SlideShare a Scribd company logo
1 of 51
EMPOWERMENT
TECHNOLOGY
ICT
 It is the umbrella that includes any communication device or
application, encompassing; radio, television, computer and etc.
 Is the main method of communication ,getting information and
education , attaining services and expressing social advocacies.
THE CURRENT STATE OF AN ICT
Web 1.0
 There is no user interaction
 Read only web
 Web pages were static
 No direct comment available
WEB 2.0
 USED AROUND 2004
 BECOME MORE AND MORE INTERACTIVE
 USED OF SOCIAL MEDIA BEGINS
 THE USER CAN INTERACT,CONTRIBUTE,AND CREATE
THEIR OWN INTERNET SPACE AND CONTENT.
 WEB 3.0
 DISCOVEREDBY TIMBERNER’SLEE
 REFERREDTOASSEMANTICWEBOR DATADRIVENWEB
CONTENTANDRESPONSE
TECHNOLOGY CONVERGENCE
 IT IS AN EVOLUTION OF TECHNOLOGICAL
DEVELOPMENT THAT MERGE INTO A NEW SYSTEM
BRINGING TOGETHER DIFFERENT TYPES OF
APPLICATION AND MEDIA
SOME ARE THE DIFFERENT TYPE OF APPLICATIONTHAT CONVERGE
NOWADAYS
SOCIAL MEDIA -IT IS A COLLECTION OF INTERNET BASED COMMUNICATION
TOOLS
-DEDICATED TO ALLOW USER TO INTERACT
FACEBOOK -IT IS A FREE SOCIAL NETWORKING SITE
-ALLOWS IT USER TO CREATE PROFILES
TWEETER -300 MILLION USERS IN 2016
-ALLOWS USER TO MICROBLOG OR
BROADCAST SHORT MESSAGES CALLED
“TWEETS”
INSTAGRAM -ENABLES TO USER TO FREE SHARE
MOBILE PHOTO AND VIDEO EITHER
PUBLICY OR PRIVATELY
SNAPCHAT -DESIGNED FOR PHOTO
SHARING,CHAT,AND MESSAGING
SERVICES
ASSISTIVE MEDIA -FOUNDED IN 1996
-READING SERVICES WITH VISUAL AND
READING IMPAIRMENTS
DANGEROUS ON ONLINE
EMAILSPAM
 KNOWN AS JUNK EMAIL,USUALLY UNSOLICITED COMMERCIAL EMAIL SENT FROM ONE SOURCE
WITH IDENTICAL MESSAGE TO SENT TO MULTIPLE RECIPIENTS.
 SPAMMER IS TERM USED TO REFER TO A PERSON WHO CREATES ELECTRONIC SPAM.
EMAIL SPOOFING
 A DECEITFUL EMAIL PRACTICE IN WHICH THE SENDER IS CHANGE, SO THAT IT WOULD APPEAR TO
HAVE CAME FROM DIFFERENT SOURCES USUALLY SOMEONE YOU KNOW.
 USUALLY USED BY SPAMMER TO HIDE THE ORIGIN OF THE SPAM.
 PHISHING
 A DECEITFUL PRACTICE OF TRYING TO GET CONFIDENTIAL
INFORMATION SUH AS PASSWORDS AND USERNAME AND
CREDIT CARD DETAILS BY MAKING IT APPEAR AS IT COMES
FROM TRUSTWORTHY SOURCE.
 PHARMING
 A DANGEROUS HACKER ATTACK ON A WEBSITE WHICH DIRECTS ALL TRAFFIC
TO THAT WEBSITE TO ANOTHER FICTITIOUS WEBSITE.
 SPYWARE
 IT IS A COMPUTER PROGRAM THAT IT IS INSTALLED CONVERTLY ON A PERSON
COMPUTER TO COLLECT INFORMATION OR EVEN TAKE CONTROL OVER THE
COMPUTER WITHOUT KNOWLEDGE OF THE USER.
 COMPUTER WORM
 IS A DANGEROUS COMPUTER PROGRAM THAT REPLICATES ITSELF THROUGH A
NETWORK.
 SOME WORMS DELETE FILES OTHERS DISRUPT THE NETWORK FUNCTION AND
STILL,OTHERS SEND JUNK MAIL FROM EFFECTED FILES.
 TROJANHORSE
 A MALLICIOUSSOFTWARE FRONTING TO PERFORM A GOOD TASK BUT CORRECTLY
PERFORMSUNDESIRABLEFUNCTIONS WITH INTENTIONS OF ENTERINGTHE
COMPUTERWITHOUT THE USER CONSENT.
 CAN ERASE DATA ,CAN ALLOW ACCESS THE COMPUTERVICTIMS
 COMPUTERVIRUS
 PROGRAM THAT DUPLICATES ITSELF AND INFECTS THE COMPUTER VIRUS,WHEREIN
IT ATTACKS ITSELF TO HOST PROGRAM AND INFECT OTHER COMPUTER.
 ITS SPREAD LIKE A BIOLOGICAL worm
HACKER
 A PERSON WHO IS ABLE TO ENTER THE CONTROL OTHERS PEOPLE
WITHOUT AUTHORIZATION
 BE ABLE TO ENTER ANOTHERS COMPUTER,USUALLR VANDALIZES
THE VICTIMS WEBSITE, STEALS PERSON INFORMATION,OBTAINS
INTELLECTUAL PROPERTY AND PERFOMS CREDIT CARD FRAUD.
SOME POSSIBLE WAYS
TO PROTECT IN
DANGER ONLINE
SECURITY CENTER
 THE PLACE WHERE YOU CAN SET ADDITIONAL PROTECTION FROM THREAT
TO YOUR COMPUTER,ESPECIALLY WHEN USING THE INTERNET.
FIREWALL
 HELPS IN PROTECTING YOUR COMPUTER FROM UNAUTORIZED
ENTRIES,VIRUSES OR WORMS FROM THE INTERNET.
 AUTHOMATIC UPDATES
 ANOTHER FEATURE OF WINDOWS WHICH WHEN TURNED ON WILL
AUTOMICALLY DOWNLOAD UPDATES FROM MICROSOFT WINDOWS WEBSITE.
 VIRUS PROTECTION
 IS USUALLY ABOUT THE CURRENT ANTIVIRUS SOFTWARE INSTALLED IN YOUR
COMPUTER.
 ANTIVIRUS
 SOFTWARE IS MEANT TO LOCATE,FIND AND REMOVE VIRUS THREATS THAT
