ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
ICT Evolution: From Web 1.0 to 5.0
1.
2. ~is an umbrella that includes any
communication devices or application,
encompassing:radio, television,
computer, etc.
~Is the main method of communication,
getting information and expressing
social advocacies and awareness.
3. ~ICT in Business
~ICT in Engineering
~ICT in Education
~ICT in Health and Services
~ICT in Sports
~ICT in Technology
4. l In this stage of internet technology, there were very
few content creators and many of them were so called
"read only web".
l There is no user interaction.
l Web pages were STATIC.
l The feedback mechanism was thru private email.
l No direct comment available.
5. l Term web 2.0 was used around 2004.
l Internet technology became more and more
interactive, (used for social media begins).
l The internet become available to anyone and
everyone.
l The user can now interact, contribute and create their
own internet space and content.
6. l It is discovered Tim-Berners-Lee
(Father of the World-Wide-Web) as
the "read-write-executive" web.
l Semantic web or data drive web
content.
l Not make the web 2.0 obsolete.
7. ~ It is an evolution of technological
development that merge into a new system
bringing together different types of
application and media.
Example:
Smartphone
8. ~is a collection of internet-
based communication tools and
computer assisted channel
dedicated to allow users to
interact, communicate and share
information in a virtual
community.
9. ~ is a popular free social
networking site with more than a
billion users around the globe that
allows it's users to create profiles,
upload photos and videos, create
and join group.
10. ~with more than 300 million users in 2016.
~allows users to microblog or broadcast
short messages called "tweets".
12. Snapchat
-designed for the mobile
networking application.
-designed photo, sharing, chat,
and messaging services.
-images stared in chat and
messaging services and short
time and they are gone.
13. *Assistive
Media
It is a nonprofit organization
founded in 1996 in Arbor Michigan
USA.
It was the first internet based
reading services for person with
visual and reading impairments.
14. *How Safe You Are
Online?
What are the possible danger
that makes you unsafe online?
Email Spam
~knows as junk email, usually
unsolicited commercial email sent from one
source with identical message to send to
multiple recipients.
15. Email Spoofing
-a deceitful changed email practice in which the
sender adress is changed, so that it would appear
have some from a different sources usually
someone you know.
Phishing
-a deceitful practice of trying to get confidental
information such as password and usernames
credit cord details by making it appear as if it
comes from a trustworthy source.
16. Pharming
-a dangerous hacker attack on a website wich directs all
traffic to that website to another pictitious website.
Spyware
-is a computer program that is installed covertly on a
personal computer to collect information or even take
control over the computer to collect without the
knowledge of the user.
17. Computer Worm
-is a dangerous computer program replicates
itself through a network.
Trojan Horse
-a malicious software fronting to perform a good
task, but covertly performs undesirable function
with the intention of entering the computer
without the user's consent.
18. Computer virus
-a program that duplicates itself and
then infects the computer.
Hacker
- a person who is able to enter the
control other people's computer
without authorization.
19. *Possible Ways To
Protect From
Dangers Online
1. Start with your password.
2. Skip the personal information.
3. Check your settings.
4. Disable location settings.
5. Share your vacation after your home.
6. Keep your password private.
7. Examine your photos.
8. Friend your friends only.
9. Log out of your accounts.
10. Use passcodes.
20. * Security
Center
*Is the place where you can set
additional protection from THREAT
to your computer, especially when
using the internet
21. Firewall
- helps in protecting your computer from
unauthorized entries, viruses, or worms
from the internet or network.
Automatic Updates
- another features of windows which
when turned on will automatically
download updates from microsoft windows
website.
22. Virus Protection
-is meant to locate, find and remove
virus threats that are already in your
computer.
-is usually about the current anti
virus software installed in your
computer.
-also prevents other malware from
gaining entry into your computer.
24. Strategy:
*art of devising or employing plans or strategies
toward a goal.
Compilation:
*the act or process of compiling.
Citation:
*an act of qouting, especially
25. *Contextualize
Search
*Is an attempt to be more precise
in providing the list documents
according to the words used by
the user to search the internet.
*A good contextual search engine
would request for more
information to narrow down the
results of the search.
26. *Steps to Make
Contextualized Online
Search
1.Identify or choose a topic
2.Topic or task definition
3.Identify methods of search
4.Identify resources of your research
5.Make your research strategies
6.Compiling the research results
7.Evaluating the result of your research
8.Create a list of your references for
citation
27. *Research Skills
Critical Thinking
- is the ability to digest, reflect, and conclude
from the information searched.
