SlideShare a Scribd company logo
EMPOWERMENT
TECHNOLOGY
ICT
It is the umbrella that includes any communication
device or application, encompassing, radio,
television, computer, etc.
Main method of communication getting
information and education attaining services and
expressing social advocacies and awareness.
USEFUL AT:
HOME
TRANSPORTATION
SCHOOL
MALL
BUSINESS
WORLD WIDE WEB(WWW)
Though internet
Belong to internet technology
WEBSITE
TWITTER
CELLPHONE
MEDIA
1 STAGE(WEB 1.0)
Develop by web master.
Were very few web content creators and many of
them were called “READ ONLY WEB”.
There no user interaction
Web pages were STATIC.
The feedback mechanism was thru private email.
No direct comment available.
No social media.
Web
mast
er
Static
web
users
2ND STAGE(WEB 2.0)
 DYNAMIC
 The term WEB 2.0 was used around 2004.
 Internet technology become more and more interactive(used of social
media begins).
 The internet become more available to everyone.
 The user can now interact, contribute, and create their own, internet
space and content, sharing video, picture, and movies.

3RD STAGE(WEB 3.0)
 It is discovered by TIM-BERNER’S-LEE(father of the WWW) as the
“READ-WRITE-EXECUTE-WEB”.
 It is reffered to as the SEMANTIC WEB.
TECHNOLOGY CONVERGENCE
 Bringing together
FACEBOOK
 Popular free social networking site create profile, upload, photos,
videos, create, and join groups, react to friends.
TWITTER
 300 million users in 2016
 Allows users to microblogor broadcast short message”tweets”.
INTRAGAM
 A social networking app that enables the users to share mobile photo
and video either publicly or privately.
SNAPCHAT Designed for the mobile networking applications
 Also designed for photo sharing, chat, and messaging services
 Images and video share in this app last only for a short time and they
are done.
ASSISTIVE MEDIA It is not a nonprofit organization founded in 1996 in Ann Arbor,
Michigan USA
 It was the first internet based reading service for persons with visual
and reading impairments.
DANGER IN ONLINE
 EMAIL SPAM
 EMAIL SPOOFING
 PHISHING
 PHARMING
 SPY WARE
 COMPUTER WORM
 TROJAN HORSE
 COMPUTER VIRUS
 HACKER
EMAIL SPAM Know as the JUNK EMAIL, usually unsolicited commercial email sent
from one source with identical message to send to multiple recipient.
 Spammer is the term used to refer to a person who creates electronic
spam.
EMAIL SPOOFING A deceitful email practice in which the sender address is changed that is
would appear to have come from a different sources usually someone
you know.
 It is usually used by spammers to hide the origin of the spam.
 Technique of EMAIL SPAMMING.
PHISHING
 A deceitful practice of trying to get the confidential information such as
passwords, users name, and credit card details by making it appear as if
it corner from a trust worthy sources.
PHARMING
 A dangerous hacker attack on a website which directs all traffic to that
website to another fictitious website.
SPY WARE Physical spy ware
 It is a computer program that is installed covertly on a personal
computer to collect information or even take control over the computer
without the knowledge of the users.
COMPUTER WORM Is a dangerous computer program that replicates itself through a
networking.
 Some worm’s delete files, other disrupt the networking function and
still , others send junk mail from infected computer.
TROJAN HORSE A malicious software fronting to perform a good tasks but covertly
perform undesirable function with the intention of entering the
computer without user’s consent.
 It can erase data, can allow access of the victim’s computer, can corrupt
files, and can be used in phishing for bank account’s.
COMPUTER VIRUS A program that duplicates itself and then infects the computer.
 It spreads like areal biological virus wherein it attaches itself to a lost
program and infect other computers if it is received by a computer
through the internet.
 Virus can also be transferred by the use of removable storage.
HACKER A person who is able to enter and control other people’s computer
without authorization.
 Be able to enter another’s computer, usually vandalizes the victims
website, steals personal information
SETTINGS THAT HELPS TO PROTECT COMPUTER
 FIREWALL
 AUTOMATIC UPDATES
 VIRUS PROTECTION
FIREWALL
Help’s in protecting you’re computer
from unauthorized entries, viruses, or
worms from the internet or network.
AUTOMATIC UPDATES
Another features of windows which when
turned on will, automatically download
updates from Microsoft windows
website.
VIRUSPROTECTION
Is usually about the current anti-virus
software installed in you’re computer.
Anti-virus software is meant to locate,
find and remove virus threats that are
already in you’re computer.
UNLOCKING
OF
DIFFICULTIES
 CONTEXTUALIZE
 RESEARCH
 STRATEGY
 COMPILATION
 CITATION
CONTEXTUALIZE
 Is to place something such as words or activity in a context.
RESEARCH
 The collecting of information about a particular subject.
STRATEGY
Art of devising, or employing plans or stratagies towards a goal.
A careful plan or method.
COMPILATION
 The act or process of compiling
CITATION
 The act of quoting, especially the citing of a previously settled case at
low.
CONTEXTUAL SEARCH
 An attempt to be more precise in providing the list documents account
to the words used by the user to search the internet
 A good contextual search engine would request for more information
to narrow down the result of the search.
1. Identify or choose a topic.
2. Topic or task definition.
3. Identify methods of search.
4. Identify resources of you’re research.
5. Make you’re research strategies.
6. Compiling the research result.
7. Evaluate the results of you’re research.
8. Create a list of you’re references for citation.
SKILL/RESEARCH SKILLS
CRITICAL THINKING
 It is the ability to digest, reflect, and conclude from the information
searched.
 ANALYTICAL THINGKING
 The ability to work, verbalize, conceptualize, and gather data attuned to the
contex of the subject.
 People with this ability are able to define and identify the latitude of the
problem and present all possible solutions.
ORGANIZING DATA MINING
 It is the ability to organize and catalagoe all collected materials efficiently
despite data size.
 RESEARCH PRESENTATION
 It is the ability to present ideas and draw conclusions from the research.
 Be able to explain in writing the purpose steps goals and objective of the
research.
CREATIVITY AND DEVELOPEDIMAGINATION
 It is the ability to look for the alternative solutions to the problems
needed to solve in the research.
 Thinking beyond the usual approaches to the research objectives.
COMPUTER LITERACY
 Knowledge of the various computer application and tools.
 Skills in the use of software to write, design and present.
STEP IN CONTEXTUALIZE
ENGINE RESEARCH
1. Open the Google Site.
2. On the upper right side of the window, click the Google Apps Icon and search G.
3. On the lower right part of the window, click setting and the Google Settings pop-up list
will appear.
4. Click advanced search and the advanced search window will appear.
5. Type and Click.
IDENTIFYING GOOD
SOURCE FROM SATIRICAL
SOURCE
 Satirical sites are website that report untrue or false stories means to amuse or entertain.
 Take their cue from TV shows that report exaggerated news.
 Started as spoofs of real public figures.
HOW TO DETECT
SATIRICAL NEWS
1. It is too good to be true, then it must be so.
