The document provides an overview of various topics related to empowerment through technology including:
- ICT and the state of internet technology including web 1.0, 2.0, and 3.0.
- Technology convergence and how different applications merge.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Online threats like spam, spoofing, phishing, and how to protect computers.
- Steps for contextualized online research including defining topics, identifying resources and evaluating results.
- Using Microsoft Word and Excel for tasks like mail merge, formulas, and functions.
The document discusses various aspects of developing and maintaining an ICT project for social change. It provides guidance on creating a concept paper for an ICT project, including key elements like introduction, purpose, description, and support. It also offers tips for publishing an ICT project through platforms like blogs, social media, and content management systems. Methods are presented for promoting and monitoring published projects to increase traffic, such as using multimedia, online tools, images and collaboration. Metrics like demographics and psychographics are described for analyzing audience feedback. The document stresses the importance of regularly updating content to maintain audience engagement.
The document discusses interactive multimedia, which allows users to control, combine, and manipulate different types of media like text, sound, video, graphics, and animation. It provides examples of uses for interactive multimedia like education, training, games, simulations, and more. Specific examples discussed include using videos on YouTube, audio on SoundCloud, online games like Farmville, online tests and surveys, e-learning courses, podcasts on apps like Spotify, and vodcasts on YouTube. The document emphasizes that these tools should be used wisely to achieve work goals efficiently.
This document discusses online platforms and tools that can be used for developing ICT content. It describes different types of online platforms including presentation/visualization tools, cloud computing, social media, file management, mapping, and web page creation tools. It also discusses Google applications such as Docs, Sheets, and Slides that allow online content creation. Basic web design principles and elements like color, layout, links, buttons and images are also covered. The document provides examples of specific online tools for each category like Slideshare, Google Drive, Tumblr and Wix.
The document discusses contextualized online search and research skills. It covers topics like search tools, information evaluation, and plagiarism. It provides guidance on using search engines effectively through search operators and techniques. It emphasizes the importance of evaluating information sources for accuracy, authority, objectivity and currency. Examples of information sources discussed include indigenous knowledge, libraries and the internet. The document aims to help students improve their ability to conduct credible online research.
The document discusses imaging and design for the online environment. It begins by stating what the author can do regarding website evaluation and image manipulation. It then defines what an image and graphics are. The document outlines different image file formats like JPEG, GIF and PNG that are used online. It discusses layout principles such as balance, emphasis and movement. It also covers infographics and how to make them effective. The document lists image manipulation principles, techniques and hosting websites. It ends by listing additional topics that could be covered.
Infographics combine information, storytelling, and perception through images. They take advantage of people's reliance on sight. Basic elements of layout and design include lines, color, and shapes. Lines are the most fundamental element and define characteristics. Color is powerful and influential, using the right colors can catch attention. Shapes are defined by boundaries like lines or color and are often used to emphasize parts of a page.
This document discusses online research skills and the strengths and weaknesses of internet research. It provides tips for effective online research, such as evaluating sources for currency, accuracy, and authority. It also recommends asking good questions, going beyond surface-level information, being patient, respecting intellectual property rights, and using social networks to gather information. Regarding internet research specifically, it notes the speed and accessibility as strengths, but also the potential for incorrect information and personal data leaks as weaknesses.
Empowerment Technologies - Imaging and Design for the Online EnvironmentLany Lyn Magdaraog
This document provides an overview of key principles of graphics and layout for online design. It discusses concepts like alignment, balance, contrast, emphasis, gestalt, movement, proportion, proximity, unity, repetition, rhythm, and white space. It defines these principles and gives examples of how they can be applied in graphic design. The document is intended to cover basic principles that are important for imaging and design in an online environment.
The document discusses various aspects of developing and maintaining an ICT project for social change. It provides guidance on creating a concept paper for an ICT project, including key elements like introduction, purpose, description, and support. It also offers tips for publishing an ICT project through platforms like blogs, social media, and content management systems. Methods are presented for promoting and monitoring published projects to increase traffic, such as using multimedia, online tools, images and collaboration. Metrics like demographics and psychographics are described for analyzing audience feedback. The document stresses the importance of regularly updating content to maintain audience engagement.
The document discusses interactive multimedia, which allows users to control, combine, and manipulate different types of media like text, sound, video, graphics, and animation. It provides examples of uses for interactive multimedia like education, training, games, simulations, and more. Specific examples discussed include using videos on YouTube, audio on SoundCloud, online games like Farmville, online tests and surveys, e-learning courses, podcasts on apps like Spotify, and vodcasts on YouTube. The document emphasizes that these tools should be used wisely to achieve work goals efficiently.
This document discusses online platforms and tools that can be used for developing ICT content. It describes different types of online platforms including presentation/visualization tools, cloud computing, social media, file management, mapping, and web page creation tools. It also discusses Google applications such as Docs, Sheets, and Slides that allow online content creation. Basic web design principles and elements like color, layout, links, buttons and images are also covered. The document provides examples of specific online tools for each category like Slideshare, Google Drive, Tumblr and Wix.
