The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
This document discusses empowerment through information and communication technologies (ICT) and provides information on current states of the internet. It describes the evolution from static Web 1.0 to more interactive Web 2.0 and the emerging semantic Web 3.0. The document also discusses technology convergence through examples like smartphones, discusses popular social media platforms, and outlines some dangers of computers like email spam, phishing, and computer viruses. It provides guidance on research skills and contextualizing online searches as well as how to use mail merge functions in Microsoft Word.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
This document discusses empowerment through information and communication technologies (ICT) and provides information on current states of the internet. It describes the evolution from static Web 1.0 to more interactive Web 2.0 and the emerging semantic Web 3.0. The document also discusses technology convergence through examples like smartphones, discusses popular social media platforms, and outlines some dangers of computers like email spam, phishing, and computer viruses. It provides guidance on research skills and contextualizing online searches as well as how to use mail merge functions in Microsoft Word.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
This document discusses empowerment through technology. It provides an overview of information and communication technologies (ICT) and how they have evolved from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence and how different applications have merged. While technology provides many benefits, it also poses some dangers like email spam, phishing, and computer viruses. The document provides tips on how to protect yourself online and conduct safe research.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
The document discusses the evolution of the World Wide Web from Web 1.0 to Web 3.0. Web 1.0 allowed only basic static pages with no user interaction. Web 2.0 enabled user-generated content and interaction. Web 3.0 aims to be data-driven with semantic content. Technology convergence brings together different applications and media through social media platforms like Facebook, Twitter, and Instagram. The document also outlines steps for online research and creating presentations with PowerPoint, and discusses digital file formats and image manipulation techniques.
The document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It provides information on social media platforms like Facebook, Twitter, Instagram, and Snapchat. It also discusses topics like assistive media, possible internet dangers and protections, online searching methods, and mail merge and label generation in Microsoft Word.
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
This document appears to be an electronic quiz about trends in information and communication technology (ICT) and different types of social media and online platforms. It consists of 10 multiple choice questions testing knowledge on topics like social media, bookmarking sites, microblogging, media sharing, and malware. The questions cover key concepts in digital technology and how people interact online through sites that allow sharing of content, links, updates and connecting with others.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
The document discusses various topics related to empowerment technologies including:
- The popularity and usage of social media, smartphones, and the internet among groups.
- An overview of the internet including its origins, how it functions as an information network, and common internet applications.
- Descriptions of the World Wide Web and how it has grown to allow access to vast amounts of online information.
- Explanations of Web 2.0 technologies which enable greater user participation and collaboration online.
- A brief definition of the concept of Web 3.0 and its focus on more intelligent and intuitive online experiences.
- Mentions of convergent technologies and Assistive Media, a nonprofit that provides
This document provides an overview of internet search strategies, including the history and definition of key concepts like the internet, web browsers, search engines, directories, blogs, multimedia tools, and more. It also briefly discusses issues around internet politics such as viruses, freedom of speech, pornography, and copyright.
Information and Communication Technology (ICT) - Empowerment TechnologiesMark Jhon Oxillo
This document provides information about information and communication technology (ICT). It defines ICT as dealing with using different communication technologies like mobile phones, internet, etc. to locate, save, send and edit information. It discusses how ICT has affected the Philippines economically and socially through the growth of industries like BPO and increased internet and social media usage. It also outlines the evolution of the world wide web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user participation and interaction. Problems with the proposed Web 3.0 that aims to have machines understand user preferences are also discussed.
1. The document discusses information and communication technologies (ICT), including the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0.
2. Key features of Web 2.0 are discussed, such as folksonomy, rich user experience, user participation, and mass participation.
3. Current trends in ICT are also summarized, including convergence, social media, mobile technologies, and assistive learning tools.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
Here are some tips for using Google search more effectively:
- Type "discography [artist name]" to see a list of all albums an artist has released. For example, "discography The Beatles".
Get Weather Forecasts Fast
- Type "weather [city name]" or "weather [zip code]" to get a quick forecast without clicking through search results.
Convert Units on the Fly
- Type a number followed by a unit to convert it, like "32 Celsius to Fahrenheit" or "5 miles to km".
