Empowerment-Technology-Lesson-1-15_1
Empowerment-Technology-Lesson-1-15_1
It deals with the use of different communication technologies such as mobile phones, telephone,
Internet to locate, save, send and edit information
Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one
of which is BPO, Business Process Outsourcing, or call centers.
ICT Department in the Philippines is responsible for the planning, development and
promotion of the country’s information and communications technology (ICT) agenda in support
of national development.
Computer– an electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that use the internet protocol suite
(TCIP/IP) to link billions of devices worldwide.
Means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers.
Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a network
of networks in which the users at any one computer can get information from any other
computer.
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that is
suitable for the World Wide Web.
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the
Web pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others.
– Allows users to interact with the page; instead of just reading the page, the user may be able to
comment or create user account.
– Aims to have machines (or servers) understand the user’s preferences to be able to deliver web
content.
Advertisement
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and
cannot be manipulated by the user. The content is also the same for all users that is referred to as Web
1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able
to see website differently than others e.g. social networking sites, wikis, video sharing sites.
1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g.
tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
3. User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews and evaluation
e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in
the internet.
5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.
TRENDS IN ICT
your smartphone.
2. Social Media– is a website, application, or online channel that enables web users web users
to create , co-create, discuss modify, and exchange user generated content.
Advertisement
b)Bookmarking Sites – Sites that allow you to store and manage links to various website and resources.
Most of the sites allow you to create a tag to others.
c) Social News – Sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be rank.
e) Microblogging – focus on short updates from the user. Those that subscribed to the user will be able
to receive these updates.
Ex. Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other users are able to comment on
the said topic.
Ex. Blogger, WordPress and Tumblr
3. Mobile Technologies– The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices capability to do the tasks that were originally found
in PCs. Several of these devices are capable of using a high-speed internet. Today the latest
model devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS
Android – an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.
Windows phone OS – A closed source and proprietary operating system developed by Microsoft.
e-mail account remotely. The software and storage for your account doesn’t exist
1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but server acts as if
they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed via Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public cloud
may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers increased
security because of its private nature.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are performed
using private cloud while the non-critical activities are performed using public cloud.
Advertisement
You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing
online just like you can in real life.
You are still talking to a real person with feelings even though you can’t see them.
Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.
Keep your post and emails to minimum by saying what you want to say.
· Know what you are talking about and make sense saying it.
Post the answers to your questions online because someone may have the same question
you do.
Netiquette does however forbid people who are flaming to hurt discussion groups by
putting the group down.
Going through other people’s things could cost you, your job or you could even go to jail.
Do not take advantage of other people just because you have more knowledge or power
than them.
Treat others as you would want them to treat you if the roles were reversed.
Remember that you were once the new kid on the block.
You still need to have a good manners even though you are online and cannot see the
person face to face.
Internet security
Advertisement
ConfidentIality
Data confidentiality
Privacy
Integrity
Data integerity System integrity
Availability
prevents the correct operation of system Masquerade: An unauthorized entity gains access to a
services and functions. system or performs a malicious act by posing as an
authorized entity.
Deception
Falsification: False data deceive an authorized entity.
A circumstance or event that may result in
an authorized entity receiving false data Repudiation: An entity deceives another by falsely
and believing it to be true. denying responsibility for an act.
Usurpation
Misuse: Causes a system component to perform a function or service that is detrimental to system
security.
Advertisement
Masquerader
Hackers
Clandestine user
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Execution phase
Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another and
also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
Phishing- acquires sensitive personal information like passwords and credits card details.
Advertisement
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake malware
removal tool.
Keyword searching
Use quotation marks to search as a phrase and keep the words linked together
Boolean
AND – enter words connect with AND- it will include sites where both words and found
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
Question
Lesson Discussion
In the professional world, sending out information to convey important information is vital. Because of
ICT, things are now sent much faster than the traditional newsletters or postal mail. You can now send
much faster than the traditional newsletters or postal mail. You can now use the Internet to send out
information you need to share. What if we could still do things much faster – an automated way of
creating and sending uniform letters with different recipients? Would that not be more convenient?
A. Mail Merge
One of the important reasons in using computers per se is its ability to do recurring tasks
automatically. But this ability has to be honed by learning the characteristics and features of the
software you use with your computer. After all, no matter how good or advance your computer and
software may be, it can only be as good as the person using it.
In this particular part of our lesson, we will learn one of the most powerful and commonly used
features of Microsoft Word called Mail Merge. As the name suggests, this feature allows you to create
documents and combine or merge them with another document or data file. It is commonly used when
sending out advertising materials to various recipients.
The simplest solution for the scenario above is to create a document and just copy and paste it
several times then just replace the details depending on whom you send it to. But what if you have
hundreds or thousands of recipients? Would not that take too many hours? What if you have a small
database of information where you can automatically generate those letters?
Two Components of Mail Merge
1. Form Document
The first component of our mail merged document is the form document. It is generally the
document that contains the main body of the message we want to convey or send. The main body of the
message is the part of the form document that remains the same no matter whom you send it to from
among your list.
