The document discusses various aspects of internet safety and security. It begins by explaining the importance of the internet in modern life but also notes the risks like scams, bullying, and illegal activities if precautions are not taken. It then provides tips for staying safe online such as not sharing passwords, only adding real-life friends on social media, avoiding untrusted websites, and not giving out personal information. The document emphasizes the need for everyone to keep themselves safe and secure when using the internet.
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptxRyanRojasRicablanca
This document discusses basic and advanced productivity tools. It begins by describing basic word processing, spreadsheets, and presentation software like Microsoft Word, Excel, and PowerPoint. It then discusses advanced techniques for these tools, including mail merge and integrating images in Word, commonly used formulas and functions in Excel, and using hyperlinks and animation in PowerPoint. The objectives are to learn how to use mail merge, advanced formulas, and hyperlinks to improve documents, spreadsheets, and presentations.
The document discusses current and future trends in information and communication technology (ICT). It covers topics like Web 2.0, which enables greater user interactivity and collaboration, as well as Web 3.0, which aims to make web pages more intelligent through semantic analysis. Converging technologies, social media, mobile devices, and assistive media are also shaping new ICT trends. The document provides examples of these concepts and outlines some challenges of emerging technologies like compatibility and security issues with Web 3.0.
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
The document discusses how information and communication technologies (ICTs) like social media can empower citizens and enable social change in developing nations. It provides examples of how platforms like Facebook and online petitions were used to disseminate information and garner support during important events in Philippine history like the EDSA Revolution and in the aftermath of disasters like Typhoon Yolanda. The document also outlines the concepts of digital citizenship, digital access, and online safety and ethics that are important for citizens to practice when using digital tools and platforms.
This document outlines an empowerment technology course consisting of 15 lessons. The lessons cover topics such as information and communication technology, online safety and etiquette, advanced Microsoft Office skills, web design, online collaboration tools, and using ICT for social change projects. Each lesson lists objectives to improve knowledge of ICT topics and skills with the overarching goal of empowering students to use ICT to their advantage and for social good.
1. The document discusses information and communication technologies (ICT), including the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0.
2. Key features of Web 2.0 are discussed, such as folksonomy, rich user experience, user participation, and mass participation.
3. Current trends in ICT are also summarized, including convergence, social media, mobile technologies, and assistive learning tools.
The document discusses how to create basic websites using Microsoft Word and the free web hosting service Jimdo. It provides step-by-step instructions on how to save a Word document as a web page and how to use Jimdo's WYSIWYG editor to add and edit elements like text, images, and navigation. Key terms discussed include WYSIWYG, HTML, templates, and search engine optimization. The document aims to teach basic website design skills without requiring knowledge of coding languages.
The document is a module on online safety, security, and netiquette for Grade 11 students. It contains the following key points:
1. It introduces the importance of online safety, security, and proper etiquette when using the internet. Personal information should be kept private and secure to avoid risks like identity theft, bullying, and scams.
2. It provides tips on online safety like using strong and unique passwords, only accessing secure websites, not sharing personal details, and knowing how to identify legitimate websites.
3. It discusses netiquette rules like being respectful, helpful, and forgiving online as well as avoiding flaming, spamming, and invading privacy. Following these rules promotes positive online
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptxRyanRojasRicablanca
This document discusses basic and advanced productivity tools. It begins by describing basic word processing, spreadsheets, and presentation software like Microsoft Word, Excel, and PowerPoint. It then discusses advanced techniques for these tools, including mail merge and integrating images in Word, commonly used formulas and functions in Excel, and using hyperlinks and animation in PowerPoint. The objectives are to learn how to use mail merge, advanced formulas, and hyperlinks to improve documents, spreadsheets, and presentations.
The document discusses current and future trends in information and communication technology (ICT). It covers topics like Web 2.0, which enables greater user interactivity and collaboration, as well as Web 3.0, which aims to make web pages more intelligent through semantic analysis. Converging technologies, social media, mobile devices, and assistive media are also shaping new ICT trends. The document provides examples of these concepts and outlines some challenges of emerging technologies like compatibility and security issues with Web 3.0.
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
The document discusses how information and communication technologies (ICTs) like social media can empower citizens and enable social change in developing nations. It provides examples of how platforms like Facebook and online petitions were used to disseminate information and garner support during important events in Philippine history like the EDSA Revolution and in the aftermath of disasters like Typhoon Yolanda. The document also outlines the concepts of digital citizenship, digital access, and online safety and ethics that are important for citizens to practice when using digital tools and platforms.
This document outlines an empowerment technology course consisting of 15 lessons. The lessons cover topics such as information and communication technology, online safety and etiquette, advanced Microsoft Office skills, web design, online collaboration tools, and using ICT for social change projects. Each lesson lists objectives to improve knowledge of ICT topics and skills with the overarching goal of empowering students to use ICT to their advantage and for social good.
1. The document discusses information and communication technologies (ICT), including the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0.
