The document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 3.0. ICT is defined as any electronic device or application used for communication, and includes radio, television and computers. The World Wide Web started as mostly static, "read-only" Web 1.0 sites created by webmasters. Web 2.0 introduced more interactivity through user-generated content and social media. Web 3.0 aims to be more semantic and machine-readable. Examples of social media discussed include Facebook, Twitter, Instagram and Snapchat. The document also covers dangers online like spam, spoofing, phishing and computer viruses, as well as ways to protect computers using firewalls and antivirus
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
The document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It provides information on social media platforms like Facebook, Twitter, Instagram, and Snapchat. It also discusses topics like assistive media, possible internet dangers and protections, online searching methods, and mail merge and label generation in Microsoft Word.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
The document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It provides information on social media platforms like Facebook, Twitter, Instagram, and Snapchat. It also discusses topics like assistive media, possible internet dangers and protections, online searching methods, and mail merge and label generation in Microsoft Word.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
Empowerment technology by mhedilyn and judithmhedilyn8556
This document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It explains the evolution from Web 1.0 to Web 2.0 to Web 3.0. Social media platforms like Facebook, Twitter, Instagram, and Snapchat are discussed. The document also covers possible internet dangers and protections, as well as research skills and contextual search methods. Mail merge and label generation in Microsoft Word are explained. Sources of photos and graphics are provided. Digital file formats for images and text are classified.
The document discusses the history and evolution of the World Wide Web from Web 1.0 to Web 2.0. Web 1.0 featured a read-only web with few content creators and no user interaction. Web 2.0 arose around 2004 and enabled increased user contribution, interaction, and creation of user-generated content through technologies like social media and WiFi. Web 2.0 transformed the web into a more dynamic and community-oriented platform.
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUashleetimkang
This document provides information on various topics related to information and communication technology (ICT). It discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also covers technologies like smartphones, social media platforms, and assistive media. Additionally, it outlines cyber threats like email spam, phishing and pharming as well as defenses like firewalls and antivirus software. The document also discusses online research skills, digital file formats, image editing tools, and the basic principles of graphic design and layout.
ICT plays an important role in many aspects of modern society, including communication, education, commerce, health services, science, and media. Some key points about ICT's role include:
- Computers are widely used for communication via mobile phones, email, and social media. They are also used for education, online shopping, sports and recreation, arts, design, and more.
- Advances from Web 1.0 to Web 2.0 to Web 3.0 have made the internet more interactive. Popular online platforms today include social media sites like Facebook and Twitter, as well as search engines, communication apps, and creative content outlets.
- ICT brings risks like computer viruses, phishing scams,
empowerment technologies by: aiza martin and patricia obormartinaiza
ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
This document discusses the role of information and communication technology (ICT) in various aspects of modern life and society. It covers how ICT is used for communication, education, commerce, health services, science, and media. It also describes the evolution of the internet from Web 1.0 to 3.0 and common online systems and platforms. Some potential online dangers like viruses, spam, and hacking are outlined. The use of social media and popular sites like Facebook, Twitter, and Instagram is also discussed.
This document discusses the role of information and communication technology (ICT) in various aspects of modern life and society. It covers how ICT is used in education, telecommunication, commerce, sports, arts, media, health services, science, and other fields. It also describes the evolution of the internet from Web 1.0 to 3.0 and common online systems, functions, and platforms. Potential online dangers like viruses and hacking are mentioned. Guidelines for image manipulation, graphics layout, and combining text/images are provided. Finally, some basic offline image editing software options are listed.
ICT plays an important role in modern society for communication, education, commerce, health services, science, and more. It has transformed how people interact through developments like the internet. Key aspects of ICT discussed include social media, online safety, conducting research, and using tools like mail merge for communication. Formats for digital images and text include proprietary, open, and file formats indicated by extensions.
Tutorial 6 - User-Generated Content on the Internetdpd
The document discusses various methods of real-time communication on the Internet, including push technologies like chat and instant messaging, and pull technologies like mailing lists, newsgroups, and RSS feeds. It covers topics like social networking, blogs, video sharing, mashups, and how to protect privacy and identity online.
This document is a 4000 word essay analyzing the security of Facebook. It discusses how Facebook requests extensive access permissions from users for applications without properly securing user data. Updates made by Facebook have not actually improved its security. The essay suggests Facebook is still not secure and recommends ways to improve security, such as limiting third party access to user data.