Also included in the form document is what we call place holders, also referred to as data fields or
merge fields. This marks the position on your form document where individual data or information will
be inserted. From our sample document, the place holders are denoted or marked by the text with
double-headed arrows (<< >>) on each side and with a gray background. On a printed standard form, this
will be the underlined spaces that you will see and use as a guide to where you need to write the
information that you need to fill out. In its simplest form, a form document is literally a “form” that you
fill out with individual information. A common example of a form document is your regular tax form or
application form.
Advertisement
The second component of our mail merged document is the list or data file. This is where the
individual information or data that needs to be plugged in (merged) to the form document is placed and
maintained. One of the best things about the mail merge feature is that it allows data file to be created
fro within the Microsoft Word application itself, or it gets data from a file created in Microsoft Excel or
other data formats. In this way, fields that needed to be filled up on the form document can easily be
maintained without accidentally altering the form or main document. You can also easily add, remove,
modify, or extract your data more efficiently by using other data management applications like Excel or
Access and import them in Word during the mail merge process.
B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes sense
that after you print out your form letters, you will need to send it to individual recipients in an envelope
with the matching address printed directly on the envelope or on a mailing label to stick on. By using
virtually the same process as a standard mail merge, Microsoft Word will print individual addresses to a
standard form that it has already pre-formatted. Simply put, it creates a blank form document that
simulates either a blank label or envelope of pre-defined size and will use the data file that you selected
to print the information, typically individual addresses. So even in generating labels, the two essential
components of creating a merged document are present: the form document and the data file. Only in
this case, you did not have to type or create the form document yourself because it was already created
and pre-formatted in Microsoft Word. All you need to do is select the correct or appropriate size for the
label or envelope and select the data file that contains the addresses (data) to be printed. You can also
preview your merged labels before printing if you want to.
Advertisement
Integrating or inserting pictures in your document is fun and it improves the impression of your
document. A common use of inserting a picture on a document is when you are creating your resume.
Though seemingly simple to do, your knowledge on the different kinds of materials that you can insert or
integrate in a Word document and its characteristics can help you create a more efficient, richer
document not only in content but also in physical form. A better understanding of the physical form of
your document as well as the different materials you would integrate in it would allow you to be more
efficient and versatile in using Microsoft Word.
A. Kinds of Materials
There are various kinds of materials Microsoft Word is capable of integrating to make the
documents richer, more impressive, and more informative.
1. Pictures
Generally, these are electronic or digital pictures or photographs you have saved in any local
storage device. There are three commonly used types of picture files. You can identify them by the
extension on their file names.
a. .JPG/JPEG
This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic Experts Group.
Like all the rest of the image file extensions, it identifies the kind of data compression process that it uses
to make it more compatible and portable through the Internet. This type of image file can support 16.7
million colors that is why it is suitable for use when working with full color photographic images.
Unfortunately, it does not support transparency and therefore, images of this file type can be difficult to
integrate in terms of blending with other materials or elements in your document. But if you are looking
for the best quality image to integrate with your document then this is the image file type for you. .JPG
does not work well on lettering, line drawings, or simple graphics. .JPG images are relatively small in file
size.
b. .GIF
This stands for Graphics Interchange Format. This type of image file is capable of displaying
transparencies. Therefore, it is good for blending with other materials or elements in your document. It
is also capable of displaying simple animation. Apparently, this may not be too useful on a printed
document but if you are sending documents electronically or through email, or even post documents
into a website, then this could be quite impressive. The downside is that it can only support up to 256
colors so it is good mostly on logos and art decors with very limited, and generally solid colors. .GIF is
much better for logos, drawings, small text, black and white images, or low-resolution files.
Example of a .gif format picture.
c. .PNG
This is pronounced as “ping“. It stands for Portable Network Graphics. It was built around the
capabilities of .GIF. Its development was basically for the purpose of transporting images on the Internet
at faster rates. It is also good with transparencies but unlike .GIFs, it does not support animation but it
can display up to 16 million colors, so image quality for this image file type is also remarkably
improved. .PNG allows the control of the transparency level or opacity of images.
2. Clip Art
This is generally a .GIF type; line art drawings or images used as generic representation for ideas
and objects that you might want to integrate in your document. Microsoft Word has a library of clip arts
that is built in or can be downloaded and used freely. There are still other clip arts that you can either
purchase or freely download and use that come from third-party providers.
3. Shapes
These are printable objects or materials that you can integrate in your document to enhance its
appearance or allow you to have some tools to use for composing and representing ideas or messages. If
you are designing the layout for a poster or other graphic material for advertising, you might find this
useful.
Shapes Icon under the Insert ribbon tab.
4. Smart Art
Generally, these are predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature. If you want to graphically represent an organization, process,
relationships, or flow for infographic documents, then you will find this easy and handy to use.