The document discusses contextualized online search and research skills. It covers topics like search tools, information evaluation, and plagiarism. It provides guidance on using search engines effectively through search operators and techniques. It emphasizes the importance of evaluating information sources for accuracy, authority, objectivity and currency. Examples of information sources discussed include indigenous knowledge, libraries and the internet. The document aims to help students improve their ability to conduct credible online research.
The document discusses imaging and design for the online environment. It begins by stating what the author can do regarding website evaluation and image manipulation. It then defines what an image and graphics are. The document outlines different image file formats like JPEG, GIF and PNG that are used online. It discusses layout principles such as balance, emphasis and movement. It also covers infographics and how to make them effective. The document lists image manipulation principles, techniques and hosting websites. It ends by listing additional topics that could be covered.
Infographics combine information, storytelling, and perception through images. They take advantage of people's reliance on sight. Basic elements of layout and design include lines, color, and shapes. Lines are the most fundamental element and define characteristics. Color is powerful and influential, using the right colors can catch attention. Shapes are defined by boundaries like lines or color and are often used to emphasize parts of a page.
This document discusses online research skills and the strengths and weaknesses of internet research. It provides tips for effective online research, such as evaluating sources for currency, accuracy, and authority. It also recommends asking good questions, going beyond surface-level information, being patient, respecting intellectual property rights, and using social networks to gather information. Regarding internet research specifically, it notes the speed and accessibility as strengths, but also the potential for incorrect information and personal data leaks as weaknesses.
Empowerment Technologies - Imaging and Design for the Online EnvironmentLany Lyn Magdaraog
This document provides an overview of key principles of graphics and layout for online design. It discusses concepts like alignment, balance, contrast, emphasis, gestalt, movement, proportion, proximity, unity, repetition, rhythm, and white space. It defines these principles and gives examples of how they can be applied in graphic design. The document is intended to cover basic principles that are important for imaging and design in an online environment.
Empowerment Technologies - Principles of Visual Message and Design using Inf...Lany Lyn Magdaraog
This document discusses principles for creating effective infographics. It defines infographics as using visuals to represent information in an engaging way. Key principles include keeping the design unique, simple, and creative while including minimal text. The goal is to grab attention and encourage sharing the infographic in order to spread the message to a wider audience. Common chart types used in infographics include pie charts, bar graphs, and line charts. Infographics can help increase brand awareness, make content go viral, and position the creator as an expert.
This document provides guidance to students on improving online search and research skills. It discusses using keywords and Boolean operators like AND, OR to narrow search results. It also covers evaluating the credibility of websites by considering the author's credentials, the purpose and date of the document, and whether the information is objective. Students are asked to conduct searches, evaluate sample websites, and explain the importance of keywords and assessing a website's domain when researching online.
This document discusses various platforms and tools for publishing, managing, promoting, and monitoring ICT projects online. It provides information on content management systems like WordPress, Microsoft Office Project Server, and file managers that can be used to upload and publish project files. It also discusses website management platforms, content promotion strategies using multimedia, blogs, collaboration and regular updates. Traction tools mentioned include LinkedIn, Google AdWords, Reddit and Facebook ads. Methods for evaluating projects through user feedback and website statistics are presented. Steps for setting up a WordPress website to publish ICT contents are outlined. The document concludes with sections on sustaining projects long-term through ongoing content updates and maintenance, as well as reflecting on the social impact and learning
The document discusses contextualized online search and research skills. It outlines both the strengths and weaknesses of internet research, including speed, sharing information, and potential personal information leaks or incorrect information. It provides tips for effective online research such as checking sources, asking good questions, going beyond the surface, being patient, and respecting ownership. The document also lists popular search engines and describes common digital image file formats like TIFF, JPEG, GIF, PNG, and raw files.
The document discusses empowerment technologies for senior high school students. It covers topics like social change, audience profiling, creating infographics, and using Google Forms to create surveys. The learning objectives are to understand social change, gather research and profile audiences, create infographics, share made infographics, and create short surveys using Google Forms. The document provides guidance on these topics through definitions, examples, and instructions for activities.
The document discusses advanced word processing skills related to mail merge and integrating images and external materials into documents. It provides 30 steps for creating a simple mail merge with two key components - a form document and a data file containing recipient information. It also describes different types of images that can be inserted, such as JPG, GIF and PNG files, as well as other materials like clip art, shapes, smart art and charts. Details are given on image placement, sizing and text wrapping options when integrating images into documents.