ALREADY IN YOUR COMPUTER
CONTEXTUAL SEARCH
 ATTEMPT TO BE MORE PRECISE IN PROVIDING THE LIST DOCUMENTS
ACCORDING THE WORDS USED BY THE USER TO SEARCH THE INTERNET
 A GOOD CONTEXTUAL SEARCH ENGINE WOULD FOR MORE INFORMATION
TO NARROW DOWN THE RESULT OF THE SEARCH.
 STEPS FOR RESEARCH
 IDENTIFY OR CHOOSE A TOPIC
 TOPIC OR TASK DEFINITION
 IDENTIFY METHODS OF RESEARCH
 IDENTIFY RESOURCES OF YOUR RESEARCH
 COMPILING THE RESEARCH RESULTS
 EVALUATE THE RESULT OF YOUR RESEARCH
 CREATE A LIST OF YOUR REFENCES FOR CITATION
SKILLS IN RESEARCH
 CRITICAL THINKING
 IT IS THE ABILITY TO DIGEST, REFLECT,AND CONCLUDE FROM THE
INFORMATION SEARCHED.
 ANALYTICAL THINKING
 THE ABILITY TO LOOK, VARBALIZE, CONCEPTUALIZE, AND GATHER
DATA ATTUNED TO THE CONTEXT OF THE SUBJECT.
 THE ABILITY TO APPLY SYNTHESIS, FOCUS AND CRITICAL THINKING
TO EXTRACT THE USEFUL INFORMATION.
PROBLEMSOLVING CAPABILITY
 THE ABILITY TO PRESENT SOLUTIONS OR SOLVE PROBLEMS BY
PRESENTING A DECITION BASED ON THE GIVEN INFORMATION.
 PEOPLE WITH THIS ABILITY ARE ABLE TO DEFINE AND IDENTIFY
THE LATITUDE OF THE PROBLEM AND PRESENT ALL POSSIBLE
SOLUTIONS.
 ORGANIZED DATA MINING
 IT IS THE ABILITY TO ORGANIZED AND CATALOGUE ALL COLLECTED
MATERIALS EFFICIENTLY DESPITE DATA SIZE.
 ARCHPRESENTATION
 IT RESEIS THE ABILITY TO PRESENT IDEAS AND DRAW
CONCLUSIONS FROM THE RESEARCH.
 BE ABLE TO EXPLAIN IN WRITING THE PURPOSE, STEPS,GOALS AND
OBJECTIVE OF THE RESEARCH.
 CREATIVITY AND DEVELOPMENT IMAGINATION
 IT IS THE ABILITY TO LOOK FOR ALTERNATIVE SOLUTIONS TO THE
PROBLEMS NEEDED TO SOLVE IN THE RESEARCH.
 COMPUTER LITERACY
 KNOWLEDGE OF THE VARIOUS COMPUTER
APPLICATIONS AND TOOLS.
 SKILLS IN THE USE OF SOFTWARE TO DESIGN, AND
PRESENT.
 STEPS in MAKING CONTEXTUALIZE SEARCH
o Open the google first.
o On the upper right side of the window click the google apps a icon
and click search G.
o On the lower right part of the window click settings add the google
search setting POP-UP list win appear.
o Click advance search and advance search window will appear.
 LIST OF TOP SOURCES OF SATIRICAL NEWS
1. Adobo chronicles
2. SO, WHAT’S NEWS??
3. Eritas what news word press-com
4. The professional haitler
 LIST OF AMERICAN SATIRICAL SITES IN
THE U.S
1. The onion
2. Clickhole
3. Cristwire global
Mail Merge and Label Generation
• Is used to automatically add mailing addresses or personalized
informations.
 MailMerge Merges data into a
publication which will be
printed and mail shows
step by step mail merge
wizard.
 Email merge
o Merges data into a publication that will be sent as email
 Select recipient list
o Choose the people to intend the letter
 Edit recipient list
o Make changes to the list receipient and decide which of them should
receive your letter.
Parts of mail merge
 Recipient list
 Publication with merge fields
 Merged
 Click ok
 Step in creating recipient list
1. Creating a recipient list
2. Prepare your publication
3. Create, merged publication
4. Add to existing publication
Generating labels
 Labels in generating for envelopes that you intend to send out
to persons usually containing the name, address or telephone.
 Steps in generating labels
1. Start a new document in MS world
2. Go to the mailings tab, in the create group, click
labels and the envelope and labels dialog box will
appear.
3. In the address box type the text that you want in the
label
4.Click the insert address if icon if you have an address stored in
the electronic address box.
5.To exchange the font or paragraph formatting select the text ,
click and select the option from the drop down menu.
6.Click option button and labels option dialog box will appear.
7.Select the settings like the type of printer, the supplier produced
your labels sheet and others.
8.After make the settings click ok
9.Under print select full page of the same label or single
