ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
The document discusses contextualized online search and research skills. It outlines both the strengths and weaknesses of internet research, including speed, sharing information, and potential personal information leaks or incorrect information. It provides tips for effective online research such as checking sources, asking good questions, going beyond the surface, being patient, and respecting ownership. The document also lists popular search engines and describes common digital image file formats like TIFF, JPEG, GIF, PNG, and raw files.
The document describes a case study of a person who experienced identity theft and online scams after downloading unauthorized programs onto their computer. They downloaded a free program that installed spyware without their knowledge. This spyware monitored their internet activity, recorded their keystrokes including passwords and login details, and sent this sensitive information to the software developer. As a result, unauthorized transactions were made using their internet banking and they could no longer access their email account. The person had to change all their account details and get their computer cleaned of the spyware. The case study warns people to be careful about downloading unauthorized programs and to read agreements before installing anything.
This document discusses advanced techniques in Microsoft Word, including mail merge, inserting and formatting various types of illustrations, and customizing SmartArt graphics and charts. It provides step-by-step instructions on how to perform mail merge by creating a main document and data source, and then merging them. It also explains how to insert, format, and design pictures, clipart, shapes, SmartArt, charts, and screenshots in Word documents. The document aims to teach learners how to effectively use these advanced Word features.
The document discusses interactive multimedia, which allows users to control, combine, and manipulate different types of media like text, sound, video, graphics, and animation. It provides examples of uses for interactive multimedia like education, training, games, simulations, and more. Specific examples discussed include using videos on YouTube, audio on SoundCloud, online games like Farmville, online tests and surveys, e-learning courses, podcasts on apps like Spotify, and vodcasts on YouTube. The document emphasizes that these tools should be used wisely to achieve work goals efficiently.
This document provides an introduction to information and communications technology (ICT). It defines ICT as the diverse set of tools used to generate, store, process, spread and share information, including computers, the internet, broadcasting technologies and telephony. The document then discusses ICT in the Philippines, noting its role in business process outsourcing and the government agencies responsible for ICT development. It also outlines trends in ICT like technological convergence, social media, mobile media and assistive technologies. The document concludes by discussing online systems, functions and platforms.
This document discusses various topics related to information and communication technology (ICT). It begins by asking questions about personal technology use and social media checking. It then defines ICT and notes the Philippines' role as an "ICT Hub of Asia" due to growth in the business process outsourcing industry. The document discusses computers, the Internet, websites, hyperlinks, and other foundational aspects of digital technology. It also examines concepts like cloud computing, operating systems, assistive technologies, and the evolution of the World Wide Web. Throughout, it provides definitions and examples to explain key terms and developments in the field of ICT.
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)bloodyblade06
The document discusses empowerment through technology and information communication technology (ICT). It outlines 9 objectives for students to understand how ICT affects their lives and society. It then defines key concepts of ICT - information as knowledge, communication as transmitting messages, and technology as using knowledge to create tools. The document traces the evolution of communication from pigeons to the internet and smartphones. It defines ICT as using electronic devices and software to locate, save, send, edit and retrieve information from anywhere. ICT consists of information technology, computer technology, and communication technology.
The document discusses contextualized online search and research skills. It outlines both the strengths and weaknesses of internet research, including speed, sharing information, and potential personal information leaks or incorrect information. It provides tips for effective online research such as checking sources, asking good questions, going beyond the surface, being patient, and respecting ownership. The document also lists popular search engines and describes common digital image file formats like TIFF, JPEG, GIF, PNG, and raw files.
The document describes a case study of a person who experienced identity theft and online scams after downloading unauthorized programs onto their computer. They downloaded a free program that installed spyware without their knowledge. This spyware monitored their internet activity, recorded their keystrokes including passwords and login details, and sent this sensitive information to the software developer. As a result, unauthorized transactions were made using their internet banking and they could no longer access their email account. The person had to change all their account details and get their computer cleaned of the spyware. The case study warns people to be careful about downloading unauthorized programs and to read agreements before installing anything.
This document discusses advanced techniques in Microsoft Word, including mail merge, inserting and formatting various types of illustrations, and customizing SmartArt graphics and charts. It provides step-by-step instructions on how to perform mail merge by creating a main document and data source, and then merging them. It also explains how to insert, format, and design pictures, clipart, shapes, SmartArt, charts, and screenshots in Word documents. The document aims to teach learners how to effectively use these advanced Word features.
The document discusses interactive multimedia, which allows users to control, combine, and manipulate different types of media like text, sound, video, graphics, and animation. It provides examples of uses for interactive multimedia like education, training, games, simulations, and more. Specific examples discussed include using videos on YouTube, audio on SoundCloud, online games like Farmville, online tests and surveys, e-learning courses, podcasts on apps like Spotify, and vodcasts on YouTube. The document emphasizes that these tools should be used wisely to achieve work goals efficiently.
This document provides an introduction to information and communications technology (ICT). It defines ICT as the diverse set of tools used to generate, store, process, spread and share information, including computers, the internet, broadcasting technologies and telephony. The document then discusses ICT in the Philippines, noting its role in business process outsourcing and the government agencies responsible for ICT development. It also outlines trends in ICT like technological convergence, social media, mobile media and assistive technologies. The document concludes by discussing online systems, functions and platforms.
This document discusses various topics related to information and communication technology (ICT). It begins by asking questions about personal technology use and social media checking. It then defines ICT and notes the Philippines' role as an "ICT Hub of Asia" due to growth in the business process outsourcing industry. The document discusses computers, the Internet, websites, hyperlinks, and other foundational aspects of digital technology. It also examines concepts like cloud computing, operating systems, assistive technologies, and the evolution of the World Wide Web. Throughout, it provides definitions and examples to explain key terms and developments in the field of ICT.