2. Key features of Web 2.0 are discussed, such as folksonomy, rich user experience, user participation, and mass participation.
3. Current trends in ICT are also summarized, including convergence, social media, mobile technologies, and assistive learning tools.
The document discusses how to create basic websites using Microsoft Word and the free web hosting service Jimdo. It provides step-by-step instructions on how to save a Word document as a web page and how to use Jimdo's WYSIWYG editor to add and edit elements like text, images, and navigation. Key terms discussed include WYSIWYG, HTML, templates, and search engine optimization. The document aims to teach basic website design skills without requiring knowledge of coding languages.
The document is a module on online safety, security, and netiquette for Grade 11 students. It contains the following key points:
1. It introduces the importance of online safety, security, and proper etiquette when using the internet. Personal information should be kept private and secure to avoid risks like identity theft, bullying, and scams.
2. It provides tips on online safety like using strong and unique passwords, only accessing secure websites, not sharing personal details, and knowing how to identify legitimate websites.
3. It discusses netiquette rules like being respectful, helpful, and forgiving online as well as avoiding flaming, spamming, and invading privacy. Following these rules promotes positive online
This document discusses online platforms and tools that can be used for developing ICT content. It describes different types of online platforms including presentation/visualization tools, cloud computing, social media, file management, mapping, and web page creation tools. It also discusses Google applications such as Docs, Sheets, and Slides that allow online content creation. Basic web design principles and elements like color, layout, links, buttons and images are also covered. The document provides examples of specific online tools for each category like Slideshare, Google Drive, Tumblr and Wix.
Interactive multimedia allows users to control and combine different types of media like text, sound, video, graphics and animation. It can be used for education, training, games, simulations, presentations and more. Some common multimedia contents include videos, audio, online games, tests, courseware, podcasts and vodcasts.
THE CURRENT STATE OF ICT - LESSON 1.pdfJamaica Ojos
The document provides an overview of the current state of information and communication technologies (ICT). It describes ICT as encompassing both hardware like phones, computers, and network equipment, as well as software, applications, and platforms. The key trends in ICT include convergent technologies where multiple devices combine into one, social media, and mobile technologies. It also distinguishes the three phases of the World Wide Web - Web 1.0 allowed only reading content, Web 2.0 enabled user interaction and sharing, while Web 3.0 will allow for more personalized and executable experiences based on user data. The document aims to educate users on the significance of ICT and how it has impacted various aspects of modern life.
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
This document provides information about advanced word processing skills in Microsoft Word, including mail merge and integrating images and external materials. It discusses the two components of a mail merge - the form document and the data list. It then provides a 30-step process for creating a simple mail merge, including inserting merge fields. The document also discusses different types of materials that can be integrated into Word documents, such as pictures, clip art, shapes, and screenshots. Finally, it outlines seven image placement options in Word like in line with text, square, and behind text.
This document provides tips for creating effective presentations and using hyperlinks in PowerPoint. It recommends keeping slides to a minimum with important details only, summarizing information using bullets or short sentences, and using graphics that don't distract. The document also outlines how to insert hyperlinks by selecting text or objects, choosing link options in the Insert tab, and clicking OK to apply the links. Hyperlinks allow easy navigation within a presentation or to other files and web pages.
Here is a draft social media post for your "Think Before You Click" campaign ad/poster:
#ThinkBeforeYouClick
One click can change everything. Help keep yourself and others safe online by pausing to consider what you share and where you surf. Your privacy and security are important - be mindful of protecting personal information. Use technology to empower yourself through knowledge and connection, not endanger yourself through haste or deception. This message brought to you by the #EmpowermentTechnology campaign. Think before you click!
The document discusses principles of graphics and layout for online environments. It explains that the goals of the lesson are to understand basic design principles, create infographics, use common file formats, edit images, and upload images to Photobucket. It then discusses key principles like balance, contrast, emphasis, movement, pattern, rhythm, proportion, and variety that are important for effective visual design. Finally, it suggests a formative activity where students create images demonstrating each principle.
This document provides instructions for creating basic web pages using different methods. It begins by outlining the key objectives and motivation for learning web page creation. It then discusses how WYSIWYG editors allow anyone to create websites without coding knowledge through platforms like Microsoft Word and Jimdo. The document concludes by summarizing the key points and providing a post-test to assess understanding.
This document provides an overview of Microsoft PowerPoint, including its functions, views, and how to create an effective presentation. It discusses key PowerPoint terms like slides, templates, and transitions. It also covers how to use animation and hyperlinks to make presentations more engaging. The document provides tips for minimizing text, using visual clarity, and consistency in designs. It describes how to insert hyperlinks within and between presentations to help navigate slides. The goal is for learners to understand how to use PowerPoint's features to produce dynamic, effective presentations.