This document provides information on productivity tools and advanced application techniques in Microsoft Office applications like Word, Excel, and PowerPoint. It discusses features like mail merge and label generation in Word, complex calculations and functions in Excel, and animation, hyperlinks, and embedded data in PowerPoint. The document demonstrates how to insert and format illustrations, integrate charts and tables, use advanced formulas and keyboard shortcuts, and apply timing and animation effects in presentations. Overall, the document aims to teach advanced productivity techniques for creating professional documents, spreadsheets, and slideshows using Microsoft Office.
This document provides tips for creating effective presentations and using hyperlinks in PowerPoint. It recommends keeping slides to a minimum with important details only, summarizing information using bullets or short sentences, and using graphics that don't distract. The document also outlines how to insert hyperlinks by selecting text or objects, choosing link options in the Insert tab, and clicking OK to apply the links. Hyperlinks allow easy navigation within a presentation or to other files and web pages.
The document provides guidance on basic web design principles and elements. It outlines 7 principles for effective web design: 1) use a consistent visual language, 2) maintain balance, 3) limit choices to avoid overwhelming users, 4) focus on high-quality content, 5) simplify designs, 6) use a grid-based layout, and 7) optimize page load times. It also describes 6 key design elements: navigation, visual design, content, web compatibility, color scheme, and typography. The document emphasizes usability, engaging the user, and conveying the intended message through thoughtful application of design principles and elements.
Interactive multimedia allows users to control and combine different types of media like text, sound, video, graphics and animation. It can be used for education, training, games, simulations, presentations and more. Some common multimedia contents include videos, audio, online games, tests, courseware, podcasts and vodcasts.
This document discusses online safety, security, ethics, and etiquette. It provides tips for protecting personal information when online, such as not sharing full names, addresses, or birthdays. It also recommends using antivirus software, avoiding untrusted websites, and not downloading unauthorized content. Additionally, it outlines several types of internet threats like malware, spam, phishing, botnets, and denial of service attacks. The goal is to educate people on how to safely and securely use the internet.
This document discusses ICT for advocacy and development communication (ICT4D). It defines ICT4D as using information and communications technology for international development, socioeconomic development, and human rights. It identifies three key success factors for ICT4D projects: having a supportive community, creating useful facilities, and understanding the target group. The document also discusses how social media and mobile phones have increased accessibility and sharing of information for advocacy purposes. It provides examples of how these technologies were used during the People Power protests in the Philippines.
- Presentations should have minimal slides, readable fonts, bullets or short sentences, and graphics that attract without distracting. Consistency in design is important.
- Hyperlinks allow easy navigation between slides by selecting text or objects and inserting hyperlinks to websites, files, specific slides, or creating emails.
- Objects like Excel files can be embedded by inserting them, appearing as interactive tables.
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Arniel Ping
Content
10. Media and Information Literate Individual
a. Improved Quality of Life
b. Greater Political Participation
c.Better Economic Opportunities
d. Improved Learning Environment
e. More Cohesive Social Units
Learning Competency
1. Students will be able to synthesize the overall implication of media and information to an individual (personal, professional, educational, and others) and the society as a whole (economic, social, political, educational, and others) MIL11/12MILI-IIIj-29
This document discusses two components of mail merge: a form document and a list or data file. It then discusses different types of materials that can be used in a Word document, including pictures, clipart, shapes, smart art, charts, and screenshots. It explains different image positioning options like inline with text, square, tight, through, top and bottom, behind text, and in front of text. Finally, it provides activities for creating a flow chart summarizing mail merge steps using shapes and creating a letter with solar campaign images and charts showing advocacy progress.
Multimedia involves combining different media types such as video, audio, images, and text. It makes websites and applications more engaging by providing rich content. Multimedia can be linear, with predetermined flow set by the creator, or nonlinear, allowing users more interactivity and freedom to navigate. It has various applications in advertising, entertainment, education, and industries. New forms include online participation in communities, video on demand systems, and open courseware from universities published freely online.
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
This document discusses various technologies including information and communication technology, the evolution of the world wide web from Web 1.0 to Web 3.0, technology convergence in smartphones, and examples of social media like Facebook, Twitter, Instagram and Snapchat. It also covers dangers on computers like email spam, phishing and pharming as well as methods of protection like using firewalls and antivirus software. Formats for digital images and text are described including raster, vector, JPEG, PNG and others.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
Empowerment Technologies - Principles of Visual Message and Design using Inf...Lany Lyn Magdaraog
This document discusses principles for creating effective infographics. It defines infographics as using visuals to represent information in an engaging way. Key principles include keeping the design unique, simple, and creative while including minimal text. The goal is to grab attention and encourage sharing the infographic in order to spread the message to a wider audience. Common chart types used in infographics include pie charts, bar graphs, and line charts. Infographics can help increase brand awareness, make content go viral, and position the creator as an expert.
This document provides guidance to students on improving online search and research skills. It discusses using keywords and Boolean operators like AND, OR to narrow search results. It also covers evaluating the credibility of websites by considering the author's credentials, the purpose and date of the document, and whether the information is objective. Students are asked to conduct searches, evaluate sample websites, and explain the importance of keywords and assessing a website's domain when researching online.