label then in the rows and columns boxes enter the
numbers that match the numbers of rows and columns on
the label sheet for the label that you want to print.
10.Click print
How to create slide Presentation
• Open MS PowerPoint application
• Click new and select your preferred design template
• Click insert tab menu and insert text word or any object in the slide.
• Click home tab to insert menu slide in.
MS EXCEL
 Is used to compute costs incurred in the creation
project
 Create tables for finding the reasonable
 Create reports for business or research that you are
doing.
Excel Functions
Sum -calculate the sum of a range of
cells
Average -calculate the arithmetic mean of
the cells
Max -give the maximum value of the
range
Min -give the minimum value of the
range
Count -counts the number of a range in a
cell
If -shows a series of a calculations
Sources of Photos and Graphics
 There are so many sources of photos and graphics.
 Come direct from your camera, old pictures, free from
internet or purchased from the internet.
Some are the list of sources of photos and
graphics
 Personal and professional photos
-taken by amateur or professional using camera
-images are downloaded and stored in the computer
-original and definitely something one would like to work on.
 Scanned images
-those are transferred from printed photos and graphics
-using scanning devices improvement and modification
-mostly old picture photographed from the digital age.
 Stock photos library
-images that are available for sale
-come from cd and DVD format
-they can be used without additional fees
Online stock photos
-found in the world wide web.
-copyright free photos and other media
-you do not have go to the places that you like because there photos
were mostly taken.
Online digital formats for images and text
 File format
-the ways of encoding and storing information to storage
 File format will categorized into 2;
 Proprietaryformats
-controlled by individuals this file format will not available to public
 Openfile format
 These are used to the public that no one has controlled on them.
Digital file format categorized into three major
Uncompressed or raw format
-used for storing original file format it is a flexible but needs bigger
memory to store
 Losslessfile format
-compressed to replicate the original quality but a reduced file size
 Losy file format
-it is a uncompressed file format
Image file format
 Raster image file format
-is means of representing digital images in bits of information for storage
Pixel
-is the smallest information of an image
Basic principles of graphics and layout
 Layout
-is the process of planning and arranging graphics or
text in a page or book.
 Graphic
-is an image or visual representation.
 Symmetrical
-there should be equal weights or elements or
balance
 Asymmetrical
-is not balance there is an artistic
 Basicprinciple
 Text
 Image
 Proximity and harmony
 Color and shape
 Emphasis
Combining text , graphics , andimages
 In your presentation image make your clearer
 Transparent shapes
 Add simple shapes with a slight transparency behind your text to
become clearly.
 Fontsand shape
 Text and background
 Clean and clear background
Basic manipulation using offline or open source
software
Manipulation
-photo editing tools allow you to make manipulate or edit messages
Various offline a open source for image editing
 Picasa
-google free editing and organize image
 Paint.net
-free open source available to window
 Google sketch up
-allow you to create 3d models of houses
 Autodesk pixlr
-free editing that similar to Photoshop
 Adobe Photoshop
-modify and combine and optimize digital photos
and images
 Gimp or gnu image manipulation program
-used for image editing and retouching drawing
and painting other specialized tasks.
Gimp windows
 Toolbox
 Tool options
 Image window
 Layers dialog
 Brushes patterns gradients