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)bloodyblade06
The document discusses empowerment through technology and information communication technology (ICT). It outlines 9 objectives for students to understand how ICT affects their lives and society. It then defines key concepts of ICT - information as knowledge, communication as transmitting messages, and technology as using knowledge to create tools. The document traces the evolution of communication from pigeons to the internet and smartphones. It defines ICT as using electronic devices and software to locate, save, send, edit and retrieve information from anywhere. ICT consists of information technology, computer technology, and communication technology.
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICTJazzyNF
This document defines multimedia and its main elements. Multimedia is defined as a combination of text, graphics, video and sound delivered electronically. The five main elements are text, images, video, audio, and animation. Linear multimedia presents information without user navigation, while non-linear multimedia allows user interactivity. Multimedia content found online includes videos, games, tests, courses, podcasts and vodcasts. The uses of multimedia discussed are edutainment, business communication, entertainment, public information access, and virtual reality.
The document discusses contextualized online search and research skills. It covers topics like search tools, information evaluation, and plagiarism. It provides guidance on using search engines effectively through search operators and techniques. It emphasizes the importance of evaluating information sources for accuracy, authority, objectivity and currency. Examples of information sources discussed include indigenous knowledge, libraries and the internet. The document aims to help students improve their ability to conduct credible online research.
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
This document discusses various technologies including information and communication technology, the evolution of the world wide web from Web 1.0 to Web 3.0, technology convergence in smartphones, and examples of social media like Facebook, Twitter, Instagram and Snapchat. It also covers dangers on computers like email spam, phishing and pharming as well as methods of protection like using firewalls and antivirus software. Formats for digital images and text are described including raster, vector, JPEG, PNG and others.
Lesson 4- Developing ict content for specific purposesJuvywen
Techniques in empowering users of application software
-Mail Merge
-Custom animations and timing
-Hyperlinking
-Integrating images and external material in word processors
-Embedded files and data
-Advanced and complex formulas and computations
This document provides an overview of Microsoft PowerPoint, including its functions, views, and how to create an effective presentation. It discusses key PowerPoint terms like slides, templates, and transitions. It also covers how to use animation and hyperlinks to make presentations more engaging. The document provides tips for minimizing text, using visual clarity, and consistency in designs. It describes how to insert hyperlinks within and between presentations to help navigate slides. The goal is for learners to understand how to use PowerPoint's features to produce dynamic, effective presentations.
This document outlines a 4-day lesson plan on media and information literacy. The lesson objectives are to describe how communication is affected by media/information, appreciate communication as a basic need, and share personal media habits. Day 1 activities include a media use log and discussion. Day 2 imagines a future without technology to analyze communication impacts. Day 3/4 involves analyzing pictures to identify messages and lessons. Key concepts covered are literacy definitions, the roles of media and information, and characteristics of responsible users and producers. Students are evaluated through essays and a media design framework assignment.
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
This document provides information about advanced word processing skills in Microsoft Word, including mail merge and integrating images and external materials. It discusses the two components of a mail merge - the form document and the data list. It then provides a 30-step process for creating a simple mail merge, including inserting merge fields. The document also discusses different types of materials that can be integrated into Word documents, such as pictures, clip art, shapes, and screenshots. Finally, it outlines seven image placement options in Word like in line with text, square, and behind text.
This document is a daily lesson log for a teacher teaching 11th grade students about online safety, security, ethics and etiquette standards related to their professional fields. The lesson uses indigenous concepts from the local culture like "Mansagawsaw" and "Manjalus" which refer to proper standards for cleaning rice fields. Over five sessions, students learn about ICT security concepts, discuss examples, complete activities, and visit a rice field to take photos illustrating proper cleaning techniques according to local standards. The teacher reflects on using contextualized lessons that actively engage students in learning.
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
The document discusses the role of information and communication technologies (ICT) in advocacy and social change. It provides examples from the Philippines of how social media and ICT were used during protests like the People Power Revolution and Million People March to organize large numbers of people and raise awareness of issues. The document also discusses concepts like digital citizenship, the global digital divide, and how social media can empower citizens in developing countries by giving them a platform to voice their concerns and perspectives.
This document is a module on introduction to information and communication technologies. It discusses the evolution of the world wide web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction. It also covers trends in ICT like social media, mobile technologies, and assistive media. The document provides tips on online safety, security, ethics and etiquette like using strong passwords, only connecting with known friends online, and not sharing personal information. It outlines various internet risks like cyberbullying, identity theft, and malware threats. Learners are engaged through activities to self-assess online habits and identify features of different websites and types of social media.
This document provides information on productivity tools and advanced application techniques in Microsoft Office applications like Word, Excel, and PowerPoint. It discusses features like mail merge and label generation in Word, complex calculations and functions in Excel, and animation, hyperlinks, and embedded data in PowerPoint. The document demonstrates how to insert and format illustrations, integrate charts and tables, use advanced formulas and keyboard shortcuts, and apply timing and animation effects in presentations. Overall, the document aims to teach advanced productivity techniques for creating professional documents, spreadsheets, and slideshows using Microsoft Office.
LESSON CONTENT:
- Advanced Presentation (PPT) Skills
- Microsoft PowerPoint Presentation: Concept and Features
Remider:
- All sets for educational purposes only.
Here is a draft social media post for your "Think Before You Click" campaign ad/poster:
#ThinkBeforeYouClick
One click can change everything. Help keep yourself and others safe online by pausing to consider what you share and where you surf. Your privacy and security are important - be mindful of protecting personal information. Use technology to empower yourself through knowledge and connection, not endanger yourself through haste or deception. This message brought to you by the #EmpowermentTechnology campaign. Think before you click!
1. The document discusses information and communication technologies (ICT), including the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0.
2. Key features of Web 2.0 are discussed, such as folksonomy, rich user experience, user participation, and mass participation.
3. Current trends in ICT are also summarized, including convergence, social media, mobile technologies, and assistive learning tools.
This document discusses information and communications technology (ICT). It defines ICT as encompassing any communication devices, applications, radio, television, phones, computers, software, satellite systems and associated services. The document discusses how the Philippines ranks in networked world readiness assessments between 2012-2016. It also discusses 5 categories of networked world readiness - access, learning, society, economy, and policy. The document then covers online safety, security, ethics and etiquette and provides tips for privacy and security online.
