SlideShare a Scribd company logo
EMPOWERMENT
TECHNOLOGY
INFORMATION COMMUNICATION
TECHNOLOGY
• Is an umbrella term that includes any communication device
or application encompassing radio, television, computer and
etc.
• Main method of communication, getting information and
education, attaining services and expressing social advocacies
and awareness
The Current States of ICT
WEB 1.0
• Read only web
• No user interaction
• Web page were static
• No direct comment available
WEBMASTERS
STATIC WEB
USERS
ILLUSTRATION FOR THE WEB 1.O
WEB 2.0
• DYNAMIC WEB
• Use around 2004
• The users now interact, contribute and create
their own internet space and content.
WEBMASTERS
USERS
CONTRIBUTION
WEB DYNAMICS
COMMUNITY
ILLUSTRATION FOR THE
WEB 2.0
WEB 3.0
• Discovered by TIM BERNERS-LEE ( father of
the world wide web)
• Refer as Semantic web
• It will not make the web 2.0 obsolete
TECHNOLOGY
CONVERGENCE Merging one technology into one.
Evolution of technological development that merge into a
new system bringing together different types of applications
and media.
Examples:
SMARTPHONE - provides functionality of various individual separate
and different devices now available in one gear.
-function as camera,telephone,Radio,TV,and gaming
console.
SOCIAL MEDIA
- internet based application
- collection of internet base communication task, dedicated to allow
users to interact, communicate and share information.
FACEBOOK
A popular free social networking site
Allows users to create profile, upload photos, and videos,
create and join groups.
Sends message, keeping in touch with relatives and friends.
TWITTER
More than 300 million users in 2016
Allows users to microblog or broadcast short message
called “tweets”
INSTAGRAM
Enables users to share mobile photos and video.
SNAPCHAT
Designed for the mobile networking application
DIFFERENT DANGERS ONLINE
EMAIL SPAM
Known as the junk email.
Usually unsolicited commercial email sent from one source with identical
message to send to multiple recipient.
EMAIL SPOOFING
A deceitful email practice in which the sender address is changed, so that it
would appear to have come from a different sources.
PHISHING
A deceitful practice of trying to get confidential information such as
passwords, usernames and credit card by making it appear as if it comes from
a trustworthy source.
PHARMING
A dangerous hacker attack on a website which directs all traffic to that websites
to another fictitious website.
SPYWARE
Is a computer program that is installed convertly on a personal computer to
collect information and take control over the computer without the knowledge
of the users.
COMPUTER WORM
A dangerous computer program that replicates itself through a network sites.
Some worms deletes file, and others.
COMPUTER VIRUS
A program that duplicates itself and then infects the computer
Virus can be also transferred by the use of removable storage.
HACKER
A person who is able to enter the control other peoples computer
without authorization.
TROJAN HORSE
A malicious software fronting to perform a good task.
It can erase data, can allow access of the victims computer.
SECURITY CENTER
• It is the place where you can set additional protection from
THREAT to your computer, especially when using the
internet.
FIREWALL
• Helps in protecting your computer from unauthorized entries.
AUTOMATIC UPDATES
• Another feature of windows which when turned on will automatically
download updates from Microsoft windows website.
VIRUS PROTECTION
Usually about the current antivirus software installed in your computer.
ANTIVIRUS- meant to locate, find and remove virus threats that
are already in your computer
CONTEXTUAL SEARCH
• An attempt to be more precise in providing the list documents accounts to the
words use by the user to search the internet.
Steps in contextual research:
1. Identify or task definition
2. Topic or task definition
3. Identify methods of search
4. Identify resources of your research
5. Make your research strategies
6. Compiling the research results
7. Evaluate the results of your research
8. Create a list of your references for citation
Methods of search:
• Experiment ●Explore ●SURVEY
RESEARCH SKILLS
CRITICAL THINKING
- the ability to digest, reflect, and conclude from the information searched.
- the ability to look, verbalize, conceptualize and gather data attuned to the context of
the subject.
PROBLEM SOLVING CAPABILITY
- the ability to present solutions of solve problems by presenting a decision