This document discusses various platforms and tools for publishing, managing, promoting, and monitoring ICT projects online. It provides information on content management systems like WordPress, Microsoft Office Project Server, and file managers that can be used to upload and publish project files. It also discusses website management platforms, content promotion strategies using multimedia, blogs, collaboration and regular updates. Traction tools mentioned include LinkedIn, Google AdWords, Reddit and Facebook ads. Methods for evaluating projects through user feedback and website statistics are presented. Steps for setting up a WordPress website to publish ICT contents are outlined. The document concludes with sections on sustaining projects long-term through ongoing content updates and maintenance, as well as reflecting on the social impact and learning
The document discusses contextualized online search and research skills. It outlines both the strengths and weaknesses of internet research, including speed, sharing information, and potential personal information leaks or incorrect information. It provides tips for effective online research such as checking sources, asking good questions, going beyond the surface, being patient, and respecting ownership. The document also lists popular search engines and describes common digital image file formats like TIFF, JPEG, GIF, PNG, and raw files.
The document discusses empowerment technologies for senior high school students. It covers topics like social change, audience profiling, creating infographics, and using Google Forms to create surveys. The learning objectives are to understand social change, gather research and profile audiences, create infographics, share made infographics, and create short surveys using Google Forms. The document provides guidance on these topics through definitions, examples, and instructions for activities.
The document discusses advanced word processing skills related to mail merge and integrating images and external materials into documents. It provides 30 steps for creating a simple mail merge with two key components - a form document and a data file containing recipient information. It also describes different types of images that can be inserted, such as JPG, GIF and PNG files, as well as other materials like clip art, shapes, smart art and charts. Details are given on image placement, sizing and text wrapping options when integrating images into documents.
This document provides information on productivity tools and advanced application techniques in Microsoft Office applications like Word, Excel, and PowerPoint. It discusses features like mail merge and label generation in Word, complex calculations and functions in Excel, and animation, hyperlinks, and embedded data in PowerPoint. The document demonstrates how to insert and format illustrations, integrate charts and tables, use advanced formulas and keyboard shortcuts, and apply timing and animation effects in presentations. Overall, the document aims to teach advanced productivity techniques for creating professional documents, spreadsheets, and slideshows using Microsoft Office.
This document provides tips for creating effective presentations and using hyperlinks in PowerPoint. It recommends keeping slides to a minimum with important details only, summarizing information using bullets or short sentences, and using graphics that don't distract. The document also outlines how to insert hyperlinks by selecting text or objects, choosing link options in the Insert tab, and clicking OK to apply the links. Hyperlinks allow easy navigation within a presentation or to other files and web pages.
The document provides guidance on basic web design principles and elements. It outlines 7 principles for effective web design: 1) use a consistent visual language, 2) maintain balance, 3) limit choices to avoid overwhelming users, 4) focus on high-quality content, 5) simplify designs, 6) use a grid-based layout, and 7) optimize page load times. It also describes 6 key design elements: navigation, visual design, content, web compatibility, color scheme, and typography. The document emphasizes usability, engaging the user, and conveying the intended message through thoughtful application of design principles and elements.
Interactive multimedia allows users to control and combine different types of media like text, sound, video, graphics and animation. It can be used for education, training, games, simulations, presentations and more. Some common multimedia contents include videos, audio, online games, tests, courseware, podcasts and vodcasts.
This document discusses online safety, security, ethics, and etiquette. It provides tips for protecting personal information when online, such as not sharing full names, addresses, or birthdays. It also recommends using antivirus software, avoiding untrusted websites, and not downloading unauthorized content. Additionally, it outlines several types of internet threats like malware, spam, phishing, botnets, and denial of service attacks. The goal is to educate people on how to safely and securely use the internet.
This document discusses ICT for advocacy and development communication (ICT4D). It defines ICT4D as using information and communications technology for international development, socioeconomic development, and human rights. It identifies three key success factors for ICT4D projects: having a supportive community, creating useful facilities, and understanding the target group. The document also discusses how social media and mobile phones have increased accessibility and sharing of information for advocacy purposes. It provides examples of how these technologies were used during the People Power protests in the Philippines.
- Presentations should have minimal slides, readable fonts, bullets or short sentences, and graphics that attract without distracting. Consistency in design is important.
- Hyperlinks allow easy navigation between slides by selecting text or objects and inserting hyperlinks to websites, files, specific slides, or creating emails.
- Objects like Excel files can be embedded by inserting them, appearing as interactive tables.