2. If the news did not emanate from reliable news site.
3. If they are from know satirical sites.
LIST OF TOP SOURCES OF SATIRICAL NEWS
1. Adobo Chronicles(adobochronicles.com)
2. So What’s New?
3. Eritas Time
4. The Professional Heckler
AMERICAN SATIRICAL SITES IN THE US.
1. The Onion(theonion.com)
2. Click Hole(clickhole,com)
3. Christ Wire Global Media(christwire.com)
MAIL MERGE AND LABEL GENERATION
 Is used to automatically add mailing address or personalized
information.
MAILING START
GROUP COMMAND
MAIL MERGE
 Merge data into a publication which will be printed and mailed.
 Shows step by step mail merge wizard.
 EMAIL MERGE
 Merges data into a publication that will be sent as email.
SELECT RECIPIENTS
 Chooses the list of people you intend to send the letter to.
 You can type your own list, use you’re outlook contacts or connect to a
data page.
 EDIT RECIPIENT LIST
 Makes changes to the list of recipient and decide which of them should
receive you’re letter.
WRITE AND INSERT
GROUP COMMANDS
INSERT MERGE MAIL
 Adds a field from you’re recipient list to the publication.
 ADDRESS BLOCK
 Adds an address to you’re letter.
 GREETING LINE
 Adds a greeting line to you’re letter.
PICTURE
 Adds a picture field from you’re recipient list to the publication.
INSERT PERSONALIZEDHYPER LINK
 Inserts hyperlinked that are customized for each recipient.
 FORMAT
 Changes the format for the content
STEP 1:CREATING A RECIPIENT LIST1. Click the Mailing tab, go to start group and click select Recipient.
2. On the list of option, select Type New List.
3. On the New Address List dialog box, click New Entry, and type the
recipient information.
4. Click OK.
STEP 2:PREPARE YOU’RE PUBLICATION
1. Insert any additional text that you want to appear in every version of
you’re mail merge publication, such as greetings.
STEP 3:CREATE MERGEDPUBLICATION
1. PRINT
A. Click Merge to a printer.
B. In the print space, select the options you want and click OK.
2. Merge to New Publication
A. Click Merge to New Publication.
B. In the New Publication, click save this publication in the Mail Merge task.
C. Type the name of you’re New Publication and Save,
3.Add to Existing Publication
A. Click Add to Existing Publication.
 B. On the Publication dialog box, locate the publication you want to
add
and Click Open.
C .Click save this Publication in the Mail Merge.
GENERATING LABELS
 Labels are used for envelopes that you intend to send out to persons
usually containing the names, address, or telephone numbers.
STEPS IN
GENERATING
LABELS
1. Start a new documents in MS WORD.
2. Go to Mailings tab, in the Create word, Click labels and the envelope and labels dialog box
will appear.
3. In the Address Box, type the text you want to be placed on the label.
4. Click the Insert Address icon if you have an address stored in the electronics address book.
5. To change the Font or Paragraph formatting, select the text, right click and select the
option from the drop-down menu.
6. Click options button and the label options dialog box will appear.
7. Select the settings like the type of printer, the supplier that produced you’re label sheets
and others.
8. After you make the settings, click OK.
9. Under print, select full page of the same label or single label. Then in the row
and columns boxes enter the numbers that match the numbers of raws and
columns on the label sheet for the label that you want to print.
10. Click Print
MS EXCEL
 Is used to compute costs incurred in the certain of projects, or create
tables for finding the researches you are doing.
PARTS OF FORMULA
 FUNCTIONS
 REFERENCES
 CONSTANT
 OPERATION
EXCEL FUNCTIONS
=SUM-calculate the sum of a range of cells.
=AVERAGE-the arithmetic mean of a range of cells/values.
=MAX-gives the maximum value in a range.
=MIN-gives the minimum value in a range.
=COUNT-counts the number of cells in a range.
=IF-shows a series calculation using the same formula but a different value for
 EXAMPLE
=If(c5>=50 ”VG Sales” , if (c5>45 ”G Sales”, “B Sales”))
SECOND SEMESTER
SOURCES OF PHOTOS
AND GRAPHICS
 There are many sources of photos and graphics. They can come direct from you’re camera ,
old friends, free from internet or purchased from the internet or store etc.
1.PERSONAL AND PROFESSIONAL PHOTOS
 Are photos taken by the amateur or professional photographers using a
digital camera. These images are downloaded and are stored in the
computer. They are source of image for any project that you may
embark. They are original and definitely something one would like work
on.
2.SCANNED IMAGES
 Are those that you transfer from printed photos and graphics using
scanning devices which you can transfer to you’re computer for further
improvement and modification. These are mostly old picture
photographed before the digital age.
3.STOCK PHOTO LIBRARY
 Are several photographs and created images that are available for sale.
They come in CD or DVD format and many of these images are royalty
free, which means that they can be used without additional fees.
4.ONLINE STOCK PHOTOS Are found in the World Wide Web. The WWW is now dominant source
of photos and graphics around the globe because of the widely
available choices and reasonable.
 Other sites even offer copyright free photos and other media. One
advantages of this set up is that you do not have to go to place where
most of these photos were taken. Another is that before you purchase
or get a picture, you can view it and if you decide to buy, simply
download it to you’re computer.
ONLINE DIGITAL FILE
 A computer will have a certain method of coding information for storage in the hard drive
or any form of computer storage. The ways of encoding and storing this information to
storage, is called FILE FORMAT. Digital file format are categorized as either proprietary or
open.
PROPRIETARY FORMATS
 Are found owned and controlled by individuals or corporations and the file format
specification are not available to the public. They are usually covered by copy right and the
owner has exclusive control of the present and future technology development of this
format. An example a proprietary format is the one who used in the storage for Microsoft
word, Excel and Power Piont.
OPEN FORMATS
 Are means and ways for storing digital information that are free, can be used by the public
and are not embarrassed by copyrights or patents. These formats are called FREE FILE
FORMATS are usually sustained and maintained by a group of individuals or organization.
 Example of this format are used in the storage for open offices and other free or open
software.
FILE FORMAT
 Uses suffixes that are added to the end of a Filename, called FILENAME EXTENSIONS. The
file extension is a means of identifying the format of the file, with a period before it after the
filename.
 The File extensions has usually two or more character, although historically there were only
three, but modern operating systems are not constrained anymore by that number of
character, more are now allowed.
DIGITAL FILE FORMAT ARE
CLASSIFIED INTO THREE:
1.UNCOMPRESSEDOR RAWFORMAT
 Is usually used for storing original file format, it is a flexible form but
needs bigger memory to store.
2.LOSSLESS FILE FORMAT
 Is a file formats that was compressed to replicate the original but at a
reduced file size. This type is ideal for storing, important files(images,
audio or video.
IMAGE FILE FORMAT