Get Stock Quotes
- Type "stock [ticker symbol]" to see the current price of a stock without leaving the search results page.
Look Up
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
The document provides an overview of various topics related to empowerment through technology including:
- ICT and the state of internet technology including web 1.0, 2.0, and 3.0.
- Technology convergence and how different applications merge.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Online threats like spam, spoofing, phishing, and how to protect computers.
- Steps for contextualized online research including defining topics, identifying resources and evaluating results.
- Using Microsoft Word and Excel for tasks like mail merge, formulas, and functions.
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
This document discusses various technologies including information and communication technology, the evolution of the world wide web from Web 1.0 to Web 3.0, technology convergence in smartphones, and examples of social media like Facebook, Twitter, Instagram and Snapchat. It also covers dangers on computers like email spam, phishing and pharming as well as methods of protection like using firewalls and antivirus software. Formats for digital images and text are described including raster, vector, JPEG, PNG and others.
Online platforms can be used to create and develop ICT content. Some examples of online platforms include presentation tools like Prezi, cloud computing services like Google Drive, social media sites like Facebook and Twitter, webpage builders like Wix and Weebly, and file management tools like Dropbox. Online platforms provide bases to develop other applications and technologies and help users communicate information clearly.
Empowerment technology by mhedilyn and judithmhedilyn8556
This document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It explains the evolution from Web 1.0 to Web 2.0 to Web 3.0. Social media platforms like Facebook, Twitter, Instagram, and Snapchat are discussed. The document also covers possible internet dangers and protections, as well as research skills and contextual search methods. Mail merge and label generation in Microsoft Word are explained. Sources of photos and graphics are provided. Digital file formats for images and text are classified.
empowerment technologies by: aiza martin and patricia obormartinaiza
ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
This document discusses empowerment through technology. It provides an overview of information and communication technologies (ICT) and how they have evolved from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence and how different applications have merged. While technology provides many benefits, it also poses some dangers like email spam, phishing, and computer viruses. The document provides tips on how to protect yourself online and conduct safe research.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
The document discusses the evolution of the World Wide Web from Web 1.0 to Web 3.0. Web 1.0 allowed only basic static pages with no user interaction. Web 2.0 enabled user-generated content and interaction. Web 3.0 aims to be data-driven with semantic content. Technology convergence brings together different applications and media through social media platforms like Facebook, Twitter, and Instagram. The document also outlines steps for online research and creating presentations with PowerPoint, and discusses digital file formats and image manipulation techniques.
The document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It provides information on social media platforms like Facebook, Twitter, Instagram, and Snapchat. It also discusses topics like assistive media, possible internet dangers and protections, online searching methods, and mail merge and label generation in Microsoft Word.
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
This document appears to be an electronic quiz about trends in information and communication technology (ICT) and different types of social media and online platforms. It consists of 10 multiple choice questions testing knowledge on topics like social media, bookmarking sites, microblogging, media sharing, and malware. The questions cover key concepts in digital technology and how people interact online through sites that allow sharing of content, links, updates and connecting with others.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
The document discusses various topics related to empowerment technologies including:
- The popularity and usage of social media, smartphones, and the internet among groups.
- An overview of the internet including its origins, how it functions as an information network, and common internet applications.
- Descriptions of the World Wide Web and how it has grown to allow access to vast amounts of online information.
- Explanations of Web 2.0 technologies which enable greater user participation and collaboration online.
- A brief definition of the concept of Web 3.0 and its focus on more intelligent and intuitive online experiences.
- Mentions of convergent technologies and Assistive Media, a nonprofit that provides
This document provides an overview of internet search strategies, including the history and definition of key concepts like the internet, web browsers, search engines, directories, blogs, multimedia tools, and more. It also briefly discusses issues around internet politics such as viruses, freedom of speech, pornography, and copyright.
