EMPOWERMENT
TECHNOLOGY
BY: JUNEL SAMACO
MARIAN MORALES
ICT(INFORMATION
COMMUNICATION TECHNOLOGY)
It is an umbrella that includes any communication devices or
application,encompassing : radio,television,computer and etc.
Is the main method of communication getting information and education ,attaining
services and expressing social advocacies and awareness.
ICT CAN BE USED IN DIFFERENT
FIELDS
• ICT IN EDUCATION
• ICT IN COMERS
• ICT IN SPORTS & RECREATION
• ICT IN HEALTH SERVICES
• ICT IN ENGINEERING & ARCHITECTURE
• ICT IN TRAVEL & HOTEL BOOKINGS
WWW-WORLD WIDE WEB
Web 1.0 version
In this stage of internet technology there were few web content creators and many
of them were so called “ read only web “.
-There were no. USERS INTERACTION .
-Web pages were STATIC .
-The feedback mechanism was thru private email .
-No direct comment available .
• Web 2.0 version
-The term web 2.0 was used around 2004.
-Internet Technology became more and more interactive (used of Social Media
begins).
-The internet became more available to everyone .
-The users can now interact , contribute and create their own internet space and
content .
• Web 3.0 version
-It is discovered by Tim Berners- Lee (Father of the World Wide Web ) as the read-
write-execute web.
-It is referred to as the semantic web or data driven web content and response.
-It will not make the web 2.0 obsolete.
Technology Convergence
-It is an evolution of technological development that merge into a new system
bringing together different types of application and media .
Ex:
Smartphone- as it provides functionality of various individual separate and
different devices now available in one gear . It can function as a telephone , camera ,
radio , TV and gaming console .
Social Media
-It is a collection of internet – based communication tools and computer – assisted
channels dedicated to allow users interact , communicate , and share information in a
virtual community .
Facebook
-Is a popular free social networking site with more than a billion users around the
globe that allows it’s users to create profiles , upload photos and videos .
Twitter
-With more than 300 million users in 2016 .
-Allows users to microblog or broadcast short messages called “Tweets”.
Instragram
-A social networking apps that enables the user to share mobile photo and video
either publicy or privately .
Snapchat
-Designed for the mobile networking application .
-Also designed for photo sharing , chat and messaging services .
-Images and videos shared in this apps last only for a short time and they are gone .
Assistive Media
-It is an nonprofit organization founded in 1996 in Ann Arbor Michigan USA.
-It was the first Internet – based reading service for person with visual and reading
impairments.
DANGERS IN ONLINE
Email Spam
-Known as junk email , usually unsolicited commercial email sent from one source
with identical message to send to multiple recepients.
Spammer-is the term used to refer to a person who creates electronic spam.
Email spoofing
-A deceitful email practice in which the sender address is changed , so that it would
appear to have come from a different sources usually someone you know .
-It is usually used by spammers to hide the origin of the spam .
Phishing
-A deceitful practice of trying to get confidential information such as passwords and
usernames , and credit card details by making it appear as if it comes from a
trustworthy source .
Pharming
-A dangerous hacker attack on a website which directs all traffic to that web site to
another fictitious website .
-It’s main objective it to obtain username and passwords , as well as credit card and
financial information and use these to steal money electronically .
Spyware
-It is a computer program that is installed covertly on a personal computer to collect
information or even take control over the computer without the knowledge of the user
.
Computer Worm
-Is a dangerous computer program that replicates itself through a network
-Some worms delete files ,others disrupt the network function and still , other send
junk email from infected computer .
Trojan horse
-A malicious software fronting to perform a good task , but covertly performs
undesirable function w/ the intention of entering the computer w/out the user’s
consent .
-It can also erase date , can allow access of the victim’s computer .
Computer Virus
-A program that duplicates itself and then infects the computer.
-It spread like a real biological virus , where in it attaches itself to a host program and
infect other .
Hacker
-A person who is able to enter the control other people’s computer w/out
authorization .
Security Center
-It is the place where you can set additional protection from THREAT to your
computer , especially when using the internet .
Fire Wall
-Helps in protecting your computer from unauthorized entries , viruses , or worms
from the internet or network .
Automatic Updates
-Another feature of Windows which when turned on will automatically download
updates from Microsoft Windows Website
Virus Protection
-Is usually about the current antivirus software installed in your computer .
Antivirus Software –meant to locate , find , and remove virus threats that are
already in your computer .
 it also prevents other malware from gaining entry into your computer .