Empowerment Technologies - Imaging and Design for the Online EnvironmentLany Lyn Magdaraog
This document provides an overview of key principles of graphics and layout for online design. It discusses concepts like alignment, balance, contrast, emphasis, gestalt, movement, proportion, proximity, unity, repetition, rhythm, and white space. It defines these principles and gives examples of how they can be applied in graphic design. The document is intended to cover basic principles that are important for imaging and design in an online environment.
Imaging and Design for the Online Environment - Empowerment TechnologiesMark Jhon Oxillo
This document defines key concepts related to images, graphics, and layout. It discusses what images are, common types of images like photographs and drawings, and basic principles of graphic design layout including balance, emphasis, movement, pattern, proportion, and variety. It also covers infographics, file formats for images, principles of image manipulation like cropping and color balance, and popular image hosting services.
Lesson 4- Developing ict content for specific purposesJuvywen
Techniques in empowering users of application software
-Mail Merge
-Custom animations and timing
-Hyperlinking
-Integrating images and external material in word processors
-Embedded files and data
-Advanced and complex formulas and computations
This document provides an overview of presentation software and key concepts for creating presentations in Microsoft PowerPoint. It defines presentation software as applications that allow users to create visual aids for communicating ideas. It then lists examples like PowerPoint, OpenOffice Impress, and LibreOffice Impress. The document goes on to explain some of the basic terminology and features in PowerPoint like slides, design templates, slide shows, animations, transitions, and different view modes. It also provides instructions for inserting different media types like images, illustrations, links, text, and videos into a PowerPoint presentation. Finally, it gives some tips for creating an effective presentation focused on minimizing text, emphasizing clarity, simplicity, visuals, consistency, and contrast
The document discusses advanced word processing skills related to mail merge and integrating images and external materials into documents. It provides 30 steps for creating a simple mail merge with two key components - a form document and a data file containing recipient information. It also describes different types of images that can be inserted, such as JPG, GIF and PNG files, as well as other materials like clip art, shapes, smart art and charts. Details are given on image placement, sizing and text wrapping options when integrating images into documents.
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
The document discusses the role of information and communication technologies (ICT) in advocacy and social change. It provides examples from the Philippines of how social media and ICT were used during protests like the People Power Revolution and Million People March to organize large numbers of people and raise awareness of issues. The document also discusses concepts like digital citizenship, the global digital divide, and how social media can empower citizens in developing countries by giving them a platform to voice their concerns and perspectives.
This document discusses publishing and sustaining ICT projects. It provides guidance on uploading projects online using platforms like WordPress or Microsoft Office Project Server. It also discusses website management and tools for promotion, monitoring traffic, and gaining traction. Examples given include using social media platforms like LinkedIn, Google AdWords, and Facebook ads. The document concludes with lessons on using ICT applications in business and considerations for sustaining an ICT project for social change over time.
The document discusses contextualized online search and research skills. It covers topics like search tools, information evaluation, and plagiarism. It provides guidance on using search engines effectively through search operators and techniques. It emphasizes the importance of evaluating information sources for accuracy, authority, objectivity and currency. Examples of information sources discussed include indigenous knowledge, libraries and the internet. The document aims to help students improve their ability to conduct credible online research.
This document discusses online safety, security, ethics, and etiquette. It provides tips for protecting personal information when online, such as not sharing full names, addresses, or birthdays. It also recommends using antivirus software, avoiding untrusted websites, and not downloading unauthorized content. Additionally, it outlines several types of internet threats like malware, spam, phishing, botnets, and denial of service attacks. The goal is to educate people on how to safely and securely use the internet.
INFORMATION AND COMMUNICATION TECHNOLOGY.
WORLD WIDE WEB
TRENDS IN ICT
TYPES OF SOCIAL MEDIA
ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE
TIPS ON HOW TO BE SAFE ONLINE
INTERNET THREATS MALWARE
SEARCHING THE WEB
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
This document discusses online platforms and tools that can be used for developing ICT content. It describes different types of online platforms including presentation/visualization tools, cloud computing, social media, file management, mapping, and web page creation tools. It also discusses Google applications such as Docs, Sheets, and Slides that allow online content creation. Basic web design principles and elements like color, layout, links, buttons and images are also covered. The document provides examples of specific online tools for each category like Slideshare, Google Drive, Tumblr and Wix.
Interactive multimedia allows users to control and combine different types of media like text, sound, video, graphics and animation. It can be used for education, training, games, simulations, presentations and more. Some common multimedia contents include videos, audio, online games, tests, courseware, podcasts and vodcasts.
THE CURRENT STATE OF ICT - LESSON 1.pdfJamaica Ojos
The document provides an overview of the current state of information and communication technologies (ICT). It describes ICT as encompassing both hardware like phones, computers, and network equipment, as well as software, applications, and platforms. The key trends in ICT include convergent technologies where multiple devices combine into one, social media, and mobile technologies. It also distinguishes the three phases of the World Wide Web - Web 1.0 allowed only reading content, Web 2.0 enabled user interaction and sharing, while Web 3.0 will allow for more personalized and executable experiences based on user data. The document aims to educate users on the significance of ICT and how it has impacted various aspects of modern life.