This document provides tips and recommendations for setting Facebook privacy and security settings to protect against identity theft. It discusses the types of information Facebook collects about users, including registration information, posts, comments, actions taken on Facebook, information others share about you, and device and usage data. It recommends carefully considering who you accept as friends, using the "acquaintances" feature to limit information shared, disabling unneeded settings by default, and adjusting privacy settings to control what information is publicly visible. The goal is to help users reduce their risk of becoming a victim of online identity theft by securing their Facebook privacy and limiting the data available to potential fraudsters.
The document provides information on connecting to the internet using different connection types like LAN, VPN, modem, etc. It discusses using browser software like Firefox to navigate web pages and search for information. Specific browser tools are described like the address bar, bookmarks, back and forward buttons. The document also covers using email and social media to communicate online and the importance of privacy and safety practices when browsing like using strong passwords, privacy settings, and avoiding clicking suspicious links.
KakaoTalk is a cross-platform messenger app that allows users to send messages without fees. It can be used on smartphones and features include file sharing, group chat, and other functions. KakaoTalk supports Android, iOS, BlackBerry, Bada OS, and Symbian platforms. It uses phone numbers or IDs to connect users and notifies them of new messages through push notifications.
This document provides an overview and quick start guide for a new MacBook Pro. It introduces the various ports and features of the laptop, provides instructions for setup and account creation, and gives brief introductions to key apps like Safari, Mail, Calendar, Messages, and Photos. It also provides tips on gestures, customizing settings, using iCloud, and where to find additional help resources.
Common reasons for losing contacts on an iPhone include accidental deletion, restoring the iPhone to factory settings, jailbreaking or rooting the device, iOS upgrades, and virus attacks. There are three main ways to retrieve deleted contacts: recovering from iTunes or iCloud backups, which automatically sync data when the iPhone is connected; or using third-party software like iPhonMate, which allows scanning the iPhone to find and recover selected deleted contacts. More details are available on iPhonMate's website.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
Empowerment technology by mhedilyn and judithmhedilyn8556
This document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It explains the evolution from Web 1.0 to Web 2.0 to Web 3.0. Social media platforms like Facebook, Twitter, Instagram, and Snapchat are discussed. The document also covers possible internet dangers and protections, as well as research skills and contextual search methods. Mail merge and label generation in Microsoft Word are explained. Sources of photos and graphics are provided. Digital file formats for images and text are classified.
The document discusses the history and evolution of the World Wide Web from Web 1.0 to Web 2.0. Web 1.0 featured a read-only web with few content creators and no user interaction. Web 2.0 arose around 2004 and enabled increased user contribution, interaction, and creation of user-generated content through technologies like social media and WiFi. Web 2.0 transformed the web into a more dynamic and community-oriented platform.
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUashleetimkang
This document provides information on various topics related to information and communication technology (ICT). It discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also covers technologies like smartphones, social media platforms, and assistive media. Additionally, it outlines cyber threats like email spam, phishing and pharming as well as defenses like firewalls and antivirus software. The document also discusses online research skills, digital file formats, image editing tools, and the basic principles of graphic design and layout.
ICT plays an important role in many aspects of modern society, including communication, education, commerce, health services, science, and media. Some key points about ICT's role include:
- Computers are widely used for communication via mobile phones, email, and social media. They are also used for education, online shopping, sports and recreation, arts, design, and more.
- Advances from Web 1.0 to Web 2.0 to Web 3.0 have made the internet more interactive. Popular online platforms today include social media sites like Facebook and Twitter, as well as search engines, communication apps, and creative content outlets.
- ICT brings risks like computer viruses, phishing scams,
empowerment technologies by: aiza martin and patricia obormartinaiza
ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
This document discusses the role of information and communication technology (ICT) in various aspects of modern life and society. It covers how ICT is used for communication, education, commerce, health services, science, and media. It also describes the evolution of the internet from Web 1.0 to 3.0 and common online systems and platforms. Some potential online dangers like viruses, spam, and hacking are outlined. The use of social media and popular sites like Facebook, Twitter, and Instagram is also discussed.
