This document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It explains the evolution from Web 1.0 to Web 2.0 to Web 3.0. Social media platforms like Facebook, Twitter, Instagram, and Snapchat are discussed. The document also covers possible internet dangers and protections, as well as research skills and contextual search methods. Mail merge and label generation in Microsoft Word are explained. Sources of photos and graphics are provided. Digital file formats for images and text are classified.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
The document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It provides information on social media platforms like Facebook, Twitter, Instagram, and Snapchat. It also discusses topics like assistive media, possible internet dangers and protections, online searching methods, and mail merge and label generation in Microsoft Word.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
The document discusses the history and evolution of the World Wide Web from Web 1.0 to Web 2.0. Web 1.0 featured a read-only web with few content creators and no user interaction. Web 2.0 arose around 2004 and enabled increased user contribution, interaction, and creation of user-generated content through technologies like social media and WiFi. Web 2.0 transformed the web into a more dynamic and community-oriented platform.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
The document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It provides information on social media platforms like Facebook, Twitter, Instagram, and Snapchat. It also discusses topics like assistive media, possible internet dangers and protections, online searching methods, and mail merge and label generation in Microsoft Word.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
The document discusses the history and evolution of the World Wide Web from Web 1.0 to Web 2.0. Web 1.0 featured a read-only web with few content creators and no user interaction. Web 2.0 arose around 2004 and enabled increased user contribution, interaction, and creation of user-generated content through technologies like social media and WiFi. Web 2.0 transformed the web into a more dynamic and community-oriented platform.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
The document provides an overview of various topics related to empowerment through technology including:
- ICT and the state of internet technology including web 1.0, 2.0, and 3.0.
- Technology convergence and how different applications merge.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Online threats like spam, spoofing, phishing, and how to protect computers.
- Steps for contextualized online research including defining topics, identifying resources and evaluating results.
- Using Microsoft Word and Excel for tasks like mail merge, formulas, and functions.
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
empowerment technology by: kier and joverynkiersamaco
This document provides an overview of empowerment technology and discusses various topics related to information and communication technology (ICT). It describes the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, social media platforms, dangers on the internet like spam and viruses, and ways to protect computers. Additionally, it covers research skills, mail merge functions in Microsoft Word, identifying credible online sources, and basics of slide presentation and graphic design.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
The document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 3.0. ICT is defined as any electronic device or application used for communication, and includes radio, television and computers. The World Wide Web started as mostly static, "read-only" Web 1.0 sites created by webmasters. Web 2.0 introduced more interactivity through user-generated content and social media. Web 3.0 aims to be more semantic and machine-readable. Examples of social media discussed include Facebook, Twitter, Instagram and Snapchat. The document also covers dangers online like spam, spoofing, phishing and computer viruses, as well as ways to protect computers using firewalls and antivirus
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
This document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, with examples like social media, and some of the dangers online like email spam, phishing, and computer viruses. It provides steps to conduct research and develop skills like critical thinking. Additionally, it outlines the mail merge and label generation process in Microsoft Word and how to create slide presentations in PowerPoint.
This document discusses empowerment through technology. It provides an overview of information and communication technologies (ICT) and how they have evolved from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence and how different applications have merged. While technology provides many benefits, it also poses some dangers like email spam, phishing, and computer viruses. The document provides tips on how to protect yourself online and conduct safe research.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
ICT plays an important role in many aspects of modern society through communication, education, commerce, health services, and more. The document discusses how ICT is used in these areas and others like science, sports, and media. It also covers the evolution of the internet from early Web 1.0 to current versions, common online systems and platforms, and potential online dangers. Guidelines for image and text manipulation and basic graphic design principles are provided.
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
This document provides an overview of information and communication technology (ICT), including current states of the web, social media platforms, and presentation tools. It discusses ICT as an umbrella term encompassing communication devices and applications. Web 1.0 allowed read-only access to static pages, while Web 2.0 enabled user interaction, participation, and sharing on dynamic pages. Web 3.0 aims to be a read-write-execute web guided by semantic analysis. The document also outlines dangers online like spam, spoofing, phishing, and malware, as well as security measures.
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUashleetimkang
This document provides information on various topics related to information and communication technology (ICT). It discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also covers technologies like smartphones, social media platforms, and assistive media. Additionally, it outlines cyber threats like email spam, phishing and pharming as well as defenses like firewalls and antivirus software. The document also discusses online research skills, digital file formats, image editing tools, and the basic principles of graphic design and layout.