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
This document provides information about advanced word processing skills in Microsoft Word, including mail merge and integrating images and external materials. It discusses the two components of a mail merge - the form document and the data list. It then provides a 30-step process for creating a simple mail merge, including inserting merge fields. The document also discusses different types of materials that can be integrated into Word documents, such as pictures, clip art, shapes, and screenshots. Finally, it outlines seven image placement options in Word like in line with text, square, and behind text.
This document provides tips for creating effective presentations and using hyperlinks in PowerPoint. It recommends keeping slides to a minimum with important details only, summarizing information using bullets or short sentences, and using graphics that don't distract. The document also outlines how to insert hyperlinks by selecting text or objects, choosing link options in the Insert tab, and clicking OK to apply the links. Hyperlinks allow easy navigation within a presentation or to other files and web pages.
Here is a draft social media post for your "Think Before You Click" campaign ad/poster:
#ThinkBeforeYouClick
One click can change everything. Help keep yourself and others safe online by pausing to consider what you share and where you surf. Your privacy and security are important - be mindful of protecting personal information. Use technology to empower yourself through knowledge and connection, not endanger yourself through haste or deception. This message brought to you by the #EmpowermentTechnology campaign. Think before you click!
The document discusses principles of graphics and layout for online environments. It explains that the goals of the lesson are to understand basic design principles, create infographics, use common file formats, edit images, and upload images to Photobucket. It then discusses key principles like balance, contrast, emphasis, movement, pattern, rhythm, proportion, and variety that are important for effective visual design. Finally, it suggests a formative activity where students create images demonstrating each principle.
This document provides instructions for creating basic web pages using different methods. It begins by outlining the key objectives and motivation for learning web page creation. It then discusses how WYSIWYG editors allow anyone to create websites without coding knowledge through platforms like Microsoft Word and Jimdo. The document concludes by summarizing the key points and providing a post-test to assess understanding.
This document provides an overview of Microsoft PowerPoint, including its functions, views, and how to create an effective presentation. It discusses key PowerPoint terms like slides, templates, and transitions. It also covers how to use animation and hyperlinks to make presentations more engaging. The document provides tips for minimizing text, using visual clarity, and consistency in designs. It describes how to insert hyperlinks within and between presentations to help navigate slides. The goal is for learners to understand how to use PowerPoint's features to produce dynamic, effective presentations.
Empowerment Technologies - Imaging and Design for the Online EnvironmentLany Lyn Magdaraog
This document provides an overview of key principles of graphics and layout for online design. It discusses concepts like alignment, balance, contrast, emphasis, gestalt, movement, proportion, proximity, unity, repetition, rhythm, and white space. It defines these principles and gives examples of how they can be applied in graphic design. The document is intended to cover basic principles that are important for imaging and design in an online environment.
Imaging and Design for the Online Environment - Empowerment TechnologiesMark Jhon Oxillo
This document defines key concepts related to images, graphics, and layout. It discusses what images are, common types of images like photographs and drawings, and basic principles of graphic design layout including balance, emphasis, movement, pattern, proportion, and variety. It also covers infographics, file formats for images, principles of image manipulation like cropping and color balance, and popular image hosting services.
Lesson 4- Developing ict content for specific purposesJuvywen
Techniques in empowering users of application software
-Mail Merge
-Custom animations and timing
-Hyperlinking
-Integrating images and external material in word processors
-Embedded files and data
-Advanced and complex formulas and computations
This document provides an overview of presentation software and key concepts for creating presentations in Microsoft PowerPoint. It defines presentation software as applications that allow users to create visual aids for communicating ideas. It then lists examples like PowerPoint, OpenOffice Impress, and LibreOffice Impress. The document goes on to explain some of the basic terminology and features in PowerPoint like slides, design templates, slide shows, animations, transitions, and different view modes. It also provides instructions for inserting different media types like images, illustrations, links, text, and videos into a PowerPoint presentation. Finally, it gives some tips for creating an effective presentation focused on minimizing text, emphasizing clarity, simplicity, visuals, consistency, and contrast
The document discusses advanced word processing skills related to mail merge and integrating images and external materials into documents. It provides 30 steps for creating a simple mail merge with two key components - a form document and a data file containing recipient information. It also describes different types of images that can be inserted, such as JPG, GIF and PNG files, as well as other materials like clip art, shapes, smart art and charts. Details are given on image placement, sizing and text wrapping options when integrating images into documents.
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
The document discusses the role of information and communication technologies (ICT) in advocacy and social change. It provides examples from the Philippines of how social media and ICT were used during protests like the People Power Revolution and Million People March to organize large numbers of people and raise awareness of issues. The document also discusses concepts like digital citizenship, the global digital divide, and how social media can empower citizens in developing countries by giving them a platform to voice their concerns and perspectives.