Interactive multimedia allows users to control and combine different types of media like text, sound, video, graphics and animation. It can be used for education, training, games, simulations, presentations and more. Some common multimedia contents include videos, audio, online games, tests, courseware, podcasts and vodcasts.
Imaging and Design for the Online Environment - Empowerment TechnologiesMark Jhon Oxillo
This document defines key concepts related to images, graphics, and layout. It discusses what images are, common types of images like photographs and drawings, and basic principles of graphic design layout including balance, emphasis, movement, pattern, proportion, and variety. It also covers infographics, file formats for images, principles of image manipulation like cropping and color balance, and popular image hosting services.
The document discusses various topics related to empowerment technologies including:
- The popularity and usage of social media, smartphones, and the internet among groups.
- An overview of the internet including its origins, how it functions as an information network, and common internet applications.
- Descriptions of the World Wide Web and how it has grown to allow access to vast amounts of online information.
- Explanations of Web 2.0 technologies which enable greater user participation and collaboration online.
- A brief definition of the concept of Web 3.0 and its focus on more intelligent and intuitive online experiences.
- Mentions of convergent technologies and Assistive Media, a nonprofit that provides
Mail Merge is a software toolkit that is used to produced multiple documents with a given template, editing the basic information that is supplied by a structured data set.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICTJazzyNF
This document defines multimedia and its main elements. Multimedia is defined as a combination of text, graphics, video and sound delivered electronically. The five main elements are text, images, video, audio, and animation. Linear multimedia presents information without user navigation, while non-linear multimedia allows user interactivity. Multimedia content found online includes videos, games, tests, courses, podcasts and vodcasts. The uses of multimedia discussed are edutainment, business communication, entertainment, public information access, and virtual reality.
The document discusses contextualized online search and research skills. It covers topics like search tools, information evaluation, and plagiarism. It provides guidance on using search engines effectively through search operators and techniques. It emphasizes the importance of evaluating information sources for accuracy, authority, objectivity and currency. Examples of information sources discussed include indigenous knowledge, libraries and the internet. The document aims to help students improve their ability to conduct credible online research.
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
This document discusses various technologies including information and communication technology, the evolution of the world wide web from Web 1.0 to Web 3.0, technology convergence in smartphones, and examples of social media like Facebook, Twitter, Instagram and Snapchat. It also covers dangers on computers like email spam, phishing and pharming as well as methods of protection like using firewalls and antivirus software. Formats for digital images and text are described including raster, vector, JPEG, PNG and others.
Lesson 4- Developing ict content for specific purposesJuvywen
Techniques in empowering users of application software
-Mail Merge
-Custom animations and timing
-Hyperlinking
-Integrating images and external material in word processors
-Embedded files and data
-Advanced and complex formulas and computations
This document provides an overview of Microsoft PowerPoint, including its functions, views, and how to create an effective presentation. It discusses key PowerPoint terms like slides, templates, and transitions. It also covers how to use animation and hyperlinks to make presentations more engaging. The document provides tips for minimizing text, using visual clarity, and consistency in designs. It describes how to insert hyperlinks within and between presentations to help navigate slides. The goal is for learners to understand how to use PowerPoint's features to produce dynamic, effective presentations.
This document outlines a 4-day lesson plan on media and information literacy. The lesson objectives are to describe how communication is affected by media/information, appreciate communication as a basic need, and share personal media habits. Day 1 activities include a media use log and discussion. Day 2 imagines a future without technology to analyze communication impacts. Day 3/4 involves analyzing pictures to identify messages and lessons. Key concepts covered are literacy definitions, the roles of media and information, and characteristics of responsible users and producers. Students are evaluated through essays and a media design framework assignment.
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
This document provides information about advanced word processing skills in Microsoft Word, including mail merge and integrating images and external materials. It discusses the two components of a mail merge - the form document and the data list. It then provides a 30-step process for creating a simple mail merge, including inserting merge fields. The document also discusses different types of materials that can be integrated into Word documents, such as pictures, clip art, shapes, and screenshots. Finally, it outlines seven image placement options in Word like in line with text, square, and behind text.
This document is a daily lesson log for a teacher teaching 11th grade students about online safety, security, ethics and etiquette standards related to their professional fields. The lesson uses indigenous concepts from the local culture like "Mansagawsaw" and "Manjalus" which refer to proper standards for cleaning rice fields. Over five sessions, students learn about ICT security concepts, discuss examples, complete activities, and visit a rice field to take photos illustrating proper cleaning techniques according to local standards. The teacher reflects on using contextualized lessons that actively engage students in learning.
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
The document discusses the role of information and communication technologies (ICT) in advocacy and social change. It provides examples from the Philippines of how social media and ICT were used during protests like the People Power Revolution and Million People March to organize large numbers of people and raise awareness of issues. The document also discusses concepts like digital citizenship, the global digital divide, and how social media can empower citizens in developing countries by giving them a platform to voice their concerns and perspectives.
This document is a module on introduction to information and communication technologies. It discusses the evolution of the world wide web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction. It also covers trends in ICT like social media, mobile technologies, and assistive media. The document provides tips on online safety, security, ethics and etiquette like using strong passwords, only connecting with known friends online, and not sharing personal information. It outlines various internet risks like cyberbullying, identity theft, and malware threats. Learners are engaged through activities to self-assess online habits and identify features of different websites and types of social media.
This document provides information on productivity tools and advanced application techniques in Microsoft Office applications like Word, Excel, and PowerPoint. It discusses features like mail merge and label generation in Word, complex calculations and functions in Excel, and animation, hyperlinks, and embedded data in PowerPoint. The document demonstrates how to insert and format illustrations, integrate charts and tables, use advanced formulas and keyboard shortcuts, and apply timing and animation effects in presentations. Overall, the document aims to teach advanced productivity techniques for creating professional documents, spreadsheets, and slideshows using Microsoft Office.