The document provides instructions for troubleshooting various technology issues including wireless connectivity, mapped drives, creating folders, backing up documents and favorites, checking document properties, using Outlook, monitoring mailbox size, using webmail, troubleshooting interactive whiteboards, cropping pictures, and preventing viruses. It discusses verifying wireless switches are on, adding wireless connections, what mapped drives show, how to create and organize folders, how to back up files and favorites to external media, what document properties show, how to access and manage Outlook and webmail, common interactive board issues and solutions, how to locate and use the crop tool in Picture Manager, and top ways to prevent viruses like keeping definitions updated and not downloading risky files.
Advanced Search: A Journalism Tools SessionEzra Eeman
Ezra Eeman presents an overview of advanced search tools and techniques for journalists. The document provides 30+ specific search tools organized into categories like alerts, images, video, translations, location, and social. It also shares tips for refining searches on Google, Google Images, YouTube, and Twitter. Links and brief descriptions are provided for each recommended tool to help journalists find relevant information from diverse sources.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
The document provides an overview of various topics related to empowerment through technology including:
- ICT and the state of internet technology including web 1.0, 2.0, and 3.0.
- Technology convergence and how different applications merge.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Online threats like spam, spoofing, phishing, and how to protect computers.
- Steps for contextualized online research including defining topics, identifying resources and evaluating results.
- Using Microsoft Word and Excel for tasks like mail merge, formulas, and functions.
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
empowerment technology by: kier and joverynkiersamaco
This document provides an overview of empowerment technology and discusses various topics related to information and communication technology (ICT). It describes the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, social media platforms, dangers on the internet like spam and viruses, and ways to protect computers. Additionally, it covers research skills, mail merge functions in Microsoft Word, identifying credible online sources, and basics of slide presentation and graphic design.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
The document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 3.0. ICT is defined as any electronic device or application used for communication, and includes radio, television and computers. The World Wide Web started as mostly static, "read-only" Web 1.0 sites created by webmasters. Web 2.0 introduced more interactivity through user-generated content and social media. Web 3.0 aims to be more semantic and machine-readable. Examples of social media discussed include Facebook, Twitter, Instagram and Snapchat. The document also covers dangers online like spam, spoofing, phishing and computer viruses, as well as ways to protect computers using firewalls and antivirus
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
This document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, with examples like social media, and some of the dangers online like email spam, phishing, and computer viruses. It provides steps to conduct research and develop skills like critical thinking. Additionally, it outlines the mail merge and label generation process in Microsoft Word and how to create slide presentations in PowerPoint.
This document discusses empowerment through technology. It provides an overview of information and communication technologies (ICT) and how they have evolved from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence and how different applications have merged. While technology provides many benefits, it also poses some dangers like email spam, phishing, and computer viruses. The document provides tips on how to protect yourself online and conduct safe research.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
ICT plays an important role in many aspects of modern society through communication, education, commerce, health services, and more. The document discusses how ICT is used in these areas and others like science, sports, and media. It also covers the evolution of the internet from early Web 1.0 to current versions, common online systems and platforms, and potential online dangers. Guidelines for image and text manipulation and basic graphic design principles are provided.
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
This document provides an overview of information and communication technology (ICT), including current states of the web, social media platforms, and presentation tools. It discusses ICT as an umbrella term encompassing communication devices and applications. Web 1.0 allowed read-only access to static pages, while Web 2.0 enabled user interaction, participation, and sharing on dynamic pages. Web 3.0 aims to be a read-write-execute web guided by semantic analysis. The document also outlines dangers online like spam, spoofing, phishing, and malware, as well as security measures.
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUashleetimkang
This document provides information on various topics related to information and communication technology (ICT). It discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also covers technologies like smartphones, social media platforms, and assistive media. Additionally, it outlines cyber threats like email spam, phishing and pharming as well as defenses like firewalls and antivirus software. The document also discusses online research skills, digital file formats, image editing tools, and the basic principles of graphic design and layout.