Smart Art
5. Chart
Another type of material that you can integrate in your Word document that allows you to represent
data characteristics and trends. This is quite useful when you are preparing reports that correlate and
present data in a graphical manner. You can create charts that can be integrate in your document either
directly in Microsoft Word or imported from external files like Microsoft Excel.
Chart – Used to illustrate and compare data.
6. Screenshot
Sometimes, creating reports or manuals for training or procedures will require the integration of a more
realistic image of what you are discussing on your report or manual. Nothing can get you a more realistic
image than a screenshot. Microsoft Word even provides a snipping tool for your screen shots so you can
select and display only the part that you exactly like to capture on your screen.
This is the default setting for images that are inserted or integrated in your document. It treats your
image like a text font with the bottom side totally aligned with the text line. This setting is usually used
when you need to place your image at the beginning of a paragraph. When placed between texts in a
paragraph or a sentence, it distorts the overall appearance and arrangement of the texts in the
paragraph because it will take up the space it needs vertically, pushing whole lines of texts upward.
B. Square
This setting allows the image you inserted to be placed anywhere with the paragraph with the text going
around the image in a square pattern like frame.
C. Tight
This is almost the same as the Square setting, but here the text “hug” or conforms to the general shape
of the image. This allows you to get a more creative effect on your document. This setting can mostly be
achieved if you are using an image that supports transparency like a .GIF or .PNG file.
D. Through
This setting allows the text on your document to flow even tighter taking the contours and shape of the
image. Again, this can be best used with .GIF or .PNG type of image.
F. Behind Text
This allows your image to be dragged and placed anywhere on your document but with all the texts
floating in front of it. It effectively makes your image look like a background.
G. In Front of Text
As it suggests, this setting allows your image to be placed right on top of the text as if your image was
dropped right on it. That means whatever part of the text you placed the image on, it will be covered by
the image.
Mail Merge – a feature that allows you to create documents and combine or merge them with
another document or data file.
Form Document – the document that contains the main body of the message we want to convey
or send.
Data File – includes the individual information or data or the recipient’s information.
Merge Field/Place Holder – marks the position on your form document where individual data or
information will be inserted.
.JPG – file extension for the Joint Photographic Experts Group picture file.
.GIF – file extension for the Graphics Interchange Format image file.
Clipart – line art drawings or images used as a generic representation for ideas and objects.
Smart Art – predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature.
Text Wrap – adjusts how the image behaves around other objects or text.
1. What is a Spreadsheet Software? • allows users to organize data in rows an columns and
perform calculations on the data • These rows and columns collectively are called worksheet.
3. 4. MICROSOFT EXCEL
4. 5. To open Microsoft Excel, Press “Windows Logo” + R then type “excel” then enter.
5. 6. Key Terms in MS Excel: • Row – horizontal line of entries in a table • Column – vertical line of
entries in a table • Cell – the place where info. is held in a spreadsheet
6. 7. Key Terms in MS Excel: • Active Cell – the selected cell • Column Heading – the box at the top
of each column containing a letter • Row Heading – the row number
7. 8. Key Terms in MS Excel: • Cell Reference – the cell address of the cell usually combine letter
and number (ex. A1, B4, C2) • Merge – combining or joining two or more cells • Formula – is an
expression which calculates the value of a cell.
8. 9. Key Terms in MS Excel: • Functions – are predefined formulas and are already available in
Excel • Formula Bar – the bar that displays the contents of a cell
9. 10. FUNCTIONS
10. 11. BASIC MATH OPERATIONS: • =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all
the numbers within the range) • =PRODUCT(x,y) – returns the product of x and y •
=QUOTIENT(x,y) – returns the quotient of x divided by y • =x-y – returns the difference of x
subtracted by y
11. 12. BASIC MATH OPERATIONS: • =x+y – returns the sum of x and y • =x*y – returns the product
of x and y • =x/y – returns the quotient of x divided by y • =x-y – returns the difference of x
subtracted by y
12. 13. OTHER FUNCTIONS: • =ABS(x) – returns the absolute value of x • =AVERAGE(x,y) – returns
the average of x and y • =CONCATENATE(x,y) – joins x and y
13. 14. OTHER FUNCTIONS: • =IF(Condition, x, y) – returns x if the condition is true, else it returns y
• =ISEVEN(x) – returns true if x is an even number • =ISODD(x) – returns true if x is an odd
number
14. 15. OTHER FUNCTIONS: • =COUNT(range) – counts the number of cell containing a number
within a range • =COUNTIF(range, criteria) – count the number of cell that fits with the criteria
within the range
15. 16. OTHER FUNCTIONS: • =ISNUMBER(x) – returns true if x is a number • =ISTEXT(x) – returns
true if x is a text • =LEN(x) – returns the length of characters in x • =PROPER(x) – returns the
proper casing of x
16. 17. OTHER FUNCTIONS: • =LEFT(x,y) – returns the characters of x specified by y (from the left) •