Analytical Thinking
-the ability to look, verbalize, conceptualize
and gather data attuned to the context of the
subject.
28. Problem Solving Capability
-the ability to present solutions or solve
problems by presenting a decision based on the
given information.
Organized Data Mining
-the ability to organized and catalogue all
colleected materials efficiently despite data size.
Research Presentation
-be able to explain in writing the purpose, steps,
goal and objective of the search.
29. *Mail Merge and Label
Generation
Mail Merge
~merges data into
publication which will
be printed and mailed.
30. *PARTS OF MAIL
MERGE
u Recipient List
u Publication with
Merge Fields
u Merge Publication
31. *CREATING A RECIPIENT
LIST
1.Click the mailings tool/tab, go to the
start group and click select recipients.
2. On the list of options, select type
new list.
3. On the new address list dialog box,
click new entry and type the
recipients information.
4.Click ok.
32. *Steps in Making
Contextualize
Search1.Open the google site
2.On the upper right side of the
window.Click the google Apps icon and
click search G.
3.On the lower right part of the
window,click setting pop-up list will
appear.
4.Type the keywords that you would wish
to search for click the advanced search.
33. *Identifying Good
Source from Satirical
Source
~These sites take their cue from
TV shows that report exaggerated
news that are untrue but
intrigging and funny.
~Untrue stories should not be
share to your friends,family and
contract
34. *How To Detect Satirical
News
1.If it is good to be true,then it is
must be so.
2.If the news did not emanate from
reliable news sites.
3.If they are known from satirical
sites.
35. *List of the Top
Sources of
Satirical News
1.Adobe Chronicles
2.So,what's news!
3.Erita's time
4.The Professional Heckler
37. Mail merge
E-mail Merge
Select Recipients
Edit Recipient List
uMerges data into a publication w/c will be
printed and mailed.Shows step by step mail
merge wizard.
uMerges data into publication that will be
sent as e-mail.
u Choose the list of people you intend to
send the letter to.
uMakes changes to the list of recipients and
decide which of them should recieve your
letter.
*Mailing Start Group
Commands
38. 1.Insert Merge Field
2.Address Block
3.Greeting Line
4.Picture
5.Hyperlink
6.Format
*Adds a field from your recipient
list to the publication.
*Add an address to your letter.
*Adds a greeting line to your letter.
*Adds a picture field from your
recipients list to the publication.
*Inserts hyperlink that are
costumized for each recipients.
*Changes the format for the field
content
*Write and Insert
Group Command
39. *PREPARE YOUR
PUBLICATION
1.Create your publication in Ms.
Word.
2.Insert any additional text that
you want to appear in every
version of your mail merge
publication such as greeting.
40. *CREATE MERGED
PUBLICATION
1. Print
a. Click merge to a printer.
b. In the print space, select the option you
want and click ok.
2. Merge to New Publication
a. Click merge to new publication.
b. In the new publication in the Mail Merge
task panell.
c. Type the name of your new publication and
click save.
41. 3. Add to Existing Publication
a. Click add to existing
publication.
b. On the open publication
dialog box, locate the publication
you want to add and click OPEN.
c. Click save this publication in
the Mail Merge task pane.
42. *GENERATING
LABELS
Labels are used for
envelopes that you intend to
send out to person's usually
containing the name, address,
or telephone.
43. *STEPS IN GENERATING
LABELS
1. Start a new document in Ms. Word.
2.Go to the mailings tab in the create
group, click labels and the envelope
and labels dialog box will appear.
3. In the address box, type the text
you want to be placed on the label.
4. Click the insert address stored in
the electronic address book.
44. 5. Change the font and paragraph formatting, select the
text, right-click and select the option from the drop-
down menu.
6. Click options button and the label options dialog box
will appear.
7. Select the settings like the type of printer, the supplier
that produced your label sheets and others.
8. After you make the settings, click ok.
9. Under print, select full page of the same label or single
label. Then in the row and column boxes, enter the
numbers of rows and columns on the label sheet for the
label that you want to print.
10. Click PRINT.
46. *How to Create Slide
Presentation?
1. Open the Ms. Powerpoint
applications.
2. Click new and select your preferred
design template.
3. Click insert tab menu and insert
text, word art or any object in the
slide.