The document provides instructions for troubleshooting various technology issues including wireless connectivity, mapped drives, creating folders, backing up documents and favorites, checking document properties, using Outlook, monitoring mailbox size, using webmail, troubleshooting interactive whiteboards, cropping pictures, and preventing viruses. It discusses verifying wireless switches are on, adding wireless connections, what mapped drives show, how to create and organize folders, how to back up files and favorites to external media, what document properties show, how to access and manage Outlook and webmail, common interactive board issues and solutions, how to locate and use the crop tool in Picture Manager, and top ways to prevent viruses like keeping definitions updated and not downloading risky files.
Advanced Search: A Journalism Tools SessionEzra Eeman
Ezra Eeman presents an overview of advanced search tools and techniques for journalists. The document provides 30+ specific search tools organized into categories like alerts, images, video, translations, location, and social. It also shares tips for refining searches on Google, Google Images, YouTube, and Twitter. Links and brief descriptions are provided for each recommended tool to help journalists find relevant information from diverse sources.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
This document discusses information and communication technology (ICT) and how it can be used across different fields like education, commerce, health services, and more. It explains the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and the emerging data-driven Web 3.0. The document also discusses technology convergence using smartphones as an example. It covers social media platforms and online dangers like spam, spoofing, and hacking. Finally, it provides guidance on contextualized online research and detecting satirical news sources.
empowerment technologies by: aiza martin and patricia obormartinaiza
ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
This document discusses various technologies including information and communication technology, the evolution of the world wide web from Web 1.0 to Web 3.0, technology convergence in smartphones, and examples of social media like Facebook, Twitter, Instagram and Snapchat. It also covers dangers on computers like email spam, phishing and pharming as well as methods of protection like using firewalls and antivirus software. Formats for digital images and text are described including raster, vector, JPEG, PNG and others.
This document discusses empowerment through technology and information communication technology (ICT). It provides an introduction to ICT and how it is used in different fields like commerce, engineering, education, health, and more. It discusses the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence through examples like smartphones. Other topics covered include social media platforms like Facebook, Twitter, and Instagram, assistive media, online safety, and security tools.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
ICT plays an important role in modern society for communication, education, commerce, health services, science, and more. It has transformed how people interact through developments like the internet. Key aspects of ICT discussed include social media, online safety, conducting research, and using tools like mail merge for communication. Formats for digital images and text include proprietary, open, and file formats indicated by extensions.
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...joanagolo4ever
The document discusses various topics related to information and communication technology (ICT). It defines ICT as the umbrella term for any communication devices or applications, including radio and computers. It then discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, noting increased interactivity and availability over time. Other topics covered include social media, online dangers/protections, research skills, and tools for image editing like GIMP.
This document discusses the role of information and communication technology (ICT) in various aspects of modern life and society. It covers how ICT is used for communication, education, commerce, health services, science, and media. It also describes the evolution of the internet from Web 1.0 to 3.0 and common online systems and platforms. Some potential online dangers like viruses, spam, and hacking are outlined. The use of social media and popular sites like Facebook, Twitter, and Instagram is also discussed.
This document discusses empowerment through information and communication technologies (ICT) and provides information on current states of the internet. It describes the evolution from static Web 1.0 to more interactive Web 2.0 and the emerging semantic Web 3.0. The document also discusses technology convergence through examples like smartphones, discusses popular social media platforms, and outlines some dangers of computers like email spam, phishing, and computer viruses. It provides guidance on research skills and contextualizing online searches as well as how to use mail merge functions in Microsoft Word.
This document discusses the role of information and communication technology (ICT) in various aspects of modern life and society. It covers how ICT is used in education, telecommunication, commerce, sports, arts, media, health services, science, and other fields. It also describes the evolution of the internet from Web 1.0 to 3.0 and common online systems, functions, and platforms. Potential online dangers like viruses and hacking are mentioned. Guidelines for image manipulation, graphics layout, and combining text/images are provided. Finally, some basic offline image editing software options are listed.
ICT plays an important role in many aspects of modern society, including communication, education, commerce, health services, science, and media. Some key points about ICT's role include:
- Computers are widely used for communication via mobile phones, email, and social media. They are also used for education, online shopping, sports and recreation, arts, design, and more.
- Advances from Web 1.0 to Web 2.0 to Web 3.0 have made the internet more interactive. Popular online platforms today include social media sites like Facebook and Twitter, as well as search engines, communication apps, and creative content outlets.