=RIGHT(x,y) – returns the characters of x specified by y (from the right) • =PI() – returns the
value of pi
17. 18. OTHER FUNCTIONS: • =MIN(x,y) – returns the smallest number between x and y • =MAX(x,y)
– returns the largest number between x and y • =MIN(range) – returns the smallest number
within the range • =MAX(range) – returns the largest number within the range
18. 19. OTHER FUNCTIONS: • =POWER(x,y) – returns the value of x raised to the power of y •
=ROUND(x,y) – rounds x to a specified number of digits (y) =COLUMN(x) – returns the column
number of x • =ROW(x) – returns the row number of x
19. 20. OTHER FUNCTIONS: • =SQRT(x) – returns the square root of x • =TRIM(x) – removes extra
spaces in x • =UPPER(x) – returns x in all capital form • =LOWER(x) – returns x in non- capital
form
20. 21. OTHER FUNCTIONS: • =TODAY() – returns the current date • =NOW() – returns the current
date and time
22. 23. Consider this data: NAME MATH GRADE SCIENCE GRADE FILIPINO GRADE ENGLISH GRADE
A.P GRADE MARK 75 70 78 81 78 PETE 84 87 86 88 85 ANA 91 92 95 90 90 REA 73 75 74 75 70
23. 24. Give the formulas to get : • Mark’s , Pete’s, Ana’s and Rea’s averages • The highest grade that
Ana got • The lowest grade that Mark got? • Sum of all Math Grade? Science? A.P.? • Sum of all
Rea’s Grades • The Lowest Number among all grades • The remarks (Passed or Failed)
24. 25. Now, consider this data: FIRST NAME MIDDLE NAME LAST NAME MARK CURTIS WILLIAMS
PETE MCCLOEY HARRISON ANA MONROE FRITZ REA TAN COLLINS
25. 26. Give the formulas to get : • Mark’s Full Name • Ana’s Full Name in Proper Case • Count the
number of letters that Pete’s Last Name has • “COLL” from Rea’s Last Name • “LOEY” from Pete’s
Middle Name • Combining “WILL” and “LINS” from Mark and Rea’s Last Names respectively
Powerpoint is a highly innovative and versatile program that can ensure a successful communication
whether you’re presenting in front of potential investors, a lecture theatre or simply in front of your
colleagues. The following are the five features you should be using-if youy aren’t already. Learn
everything about these tips: they will improve your presentation skills and allow you to communicate
your message successfully. The five features of powerpoint was
Advertisement
2)Inserting Shapes
4)Slide Transitions
5)Adding Animations
1. Minimize: Keep slides counts to a minimum to maintain a clear message and to keep the audience
attentive. Remember that the presentation is just a visual aid. Most information should still come from
the reporter.
2.Clarity: Avoid being to fancy by using font style that is easy to read. Make sure that it is also big enough
to be read by the audience. Once you start making your presentation, consider how big the screen is
during your report.
3.Simplicity: Use bullets or short sentences. Summarize the information on the screen to have your
audience focus on what the speaker is saying than on reading the slide. Limit the content to six lines and
seven words per line. This is known as the 6 x 7 rule.
4. Visual: Use graphics to help in your presentation but not too many to distract the audience. In
addition, instead of using table of data, use charts and graphs.
5. Consistency: Make your design uniform. Avoid having different font styles and backgrounds.
6. Contrast: Use a light font on dark background or vice versa. This is done so that it is easier to read. In
most instances, it is easier to read on screen if the background is dark. This is due to the brightness of
the screen.
PHOTO EDITING
Photo editing encompasses the processes of altering images, whether they are digital
photographs, traditional photo chemical photographs, or illustrations. Traditional analog image
editing is known as photo retouching, using tools such as an airbrush to modify photographs, or
editing illustrations with any traditional art medium.
Graphic software programs
Which can be broadly grouped into vector graphics editors, raster graphics editors, and 3D
modelers are the primary tools with which a user may manipulate, enhance, and transform
images. Many image editing programs are also used to render or create computer art from
scratch.
1. RASTER IMAGESare stored in a computer in the form of a grid of picture elements or pixels.
2. VECTOR IMAGESsuch as Adobe Illustrator, Inkscape and etc. are used to create and modify
vector images, which are stored as descriptions of lines, Bezier curves and text instead of pixels.
RASTER IMAGESuse many colored pixels or individual building blocks to form a complete image JPEGs,
GIFs and PNGs are common raster image types. Almost all of the photos found on the web and in print
catalogs are raster images.
VECTOR IMAGES alternatively, allow for more flexibility. Constructed using mathematical
formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF are
excellent for creating graphics that frequently require resizing.
3. 3D MODELING (OR MODELLING) is the process of developing a mathematical representation
of any three dimensional surface of an object via specialized software. The product is called a 3D
model. It can be displayed as a two-dimensional image through a process called 3D rendering or
used in a computer simulation or physical phenomena. The model can also be physically created
using 3D printing devices.
IMAGE FORMATS
Ø JPEG is a commonly used method of lossy compression for digital images, particularly for those
images produced by a digital photography.
Ø PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics file format that supports lossless data
compression.
Ø GIF a lossless format for image files that supports both animated and static images.