This document discusses the role of information and communication technology (ICT) in various aspects of modern life and society. It covers how ICT is used in education, telecommunication, commerce, sports, arts, media, health services, science, and other fields. It also describes the evolution of the internet from Web 1.0 to 3.0 and common online systems, functions, and platforms. Potential online dangers like viruses and hacking are mentioned. Guidelines for image manipulation, graphics layout, and combining text/images are provided. Finally, some basic offline image editing software options are listed.
ICT plays an important role in modern society for communication, education, commerce, health services, science, and more. It has transformed how people interact through developments like the internet. Key aspects of ICT discussed include social media, online safety, conducting research, and using tools like mail merge for communication. Formats for digital images and text include proprietary, open, and file formats indicated by extensions.
Tutorial 6 - User-Generated Content on the Internetdpd
The document discusses various methods of real-time communication on the Internet, including push technologies like chat and instant messaging, and pull technologies like mailing lists, newsgroups, and RSS feeds. It covers topics like social networking, blogs, video sharing, mashups, and how to protect privacy and identity online.
This document is a 4000 word essay analyzing the security of Facebook. It discusses how Facebook requests extensive access permissions from users for applications without properly securing user data. Updates made by Facebook have not actually improved its security. The essay suggests Facebook is still not secure and recommends ways to improve security, such as limiting third party access to user data.
This document provides tips and recommendations for setting Facebook privacy and security settings to protect against identity theft. It discusses the types of information Facebook collects about users, including registration information, posts, comments, actions taken on Facebook, information others share about you, and device and usage data. It recommends carefully considering who you accept as friends, using the "acquaintances" feature to limit information shared, disabling unneeded settings by default, and adjusting privacy settings to control what information is publicly visible. The goal is to help users reduce their risk of becoming a victim of online identity theft by securing their Facebook privacy and limiting the data available to potential fraudsters.
The document provides information on connecting to the internet using different connection types like LAN, VPN, modem, etc. It discusses using browser software like Firefox to navigate web pages and search for information. Specific browser tools are described like the address bar, bookmarks, back and forward buttons. The document also covers using email and social media to communicate online and the importance of privacy and safety practices when browsing like using strong passwords, privacy settings, and avoiding clicking suspicious links.
KakaoTalk is a cross-platform messenger app that allows users to send messages without fees. It can be used on smartphones and features include file sharing, group chat, and other functions. KakaoTalk supports Android, iOS, BlackBerry, Bada OS, and Symbian platforms. It uses phone numbers or IDs to connect users and notifies them of new messages through push notifications.
This document provides an overview and quick start guide for a new MacBook Pro. It introduces the various ports and features of the laptop, provides instructions for setup and account creation, and gives brief introductions to key apps like Safari, Mail, Calendar, Messages, and Photos. It also provides tips on gestures, customizing settings, using iCloud, and where to find additional help resources.
Common reasons for losing contacts on an iPhone include accidental deletion, restoring the iPhone to factory settings, jailbreaking or rooting the device, iOS upgrades, and virus attacks. There are three main ways to retrieve deleted contacts: recovering from iTunes or iCloud backups, which automatically sync data when the iPhone is connected; or using third-party software like iPhonMate, which allows scanning the iPhone to find and recover selected deleted contacts. More details are available on iPhonMate's website.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
This document discusses empowerment through technology. It provides an overview of information and communication technologies (ICT) and how they have evolved from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence and how different applications have merged. While technology provides many benefits, it also poses some dangers like email spam, phishing, and computer viruses. The document provides tips on how to protect yourself online and conduct safe research.
This document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, with examples like social media, and some of the dangers online like email spam, phishing, and computer viruses. It provides steps to conduct research and develop skills like critical thinking. Additionally, it outlines the mail merge and label generation process in Microsoft Word and how to create slide presentations in PowerPoint.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
This document discusses empowerment through technology and information communication technology (ICT). It provides an introduction to ICT and how it is used in different fields like commerce, engineering, education, health, and more. It discusses the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence through examples like smartphones. Other topics covered include social media platforms like Facebook, Twitter, and Instagram, assistive media, online safety, and security tools.
empowerment technology by: kier and joverynkiersamaco
This document provides an overview of empowerment technology and discusses various topics related to information and communication technology (ICT). It describes the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, social media platforms, dangers on the internet like spam and viruses, and ways to protect computers. Additionally, it covers research skills, mail merge functions in Microsoft Word, identifying credible online sources, and basics of slide presentation and graphic design.
