You are on page 1of 17

WEEK 1

Introduction to Information and Communication Technologies

Information means valuable context that gives meaning and relevance to many people such as name of
place, birth date, color, money, your name, depending on the context.

Communication refers to the conveying of information between two or more people in different places.

Technology new tools to accomplish various tasks in our daily lives

Information and Communication Technology (ICT) deals with the use of different communication
technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information.

Internet is the global system of interconnected computer networks that use the internet protocol 
suite (TCIP/IP) to link billions of devices worldwide.

World Wide Web An information system on the internet that allows documents to be connected to other
documents by hypertext links, enabling the user to search for information by moving from one document
to another.

Web Page is a hypertext document connected to the World Wide Web.   It is a document that is   suitable
for the World Wide Web.

2 Kinds of Web Page

1. Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and
cannot be manipulated by the user.

2. Dynamic Web Pages- is the evolution of web by adding dynamic web pages. The user is able to see
website differently than others e.g. social networking sites, wikis, video sharing sites.

The different online platforms of World Wide Web:

1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web
pages connected by hyperlinks.

2.  Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others.

– Allows users to interact with the page; instead of just reading the page, the user may be
able to comment or create user account.

3. Web 3.0 –  this platform is all about semantic web.

– Aims to have machines (or servers) understand the user’s preferences to be able to deliver
web content.

Most websites that we visit today are Web 2.0.

Features of Web 2.0


1. Folksonomy. It allows users to categorize and classify/arrange information using freely chosen
keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook,
etc. use tags that start with the pound sign (#). This is also referred to as hashtag.

2. Rich User Experience. Content is dynamic and is responsive to user’s input. An example would
be a website that shows local content. In the case of social networking sites, when logged on,
your account is used to modify what you see in their website.

3. Long Tail. Services are offered on demand rather than on a one-time purchase. In certain cases,
time-based pricing is better than file-size-based pricing or vice versa. This is synonymous to
subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a
data plan that charges you for the amount of bandwidth you used.

4. User Participation. The owner of the website is not the only one who is able to put content. Others
are able to place a content of their own by means of comment, reviews, and evaluation. Some
websites allow readers to comment on an article, participate in a poll, or review a specific product
(e.g., Amazon.com, online stores).

5. Software as a Service. Users will subscribe to software only when needed rather than purchasing
them. This is a cheaper option if you do not always need to use software. For instance, Google
Docs is a free web-based application that allows the user to create and edit word processing and
spreadsheet documents online. When you need a software, like a Word Processor, you can
purchase it for a one-time huge amount and install it in your computer and it is yours forever.
Software as a service allows you to “rent” a software for a minimal fee.

6. Mass Participation. It is a diverse information sharing through universal web access. Since most
users can use the Internet, Web 2.0’s content is based on people from various cultures.

Trends in ICT

1. Convergence  - Technological convergence is the synergy of technological advancements to work


on a similar goal or task. For example, besides using your personal computer to create word
documents, you can now use your smartphone.

2. Social Media is a website, application, or online channels that enable web users to create, co-
create, discuss, modify, and exchange user-generated content.

Six Types of Social Media

1. Social Networks. These are sites that allow you to connect with other people with the same interests
or background.

2. Bookmarking Sites. These are sites that allow you to store and manage links to various websites and
resources.

3. Social News. These are sites that allow users to post their own news items or links to other news
sources.

4. Media Sharing. These are sites that allow you to upload and share media content like images, music,
and video.

5. Microblogging. These are sites that focus on short updates from the user.

6. Blogs and Forums - allow user to post their content. Other users are able to comment on the said
topic.
3. Mobile Technologies  The popularity of smart phones and tablets has taken a major rise over the
years. This is largely because of the devices’ capability to do tasks that were originally found in
personal computers.

Operating system - is a system software that manages computer/device hardware, software resources,
and provides common services for computer/device programs.