- ICT brings risks like computer viruses, phishing scams,
This document summarizes a webinar on newsgathering and monitoring platforms for COVID-19 reporting. It outlines fundamentals of online newsgathering including searching for keywords and sources on platforms like Twitter, LinkedIn, and Crowdtangle. It also discusses tools for monitoring digital platforms like TweetDeck, Crowdtangle, Google Alerts, Picuki, Livedisplay, TrackReddit, and Snapchat maps to track discussions and find experts on the pandemic.
Similar to Empowerment technology by mhedilyn and judith (16)
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
2. INFORMATION,
COMMUNICATION,
TECHNOLOGY (ICT)
• It is the umbrella that includes any
communication device or application,
encompassing: radio, television, computer and
etc
• It is the main method of communication, getting
information and education, attaining services and
expressing advocacies and awareness.
3. WHAT IS THE CURRENT
STATE OF ICT?
There are stages of internet technology. The first
one is the web 1.0 then web 2.0 and web 3.o.
4. STATE OF WEB 1.0
• There Is no user interaction
• Web pages were static
• No direct comment available
• Called read only web
5. STATE OF WEB 2.0
• The internet became more available to everyone
• The term web 2.0 was used around 2004
• The user can now interact, contribute, and create their own
internet space and content.
Webmaster web dynamics
users contributors community
6. STATE OF WEB 3.0
• Discovered by tim berners lee (father of world
wide web).
• It will not make the web 2.0 obsolete
• It is referred to as the semantic web or data web
content and response
7. SOCIAL MEDIA
• It is a collection of internet – base
communication tools and computer – assisted
channels dedicated to allow users to interact,
communicate and share information in a virtual
community and network.
8. FACEBOOK
• Is a popular free social networking site with more
than a billion users.
9. TWITTER
• Allows user to micro blog or broadcast short
messages called twits
• With more than 300 million users in 2016.
10. INSTAGRAM
• A social networking app that enables the user to
share mobile photo either publicly or privately.
11. SNAPSHOT
• Design for mobile networking application.
• Image and videos share in this app last only for a
short time and they`re gone.
12. ASSISTIVE MEDIA
• It is a non profit organization founded and in
1996 in arbor, Michigan usa.
• It was the first internet – base reading services
for person with visual and hearing impairing.
13. POSSIBLE DANGER IN INTERNET
• email spam – is the term use to refer to a person who create electronic spam.
• Email spoofing – it is usually used by spammers to hide the origin of the spam.
• Phishing – practice of trying to get confidential information.
• pharming – a dangerous hacker attack on a website.
• Spyware – a program installed covertly on a personal computer to collect information
and take control.
• Computer worm – it is a dangerous computer program that it replicates itself
through a network.
• Trojan horse – it can erase data and can allow access of victims computer also can
corrupt files.
• Computer virus – a program that duplicates itself and then infects the computer.
• Hacker – a person who is able to enter the control others people computer without
authorization.
14. PROTECTION IN DANGER
NETWORKS
• Security center – is a place where you can set
additional protection from threat to your computer.
• Firewall – helps protecting your computer from
unauthorized entries, viruses or worms from the
internet or network.
• Automatic updates – it upgrades all the security that
can help advance recognizing a threats.
• Virus protection – it also prevents other malware from
gaining entry into your computer
15. RESEARCH
• Contextual search – its an attempt to be more
precise in providing the list documents according
to the words used by the user to search the
internet
• a good contextual search engine would request
for information to narrow down the result of the
search
16. CONTEXTUALIZE METHOD
• Contextualize – is to place (something, such as
word or ability in a context )
• Research – collecting of information a particular
topic.
• Strategy – a careful plan or method.
• Compilation – the act of process or compiling.
• Citation – the act of quoting.
17. SEARCHING METHOD
• Identify or choose a topic
• Topic or task definition
• Identify methods of search
• Identify resources of your research
• Make your research strategies
• Compiling the research result
• Evaluate the result of your research
• Create a list of your references for citation
18. STEPS TO MAKE
CONTEXTUALIZED ONLINE
SEARCH
• Identify method of search
• Experiments
• Explore
• Survey
• Identify resources of your research
• Wikipedia
• Google
• Make your research strategies
• Compiling the research result
19. RESEARCH SKILLS
• Practice makes it perfect – the more you do it the better you will be in
doing research.
• Critical thinking – it is the ability to digest, reflect and conclude from
the information searched.
• Analytical thinking – the ability to look verbalize, conceptualize and
gather data attained.
• Problem solving capability – the ability to present solutions or solve
problems by presenting decision based on the given information.