Information and Communication Technology (ICT) - Empowerment TechnologiesMark Jhon Oxillo
This document provides information about information and communication technology (ICT). It defines ICT as dealing with using different communication technologies like mobile phones, internet, etc. to locate, save, send and edit information. It discusses how ICT has affected the Philippines economically and socially through the growth of industries like BPO and increased internet and social media usage. It also outlines the evolution of the world wide web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user participation and interaction. Problems with the proposed Web 3.0 that aims to have machines understand user preferences are also discussed.
1. The document discusses information and communication technologies (ICT), including the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0.
2. Key features of Web 2.0 are discussed, such as folksonomy, rich user experience, user participation, and mass participation.
3. Current trends in ICT are also summarized, including convergence, social media, mobile technologies, and assistive learning tools.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
Here are some tips for using Google search more effectively:
- Type "discography [artist name]" to see a list of all albums an artist has released. For example, "discography The Beatles".
Get Weather Forecasts Fast
- Type "weather [city name]" or "weather [zip code]" to get a quick forecast without clicking through search results.
Convert Units on the Fly
- Type a number followed by a unit to convert it, like "32 Celsius to Fahrenheit" or "5 miles to km".
Get Stock Quotes
- Type "stock [ticker symbol]" to see the current price of a stock without leaving the search results page.
Look Up
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
The document provides an overview of various topics related to empowerment through technology including:
- ICT and the state of internet technology including web 1.0, 2.0, and 3.0.
- Technology convergence and how different applications merge.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Online threats like spam, spoofing, phishing, and how to protect computers.
- Steps for contextualized online research including defining topics, identifying resources and evaluating results.
- Using Microsoft Word and Excel for tasks like mail merge, formulas, and functions.
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
This document discusses various technologies including information and communication technology, the evolution of the world wide web from Web 1.0 to Web 3.0, technology convergence in smartphones, and examples of social media like Facebook, Twitter, Instagram and Snapchat. It also covers dangers on computers like email spam, phishing and pharming as well as methods of protection like using firewalls and antivirus software. Formats for digital images and text are described including raster, vector, JPEG, PNG and others.
Online platforms can be used to create and develop ICT content. Some examples of online platforms include presentation tools like Prezi, cloud computing services like Google Drive, social media sites like Facebook and Twitter, webpage builders like Wix and Weebly, and file management tools like Dropbox. Online platforms provide bases to develop other applications and technologies and help users communicate information clearly.
Empowerment technology by mhedilyn and judithmhedilyn8556
This document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It explains the evolution from Web 1.0 to Web 2.0 to Web 3.0. Social media platforms like Facebook, Twitter, Instagram, and Snapchat are discussed. The document also covers possible internet dangers and protections, as well as research skills and contextual search methods. Mail merge and label generation in Microsoft Word are explained. Sources of photos and graphics are provided. Digital file formats for images and text are classified.
empowerment technologies by: aiza martin and patricia obormartinaiza
ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
This document discusses information and communication technology (ICT) and how it can be used across different fields like education, commerce, health services, and more. It explains the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and the emerging data-driven Web 3.0. The document also discusses technology convergence using smartphones as an example. It covers social media platforms and online dangers like spam, spoofing, and hacking. Finally, it provides guidance on contextualized online research and detecting satirical news sources.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
The document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 3.0. ICT is defined as any electronic device or application used for communication, and includes radio, television and computers. The World Wide Web started as mostly static, "read-only" Web 1.0 sites created by webmasters. Web 2.0 introduced more interactivity through user-generated content and social media. Web 3.0 aims to be more semantic and machine-readable. Examples of social media discussed include Facebook, Twitter, Instagram and Snapchat. The document also covers dangers online like spam, spoofing, phishing and computer viruses, as well as ways to protect computers using firewalls and antivirus
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
This document provides an overview of information and communication technology (ICT), including current states of the web, social media platforms, and presentation tools. It discusses ICT as an umbrella term encompassing communication devices and applications. Web 1.0 allowed read-only access to static pages, while Web 2.0 enabled user interaction, participation, and sharing on dynamic pages. Web 3.0 aims to be a read-write-execute web guided by semantic analysis. The document also outlines dangers online like spam, spoofing, phishing, and malware, as well as security measures.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
The document discusses the history and evolution of the World Wide Web from Web 1.0 to Web 2.0. Web 1.0 featured a read-only web with few content creators and no user interaction. Web 2.0 arose around 2004 and enabled increased user contribution, interaction, and creation of user-generated content through technologies like social media and WiFi. Web 2.0 transformed the web into a more dynamic and community-oriented platform.