This document discusses publishing and sustaining ICT projects. It provides guidance on uploading projects online using platforms like WordPress or Microsoft Office Project Server. It also discusses website management and tools for promotion, monitoring traffic, and gaining traction. Examples given include using social media platforms like LinkedIn, Google AdWords, and Facebook ads. The document concludes with lessons on using ICT applications in business and considerations for sustaining an ICT project for social change over time.
The document discusses contextualized online search and research skills. It covers topics like search tools, information evaluation, and plagiarism. It provides guidance on using search engines effectively through search operators and techniques. It emphasizes the importance of evaluating information sources for accuracy, authority, objectivity and currency. Examples of information sources discussed include indigenous knowledge, libraries and the internet. The document aims to help students improve their ability to conduct credible online research.
This document discusses online safety, security, ethics, and etiquette. It provides tips for protecting personal information when online, such as not sharing full names, addresses, or birthdays. It also recommends using antivirus software, avoiding untrusted websites, and not downloading unauthorized content. Additionally, it outlines several types of internet threats like malware, spam, phishing, botnets, and denial of service attacks. The goal is to educate people on how to safely and securely use the internet.
INFORMATION AND COMMUNICATION TECHNOLOGY.
WORLD WIDE WEB
TRENDS IN ICT
TYPES OF SOCIAL MEDIA
ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE
TIPS ON HOW TO BE SAFE ONLINE
INTERNET THREATS MALWARE
SEARCHING THE WEB
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
The document provides information on advanced techniques using Microsoft Word, including mail merge. Mail merge allows a user to create documents and combine them with another document or data file, commonly used when sending out materials to multiple recipients. Other techniques discussed include formatting text using bold, italics and other options; correcting spelling and grammar; and saving documents electronically on a computer's hard drive. Advanced functions in Word help users efficiently compose, edit, format and print complex documents.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
The document provides information on advanced techniques using Microsoft Word, including mail merge. Mail merge allows a user to create documents and combine them with another document or data file, commonly used when sending out materials to multiple recipients. Other techniques discussed include formatting text using bold, italics and other options; correcting spelling and grammar; and saving documents electronically on a computer's hard drive. Advanced functions in Word help users efficiently compose, edit, format and print complex documents.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
The document provides information on advanced techniques using Microsoft Word, including mail merge. Mail merge allows a user to create documents and combine them with another document or data file, commonly used when sending out materials to multiple recipients. Other techniques discussed include formatting text using bold, italics and other options; correcting spelling and grammar; and saving documents electronically on a computer's hard drive. Advanced functions in Word help users efficiently compose, edit, format and print complex documents.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
This document provides an overview of information and communication technologies (ICT). It discusses key topics like the current state of ICT in the Philippines, trends in ICT including social media and mobile technologies, online safety and security issues, and netiquette guidelines. The objectives are to compare online platforms to achieve class goals, apply safety standards, and use the internet for research. It also includes activities for students to engage with the material.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
This document provides information and advice about staying safe online. It discusses some of the common risks people may encounter on the internet, such as viruses, spyware, and interacting with strangers. It also addresses issues like cyberbullying and privacy settings. The document encourages students to be aware of potential dangers and to get help from college staff if they experience any problems like online bullying.
The document discusses internet privacy and data protection. It defines internet privacy as the right to privacy regarding personal information stored and shared online. It notes that privacy is recognized as a human right by various international organizations and treaties. However, privacy faces numerous risks online like companies tracking browsing histories and social media sites sharing data. Strong encryption and privacy laws are important to protect individuals' information and uphold their right to privacy on the internet.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
The document provides information on various topics related to cyber safety, ethics, and laws. It discusses open source and open data, defining them and their key principles. It also covers data privacy, cyber crimes like phishing and illegal downloading, laws around privacy and cyber crimes in India. Tips are given around protecting personal data, preventing identity theft and phishing, maintaining confidentiality of information, staying safe on social media and the web, and dealing with cyber trolls and bullying.
The downfall to_computers_in_the_21st_centurygracestearns
Computer fraud and identity theft are growing problems, with phishing scams and spyware posing major risks. It is important to take precautions like using antivirus software and being wary of emails from unknown senders. Copyright law protects creative works, and permission is needed to use others' content online. New technologies can enable privacy issues if personal data is not securely handled.
The downfall to_computers_in_the_21st_centurygracestearns
Computer fraud and identity theft are growing problems, with phishing scams and spyware posing major risks. It is important to take precautions like using antivirus software and being wary of emails from unknown senders. Copyright law protects creative works, and permission is needed to use others' content online. New technologies can enable privacy issues if personal data is not securely handled.
The document discusses several topics related to computer issues including computer fraud, copyright, individual privacy, computer viruses and hackers, and dangers of new technology. It provides information on each topic, such as defining computer fraud and ways to prevent it, outlining copyright law and what is protected, discussing concerns about individual privacy and what cookies are, explaining computer viruses and hackers and how to prevent being affected by them, and noting some potential health, social, and educational dangers of new technology.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
2. It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of
different pages that are formatted in a markup language called HTML
(Hypertext Markup Language) and linked to each other that contain text,
graphics, multimedia files, hyperlinks and etc.