Ø SVG is an XML-based vector image format for two-dimensional graphics w/ support for interactivity
and animation
Ø .3ds is one of the file formats used by the Autodesk 3Ds Max 3D Modelling, animation and rendering
software.
Ø .fbx is an exchange format, in particular for interoperability between Autodesk products and other
digital content creation software
Ø MAGIC WAND TOOL selects objects or regions in the image defined by proximity of color or
luminance
LAYERS which are analogous to sheets of transparent acetate, stacked on top of each other, each capable
of being individually positioned, altered and blended with the layers below, w/o affecting any of the
elements on the other layers.
IMAGE SIZE resize images in a process often called image scaling, making them larger, or smaller. High
image resolution cameras can produce large images which are often reduced in size for Internet use.
CROPPING creates a new image by selecting a desired rectangular portion from the image being
cropped. The unwanted part of the image is discarded. Image cropping does not reduce the resolution of
the area cropped.
CLONING uses the current brush to copy from an image or pattern. It has many uses: one of the most
important is to repair problem areas in digital photos.
IMAGE ORIENTATION – Image editors are capable of altering an image to be rotated in any direction and
to any degree. Mirror images can be created and images can be horizontally flipped or vertically flopped.
Rotated image usually require cropping afterwards, in order to remove the resulting gaps at the image
edges.
PERSPECTIVE – is the art of drawing solid objects on a two- dimensional surface so as to give the right
impression of their height, width, depth and position in relation to each other when viewed from a
particular point.
SHARPENING AND SOFTENING– Sharpening makes images clearer. Too much sharpening causes grains
on the surface of the image. Softening makes images softer that removes some of the highly visible
flaws. Too much causes the image to blur.
SATURATION- is an expression for the relative bandwidth of the visible output from a light source. As
saturation increase, colors appear more “pure.’’ As saturation decreases, colors appear more ‘’ washed-
out.’’
CONTRAST AND BRIGHTENING
Contrast of images and brighten or darken the image. Underexposed images can be often be improved
by using this feature.
Brightening lightens the image so the photo brightens up. Brightness is a relative expression of the
intensity of the energy output of a visible light source.
Adjusting contrast means adjusting brightness because they work together to make a better image.
PHOTO MANIPULATION
Photo manipulation involves transforming or altering a photograph using various methods and
techniques to achieve desired results. Some photo manipulations are considered skillful artwork while
others are frowned upon as unethical practices, especially when used to deceive the public, such as hat
used for political propaganda , or to make a product or person look better.
DIFFERENCES
PHOTO EDITING – signifies the regular process used to enhance photos and to create them ‘’Actual
editing simple process’’. Also includes some of the regular programs used for editing and expose how to
use them.
PHOTO MANIPULATION – includes all simple editing techniques and have some manipulation
techniques like erasing, adding objects , adding some graphical effects, background correction, creating
incredible effect, change elements in an image, adding styles , eliminating blemishes from a person’s
face and changing the features of a person’s body.
b.) Infographics
It is any graphic that display and explains information, whether that be data or words. When we
use the term ‘’infographics’’, we’re using it as a general term used to describe data presented in
a visual way.
Infographics are important because they change the way people find and experience stories.
Infographics are being used to augment editorial content on the web, it create a new way of
seeing the world of data, and they help communicate complex ideas in a clear and beautiful way.
TYPES OF INFOGRAPHICS
1. Statistical
2. Process Flow
3. Geographic
1. Research
3. b)Take a reference
6. Brainstorm
7. a)Gather ideas
9. Design
11. Review
13. Launch
1. a)Maintain a structure
1.Facebook
2. Groups – allows members who have common interests to find each other and interact.
3. Events – allows members to publicize an event, invite guests and track who plans to attend.
4. Pages – allows members to create and promote a public page built around a specific topic.
5. Presence technology – allows members to see which contacts are online and chat.
Within each member’s personal profile, there are several key networking components. The most popular
is arguably the Wall, which is essentially a virtual bulletin board. Messages left on a member’s Wall can
be text, video or photos. Another popular component is the virtual Photo Album. Photos can be
uploaded from the desktop or directly from a smartphone camera. There is no limitation on quantity, but
Facebook staff will remove inappropriate or copyrighted images. An interactive album feature allows the
member’s contacts (who are called generically called “friends”) to comment on each other’s photos and
identify (tag) people in the photos. Another popular profile component is status updates,
a microbloggingfeature that allows members to broadcast short Twitter-like announcements to their
friends. All interactions are published in a news feed, which is distributed in real-time to the member’s
friends.
Facebook offers a range of privacy options to its members. A member can make all his communications
visible to everyone, he can block specific connections or he can keep all his communications private.
Members can choose whether or not to be searchable, decide which parts of their profile are public,
decide what not to put in their news feed and determine exactly who can see their posts. For those
members who wish to use Facebook to communicate privately, there is a message feature, which closely
resembles email.