based on the given information.
ORGANIZED DATA MINING
- it is the ability to organize and catalogue all collected materials efficiently
despite data size.
RESEARCH PRESENTATION
- it is the ability to present ideas and draws conclusions from the research.
CREATIVITY AND DEVELOPED IMAGINATION
- it is the ability to look for alternative solutions to the problems needed to
solve in the research.
COMPUTER LITERACY
- knowledge of the various computer applications and tools.
- skills in the use of software to write, design and present.
STEPS IN CONTEXTUALIZE RESEARCH:
1. Open the Google site
2. On the upper right side of the window click the Google App icon and click search
G
3. Lower right part of the window click settings and the Google search settings pop-
list will appear.
4. Click advanced search and the advance search windows will appear.
IDENTIFYING GOOD SOURCE FROM SATIRICAL SOURCE
• SATIRICAL SITES are websites that report untrue or false stories meant to
amuse or entertain.
HOW TO DETECT SATIRICAL NEWS:
1. If it is good to be true, then it must be so
2. If the news did not emanate from liable news site.
3. If they are from known satirical sites.
LIST OF TOP SOURCES OF SATIRICAL NEWS:
1. Adobo chronicles (adobchronicles.com)
2. So, what news?
3. Eritas times
4. Professional Heckler
LIST OF AMERICAN SATIRICAL SITES IN US
1. The onion
2. Clickhole
3. Christ wire global media
MAIL MERGE
• is used to automatically add mailing addresses or personalized
information to your publication.
MAILING START GROUP COMMANDS
NAME FUNCTION
MAIL MERGE Merges data into a publication which will be
printed and mailed.
EMAIL MERGE Merges data into a publication that will be sent as
e-mail.
SELECT RECEPIENTS Chooses the list of people you intended to send.
EDIT RECEPIENT LIST Make changes to the list of recipients.
INSERT MERGE FIELD Adds a field from your recipient list.
ADDRESS BLOCK Adds an address to your letter.
GREETING LINE Adds a greeting to your letter
PICTURE Adds a picture to your field.
HANDS ON USING MS. WORD TO CREATE A MAIL MERGE:
Step 1: Creating a recipient list
Step 2: Prepare your publication
Step 3: Create merge publication
GENERATING LABELS
LABELSare used for envelopes that you intend to send out
to persons usually containing the name, address or telephone.
MS POWERPOINT
- it is an application intend in creating a slide presentation.
HOW TO CREATE A SLIDE PRESENTATION:
1.Open MS Power Point app.
2.Click new and select your preferred design template
3.Click insert tab menu and insert text, word art, or any object
needed in slide
4.Click home tab under, click insert new slide in your presentation.
Is a spreadsheet developed by Microsoft for Windows,
macOS, Android and iOS. It features calculation, graphing
tools, pivot tables, and a macro programming language
called Visual Basic for Applications.
MS EXCEL
=SUM Calculates sum of average cells.
=AVERAGE Calculates the arithmetic mean of range of the
cells
=MAX Gives the maximum value in range.
=MIN Gives the minimum value in range.
=COUNT Counts the number of cells in a range.
=If Shows a series calculations
EXCEL FUNCTIONS
SOURCES OF PHOTOS AND GRAPHICS
They can come direct from your camera, old pictures, free from internet or
purchased from the internet.
1.PERSONAL AND PROFESSIONAL PHOTOS
- are photos taken by amateur or professional photographers.
- these images are downloaded and are stored in the computer.
2. SCANNED IMAGES
- are those that you transfer from printed photos and graphics using
scanning devices.
- these are mostly old pictures photographed before the digital age.
3. STOCK PHOTO LIBRARY
- are several photographs and created images that are available for sale.
4. ONLINE STOCK PHOTO
- are found in WWW.
- advantage of this set up is that you do not have to go to places where
most of these photos were taken.
ONLINE DIGITAL FILE FORMATS FOR IMAGES AND TEXT
FILE FORMAT- the ways of encoding and storing this information to storage.
Digital file formats are categorized either proprietary or open:
PROPRIETARY FORMATS
• are owned and controlled by individuals or cooperation's.
• they are usually covered by copyrights and the owner has exclusive
control.
FILE FORMATS
FILE EXTENSIONS -are the suffixes at the end of the file name.
- is a means of identifying the format of the file
name
OPEN FORMATS
• are means and ways for storing digital information that are free
• can be used by public and are not encumbered by copyrights