UNLOCKING OF DIFFICULTIES
Contextualize
 Is to place ( something , such as a word or activity) in a context.
Research
The collecting of information about a particular subject .
Strategy
The art of devising or employing plans or stratagems toward a goal.
a careful plan method .
Compilation
The act of process of compiling .
Citation
An act of quoting ; especially the citing of a previously settled case at law .
Contextualized Search
An attempt to more precise in providing the list documents according to the words
used by the user to search the internet .
A good contextual search engine would request for more information to narrow
down the result of the search .
STEP TO MAKE
CONTEXTUALIZED ONLINE
SEARCH
1.Identify or choose a topic
2. Topic or task definition
3.Identify the methods of search
4. Identify resources of your research
5. Make your research strategies
6. Compiling the research results
7. Evaluate the results of your research
8. Create a list of your reference for your citation
RESEARCH SKILLS
Critical Thinking
It is the ability to digest , reflect , and conclude from the information searched .
Analytical Thinking
The ability to look , verbalize, conceptualize and gather data attuned to the context
of subject .
The ability to apply synthesis , focus and critical thinking to extract the useful
information .
Problem Solving Capability
The ability to present solutions or solve problems by presenting a decision based on
the given information .
People with this ability are able to define and identify the latitude of the problem and
present all possible solutions.
Organized Data Mining
It is the ability to organize and catalogue all collected materials efficiently despite
data size .
Research Presentation
It is the ability to present ideas and draw conclusions from the research .
Be able to explain in writing the purpose , steps , goals and objective of the
research .
Creativity and Developed Imaginations
It is the ability to look for alternative solutions to the problems needed to solve in the
research .
Thinking beyond the usual approaches to the research objectives .
Computer Literacy
Knowledge of the various computer applications and tools .
Skills in the use of software to write , design , and present .
STEP IN MAKING A
CONTEXTUALIZED SEARCH
1. Open the Google site
2. On the upper right side of the window , click the Google Apps icon & Search G .
3. On the lower part of the window , click the settings & the Google Search Setting
pop-up list will appear .
4. Click advanced search & the advance search window will appear .
5. Type the keywords that you would like to search .
IDENTIFYING GOOD SOURCE
FROM SATIRICAL SOURCE
• Satirical sites are websites that report untrue or false stories meant to amuse or
entertain .
• These sites take their cue from TV shows that report exaggerated news that are
untrue but intriguing & funny .
• These sites started as spoofs or real publish figures .
• Untrue stories should not be share on your family & friends .
HOW TO DETECT SATIRICAL
NEWS
If it is too good to be true, then it must be so .
If the news did not emanate from reliable news.
If they are from known satirical sites .
TOP SOURCES OF SATIRICAL NEWS
1. Adobo chronicles (adobochronicles.com)
2. So what’s news? (sowhatnews.wordpress.com)
3. Eritas Times (eritastimes.com)
LIST OF AMERICAN SATIRICAL
SITES IN THE U.S
1. The onion (theonion.com)
2. Clickhole (clickhole.com)
3. Christwire global media (christwireglobalmedia)
MAIL MERGE AND LABEL
GENERATION
Mail merge
-is used to automatically add mailings address or personalized information to your
publication .
Mailing Start Group Commands
Mailing
Mail merge Merges data into a publication which will be printed and mailed
shows step by step Mail Merge Wizard .
E-mail merge Merges data into a publication that will be sent as e-mail .
Select recipients Chooses the list of people you intend to send the letter to. You can type
your own list , use your outlook contacts or connect to a data base .
Edit recipients list Make changes to the list of recipients and decide which of them should
receive your letter .
WRITE AND INSERT GROUP
COMMANDS
Insert merge field Adds a field from your recipients list to the publication .
Address block Adds an address to your letter.
Greeting line Adds a greeting line to your letter
Picture Adds a picture field from your recipient list to the publication
Insert personalized hyperlink Insert hyperlink that are customized for each recipients
Format Changes the format for the field context
PARTS OF MAIL MERGE
Step 1: creating a recipient list
Click the mailings tab, go to Start group and click Select Recipients
On the list of options , Select Type New List .
On the New Address List dialog box , click New Entry and type the recipient
information
Click OK
Step 2: prepare your publication
Create your publication in MS Word
Insert any additional text that you want to appear in every version of your mail
merge publication , such as greeting
Step 3: create merged publications
Print
a. Click mail merge to a printer
b. In the print space, select the option you want and click OK
Merge to new publication
a. Click the new publication
b. in the new publication , click save this publication in the Mail Merge task pane
c. Type the name of your new publication and Click Save
Add to existing publication
a. click add to existing publication
b. on the open publication dialog box , locate the publication you want to add and
click open
c. click save this publication in the Mail Merge task pane
GENERATING LABELS
-labels are used for envelopes that you intend to send out persons usually
containing the name , address , or telephone .