2. Instagram
Instagram is an online mobile photo-sharing site that allows its users to share pictures and videos either
publicly or privately on the app, as well as through a variety of other social networking platforms, such
as Facebook, Twitter, Tumblr, and Flickr. Originally, a distinctive feature was that it confined photos to a
square shape, similar to Kodak Instamatic and Polaroid SX-70 images, in contrast to the 4:3 aspect ratio
typically used by mobile device cameras. In August 2015, version 7.5 was released, allowing users to
upload media captured in any aspect ratio. Users can also apply digital filters to their images. Videos on
Instagram debuted in June 2013, allowing prerecorded square standard definition resolution clips of up
to 15 seconds to be shared; later improvements added support for widescreenresolutions of up
to 1080p and longer recording times for either prerecorded (up to one minute) or disappearing live (up
to one hour) videos.
Instagram was created by Kevin Systrom and Mike Krieger, and launched in October 2010 as a
free mobile app. The service rapidly gained popularity, with over 100 million active users as of April
2012[10][11] and over 300 million as of December 2014.[12] Instagram is distributed through the
Apple App Store and Google Play.[13]Support for the app is available for iPhone, iPad, iPod
Touch, Windows 10 devices and Android handsets, while third-party Instagram apps are available
for BlackBerry 10 and Nokia-Symbian Devices.
3. Twitter
Twitter is an online news and social networking service where users post and interact with messages,
“tweets,” restricted to 140 characters. Registered users can post tweets, but those who are unregistered
can only read them. Users access Twitter through its website interface, SMS or a mobile device app.
[10] Twitter Inc. is based in San Francisco, California, United States, and has more than 25 offices around
the world.
BLOGGING SITES
1. Weebly
Weebly is one of the easiest website builders in the market. They allow you to drag and drop content
into a website, so it’s very intuitive to use (click here to see our opinion on Weebly).
By using Weebly’s website building elements, you can literally drag them into your website and have a
website built relatively quickly, and painlessly. The beauty of this system is that you can pretty much
drag the elements to wherever you want – so it’s not very restrictive on where and how you place your
website content.
Weebly’s elements include pictures, paragraphs, videos, buttons, maps, contact forms – basically all the
basics for website building.
2. Tumblr
Tumblr is a popular microblogging platform designed for creative self-expression. It is considered a
mindful alternative to Facebook and other social media websites where users blog on a myriad of topics.
You can link your Tumblr account to other social networks you use and you can feed your traditional blog
or other RSS feed to your Tumblelog. You can also create static pages such as your own Questions page
that people are automatically taken to when they ask you a question. If you want to make your
Tumblelog look more lie a traditional website, you can do it by adding pages. You can make your
Tumblelog private or just make specific posts private as needed, and you can schedule posts to publish in
the future.
Tumblr is perfect for people who don’t need a full blog to publish lengthy posts. It’s also great for people
who prefer to publish quick multimedia posts, particularly from their mobile devices. Tumblr is also a
great choice for people who want to join a larger community. If a blog is too much or too big for you, but
Twitter is too small or too little for you and Instagram isn’t versatile enough for you, then Tumblr might
be just right for you.
If you want to track your stats, you can add any analytics tracking code to your Tumblelog. Some users
will even burn a feed with Feedburner, create custom themes, and use their own domain names
3. Pinterest
Pinterest is a free website that requires registration to use.Users can upload, save, sort, and manage
images—known as pins—and other media content (e.g., videos) through collections known as
pinboards. Pinterest acts as a personalized media platform. Users can browse the content of others in
their feed. Users can then save individual pins to one of their own boards using the “Pin It” button, with
pinboards typically organized by a central topic or theme. Users can personalize their experience by
pinning items, creating boards, and interacting with other members. The end result is that the “pin feed”
of each user displays unique, personalized results.
Content can also be found outside of Pinterest and similarly uploaded to a board via the “Pin It” button,
which can be downloaded to the bookmark bar on a web browser, or be implemented by a webmaster
directly on the website. They also have the option of sending a pin to other Pinterest users and email
accounts through the “Send” button. Some websites include red and white “pin it” buttons on items,
which allow Pinterest users to pin them directly.
Initially, there were several ways to register a new Pinterest account. Potential users could either receive
an invitation from an already registered friend, or they could request an invitation directly from the
Pinterest website that could take some time to receive. An account can also be created and accessed by
linking Pinterest to a Facebook or Twitter profile. When a user re-posts or re-pins an image to their own
board, they have the option of notifying their Facebook and Twitter followers. This feature can be
managed on the settings page.
On the main Pinterest page, a “pin feed” appears, displaying the chronological activity from the Pinterest
boards that a user follows.
A “board” is where the user’s pins are located. Users can have several boards for various items such as
quotes, travel or, most popularly, weddings. A “pin” is an image that has either been uploaded or linked
from a website. Once users create boards and add pins, other users can now repin, meaning they
can pin one user’s image to their board as well. Once the user has set up their account and boards, they
can browse, comment, and like other pins. Users might be discouraged by repeated images and difficult-
to-follow direct linking features. Pinterest has also added the option of making boards “secret” so that
the user can pin to and view boards that only the user can see when logged into their own account.
