ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
Hi guys this it is, i made slideshare about empowerment technology for the senior highschool student. All of the 1st semester in G11 are you. So good luck you guys have fun. :)
Hi guys this it is, i made slideshare about empowerment technology for the senior highschool student. All of the 1st semester in G11 are you. So good luck you guys have fun. :)
this pdf file description
what is the Internet Basics topics likes ;
what is the internet
What is the World Wide Web?
Exploring the Internet using Microsoft Internet Explorer
What is a URL?
What are Domains? and so on.
this pdf file description
what is the Internet Basics topics likes ;
what is the internet
What is the World Wide Web?
Exploring the Internet using Microsoft Internet Explorer
What is a URL?
What are Domains? and so on.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. INFORMATION COMMUNICATION
TECHNOLOGY
• Is an umbrella term that includes any communication device
or application encompassing radio, television, computer and
etc.
• Main method of communication, getting information and
education, attaining services and expressing social advocacies
and awareness
3. The Current States of ICT
WEB 1.0
• Read only web
• No user interaction
• Web page were static
• No direct comment available
7. WEB 3.0
• Discovered by TIM BERNERS-LEE ( father of
the world wide web)
• Refer as Semantic web
• It will not make the web 2.0 obsolete
8. TECHNOLOGY
CONVERGENCE Merging one technology into one.
Evolution of technological development that merge into a
new system bringing together different types of applications
and media.
Examples:
SMARTPHONE - provides functionality of various individual separate
and different devices now available in one gear.
-function as camera,telephone,Radio,TV,and gaming
console.
9. SOCIAL MEDIA
- internet based application
- collection of internet base communication task, dedicated to allow
users to interact, communicate and share information.
FACEBOOK
A popular free social networking site
Allows users to create profile, upload photos, and videos,
create and join groups.
Sends message, keeping in touch with relatives and friends.
10. TWITTER
More than 300 million users in 2016
Allows users to microblog or broadcast short message
called “tweets”
INSTAGRAM
Enables users to share mobile photos and video.
SNAPCHAT
Designed for the mobile networking application
11. DIFFERENT DANGERS ONLINE
EMAIL SPAM
Known as the junk email.
Usually unsolicited commercial email sent from one source with identical
message to send to multiple recipient.
EMAIL SPOOFING
A deceitful email practice in which the sender address is changed, so that it
would appear to have come from a different sources.
PHISHING
A deceitful practice of trying to get confidential information such as
passwords, usernames and credit card by making it appear as if it comes from
a trustworthy source.
12. PHARMING
A dangerous hacker attack on a website which directs all traffic to that websites
to another fictitious website.
SPYWARE
Is a computer program that is installed convertly on a personal computer to
collect information and take control over the computer without the knowledge
of the users.
COMPUTER WORM
A dangerous computer program that replicates itself through a network sites.
Some worms deletes file, and others.
13. COMPUTER VIRUS
A program that duplicates itself and then infects the computer
Virus can be also transferred by the use of removable storage.
HACKER
A person who is able to enter the control other peoples computer
without authorization.
TROJAN HORSE
A malicious software fronting to perform a good task.
It can erase data, can allow access of the victims computer.
14. SECURITY CENTER
• It is the place where you can set additional protection from
THREAT to your computer, especially when using the
internet.
FIREWALL
• Helps in protecting your computer from unauthorized entries.
15. AUTOMATIC UPDATES
• Another feature of windows which when turned on will automatically
download updates from Microsoft windows website.
VIRUS PROTECTION
Usually about the current antivirus software installed in your computer.
ANTIVIRUS- meant to locate, find and remove virus threats that
are already in your computer
16. CONTEXTUAL SEARCH
• An attempt to be more precise in providing the list documents accounts to the
words use by the user to search the internet.
Steps in contextual research:
1. Identify or task definition
2. Topic or task definition
3. Identify methods of search
4. Identify resources of your research
5. Make your research strategies
6. Compiling the research results
7. Evaluate the results of your research
8. Create a list of your references for citation
17. Methods of search:
• Experiment ●Explore ●SURVEY
RESEARCH SKILLS
CRITICAL THINKING
- the ability to digest, reflect, and conclude from the information searched.
- the ability to look, verbalize, conceptualize and gather data attuned to the context of
the subject.
PROBLEM SOLVING CAPABILITY
- the ability to present solutions of solve problems by presenting a decision
based on the given information.
18. ORGANIZED DATA MINING
- it is the ability to organize and catalogue all collected materials efficiently
despite data size.