LESSON CONTENT:
- Advanced Presentation (PPT) Skills
- Microsoft PowerPoint Presentation: Concept and Features
Remider:
- All sets for educational purposes only.
Here is a draft social media post for your "Think Before You Click" campaign ad/poster:
#ThinkBeforeYouClick
One click can change everything. Help keep yourself and others safe online by pausing to consider what you share and where you surf. Your privacy and security are important - be mindful of protecting personal information. Use technology to empower yourself through knowledge and connection, not endanger yourself through haste or deception. This message brought to you by the #EmpowermentTechnology campaign. Think before you click!
1. The document discusses information and communication technologies (ICT), including the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0.
2. Key features of Web 2.0 are discussed, such as folksonomy, rich user experience, user participation, and mass participation.
3. Current trends in ICT are also summarized, including convergence, social media, mobile technologies, and assistive learning tools.
This document discusses information and communications technology (ICT). It defines ICT as encompassing any communication devices, applications, radio, television, phones, computers, software, satellite systems and associated services. The document discusses how the Philippines ranks in networked world readiness assessments between 2012-2016. It also discusses 5 categories of networked world readiness - access, learning, society, economy, and policy. The document then covers online safety, security, ethics and etiquette and provides tips for privacy and security online.
Interactive multimedia allows users to control and combine different types of media like text, sound, video, graphics and animation. It can be used for education, training, games, simulations, presentations and more. Some common multimedia contents include videos, audio, online games, tests, courseware, podcasts and vodcasts.
Imaging and Design for the Online Environment - Empowerment TechnologiesMark Jhon Oxillo
This document defines key concepts related to images, graphics, and layout. It discusses what images are, common types of images like photographs and drawings, and basic principles of graphic design layout including balance, emphasis, movement, pattern, proportion, and variety. It also covers infographics, file formats for images, principles of image manipulation like cropping and color balance, and popular image hosting services.
The document discusses various topics related to empowerment technologies including:
- The popularity and usage of social media, smartphones, and the internet among groups.
- An overview of the internet including its origins, how it functions as an information network, and common internet applications.
- Descriptions of the World Wide Web and how it has grown to allow access to vast amounts of online information.
- Explanations of Web 2.0 technologies which enable greater user participation and collaboration online.
- A brief definition of the concept of Web 3.0 and its focus on more intelligent and intuitive online experiences.
- Mentions of convergent technologies and Assistive Media, a nonprofit that provides
Mail Merge is a software toolkit that is used to produced multiple documents with a given template, editing the basic information that is supplied by a structured data set.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
empowerment technology by: kier and joverynkiersamaco
This document provides an overview of empowerment technology and discusses various topics related to information and communication technology (ICT). It describes the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, social media platforms, dangers on the internet like spam and viruses, and ways to protect computers. Additionally, it covers research skills, mail merge functions in Microsoft Word, identifying credible online sources, and basics of slide presentation and graphic design.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
This document discusses empowerment through technology and information communication technology (ICT). It provides an introduction to ICT and how it is used in different fields like commerce, engineering, education, health, and more. It discusses the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence through examples like smartphones. Other topics covered include social media platforms like Facebook, Twitter, and Instagram, assistive media, online safety, and security tools.
This document discusses information and communication technology (ICT) and how it can be used across different fields like education, commerce, health services, and more. It explains the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and the emerging data-driven Web 3.0. The document also discusses technology convergence using smartphones as an example. It covers social media platforms and online dangers like spam, spoofing, and hacking. Finally, it provides guidance on contextualized online research and detecting satirical news sources.
ICT plays an important role in many aspects of modern society through communication, education, commerce, health services, and more. The document discusses how ICT is used in these areas and others like science, sports, and media. It also covers the evolution of the internet from early Web 1.0 to current versions, common online systems and platforms, and potential online dangers. Guidelines for image and text manipulation and basic graphic design principles are provided.
The document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 3.0. ICT is defined as any electronic device or application used for communication, and includes radio, television and computers. The World Wide Web started as mostly static, "read-only" Web 1.0 sites created by webmasters. Web 2.0 introduced more interactivity through user-generated content and social media. Web 3.0 aims to be more semantic and machine-readable. Examples of social media discussed include Facebook, Twitter, Instagram and Snapchat. The document also covers dangers online like spam, spoofing, phishing and computer viruses, as well as ways to protect computers using firewalls and antivirus
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
ICT plays an important role in modern society for communication, education, commerce, health services, science, and more. It has transformed how people interact through developments like the internet. Key aspects of ICT discussed include social media, online safety, conducting research, and using tools like mail merge for communication. Formats for digital images and text include proprietary, open, and file formats indicated by extensions.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
Similar to Empowerment Technology by: Maria Elisa Pal and Rodel Reyes (20)
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 3)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
Lesson Outcomes:
- students will be able to identify and name various types of ornamental plants commonly used in landscaping and decoration, classifying them based on their characteristics such as foliage, flowering, and growth habits. They will understand the ecological, aesthetic, and economic benefits of ornamental plants, including their roles in improving air quality, providing habitats for wildlife, and enhancing the visual appeal of environments. Additionally, students will demonstrate knowledge of the basic requirements for growing ornamental plants, ensuring they can effectively cultivate and maintain these plants in various settings.
How to Create User Notification in Odoo 17Celine George
This slide will represent how to create user notification in Odoo 17. Odoo allows us to create and send custom notifications on some events or actions. We have different types of notification such as sticky notification, rainbow man effect, alert and raise exception warning or validation.