ICT plays an important role in many aspects of modern society through communication, education, commerce, health services, and more. The document discusses how ICT is used in these areas and others like science, sports, and media. It also covers the evolution of the internet from early Web 1.0 to current versions, common online systems and platforms, and potential online dangers. Guidelines for image and text manipulation and basic graphic design principles are provided.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
This document discusses empowerment through information and communication technologies (ICT) and provides information on current states of the internet. It describes the evolution from static Web 1.0 to more interactive Web 2.0 and the emerging semantic Web 3.0. The document also discusses technology convergence through examples like smartphones, discusses popular social media platforms, and outlines some dangers of computers like email spam, phishing, and computer viruses. It provides guidance on research skills and contextualizing online searches as well as how to use mail merge functions in Microsoft Word.
This document discusses information and communication technology (ICT) and how it can be used across different fields like education, commerce, health services, and more. It explains the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and the emerging data-driven Web 3.0. The document also discusses technology convergence using smartphones as an example. It covers social media platforms and online dangers like spam, spoofing, and hacking. Finally, it provides guidance on contextualized online research and detecting satirical news sources.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
This document discusses various technologies and how they relate to empowerment. It begins by defining ICT as information and communication technology, which encompasses devices and applications used for communication like radio, TV, and computers. It then discusses how ICT is used in different fields like commerce, engineering, education, health, and sports. It also discusses the evolution of the internet from Web 1.0 to 2.0 to 3.0 and how user interaction and contribution has increased over time. Social media platforms and how to stay safe online are also covered.
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
This document provides an overview of information and communication technology (ICT), including current states of the web, social media platforms, and presentation tools. It discusses ICT as an umbrella term encompassing communication devices and applications. Web 1.0 allowed read-only access to static pages, while Web 2.0 enabled user interaction, participation, and sharing on dynamic pages. Web 3.0 aims to be a read-write-execute web guided by semantic analysis. The document also outlines dangers online like spam, spoofing, phishing, and malware, as well as security measures.
This document discusses various topics related to information and communication technology (ICT), including:
- ICT definitions and uses in different fields like commerce, engineering, education, health, and sports
- Evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0
- Social media platforms like Facebook, Twitter, Snapchat, and Instagram
- Online safety issues like spam, spoofing, phishing, and computer viruses
- Research skills and contextualized online searching
- Mail merge and label generation in Microsoft Word
- Creating slide presentations in Microsoft PowerPoint
- Sources of photos and graphic files as well as common digital file formats
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
The document provides an overview of various topics related to empowerment through technology including:
- ICT and the state of internet technology including web 1.0, 2.0, and 3.0.
- Technology convergence and how different applications merge.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Online threats like spam, spoofing, phishing, and how to protect computers.
- Steps for contextualized online research including defining topics, identifying resources and evaluating results.
- Using Microsoft Word and Excel for tasks like mail merge, formulas, and functions.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
2. ICT
It is the umbrella that includes any communication
device or application, encompassing, radio,
television, computer, etc.
Main method of communication getting
information and education attaining services and
expressing social advocacies and awareness.
5. 1 STAGE(WEB 1.0)
Develop by web master.
Were very few web content creators and many of
them were called “READ ONLY WEB”.
There no user interaction
Web pages were STATIC.
The feedback mechanism was thru private email.
No direct comment available.
No social media.
7. 2ND STAGE(WEB 2.0)
DYNAMIC
The term WEB 2.0 was used around 2004.
Internet technology become more and more interactive(used of social
media begins).
The internet become more available to everyone.
The user can now interact, contribute, and create their own, internet
space and content, sharing video, picture, and movies.
8. 3RD STAGE(WEB 3.0)
It is discovered by TIM-BERNER’S-LEE(father of the WWW) as the
“READ-WRITE-EXECUTE-WEB”.
It is reffered to as the SEMANTIC WEB.
10. FACEBOOK
Popular free social networking site create profile, upload, photos,
videos, create, and join groups, react to friends.
11. TWITTER
300 million users in 2016
Allows users to microblogor broadcast short message”tweets”.
12. INTRAGAM
A social networking app that enables the users to share mobile photo
and video either publicly or privately.
13. SNAPCHAT Designed for the mobile networking applications
Also designed for photo sharing, chat, and messaging services
Images and video share in this app last only for a short time and they
are done.