 Operating system for personal computers and laptops


 Operating system for mobile phones

Kinds of Operating Systems for Mobile Phones

a. iOS - use in apple devices such as iPhone and iPad

b. Android - an open source OS developed by Google. Being open source means mobile
phone companies use this OS for free.

c. Blackberry OS - use in blackberry devices.

d. Windows phone OS - A closed source and proprietary operating system developed by


Microsoft.

e. Symbian - the original smartphone OS. Used by Nokia devices.

f. WebOS- originally used in smartphone; now in smart TVs.

g. Windows Mobile - developed by Microsoft for smartphones and pocket PCs.

h. Harmony OS -  styled as HarmonyOS, is an upcoming free, microkernel-based distributed


operating system being developed by Huawei. Unveiled on 9 August 2019, the platform is
designed primarily for Internet of things (IoT) devices.

Ø Internet of things (IoT)- is a system of interrelated computing devices, mechanical and digital
machines provided with unique identifiers (UIDs) and the ability to transfer data over a network without
requiring human-to-human or human-to-computer interaction.  IoT technology is most synonymous with
products pertaining to the concept of the "smart home", including devices and appliances (such as
lighting fixtures, thermostats, home security systems and cameras, and other home appliances) that
support one or more common ecosystems, and can be controlled via devices associated with that
ecosystem, such as smart phones and smart speakers.

4. Assistive Media is a nonprofit service designed to help people who have visual and reading
impairments. A database of audio recordings is used to read to the user.

5. Cloud computing- distributed computing on internet or delivery of computing service over the
internet. Instead of running an e-mail program on your computer, you log in to a Web

Three Components of Cloud Computing

1. Client computers   –   clients are the device that the end user interact with cloud.

2. Distributed Servers – Often servers are in geographically different places, but server acts as if
they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed via Internet

Types of Clouds

1. Public cloud allows systems and services to be easily accessible to the general public.ublic cloud
may be less secured because of its openness, e.g. e-mail.

2. Private cloud allows systems and services to be accessible within an organization. It offers
increased security because of its private nature.

3. Community cloud allows systems and services to be accessible by group of organizations.

4. Hybrid cloud is a mixture of public and private cloud. However, the critical activities are performed
using private cloud while the non-critical activities are performed using public cloud.

WEEK 2

Because of the wide capacity of Web 2.0, it has helped in creating dynamic online platform sites.
Online platform is a specially developed platform using Internet technology. Online platforms have
revolutionized access to any information. Online platforms currently include, but are not limited to:

Presentation or Visualization

Cloud Computing

File Management

Mapping

Social Media

Let us go through them one by one!

1. Presentation or Visualization Platform allows you to present and share presentations,


infographics and videos with other people. It is used to communicate information clearly and
efficiently.

2. Cloud Computing Platform is also called as “The cloud.” It is the practice of using a network of
remote servers hosted on the internet. Instead of using your computer’s hard drive, you store and
access your data and programs over the Internet.

3. File Management Platform is used for the storing, naming, sorting, and handling of computer files.
Allows you to convert and manage files without download in the software tool.

4. Mapping Platform is a transformation taking the points of one space into the points of the same or
another space. Uses GPS to detect location and used for navigation.

5. Social Media Platform is a computer-mediated tools that allow large group of people to create,
share or exchange information, interest and the information shared can be in the form of ideas,
pictures, videos or anything that you want to create and share to virtual communities. It can be in
the following platforms
Social Networks. These sites allow you to connect with other people with the same interests or
background.

Bookmarking Sites. These are sites that allow you to store and manage links to various websites and
resources.

Social News. These are sites that allow users to post their own news items or links to other news
sources.

Media Sharing. These are sites that allow you to upload and share media content like images, music,
and video. Media sharing sites can be specific for video sharing, photo sharing, slide sharing, social
bookmarking, and gaming.

Microblogging. These are sites that focus on short updates from the user. Those subscribed to the user
will be able to receive these updates. Posts are brief that range typically from 140 – 200 characters.