Post init hook in the odoo 17 ERP ModuleCeline George
In Odoo, hooks are functions that are presented as a string in the __init__ file of a module. They are the functions that can execute before and after the existing code.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024yarusun
Are you worried about your preparation for the UiPath Power Platform Functional Consultant Certification Exam? You can come to DumpsBase to download the latest UiPath UIPATH-ADPV1 exam dumps (V11.02) to evaluate your preparation for the UIPATH-ADPV1 exam with the PDF format and testing engine software. The latest UiPath UIPATH-ADPV1 exam questions and answers go over every subject on the exam so you can easily understand them. You won't need to worry about passing the UIPATH-ADPV1 exam if you master all of these UiPath UIPATH-ADPV1 dumps (V11.02) of DumpsBase. #UIPATH-ADPV1 Dumps #UIPATH-ADPV1 #UIPATH-ADPV1 Exam Dumps
Artificial Intelligence (AI) has revolutionized the creation of images and videos, enabling the generation of highly realistic and imaginative visual content. Utilizing advanced techniques like Generative Adversarial Networks (GANs) and neural style transfer, AI can transform simple sketches into detailed artwork or blend various styles into unique visual masterpieces. GANs, in particular, function by pitting two neural networks against each other, resulting in the production of remarkably lifelike images. AI's ability to analyze and learn from vast datasets allows it to create visuals that not only mimic human creativity but also push the boundaries of artistic expression, making it a powerful tool in digital media and entertainment industries.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
2. ICT-Information
Communication Technology
- is the umbrella that includes any communication device or
application, encompassing radio, television, computer and etc.
- the main method of information, getting information and education,
attaining services and expressing social advocacies and awareness.
4. Web 1.0
In this stage of internet technology there were very few web content creators
and many of them were so called ‘ read only web’’.
o There were no user interaction.
oWeb pages were STATIC
oThe feedback mechanism was thru private email
o No direct comment available
5. WEB 2.0
The term Web 2.0 was used around 2004
oInternet Technology became more and more interactive.
oThe internet became more available to everyone.
oThe users on now interact, contribute, and create their own internet space
and content.
6. WEB 3.0
It is discovered by Tim Berners-Lee ( Father of the World Wide Web ) as
the read-write-execute web.
o It is referred to as the semantic web or data driven web content and
response.
7. TECHNOLOGY CONVERGENCE
• It is an evolution of technological development that merge into two
system bringing together different types of applications and media.
8. Examples:
1. Smartphone
-as it provides functionality of various individual separate and different devices now
available in one year. It can function as a telephone, camera ,radio, TV and gaming
console.
9. Social Media
It is a collection of internet-based
communication
tools and computer-assisted
channels dedicated to
allow users to interact.
Facebook
Is a popular free social networking site with
more than a billion users around the globe
that allows it users to create profiles.
10. TwitterWith more than 300 million users in 2016
Allows users to micro logy or broadcast short
messages called ‘’tweets’’
Instragram
A social networking application that enables
the user to share mobile photo and video
either publically or privately.
11. Snap chat
Designed for the mobile networking application.
Also designed for photo sharing , chat, and
messaging services
Images and videos shared in this app last
only for a short time and they are gone.
Assistive Media
It is was the first internet-based reading service
for persons with casual and reading impairments.
12. Email Spam
Known as junk email, usually unsolicited commercial
email sent from one source with identical
message to send to multiple recipients.
Email Spoofing
A deceitful email practice in which the sender
address is changed, so that it would appear
to have come from a different sources
usually someone you know.
13. Phishing
A deceitful practice of trying to get confidential
information such as passwords and usernames,
and credit card details by making it appear as
if it comes from a trust worthy source.
Pharming
A dangerous hacker attack on a website
which directs all traffic to that web site
to another fictitious website.
14. Spyware
It is a computer program that is installed covertly
on a personal computer to collect information or
even take control over the computer without
the knowledge of the users.
Computer Worm
Some worms delete files, others disrupt
the network function and still, other
disrupt the network function and still,
other send junk mail from infected computer.
15. Trojan Horse
It can erase data, can allow access of the victim’s
computer, can corrupt files ,and can be use
in Phishing.
Computer Virus
It spread like a real biological virus, wherein it
attaches it self to a host program and
infect other computer if it is received by a
computer if it is received by a computer
through the internet.
16. Hacker
A person who is able to enter
the control other
people’s computer without
authorization.
17. Security center
-Is the place where you can set additional protection from threat to your computer especially when
using the internet.
Fire wall
-Help to protection your computer from un authorized entries viruses or worms from the internet or
network.
Automatic updates
-Another features of windows which when turn on will automatically download updates from
Microsoft windows website.
Virus protection
-Is usually about the current anti virus software installed in your computer.
Anti virus
-Software is meant to locate find and remove virus threats. That are already in your computer. It is
also prevent other malware from gaming entry into your computer.
18. Unlocking of difficulties
Contextualize- is to place (something such as a word or activity) in
a word or in a context.
Research- the collection of information about a particular subject.
Strategy- the art of devising or employing plans or stratagems toward
a goal careful plan or method.
Compilation-the act or process of compiling.
Citation-an act especially the citing of a previously settled case at law.
19. Contextual Search
•Is an attempt to be more precise in providing
the list document according to the words used
by the user to search the internet.
•A good contextual search engine would
request for more information to narrow down
the result of the search.
20. Steps to make Contextualized Online Search
1.Identify or choose a topic.
2.Topic or task definition.
3.Identify method of search
experiment
explore
survey
4.Identify resources of your research
wikipedia
google
21. 5. Make your research strategies.
6. Compiling the research result.
7. Evaluate the result of your research.
8. Create a list of your references for citation.
22. Research Skills
Critical skill
- it is the ability to digest reflect and conclude
from the information search.
Analytical thinking
- the ability to look verbalize conceptualize
and gather data attuned to the context of
the subject.
-the ability to apply synthesis, focus and critical
thinking to extract the useful information.
23. • Problem Solving Capability
- the ability to present solutions or solve problems by presenting a
decision based on the given information.
-people with this ability are able to define and identify the
latitude of the problem and present all possible solutions.
• Organize Data Mining
-It is the ability to organize and catalog all collected materials
efficiently
despite data size.
24. • Research Presentation
- It is the ability to present ideas and draw conclusion from the
research.
-be able to explain in writing the purpose, steps, goals and
objective of the research.