More Related Content

What's hot

Empowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and CharizaEmpowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and CharizaPadsromel
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOEmpowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Ybonnica22
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joverynkiersamaco
 
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]niniogolo
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithmhedilyn8556
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene PetereJuliezaMaeGermo
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoVineGono
 
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUInformation communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUashleetimkang
 

What's hot (20)

Empowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and CharizaEmpowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and Chariza
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Christine
ChristineChristine
Christine
 
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOEmpowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
 
Gwapo
GwapoGwapo
Gwapo
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
 
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUInformation communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
 

Similar to Lea pagoyo final(1)

empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obormartinaiza
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technologyniniogolo
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost coldfire007
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology jonaspalen1
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crimejuliakad84
 

Similar to Lea pagoyo final(1) (13)

empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obor
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technology
 
Jovanie garin ict
Jovanie garin ictJovanie garin ict
Jovanie garin ict
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
Shane
ShaneShane
Shane
 
Abegail
AbegailAbegail
Abegail
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crime
 

Recently uploaded

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Lea pagoyo final(1)

  • 2. ICT  It is the umbrella that includes any communication device or application, encompassing; radio, television, computer and etc.  Is the main method of communication ,getting information and education , attaining services and expressing social advocacies.
  • 3. THE CURRENT STATE OF AN ICT Web 1.0  There is no user interaction  Read only web  Web pages were static  No direct comment available
  • 4. WEB 2.0  USED AROUND 2004  BECOME MORE AND MORE INTERACTIVE  USED OF SOCIAL MEDIA BEGINS  THE USER CAN INTERACT,CONTRIBUTE,AND CREATE THEIR OWN INTERNET SPACE AND CONTENT.
  • 5.  WEB 3.0  DISCOVEREDBY TIMBERNER’SLEE  REFERREDTOASSEMANTICWEBOR DATADRIVENWEB CONTENTANDRESPONSE
  • 6. TECHNOLOGY CONVERGENCE  IT IS AN EVOLUTION OF TECHNOLOGICAL DEVELOPMENT THAT MERGE INTO A NEW SYSTEM BRINGING TOGETHER DIFFERENT TYPES OF APPLICATION AND MEDIA
  • 7. SOME ARE THE DIFFERENT TYPE OF APPLICATIONTHAT CONVERGE NOWADAYS SOCIAL MEDIA -IT IS A COLLECTION OF INTERNET BASED COMMUNICATION TOOLS -DEDICATED TO ALLOW USER TO INTERACT FACEBOOK -IT IS A FREE SOCIAL NETWORKING SITE -ALLOWS IT USER TO CREATE PROFILES TWEETER -300 MILLION USERS IN 2016 -ALLOWS USER TO MICROBLOG OR BROADCAST SHORT MESSAGES CALLED “TWEETS” INSTAGRAM -ENABLES TO USER TO FREE SHARE MOBILE PHOTO AND VIDEO EITHER PUBLICY OR PRIVATELY SNAPCHAT -DESIGNED FOR PHOTO SHARING,CHAT,AND MESSAGING SERVICES ASSISTIVE MEDIA -FOUNDED IN 1996 -READING SERVICES WITH VISUAL AND READING IMPAIRMENTS