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Arniel Ping
Content
10. Media and Information Literate Individual
a. Improved Quality of Life
b. Greater Political Participation
c.Better Economic Opportunities
d. Improved Learning Environment
e. More Cohesive Social Units
Learning Competency
1. Students will be able to synthesize the overall implication of media and information to an individual (personal, professional, educational, and others) and the society as a whole (economic, social, political, educational, and others) MIL11/12MILI-IIIj-29
This document discusses two components of mail merge: a form document and a list or data file. It then discusses different types of materials that can be used in a Word document, including pictures, clipart, shapes, smart art, charts, and screenshots. It explains different image positioning options like inline with text, square, tight, through, top and bottom, behind text, and in front of text. Finally, it provides activities for creating a flow chart summarizing mail merge steps using shapes and creating a letter with solar campaign images and charts showing advocacy progress.
Multimedia involves combining different media types such as video, audio, images, and text. It makes websites and applications more engaging by providing rich content. Multimedia can be linear, with predetermined flow set by the creator, or nonlinear, allowing users more interactivity and freedom to navigate. It has various applications in advertising, entertainment, education, and industries. New forms include online participation in communities, video on demand systems, and open courseware from universities published freely online.
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
This document discusses various technologies including information and communication technology, the evolution of the world wide web from Web 1.0 to Web 3.0, technology convergence in smartphones, and examples of social media like Facebook, Twitter, Instagram and Snapchat. It also covers dangers on computers like email spam, phishing and pharming as well as methods of protection like using firewalls and antivirus software. Formats for digital images and text are described including raster, vector, JPEG, PNG and others.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
This document discusses empowerment through technology. It provides an overview of information and communication technologies (ICT) and how they have evolved from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence and how different applications have merged. While technology provides many benefits, it also poses some dangers like email spam, phishing, and computer viruses. The document provides tips on how to protect yourself online and conduct safe research.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
ICT plays an important role in many aspects of modern society through communication, education, commerce, health services, and more. The document discusses how ICT is used in these areas and others like science, sports, and media. It also covers the evolution of the internet from early Web 1.0 to current versions, common online systems and platforms, and potential online dangers. Guidelines for image and text manipulation and basic graphic design principles are provided.
This document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, with examples like social media, and some of the dangers online like email spam, phishing, and computer viruses. It provides steps to conduct research and develop skills like critical thinking. Additionally, it outlines the mail merge and label generation process in Microsoft Word and how to create slide presentations in PowerPoint.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
This document discusses information and communication technology (ICT) and how it can be used across different fields like education, commerce, health services, and more. It explains the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and the emerging data-driven Web 3.0. The document also discusses technology convergence using smartphones as an example. It covers social media platforms and online dangers like spam, spoofing, and hacking. Finally, it provides guidance on contextualized online research and detecting satirical news sources.
This document discusses empowerment through information and communication technologies (ICT) and provides information on current states of the internet. It describes the evolution from static Web 1.0 to more interactive Web 2.0 and the emerging semantic Web 3.0. The document also discusses technology convergence through examples like smartphones, discusses popular social media platforms, and outlines some dangers of computers like email spam, phishing, and computer viruses. It provides guidance on research skills and contextualizing online searches as well as how to use mail merge functions in Microsoft Word.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
empowerment technology by: kier and joverynkiersamaco
This document provides an overview of empowerment technology and discusses various topics related to information and communication technology (ICT). It describes the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, social media platforms, dangers on the internet like spam and viruses, and ways to protect computers. Additionally, it covers research skills, mail merge functions in Microsoft Word, identifying credible online sources, and basics of slide presentation and graphic design.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
The document discusses the history and evolution of the World Wide Web from Web 1.0 to Web 2.0. Web 1.0 featured a read-only web with few content creators and no user interaction. Web 2.0 arose around 2004 and enabled increased user contribution, interaction, and creation of user-generated content through technologies like social media and WiFi. Web 2.0 transformed the web into a more dynamic and community-oriented platform.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
empowerment technologies by: aiza martin and patricia obormartinaiza
ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
Similar to EMPOWERMENT TECHNOLOGY by jessabel & mary grace (20)
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
2. ICT
State of the Internet Technology
Technology Convergence
Social Media
The Different Dangers in the Computer
Protection from Threat
Unlocking of Difficulties
Contextual search
Steps to make Contextualized Online Research
Research Skills
Identify Good Source from Satirical Sites
Mailings Start Group Commands
3. Write and Insert Group Commands
Parts of Mail Merge
Hands- on: Using MS Word to create a Mail Merge
MS Excel
Sources of Photos and Graphics
Online Digital File Formats for Images and Text
Image File Format
Raster Image Files (Bitmap Images)
Types of Raster Image Format
Vector Image or Vector Graphics Files
Types of Vector Image Formats
Basic Principles of Graphics and Layout
Principles and Basic Technique of Image Manipulation
Techniques of Image Manipulation
Combining Text, Graphics and Image
Basic Image Manipulation Using Offline or Open Source Software
4. Types of Raster Image Format
Vector Image or Vector Graphics Files
Types of Vector Image Formats
Basic Principles of Graphics and Layout
Principles and Basic Technique of Image Manipulation
Techniques of Image Manipulation
Combining Text, Graphics and Image
Basic Image Manipulation Using Offline or Open Source
Software
5. ICT
Umbrella term that includes any
communication device or application,
encompassing; radio, television, computer
and etc.