•Creativity and Developed Imagination
-it is the ability to look for alternative solutions to the problems
needed to solve in the research.
- Thinking beyond the usual approaches to the research
objectives.
25. • Computer Literacy
-knowledge of the various computer application and tools.
- Skills in the use of software to write, design, and present.
26. * Steps in making Research
Contextualized Research*
1. Open the Google site.
2. On the upper right side of the window, click the Google Apps Icon and click
search G.
3. On the lower right part of the window, click settings and the Google search
setting pop-up list will appear.
4. Click an advance search and the advanced search window will appear.
5. Type the keywords that you would like to search and click the Advance search
button.
27. * Identify Good Source from satirical
Source*
• Satirical sites are website that report untrue or false stories meant
to amuse or entertain.
• These sites take their cue from TV shows that report exaggerated
news that are untrue but intriguing and funny.
• Untrue stories should not be share.
• There sites started as spoofs of real public figure such as political
leaders or movie personalities.
28. * How to defect satirical News*
1. If its is good to be true, then it must be so.
2. If the news did not emanate from reliable news site.
3. If they are from known satirical sites.
*List of top source of satirical
news*
1. Adobo Chronicles ( Adobo Chronicles.com)
2. So, What’s New? (So what new. Wordpress.com)
3. Eritas Times ( Eritas-time.com)
4. The professional Heckler ( Profesionalheckler.wordpress.com)
29. * List of American Satirical Sites in the US*
1. The onion ( theonin.com)
2. Click hole ( clickhole.com)
3. Christwire Global Media ( christwire.org)
30. * Mail Merge and Label Generation*
MAIL MERGE – is used to
automatically add mailing
addresses or personalized
information to your publication
31. * Mailing Start Group Commands*
NAME FUNCTION
MAIL MERGE Merges data into a publication which will be printed
and mailed. Show steps by steps Mail Merge World.
E-Mail Merge Merges data into a publication that will be sent as e-
mail.
Select Recipients Chooses the list of people you intend to send the
letter to. You can type your own list, use your out
look content or connect to a database.
Edit Recipients List Make changes to the list of recipients and decide
which of them should receive your letter.
32. * Write and Insert Group Commands*
NAME FUNCTION
Insert Merge Field Adds a field from your recipient list to the
publication.
Address Block Adds an address to your letter.
Greeting Line Adds a greeting to your letter.
Picture Adds a picture field from your recipient- list to
publication.
Insert Personalized Hyperlink Inserts hyperlink that are customized for each
recipient.
Format Changes the format for the field content.
33. *Parts of Mail Merge*
1. Recipients List
2. Publication with Merge fields
3. Merge Publication
34. Step 1: Creating a Recipients List
1.Click the mailings tab, go to the start group and click select
recipients.
2.On the list of options, select Type New List.
3. On the New Address List dialog box, click New Entry and Type the
recipient information.
4. Click Ok.
35. Step 2: Prepare your publication
1.Create your publication in MS Word.
2. Insert any additional text that you want to appear in
every version of your mail merge publication, such as
greeting.
36. Step 3 : Create Merged Publication
1. Print
A. Click Merge to a printer
B. In the print space, select the options you want and click Ok.
2. Merge to new publication
A. Click Merge to New Publication.
B. In the new publication, click Save this Publication in the Mail Merge task pane.
C. Type the name of your new publication and Click save.
3. Add to existing Publication
A. Click Add to Existing Publication
B. On the Open Publication dialog box, locate the publication you want to add and click open
C. Click Save this Publication in the Mail Merge Task pane.
37. Generating Labels
• Labels are used for envelopes that
you intend to send out to persons
usually containing the name,
address, or telephone.
38. * Steps in Generating Labels*
1. Start a new document in MS Word.
2. Go to the Mailings tab, in the Create Group, Click labels and the
Envelope and Labels dialog box will appear.
3. In the Address box, type the text you want to be placed on the
label.
4. Click the Insert Address icon if you have an address stored In the
electronic address book.
5. To change the Font or Paragraph formatting, select the text, right-
click and select the option from the drop-down menu.
39. 6. Click Option button and the label options dialog box will appear.
7. Select the settings like the type of printer, the supplier that produced
your label sheet and others.
8. After you make the settings, Click OK.
9. Under Print, select full page of the same label or single label. Then in
the row and column boxes, enter the numbers that match the numbers of
row and columns on the label sheet for the label that you want to print.
10. Click Print.
40. * MS PowerPoint *
What is MS PowerPoint?
- It is an application intended for creating a slide presentation.
How to create a Slide Presentation?
1.Open MS PowerPoint.
2.Click New and select your preferred design template.
3.Click insert tab new and insert text, word art or any object in the slide.
4.Click home tab to insert new slide in our information.
41. MS Excel
- Is use to compute costs incurred in the creation of
projects, or create tables for finding the researches
and then create reports for business or research that
you are doing.
42. Sources of Photos and Graphics
There are many sources of photos and graphics. They can
come direct from your camera, old pictures, free from internet or
stores.
43. 1. Personal and Professional Photos
-are photos taken by amateur or professional photographers using a digital
camera. These image are downloaded and are stored in the computer.
2 . Scanned Images
- are those that you transfer from printed photos and graphics using scanning
devices which you can transfer to your computer for further improvement and
modification.
3. Stock Photo Library
- are several photographs and created images that are available for sale.
4. Online Stock Photos
- found in the World Wide Web. The WWW is no the dominant source of
photos and graphics around the globe because of the widely available choices and
reasonable prices.
44. Online digital file formats for images and text
A computer will have a certain method of encoding information for storage in the hard
drive or any form of computer storage. The ways of encoding and storing this information to
storage is called file formats. Digital file formats are categorized as either proprietary or open.
Proprietary formats are owned and controlled by individuals or corporation and the file
format specifications are not available to the public. They are usually covered by copyright and
the owner has exclusive control of the present and future technology development of this
format. An example of a proprietary format is the one used is the one used in the storage for
Microsoft word, excel and PowerPoint.