RESEARCH PRESENTATION
- it is the ability to present ideas and draws conclusions from the research.
CREATIVITY AND DEVELOPED IMAGINATION
- it is the ability to look for alternative solutions to the problems needed to
solve in the research.
COMPUTER LITERACY
- knowledge of the various computer applications and tools.
- skills in the use of software to write, design and present.
19. STEPS IN CONTEXTUALIZE RESEARCH:
1. Open the Google site
2. On the upper right side of the window click the Google App icon and click search
G
3. Lower right part of the window click settings and the Google search settings pop-
list will appear.
4. Click advanced search and the advance search windows will appear.
IDENTIFYING GOOD SOURCE FROM SATIRICAL SOURCE
• SATIRICAL SITES are websites that report untrue or false stories meant to
amuse or entertain.
20. HOW TO DETECT SATIRICAL NEWS:
1. If it is good to be true, then it must be so
2. If the news did not emanate from liable news site.
3. If they are from known satirical sites.
LIST OF TOP SOURCES OF SATIRICAL NEWS:
1. Adobo chronicles (adobchronicles.com)
2. So, what news?
3. Eritas times
4. Professional Heckler
LIST OF AMERICAN SATIRICAL SITES IN US
1. The onion
2. Clickhole
3. Christ wire global media
21. MAIL MERGE
• is used to automatically add mailing addresses or personalized
information to your publication.
MAILING START GROUP COMMANDS
NAME FUNCTION
MAIL MERGE Merges data into a publication which will be
printed and mailed.
EMAIL MERGE Merges data into a publication that will be sent as
e-mail.
SELECT RECEPIENTS Chooses the list of people you intended to send.
EDIT RECEPIENT LIST Make changes to the list of recipients.
INSERT MERGE FIELD Adds a field from your recipient list.
ADDRESS BLOCK Adds an address to your letter.
GREETING LINE Adds a greeting to your letter
PICTURE Adds a picture to your field.
22. HANDS ON USING MS. WORD TO CREATE A MAIL MERGE:
Step 1: Creating a recipient list
Step 2: Prepare your publication
Step 3: Create merge publication
GENERATING LABELS
LABELSare used for envelopes that you intend to send out
to persons usually containing the name, address or telephone.
23. MS POWERPOINT
- it is an application intend in creating a slide presentation.
HOW TO CREATE A SLIDE PRESENTATION:
1.Open MS Power Point app.
2.Click new and select your preferred design template
3.Click insert tab menu and insert text, word art, or any object
needed in slide
4.Click home tab under, click insert new slide in your presentation.
24. Is a spreadsheet developed by Microsoft for Windows,
macOS, Android and iOS. It features calculation, graphing
tools, pivot tables, and a macro programming language
called Visual Basic for Applications.
MS EXCEL
25. =SUM Calculates sum of average cells.
=AVERAGE Calculates the arithmetic mean of range of the
cells
=MAX Gives the maximum value in range.
=MIN Gives the minimum value in range.
=COUNT Counts the number of cells in a range.
=If Shows a series calculations
EXCEL FUNCTIONS
26. SOURCES OF PHOTOS AND GRAPHICS
They can come direct from your camera, old pictures, free from internet or
purchased from the internet.
1.PERSONAL AND PROFESSIONAL PHOTOS
- are photos taken by amateur or professional photographers.
- these images are downloaded and are stored in the computer.
2. SCANNED IMAGES
- are those that you transfer from printed photos and graphics using
scanning devices.
- these are mostly old pictures photographed before the digital age.
27. 3. STOCK PHOTO LIBRARY
- are several photographs and created images that are available for sale.
4. ONLINE STOCK PHOTO
- are found in WWW.
- advantage of this set up is that you do not have to go to places where
most of these photos were taken.
28. ONLINE DIGITAL FILE FORMATS FOR IMAGES AND TEXT
FILE FORMAT- the ways of encoding and storing this information to storage.
Digital file formats are categorized either proprietary or open:
PROPRIETARY FORMATS
• are owned and controlled by individuals or cooperation's.
• they are usually covered by copyrights and the owner has exclusive
control.
29. FILE FORMATS
FILE EXTENSIONS -are the suffixes at the end of the file name.
- is a means of identifying the format of the file
name
OPEN FORMATS
• are means and ways for storing digital information that are free
• can be used by public and are not encumbered by copyrights
30. THREE MAJOR GROUPS OF DIGITAL FILE FORMATS
1.UNCOMPRESSED OR RAW FORMAT
- is usually used for storing original file, it is flexible
form but needs a higher memory to store.