Main method of communication, getting
information and education, attaining
services and expressing social advocates
and awareness
6. State of the Internet Technology
Web 1.0
Web 2.0
Web 3.0
7. Web 1.0
Very few content creator or known as “read only
web”
There’s no user interaction
Web pages were static
Feedback mechanism was the private email
No direct comment available
8. Web 2.0
Was used around 2004 (read and write web)
Technology became more and more interactive ( social
media exist)
Internet became more available to everyone
The user can now interact, contribute, and create their
own internet space and content
“Social media begin”
9. Web 3.0
Discovered by Tim- Berners- lee (father of the world wide
web)
Read- write- execute
Semantic web or data driven web content and response
10. Technology Convergence
Evolution of technological development that merge into a
new system bringing together different types of
applications and media.
Example:
Smart Phone- it can function as a telephone,
camera, radio, tv, and gaming console.
11. Social Media
It is a collection of internet-based
communications tools and computer-assisted
channels dedicated to allow users, interact,
communicate, and share virtually in the
community and networks.
13. Twitter
More than 300 million users in 2016
Allows users to microblog or broadcast short
messages are called tweets.
14. Instagram
Social networking app that enables the user to show
mobile photo and video either public or private (not user
friendly)
15. Snapchat
Design for mobile networking application, photo sharing,
chat, and messaging services.
Image and video showed in this app last only for a short
time and they are gone.
16. Assistive Media
Founded in 1996 in Ann Arbor, Michigan USA it is a not-
profit organization
First internet- based reading service for persons with
visual and reading impairments
17. Email Spam
Known as junk email, usually unsolicited commercial
email sent from one source with identical message to sent
to multiple recipients.
18. Email Spoofing
A deceitful email practice in which the sender address is
changed, so that it would appear to have come from
different sources usually someone you know.
It is usually used by spammers to hide the origin of the
spam.
19. Phishing
A deceitful practice of trying to get a confidential
information such as passwords and usernames, and credit
card details by making it appear as if it comes from a
trust worthy sources.
20. Pharming
A dangerous hacker attack on a website which directs all
traffic to that website to another facitious website.
It main objective is to obtain username and passwords, as
well as credit card and financial information and use
these to steal money electronically
21. Spyware
It is a computer program that is installed covertly on a
[personal computer to collect information or even take
control over the computer
22. Computer Worm
Is a dangerous computer program that replicates itself
through a network
some worms delete files, others disrupt the network
function.
23. Trojan Horse
A malicious software fronting to perform a good task, but
covertly performs undesirable function with intension of
entering the computer without the user’s content
24. Computer Virus
A program that duplicates itself and then infects the
computer
It spread like a real biological virus, where in it attaches
itself to a host program
Virus can also be transferred by the removable storage
25. Hacker
A person who is able to enter the control other people’s
computer without authorization
26. Protection from Threat
Security Center- place where you can set protection
Security Setting- to make our system protected
Fire Wall- unauthorized entries, viruses, worm from the internet/ network
Automatic Updates- ON
Virus Protection-on
-current anti virus
Anti Virus- locate, find and remove virus threats that are already in your
computer
31. Citation
An act of quoting; specially : the citing of a previously settled case at law
32. Contextual search
Is an attempt to be more precise in providing the list documents according to
the words used by the user to search the internet
A good contextual search engine would request for more information to
narrow down the result of the search
33. Steps to make Contextualized Online
Research
Identify or choose a topic
Topic or task definition
Identify methods of search
Identify resources of your research
Make your research strategies
Compiling the research results
Evaluate the results of your research
Create a list of you’re your references for citation
34. Critical Thinking
It is the ability to digest, reflect, and conclude from the information searched
35. Analytical Thinking
The ability to look, verbalize, conceptualize, and gather data and altuned to
the context of the subject
The ability to apply synthesis, focus and critical thinking to extract the useful
information
36. Problem Solving Capability
The ability to present solutions or solve problems by presenting a decision
based on the given information
People with this ability are able to define and identify the latitude of the
problem and present all possible solutions
37. Organize Data Mining
It is the ability to organize and catalogue all collected materials efficiently
despite data size
38. Research Presentation
It is the ability to present ideas and draw conclusions from the research
Be able to explain in writing the purpose, steps, goals and objective of the
research
39. Creativity and Develop Imagination
It is the ability to look for alternative solutions to the problems needed to
solve in the research
Thinking beyond the usual approaches to the research objective
40. Computer Literacy
Knowledge of the various computer applications and tools
Skills in the use of software to write, design, and present
44. Select Recipients
Chooses the list of people you intend to send the letter. You can type your
own list. Use your outlook contacts or connect to a database
45. Edit Recipient List
Makes changes to the list of recipients and decide which of them should
receive your letter
46. Write and Insert Group Commands
Insert Merge Field- adds field from your recipient list to the publication
Address Block- adds address to your letter
Greeting Line-adds a greeting line to your letter
Picture- adds a picture field from your recipient list to the publication
Insert Personalized- insert hyperlinked that are customized for each recipient
Format- changes the format for the field content
48. Creating a Recipient List
prepare your Publication
Create Merge Publication
49. 1.Creating a Recipient List
Click the mailings tab, go to the start group and click select recipient
On the list options, select type new list
On the new address list dialog box, click new entry and type the recipient
information
50. 2. Prepare your Publication
Check your publication in MS Word
Insert any additional text that you want to appear in every version of your
mail merge publication such as greeting
51. 3. Create Merge Publication
Print
A. Click merge to a printers
B. In the print space, select the option you want and click ok
Merge to New Publication
A. click merge to new publication
B. in the new publication, click save this publication in the mail merge task
pare.