Pinterest does not generate its own content; rather, it draws from many resources around the web and
compiles them in one convenient location for users.
ADVANTAGE :
– Everything moves fluently, and you can easily preview what you want.
DISADVANTAGE :
-A lot of HTML code churned out by the editors is superfluous which makes the web pages bulky in file
size
-WYSIWYG editors let you ignore certain aspects that are important.
-WYSIWYG editors simply do not provide enough support and help in optimizing your web site for search
engines.
2.) List Down (3) more WYSIWYG web hosting services and their URL.
Web portal
a website that contains information from different sources and places them in one location in a uniform
way
Yahoo!
yahoo.com
offers a web portal where news, email, weather, etc. are found in one place
Facebook groups ; WordPress ; Google Drive ; Microsoft Office Online ; Microsoft’s
Yammer ; Trello
Facebook groups
used to create a group page that will allow people in your group to communicate your ideas
WordPress
allow multiple people to work on different office files and even have their own group’s cloud storage
Microsoft’s Yammer
offers companies to have their own social network that allows sharing and managing content
Trello
world-wide-wait
WWW
CNN
now hosts videos placed on their home page, which was unthinkable in the past because of slow
internet speed
on-demand
Videos way back then were never on the home page and can be viewed “____________” or only when a
user clicks on it.
videos (youtube)
podcasts (ted talks, ear biscuits, the starters, stuff you should know)
vodcasts (video game high school and gmm)
online tests
online survey forms and tests that automatically display the results when finished
courseware
podcasts
embed
Throughout recent history, the Philippines have been one of a few nations that demonstrate unity for
a call to action or social change. These campaigns for social change would have not been successful if it
were not for ICT.
1. EDSA (PEOPLE POWER REVOLUTION). The people power revolution lasted from 1083 to 1986.
During a radio broadcast of Radio Veritas, Cardinal Sin encouraged the Filipinos to help end the
regime of then President Ferdinand Marcos. A major protest took place along the EDSA from
February 22 to 25, 1986 involving two million Filipinos from different sectors. These included
civilians, political parties, the military and religious groups.
2. EDSA DOS.This is also known as the 2001 EDSA Revolution, happened during January 17 to 21,
2001. It was fueled after 11 prosecutors of the President Joseph Estrada walked out of the
impeachment trial. As a result, the crowd in EDSA grew over the course of a few days through
text brigades.
3. Million People March.This is a series pf protest that mainly took place in Luneta Park from
august 22 to 26, 2013. There were also several demonstrations that happened around key cities
in the Philippines and some location overseas. The organizers and promoters of the Million
People March used Facebook and Change.org as their, mediums.
4. Yolanda People Finder.Recent storms in Philippines history gave birth to the People finder
database powered by Google. During typhoon Yolanda, the people finder was a vital tool for
people across the globe to track the situation of their relatives. This proved to be successful and
is now adapted by more organizations to help people track relatives during calamities.
Change.org
Change.org is dubbed as the “world’s platform for change” where anyone from the online community
can create a petition and ask others to sign in it. During the past times petitions are only done through
signing a paper, usually done by a group asking for signatures via travel. Change.org gives access to more
people by allowing the online community to affix their digital signatures on petition.
1. VisitChange.org
2. Change.org works this way. If this is your first time to use Change.org, click Sign up or log in with
Facebook. Otherwise, just input your log in details.
3. You can then start your own petition, but for now click on any petition you want under tending
petitions.
4. Read the petitions description to see if this petition matters to you. If it is, sign the petition by
filling up the information on the right side of the screen.
Alternatively, you can check out petitions of your friends on Facebook, and then click on those
petitions to read about it and sign it.
Before starting your project, your group should be able to do the necessary paperwork. This allows
experts to see if your project is doable over the time frame that was given and if it is significant enough
to be made into reality.
Five elements of a concept paper
1.Introduction-includes tour group’s mission and vision and a brief introduction of your project.
2.Purpose-includes the reasons why this project is worth your group and your sponsor’s time, effort and
money.
3.Description-includes all the necessary information about the project. In ICT, it involves the sites you
are going to produce and the purpose of each and how they work in unison.
4.Support-contains the budget needed for the project. Some concept papers do not specify any amount
requested from the sponsor.
7. Listing down all applications, that you need including web apps
2.Development-involves the actual creation of the website(s), involves the production of images,
infographics, etc.
3.Release and Promotion-involves the actual release of the website for public view and promoting it.
Promotion typically starts before the actual release.
4.Maintenance-involves responding to feedback of your site visitors and continuing to improve your
website.
1. WordPress
Once you log in to your WordPress account, you are on the Reader tab by default. Simply click on My
Sites and from there you will see the statistics for your blog.