  • 9. EMAILSPAM  KNOWN AS JUNK EMAIL,USUALLY UNSOLICITED COMMERCIAL EMAIL SENT FROM ONE SOURCE WITH IDENTICAL MESSAGE TO SENT TO MULTIPLE RECIPIENTS.  SPAMMER IS TERM USED TO REFER TO A PERSON WHO CREATES ELECTRONIC SPAM. EMAIL SPOOFING  A DECEITFUL EMAIL PRACTICE IN WHICH THE SENDER IS CHANGE, SO THAT IT WOULD APPEAR TO HAVE CAME FROM DIFFERENT SOURCES USUALLY SOMEONE YOU KNOW.  USUALLY USED BY SPAMMER TO HIDE THE ORIGIN OF THE SPAM.
  • 10.  PHISHING  A DECEITFUL PRACTICE OF TRYING TO GET CONFIDENTIAL INFORMATION SUH AS PASSWORDS AND USERNAME AND CREDIT CARD DETAILS BY MAKING IT APPEAR AS IT COMES FROM TRUSTWORTHY SOURCE.  PHARMING  A DANGEROUS HACKER ATTACK ON A WEBSITE WHICH DIRECTS ALL TRAFFIC TO THAT WEBSITE TO ANOTHER FICTITIOUS WEBSITE.
  • 11.  SPYWARE  IT IS A COMPUTER PROGRAM THAT IT IS INSTALLED CONVERTLY ON A PERSON COMPUTER TO COLLECT INFORMATION OR EVEN TAKE CONTROL OVER THE COMPUTER WITHOUT KNOWLEDGE OF THE USER.  COMPUTER WORM  IS A DANGEROUS COMPUTER PROGRAM THAT REPLICATES ITSELF THROUGH A NETWORK.  SOME WORMS DELETE FILES OTHERS DISRUPT THE NETWORK FUNCTION AND STILL,OTHERS SEND JUNK MAIL FROM EFFECTED FILES.
  • 12.  TROJANHORSE  A MALLICIOUSSOFTWARE FRONTING TO PERFORM A GOOD TASK BUT CORRECTLY PERFORMSUNDESIRABLEFUNCTIONS WITH INTENTIONS OF ENTERINGTHE COMPUTERWITHOUT THE USER CONSENT.  CAN ERASE DATA ,CAN ALLOW ACCESS THE COMPUTERVICTIMS  COMPUTERVIRUS  PROGRAM THAT DUPLICATES ITSELF AND INFECTS THE COMPUTER VIRUS,WHEREIN IT ATTACKS ITSELF TO HOST PROGRAM AND INFECT OTHER COMPUTER.  ITS SPREAD LIKE A BIOLOGICAL worm
  • 13. HACKER  A PERSON WHO IS ABLE TO ENTER THE CONTROL OTHERS PEOPLE WITHOUT AUTHORIZATION  BE ABLE TO ENTER ANOTHERS COMPUTER,USUALLR VANDALIZES THE VICTIMS WEBSITE, STEALS PERSON INFORMATION,OBTAINS INTELLECTUAL PROPERTY AND PERFOMS CREDIT CARD FRAUD.
  • 14. SOME POSSIBLE WAYS TO PROTECT IN DANGER ONLINE
  • 15. SECURITY CENTER  THE PLACE WHERE YOU CAN SET ADDITIONAL PROTECTION FROM THREAT TO YOUR COMPUTER,ESPECIALLY WHEN USING THE INTERNET. FIREWALL  HELPS IN PROTECTING YOUR COMPUTER FROM UNAUTORIZED ENTRIES,VIRUSES OR WORMS FROM THE INTERNET.
  • 16.  AUTHOMATIC UPDATES  ANOTHER FEATURE OF WINDOWS WHICH WHEN TURNED ON WILL AUTOMICALLY DOWNLOAD UPDATES FROM MICROSOFT WINDOWS WEBSITE.  VIRUS PROTECTION  IS USUALLY ABOUT THE CURRENT ANTIVIRUS SOFTWARE INSTALLED IN YOUR COMPUTER.  ANTIVIRUS  SOFTWARE IS MEANT TO LOCATE,FIND AND REMOVE VIRUS THREATS THAT ALREADY IN YOUR COMPUTER
  • 17. CONTEXTUAL SEARCH  ATTEMPT TO BE MORE PRECISE IN PROVIDING THE LIST DOCUMENTS ACCORDING THE WORDS USED BY THE USER TO SEARCH THE INTERNET  A GOOD CONTEXTUAL SEARCH ENGINE WOULD FOR MORE INFORMATION TO NARROW DOWN THE RESULT OF THE SEARCH.
  • 18.  STEPS FOR RESEARCH  IDENTIFY OR CHOOSE A TOPIC  TOPIC OR TASK DEFINITION  IDENTIFY METHODS OF RESEARCH  IDENTIFY RESOURCES OF YOUR RESEARCH  COMPILING THE RESEARCH RESULTS  EVALUATE THE RESULT OF YOUR RESEARCH  CREATE A LIST OF YOUR REFENCES FOR CITATION
  • 20.  CRITICAL THINKING  IT IS THE ABILITY TO DIGEST, REFLECT,AND CONCLUDE FROM THE INFORMATION SEARCHED.  ANALYTICAL THINKING  THE ABILITY TO LOOK, VARBALIZE, CONCEPTUALIZE, AND GATHER DATA ATTUNED TO THE CONTEXT OF THE SUBJECT.  THE ABILITY TO APPLY SYNTHESIS, FOCUS AND CRITICAL THINKING TO EXTRACT THE USEFUL INFORMATION.