 Are standard means of organizing and storing digital images.
 May store data in uncompressed, compressed, vector formats.
 Are composed of digital data in one of these formats that can be rasterized for use on a
computer display or printer.
 RASTER IMAGE FORMAT
 Images faithfully display the color information of an image making them a great choice to
display detailed image.
WHAT ARE THEY:
 JPEG/JPG
 GIF
 PNG
 RMP
 TIFF
 PCX
JOINTPHOTOGRAPHICS GROUP (JPEG)
 An extremely common format, and is typically use for sharing photographs.
 Image can contain more than 16 million colors.
GRAPHICS INTERFACE FORMAT(GIF)
 One of the most common image format on the web.
 Supported for animation has made it incredibly popular
BITMAP (BMP)
 One of the simplest file format in raster graphics.
TAGGED IMAGE FILE FORMAT(TIFF)
 Commonly used file format in the fields of printing, graphic design, and popular
photography.
PORTABLE NETWORK GRAPHICS(PNG)
 Most use lossless image format on the internet.
PICTURE EXCHANGE(PCX)
 Was created in 1985 to serve as the native file format of the PC Paint Brush Software.
 Extended to support true color images.
VECTOR IMAGES AND
VECTOR GRAPHICS
VECTOR IMAGES
 Are lossless files created using mathematical geometry equations to represent image in
digital computer graphics.
VECTOR GRAPHICS
 It has the advantages of retaining its quality at any desired images, size unliked raster image
that appear pixilated when displayed in expnded images size.
 Is the preffered format for those who desire quality prints and displays images.
FILENAME EXTEANSION: .ai
 .drw
 .dxf
 .ps
 .svg
ADOBE ILLUSTRATOR(.AI)
 Created using paths and lines connected by points instead of bitmap.
 Object, color, text.
DRAWING EXCHANGE FORMAT(.dxf)
 Drawing format developed and introduced by auto-desk the makes of
auto-CAD. Similar to drawing file but its universal so that auto-CAD can be
opened using other program.
DRAWING FILE(.DRW)
 Generic drawing created and stored in a vector format that uses lines or
path to represent image.
SCALABLE VECTOR/GRAPHICS(.svg)
 Most common vector format on the internet.
 Developed by the WWW to display vector graphics
 Open format and can be opened by adobe, corel, and open graphics
programs.
BASIC PRINCIPLE OF
GRAPHICS AND LAYOUT
LAYOUT
 Is the process of planning and arranging graphics.
 A good layout should have a balance make up and alignment of elements.
SYMMETRICAL
 There are equal weight of element
ASSYMMETRICAL
 There are an artistic and different intensity on one side of the page
TEXT
 Should be legible appropriate font page.
IMAGE
 Should be proportionate with sharp color and high resolution
PROXIMITY AND HARMONY
 Should be close together and not scattered and arrange apart.
CONSISTENCY
 Should be uniformity of theme on each page.
COLOR AND SHAPE
Create and interest by providing variety in design like the use of color contrast and shape.
EMPHASIS
Should be one point of interest in a page.
Should have a different size, colors, shape, or background.
PRINCIPLE AND BASIC
TECHNIQUE OF IMAGES
MANIPULATION
BACKGROUND COLOR
 You can change the background if it does not match the image or the totally of the
presentation.
 You can also add effects to the background.
MULTIPLE IMAGE
 To make a point or use to highlight you’re message.
SHADOW
 Using shadow effect will make the image realistic.
PROPORTION When combining images, resize the image to make it proportionate and realistic.
BLENDING COLOR
 You can us color blending to match the background with the other elements in the page.
TEXTURE
 Allows you to blend different images, textures add to the depth of you’re art. Blending will
allow smooth transition of the image to another.
EMPHASIS
 There should be focal point to a page, that will attract viewers. The element you want to
emphasize should be sharp, big and most vibrant in you’re design.
COMBINING TEXT,
GRAPHICS AND IMAGES
 Combining text, graphics, and image in you’re presentation, in graphics
or web pages will make you’re message clearer.
TRANSPARENT SHAPES
 Add simple shapes with a slight transparency behind you’re text to clearly see the text you
want to emphasize.
TEXT AND BACKGROUND
 Text and background should ne aligned to have an organized look. You can align text with
shapes or geometric figures in the images.
FONTS AND SHAPE
 Fonts and shape should complement with each other. You can use rounded shape with
rounded fonts and sharp shapes with rounded fonts.
CLEAR AND CLEAND BACKGROUND
 Use a clean and clear background for the message to be readable. Background should npt
wash out you’re message.
BASIC MANIPULATION
USING OFFLINE OR OPEN
SOURCE SOFTWARE
 Photo editing and designing tools allow to make manipulate or edit images, apply effects,
filters, add frames, crop, add text, change background color, make photo collage and photo
album that you would like to do in an image.
VARIOUS OFFLINE OR
OPEN-SOURCE FOR IMAGE
EDITING
1. PICASA
 It is a Google’s free photo manager to edit and organize you’re photos.
2.PAINT.NET
 it is a window’s-based alternative manager to edit and organize you’re photos.
3.GOOGLE SKETCHUP
 It is a free, 3d modeling program with tools that allow you to create 3D models of houses,
home reservation wood working project.
4.AUTODESKPIXL
 A free photo editing tool with more than 600 effects.
5.ADOBE PHOTOSHOP
 A tool to create, modifying, combine and optimize digital image and photo.
6.IMAGE MANIPULATION PROGRAM(GIMP/ GNU)
 Is a free, open-source, image/ graphics editing program used for image retouching and
editing, free-form drawing/painting and other specialized tasks.
INSTALLING GIMP
1. Go to WWW.gmp.com
2. Then click download
3. Select download GIMP derictly
4. Run the GIMP Installer
5. Click Install
6. Wait for it to finish the installation then click finish
PRESENTATION
OR
VISUALIZATION
PRESENTATION
 Is a graphics program that allows you to create slide shows presenting a topic, lecture,
demonstrator, to enlighten, educate, communicate, or persuade the audience.
 Allows you to organize, summarize and format you’re materials illustrator you’re
presentation with image or clip art, animation, graphics, and other multi media components.
 Allows transition, animation, and sounds that will captivate the audience and keep them
interested.
EXAMPLE OF
PRESENTATION TOOLS
1. ZOHOSHOW
 It is online presentation that features master slides, template,
customization the ability to insert videos/ images, transition animations,
images editing, shape effects, and easy flowchart building .
 Useful particularly in business man.
2. LINKED IN SLIDE SHARE
 Web 2.0 based sliding hosting service. Users can upload files privately
and publicy in the ff formats. Power point, Pdf, Keynote or open
Documents Presentation.
4. GOOGLE SLIDES
 Create a new presentation and edit, collaborate with others present
wherever you are free.
5.MS POWER POINT
 Slide show presentation program currently developed by Microsoft.
6.PREZI
 Cloude-base presentation software based on a software as service
model. The products employs a zooming user interface(ZUI) which
allows users to zoom in and out of their presentation media.
CREATING NEW PREZI ACCOUNT
1. Go to PREZI.COM
2. Click get started on the upper right corner,
3. Sing for a public account.
4. Fill in the boxes with the specified information.
5. After providing information, click create you’re free public accounts.
EMPOWERMENT TECHNOLOGIES