14. ASSISTIVE MEDIA It is not a nonprofit organization founded in 1996 in Ann Arbor,
Michigan USA
It was the first internet based reading service for persons with visual
and reading impairments.
16. EMAIL SPAM Know as the JUNK EMAIL, usually unsolicited commercial email sent
from one source with identical message to send to multiple recipient.
Spammer is the term used to refer to a person who creates electronic
spam.
17. EMAIL SPOOFING A deceitful email practice in which the sender address is changed that is
would appear to have come from a different sources usually someone
you know.
It is usually used by spammers to hide the origin of the spam.
Technique of EMAIL SPAMMING.
18. PHISHING
A deceitful practice of trying to get the confidential information such as
passwords, users name, and credit card details by making it appear as if
it corner from a trust worthy sources.
19. PHARMING
A dangerous hacker attack on a website which directs all traffic to that
website to another fictitious website.
20. SPY WARE Physical spy ware
It is a computer program that is installed covertly on a personal
computer to collect information or even take control over the computer
without the knowledge of the users.
21. COMPUTER WORM Is a dangerous computer program that replicates itself through a
networking.
Some worm’s delete files, other disrupt the networking function and
still , others send junk mail from infected computer.
22. TROJAN HORSE A malicious software fronting to perform a good tasks but covertly
perform undesirable function with the intention of entering the
computer without user’s consent.
It can erase data, can allow access of the victim’s computer, can corrupt
files, and can be used in phishing for bank account’s.
23. COMPUTER VIRUS A program that duplicates itself and then infects the computer.
It spreads like areal biological virus wherein it attaches itself to a lost
program and infect other computers if it is received by a computer
through the internet.
Virus can also be transferred by the use of removable storage.
24. HACKER A person who is able to enter and control other people’s computer
without authorization.
Be able to enter another’s computer, usually vandalizes the victims
website, steals personal information
25. SETTINGS THAT HELPS TO PROTECT COMPUTER
FIREWALL
AUTOMATIC UPDATES
VIRUS PROTECTION
26. FIREWALL
Help’s in protecting you’re computer
from unauthorized entries, viruses, or
worms from the internet or network.
AUTOMATIC UPDATES
Another features of windows which when
turned on will, automatically download
updates from Microsoft windows
website.
VIRUSPROTECTION
Is usually about the current anti-virus
software installed in you’re computer.
Anti-virus software is meant to locate,
find and remove virus threats that are
already in you’re computer.
29. CONTEXTUALIZE
Is to place something such as words or activity in a context.
RESEARCH
The collecting of information about a particular subject.
STRATEGY
Art of devising, or employing plans or stratagies towards a goal.
A careful plan or method.
30. COMPILATION
The act or process of compiling
CITATION
The act of quoting, especially the citing of a previously settled case at
low.
31. CONTEXTUAL SEARCH
An attempt to be more precise in providing the list documents account
to the words used by the user to search the internet
A good contextual search engine would request for more information
to narrow down the result of the search.
32. 1. Identify or choose a topic.
2. Topic or task definition.
3. Identify methods of search.
4. Identify resources of you’re research.
5. Make you’re research strategies.
6. Compiling the research result.
7. Evaluate the results of you’re research.
8. Create a list of you’re references for citation.
34. CRITICAL THINKING
It is the ability to digest, reflect, and conclude from the information
searched.
ANALYTICAL THINGKING
The ability to work, verbalize, conceptualize, and gather data attuned to the
contex of the subject.
People with this ability are able to define and identify the latitude of the
problem and present all possible solutions.
35. ORGANIZING DATA MINING
It is the ability to organize and catalagoe all collected materials efficiently
despite data size.
RESEARCH PRESENTATION
It is the ability to present ideas and draw conclusions from the research.
Be able to explain in writing the purpose steps goals and objective of the
research.
36. CREATIVITY AND DEVELOPEDIMAGINATION
It is the ability to look for the alternative solutions to the problems
needed to solve in the research.
Thinking beyond the usual approaches to the research objectives.
COMPUTER LITERACY
Knowledge of the various computer application and tools.
Skills in the use of software to write, design and present.
38. 1. Open the Google Site.
2. On the upper right side of the window, click the Google Apps Icon and search G.
3. On the lower right part of the window, click setting and the Google Settings pop-up list
will appear.