• Research presentation – it is ability to present ideas and draw
conclusion.
• Creativity and developed imagination – it is the ability to look for
alternative solutions to the problems
• Computer literacy - knowledge of the various computer application
and tools.
20. STEPS OF CONTEXTUALIZE
CONCEPT
1. Open the Google site.
2. On the upper right side of the window, click the google
apps, icon and click search engine.
3. On the lower right part of the window, click setting and
google search setting pop-up list will appear.
4. Click advance search and the advance search window will
appear.
5. Type the keywords that you, would like to search and
click the advanced search button.
21. IDENTIFYING GOOD SOURCE
FROM SATIRICAL SOURCE
Satirical sites are websites that report false stories
meant to amuse or entertain
These sites take their cue from tv shows that report
exaggerated news that are untrue but intriguing and
funny
These sites started as spoofs of real public figures
such as political leaders of motive personalities.
Untrue stories should not be shared with your friends
family and contacts.
22. HOW TO DETECT SATIRICAL
NEWS
1. If it is too good to be true, then it must be so.
2. If the news did not emanate from reliable news
site.
3. If they are from know satirical sites.
23. LIST OF TOP SOURCES OF
SATIRICAL NEWS
1. Adobo chronicles (adobochronicles.com)
2. So, what’s news (sowhatsnews.wordpress.com)
3. Erita’s time (eritastimes.com)
4. The professional heckler
(professionalheckler.com)
24. AMERICAN SATIRICAL SITE SITES
IN U.S
• The onion (theonion.com)
• Click hole (clickhole.com)
• Christ wine global media (christwine.org)
25. MAIL MERGE AND LABEL
GENERATION
• it is used automatically add mailing addresses or
personalized information to your publication.
26. MAILING START GROUP
COMMANDS
1. Mail merge
2. Email merge
3. Select recipients
4. Edit recipients
5. Insert merge field
6. Address block
7. Greeting line
8. Pictures
9. Insert personalized
10.Format
11.hyperlink
27. Name Function
Email merge – merges data into a publication which will be
printed and mailed
shows step by step mail merge.
Email merge – Merge data into a publication that will be
sent as email.
select recipients – chooses the list of the people you
intend to send the
letters to you can type your own
list.
Edit – recipients list – make changes to the list of
recipients.
Insert merge field – adds a field your recipient list.
Address block – adds an address to your letter.
Greeting line – adds a greeting line to your letter.
Picture – adds a picture field from your recipient list to the
publication.
28. PARTS OF MAIL MERGE
1. Recipients list
2. Publication with merge fields
3. Merge publication
29. STEP 1 CREATING A RECIPIENT
LIST
1. Click the mailing tab, go to the start group and
click select recipient.
2. On the list of option, select type new list.
3. On the new address list dialog box, click new
entry and type the recipient information.
4. Click ok.
30. STEP 2 : PREPARE YOUR
PUBLICATION
• Create your publication in ms. Word
• Insert any additional text that you want to apper
in every version.
31. STEP 3
1. Print
A. CLICK MERGE TO A PRINTER
B. IN THE PRINT SPACE, SELECT THE OPTIONS YOU WANT AND CLICK OK.
2. MERGE NEW PUBLICATION
A. CLICK MERGE TO NEW PUBLICATION
B. IN THE NEW PUBLICATION, CLICK SAVE THIS PUBLICATION.
C. TYPE THE NAME OF YOUR NEW PUBLICATION AND CLICK SAVE .
3. ADD TO EXISTING PUBLICATION
A. CLICK ADD TO EXISTING PUBLICATION
B. ON THE OPEN PUBLICATION DIALOG BOX
32. GENERATING LABELS
• Labels are used for envelopes that you intend to
send out to persons usually containing the none
address or telephone.
33. STEPS IN GENERATING LABELS
1. Start a new document in the ms word
2. Go to the mailings tab, in the create group.
3. In the address box, type the text you want to be
placed on the label.
4. Click the insert address icon if you have an address
stored in the electronic address book
5. To change the font or paragraph formatting, select
the text right click and select the option from the
down menu.