More Related Content

What's hot

Gwapo
GwapoGwapo
Christine
ChristineChristine
Christine
christinegay1
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
andregoron
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
mhedilyn8556
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123
Ybonnica22
 
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUInformation communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
ashleetimkang
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technology
niniogolo
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obor
martinaiza
 
Shane
ShaneShane
Shane
niniogolo
 
Abegail
AbegailAbegail
Abegail
niniogolo
 
Jovanie garin ict
Jovanie garin ictJovanie garin ict
Jovanie garin ict
JovanieGarin
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
Ashley Surabhi
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
dpd
 
Facebook Security Essay - Umut Baris Akkaya
Facebook Security Essay - Umut Baris AkkayaFacebook Security Essay - Umut Baris Akkaya
Facebook Security Essay - Umut Baris Akkaya
Umut Baris Akkaya
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Security
thaash95
 
Using the Internet
Using the InternetUsing the Internet
Using the Internet
iteclearners
 
Power point kakaotalk
Power point kakaotalkPower point kakaotalk
Power point kakaotalk
pika setiawan
 
Macbook pro 13-inch_mid2012_qs
Macbook pro 13-inch_mid2012_qsMacbook pro 13-inch_mid2012_qs
Macbook pro 13-inch_mid2012_qs
Creygan
 
