2. ICT
It is the umbrella that includes any communication device or
application, encompassing; radio, television, computer and etc.
Is the main method of communication ,getting information and
education , attaining services and expressing social advocacies.
3. THE CURRENT STATE OF AN ICT
Web 1.0
There is no user interaction
Read only web
Web pages were static
No direct comment available
4. WEB 2.0
USED AROUND 2004
BECOME MORE AND MORE INTERACTIVE
USED OF SOCIAL MEDIA BEGINS
THE USER CAN INTERACT,CONTRIBUTE,AND CREATE
THEIR OWN INTERNET SPACE AND CONTENT.
6. TECHNOLOGY CONVERGENCE
IT IS AN EVOLUTION OF TECHNOLOGICAL
DEVELOPMENT THAT MERGE INTO A NEW SYSTEM
BRINGING TOGETHER DIFFERENT TYPES OF
APPLICATION AND MEDIA
7. SOME ARE THE DIFFERENT TYPE OF APPLICATIONTHAT CONVERGE
NOWADAYS
SOCIAL MEDIA -IT IS A COLLECTION OF INTERNET BASED COMMUNICATION
TOOLS
-DEDICATED TO ALLOW USER TO INTERACT
FACEBOOK -IT IS A FREE SOCIAL NETWORKING SITE
-ALLOWS IT USER TO CREATE PROFILES
TWEETER -300 MILLION USERS IN 2016
-ALLOWS USER TO MICROBLOG OR
BROADCAST SHORT MESSAGES CALLED
“TWEETS”
INSTAGRAM -ENABLES TO USER TO FREE SHARE
MOBILE PHOTO AND VIDEO EITHER
PUBLICY OR PRIVATELY
SNAPCHAT -DESIGNED FOR PHOTO
SHARING,CHAT,AND MESSAGING
SERVICES
ASSISTIVE MEDIA -FOUNDED IN 1996
-READING SERVICES WITH VISUAL AND
READING IMPAIRMENTS
9. EMAILSPAM
KNOWN AS JUNK EMAIL,USUALLY UNSOLICITED COMMERCIAL EMAIL SENT FROM ONE SOURCE
WITH IDENTICAL MESSAGE TO SENT TO MULTIPLE RECIPIENTS.
SPAMMER IS TERM USED TO REFER TO A PERSON WHO CREATES ELECTRONIC SPAM.
EMAIL SPOOFING
A DECEITFUL EMAIL PRACTICE IN WHICH THE SENDER IS CHANGE, SO THAT IT WOULD APPEAR TO
HAVE CAME FROM DIFFERENT SOURCES USUALLY SOMEONE YOU KNOW.
USUALLY USED BY SPAMMER TO HIDE THE ORIGIN OF THE SPAM.
10. PHISHING
A DECEITFUL PRACTICE OF TRYING TO GET CONFIDENTIAL
INFORMATION SUH AS PASSWORDS AND USERNAME AND
CREDIT CARD DETAILS BY MAKING IT APPEAR AS IT COMES
FROM TRUSTWORTHY SOURCE.
PHARMING
A DANGEROUS HACKER ATTACK ON A WEBSITE WHICH DIRECTS ALL TRAFFIC
TO THAT WEBSITE TO ANOTHER FICTITIOUS WEBSITE.
11. SPYWARE
IT IS A COMPUTER PROGRAM THAT IT IS INSTALLED CONVERTLY ON A PERSON
COMPUTER TO COLLECT INFORMATION OR EVEN TAKE CONTROL OVER THE
COMPUTER WITHOUT KNOWLEDGE OF THE USER.
COMPUTER WORM
IS A DANGEROUS COMPUTER PROGRAM THAT REPLICATES ITSELF THROUGH A
NETWORK.
SOME WORMS DELETE FILES OTHERS DISRUPT THE NETWORK FUNCTION AND
STILL,OTHERS SEND JUNK MAIL FROM EFFECTED FILES.
12. TROJANHORSE
A MALLICIOUSSOFTWARE FRONTING TO PERFORM A GOOD TASK BUT CORRECTLY
PERFORMSUNDESIRABLEFUNCTIONS WITH INTENTIONS OF ENTERINGTHE
COMPUTERWITHOUT THE USER CONSENT.
CAN ERASE DATA ,CAN ALLOW ACCESS THE COMPUTERVICTIMS
COMPUTERVIRUS
PROGRAM THAT DUPLICATES ITSELF AND INFECTS THE COMPUTER VIRUS,WHEREIN
IT ATTACKS ITSELF TO HOST PROGRAM AND INFECT OTHER COMPUTER.