2. Facebook
In your Facebook page, a summary of the statistics will appear on the right side of your cover photo:
Hovering your mouse pointer over “Post Reach” will give you more insights on which recent post
reached the most people: Clicking on the Insights tab will give more in-depth statistics:
Advertisement
Reach: Organic – your posts seen through the page’s wall, shares by users, and the news feed
Likes, Comments, and Shares – actual interaction done by your audience either through liking the post,
commenting on it, or sharing it on their walls.
2. Reach– contains information about the number of people who was reached by your post
3. Visits– contains data of the number of times your page tabs (like the Timeline) are visited
4. Post– contains data showing when (day and time) you site visitors visit your site
5. People– contains statistics about your audience’s demographics (age, location, gender, language,
and country). It is also includes demographics about the people you have reached and engaged
with.
Demographics refers to the statistics characterizing human population usually divided by age, gender,
income, location, and language.
iii. Multiple Choice – can be answered by only one answer in a set of options
Creating feedback forms using Google forms
Lesson objectives
• Evaluate the effectiveness of their online campaign through user feedback;
• Improve the online campaign using various tools; and
• Check the impact of their online campaign.
Steps !
Steps !
5. You may now fill out the form questions:
A. Question Title- Includes the question that will be answered by your audience.
B. Help Text- Creates a subtext under the question to give more information about a question.
C. Question Type- changes the type question according to your preference. These questions include:
i. Text – can be answered in a short text.
ii. Paragraph Text – can be answered in a long text.
iv. Checkboxes – a question that can be answered with multiple answers in a set of options.
v. Choose from a list- similar to a multiple-choice question but options are revealed in a drop-down list.
vi. Scale- a question that can be answered with a numerical range.
vii. Grid- a question that contains sub questions with similar options as shown;
• Date- a question that can be answered with a specified date
• Time- a question that can be answered with a specified time
.
d. Advanced Settings: Contains more options for the specified question type.
8. Edit the Confirmation Page option at the bottom as you see fit.
A. Show link to submit another response- allows the user to answer the same form again.
B. Publish and show a public link to form results- allows users to see the summarized results for your
survey.
C. Allow responders to edits responses after submitting- allows users to back and edit their answers
.
9. Click the Send Form button. The Send Form dialog box will appear these options as you see fit.
a. Link to share- contains the URL that you can share on your website.
b. Embed- contains an embed code to attach to your HTML.
c. Short URL- generates a shorter URL necessary for limited spaces like sharing on twitter.
d. Share link via- allows you to share the link to Google+, Facebook, and Twitter.
e. Send form via email- allows you to share the form via email.
f. Add collaborators- Allows others to edit your form, necessary when working on groups.
1. The easiest way to view the result is viewing a summary of the responses. Click on Responses>
Summary of Responses.
2. You will be taken to a Summary of Responses page. This is particularly useful for viewing your results
from time to time.
However, after a set amount of time, you may want to use this data in a spreadsheet and eventually
create your own charts.
3. To use the data collected through responses, click View Responses button found on the upper part of
the page.
Cybercrimes are illegal acts done through the use of the internet. People all over the world use the
Internet to commit a host of crimes, some of which the public doesn’t even know are capable of being
done electronically.
Spoofing attack is when a malicious party impersonates another device or user on a network in order to
launch attacks against network hosts, steal data, spread malware or bypass access controls. There are
several different types of spoofing attacks that malicious parties can use to accomplish this.
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card
details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a
trustworthy entity in an electronic communication.
2. Blackmail/Extortion
Extortion (also called blackmail, shakedown, out wresting, and exaction) is a criminal offence of
unlawfully obtaining money, property, or services from a person, entity, or institution, through coercion.
Refraining from doing harm is sometimes euphemistically called protection. Using the Internet to
threaten to cause damage with the intent to extort from any person any money or other thing of value.
4. Sports Betting
Sports Beating is engaging in the business of betting or wagering on any sporting event or contest over
the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over
the Internet.
5. Non-Delivery of Merchandise
Devising any scheme to defraud, or for obtaining money or property by means of false or fraudulent
pretenses, or promises, and using the Internet for the purpose of executing the scheme. The non-
delivery scam occurs when the scammer places an item up for sale when there is actually no item at all.
The item is subsequently never delivered to the buyer after they purchase the item.
7. Child Pornography
Using the Internet to transmit child pornography. Child pornography is distributed nowadays mainly
through the Internet. Child pornography are produced not only on a professional scale by commercial
providers, but also privately using victims from the producer’s own environment, from the exploitation
of children by clients of child prostitutes. Child pornography is sold over commercial websites and also
exchanged in closed groups or via peer-to-peer networks. Criminal groups also use the Internet to make
big money selling child pornography.
8. Prostitution
Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage
in prostitution.The internet has become one of the preferred methods of communication for
prostitution, as clients and prostitutes are less vulnerable to arrest or assault and for its convenience
9. Drug Trafficking
Criminal Copyright Infringement, the act of piracy mainly for financial gain. In late 2014, the number one
pirate website, The PirateBay, was raided for the second time due to years of pirating movies, music,
games, books, and other software. These kinds of websites earn money through advertsing.