C. type the name of your new publication and click save
52. MS Excel
Is use to compute costs incurred in the creation of project’s or create tables
for finding the researches, and then create reports for business or research
that you are doing
53. Parts of a Formula Excel Function
Functions Sum- calculate the sum of a range of
cells
References Average- calculate the arithmetic mean
of a range
Constants Max- gives the maximum value in a
range
Operators Min- gives the minimum value in
arrange
Count- counts the number of cells in a
range
If- shows a series of calculations using
the same
54. Sources of Photos and Graphics
1. Personal and Professional Photos- are photos taken by amateur or
professional photographers using a digital camera.
2. Scanned Images- are those that you transfer from printed photos and
graphics using scanning devices which you can transfer to your computer for
further improvement and modification.
3. Stock Photo Library- are several photographs and created images that are
available for sale.
4. Online Stock Photos- are found in the World Wide Web. The www is now
the dominant source of photos and graphics around the globe because of the
widely available choices and reasonable prices.
55. Online Digital File Formats for Images and
Text
1. Proprietory Formats- are owned and controlled by individuals or
corporations and the file specifications are not available to the public.
2. Open Formats- are means and ways for storing digital information that are
free, can be used by the public and are not encumbered by copyrights or
patents.
File Formats- uses suffixes that are added to the end of a filename.
56. Image File Format
Means of storing and organizing digital images, photos and illustration.
Two Types of Image File Formats
1. RASTER IMAGE FILES
2. VECTOR IMAGE FILES
57. Raster Image Files (Bitmap Images)
Means of representing digital images in BITS of information for storage which
translates into pixels.
Lossy
Pixels- is the smallest information of an image.
-represented by dots and square, come from the word PICTURE (PIX)
and ELEMENT (EL).
58. Types of Raster Image Format
.bmp- is an image file format developed and used on Microsoft and windows
environment and is stored in a graphics file format called Device Independent
Bitmap (DIB).
.gif- very popular in the www because of it’s portability and support for animation.
.jpg- common method for photographic images as well as transmission of photos on
the www.
.png- is a free open source bitmap image format made to improve an GIF which
has a small file but can handle more colors since it supports 2y bit per pixel color
screme and support true color.
.psd- native file format for Adobe Photoshop and it is very popular
59. Vector Image or Vector Graphics Files
Victor Images- are lossless files created using mathematical geometric
equations to represent images in digital computer graphics.
-has the advantage of retaining it’s quality at any desired image
size.
Vector Formats or Graphic- is the preferred format for those who desire
quality prints and display of images.
Examples: PDF, Encapsulated Postscript, Scalable Vector Graphics, Window
Metafile.
60. Types of Vector Image Formats
.ai - Adobe Illustrator- is the file extension for graphics created using adobe
illustrator which is created using paths and lines connected by points instead
of bitmaps, which may include objects, color, and text.
.drw- Drawing File- is a generic drawing created and stored in a vector format
that uses lines or path to represent image.
.dxf- Drawing Exchange Format- develop and introduced by auto desk the
maker of Auto CAD and is used for computer added design (CAD), Vector
Images.
.ps- PostScript file is a page description language (PDC) developed by adobe.
Can change in size without image quality reduction.
.svg- Scalable Vector Graphics file is the most common vector graphic format
on the internet. It was developed by the world wide web to display victor
graphics.
61. Basic Principles of Graphics and Layout
Layout- is the process of planning and arranging graphics or text in a page or
book. A good layout should have a balanced make up and alignment of
element.
Remember that simplicity is the key to a good layout
1. Symmetrical- a layout may be symmetrical where there are equal weight
and the elements on both sides of the page. The layout maybe left braced or
right braced.
2. Assymetrical- a layout maybe assymetrical where there is an artistic and
different intensity on one side of the page.