This document discusses empowerment through technology and information communication technology (ICT). It provides an introduction to ICT and how it is used in different fields like commerce, engineering, education, health, and more. It discusses the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence through examples like smartphones. Other topics covered include social media platforms like Facebook, Twitter, and Instagram, assistive media, online safety, and security tools.
This document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, with examples like social media, and some of the dangers online like email spam, phishing, and computer viruses. It provides steps to conduct research and develop skills like critical thinking. Additionally, it outlines the mail merge and label generation process in Microsoft Word and how to create slide presentations in PowerPoint.
empowerment technology by: kier and joverynkiersamaco
This document provides an overview of empowerment technology and discusses various topics related to information and communication technology (ICT). It describes the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, social media platforms, dangers on the internet like spam and viruses, and ways to protect computers. Additionally, it covers research skills, mail merge functions in Microsoft Word, identifying credible online sources, and basics of slide presentation and graphic design.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...joanagolo4ever
The document discusses various topics related to information and communication technology (ICT). It defines ICT as the umbrella term for any communication devices or applications, including radio and computers. It then discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, noting increased interactivity and availability over time. Other topics covered include social media, online dangers/protections, research skills, and tools for image editing like GIMP.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUashleetimkang
This document provides information on various topics related to information and communication technology (ICT). It discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also covers technologies like smartphones, social media platforms, and assistive media. Additionally, it outlines cyber threats like email spam, phishing and pharming as well as defenses like firewalls and antivirus software. The document also discusses online research skills, digital file formats, image editing tools, and the basic principles of graphic design and layout.
ICT plays an important role in many aspects of modern society through communication, education, commerce, health services, and more. The document discusses how ICT is used in these areas and others like science, sports, and media. It also covers the evolution of the internet from early Web 1.0 to current versions, common online systems and platforms, and potential online dangers. Guidelines for image and text manipulation and basic graphic design principles are provided.
ICT plays an important role in modern society for communication, education, commerce, health services, science, and more. It has transformed how people interact through developments like the internet. Key aspects of ICT discussed include social media, online safety, conducting research, and using tools like mail merge for communication. Formats for digital images and text include proprietary, open, and file formats indicated by extensions.
Similar to Empowerment technology Grecille Mae Gesulga and Catalino (20)
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
2. INFORMATION, COMMUNICATION,
TECHNOLOGY (ICT)
• IT IS THE UMBRELLA THAT INCLUDES ANY COMMUNICATION DEVICE OR
APPLICATION, ENCOMPASSING: RADIO, TELEVISION, COMPUTER AND ETC
• IT IS THE MAIN METHOD OF COMMUNICATION, GETTING INFORMATION AND
EDUCATION, ATTAINING SERVICES AND EXPRESSING ADVOCACIES AND
AWARENESS.
3. WHAT IS THE CURRENT STATE OF
ICT?
THERE ARE STAGES OF INTERNET TECHNOLOGY:
WEB 1.0
WEB 2.O
WEB 3.0
4. STATE OF WEB 1.0
• THERE IS NO USER INTERACTION
•WEB PAGES WERE STATIC
•NO DIRECT COMMENT AVAILABLE
•CALLED READ ONLY WEB
5. “STATE OF WEB 2.0”
WEB 2.0
•THE INTERNET BECAME MORE AVAILABLE TO EVERYONE
•THE TERM WEB 2.0 WAS USED AROUND 2004
•THE USER CAN NOW INTERACT, CONTRIBUTE, AND CREATE THEIR OWN
INTERNET SPACE AND CONTENT.
WEBMASTER WEB DYNAMICS
USERS CONTRIBUTORS COMMUNITY
6. STATE OF WEB 3.0
WEB 3.0
•DISCOVERED BY TIM BERNERS LEE (FATHER OF WORLD
WIDE WEB).