45. Open formats are means and ways for storing digital information that
are free, can be used by the public and are not encumbered by copyrights or
patients. These formats are also called free file formats and the specification for
those formats and the specification for these formats are usually sustained and
maintained by a group of individuals or organizations. Example of the formats are
used in the storage for open office and other free or open software.
File format uses suffixes that are added to the end of a
filename, called filename extension the file extension is means of identifying the
format of the file, with a period before it after the filename. The file extension has
usually two or more characters, although historically there were only three, but
modern operating systems of characters, more are now allowed.
46. Digital File Formats are classified into three major
groups:
1. Uncompressed or row format
- is usually used for storing original file format, it is a flexible form but needs
bigger memory to store.
2. Lossless file format
- is a file format that was compressed to replicate the original quality but
reduced file size. This type is ideal for storing important files ( images, audio or
video ).
3. Lossy file format
-compressed using approximation of its size .
47. IMAGE FILE FORMATS
- are means of storing and storing digital images , photos and illustrations.
These are two types classified of Image File Format:
Raster image File
Vector Image File
48. A. Raster Image File
A. Raster Image File
- Is a mean of representing digital images bits of information for storage, which
translates into pixels when viewed on the screen. Majority of raster files are lossy.
B. Pixels
- Is the smallest information of an image. Image using pixels are usually represented
on dots or squares that are arranged and added together to form the picture.
- The word PIXEL comes from the word picture (pix) and element (el).
49. Raster Image Files
- is a common formats you will encounter in the internet and with many digital
image files, such as those coming from digital cameras. The raster image are stored as
bit maps.
Examples:
JPEG
GIF
PNG files
50. The most common types of raster
image files
Filename Extension Description
.bmp Bitmap image file- is an image file format developed and
used on Microsoft windows environment and is stored
in a graphics File format called device- independent
bitmap and has a file extension of .bmp or .dip. Not a
common format on the world wide web because of its
large file size.
.gif Graphic Interchange Format File – is an image file
format that is very popular on the World Wide Web
because of its portability and support for animation.
.jpg JPEG Image file- standardized by the joint Photographic
Experts Group (JPEG) is a common method for
photographic images as well as transmission of photos
on the world wide web since it supports 24-bits per
pixel color scheme.
51. Filename Extension Description
.png Portable Network Graphic (PNG) – is a free open-source
bitmap image format made to improve on GIF which
has small file but can handle more colors since it
supports 24- bit per pixel color scheme and supports
true color (16 million colors).
.psd Photoshop Document (PSD) – is a native file format for
adobe Photoshop, and since many are using this
program to create images, it is very popular. Photoshop
has the ability to read all of the above formats and edit
them.
52. B. Vector Image or Vector Graphics Files
- are lossless files created using mathematics
geometric equations to represent images in digital
computer graphics.
53. Vector graphics has the advantage of retaining its quality to any desired image size,
unlike raster images that appear pixilated when displayed in expand image sizes.
Vector format or graphic is preferred for those who desire quality prints and display
of images.
Examples of this are type of formats are:
PDF
Encapsulated postscripts
Scalable Vector Graphics
Windows metafile
54. Types of vector image formats
Filename extension Description
.ai Adobe illustrator file-is the file extension
for graphics created using adobe illustrator
which is created using paths, and lines
connected by points instead of bitmaps,
which may include objects; color, and text.
.drw Drawing file is a generic drawing created and
stored in a vector format that uses lines or
paths to present images. These images are
output of the following
programs:appleworks,microsoft picture it,
cord DRAW and paint shop pro.
.dxf Drawing exchange format file-is a drawing
format developed and introduced by
autodesk the maker of autocad and is used
for computer aided design (cad) vector
images.
55. Filename extension Description
.ps Postscript file- is a page description
language (pdl) developed by adobe,
basically a language for printing documents
on laser printers and image setter (high
resolution printers) used to produced
camera ready copies.
.sgv Scalable Vector Graphics (sgv) – File is the
most common vector graphic format on the
internet; it was developed by the World
Wide Web consortium (w3c) to display
vector graphics.
56. *Basic Principles of Graphics and Layout*
LAYOUT
- is the process of planning and arranging graphics or text in a page.
GRAPHIC
- is an image or visual representation of an object. Therefore, computer graphic are
simply images displayed on a computer screen.
SYMMETRICAL
- There should be equal weights or elements on both side of the page.
ASSYMETRICAL
- It maybe asymmetrical when there is an artistic and different intensity on one side
of the page.
57. TEXT
- the text should be:
* legible
* Appropriate font face
* Left justified, right justified, center
* The flow of text should be easy to
read
IMAGE
- the image should be:
* proportionate
* sharp in color
* with high resolution
* with appropriate captions
58. PROXIMITY and HARMONY
* the element should be closed together and scattered and
arrange apart from each other.
* elements should not be cluttered and not complete with each
other.
CONSISTENCY
* there should be uniformity of theme on each page.
COLOR and SHAPE
* use color to create interest by providing variety in the design (
color contrast and shape ).
EMPHASIS
* there should be one point of interest in a page.
* the elements to be emphasized should have a different size,
color, shape, or background.
59. * Principles and basic techniques of image
manipulation *
There are various ways to manipulate images like
resizing, cropping, adjusting color background, balance
brightness and contrast, combining photos, combining text
and photos, and clear image to be used of a photo editing
too, you can improve and edit the pictures to be able to use
them the way you want to be able to send your message to
your message to your viewers.
60. * Techniques of Image Manipulation *
BACKGROUND COLOR
- you can change the background if it does not match the image or the totality of
the presentation. You can also add effects to the background.
MULTIPLE IMAGES
- you can combine multiple images to make a point or use to highlight your
message.
SHADOW
- using shadow effect will make the image realistic.
PROPORTION
- when combining images, resize the image to make it proportionate and realistic.
61. BLENDING COLOR
- you can use color to match the background with the other elements
in the page.
TEXTURE
- adding texture allows you to blend different image. Texture add to
the depth of your art. Blending with allow smooth transition of one image to anther.