2. LOSSLESS FILE FORMAT
- is a file format that was compressed to replicate the
original quality but a reduced file size.
3.
31. IMAGE FILE FORMATS
- are standardized means of organizing and storing digital images.
RASTER IMAGE FORMAT
- images faithfully display the color information.
- made of pixels
Examples:
● JPEG (Joint Photographic Expert Group)
● GIF (Graphics Interface Format)
● PNG ( Portable Network Graphics)
● BMP (Bitmap)
● TIFF (Tagged Image File Format)
● PCX (Picture Exchange)
32. VECTOR IMAGES
- are lossless file created using mathematical geometric equations.
VECTOR IMAGE FORMAT OF GRAPHICS
- is preferred format for those who designed quality prints and display.
Types of formats:
1.PDF
2.Encapsulated postscript
3.Scalable Vector Graphics
4.Windows Metafile
File name extensions:
• .ai ● .dxf
• .ps ● .svg
• .drw
33. BASICS PRINCIPLES OF GRAPHICS AND LAYOUT
LAYOUT- is the process of planning and arranging graphics or text in a page or book
1.SYMMETRICAL
- there are equal weight of elements on both sides of the page
2.ASSYMETRICAL
- there is an artistic and different intensity on one side of the page.
3.TEXT
- the type should be visible legible and appropriate.
4. IMAGED
- should be appropriate with sharp color and high resolution.
34. 5. PROXIMITY AND HARMONY
- elements should be closed together and not scattered and arranged apart
from each other.
6. CONSISTENCY
- there should be uniformity of theme on each page.
7. COLOR AND SHAPED
- use color to create interest by providing variety in design like the use of
color contrast and shape.
8. EMPHASIS
- there should be one point of interest in page
35. PRINCIPLES AND BASIC TECHNIQUES OF IMAGE
MANIPULATION
Techniques of image manipulation:
oBACKGORUND AND COLOR
- change the background if it does not match the image
oMULTIPLE IMAGES
- combine multiple images to make a point or highlight message.
o SHADOW
- using shadow effect will make the image realistic.
36. oBLENDING COLOR
- use blending color to match the background with the other
elements.
oTEXTURE
- textures add to the depth of your art.
oEMPHASIS
- there should be a focal point to a page that will attract viewers.
o PROPORTION
- when combining image, resize image to make it proportionate.
37. COMBINING TEXT, GRAPHICS AND IMAGES
TRANSPARENT SHAPES
-add simple shape with a slight transparency behind your text to clearly see
the text.
FONTS AND SHAPES
- fonts and shape should complement with each other. You can use rounded
shapes with rounded fonts and sharp shapes and fonts.
TEXT AND BACKGROUND
- text and background should be aligned to have an organized look.
CLEAN AND CLEAR BACKGROUND
- use a clean and color background for the message to be readable.
38. BASIC MANIPULATION USING OFFLINE OR OPEN SOURE
SORTWARE
VARIOUS OFFLINE OR OPEN SOURCE FOR IMAGE EDITING:
PICASA
- a Google free photo manager that edit and organize photo.
PAINT.NET
- it is a windows-based alternative to the MS PAINT.
GOOGLE SKETCH UP
- it is free 3D modeling program.
39. AUTODESK PIXL
- a free photo editing tool
- more than 600 effects.
ADOBE PHOTOSHOP
- a tool to create modifying combine digital photos.
GIMP OR GNU
- used for image retouching and editing.
- Free, open source, image/graphic editing program
40. INSTALLING GIMP
1.Go to www.gimp.com
2.Then click download
3.Select download GIMP directly.
4.Run the GIMP installer.
5.Click install
6.Wait for it to finish the installation.
41. PRESENTATION AND VISUALIZATION
PRESENTATION
- is a graphics program that allows you to create slide shows presenting a
topic, lecture, demonstration.
- allows you to organize, summarize and format your materials.
- allows transitions and animations and sounds that will captivate the
audience.
Examples:
1. ZOHO SHOW
- online presentation that features master slides.
- ability to insert videos/images, transition and animations.
42. 2. LinkedInSlideShare
- web 2.0 based sliding hosting service.
- users can upload files privately or publicly in the FF formats
3. GOOGLE SLIDES
- create a new presentation and edit, collaborate with others and present
wherever you are free.
4. SLIDE ROCKET
- online presentation
5. MS POWERPOINT
- slide show presentation program currently developed by Microsoft.
6. PREZI
- cloud based presentation software based on a software as service model.