THREE MAJOR GROUPS OF DIGITAL FILE FORMATS
1.UNCOMPRESSED OR RAW FORMAT
- is usually used for storing original file, it is flexible
form but needs a higher memory to store.
2. LOSSLESS FILE FORMAT
- is a file format that was compressed to replicate the
original quality but a reduced file size.
3.
IMAGE FILE FORMATS
- are standardized means of organizing and storing digital images.
RASTER IMAGE FORMAT
- images faithfully display the color information.
- made of pixels
Examples:
● JPEG (Joint Photographic Expert Group)
● GIF (Graphics Interface Format)
● PNG ( Portable Network Graphics)
● BMP (Bitmap)
● TIFF (Tagged Image File Format)
● PCX (Picture Exchange)
VECTOR IMAGES
- are lossless file created using mathematical geometric equations.
VECTOR IMAGE FORMAT OF GRAPHICS
- is preferred format for those who designed quality prints and display.
Types of formats:
1.PDF
2.Encapsulated postscript
3.Scalable Vector Graphics
4.Windows Metafile
File name extensions:
• .ai ● .dxf
• .ps ● .svg
• .drw
BASICS PRINCIPLES OF GRAPHICS AND LAYOUT
LAYOUT- is the process of planning and arranging graphics or text in a page or book
1.SYMMETRICAL
- there are equal weight of elements on both sides of the page
2.ASSYMETRICAL
- there is an artistic and different intensity on one side of the page.
3.TEXT
- the type should be visible legible and appropriate.
4. IMAGED
- should be appropriate with sharp color and high resolution.
5. PROXIMITY AND HARMONY
- elements should be closed together and not scattered and arranged apart
from each other.
6. CONSISTENCY
- there should be uniformity of theme on each page.
7. COLOR AND SHAPED
- use color to create interest by providing variety in design like the use of
color contrast and shape.
8. EMPHASIS
- there should be one point of interest in page
PRINCIPLES AND BASIC TECHNIQUES OF IMAGE
MANIPULATION
Techniques of image manipulation:
oBACKGORUND AND COLOR
- change the background if it does not match the image
oMULTIPLE IMAGES
- combine multiple images to make a point or highlight message.
o SHADOW
- using shadow effect will make the image realistic.
oBLENDING COLOR
- use blending color to match the background with the other
elements.
oTEXTURE
- textures add to the depth of your art.
oEMPHASIS
- there should be a focal point to a page that will attract viewers.
o PROPORTION
- when combining image, resize image to make it proportionate.
COMBINING TEXT, GRAPHICS AND IMAGES
 TRANSPARENT SHAPES
-add simple shape with a slight transparency behind your text to clearly see
the text.
 FONTS AND SHAPES
- fonts and shape should complement with each other. You can use rounded
shapes with rounded fonts and sharp shapes and fonts.
 TEXT AND BACKGROUND
- text and background should be aligned to have an organized look.
 CLEAN AND CLEAR BACKGROUND
- use a clean and color background for the message to be readable.
BASIC MANIPULATION USING OFFLINE OR OPEN SOURE
SORTWARE
 VARIOUS OFFLINE OR OPEN SOURCE FOR IMAGE EDITING:
 PICASA
- a Google free photo manager that edit and organize photo.
 PAINT.NET
- it is a windows-based alternative to the MS PAINT.
 GOOGLE SKETCH UP
- it is free 3D modeling program.
AUTODESK PIXL
- a free photo editing tool
- more than 600 effects.
ADOBE PHOTOSHOP
- a tool to create modifying combine digital photos.
GIMP OR GNU
- used for image retouching and editing.
- Free, open source, image/graphic editing program
INSTALLING GIMP
1.Go to www.gimp.com
2.Then click download
3.Select download GIMP directly.
4.Run the GIMP installer.
5.Click install
6.Wait for it to finish the installation.
PRESENTATION AND VISUALIZATION
PRESENTATION
- is a graphics program that allows you to create slide shows presenting a
topic, lecture, demonstration.
- allows you to organize, summarize and format your materials.
- allows transitions and animations and sounds that will captivate the
audience.
Examples:
1. ZOHO SHOW
- online presentation that features master slides.
- ability to insert videos/images, transition and animations.
2. LinkedInSlideShare
- web 2.0 based sliding hosting service.
- users can upload files privately or publicly in the FF formats
3. GOOGLE SLIDES
- create a new presentation and edit, collaborate with others and present
wherever you are free.
4. SLIDE ROCKET
- online presentation
5. MS POWERPOINT
- slide show presentation program currently developed by Microsoft.
6. PREZI
- cloud based presentation software based on a software as service model.