Steps In Generating Labels
1. Start a new document in Ms Word
2. Go to the mailings tab, in the Create Group , click labels and the envelope and
labels dialog box will appear
3. In the address box , type the text you want to be placed on the label
4. Click the Insert address icon if you have an address stored in the electronic
address book.
5) To change the Font or Paragraph formating select the text , right – click and select the
option from the drop – down menu .
6) Click the option button and the Label Options dialog box will appear
7) Select the setting like the type of printer , the supplier that produced your labels sheets
and others
8) After you make the settings , Click OK
9) Under print , select Full Page of the same Label or Single Label . Then in the Row and
Column Boxes , enter the numbers that match the numbers of the rows and columns on
the label sheet for the label that you want to print
10) Click Print
WHAT IS MS POWERPOINT ?
Is an application intended for creating a Slide Presentation .
How to create a Slide Presentation
1. Open the Ms Powerpoint application
2. Click new& select your preferred design template
3. Click Insert Tab Menu & insert text , word art or any object in the slides
4. Click Home tab to insert new slide in your presentation
MICROSOFT EXCEL
Is use to compute costs incurred in the creation of projects , or creates tables for
finding the researchers , and then create report , for business or research that you
are doing .
Parts of formula Excel Functions
SOURCES OF PHOTOS AND
GRAPHICS
There are many sources of photos and graphics . They can come direct from your camera
, old pictures , free from internet or purchased from the internet or stores.
1. Personal and professional photos
 are photos taken by amateur or professional photographers using a digital camera
. These images are downloaded and are stored in the computer .They are sources of
images for any project that you may embark . They are original and definitely something
one would like to work on .
2. Scanned Images
 Are those that you are transfer from printed photos and graphics using scanning devices
which you can transfer to your computer for further improvement and modification .
These are mostly old pictures photographed before the digital age .
3. Stock Photo Library
 Are several photographers and created images that are available for sale . They
come in CD or DVD format and many of these images are royalty – free which means
that they can be used w/out additional fees .
4. Online Stock Photos
 Are found in the World Wide Web . The WWW is now the dominant source of photos
and graphics around the globe because of the widely available choices and
reasonable prices . Other sites even offer copyright –free photos and other media .
One advantage of this set –up is that you do not have to go to places where most of
these photos were taken . Another is that before you purchase or get a picture you
can view it and if you decide to buy , simply download it to your computer .
ONLINE DIGITAL FILE FORMATS
FOR IMAGES AND TEXT
A computer will have a certain method of encoding information for storage in the hard drive
or any form of computer storage . The ways of encoding and storing this information to
storage is called file format . Digital file formats are categorists as either proprietary or open
.
Proprietary Formats
 are owned and controlled by individuals or corporations and the file format specifications
are not available to the public . They are usually covered by copyright and the owner has
exclusive control of the present and future technology development of this format . An
example of a proprietary format is the one used is the one used in the storage for Microsoft
Word , Excel, and Powerpoint .
Open formats
Are means and ways for storing digital information that are free, can be used by the
public and are not encumbered by copyrights or patents . These formats are also
called free file formats and the specifications for these formats are usually
sustained and maintained by a group of individuals or organizations . Examples of
these formats are used in the storage for OpenOffice and other free or open
software .
File Formats
Uses suffixes that are added to end of filename called filename extensions . The
file extension is a means of identifying the format of the file , w/ a period before it
after the filename . The file extension has usually 2 or more characters , although
historically there were only three but modern operating systems are not constrained
anymore by the number of characters , more are now allowed .
DIGITAL FILE FORMATS ARE
CLASSIFIED INTO THREE MAJOR
GROUPS
• Uncompressed or raw format
-is usually used for storing original file format it is flexible form but needs bigger
memory to store.
• Lossless file format
-is a file format that was compressed to replicate the original quality but at a
reduced file size . This type is ideal for storing important files(images ,audio , video).
• Lossy file format
IMAGE FILE FORMAT
•Image file format are means of storing
and organizing digital image, photos
and illustratons .
RASTER FILE FORMAT
-is a means of of representing digital images in bits of
information for storage ,with translates into pixels.
PIXEL is the smallest information of an image.