How to use of Daily Basic Apps in your Gadgets.
How to use of Daily Basic Apps in your Gadgets.How to use of Daily Basic Apps in your Gadgets.
How to use of Daily Basic Apps in your Gadgets.
Mahendra25
 
How to Retrieve Contacts from iphone
How to Retrieve Contacts from iphoneHow to Retrieve Contacts from iphone
How to Retrieve Contacts from iphone
Holidayzqq
 

What's hot (20)

Gwapo
GwapoGwapo
Gwapo
 
Christine
ChristineChristine
Christine
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123
 
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUInformation communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technology
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obor
 
Shane
ShaneShane
Shane
 
Abegail
AbegailAbegail
Abegail
 
Jovanie garin ict
Jovanie garin ictJovanie garin ict
Jovanie garin ict
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
 
Facebook Security Essay - Umut Baris Akkaya
Facebook Security Essay - Umut Baris AkkayaFacebook Security Essay - Umut Baris Akkaya
Facebook Security Essay - Umut Baris Akkaya
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Using the Internet
Using the InternetUsing the Internet
Using the Internet
 
Power point kakaotalk
Power point kakaotalkPower point kakaotalk
Power point kakaotalk
 
Macbook pro 13-inch_mid2012_qs
Macbook pro 13-inch_mid2012_qsMacbook pro 13-inch_mid2012_qs
Macbook pro 13-inch_mid2012_qs
 
How to use of Daily Basic Apps in your Gadgets.
How to use of Daily Basic Apps in your Gadgets.How to use of Daily Basic Apps in your Gadgets.
How to use of Daily Basic Apps in your Gadgets.
 
How to Retrieve Contacts from iphone
How to Retrieve Contacts from iphoneHow to Retrieve Contacts from iphone
How to Retrieve Contacts from iphone
 

Similar to EMPOWERMENT TECHNOLOGIES

empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
joanagolo4ever
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
andregoron
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
JuliezaMaeGermo
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Padsromel
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
pizonaim
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
jonaspalen1
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
Padsromel
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
VineGono
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
kiersamaco
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
JovanieGarin
 
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOEmpowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Padsromel
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
Padsromel
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
pizonaim
 
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
niniogolo
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
jonaspalen1
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
Padsromel
 
Empowerment
EmpowermentEmpowerment
Empowerment
rairuta
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
niniogolo
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
rairuta
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
obus25
 

Similar to EMPOWERMENT TECHNOLOGIES (20)

empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
 
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOEmpowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 