More Related Content

What's hot

Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
salvepepe
 
Gwapo
GwapoGwapo
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIES
agielyn
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
pizonaim
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs insetMaxie Santos
 
Computer Internet Basics I
Computer Internet Basics IComputer Internet Basics I
Computer Internet Basics Idebbie43
 
Christine
ChristineChristine
Christine
christinegay1
 
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
joanagolo4ever
 
Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
andregoron
 
Basic Internet Concepts
Basic Internet ConceptsBasic Internet Concepts
Basic Internet ConceptsKiran Budhrani
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
JovanieGarin
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123
Ybonnica22
 
Internet Basics
Internet BasicsInternet Basics
Internet Basics
Sue Pelman
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internetdpd
 
Internet basics
Internet basicsInternet basics
Internet basics
cetrosoft
 
Internet basic
Internet basicInternet basic
Internet basic
argusacademy
 
Internet application
Internet applicationInternet application
Internet application
Rezaul Rahat
 

What's hot (20)

Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Gwapo
GwapoGwapo
Gwapo
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIES
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs inset
 
Computer Internet Basics I
Computer Internet Basics IComputer Internet Basics I
Computer Internet Basics I
 
Christine
ChristineChristine
Christine
 
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
 
Basic Internet Concepts
Basic Internet ConceptsBasic Internet Concepts
Basic Internet Concepts
 
Group 5
Group 5Group 5
Group 5
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
 
What is Internet
What is InternetWhat is Internet
What is Internet
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123
 
Internet Basics
Internet BasicsInternet Basics
Internet Basics
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Internet basic
Internet basicInternet basic
Internet basic
 
Internet application
Internet applicationInternet application
Internet application
 

Similar to empowerment technologies by: aiza martin and patricia obor

1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
niniogolo
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
janelle17
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
jonaspalen1
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
Padsromel
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
andregoron
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
joanagolo4ever
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
VineGono
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
CedricPada
 
ICT
ICTICT
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
jonaspalen1
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
JuliezaMaeGermo
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
Padsromel
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
mhedilyn8556
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
joanagolo4ever
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
pizonaim
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies
RicciGozon
 
Empowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and CharizaEmpowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and Chariza
Padsromel
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
Padsromel
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
obus25
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
rairuta
 

Similar to empowerment technologies by: aiza martin and patricia obor (20)

1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
ICT
ICTICT
ICT
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies
 
Empowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and CharizaEmpowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and Chariza
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 