Usually represented in dots & squares
Pix(picture)
El (element)
Is the common formats you will enxcounter
COMMON TYPES OF RASTER
IMAGES
 Dmp bitmap image file.
-developed and used on Microsoft Windows
 Gif graphical interchange format file
-very popular on WWW
-8 bits only
 Jpg JPEG Image File standardlized by the Joint Photographic Experts
Group
-Common method -24 bits .
 png Portable Network Graphic
-is a free , open source bitmap image
-24 bits
 Psd Photoshop Document
- a native file formats for Adobe Photoshop
-it is very popular
VECTOR IMAGE OR VECTOR
GRAPHIC FILES
-are lossless files created using mathematical geometric equations to
represent images in digital computer graphics . It has the advantage of
retaining its quality at any desired image sized.
-preferred format for those who desire quality prints & display of images.
Examples:
pdf , encapsulated postscript , scalable vector , graphics and windows
metafile.
TYPES OF VECTOR IMAGE
FORMAT
 ai Adobe illustration file is the file extension for graphics created using
Adobe Illustrator w/c is created using paths & lines connected by points
instead of bitmaps , w/c may include objects , color , text.
 Drw Drawing file- is the generic drawing created & stored in a vector .
 Ps Postscript file - is a page descriptions language (PDL) developed by Adobe
basically a language for printing documents .
 Svg Scalable vector graphics (svg) is the most common vector graphic format on
the internet , it was developed by the World Wide Web Consortion (W3C) to
display the vector graphics .
BASIC PRINCIPLES O GRAPHICS
AND LAYOUT
Layout
- is the process o planning and arranging graphics or text in a page or book
Graphics
- is an image or visual representation or an object .
Symmetrical
-there should be equal weights or elements .
Assymetrical
-it maybe assymetrical when there is an artistic but other side has different intensity .
Text should be:
Legible
Appropriate font face
Left justified , right justified , and centered
The flow of text should be easy to read
Image should be:
Proportionate
Sharp in color
With high resolution
Proximity and Harmony
The element should be close together and flattered/scattered and arranged apart
from each other .
Consistency of the theme
There should be uniformity of theme on each page.
Example : magazine
Color & shape
- use color to create interest by providing variety in the design ( color contrast &
shape.
Emphasis
- There should be one print of interest in a page .
-the elements to be emphasized should have a different size color , shape or
background .
PRINCIPLES AND BASIC TECHNIQUES
OF IMAGE MANIPULATION
Background color
-you can change background if it does not match the image of the totally of the
presentation . You can add effects to the background .
Multiple image
-you can combine multiple images to make a point or use to highlight your message
.
Shadow
-using shadow effect will make image realistic .
Proportion
-when combining images , resize the image to make it proportionate and realistic .
Blending color
- you can use to match the background with the other elements in the page.
Texture
-adding texture allows you to blend different images . Textures add to the depth of
your art . Blending will allow smooth transition of one image to another .
Emphasis
- there should be a focal point to a page that will attract viewers . The element you
want to emphasized should be sharp big , and most vibrant in your design .
COMBINING TEXT , GRAPHICS
AND IMAGES
Transparent shapes
-add simple shape with a slight transparency behind your text to clearly see .
Fonts and shapes
-should be complement to each other .
Text and background
-should be aligned to have an organized look .
Clean and clear background
-use a clean and clear background for the message to be readable . Background
should not washout your message .
BASIC IMAGE MANIPULATION USING
ONLINE OR OPEN – SOURCE
SOFTWARE
Photo editing and designing tools allow you to manipulate or edit images , apply
effects , filters , add frames , crop , add text , change background color , make
photo collage & photo album that you would like to do in an image .
Various offline or open – source you can use for image editing usable
flatform/application include:
1. Picasa
- is Googles free photo manager to edit & organize your photos . It has tools for
photo editing like crop, straighten , rotate , red-eye removal , contrast , & filters .
2. Paint – net
- is a windows-based alternative to Ms Paint Editor .it is a free and open source
available in windows . It can be used for photo editing like recolor , crop, text edit ,
rotate , multiple layers , and other photo editing work .
3. Google sketch up
-is a free , 3D- modeling program with tools that allow you to create 3D models of
houses , home renovation , woodworking projects , & other with dimensional accuracy
.
4. Autodesk pixlr
- is a free photo editing that similar to Photoshop and has more than 600 effects ,
overlays, and borders that you can use .
5. Adobe Photoshop
-is a tool to create , modify , combine & optimize digital photos and images . It is
used to perform changes such as adjusting brightness & contrast of the images ,
combines different image elements & keep your images organized

ICT

  • 1.