  • 21. PROBLEMSOLVING CAPABILITY  THE ABILITY TO PRESENT SOLUTIONS OR SOLVE PROBLEMS BY PRESENTING A DECITION BASED ON THE GIVEN INFORMATION.  PEOPLE WITH THIS ABILITY ARE ABLE TO DEFINE AND IDENTIFY THE LATITUDE OF THE PROBLEM AND PRESENT ALL POSSIBLE SOLUTIONS.  ORGANIZED DATA MINING  IT IS THE ABILITY TO ORGANIZED AND CATALOGUE ALL COLLECTED MATERIALS EFFICIENTLY DESPITE DATA SIZE.
  • 22.  ARCHPRESENTATION  IT RESEIS THE ABILITY TO PRESENT IDEAS AND DRAW CONCLUSIONS FROM THE RESEARCH.  BE ABLE TO EXPLAIN IN WRITING THE PURPOSE, STEPS,GOALS AND OBJECTIVE OF THE RESEARCH.  CREATIVITY AND DEVELOPMENT IMAGINATION  IT IS THE ABILITY TO LOOK FOR ALTERNATIVE SOLUTIONS TO THE PROBLEMS NEEDED TO SOLVE IN THE RESEARCH.
  • 23.  COMPUTER LITERACY  KNOWLEDGE OF THE VARIOUS COMPUTER APPLICATIONS AND TOOLS.  SKILLS IN THE USE OF SOFTWARE TO DESIGN, AND PRESENT.
  • 24.  STEPS in MAKING CONTEXTUALIZE SEARCH o Open the google first. o On the upper right side of the window click the google apps a icon and click search G. o On the lower right part of the window click settings add the google search setting POP-UP list win appear. o Click advance search and advance search window will appear.
  • 25.  LIST OF TOP SOURCES OF SATIRICAL NEWS 1. Adobo chronicles 2. SO, WHAT’S NEWS?? 3. Eritas what news word press-com 4. The professional haitler
  • 26.  LIST OF AMERICAN SATIRICAL SITES IN THE U.S 1. The onion 2. Clickhole 3. Cristwire global
  • 27. Mail Merge and Label Generation • Is used to automatically add mailing addresses or personalized informations.  MailMerge Merges data into a publication which will be printed and mail shows step by step mail merge wizard.
  • 28.  Email merge o Merges data into a publication that will be sent as email  Select recipient list o Choose the people to intend the letter  Edit recipient list o Make changes to the list receipient and decide which of them should receive your letter.
  • 29. Parts of mail merge  Recipient list  Publication with merge fields  Merged  Click ok
  • 30.  Step in creating recipient list 1. Creating a recipient list 2. Prepare your publication 3. Create, merged publication 4. Add to existing publication
  • 31. Generating labels  Labels in generating for envelopes that you intend to send out to persons usually containing the name, address or telephone.
  • 32.  Steps in generating labels 1. Start a new document in MS world 2. Go to the mailings tab, in the create group, click labels and the envelope and labels dialog box will appear. 3. In the address box type the text that you want in the label
  • 33. 4.Click the insert address if icon if you have an address stored in the electronic address box. 5.To exchange the font or paragraph formatting select the text , click and select the option from the drop down menu. 6.Click option button and labels option dialog box will appear. 7.Select the settings like the type of printer, the supplier produced your labels sheet and others.
  • 34. 8.After make the settings click ok 9.Under print select full page of the same label or single label then in the rows and columns boxes enter the numbers that match the numbers of rows and columns on the label sheet for the label that you want to print. 10.Click print
  • 35. How to create slide Presentation • Open MS PowerPoint application • Click new and select your preferred design template • Click insert tab menu and insert text word or any object in the slide. • Click home tab to insert menu slide in.