3. Text- the text should legible, appropriate font face, and arrange either left
justified, or centered. The flow of the text and picture should be easy to
read.
4. Image- the image should be proportionate, with sharp color and high
resolution. The images used should have caption.
62. Proximity and Harmony- the elements should be close
together and scattered and arranged apart from each
other. Elements should not be cluttered and not compete
with each other.
Consistency- there should be uniformity of theme on each
pages.
Color and Shape- use color to create interest by providing
variety in design like the use of color contrast and shapes.
Emphasis- there should be one point of interest in a page.
The element to be emphasized should have a different
size, color, shape, or background.
63. Principles and Basic Technique of
Image Manipulation
Ways to manipulate image resizing, cropping, adjusting
color background, balanced brightness and contrast,
combining photos, combining text, and photos and adding
effects.
64. Techniques of Image Manipulation
Background Color- you can change the background if it
does not match the image or the totality of presentation.
You can also add effects to the background
65. Multiple Image
You can combine multiple image to make a point or use to
highlight your message
68. Blending Color
You can use blending color to match the background with
the other elements in the page
69. Texture
Adding texture allows you to blend different images.
Texture add to the depth of given art.
70. Emphasis
There should be a focal point to a page that will attract viewers. The element
you want to emphasize should be sharp, big, and most vibrant in your design
71. Combining Text, Graphics and Image
Combining text, graphics and images in your presentation, infographics or
web page will make your message clearer
72. Transparent Shapes
Add simple shapes with a slight transparency behind your
text, to clearly see the text you want to emphasize
74. Text and Background
Text and background should be aligned to have an
organized work
75. Clean and Clear Background
Use clean and clear background for the message to be
readable
76. Basic Image Manipulation Using Offline
or Open Source Software
Photo editing and designing tools allow you to manipulate or edit
images
77. Picasa
Googles free photo manager to edit and organize your
photos
Crop, straighten, rotate, red-eye removable, contrast,
and filters
78. Paint. net
Window based alternative to the MS PowerPoint editor
Record, crop, text, rotate, multiple layers
79. Google Sketch Up
Free 3D modeling program with tools that allows you to
create 3D model of houses, home renovation wood
working, projects and others with dimensional accuracy.
80. Auto disk pixlr
Pixlr is a free photo editing tool that is similar to
photoshop and has more than 600 effects, and borders
that you can use.
82. GIMP
Image manipulation program is a free open source
image graphics editing program local for image
retouching and editing, free from drawing,
painting and other specialized tasks.
83. Creating a new Prezi account
Go to prezi.com
Click get started on the upper right corner
Sign up for a public account
Fill in the boxes with the specified information
After providing information, click create your free public account
84. The prezi canvas
zooming in and out
To zoom in, just scroll the mouse upwards, and to zoom
out, scroll the mouse downwards.
To zoom in the frames, just like a frame and select zoom
into frame in the frame tool bar.
To zoom out in the original overview, click the home
button moving around the canvas
85. Moving around the canvas
To move around the canvas, click and hold, and
drag the cursor to the direction you want to go
to.
86. Undo and redo
To undo, just click the undo button and to redo,
click the redo button.
87. Adding/ editing texts
To add text, just click anywhere in the canvas, and start
typing or click the sign click to add tittle and type.
88. Adding/ editing frames
To add a frame, select the type of frame you would like, and drag the
shape with a plus sign anywhere you want in the canvas
To edit the frame, click on the frame, add you can change the color
and type of thee frame or delete it in he frame toolbar.
You can move the frame around by clicking and holding the hand
button, and then drag it at any direction.
You can increase or decrease the size of the frame by sliding the
sizing handle outward or toward the center, or you can use the + and
– buttons.
To add an image, shape, video, and other files to the frame, click
insert.
89. Editing images
You can move the image around by clicking and holding the hand button
and moving it to any direction you want.
You can increase or decrease the size of the image by dragging the sizing
handle away or towards the center, or you can use the + and – button.
You can rotate the photo by pointing your mouse near any sizing handle
so you can click and holds a small circle beside it, and rotate it at any
direction.
You can enhance, add effects and frames to your photo by selecting
effects at the picture toolbar.
90. Editing the background
To add an image or change the background color, click
customize
You can either change the background color by clicking
color and choosing a new color, or adding a background
imaging by selecting choose file.
You can also change the lock of your present template
by choosing one of the themes in the theme tab
91. Adding/ editing animations
Enter edit path mode by clicking edit path on the bottom left. A star
symbol will appear on each side of a path point or to a frame
Click the star symbol to enter animation edit mode.
When you click or have on an object, you’ll see a green star with a
number, this represents the order which your content will fade in.
You can review the animation by clicking the play button on the top right
corner.
To change the order you can click the reset on the top left corner to
remove all the animation present in the frame.
Or you can also remove the animation individually by hovering over a
green star until you see a delete button
If you are satisfied with the order of your animation, click done.