Blogs and Forums. These are websites that allow users to post their content. Other users can comment
on the said topic.

WEEK 4

Online Safety, Security and Netiquette

The internet is the guiding technology of the Information Technology Age just as the electrical
engine was of the Industrial Age. In these times, more and more people are already engaged in the use of
technology. These people who are raised in a digital, media-saturated world are called digital natives. No
doubt, the Internet has been very useful to us but with the rise of instant messaging, chat rooms, emails
and social networking sites, it can also bring trouble - from cyberbullying to more serious Internet
dangers, including exposure to sexual predators. Thus, internet safety is always our primary concern.

What is Online Threat ?

Online threat is any malicious act that attempts to gain access to a computer network without
authorization or permission from the owners.

These are usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime.

Web threats pose a broad range of risks, including financial damages, identity theft, loss of
confidential information/data, theft of network resources, damaged brand/personal reputation, and erosion
of consumer confidence in e-commerce and online banking.

Kinds of online threats that you should be aware of:

1. Phishing- happens when an email is sent from an internet criminal disguised as an email from a
legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or
confidential information.

2. Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a
legitimate one.

 These “spoofed” sites can capture a victim’s confidential information, including usernames,
passwords, and credit card data, or install malware on their computer.
 Pharmers usually focus on websites in the financial sector, including banks, online payment
platforms, or other e-commerce destinations.
3. Internet Scam generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain.

 Cybercriminals may contact potential victims through personal or work email accounts, social
networking sites, dating apps, or other methods in attempts to obtain financial or other valuable
personal information.
 Online scams may come in various forms such as lottery scam, charity fraud scams, job offer
scams, and online dating scams to name a few.

4. Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is
programmed to do certain tasks.

 Bots are automated, which means they run according to their instructions without a human user.
 Some bots are useful, such as search engine bots that index content for search or customer
service bots that help users. Other bots are "bad" and are programmed to break into user
accounts, scan the web for contact information for sending spam, or perform other malicious
activities.

5. Malware or malicious software, is any program or file that is harmful to a computer user.

6. Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable
permission for the message to be sent. Spam messages can be damaging if you open or respond to
it.

7. Cyberstalking refers to the use of the internet or other electronic device to harass or stalk individuals
or organizations.

8. Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using the
internet.

9. Spoofing happens when someone or something pretends to be something else to gain our confidence,
get access to our systems, steal data, steal money, or spread malware.

There are numerous delinquencies that can be committed on the internet such as stalking, identity theft,
privacy violations, and harassment.

To avoid these online crimes, follow the following online safety measures:

Never give any personal information about yourself over the internet.

Do not give any banking or sensitive information unless you are sure that it is a reputable business having
a secure service. To make sure that you are in a secured network, the website address should begin with
“https://’ as opposed to “http://”. Never access your accounts by following an email link, instead type your
URL by yourself.

 Never open messages or attachments from someone you do not know.


 Regularly review your privacy settings in your online accounts to make sure you are not sharing
important personal information.
 When using a public computer terminal, be sure to delete your browsing data before leaving.
 Keep your software updated to avoid security holes.
 Do not download or install software or anything on your computer or cell phone that is unknown to
you.

Different Types of Online Security


1. Complex password entry – Social media platforms and websites that allow you to have an
account or offer a login entry system will more often than not, ask you to create a password in
order to gain access in the future.

2. Security questions – Commonly, banks will ask you to set up security questions. These questions
will be personal to you and you should never share your answers with anybody.

3. Anti-virus software/freeware – Antivirus software that can be purchased or freely downloaded


can be very useful in providing protection to internet users.

4. Two-factor authentication – means that more than just a username and password are required
when logging in to an account. This works by sending a unique code to the user via SMS. This
code will expire after a certain amount of time and also lets people know if anyone is attempting
to gain access to their account without permission.

Online Safety and Security

The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, stay in
touch with the old ones. It is also a source of entertainment.

But like most things in this world, there is always “another side of the coin.” The Internet is one of the
most dangerous places, especially if you do not know what you are doing.