4. Click advanced search and the advanced search window will appear.
5. Type and Click.
40. Satirical sites are website that report untrue or false stories means to amuse or entertain.
Take their cue from TV shows that report exaggerated news.
Started as spoofs of real public figures.
42. 1. It is too good to be true, then it must be so.
2. If the news did not emanate from reliable news site.
3. If they are from know satirical sites.
43. LIST OF TOP SOURCES OF SATIRICAL NEWS
1. Adobo Chronicles(adobochronicles.com)
2. So What’s New?
3. Eritas Time
4. The Professional Heckler
44. AMERICAN SATIRICAL SITES IN THE US.
1. The Onion(theonion.com)
2. Click Hole(clickhole,com)
3. Christ Wire Global Media(christwire.com)
45. MAIL MERGE AND LABEL GENERATION
Is used to automatically add mailing address or personalized
information.
47. MAIL MERGE
Merge data into a publication which will be printed and mailed.
Shows step by step mail merge wizard.
EMAIL MERGE
Merges data into a publication that will be sent as email.
48. SELECT RECIPIENTS
Chooses the list of people you intend to send the letter to.
You can type your own list, use you’re outlook contacts or connect to a
data page.
EDIT RECIPIENT LIST
Makes changes to the list of recipient and decide which of them should
receive you’re letter.
50. INSERT MERGE MAIL
Adds a field from you’re recipient list to the publication.
ADDRESS BLOCK
Adds an address to you’re letter.
GREETING LINE
Adds a greeting line to you’re letter.
51. PICTURE
Adds a picture field from you’re recipient list to the publication.
INSERT PERSONALIZEDHYPER LINK
Inserts hyperlinked that are customized for each recipient.
FORMAT
Changes the format for the content
52. STEP 1:CREATING A RECIPIENT LIST1. Click the Mailing tab, go to start group and click select Recipient.
2. On the list of option, select Type New List.
3. On the New Address List dialog box, click New Entry, and type the
recipient information.
4. Click OK.
53. STEP 2:PREPARE YOU’RE PUBLICATION
1. Insert any additional text that you want to appear in every version of
you’re mail merge publication, such as greetings.
54. STEP 3:CREATE MERGEDPUBLICATION
1. PRINT
A. Click Merge to a printer.
B. In the print space, select the options you want and click OK.
2. Merge to New Publication
A. Click Merge to New Publication.
B. In the New Publication, click save this publication in the Mail Merge task.
C. Type the name of you’re New Publication and Save,
3.Add to Existing Publication
A. Click Add to Existing Publication.
55. B. On the Publication dialog box, locate the publication you want to
add
and Click Open.
C .Click save this Publication in the Mail Merge.
56. GENERATING LABELS
Labels are used for envelopes that you intend to send out to persons
usually containing the names, address, or telephone numbers.
58. 1. Start a new documents in MS WORD.
2. Go to Mailings tab, in the Create word, Click labels and the envelope and labels dialog box
will appear.
3. In the Address Box, type the text you want to be placed on the label.
4. Click the Insert Address icon if you have an address stored in the electronics address book.
5. To change the Font or Paragraph formatting, select the text, right click and select the
option from the drop-down menu.
6. Click options button and the label options dialog box will appear.
7. Select the settings like the type of printer, the supplier that produced you’re label sheets
and others.
8. After you make the settings, click OK.
59. 9. Under print, select full page of the same label or single label. Then in the row
and columns boxes enter the numbers that match the numbers of raws and
columns on the label sheet for the label that you want to print.
10. Click Print
60. MS EXCEL
Is used to compute costs incurred in the certain of projects, or create
tables for finding the researches you are doing.
63. =SUM-calculate the sum of a range of cells.
=AVERAGE-the arithmetic mean of a range of cells/values.
=MAX-gives the maximum value in a range.
=MIN-gives the minimum value in a range.
=COUNT-counts the number of cells in a range.
=IF-shows a series calculation using the same formula but a different value for
67. There are many sources of photos and graphics. They can come direct from you’re camera ,
old friends, free from internet or purchased from the internet or store etc.
68. 1.PERSONAL AND PROFESSIONAL PHOTOS
Are photos taken by the amateur or professional photographers using a
digital camera. These images are downloaded and are stored in the
computer. They are source of image for any project that you may
embark. They are original and definitely something one would like work
on.