34. 6. Click options button and the label options
dialog box will appear
7. Select the setting like the type of printer, the
supplies that produced your label sheets and
others
8. After you make setting, click ok.
9. Under print, select full page of the same label of
single label. Then in the row and column boxes,
enter the numbers that match the number of row
and column on the label sheet
10. Click print
35. MS. POWERPOINT
• It is an application intended in creating a slide
presentation
36. HOW TO CREATE SLIDE
PRESENTATION
1. Open ms. Powerpoint application
2. Click new and select your preferred design
template
3. Click insert tab menu and insert text word art
or any object in the slide
4. Click home tab to insert new slide in our
presentation.
37. SOURCES OF PHOTOS AND
GRAPHICS
• There are many sources of photos and graphics.
They can some direct from your camera, old
pictures , free from internet or purchased from
the internet or stores.
38. PERSONAL AND PROFESSIONAL
PHOTOS
• Are photos taken y amateur or professional
photographer using a digital camera. Theses
images are downloaded and are stored in the
computer. They are sources of images for any
project that you may embark. They re original
and definitely something one would like to work
on.
39. SCANNED IMAGES
• Are those that you transfer from printed photos
and graphics using scanning devices which you
can transfer to your computer for further
improvement and modification. These are mostly
old pictures photographed before the digital age.
40. STOCK PHOTO LIBRARY
• Are several photographs and created images that
are available for sale . They come in cd or dvd
format and many of these images are royalty
free, which means that they can be used without
additional fees.
41. ONLINE STOCK PHOTOS
• Are found in the world wide web. The www is now the
dominant source of photos and graphics around the
globe because of the widely available choices and
reasonable prices, other sites even offer copy right
free photos and other media. One advantage of this
set up is that you do not have to go to place where
most of these photos were taken. Another is that
before you purchase or get a picture , you can view it
and if you decide to buy, simply download it to your
computer.
42. ONLINE DIGITAL FILE FORMAT
FOR IMAGES AND TEXT
• A computer will have a certain method of
encoding information for storage in the hard
drive or any form of computer storage . The ways
of encoding and storing this information to
storage is called file – format, digital file formats
are categorized as either proprietary or open.
43. PROPRIETARY FORMATS
• Are owned and controlled by individuals or
corporations and the file format specifications
are not available to the public. They are usually
covered by copyright and the owner has
exclusive control of the presend and future
technology development of this format an
example of a proprietary format is the one used
in the storage for microsoft word, excel, and
powerpoint.
44. OPEN FORMATS
• Are means and ways for storing digital
information that are free, can be used by the
public and are not encumbered by copyright or
potents.
45. FILE FORMAT
• Are uses suffixes that are added to the end of
the filename called filename extension. The file
extension is a means of identifying the format of
the file, with the period before it after the
filename.
46. DIGITAL FILE FORMAT ARE
CLASSIFIED INTO THREE MAJOR
GROUPS
1. Uncompressed or raw format – is usually used
for storing original file format, it is a flexible
form but needs bigger memory to store.
2. Lossless file format – is a file format that was
compressed to replicate the original quality but
at a reduced file size. This type is ideal for
storing important file ( images, audio, or
video).
47. IMAGED FILE FORMAT ( RASTER
IMAGE FORMAT)
• Are standardized means of organizing and
storing digital images
two types of image file format
1. Raster image format
2. Vector image format
48. RASTER IMAGE FORMAT
• Images faithfully display the color information
and image making them a great choice to display
detailed images
• Widely supported to web browsers, which is
makes them easy to share.
49. TYPES OF RASTER IMAGES
• Jpeg/jpg ( joint photographics expert group) – is an
extremely common format and is typically used sharing
photographs
• Gif ( graphics interface format) - one of the most
commoon images format on the web
• Png ( portable network graphics – supported by current
browser
• Bmp ( bitmap) – is one of the simplest file formats in raster
graphics
• Tiff ( tagged image file format ) – recommended for
vectorization.
50. VECTOR IMAGES AND VECTOR
GRAPHICS
• Vector images – are lossless files created using
mathematical geometric equations to represent
images in digital computer graphics.
• Vector graphics – has the advantage or retaining its
quality at any desired imaged, size unlike raster
images that appear proxilated when displayed in
expanded images
size………………………………………………………………
….
51. EXAMPLES OF THESE TYPE
FORMATS ARE :
• Pdf
• Encapsulated postscript
• Scalable vector graphics
• Windows metafile
53. ADOBE ILLUSTRATOR
• Created using paths and lines by point instead of bit
maps which may include objects, color and texts.
• Drawing file – a generic drawing created and stored in
a vector formats that uses lines or path to represent
iamge.