Recently uploaded

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

empowerment technologies by: aiza martin and patricia obor

  • 2. INFORMATION COMMUNICATION TECHNOLOGY • Is an umbrella term that includes any communication device or application encompassing radio, television, computer and etc. • Main method of communication, getting information and education, attaining services and expressing social advocacies and awareness
  • 3. The Current States of ICT WEB 1.0 • Read only web • No user interaction • Web page were static • No direct comment available
  • 5. WEB 2.0 • DYNAMIC WEB • Use around 2004 • The users now interact, contribute and create their own internet space and content.
  • 7. WEB 3.0 • Discovered by TIM BERNERS-LEE ( father of the world wide web) • Refer as Semantic web • It will not make the web 2.0 obsolete
  • 8. TECHNOLOGY CONVERGENCE Merging one technology into one. Evolution of technological development that merge into a new system bringing together different types of applications and media. Examples: SMARTPHONE - provides functionality of various individual separate and different devices now available in one gear. -function as camera,telephone,Radio,TV,and gaming console.
  • 9. SOCIAL MEDIA - internet based application - collection of internet base communication task, dedicated to allow users to interact, communicate and share information. FACEBOOK A popular free social networking site Allows users to create profile, upload photos, and videos, create and join groups. Sends message, keeping in touch with relatives and friends.
  • 10. TWITTER More than 300 million users in 2016 Allows users to microblog or broadcast short message called “tweets” INSTAGRAM Enables users to share mobile photos and video. SNAPCHAT Designed for the mobile networking application
  • 11. DIFFERENT DANGERS ONLINE EMAIL SPAM Known as the junk email. Usually unsolicited commercial email sent from one source with identical message to send to multiple recipient. EMAIL SPOOFING A deceitful email practice in which the sender address is changed, so that it would appear to have come from a different sources. PHISHING A deceitful practice of trying to get confidential information such as passwords, usernames and credit card by making it appear as if it comes from a trustworthy source.
  • 12. PHARMING A dangerous hacker attack on a website which directs all traffic to that websites to another fictitious website. SPYWARE Is a computer program that is installed convertly on a personal computer to collect information and take control over the computer without the knowledge of the users. COMPUTER WORM A dangerous computer program that replicates itself through a network sites. Some worms deletes file, and others.
  • 13. COMPUTER VIRUS A program that duplicates itself and then infects the computer Virus can be also transferred by the use of removable storage. HACKER A person who is able to enter the control other peoples computer without authorization. TROJAN HORSE A malicious software fronting to perform a good task. It can erase data, can allow access of the victims computer.
  • 14. SECURITY CENTER • It is the place where you can set additional protection from THREAT to your computer, especially when using the internet. FIREWALL • Helps in protecting your computer from unauthorized entries.
  • 15. AUTOMATIC UPDATES • Another feature of windows which when turned on will automatically download updates from Microsoft windows website. VIRUS PROTECTION Usually about the current antivirus software installed in your computer. ANTIVIRUS- meant to locate, find and remove virus threats that are already in your computer
  • 16. CONTEXTUAL SEARCH • An attempt to be more precise in providing the list documents accounts to the words use by the user to search the internet. Steps in contextual research: 1. Identify or task definition 2. Topic or task definition 3. Identify methods of search 4. Identify resources of your research 5. Make your research strategies 6. Compiling the research results 7. Evaluate the results of your research 8. Create a list of your references for citation
  • 17. Methods of search: • Experiment ●Explore ●SURVEY RESEARCH SKILLS CRITICAL THINKING - the ability to digest, reflect, and conclude from the information searched. - the ability to look, verbalize, conceptualize and gather data attuned to the context of the subject. PROBLEM SOLVING CAPABILITY - the ability to present solutions of solve problems by presenting a decision based on the given information.