EMPOWERMENT TECHNOLOGIES

  • 2. ICT It is the umbrella that includes any communication device or application, encompassing, radio, television, computer, etc. Main method of communication getting information and education attaining services and expressing social advocacies and awareness.
  • 4. WORLD WIDE WEB(WWW) Though internet Belong to internet technology WEBSITE TWITTER CELLPHONE MEDIA
  • 5. 1 STAGE(WEB 1.0) Develop by web master. Were very few web content creators and many of them were called “READ ONLY WEB”. There no user interaction Web pages were STATIC. The feedback mechanism was thru private email. No direct comment available. No social media.
  • 7. 2ND STAGE(WEB 2.0)  DYNAMIC  The term WEB 2.0 was used around 2004.  Internet technology become more and more interactive(used of social media begins).  The internet become more available to everyone.  The user can now interact, contribute, and create their own, internet space and content, sharing video, picture, and movies. 
  • 8. 3RD STAGE(WEB 3.0)  It is discovered by TIM-BERNER’S-LEE(father of the WWW) as the “READ-WRITE-EXECUTE-WEB”.  It is reffered to as the SEMANTIC WEB.
  • 10. FACEBOOK  Popular free social networking site create profile, upload, photos, videos, create, and join groups, react to friends.
  • 11. TWITTER  300 million users in 2016  Allows users to microblogor broadcast short message”tweets”.
  • 12. INTRAGAM  A social networking app that enables the users to share mobile photo and video either publicly or privately.
  • 13. SNAPCHAT Designed for the mobile networking applications  Also designed for photo sharing, chat, and messaging services  Images and video share in this app last only for a short time and they are done.
  • 14. ASSISTIVE MEDIA It is not a nonprofit organization founded in 1996 in Ann Arbor, Michigan USA  It was the first internet based reading service for persons with visual and reading impairments.
  • 15. DANGER IN ONLINE  EMAIL SPAM  EMAIL SPOOFING  PHISHING  PHARMING  SPY WARE  COMPUTER WORM  TROJAN HORSE  COMPUTER VIRUS  HACKER
  • 16. EMAIL SPAM Know as the JUNK EMAIL, usually unsolicited commercial email sent from one source with identical message to send to multiple recipient.  Spammer is the term used to refer to a person who creates electronic spam.
  • 17. EMAIL SPOOFING A deceitful email practice in which the sender address is changed that is would appear to have come from a different sources usually someone you know.  It is usually used by spammers to hide the origin of the spam.  Technique of EMAIL SPAMMING.
  • 18. PHISHING  A deceitful practice of trying to get the confidential information such as passwords, users name, and credit card details by making it appear as if it corner from a trust worthy sources.
  • 19. PHARMING  A dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
  • 20. SPY WARE Physical spy ware  It is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the users.
  • 21. COMPUTER WORM Is a dangerous computer program that replicates itself through a networking.  Some worm’s delete files, other disrupt the networking function and still , others send junk mail from infected computer.
  • 22. TROJAN HORSE A malicious software fronting to perform a good tasks but covertly perform undesirable function with the intention of entering the computer without user’s consent.  It can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in phishing for bank account’s.
  • 23. COMPUTER VIRUS A program that duplicates itself and then infects the computer.  It spreads like areal biological virus wherein it attaches itself to a lost program and infect other computers if it is received by a computer through the internet.  Virus can also be transferred by the use of removable storage.
  • 24. HACKER A person who is able to enter and control other people’s computer without authorization.  Be able to enter another’s computer, usually vandalizes the victims website, steals personal information
  • 25. SETTINGS THAT HELPS TO PROTECT COMPUTER  FIREWALL  AUTOMATIC UPDATES  VIRUS PROTECTION
  • 26. FIREWALL Help’s in protecting you’re computer from unauthorized entries, viruses, or worms from the internet or network. AUTOMATIC UPDATES Another features of windows which when turned on will, automatically download updates from Microsoft windows website. VIRUSPROTECTION Is usually about the current anti-virus software installed in you’re computer. Anti-virus software is meant to locate, find and remove virus threats that are already in you’re computer.
  • 28.  CONTEXTUALIZE  RESEARCH  STRATEGY  COMPILATION  CITATION
  • 29. CONTEXTUALIZE  Is to place something such as words or activity in a context. RESEARCH  The collecting of information about a particular subject. STRATEGY Art of devising, or employing plans or stratagies towards a goal. A careful plan or method.
  • 30. COMPILATION  The act or process of compiling CITATION  The act of quoting, especially the citing of a previously settled case at low.
  • 31. CONTEXTUAL SEARCH  An attempt to be more precise in providing the list documents account to the words used by the user to search the internet  A good contextual search engine would request for more information to narrow down the result of the search.
  • 32. 1. Identify or choose a topic. 2. Topic or task definition. 3. Identify methods of search. 4. Identify resources of you’re research. 5. Make you’re research strategies. 6. Compiling the research result. 7. Evaluate the results of you’re research. 8. Create a list of you’re references for citation.
  • 34. CRITICAL THINKING  It is the ability to digest, reflect, and conclude from the information searched.  ANALYTICAL THINGKING  The ability to work, verbalize, conceptualize, and gather data attuned to the contex of the subject.  People with this ability are able to define and identify the latitude of the problem and present all possible solutions.
  • 35. ORGANIZING DATA MINING  It is the ability to organize and catalagoe all collected materials efficiently despite data size.  RESEARCH PRESENTATION  It is the ability to present ideas and draw conclusions from the research.  Be able to explain in writing the purpose steps goals and objective of the research.
  • 36. CREATIVITY AND DEVELOPEDIMAGINATION  It is the ability to look for the alternative solutions to the problems needed to solve in the research.  Thinking beyond the usual approaches to the research objectives. COMPUTER LITERACY  Knowledge of the various computer application and tools.  Skills in the use of software to write, design and present.
  • 38. 1. Open the Google Site. 2. On the upper right side of the window, click the Google Apps Icon and search G. 3. On the lower right part of the window, click setting and the Google Settings pop-up list will appear. 4. Click advanced search and the advanced search window will appear. 5. Type and Click.
  • 39. IDENTIFYING GOOD SOURCE FROM SATIRICAL SOURCE
  • 40.  Satirical sites are website that report untrue or false stories means to amuse or entertain.  Take their cue from TV shows that report exaggerated news.  Started as spoofs of real public figures.
  • 42. 1. It is too good to be true, then it must be so. 2. If the news did not emanate from reliable news site. 3. If they are from know satirical sites.