  • 36. MS EXCEL  Is used to compute costs incurred in the creation project  Create tables for finding the reasonable  Create reports for business or research that you are doing.
  • 37. Excel Functions Sum -calculate the sum of a range of cells Average -calculate the arithmetic mean of the cells Max -give the maximum value of the range Min -give the minimum value of the range Count -counts the number of a range in a cell If -shows a series of a calculations
  • 38. Sources of Photos and Graphics  There are so many sources of photos and graphics.  Come direct from your camera, old pictures, free from internet or purchased from the internet.
  • 39. Some are the list of sources of photos and graphics  Personal and professional photos -taken by amateur or professional using camera -images are downloaded and stored in the computer -original and definitely something one would like to work on.
  • 40.  Scanned images -those are transferred from printed photos and graphics -using scanning devices improvement and modification -mostly old picture photographed from the digital age.  Stock photos library -images that are available for sale -come from cd and DVD format -they can be used without additional fees
  • 41. Online stock photos -found in the world wide web. -copyright free photos and other media -you do not have go to the places that you like because there photos were mostly taken.
  • 42. Online digital formats for images and text  File format -the ways of encoding and storing information to storage  File format will categorized into 2;  Proprietaryformats -controlled by individuals this file format will not available to public  Openfile format  These are used to the public that no one has controlled on them.
  • 43. Digital file format categorized into three major Uncompressed or raw format -used for storing original file format it is a flexible but needs bigger memory to store  Losslessfile format -compressed to replicate the original quality but a reduced file size  Losy file format -it is a uncompressed file format
  • 44. Image file format  Raster image file format -is means of representing digital images in bits of information for storage Pixel -is the smallest information of an image
  • 45. Basic principles of graphics and layout  Layout -is the process of planning and arranging graphics or text in a page or book.  Graphic -is an image or visual representation.  Symmetrical -there should be equal weights or elements or balance
  • 46.  Asymmetrical -is not balance there is an artistic  Basicprinciple  Text  Image  Proximity and harmony  Color and shape  Emphasis
  • 47. Combining text , graphics , andimages  In your presentation image make your clearer  Transparent shapes  Add simple shapes with a slight transparency behind your text to become clearly.  Fontsand shape  Text and background  Clean and clear background
  • 48. Basic manipulation using offline or open source software Manipulation -photo editing tools allow you to make manipulate or edit messages
  • 49. Various offline a open source for image editing  Picasa -google free editing and organize image  Paint.net -free open source available to window  Google sketch up -allow you to create 3d models of houses  Autodesk pixlr -free editing that similar to Photoshop
  • 50.  Adobe Photoshop -modify and combine and optimize digital photos and images  Gimp or gnu image manipulation program -used for image editing and retouching drawing and painting other specialized tasks.
  • 51. Gimp windows  Toolbox  Tool options  Image window  Layers dialog  Brushes patterns gradients