•IT WILL NOT MAKE THE WEB 2.0 OBSOLETE
•IT IS REFERRED TO AS THE SEMANTIC WEB OR DATA
WEB CONTENT AND RESPONSE
7. SOCIAL MEDIA
•IT IS A COLLECTION OF INTERNET – base communication
tools and computer – assisted channels dedicated to
allow users to interact and communicate
ASSISSTIVE MEDIA
•It was the first internet – base reading services for
person with visual and hearing impairing.
11. SNAPSHOT
•Design for mobile networking application.
•Image and videos share in this app last only
for a short time and they`re gone.
12. POSSIBLE DANGER IN INTERNET
•EMAIL SPAM – Is the term use to refer to a person who create
electronic spam.
•EMAIL SPOOFING – It is usually used by spammers to hide the
origin of the spam.
•PHISHING – Practice of trying to get confidential information.
•PHARMING – A dangerous hacker attack on a website.
•SPYWARE – A program installed covertly on a personal computer
to collect information and take control.
13. •COMPUTER WORM – It is a dangerous computer
program that it replicates itself through a network.
•TROJAN HORSE – It can erase data and can allow access
of victims computer also can corrupt files.
•COMPUTER VIRUS – A program that duplicates itself and
then infects the computer.
•HACKER – A person who is able to enter the control
others people computer without authorization.
14. PROTECTION IN DANGER
NETWORKS
•SECURITY CENTER – Is a place where you can set additional
protection from threat to your computer.
•FIREWALL – Helps protecting your computer from unauthorized
entries, viruses or worms from the internet or network.
•AUTOMATIC UPDATES – It upgrades all the security that can help
advance recognizing a threats.
•VIRUS PROTECTION – It also prevents other malware from gaining
entry into your computer
15. RESEARCH
•CONTEXTUAL SEARCH – Its an attempt to be more
precise in providing the list documents according
to the words used by the user to search the
internet
• A GOOD CONTEXTUAL SEARCH ENGINE WOULD
REQUEST FOR INFORMATION TO NARROW DOWN THE
RESULT OF THE SEARCH
16. CONTEXTUALIZE METHOD
•CONTEXTUALIZE – Is to place (something, such as word
or ability in a context )
•RESEARCH – Collecting of information a particular
topic.
•STRATEGY – A careful plan or method.
•COMPILATION – The act of process or compiling.
•CITATION – The act of quoting.
17. SEARCHING METHOD
•Identify or choose a topic
•Topic or task definition
•Identify methods of search
•Identify resources of your research
•Make your research strategies
•Compiling the research result
•Evaluate the result of your research
•Create a list of your references for citation
18. STEPS TO MAKE CONTEXTUALIZED
ONLINE SEARCH
•Identify method of search
•Experiments
•Explore
•Survey
19. •Identify resources of your research
•Wikipedia
•Google
•Make your research strategies
•Compiling the research result
20. RESEARCH SKILLS
•PRACTICE MAKES IT PERFECT – The more you do it the better you
will be in doing research.
•CRITICAL THINKING – It is the ability to digest, reflect and
conclude from the information searched.
•ANALYTICAL THINKING – The ability to look verbalize,
conceptualize and gather data attained.
21. •PROBLEM SOLVING CAPABILITY – The ability to present
solutions or solve problems by presenting decision
based on the given information.
•RESEARCH PRESENTATION – It is ability to present ideas
and draw conclusion.
•CREATIVITY AND DEVELOPED IMAGINATION – It is the ability
to look for alternative solutions to the problems
•COMPUTER LITERACY - Knowledge of the various
computer application and tools.
22. STEPS OF CONTEXTUALIZE CONCEPT
1. Open the Google site.
2. On the upper right side of the window, click the google apps,
icon and click search engine.
3. On the lower right part of the window, click setting and
google search setting pop-up list will appear.
4. Click advance search and the advance search window will
appear.
5. Type the keywords that you, would like to search and click
the advanced search button.
23. IDENTIFYING GOOD SOURCE FROM
SATIRICAL SOURCE
Satirical sites are websites that report false stories meant to
amuse or entertain
These sites started as spoofs of real public figures such as
political leaders of motive personalities.