  • 2.
    ICT(INFORMATION COMMUNICATION TECHNOLOGY) It isan umbrella that includes any communication devices or application,encompassing : radio,television,computer and etc. Is the main method of communication getting information and education ,attaining services and expressing social advocacies and awareness.
  • 3.
    ICT CAN BEUSED IN DIFFERENT FIELDS • ICT IN EDUCATION • ICT IN COMERS • ICT IN SPORTS & RECREATION • ICT IN HEALTH SERVICES • ICT IN ENGINEERING & ARCHITECTURE • ICT IN TRAVEL & HOTEL BOOKINGS
  • 4.
    WWW-WORLD WIDE WEB Web1.0 version In this stage of internet technology there were few web content creators and many of them were so called “ read only web “. -There were no. USERS INTERACTION . -Web pages were STATIC . -The feedback mechanism was thru private email . -No direct comment available .
  • 5.
    • Web 2.0version -The term web 2.0 was used around 2004. -Internet Technology became more and more interactive (used of Social Media begins). -The internet became more available to everyone . -The users can now interact , contribute and create their own internet space and content .
  • 6.
    • Web 3.0version -It is discovered by Tim Berners- Lee (Father of the World Wide Web ) as the read- write-execute web. -It is referred to as the semantic web or data driven web content and response. -It will not make the web 2.0 obsolete.
  • 7.
    Technology Convergence -It isan evolution of technological development that merge into a new system bringing together different types of application and media . Ex: Smartphone- as it provides functionality of various individual separate and different devices now available in one gear . It can function as a telephone , camera , radio , TV and gaming console .
  • 8.
    Social Media -It isa collection of internet – based communication tools and computer – assisted channels dedicated to allow users interact , communicate , and share information in a virtual community . Facebook -Is a popular free social networking site with more than a billion users around the globe that allows it’s users to create profiles , upload photos and videos . Twitter -With more than 300 million users in 2016 . -Allows users to microblog or broadcast short messages called “Tweets”.
  • 9.
    Instragram -A social networkingapps that enables the user to share mobile photo and video either publicy or privately . Snapchat -Designed for the mobile networking application . -Also designed for photo sharing , chat and messaging services . -Images and videos shared in this apps last only for a short time and they are gone .
  • 10.
    Assistive Media -It isan nonprofit organization founded in 1996 in Ann Arbor Michigan USA. -It was the first Internet – based reading service for person with visual and reading impairments.
  • 11.
    DANGERS IN ONLINE EmailSpam -Known as junk email , usually unsolicited commercial email sent from one source with identical message to send to multiple recepients. Spammer-is the term used to refer to a person who creates electronic spam. Email spoofing -A deceitful email practice in which the sender address is changed , so that it would appear to have come from a different sources usually someone you know . -It is usually used by spammers to hide the origin of the spam .
  • 12.
    Phishing -A deceitful practiceof trying to get confidential information such as passwords and usernames , and credit card details by making it appear as if it comes from a trustworthy source . Pharming -A dangerous hacker attack on a website which directs all traffic to that web site to another fictitious website . -It’s main objective it to obtain username and passwords , as well as credit card and financial information and use these to steal money electronically .
  • 13.
    Spyware -It is acomputer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user . Computer Worm -Is a dangerous computer program that replicates itself through a network -Some worms delete files ,others disrupt the network function and still , other send junk email from infected computer .
  • 14.
    Trojan horse -A malicioussoftware fronting to perform a good task , but covertly performs undesirable function w/ the intention of entering the computer w/out the user’s consent . -It can also erase date , can allow access of the victim’s computer . Computer Virus -A program that duplicates itself and then infects the computer. -It spread like a real biological virus , where in it attaches itself to a host program and infect other .
  • 15.
    Hacker -A person whois able to enter the control other people’s computer w/out authorization . Security Center -It is the place where you can set additional protection from THREAT to your computer , especially when using the internet . Fire Wall -Helps in protecting your computer from unauthorized entries , viruses , or worms from the internet or network .
  • 16.
    Automatic Updates -Another featureof Windows which when turned on will automatically download updates from Microsoft Windows Website Virus Protection -Is usually about the current antivirus software installed in your computer . Antivirus Software –meant to locate , find , and remove virus threats that are already in your computer .  it also prevents other malware from gaining entry into your computer .
  • 17.