  • 18. ORGANIZED DATA MINING - it is the ability to organize and catalogue all collected materials efficiently despite data size. RESEARCH PRESENTATION - it is the ability to present ideas and draws conclusions from the research. CREATIVITY AND DEVELOPED IMAGINATION - it is the ability to look for alternative solutions to the problems needed to solve in the research. COMPUTER LITERACY - knowledge of the various computer applications and tools. - skills in the use of software to write, design and present.
  • 19. STEPS IN CONTEXTUALIZE RESEARCH: 1. Open the Google site 2. On the upper right side of the window click the Google App icon and click search G 3. Lower right part of the window click settings and the Google search settings pop- list will appear. 4. Click advanced search and the advance search windows will appear. IDENTIFYING GOOD SOURCE FROM SATIRICAL SOURCE • SATIRICAL SITES are websites that report untrue or false stories meant to amuse or entertain.
  • 20. HOW TO DETECT SATIRICAL NEWS: 1. If it is good to be true, then it must be so 2. If the news did not emanate from liable news site. 3. If they are from known satirical sites. LIST OF TOP SOURCES OF SATIRICAL NEWS: 1. Adobo chronicles (adobchronicles.com) 2. So, what news? 3. Eritas times 4. Professional Heckler LIST OF AMERICAN SATIRICAL SITES IN US 1. The onion 2. Clickhole 3. Christ wire global media
  • 21. MAIL MERGE • is used to automatically add mailing addresses or personalized information to your publication. MAILING START GROUP COMMANDS NAME FUNCTION MAIL MERGE Merges data into a publication which will be printed and mailed. EMAIL MERGE Merges data into a publication that will be sent as e-mail. SELECT RECEPIENTS Chooses the list of people you intended to send. EDIT RECEPIENT LIST Make changes to the list of recipients. INSERT MERGE FIELD Adds a field from your recipient list. ADDRESS BLOCK Adds an address to your letter. GREETING LINE Adds a greeting to your letter PICTURE Adds a picture to your field.
  • 22. HANDS ON USING MS. WORD TO CREATE A MAIL MERGE: Step 1: Creating a recipient list Step 2: Prepare your publication Step 3: Create merge publication GENERATING LABELS LABELSare used for envelopes that you intend to send out to persons usually containing the name, address or telephone.
  • 23. MS POWERPOINT - it is an application intend in creating a slide presentation. HOW TO CREATE A SLIDE PRESENTATION: 1.Open MS Power Point app. 2.Click new and select your preferred design template 3.Click insert tab menu and insert text, word art, or any object needed in slide 4.Click home tab under, click insert new slide in your presentation.
  • 24. Is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications. MS EXCEL
  • 25. =SUM Calculates sum of average cells. =AVERAGE Calculates the arithmetic mean of range of the cells =MAX Gives the maximum value in range. =MIN Gives the minimum value in range. =COUNT Counts the number of cells in a range. =If Shows a series calculations EXCEL FUNCTIONS
  • 26. SOURCES OF PHOTOS AND GRAPHICS They can come direct from your camera, old pictures, free from internet or purchased from the internet. 1.PERSONAL AND PROFESSIONAL PHOTOS - are photos taken by amateur or professional photographers. - these images are downloaded and are stored in the computer. 2. SCANNED IMAGES - are those that you transfer from printed photos and graphics using scanning devices. - these are mostly old pictures photographed before the digital age.
  • 27. 3. STOCK PHOTO LIBRARY - are several photographs and created images that are available for sale. 4. ONLINE STOCK PHOTO - are found in WWW. - advantage of this set up is that you do not have to go to places where most of these photos were taken.
  • 28. ONLINE DIGITAL FILE FORMATS FOR IMAGES AND TEXT FILE FORMAT- the ways of encoding and storing this information to storage. Digital file formats are categorized either proprietary or open: PROPRIETARY FORMATS • are owned and controlled by individuals or cooperation's. • they are usually covered by copyrights and the owner has exclusive control.
  • 29. FILE FORMATS FILE EXTENSIONS -are the suffixes at the end of the file name. - is a means of identifying the format of the file name OPEN FORMATS • are means and ways for storing digital information that are free • can be used by public and are not encumbered by copyrights