Untrue stories should not be shared with your friends family
and contacts.
24. HOW TO DETECT SATIRICAL NEWS
If it is too good to be true, then it must be so.
If the news did not emanate from reliable news
site.
If they are from know satirical sites.
25. LIST OF TOP SOURCES OF SATIRICAL
NEWS
1. ADOBO CHRONICLES (ADOBOCHRONICLES.COM)
2. SO, WHATS NEWS (SOWHATSNEWS.WORDPRESS.COM)
3. ERITAS TIME (ERITASTIMES.COM)
4. THE PROFESSIONAL HECKLER (PROFESSIONALHECKLER.COM)
26. AMERICAN SATIRICAL SITE
SITES IN U.S
•THE ONION (THEONION.COM)
•CLICK HOLE (CLICKHOLE.COM)
•CHRIST WINE GLOBAL MEDIA (CHRISTWINE.ORG)
27. MAIL MERGE AND LABEL
GENERATION
• It is used automatically add mailing
addresses or personalized information to
your publication.
28. MAILING START GROUP COMMANDS
1. MAIL MERGE
2. EMAIL MERGE
3. SELECT RECIPIENTS
4. EDIT RECIPIENTS
5. INSERT MERGE FIELD
6. ADDRESS BLOCK
7. GREETING LINE
8. PICTURES
9. INSERT PERSONALIZED
10.FORMAT
11. HYPERLINK
29. NAME FUNCTION
EMAIL MERGE – Merges data into a publication which will
be printed and mailed shows step by step mail merge.
EMAIL MERGE – Merge data into a publication that will be
sent as email.
SELECT RECIPIENTS – Chooses the list of the people you
intend to send the letters to you can type your own list.
EDIT – RECIPIENT LIST – Make changes to the list of
recipients.
30. INSERT MERGE FIELD – Adds a field your recipient list.
ADDRESS BLOCK – Adds an address to your letter.
GREETING LINE – Adds a greeting line to your letter.
PICTURE – Adds a picture field from your recipient list to
the publication.
INSERT PERSONALIZED HYPERLINK – Insert hyperlink that
are customized from each other
31. PARTS OF MAIL MERGE
1.Recipients list
2.Publication with merge fields
3.Merge publication
32. STEP 1 CREATING A RECIPIENT LIST
1. Click the mailing tab, go to the start group and click select
recipient.
2. On the list of option, select type new list.
3. On the new address list dialog box, click new entry and type
the recipient information.
4. Click ok.
33. STEP 2 : PREPARE YOUR
PUBLICATION
•Create your publication in MS Word
•Insert any additional text that you want to apper in
every version.
34. STEP 3
1. PRINT.
A. Click merge to a printer
b. In the print space, select the options you want and click ok.
2. MERGE NEW PUBLICATION
A. Click merge to new publication
B. In the new publication, click save this publication.
C. Type the name of your new publication and click save .
3. ADD TO EXISTING PUBLICATION
A. Click add to existing publication
B. On the open publication dialog box
35. GENERATING LABELS
•Labels are used for envelopes that you
intend to send out to persons usually
containing the none address or telephone
36. STEPS IN GENERATING LABELS
1. Start a new document in the MS Word
2. Go to the mailings tab, in the create group.
3. In the address box, type the text you want to be placed on the
label.
4. Click the insert address icon if you have an address stored in
the electronic address book
5. To change the font or paragraph formatting, select the text
right click and select the option from the down menu.
37. 6. Click options button and the label options dialog box will
appear
7. Select the setting like the type of printer, the supplies that
produced your label sheets and others
8. After you make setting, click ok.
9. Under print, select full page of the same label of single label.
Then in the row and column boxes, enter the numbers that
match the number of row and column on the label sheet
10. Click print
39. HOW TO CREATE SLIDE
PRESENTATION
1. Open MS Powerpoint application
2.Click new and select your preferred design template
3.Click insert tab menu and insert text word art or any
object in the slide
4.Click home tab to insert new slide in our
presentation.