    UNLOCKING OF DIFFICULTIES Contextualize Is to place ( something , such as a word or activity) in a context. Research The collecting of information about a particular subject . Strategy The art of devising or employing plans or stratagems toward a goal. a careful plan method . Compilation The act of process of compiling .
  • 18.
    Citation An act ofquoting ; especially the citing of a previously settled case at law . Contextualized Search An attempt to more precise in providing the list documents according to the words used by the user to search the internet . A good contextual search engine would request for more information to narrow down the result of the search .
  • 19.
    STEP TO MAKE CONTEXTUALIZEDONLINE SEARCH 1.Identify or choose a topic 2. Topic or task definition 3.Identify the methods of search 4. Identify resources of your research 5. Make your research strategies 6. Compiling the research results 7. Evaluate the results of your research 8. Create a list of your reference for your citation
  • 20.
    RESEARCH SKILLS Critical Thinking Itis the ability to digest , reflect , and conclude from the information searched . Analytical Thinking The ability to look , verbalize, conceptualize and gather data attuned to the context of subject . The ability to apply synthesis , focus and critical thinking to extract the useful information .
  • 21.
    Problem Solving Capability Theability to present solutions or solve problems by presenting a decision based on the given information . People with this ability are able to define and identify the latitude of the problem and present all possible solutions. Organized Data Mining It is the ability to organize and catalogue all collected materials efficiently despite data size .
  • 22.
    Research Presentation It isthe ability to present ideas and draw conclusions from the research . Be able to explain in writing the purpose , steps , goals and objective of the research . Creativity and Developed Imaginations It is the ability to look for alternative solutions to the problems needed to solve in the research . Thinking beyond the usual approaches to the research objectives .
  • 23.
    Computer Literacy Knowledge ofthe various computer applications and tools . Skills in the use of software to write , design , and present .
  • 24.
    STEP IN MAKINGA CONTEXTUALIZED SEARCH 1. Open the Google site 2. On the upper right side of the window , click the Google Apps icon & Search G . 3. On the lower part of the window , click the settings & the Google Search Setting pop-up list will appear . 4. Click advanced search & the advance search window will appear . 5. Type the keywords that you would like to search .
  • 25.
    IDENTIFYING GOOD SOURCE FROMSATIRICAL SOURCE • Satirical sites are websites that report untrue or false stories meant to amuse or entertain . • These sites take their cue from TV shows that report exaggerated news that are untrue but intriguing & funny . • These sites started as spoofs or real publish figures . • Untrue stories should not be share on your family & friends .
  • 26.
    HOW TO DETECTSATIRICAL NEWS If it is too good to be true, then it must be so . If the news did not emanate from reliable news. If they are from known satirical sites . TOP SOURCES OF SATIRICAL NEWS 1. Adobo chronicles (adobochronicles.com) 2. So what’s news? (sowhatnews.wordpress.com) 3. Eritas Times (eritastimes.com)
  • 27.
    LIST OF AMERICANSATIRICAL SITES IN THE U.S 1. The onion (theonion.com) 2. Clickhole (clickhole.com) 3. Christwire global media (christwireglobalmedia)
  • 28.
    MAIL MERGE ANDLABEL GENERATION Mail merge -is used to automatically add mailings address or personalized information to your publication . Mailing Start Group Commands Mailing Mail merge Merges data into a publication which will be printed and mailed shows step by step Mail Merge Wizard . E-mail merge Merges data into a publication that will be sent as e-mail . Select recipients Chooses the list of people you intend to send the letter to. You can type your own list , use your outlook contacts or connect to a data base . Edit recipients list Make changes to the list of recipients and decide which of them should receive your letter .
  • 29.
    WRITE AND INSERTGROUP COMMANDS Insert merge field Adds a field from your recipients list to the publication . Address block Adds an address to your letter. Greeting line Adds a greeting line to your letter Picture Adds a picture field from your recipient list to the publication Insert personalized hyperlink Insert hyperlink that are customized for each recipients Format Changes the format for the field context
  • 30.
    PARTS OF MAILMERGE Step 1: creating a recipient list Click the mailings tab, go to Start group and click Select Recipients On the list of options , Select Type New List . On the New Address List dialog box , click New Entry and type the recipient information Click OK Step 2: prepare your publication Create your publication in MS Word Insert any additional text that you want to appear in every version of your mail merge publication , such as greeting
  • 31.
    Step 3: createmerged publications Print a. Click mail merge to a printer b. In the print space, select the option you want and click OK Merge to new publication a. Click the new publication b. in the new publication , click save this publication in the Mail Merge task pane c. Type the name of your new publication and Click Save
  • 32.