• Drawing exchange format – a developed and
introduced by auto desk the maker of autocad similar
to drawing file both is universal so that autocad can
be opened using other program.
54. POSTSCRIPT
• a page description language developed by adobe
that describe the appearance of a printed page it
become an industry standard for printing and
imaging.
• Scalable vector graphics – most common vector
format on the internet, developed by the ( www. )
to display vector graphics open format can be
opened by adobe, corel and open graphic
program
55. BASIC PRINCIPLE OF GRAPHICS &
LAYOUT
• Layout – is the process of planning and arranging graphics
or text in a page or book.
• Symmetrical – a layout may be symmetrical where there are
equal weight of elements on both sides of the page.
• Assymmetrical – a layout maybe assymmetrical where there
is an artistic and different intensity on one side of the
page.
• Text – a text type should be legible, appropriate font face,
and arranged either left justified, or centered the flow of
the text and pictures should be easy to read.
56. • Image – should be proportionate, w/ sharp color and
high resolution.
• Proximity and harmony – the elements should be
closed together and most
• Consistency – there should be uniformity on the
theme on each page.
• Color and shape - use color to create interest by
providing variety in design like the use of color
contrast and shape.
• Emphasis – there should be one point of interest in a
page. The element to be emphasized should have a
different size , color, shape, or background.
57. PRINCIPLES AND BASIC TECHNIQUES OF IMAGE
MANIPULATION
• You can change the background of it does not
math the image or totally the presentation. You
can also add efforts to the background.
58. TECHNIQUES OF IMAGE MANIPULATION
• BACKGROUND COLOR - You can change the background if it does not
match the image or the totality of the presentation. You can also add
effects to the background
• SHADOW - Using shadow effect will make the image realistic.
• Proportion - When combining images, resize the image to make it
proportionate and realistic.
• Blending color - You can use color blending to match the background
with the other elements in the page.
• Texture - Adding texture allows you to blend different images.
Textures add to the depth of your art. Blending will allow smooth
trasition of one image to another.
• Emphasis - There should be a focal point to a page that will attract
viewers. The element you want to emphasize should be sharp,big,
and most vibrant in your design.
59. COMBINING TEXT, GRAPHICS
AND IMAGES
• Combining text , graphics, and images in your presentation, info
graphics or web page will make your message clear.
• Transparent shapes – add simple shapes with slight transparency
behind your text to clearly see the text you want to emphasize.
• Fonts and shapes – fonts and shapes should complement with each
other. You can use rounded shapes with rounded fonts and sharp
shapes with sharp fonts.
• Text and background - should be aligned to have an organized look.
• Clean and clear background – use a clean and clear background for
message to be readable .
60. BASIC MANIPULATION USING
OFFLINE OR OPEN SOURCE
SOFTWARE
• Photo editing and designing tools allow you to make
manipulate or edit images , apply , effects, filters and frames ,
crop add text, changed background color make photo collage
and photo album that you would like to do in an image
• Picasa – it is a google`s free photo manager to edit and
orginizing your photo.
• Pain.net – it is a window base alternative to ms point editor .
• Google sketch up – it is a free .3d modeling program with
tools that allow you to create 3d models of houses, home
renovation, woodworking projects and others with
dimensional accuracy.
61. AUTODESK PIXL – FREE PHOTO EDITING TOOL THAT IS
SIMILAR TO PHOTOSHOP AND HAS MORE THAN 600
EFFECTS
ADOBE PHOTOSHOP – IS A TOOL TO CREATE MODIFY,
COMBINE AND OPTIMIZE, DIGITAL PHOTOS AND IMAGES.
GIMP OR GNU ( IMAGE MANIPULATION PROGRAM ) – IT IS
A FREE OPEN SOURCE IMAGE GRAPHIC EDITING PROGRAM
USED FOR IMAGE RETOUCHING AND EDITING, FREE –
FORM DRAWING / PAINTING AND OTHER SPECIALIZED
TASKS.
62. INSTALLING GIMP
1. go to www.gimp.org
2. Then click download
3. Select download gimp directly
4. Run the gimp installer
5. Click install
6. Wait for it to finish the installation, then click
finish.
63. DIFFERENT TYPES OF SLIDE
PRESENTATION
• Zoho show
• Link in share.net
• Google slide
• Slide rocket
• Ms powerpoint
• prezi