40. SOURCES OF PHOTOS AND
GRAPHICS
•There are many sources of photos and graphics. They
can some direct from your camera, old pictures , free
from internet or purchased from the internet or stores.
41. PERSONAL AND
PROFESSIONAL PHOTOS
•Are photos taken y amateur or professional
photographer using a digital camera. Theses images
are downloaded and are stored in the computer. They
are sources of images for any project that you may
embark. They re original and definitely something one
would like to work on.
42. SCANNED IMAGES
•Are those that you transfer from printed photos
and graphics using scanning devices which you
can transfer to your computer for further
improvement and modification. These are mostly
old pictures photographed before the digital age.
43. STOCK PHOTO LIBRARY
•Are several photographs and created images that
are available for sale . they come in cd or dvd
format and many of these images are royalty
free, which means that they can be used without
additional fees.
44. ONLINE STOCK PHOTOS
•Are found in the world wide web. The www is now the
dominant source of photos and graphics around the
globe because of the widely available choices and
reasonable prices, other sites even offer copy right free
photos and other media. One advantage of this set up is
that you do not have to go to place where most of these
photos were taken.
45. ONLINE DIGITAL FILE FORMAT
FOR IMAGES AND TEXT
•A computer will have a certain method of
encoding information for storage in the hard
drive or any form of computer storage . the ways
of encoding and storing this information to
storage is called file – format, digital file formats
are categorized as either proprietary or open.
46. PROPRIETARY FORMATS
•Are owned and controlled by individuals or
corporations and the file format specifications
are not available to the public.
OPEN FORMATS
•Are means and ways for storing digital information that
are free, can be used by the public and are not
encumbered by copyright or potents.
47. FILE FORMAT
•Are uses suffixes that are added to the
end of the filename called filename
extension.
48. DIGITAL FILE FORMAT ARE CLASSIFIED
INTO THREE MAJOR GROUPS
1. UNCOMPRESSED OR RAW FORMAT – Is usually used for storing
original file format, it is a flexible form but needs bigger
memory to store.
2. LOSSLESS FILE FORMAT – Is a file format that was compressed
to replicate the original quality but at a reduced file size. This
type is ideal for storing important file ( images, audio, or
video).
49. IMAGED FILE FORMAT ( RASTER
IMAGE FORMAT)
•Are standardized means of organizing and
storing digital images
TWO TYPES OF IMAGE FILE FORMAT
1. Raster image format
2.Vector image format
50. RASTER IMAGE FORMAT
•Images faithfully display the color information
and image making them a great choice to display
detailed images
•Widely supported to web browsers, which is
makes them easy to share.
51. TYPES OF RASTER IMAGES
• JPEG/JPG ( JOINT PHOTOGRAPHICS EXPERT GROUP) – Is an extremely common
format and is typically used sharing photographs
• GIF ( GRAPHICS INTERFACE FORMAT) - One of the most commoon images format on
the web
• PNG ( PORTABLE NETWORK GRAPHICS – Supported by current browser
• BMP ( BITMAP) – Is one of the simplest file formats in raster graphics
• TIFF ( TAGGED IMAGE FILE FORMAT ) – Recommended for vectorization.
• PCX ( PICTURE EXCHANGE) – Extended to support true color images.
52. VECTOR IMAGES AND VECTOR
GRAPHICS
•VECTOR IMAGES – Are lossless files created using mathematical
geometric equations to represent images in digital computer
graphics.
•VECTOR GRAPHICS – Has the advantage or retaining its quality at
any desired imaged, size unlike raster images that appear
proxilated when displayed in expanded images size
53. EXAMPLES OF THESE TYPE FORMATS
ARE :
•PDF
•ENCAPSULATED POSTSCRIPT
•SCALABLE VECTOR GRAPHICS
•WINDOWS METAFILE
55. ADOBE ILLUSTRATOR
•Created using paths and lines by point instead of bit
maps which may include objects, color and texts.
•Drawing file – a generic drawing created and stored in a
vector formats that uses lines or path to represent iamge.