EMPHASIS
- there should be a focal point to a page that will attract to the
viewers. The element you want to emphasize should be sharp, big and most vibrant
in your design.
62. * Combining Text, Graphics and Images *
TRANSPARENT SHAPES
- add simple shapes with a slight transparency behind your text to clearly (
emphasis ) see the text you want to emphasize.
FONTS and SHAPES
- fonts and shapes should complement with each other. You can use rounded
shapes.
TEXT and BACKGROUND
- text and background should be aligned to have an organized look.
CLEAN and CLEAR BACKGROUND
- use a clean and clear background for the message to be readable. Background
should not washout your massage.
63. * Basic Manipulation using offline or open
source software *
Photo editing and designing tools allow
you to make manipulate or edit images, apply
effects filters, frames, crop, and text
64. * Various offline or open- source for
image editing *
1. PICASA – it is a Google's free photo manager to edit and organize your
photos.
2. PAINT.NET – it is a window-based alternative to the MS paint editor. It is a
free open source available in windows.
3. GOOGL SKETCH UP – it is fee, 3D modeling program with tools that
allows you to create 3D models of houses, home, renovation, woodworks and
other dimensional accuracy.
65. 4. AUTODESK PIXEL – a free photo editing tool that is similar
to Photoshop and has more 600 effects.
5. ADOBE PHOTOSHOP – is a tool to create, modify, combine
and optimize digital photos and images. It is used to performed
changes.
6. GIMP or GNU Image Manipulation Program – is a
free, open-source image/ graphics editing program used for image
retouching and editing, free- farm drawing/ painting and other
specialized tasks.
66. INSTALLING GIMP
1. go to www.gimp.org
2. then click download
3. select download GIMO directly
4. run the GIMP installer
5. Click Install
6. Wait for it to finish the installation, then Click Download.
67. 1. TOOLBOX – This is the part where the main tool are located such as the tools
used to crop, select, erase, and more.
2. TOOL OPTION – located below the toolbox, here you will be able to see the
options for the currently selected.
3. IMAGE WINDOW – this is where your works or image will be shown. You
will also have an option to open multiple image at the same time.
68. 4. LAYERS DIALOG – this shows the layer structure of the images
shown in the image window. You will be allowed to manipulate it in
a variety of ways.
5. BRUSHES/ PATTERN/ GRAADIENTS – located below the
layer dialog, you will be able to see the choices of brush, patterns
and gradients that can be used in your work.
69. PRESENTATION
Is a graphic program that allows you t create slide
shows presenting a topic, lecture, demonstration to
enlighten, educate, communicate.
allows you to organize, summarize and format your
materials
Allows transitions, animation and sounds that will
captivate the audience a keep them interested.
70. Examples:
1. ZOHO SHOW - an online presentation that features master
slides, template, customization the ability to insert videos/ images,
transitions/ animations, image editing, shape effects, and easy
flowchart building.
2. LINKED IN SHARE – is a web 2.0 based sliding hosting service.
Users can upload files privately or publicly in the ff. format:
PowerPoint, PDF, Keynote or open document presentations.
3. GOOGLES SLIDES - create a new presentation, and edit,
collaborate with others and present wherever you are free.
71. 4. SLIDE ROCKET – is an online presentation platform that lets
users create, manage, share and measure presentations. It is
provide via a SAAS model.
5. MS POWERPOINT – a slide show presentation program
currently developed by Microsoft.
6. PREZI – a cloud- based presentation software based on a
software as service model. The product employs a zooming user
interface ( ZUI ) which allows users to zoom in and out of their
presentation media.
72. Hands –on : using prezi to create a presentation creating a new prezi account:
1. Go to prezi.com
2.
Click get started on the upper right corner
3.Sign up for a public account
4. Fill in the boxes with the specified information
5.After providing information,
click create your free public account.
*The Prezi Canvas*
Zooming in
and out
1. To zoom in, just scroll the mouse upwards, and to zoom out, scroll the mouse
downwards.
2. To
zoom in the frames, just like a frame and select zoom in to frame tool bar` 3. To
zoom out in the original overview, click the home button.
73. Moving around the canvas
1.To move around the canvas , click and hold, and drag the cursor to the direction you
want to go to.
Undo and Redo
1.To undo, just click the undo button, and the redo, click the redo button.
Adding / Editing text
1.To add text, just click anywhere in the canvas , and start typing. Or click to add tittle
and type .
Adding/Editing frames
1. to add a frame, select the type of frame you would like, and drag the shape with a
plus sign anywhere you want in the canvas.
2.To edit the frame , click on the frame, and you can change the color and type of the
frame or delete it in the frame toolbar.
74. 3. You can move the frame around by clicking and holding the
hand, button, and then drag it at any direction.
4. You can increase or decrease the size of the frame by sliding the
sizing handle outward or toward the center, or you can use the + and –
buttons
5. to add an image, shape, video, and other files to the frame, click
insert.
75. * The Prezi Canvas *
EDITING IMAGES
1. you can move the image around by clicking and holding the hand button
and moving it to any direction you want.
2.you can increase or decrease the size of the image by dragging the sizing
handle away or towards the center, or you can use the + and – buttons.
3. you can rotate the photo by painting your mouse near any sizing handle
so you can click and hold a small circle beside it, and rotate it at any direction.
4. you can enhance, add effects and frames to your photo by selecting
effects at the picture toolbar.
76. Editing the Background
1. Enter edit path mode by clicking edit path on the bottom left. A star
symbol will appear on each side of a path point or to a fame.
2. Click the Star symbol to enter Animation edit mode.
3. When you click or hover on an object, you will see a Green star with a
number, this represent the order which your content will fade in
4. you can review the animation by clicking the play button on the top
right corner.
5. To change the order, you can click the reset on the top left corner to
remove all the animation present in the frame.
6. on you can also remove the animation individually by hovering over a
green star until you see a delete button.
7. if you are satisfied with the order of your animation, click done