4. Click home tab to insert new slide.
47. *Ms. Excell (Work
Book)
~It is use to compute costs
incurred in the creation of
projects or create tables for
finding the researches then
create reports for business or
research that you are doing.
49. *EXCEL FUNCTIONS
SUM = calculate the sum of a range of
a cells.
AVERAGE = calculate the arithmetic
mean of a range of cells/values.
MAX = gives the maximum value in a
range.
50. *SOURCES OF PHOTOS
AND GRAPHICS
1. Personal and Professional
Photos
- are photos taken by amateur or professional
photographers using a digital camera.
2. Scanned Images
- are those that you transfer from pointed photos
and graphics using scanning devices.
51. 3. Stock Photo Library
- are several photographs and created images
that are available for sale. They come in CD or
DVD format and many of these images are
royalty-free, which means that they can be used
without additional fees.
4. Online Stock Photos
-are found in the World Wide Web. The WWW
is the dominant source of photos and graphics
around the globe.
52. *ONLINE DIGITAL FILE
FORMATS FOR IMAGES
AND TEXT
A computer will have a certain method
of encoding information for storage in
the hard drive or any form of computer
storage in the hard drive or any form of
computer storage. The ways of
encoding and storing this information
to storage is scanned file format.
53. *2 Category of Digital
File Format
Proprietary Formats
- are owned and controlled by individuals or
cooperation and the file format specifications
are not available to the public.
Open Format
- are available to everyone. It is specifically
availed by public.
54. *BASIC PRINCIPLES OF
GRAPHICS AND LAYOUT
Layout
*is the process of planning and
arranging graphics in a page.
Graphics
*is an image or visual representation.
Assymetrical
* not balance
55. Symmetrical
* equal weights or measurements and balance.
Text
* legible, appropriate font face, left justified, right justified,
centered.
Image
*proportionate, and sharpen.
Proximity and Harmony
* should be close together.
56. Consistency
*uniformity of the theme.
Color and Shape
* create interest by providing
variety in the design.
Emphasis
* one point of interest in page.
57. *PRINCIPLES AND BASIC
TECHNIQUES OF IMAGE
MANIPULATION
1. Background Color
- you can change the background if it does not match the
image or the totality of the presentation.
2. Multiple Images
- you can combine images to make a point or use a highlight
your image.
58. 3. Shadow
-using shadow effect can make the
image realistic.
4. Proportion
-when combining images, resize the
image to make it proportionate and
realistic.
5. Blending color
- you can use color to match the
background with the other elements in
the page.
59. 6. Texture
- allows you blend different image.
Texture add to the depth of your art.
Blending with allows smooth
transition of one image to another.
7. Emphasis
- there should be a focal point to a
page that will attract with the
viewers. The element you want to
emphasize should be sharp, big and
most vibrant in your design.
60. *COMBINING TEXT,
GRAPHICS AND
IMAGES
Combining - will make your message
clearer.
Transparent Shapes
- add simple shapes with a slight
transparency behind your text.
Fonts and Shapes
- should complement with each other.
61. Text and Background
- should be aligned and organized to
have an organized look.
Clean and Clear Background
- background should not be washed
out your message and to be readable.
62. *BASIC MANIPULATION USING
OFFLINE OR OPEN SOURCES
SOFTWARE
Photo editing and designing tools
allows you to make manipulate or
edit images, apply any effects and
filters.
63. *VARIOUS OFFLINE OR
OPEN SOURCE FOR
IMAGE EDITING
1. Picasa
- limited tools and will edit and organized your
photo.
2. Paint.net
- window based alternative to the Ms. Paint Editor.
3. Google Sketch Up
- 3D modeling program with tools to allow you to
create 3D models of houses and home renovation.
64. 4. Autodesk Pixlr
- is similar to photoshop and has more than 600 effects.
5. Adobe Photoshop
- is a tool to create, modify and combine image.
6. GIMP or GNU Image Manipulation
Program
- used for image retouching and editing, free form
drawing/ painting, and other specialized task.
65. *INSTALLING GIMP
1. Go to www.gimp.org.
2. Then click download.
3. Select download gimp directly.
4. Run the Gimp Installer.
5. Click Install.
6. Wait for it to finish the
installation, then click finish.
66. *PARTS OF THE
WINDOW
1. Toolbox
2. Tool option
3. Image manipulation
4. Layers dialog
5. Brushes/patterns/gradients