69. 2.SCANNED IMAGES
Are those that you transfer from printed photos and graphics using
scanning devices which you can transfer to you’re computer for further
improvement and modification. These are mostly old picture
photographed before the digital age.
70. 3.STOCK PHOTO LIBRARY
Are several photographs and created images that are available for sale.
They come in CD or DVD format and many of these images are royalty
free, which means that they can be used without additional fees.
71. 4.ONLINE STOCK PHOTOS Are found in the World Wide Web. The WWW is now dominant source
of photos and graphics around the globe because of the widely
available choices and reasonable.
Other sites even offer copyright free photos and other media. One
advantages of this set up is that you do not have to go to place where
most of these photos were taken. Another is that before you purchase
or get a picture, you can view it and if you decide to buy, simply
download it to you’re computer.
73. A computer will have a certain method of coding information for storage in the hard drive
or any form of computer storage. The ways of encoding and storing this information to
storage, is called FILE FORMAT. Digital file format are categorized as either proprietary or
open.
74. PROPRIETARY FORMATS
Are found owned and controlled by individuals or corporations and the file format
specification are not available to the public. They are usually covered by copy right and the
owner has exclusive control of the present and future technology development of this
format. An example a proprietary format is the one who used in the storage for Microsoft
word, Excel and Power Piont.
75. OPEN FORMATS
Are means and ways for storing digital information that are free, can be used by the public
and are not embarrassed by copyrights or patents. These formats are called FREE FILE
FORMATS are usually sustained and maintained by a group of individuals or organization.
Example of this format are used in the storage for open offices and other free or open
software.
76. FILE FORMAT
Uses suffixes that are added to the end of a Filename, called FILENAME EXTENSIONS. The
file extension is a means of identifying the format of the file, with a period before it after the
filename.
The File extensions has usually two or more character, although historically there were only
three, but modern operating systems are not constrained anymore by that number of
character, more are now allowed.
78. 1.UNCOMPRESSEDOR RAWFORMAT
Is usually used for storing original file format, it is a flexible form but
needs bigger memory to store.
2.LOSSLESS FILE FORMAT
Is a file formats that was compressed to replicate the original but at a
reduced file size. This type is ideal for storing, important files(images,
audio or video.
79. IMAGE FILE FORMAT
Are standard means of organizing and storing digital images.
May store data in uncompressed, compressed, vector formats.
Are composed of digital data in one of these formats that can be rasterized for use on a
computer display or printer.
RASTER IMAGE FORMAT
Images faithfully display the color information of an image making them a great choice to
display detailed image.
81. JOINTPHOTOGRAPHICS GROUP (JPEG)
An extremely common format, and is typically use for sharing photographs.
Image can contain more than 16 million colors.
GRAPHICS INTERFACE FORMAT(GIF)
One of the most common image format on the web.
Supported for animation has made it incredibly popular
82. BITMAP (BMP)
One of the simplest file format in raster graphics.
TAGGED IMAGE FILE FORMAT(TIFF)
Commonly used file format in the fields of printing, graphic design, and popular
photography.
83. PORTABLE NETWORK GRAPHICS(PNG)
Most use lossless image format on the internet.
PICTURE EXCHANGE(PCX)
Was created in 1985 to serve as the native file format of the PC Paint Brush Software.
Extended to support true color images.
85. VECTOR IMAGES
Are lossless files created using mathematical geometry equations to represent image in
digital computer graphics.
VECTOR GRAPHICS
It has the advantages of retaining its quality at any desired images, size unliked raster image
that appear pixilated when displayed in expnded images size.
Is the preffered format for those who desire quality prints and displays images.
87. ADOBE ILLUSTRATOR(.AI)
Created using paths and lines connected by points instead of bitmap.
Object, color, text.
DRAWING EXCHANGE FORMAT(.dxf)
Drawing format developed and introduced by auto-desk the makes of
auto-CAD. Similar to drawing file but its universal so that auto-CAD can be
opened using other program.
88. DRAWING FILE(.DRW)
Generic drawing created and stored in a vector format that uses lines or
path to represent image.
SCALABLE VECTOR/GRAPHICS(.svg)
Most common vector format on the internet.
Developed by the WWW to display vector graphics
Open format and can be opened by adobe, corel, and open graphics
programs.
90. LAYOUT
Is the process of planning and arranging graphics.
A good layout should have a balance make up and alignment of elements.