ITS SPREAD LIKE A BIOLOGICAL worm
13. HACKER
A PERSON WHO IS ABLE TO ENTER THE CONTROL OTHERS PEOPLE
WITHOUT AUTHORIZATION
BE ABLE TO ENTER ANOTHERS COMPUTER,USUALLR VANDALIZES
THE VICTIMS WEBSITE, STEALS PERSON INFORMATION,OBTAINS
INTELLECTUAL PROPERTY AND PERFOMS CREDIT CARD FRAUD.
15. SECURITY CENTER
THE PLACE WHERE YOU CAN SET ADDITIONAL PROTECTION FROM THREAT
TO YOUR COMPUTER,ESPECIALLY WHEN USING THE INTERNET.
FIREWALL
HELPS IN PROTECTING YOUR COMPUTER FROM UNAUTORIZED
ENTRIES,VIRUSES OR WORMS FROM THE INTERNET.
16. AUTHOMATIC UPDATES
ANOTHER FEATURE OF WINDOWS WHICH WHEN TURNED ON WILL
AUTOMICALLY DOWNLOAD UPDATES FROM MICROSOFT WINDOWS WEBSITE.
VIRUS PROTECTION
IS USUALLY ABOUT THE CURRENT ANTIVIRUS SOFTWARE INSTALLED IN YOUR
COMPUTER.
ANTIVIRUS
SOFTWARE IS MEANT TO LOCATE,FIND AND REMOVE VIRUS THREATS THAT
ALREADY IN YOUR COMPUTER
17. CONTEXTUAL SEARCH
ATTEMPT TO BE MORE PRECISE IN PROVIDING THE LIST DOCUMENTS
ACCORDING THE WORDS USED BY THE USER TO SEARCH THE INTERNET
A GOOD CONTEXTUAL SEARCH ENGINE WOULD FOR MORE INFORMATION
TO NARROW DOWN THE RESULT OF THE SEARCH.
18. STEPS FOR RESEARCH
IDENTIFY OR CHOOSE A TOPIC
TOPIC OR TASK DEFINITION
IDENTIFY METHODS OF RESEARCH
IDENTIFY RESOURCES OF YOUR RESEARCH
COMPILING THE RESEARCH RESULTS
EVALUATE THE RESULT OF YOUR RESEARCH
CREATE A LIST OF YOUR REFENCES FOR CITATION
20. CRITICAL THINKING
IT IS THE ABILITY TO DIGEST, REFLECT,AND CONCLUDE FROM THE
INFORMATION SEARCHED.
ANALYTICAL THINKING
THE ABILITY TO LOOK, VARBALIZE, CONCEPTUALIZE, AND GATHER
DATA ATTUNED TO THE CONTEXT OF THE SUBJECT.
THE ABILITY TO APPLY SYNTHESIS, FOCUS AND CRITICAL THINKING
TO EXTRACT THE USEFUL INFORMATION.
21. PROBLEMSOLVING CAPABILITY
THE ABILITY TO PRESENT SOLUTIONS OR SOLVE PROBLEMS BY
PRESENTING A DECITION BASED ON THE GIVEN INFORMATION.
PEOPLE WITH THIS ABILITY ARE ABLE TO DEFINE AND IDENTIFY
THE LATITUDE OF THE PROBLEM AND PRESENT ALL POSSIBLE
SOLUTIONS.
ORGANIZED DATA MINING
IT IS THE ABILITY TO ORGANIZED AND CATALOGUE ALL COLLECTED
MATERIALS EFFICIENTLY DESPITE DATA SIZE.
22. ARCHPRESENTATION
IT RESEIS THE ABILITY TO PRESENT IDEAS AND DRAW
CONCLUSIONS FROM THE RESEARCH.
BE ABLE TO EXPLAIN IN WRITING THE PURPOSE, STEPS,GOALS AND
OBJECTIVE OF THE RESEARCH.
CREATIVITY AND DEVELOPMENT IMAGINATION
IT IS THE ABILITY TO LOOK FOR ALTERNATIVE SOLUTIONS TO THE
PROBLEMS NEEDED TO SOLVE IN THE RESEARCH.
23. COMPUTER LITERACY
KNOWLEDGE OF THE VARIOUS COMPUTER
APPLICATIONS AND TOOLS.
SKILLS IN THE USE OF SOFTWARE TO DESIGN, AND
PRESENT.
24. STEPS in MAKING CONTEXTUALIZE SEARCH
o Open the google first.
o On the upper right side of the window click the google apps a icon
and click search G.
o On the lower right part of the window click settings add the google
search setting POP-UP list win appear.
o Click advance search and advance search window will appear.