  • 43. LIST OF TOP SOURCES OF SATIRICAL NEWS 1. Adobo Chronicles(adobochronicles.com) 2. So What’s New? 3. Eritas Time 4. The Professional Heckler
  • 44. AMERICAN SATIRICAL SITES IN THE US. 1. The Onion(theonion.com) 2. Click Hole(clickhole,com) 3. Christ Wire Global Media(christwire.com)
  • 45. MAIL MERGE AND LABEL GENERATION  Is used to automatically add mailing address or personalized information.
  • 47. MAIL MERGE  Merge data into a publication which will be printed and mailed.  Shows step by step mail merge wizard.  EMAIL MERGE  Merges data into a publication that will be sent as email.
  • 48. SELECT RECIPIENTS  Chooses the list of people you intend to send the letter to.  You can type your own list, use you’re outlook contacts or connect to a data page.  EDIT RECIPIENT LIST  Makes changes to the list of recipient and decide which of them should receive you’re letter.
  • 50. INSERT MERGE MAIL  Adds a field from you’re recipient list to the publication.  ADDRESS BLOCK  Adds an address to you’re letter.  GREETING LINE  Adds a greeting line to you’re letter.
  • 51. PICTURE  Adds a picture field from you’re recipient list to the publication. INSERT PERSONALIZEDHYPER LINK  Inserts hyperlinked that are customized for each recipient.  FORMAT  Changes the format for the content
  • 52. STEP 1:CREATING A RECIPIENT LIST1. Click the Mailing tab, go to start group and click select Recipient. 2. On the list of option, select Type New List. 3. On the New Address List dialog box, click New Entry, and type the recipient information. 4. Click OK.
  • 53. STEP 2:PREPARE YOU’RE PUBLICATION 1. Insert any additional text that you want to appear in every version of you’re mail merge publication, such as greetings.
  • 54. STEP 3:CREATE MERGEDPUBLICATION 1. PRINT A. Click Merge to a printer. B. In the print space, select the options you want and click OK. 2. Merge to New Publication A. Click Merge to New Publication. B. In the New Publication, click save this publication in the Mail Merge task. C. Type the name of you’re New Publication and Save, 3.Add to Existing Publication A. Click Add to Existing Publication.
  • 55.  B. On the Publication dialog box, locate the publication you want to add and Click Open. C .Click save this Publication in the Mail Merge.
  • 56. GENERATING LABELS  Labels are used for envelopes that you intend to send out to persons usually containing the names, address, or telephone numbers.
  • 58. 1. Start a new documents in MS WORD. 2. Go to Mailings tab, in the Create word, Click labels and the envelope and labels dialog box will appear. 3. In the Address Box, type the text you want to be placed on the label. 4. Click the Insert Address icon if you have an address stored in the electronics address book. 5. To change the Font or Paragraph formatting, select the text, right click and select the option from the drop-down menu. 6. Click options button and the label options dialog box will appear. 7. Select the settings like the type of printer, the supplier that produced you’re label sheets and others. 8. After you make the settings, click OK.
  • 59. 9. Under print, select full page of the same label or single label. Then in the row and columns boxes enter the numbers that match the numbers of raws and columns on the label sheet for the label that you want to print. 10. Click Print
  • 60. MS EXCEL  Is used to compute costs incurred in the certain of projects, or create tables for finding the researches you are doing.
  • 61. PARTS OF FORMULA  FUNCTIONS  REFERENCES  CONSTANT  OPERATION
  • 63. =SUM-calculate the sum of a range of cells. =AVERAGE-the arithmetic mean of a range of cells/values. =MAX-gives the maximum value in a range. =MIN-gives the minimum value in a range. =COUNT-counts the number of cells in a range. =IF-shows a series calculation using the same formula but a different value for
  • 64.  EXAMPLE =If(c5>=50 ”VG Sales” , if (c5>45 ”G Sales”, “B Sales”))
  • 67.  There are many sources of photos and graphics. They can come direct from you’re camera , old friends, free from internet or purchased from the internet or store etc.
  • 68. 1.PERSONAL AND PROFESSIONAL PHOTOS  Are photos taken by the amateur or professional photographers using a digital camera. These images are downloaded and are stored in the computer. They are source of image for any project that you may embark. They are original and definitely something one would like work on.
  • 69. 2.SCANNED IMAGES  Are those that you transfer from printed photos and graphics using scanning devices which you can transfer to you’re computer for further improvement and modification. These are mostly old picture photographed before the digital age.
  • 70. 3.STOCK PHOTO LIBRARY  Are several photographs and created images that are available for sale. They come in CD or DVD format and many of these images are royalty free, which means that they can be used without additional fees.
  • 71. 4.ONLINE STOCK PHOTOS Are found in the World Wide Web. The WWW is now dominant source of photos and graphics around the globe because of the widely available choices and reasonable.  Other sites even offer copyright free photos and other media. One advantages of this set up is that you do not have to go to place where most of these photos were taken. Another is that before you purchase or get a picture, you can view it and if you decide to buy, simply download it to you’re computer.
  • 73.  A computer will have a certain method of coding information for storage in the hard drive or any form of computer storage. The ways of encoding and storing this information to storage, is called FILE FORMAT. Digital file format are categorized as either proprietary or open.
  • 74. PROPRIETARY FORMATS  Are found owned and controlled by individuals or corporations and the file format specification are not available to the public. They are usually covered by copy right and the owner has exclusive control of the present and future technology development of this format. An example a proprietary format is the one who used in the storage for Microsoft word, Excel and Power Piont.
  • 75. OPEN FORMATS  Are means and ways for storing digital information that are free, can be used by the public and are not embarrassed by copyrights or patents. These formats are called FREE FILE FORMATS are usually sustained and maintained by a group of individuals or organization.  Example of this format are used in the storage for open offices and other free or open software.
  • 76. FILE FORMAT  Uses suffixes that are added to the end of a Filename, called FILENAME EXTENSIONS. The file extension is a means of identifying the format of the file, with a period before it after the filename.  The File extensions has usually two or more character, although historically there were only three, but modern operating systems are not constrained anymore by that number of character, more are now allowed.
  • 77. DIGITAL FILE FORMAT ARE CLASSIFIED INTO THREE:
  • 78. 1.UNCOMPRESSEDOR RAWFORMAT  Is usually used for storing original file format, it is a flexible form but needs bigger memory to store. 2.LOSSLESS FILE FORMAT  Is a file formats that was compressed to replicate the original but at a reduced file size. This type is ideal for storing, important files(images, audio or video.