SYMMETRICAL
There are equal weight of element
ASSYMMETRICAL
There are an artistic and different intensity on one side of the page
91. TEXT
Should be legible appropriate font page.
IMAGE
Should be proportionate with sharp color and high resolution
PROXIMITY AND HARMONY
Should be close together and not scattered and arrange apart.
92. CONSISTENCY
Should be uniformity of theme on each page.
COLOR AND SHAPE
Create and interest by providing variety in design like the use of color contrast and shape.
EMPHASIS
Should be one point of interest in a page.
Should have a different size, colors, shape, or background.
94. BACKGROUND COLOR
You can change the background if it does not match the image or the totally of the
presentation.
You can also add effects to the background.
MULTIPLE IMAGE
To make a point or use to highlight you’re message.
SHADOW
Using shadow effect will make the image realistic.
95. PROPORTION When combining images, resize the image to make it proportionate and realistic.
BLENDING COLOR
You can us color blending to match the background with the other elements in the page.
TEXTURE
Allows you to blend different images, textures add to the depth of you’re art. Blending will
allow smooth transition of the image to another.
96. EMPHASIS
There should be focal point to a page, that will attract viewers. The element you want to
emphasize should be sharp, big and most vibrant in you’re design.
98. Combining text, graphics, and image in you’re presentation, in graphics
or web pages will make you’re message clearer.
99. TRANSPARENT SHAPES
Add simple shapes with a slight transparency behind you’re text to clearly see the text you
want to emphasize.
TEXT AND BACKGROUND
Text and background should ne aligned to have an organized look. You can align text with
shapes or geometric figures in the images.
100. FONTS AND SHAPE
Fonts and shape should complement with each other. You can use rounded shape with
rounded fonts and sharp shapes with rounded fonts.
CLEAR AND CLEAND BACKGROUND
Use a clean and clear background for the message to be readable. Background should npt
wash out you’re message.
102. Photo editing and designing tools allow to make manipulate or edit images, apply effects,
filters, add frames, crop, add text, change background color, make photo collage and photo
album that you would like to do in an image.
104. 1. PICASA
It is a Google’s free photo manager to edit and organize you’re photos.
2.PAINT.NET
it is a window’s-based alternative manager to edit and organize you’re photos.
3.GOOGLE SKETCHUP
It is a free, 3d modeling program with tools that allow you to create 3D models of houses,
home reservation wood working project.
105. 4.AUTODESKPIXL
A free photo editing tool with more than 600 effects.
5.ADOBE PHOTOSHOP
A tool to create, modifying, combine and optimize digital image and photo.
6.IMAGE MANIPULATION PROGRAM(GIMP/ GNU)
Is a free, open-source, image/ graphics editing program used for image retouching and
editing, free-form drawing/painting and other specialized tasks.
106. INSTALLING GIMP
1. Go to WWW.gmp.com
2. Then click download
3. Select download GIMP derictly
4. Run the GIMP Installer
5. Click Install
6. Wait for it to finish the installation then click finish
108. PRESENTATION
Is a graphics program that allows you to create slide shows presenting a topic, lecture,
demonstrator, to enlighten, educate, communicate, or persuade the audience.
Allows you to organize, summarize and format you’re materials illustrator you’re
presentation with image or clip art, animation, graphics, and other multi media components.
Allows transition, animation, and sounds that will captivate the audience and keep them
interested.
110. 1. ZOHOSHOW
It is online presentation that features master slides, template,
customization the ability to insert videos/ images, transition animations,
images editing, shape effects, and easy flowchart building .
Useful particularly in business man.
111. 2. LINKED IN SLIDE SHARE
Web 2.0 based sliding hosting service. Users can upload files privately
and publicy in the ff formats. Power point, Pdf, Keynote or open
Documents Presentation.
112. 4. GOOGLE SLIDES
Create a new presentation and edit, collaborate with others present
wherever you are free.
113. 5.MS POWER POINT
Slide show presentation program currently developed by Microsoft.
114. 6.PREZI
Cloude-base presentation software based on a software as service
model. The products employs a zooming user interface(ZUI) which
allows users to zoom in and out of their presentation media.
115. CREATING NEW PREZI ACCOUNT
1. Go to PREZI.COM
2. Click get started on the upper right corner,
3. Sing for a public account.
4. Fill in the boxes with the specified information.
5. After providing information, click create you’re free public accounts.