    Add to existingpublication a. click add to existing publication b. on the open publication dialog box , locate the publication you want to add and click open c. click save this publication in the Mail Merge task pane
  • 33.
    GENERATING LABELS -labels areused for envelopes that you intend to send out persons usually containing the name , address , or telephone . Steps In Generating Labels 1. Start a new document in Ms Word 2. Go to the mailings tab, in the Create Group , click labels and the envelope and labels dialog box will appear 3. In the address box , type the text you want to be placed on the label 4. Click the Insert address icon if you have an address stored in the electronic address book.
  • 34.
    5) To changethe Font or Paragraph formating select the text , right – click and select the option from the drop – down menu . 6) Click the option button and the Label Options dialog box will appear 7) Select the setting like the type of printer , the supplier that produced your labels sheets and others 8) After you make the settings , Click OK 9) Under print , select Full Page of the same Label or Single Label . Then in the Row and Column Boxes , enter the numbers that match the numbers of the rows and columns on the label sheet for the label that you want to print 10) Click Print
  • 35.
    WHAT IS MSPOWERPOINT ? Is an application intended for creating a Slide Presentation . How to create a Slide Presentation 1. Open the Ms Powerpoint application 2. Click new& select your preferred design template 3. Click Insert Tab Menu & insert text , word art or any object in the slides 4. Click Home tab to insert new slide in your presentation
  • 36.
    MICROSOFT EXCEL Is useto compute costs incurred in the creation of projects , or creates tables for finding the researchers , and then create report , for business or research that you are doing . Parts of formula Excel Functions
  • 37.
    SOURCES OF PHOTOSAND GRAPHICS There are many sources of photos and graphics . They can come direct from your camera , old pictures , free from internet or purchased from the internet or stores. 1. Personal and professional photos  are photos taken by amateur or professional photographers using a digital camera . These images are downloaded and are stored in the computer .They are sources of images for any project that you may embark . They are original and definitely something one would like to work on . 2. Scanned Images  Are those that you are transfer from printed photos and graphics using scanning devices which you can transfer to your computer for further improvement and modification . These are mostly old pictures photographed before the digital age .
  • 38.
    3. Stock PhotoLibrary  Are several photographers and created images that are available for sale . They come in CD or DVD format and many of these images are royalty – free which means that they can be used w/out additional fees . 4. Online Stock Photos  Are found in the World Wide Web . The WWW is now the dominant source of photos and graphics around the globe because of the widely available choices and reasonable prices . Other sites even offer copyright –free photos and other media . One advantage of this set –up is that you do not have to go to places where most of these photos were taken . Another is that before you purchase or get a picture you can view it and if you decide to buy , simply download it to your computer .
  • 39.
    ONLINE DIGITAL FILEFORMATS FOR IMAGES AND TEXT A computer will have a certain method of encoding information for storage in the hard drive or any form of computer storage . The ways of encoding and storing this information to storage is called file format . Digital file formats are categorists as either proprietary or open . Proprietary Formats  are owned and controlled by individuals or corporations and the file format specifications are not available to the public . They are usually covered by copyright and the owner has exclusive control of the present and future technology development of this format . An example of a proprietary format is the one used is the one used in the storage for Microsoft Word , Excel, and Powerpoint .
  • 40.
    Open formats Are meansand ways for storing digital information that are free, can be used by the public and are not encumbered by copyrights or patents . These formats are also called free file formats and the specifications for these formats are usually sustained and maintained by a group of individuals or organizations . Examples of these formats are used in the storage for OpenOffice and other free or open software . File Formats Uses suffixes that are added to end of filename called filename extensions . The file extension is a means of identifying the format of the file , w/ a period before it after the filename . The file extension has usually 2 or more characters , although historically there were only three but modern operating systems are not constrained anymore by the number of characters , more are now allowed .
  • 41.
    DIGITAL FILE FORMATSARE CLASSIFIED INTO THREE MAJOR GROUPS • Uncompressed or raw format -is usually used for storing original file format it is flexible form but needs bigger memory to store. • Lossless file format -is a file format that was compressed to replicate the original quality but at a reduced file size . This type is ideal for storing important files(images ,audio , video). • Lossy file format
  • 42.
    IMAGE FILE FORMAT •Imagefile format are means of storing and organizing digital image, photos and illustratons .
  • 43.
    RASTER FILE FORMAT -isa means of of representing digital images in bits of information for storage ,with translates into pixels. PIXEL is the smallest information of an image. Usually represented in dots & squares Pix(picture) El (element) Is the common formats you will enxcounter
  • 44.