  • 30. THREE MAJOR GROUPS OF DIGITAL FILE FORMATS 1.UNCOMPRESSED OR RAW FORMAT - is usually used for storing original file, it is flexible form but needs a higher memory to store. 2. LOSSLESS FILE FORMAT - is a file format that was compressed to replicate the original quality but a reduced file size. 3.
  • 31. IMAGE FILE FORMATS - are standardized means of organizing and storing digital images. RASTER IMAGE FORMAT - images faithfully display the color information. - made of pixels Examples: ● JPEG (Joint Photographic Expert Group) ● GIF (Graphics Interface Format) ● PNG ( Portable Network Graphics) ● BMP (Bitmap) ● TIFF (Tagged Image File Format) ● PCX (Picture Exchange)
  • 32. VECTOR IMAGES - are lossless file created using mathematical geometric equations. VECTOR IMAGE FORMAT OF GRAPHICS - is preferred format for those who designed quality prints and display. Types of formats: 1.PDF 2.Encapsulated postscript 3.Scalable Vector Graphics 4.Windows Metafile File name extensions: • .ai ● .dxf • .ps ● .svg • .drw
  • 33. BASICS PRINCIPLES OF GRAPHICS AND LAYOUT LAYOUT- is the process of planning and arranging graphics or text in a page or book 1.SYMMETRICAL - there are equal weight of elements on both sides of the page 2.ASSYMETRICAL - there is an artistic and different intensity on one side of the page. 3.TEXT - the type should be visible legible and appropriate. 4. IMAGED - should be appropriate with sharp color and high resolution.
  • 34. 5. PROXIMITY AND HARMONY - elements should be closed together and not scattered and arranged apart from each other. 6. CONSISTENCY - there should be uniformity of theme on each page. 7. COLOR AND SHAPED - use color to create interest by providing variety in design like the use of color contrast and shape. 8. EMPHASIS - there should be one point of interest in page
  • 35. PRINCIPLES AND BASIC TECHNIQUES OF IMAGE MANIPULATION Techniques of image manipulation: oBACKGORUND AND COLOR - change the background if it does not match the image oMULTIPLE IMAGES - combine multiple images to make a point or highlight message. o SHADOW - using shadow effect will make the image realistic.
  • 36. oBLENDING COLOR - use blending color to match the background with the other elements. oTEXTURE - textures add to the depth of your art. oEMPHASIS - there should be a focal point to a page that will attract viewers. o PROPORTION - when combining image, resize image to make it proportionate.
  • 37. COMBINING TEXT, GRAPHICS AND IMAGES  TRANSPARENT SHAPES -add simple shape with a slight transparency behind your text to clearly see the text.  FONTS AND SHAPES - fonts and shape should complement with each other. You can use rounded shapes with rounded fonts and sharp shapes and fonts.  TEXT AND BACKGROUND - text and background should be aligned to have an organized look.  CLEAN AND CLEAR BACKGROUND - use a clean and color background for the message to be readable.
  • 38. BASIC MANIPULATION USING OFFLINE OR OPEN SOURE SORTWARE  VARIOUS OFFLINE OR OPEN SOURCE FOR IMAGE EDITING:  PICASA - a Google free photo manager that edit and organize photo.  PAINT.NET - it is a windows-based alternative to the MS PAINT.  GOOGLE SKETCH UP - it is free 3D modeling program.
  • 39. AUTODESK PIXL - a free photo editing tool - more than 600 effects. ADOBE PHOTOSHOP - a tool to create modifying combine digital photos. GIMP OR GNU - used for image retouching and editing. - Free, open source, image/graphic editing program
  • 40. INSTALLING GIMP 1.Go to www.gimp.com 2.Then click download 3.Select download GIMP directly. 4.Run the GIMP installer. 5.Click install 6.Wait for it to finish the installation.
  • 41. PRESENTATION AND VISUALIZATION PRESENTATION - is a graphics program that allows you to create slide shows presenting a topic, lecture, demonstration. - allows you to organize, summarize and format your materials. - allows transitions and animations and sounds that will captivate the audience. Examples: 1. ZOHO SHOW - online presentation that features master slides. - ability to insert videos/images, transition and animations.
  • 42. 2. LinkedInSlideShare - web 2.0 based sliding hosting service. - users can upload files privately or publicly in the FF formats 3. GOOGLE SLIDES - create a new presentation and edit, collaborate with others and present wherever you are free. 4. SLIDE ROCKET - online presentation 5. MS POWERPOINT - slide show presentation program currently developed by Microsoft. 6. PREZI - cloud based presentation software based on a software as service model.