The first development of World Wide Web where web pages are static. It also
known as flat or stationary page and it cannot be manipulated by users.
It is a dynamic web page where user can interact with page like creating a
user account, posting comments, uploading files and images, and others.
Example: Blog sites, Facebook, Twitter, Instagram, YouTube.
3. users can classify and arrange information by adding tag or
label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social
networking sites.
Example in tagging on Facebook: #TeamKawayan, #Single
2. Rich User Experience – user can have high interaction with the content of
the page and can achieve level of expertise.
user can put content on their own in web page like
comment, evaluation, and etc.
A site that offers services and brings individual and businesses
into selling different goods and commodities such as shopping site like OLX,
Lazada, Shopee, Zalora and others.
users can subscribe to a software when they need it
instead of purchasing them.
sharing of diverse information through universal web
access.
4. A new paradigm in web interaction extension of
led by World Wide Web Consortium (W3C) where
it provides framework that allows data to be
shared and reuse.
5. it refers to fusing
of technological advancement to
work on a similar task.
Example. Using smartphone as
camera in taking pictures instead
of DSLR camera.
an application
and website where user can
communicate, create and share
content, and participate in online
communities.
6. A website where people with the
same come together to share information.
Examples: Twitter, Instagram, Facebook
7. A website where user can post stories
and are ranked based on the popularity through
voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark
8. A website that
allows you to share and store
internet bookmarks, articles, posts,
blogs, images and others. Examples:
Pinterest, StumbleUpon, Dribble
A website that
allows you to share and store
multimedia files such as video,
photos and music.
Examples: Instagram, YouTube, Flickr
9. a website that
allows you to broadcast short
message. Examples: Twitter, Tumblr,
Meetme
a discussion
website that allows user to ask
questions and comments on a
journal posted by an individual or
group. Examples: Wordpress,
Blogger
10. a technology used in cellular
and other devices such netbook, laptop, tablet,
smartphones and etc.
A platform that assist people with
disability. It will guide the individual like a blind
person by using an audio recording.
11.
12. The importance of internet plays a crucial part in human
development. Life becomes easy and comfortable because of this
technology. Most of us are connected to the internet via laptop,
mobile phone, tablet, personal computer and other electronic
gadgets. Behind this technology there is a risk that everyone
should be aware of. You could be at risk on scam, bullying, and
illegal activities if you will not take precautions in using internet.
We need to keep ourselves safe and secure whenever we use the
internet. That is why it is very important to know and learn the
ways on how to be safe and secured online.
13. Do not share your password with anyone.
Add friends you know in real life.
Do not visit untrusted websites.
Add password to your WIFI at home to make it
private.
Install and update antivirus in your computer.
Do not give your personal information to anyone
Think before you click.
Never post about your future vacation.
14. It happens when someone intentionally abused, harass, and mistreated by other
person using electronic communication.
It is a crime of stealing personal information for the purpose of assuming that
person’s name or identity to make any form of transactions.
A criminal practice where electronic communication is used to stalk or harass
individual or group.
The act of sending sexually explicit text messages, images, and videos.
15. also known as Malicious Software.
Virus – a malicious program that replicate itself by copying itself to another program.
Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but
take control of your computer.
Worm – malicious program that copy’s itself and spreads to other computers.
Spyware – A malicious program that gathers information from victim’s computer and send it back to the
hacker.
Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave
abnormally and tedious to close them.
Keylogger – A program that runs in the background and steals user credentials and confidential information
and send back to hack by recording every keystroke that a user makes on their computer or device.
Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are
controlled by a common type of malware.
Rootkit – A software tools used by hackers to gain control over a computer on a network without being
exposed.
Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay
the ransom through online method for the removal of the virus.
16. Also known as junk email or unwanted email send by advertiser or
bot. It can be used to send malware.
A cyberattack method using deceptive emails and websites to
acquiring sensitive personal information.
A crime in which computer is used as object and tool in committing a
crime such hacking, phishing, spamming, child pornography, libel,
hate crimes, identity thief and others.
A law that deals with all forms of cybercrime.
17. It is a word that came from the two words “net”
and “etiquette”. It is an etiquette applied online
that shows proper manner and behavior. If you are
a member of an online society through social
media you are called netizen. And in interacting
with other netizen online, we need to maintain
good behavior which is acceptable to others in
online community.
18. 1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in
real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.
20. is a research method in
collecting and gathering information via
internet by using search engine such as
google.
is a program that allows users
to search for content on internet.