  • 79. IMAGE FILE FORMAT  Are standard means of organizing and storing digital images.  May store data in uncompressed, compressed, vector formats.  Are composed of digital data in one of these formats that can be rasterized for use on a computer display or printer.  RASTER IMAGE FORMAT  Images faithfully display the color information of an image making them a great choice to display detailed image.
  • 80. WHAT ARE THEY:  JPEG/JPG  GIF  PNG  RMP  TIFF  PCX
  • 81. JOINTPHOTOGRAPHICS GROUP (JPEG)  An extremely common format, and is typically use for sharing photographs.  Image can contain more than 16 million colors. GRAPHICS INTERFACE FORMAT(GIF)  One of the most common image format on the web.  Supported for animation has made it incredibly popular
  • 82. BITMAP (BMP)  One of the simplest file format in raster graphics. TAGGED IMAGE FILE FORMAT(TIFF)  Commonly used file format in the fields of printing, graphic design, and popular photography.
  • 83. PORTABLE NETWORK GRAPHICS(PNG)  Most use lossless image format on the internet. PICTURE EXCHANGE(PCX)  Was created in 1985 to serve as the native file format of the PC Paint Brush Software.  Extended to support true color images.
  • 85. VECTOR IMAGES  Are lossless files created using mathematical geometry equations to represent image in digital computer graphics. VECTOR GRAPHICS  It has the advantages of retaining its quality at any desired images, size unliked raster image that appear pixilated when displayed in expnded images size.  Is the preffered format for those who desire quality prints and displays images.
  • 86. FILENAME EXTEANSION: .ai  .drw  .dxf  .ps  .svg
  • 87. ADOBE ILLUSTRATOR(.AI)  Created using paths and lines connected by points instead of bitmap.  Object, color, text. DRAWING EXCHANGE FORMAT(.dxf)  Drawing format developed and introduced by auto-desk the makes of auto-CAD. Similar to drawing file but its universal so that auto-CAD can be opened using other program.
  • 88. DRAWING FILE(.DRW)  Generic drawing created and stored in a vector format that uses lines or path to represent image. SCALABLE VECTOR/GRAPHICS(.svg)  Most common vector format on the internet.  Developed by the WWW to display vector graphics  Open format and can be opened by adobe, corel, and open graphics programs.
  • 90. LAYOUT  Is the process of planning and arranging graphics.  A good layout should have a balance make up and alignment of elements. SYMMETRICAL  There are equal weight of element ASSYMMETRICAL  There are an artistic and different intensity on one side of the page
  • 91. TEXT  Should be legible appropriate font page. IMAGE  Should be proportionate with sharp color and high resolution PROXIMITY AND HARMONY  Should be close together and not scattered and arrange apart.
  • 92. CONSISTENCY  Should be uniformity of theme on each page. COLOR AND SHAPE Create and interest by providing variety in design like the use of color contrast and shape. EMPHASIS Should be one point of interest in a page. Should have a different size, colors, shape, or background.
  • 93. PRINCIPLE AND BASIC TECHNIQUE OF IMAGES MANIPULATION
  • 94. BACKGROUND COLOR  You can change the background if it does not match the image or the totally of the presentation.  You can also add effects to the background. MULTIPLE IMAGE  To make a point or use to highlight you’re message. SHADOW  Using shadow effect will make the image realistic.
  • 95. PROPORTION When combining images, resize the image to make it proportionate and realistic. BLENDING COLOR  You can us color blending to match the background with the other elements in the page. TEXTURE  Allows you to blend different images, textures add to the depth of you’re art. Blending will allow smooth transition of the image to another.
  • 96. EMPHASIS  There should be focal point to a page, that will attract viewers. The element you want to emphasize should be sharp, big and most vibrant in you’re design.
  • 98.  Combining text, graphics, and image in you’re presentation, in graphics or web pages will make you’re message clearer.
  • 99. TRANSPARENT SHAPES  Add simple shapes with a slight transparency behind you’re text to clearly see the text you want to emphasize. TEXT AND BACKGROUND  Text and background should ne aligned to have an organized look. You can align text with shapes or geometric figures in the images.
  • 100. FONTS AND SHAPE  Fonts and shape should complement with each other. You can use rounded shape with rounded fonts and sharp shapes with rounded fonts. CLEAR AND CLEAND BACKGROUND  Use a clean and clear background for the message to be readable. Background should npt wash out you’re message.
  • 101. BASIC MANIPULATION USING OFFLINE OR OPEN SOURCE SOFTWARE
  • 102.  Photo editing and designing tools allow to make manipulate or edit images, apply effects, filters, add frames, crop, add text, change background color, make photo collage and photo album that you would like to do in an image.
  • 103. VARIOUS OFFLINE OR OPEN-SOURCE FOR IMAGE EDITING
  • 104. 1. PICASA  It is a Google’s free photo manager to edit and organize you’re photos. 2.PAINT.NET  it is a window’s-based alternative manager to edit and organize you’re photos. 3.GOOGLE SKETCHUP  It is a free, 3d modeling program with tools that allow you to create 3D models of houses, home reservation wood working project.
  • 105. 4.AUTODESKPIXL  A free photo editing tool with more than 600 effects. 5.ADOBE PHOTOSHOP  A tool to create, modifying, combine and optimize digital image and photo. 6.IMAGE MANIPULATION PROGRAM(GIMP/ GNU)  Is a free, open-source, image/ graphics editing program used for image retouching and editing, free-form drawing/painting and other specialized tasks.
  • 106. INSTALLING GIMP 1. Go to WWW.gmp.com 2. Then click download 3. Select download GIMP derictly 4. Run the GIMP Installer 5. Click Install 6. Wait for it to finish the installation then click finish
  • 108. PRESENTATION  Is a graphics program that allows you to create slide shows presenting a topic, lecture, demonstrator, to enlighten, educate, communicate, or persuade the audience.  Allows you to organize, summarize and format you’re materials illustrator you’re presentation with image or clip art, animation, graphics, and other multi media components.  Allows transition, animation, and sounds that will captivate the audience and keep them interested.
  • 110. 1. ZOHOSHOW  It is online presentation that features master slides, template, customization the ability to insert videos/ images, transition animations, images editing, shape effects, and easy flowchart building .  Useful particularly in business man.
  • 111. 2. LINKED IN SLIDE SHARE  Web 2.0 based sliding hosting service. Users can upload files privately and publicy in the ff formats. Power point, Pdf, Keynote or open Documents Presentation.
  • 112. 4. GOOGLE SLIDES  Create a new presentation and edit, collaborate with others present wherever you are free.
  • 113. 5.MS POWER POINT  Slide show presentation program currently developed by Microsoft.
  • 114. 6.PREZI  Cloude-base presentation software based on a software as service model. The products employs a zooming user interface(ZUI) which allows users to zoom in and out of their presentation media.
  • 115. CREATING NEW PREZI ACCOUNT 1. Go to PREZI.COM 2. Click get started on the upper right corner, 3. Sing for a public account. 4. Fill in the boxes with the specified information. 5. After providing information, click create you’re free public accounts.