    COMMON TYPES OFRASTER IMAGES  Dmp bitmap image file. -developed and used on Microsoft Windows  Gif graphical interchange format file -very popular on WWW -8 bits only  Jpg JPEG Image File standardlized by the Joint Photographic Experts Group -Common method -24 bits .  png Portable Network Graphic -is a free , open source bitmap image -24 bits  Psd Photoshop Document - a native file formats for Adobe Photoshop -it is very popular
  • 45.
    VECTOR IMAGE ORVECTOR GRAPHIC FILES -are lossless files created using mathematical geometric equations to represent images in digital computer graphics . It has the advantage of retaining its quality at any desired image sized. -preferred format for those who desire quality prints & display of images. Examples: pdf , encapsulated postscript , scalable vector , graphics and windows metafile.
  • 46.
    TYPES OF VECTORIMAGE FORMAT  ai Adobe illustration file is the file extension for graphics created using Adobe Illustrator w/c is created using paths & lines connected by points instead of bitmaps , w/c may include objects , color , text.  Drw Drawing file- is the generic drawing created & stored in a vector .  Ps Postscript file - is a page descriptions language (PDL) developed by Adobe basically a language for printing documents .  Svg Scalable vector graphics (svg) is the most common vector graphic format on the internet , it was developed by the World Wide Web Consortion (W3C) to display the vector graphics .
  • 47.
    BASIC PRINCIPLES OGRAPHICS AND LAYOUT Layout - is the process o planning and arranging graphics or text in a page or book Graphics - is an image or visual representation or an object . Symmetrical -there should be equal weights or elements . Assymetrical -it maybe assymetrical when there is an artistic but other side has different intensity .
  • 48.
    Text should be: Legible Appropriatefont face Left justified , right justified , and centered The flow of text should be easy to read Image should be: Proportionate Sharp in color With high resolution Proximity and Harmony The element should be close together and flattered/scattered and arranged apart from each other . Consistency of the theme There should be uniformity of theme on each page. Example : magazine
  • 49.
    Color & shape -use color to create interest by providing variety in the design ( color contrast & shape. Emphasis - There should be one print of interest in a page . -the elements to be emphasized should have a different size color , shape or background .
  • 50.
    PRINCIPLES AND BASICTECHNIQUES OF IMAGE MANIPULATION Background color -you can change background if it does not match the image of the totally of the presentation . You can add effects to the background . Multiple image -you can combine multiple images to make a point or use to highlight your message . Shadow -using shadow effect will make image realistic . Proportion -when combining images , resize the image to make it proportionate and realistic .
  • 51.
    Blending color - youcan use to match the background with the other elements in the page. Texture -adding texture allows you to blend different images . Textures add to the depth of your art . Blending will allow smooth transition of one image to another . Emphasis - there should be a focal point to a page that will attract viewers . The element you want to emphasized should be sharp big , and most vibrant in your design .
  • 52.
    COMBINING TEXT ,GRAPHICS AND IMAGES Transparent shapes -add simple shape with a slight transparency behind your text to clearly see . Fonts and shapes -should be complement to each other . Text and background -should be aligned to have an organized look . Clean and clear background -use a clean and clear background for the message to be readable . Background should not washout your message .
  • 53.
    BASIC IMAGE MANIPULATIONUSING ONLINE OR OPEN – SOURCE SOFTWARE Photo editing and designing tools allow you to manipulate or edit images , apply effects , filters , add frames , crop , add text , change background color , make photo collage & photo album that you would like to do in an image . Various offline or open – source you can use for image editing usable flatform/application include: 1. Picasa - is Googles free photo manager to edit & organize your photos . It has tools for photo editing like crop, straighten , rotate , red-eye removal , contrast , & filters .
  • 54.
    2. Paint –net - is a windows-based alternative to Ms Paint Editor .it is a free and open source available in windows . It can be used for photo editing like recolor , crop, text edit , rotate , multiple layers , and other photo editing work . 3. Google sketch up -is a free , 3D- modeling program with tools that allow you to create 3D models of houses , home renovation , woodworking projects , & other with dimensional accuracy . 4. Autodesk pixlr - is a free photo editing that similar to Photoshop and has more than 600 effects , overlays, and borders that you can use . 5. Adobe Photoshop -is a tool to create , modify , combine & optimize digital photos and images . It is used to perform changes such as adjusting brightness & contrast of the images , combines different image elements & keep your images organized