21. Examples of Search Engine
Google Aol Search Wow Baidu
Web Crawler Yahoo! Search MyWebSearch Wolframalpha
Bing Info Dogpile DuckDuckGo
Ask Infospace Contenko Internet
Archive
22. Getting the correct and reliable information is our goal
in internet research. We may rely on the capability of
search engine but sometimes it may not give us the
correct information because of the keywords we
entered into a search engine. There are techniques in
searching information that can be applied in search
engine in order to get a better result. Some search
engines allow combination of words and logic
connectors of AND, OR, and NOT.
23. Tips for Effective Internet Research by George Mathews
Know what kind of research you want to do.
Make a list of keywords you will use in your search.
Enclose keywords in quotation marks.
Use the minus sign (-).
Try specialized search engines.
Skim through search results web pages.
Bookmark
Review your bookmarks.
24. Online Research Skills by Hannah Trierweiler
Hudson
Check Your Sources
Ask Good Questions
Go Beyond the Surface
Be Patient
Respect Ownership
Use Your Networks
25. Copyright Issues
There are millions of information that we can get from the internet.
Some of this information are free but others are not. They are
protected by a copyright law.
What is Copyright?
Copyright is a protection given to the owner of the rights in an original
work such as books, musical works, films, paintings, and other works,
and computer programs. This original work is called intellectual
property which is protected under Republic Act 8293 known as the
“Intellectual Property Code of the Philippines”.
26. Copyright Infringement
This happens when the copyrighted work is use by other person without
permission of the author or copyright holder. Any person who is infringing the
right protected work would be liable under the law. An example of this is the case
of M.Y. Intercontinental Trading Corporation (MITC), Tedwin T. Uy, Allianz
Marketing and Publishing Corp. (Allianz), and Fujian New Technology Color
Making and Printing Company, LTD (Fujian) against St. Mary’s Publishing
Corporation (SMPC). Manila regional trial court ordered Fujian and its partners to
pay P24.7 million for the damages and cost of litigation for copyright infringement
to SMPC. Fujian and its three local partners was guilty of printing, copying,
reproducing, importing, distributing and selling of original and revised textbooks
that they have illegally sold to Department of Education in Zamboanga,
Municipality of Cabuyao in Laguna and Municipality of Matnog in Sorsogon
without the approval of SMPC, the copyright owner of the textbooks.
27. Fair Use
Research is important to the students and other people. Most of them rely on the
information that they can get online. Although this information is protected by a
copyright law but we can still use this information without permission in a limited
way under certain condition and purpose.
Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and other similar purpose is not an infringement
of copyright.
Example of this is when you post a quote from a person in your Facebook wall.
Include the name of person who owns the quote in your post. Another example is
when you copy image from internet, give credit to the creator of image. The
copied image should be use for educational purpose not for commercial use.
In fair use, 5% of the content of reference can only be copied. If 20% or less of
reference copied, there must be a secondary use agreement and fee. And if 20%
or more of reference copied, it requires purchasing of creative work.
28. Guidelines for Fair Use
Majority of the contents created must be
yours.
Give credit to the owner.
Don’t make profit of the copyrighted work.
29. Developing ICT content for specific purposes
Productivity Tools
It refers to the software that people use to create and
produce documents, presentations, databases, charts,
and graphs.
Productivity tools helps you create professional quality
documents, presentation, graphics, and more.
30. Why should you learn productivity tools?
While there are a wide range of benefits of using productivity tools, the best
reason is that it just makes essential, everyday we use computer to do different
task for more efficient.
Common productivity tools
Microsoft word
Microsoft excel
Microsoft PowerPoint
LibreOffice
31. Tools/Techniques Use Case
1. Mail Merge and label generation Mass email or printed letters
2. Custom animation and timing Enhance viewer experience
3. Hyperlinking in presentations
Optimizes use of related content and
references. Applies to
Word/Write document too.
4. Integrating images and external
materials in word processor
Enriches textual content. Also useful in
presentation slides and sometimes in
spreadsheets.
5. Embedded files and data Seamlessly integrates related files
6. Advanced and complex formulasand
computations
Simplifies and automates common tasks.
32. Mail Merge
It is a Word’s way of generating mass mailings. It involves combining a list of
names and addresses to individually address to each person / receiver on the list.
You can use Mail Merge to create envelopes or address labels, as well as form
letters.
Mail Merged involved the following documents;
Main document – this document contains text and graphics. Example body of the
letter.
Mailing list – this is your data source that is used to populate information in the
letter. It contains names and address of the recipients.
Merged document - this document the combination of the main document
33. Opening Microsoft Word Program. (Click Start button, type Word and click OK.
On the Mailings tab, click Start Mail Merge, and then select Letters. This will
allow you to sent letters to a group of people and personalize, the result of the
letter that each person receives.
34. Custom Animation
Animation is a simulation of movement created by displaying a series of pictures,
or frames. Animation on computers is one of the chief ingredients of multimedia
presentations. There are many software applications that enable you to create
animations that you can display on a computer monitor. One of this application
software are presentation software that you can use to create a slide show for
your presentation. Some of the
popular software that are available online for free or for purchase are WPS Office,
LibreOffice, and MS-PowerPoint.