•Drawing exchange format – a developed and introduced
by auto desk the maker of autocad similar to drawing file
both is universal so that autocad can be opened using
other program
56. POSTSCRIPT
•A page description language developed by adobe that
describe the appearance of a printed page it become an
industry standard for printing and imaging.
•Scalable vector graphics – most common vector format
on the internet, developed by the ( www. ) To display
vector graphics open format can be opened by adobe,
corel and open graphic program
57. BASIC PRINCIPLE OF GRAPHICS &
LAYOUT
•Layout – is the process of planning and arranging
graphics or text in a page or book.
•Symmetrical – a layout may be symmetrical where there
are equal weight of elements on both sides of the page.
•Asymmetrical – a layout maybe asymmetrical where
there is an artistic and different intensity on one side of
the page.
58. •Text – a text type should be legible, appropriate font
face, and arranged either left justified, or centered the
flow of the text and pictures should be easy to read.
•Image – should be proportionate, w/ sharp color and
high resolution.
•Proximity and harmony – the elements should be closed
together and most
•Consistency – there should be uniformity on the theme
on each page.
59. •Color and shape - use color to create interest
by providing variety in design like the use of
color contrast and shape.
•Emphasis – there should be one point of
interest in a page. The element to be
emphasized should have a different size , color,
shape, or background.
60. PRINCIPLES AND BASIC
TECHNIQUES OF IMAGE
MANIPULATION
•You can change the background of it does not
math the image or totally the presentation. You
can also add efforts to the background.
61. TECHNIQUES OF IMAGE MANIPULATION
•BACKGROUND COLOR - you can change the background if
it does not match the image or the totality of the
presentation. You can also add effects to the
background
•SHADOW - using shadow effect will make the image
realistic.
•Proportion - when combining images, resize the image
to make it proportionate and realistic.
62. •Blending color - you can use color blending to match
the background with the other elements in the page.
•Texture - adding texture allows you to blend different
images.Textures add to the depth of your art.Blending
will allow smooth trasition of one image to another.
•Emphasis - there should be a focal point to a page that
will attract viewers.The element you want to emphasize
should be sharp,big, and most vibrant in your design.
63. COMBINING TEXT, GRAPHICS AND
IMAGES
•Combining text , graphics, and images in your
presentation, info graphics or web page will make your
message clear.
•Transparent shapes – add simple shapes with slight
transparency behind your text to clearly see the text you
want to emphasize.
64. •Fonts and shapes – fonts and shapes should
complement with each other. You can use
rounded shapes with rounded fonts and sharp
shapes with sharp fonts.
•Text and background - should be aligned to have
an organized look.
•Clean and clear background – use a clean and
clear background for message to be readable .
65. BASIC MANIPULATION USING OFFLINE OR
OPEN SOURCE SOFTWARE
• Photo editing and designing tools allow you to make manipulate or edit images
, apply , effects, filters and frames , crop add text, changed background color
make photo collage and photo album that you would like to do in an image
• Picasa – it is a google`s free photo manager to edit and orginizing your photo.
• Pain.Net – it is a window base alternative to ms point editor .
• Google sketch up – it is a free .3d modeling program with tools that allow you to
create 3d models of houses, home renovation, woodworking projects and
others with dimensional accuracy
66. •Autodesk pixl – free photo editing tool that is similar to
photoshop and has more than 600 effects
•Adobe photoshop – is a tool to create modify, combine
and optimize, digital photos and images.
•Gimp or gnu ( image manipulation program ) – it is a
free open source image graphic editing program used
for image retouching and editing, free – form drawing /
painting and other specialized tasks.
67. INSTALLING GIMP
1. GO TO WWW.GIMP.ORG
2.THEN CLICK DOWNLOAD
3.SELECT DOWNLOAD GIMP DIRECTLY
4.RUN THE GIMP INSTALLER
5.CLICK INSTALL
6.WAIT FOR IT TO FINISH THE INSTALLATION, THEN CLICK
FINISH.
68. DIFFERENT TYPES OF SLIDE
PRESENTATION
•ZOHO SHOW
•LINK IN SHARE.NET
•GOOGLE SLIDE
•SLIDE ROCKET
•MS POWERPOINT
•PREZI