25. LIST OF TOP SOURCES OF SATIRICAL NEWS
1. Adobo chronicles
2. SO, WHAT’S NEWS??
3. Eritas what news word press-com
4. The professional haitler
26. LIST OF AMERICAN SATIRICAL SITES IN
THE U.S
1. The onion
2. Clickhole
3. Cristwire global
27. Mail Merge and Label Generation
• Is used to automatically add mailing addresses or personalized
informations.
MailMerge Merges data into a
publication which will be
printed and mail shows
step by step mail merge
wizard.
28. Email merge
o Merges data into a publication that will be sent as email
Select recipient list
o Choose the people to intend the letter
Edit recipient list
o Make changes to the list receipient and decide which of them should
receive your letter.
29. Parts of mail merge
Recipient list
Publication with merge fields
Merged
Click ok
30. Step in creating recipient list
1. Creating a recipient list
2. Prepare your publication
3. Create, merged publication
4. Add to existing publication
31. Generating labels
Labels in generating for envelopes that you intend to send out
to persons usually containing the name, address or telephone.
32. Steps in generating labels
1. Start a new document in MS world
2. Go to the mailings tab, in the create group, click
labels and the envelope and labels dialog box will
appear.
3. In the address box type the text that you want in the
label
33. 4.Click the insert address if icon if you have an address stored in
the electronic address box.
5.To exchange the font or paragraph formatting select the text ,
click and select the option from the drop down menu.
6.Click option button and labels option dialog box will appear.
7.Select the settings like the type of printer, the supplier produced
your labels sheet and others.
34. 8.After make the settings click ok
9.Under print select full page of the same label or single
label then in the rows and columns boxes enter the
numbers that match the numbers of rows and columns on
the label sheet for the label that you want to print.
10.Click print
35. How to create slide Presentation
• Open MS PowerPoint application
• Click new and select your preferred design template
• Click insert tab menu and insert text word or any object in the slide.
• Click home tab to insert menu slide in.
36. MS EXCEL
Is used to compute costs incurred in the creation
project
Create tables for finding the reasonable
Create reports for business or research that you are
doing.
37. Excel Functions
Sum -calculate the sum of a range of
cells
Average -calculate the arithmetic mean of
the cells
Max -give the maximum value of the
range
Min -give the minimum value of the
range
Count -counts the number of a range in a
cell
If -shows a series of a calculations
38. Sources of Photos and Graphics
There are so many sources of photos and graphics.
Come direct from your camera, old pictures, free from
internet or purchased from the internet.
39. Some are the list of sources of photos and
graphics
Personal and professional photos
-taken by amateur or professional using camera
-images are downloaded and stored in the computer
-original and definitely something one would like to work on.
40. Scanned images
-those are transferred from printed photos and graphics
-using scanning devices improvement and modification
-mostly old picture photographed from the digital age.
Stock photos library
-images that are available for sale
-come from cd and DVD format
-they can be used without additional fees
41. Online stock photos
-found in the world wide web.
-copyright free photos and other media
-you do not have go to the places that you like because there photos
were mostly taken.
42. Online digital formats for images and text
File format
-the ways of encoding and storing information to storage
File format will categorized into 2;
Proprietaryformats
-controlled by individuals this file format will not available to public
Openfile format
These are used to the public that no one has controlled on them.
43. Digital file format categorized into three major
Uncompressed or raw format
-used for storing original file format it is a flexible but needs bigger
memory to store
Losslessfile format
-compressed to replicate the original quality but a reduced file size
Losy file format
-it is a uncompressed file format
44. Image file format
Raster image file format
-is means of representing digital images in bits of information for storage
Pixel
-is the smallest information of an image
45. Basic principles of graphics and layout
Layout
-is the process of planning and arranging graphics or
text in a page or book.
Graphic
-is an image or visual representation.
Symmetrical
-there should be equal weights or elements or
balance
46. Asymmetrical
-is not balance there is an artistic
Basicprinciple
Text
Image
Proximity and harmony
Color and shape
Emphasis
47. Combining text , graphics , andimages
In your presentation image make your clearer
Transparent shapes
Add simple shapes with a slight transparency behind your text to
become clearly.
Fontsand shape
Text and background
Clean and clear background
48. Basic manipulation using offline or open source
software
Manipulation
-photo editing tools allow you to make manipulate or edit messages
49. Various offline a open source for image editing
Picasa
-google free editing and organize image
Paint.net
-free open source available to window
Google sketch up
-allow you to create 3d models of houses
Autodesk pixlr
-free editing that similar to Photoshop
50. Adobe Photoshop
-modify and combine and optimize digital photos
and images
Gimp or gnu image manipulation program
-used for image editing and retouching drawing
and painting other specialized tasks.