35. Steps in applying animation effect to an object:
On a slide in Normal view, select the object you want to animate.
Select Slide Show – click Animations tab, in the Animation group, select your
desired effect or click dropdown button to choose more effects. To preview the
animation, click the Preview button to play.
36. Add a motion path animation effect
You can apply motion path animation effects to an object to move in a sequence
that tells an effective story.
Add a motion path to an object
Select the object that you want to animate.
On the Animation tab, click Add Animation.
Scroll down Motion Paths and select one.
- If you want to create a customize path, Select Custom Path option, and draw
path that you want the object to move.
37. Editing motion paths
to do things like to change the direction of the motion path, edit the individual
points of the motion path, or to lock ( make it so others can’t change your
animation ) or unlock the animation, Effect Options.
to preview the motion path, click the object on the slides, and click Animation
and select Preview.
Remove an animation effect from an object
On the slide in a Normal view, select the object from which to remove the effect.
On the Animation tab, in the Animation
group, click None to remove the effect.
38. Hyperlink
A hyperlink or simply a link, is a reference data that the reader can directly follow
either by clicking or tapping. Hyperlinks are found in nearly all Web pages,
allowing users to click their way from one page to another. In text hyperlinks are
often color blue and underlined. When you move the cursor over a hyperlink,
whether it is text, button or an image, the arrow cursor should be change to a
small hand pointing to the link.
Hyperlinks have to basic parts:
The Address – can be webpage, email address, or other location they are linking.
The Display – can be picture or shape.
Example:
https://www.microsoft.com - address
microsoft - display text
https://www.microsoft.com - address at the same time display text
39. Select Existing File or Web page, and choose the:
Text to display: type the text that you want to appear as hyperlink.
ScreenTip: Type the text that you want to appear when the user hovers over the hyperlink
(optional).
Current Folder, Browsed Pages, or Recent Files: Select where you want to link to.
Address: if you haven’t already selected a location above, insert the URL for the website you want to link to.
40. Link a slide in the same presentation
Opening PowerPoint program. (click Start button, type PowerPoint and press
Enter)
Select the text, shape, or picture that you want to use as a hyperlink.
Select Insert tab > Links group, click Link button and select an option:
Place in This Document: Link to a specific slide in your presentation.
Create New Document: Link from your presentation to another presentation.
E-mail Address: Link a displayed email address to open up a user's email
program.
41. Change the color of a hyperlink
You can also change the color of a hyperlink. If you want to change the display text
of a link to blue or any other color.
Select the hyperlink you want to re-color.
On the Home tab of the ribbon, select down arrow next to the Font Color button
to open the menu of colors.
Select the appropriate color that you want for the hyperlink.
42. Integrating Images
In Microsoft word processing you can do a lot of things to make your documents
look good and presentable. One of its function is to integrate image. Word
processing refers to an application program for manipulating text-based
documents; the electronic equivalent of paper, pen, typewriter, eraser, and most
likely, dictionary and thesaurus. Word processors run the scope from simple
through complex, but all ease the tasks associated with editing documents
(deleting, inserting, rewording, and so on).
43. Electronic Spreadsheet
According to emerald.com electronic spreadsheet is probably the most useful
general-purpose software for the microcomputer user. Almost all spreadsheets
are now packaged in combination with other applications, such as database
system and graphic capabilities. Electronic spreadsheet refers
to a collection of text and numbers laid out in a
44. Electronic Spreadsheet
According to emerald.com electronic spreadsheet is probably the most useful general-purpose software for the
microcomputer user. Almost all spreadsheets are now packaged in combination with other applications, such as
database system and graphic capabilities. Electronic spreadsheet refers
to a collection of text and numbers laid out in a rectangular grid. It is an application program commonly used for
budgeting, inventory management, decision making, forecasting and other finance-related tasks.
It replaces the traditional financial modeling tools, the accountant’s columnar pad, pencil and calculator. It a
spreadsheet program, data and formulas used to calculate those data are entered into ledge-like forms
(Spreadsheets or Worksheets) for analysis, tracking, planning, or “what-if” evaluations of the impact of real or
proposed changes on an economic strategy.
A great free alternative spreadsheet program is LibreOffice Calc, and OpenOffice spreadsheet program.
45. Arithmetic operations
Formula – is an equation that performs operation on worksheet data. A formula in Microsoft Excel always begins
with an equal sign (=).
ARITHMETIC OPERATORS /SYMBOLS OPERATION EXAMPLE
+ (Plus Sign) Addition =A1+A2
- (Minus Sign) Subtraction =A1-A2
* (Asterisk) Multiplication =A1*A2
/ (Forward Slash) Division =A1/A2
^ (Exponentiation) Raises a no. to a
power
=3^2
- (Negation) Negative -11
% (Percent Sign) Percentage =90%