Online safety refers to the practices and precautions that should be observed when using the internet to
ensure that the users as well as their computers and personal information are safe from crimes
associated with using the internet.

Online Safety Tips


The SMART guidelines are as follows:

 S for Safe: Keep personal details away from strangers.


 M for Meet: Don’t meet people that you know online unless you’re with a trusted adult.
 A for Accept: Don’t click any links that you’re unsure about. Ask a trusted adult.
 R for Reliable: Don’t believe everything people tell you. Always check trusted sources to find the
truth.
 T for Tell: If you see something online that upsets you, tell a trusted adult straight away!

Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly
online.
Flame war is a series of flame posts or messages in a thread that are considered derogatory in nature or
are completely off-topic. Often these flames are posted for the sole purpose of offending or upsetting
other users. The flame becomes a flame war when other users respond to the thread with their own flame
message

WEEK 5

Effective Internet Research


The Internet has made our lives easier especially in terms of doing research. By browsing the
internet, we can access limitless topics. Web-based catalogs are available in many libraries to assist
researchers in locating printed books, journals, government documents and other materials. The biggest
obstacle facing all researchers on the internet is how to effectively and efficiently access the vast amount
of information available (The Internet: Research Tools, 2013).
Searching the Web
There are billions of information on the web and it is a challenge for us to truly find which
information is reliable and relevant. Here are some tips you may use to be able to look for relevant and
reliable sources:

 Search Engines are websites used for retrieval


of data, files, or documents from data bases.
Some search engines we use today are the
following:

Anatomy of a URL
A URL or also known as UNIFORM RESOUCE LOCATOR is one type of Uniform Resource
Identifier (URI). It is a generic term for all types of names and addresses that refer to objects on the World
Wide Web. Knowing the URL endings will give you clues to who is sponsoring the website and help
evaluate the sources.

 Search Skills and Tools

1. Boolean Logic – narrows, broadens, or eliminates search term.


a. Boolean “or” – this operator will find pages that
include either of the search terms.

Ex. A or B

b. Boolean “and” –
this operator will
retrieve only pages
containing both
terms

Ex. A and B

c. Boolean “not” – this


operator will find
pages that do not
include search term
immediately following
it.

Ex. A not B
2. Phase Searching – is used to search for famous quotes, proper names, Recommendations,
etc. It encloses the phrase in quotation marks.

Ex. “Jane Doe” “To be or not to be”

3. Plus (+) – indicates that the word after the sign is a required word must be found in search.
Example: +fire
4. Minus (–) sign – indicates to exclude a word from your search that is not required on the result.
Example: Jaguar speed –car
5. Ampersand (@) is used to find social tags. Example: @SteveJobs

6. Hashtag (#) is used to find popular hashtags. Example: #OnlineClass


7. Finding Documents – using the filetype refines the search for documents on the web.

 filetype:pdf
 filetype:doc
 filetype:xls

1. Searching Site – the sites find webpage from a website.


Ex.: National Geographic information in Australia Search:
Australia site: NationalGeographic.com
Evaluating Sites
The web provides access to some excellent information and can also give access to those that are
irrelevant and outdated. Here is some checklist that you can use to evaluate your website:

1. Authority. It reveals that the person, institution or agency responsible for a site has the
qualifications and knowledge to do so. Evaluating a web site for authority:
 Authorship: It should be clear who developed the site.
 Contact information should be clearly provided: e-mail address, snail mail address,
phone number, and fax number.
 Credentials: the author should state qualifications, credentials, or personal background
that gives them authority to present information.
 Check to see if the site supported by an organization or a commercial body
2. Purpose. The purpose of the information presented in the site should be clear. Some sites are
meant to inform, persuade, state an opinion, entertain, or parody something or someone.
Evaluating a web site for purpose:
 Does the content support the purpose of the site?
 Is the information geared to a specific audience (students, scholars, general reader)?
 Is the site organized and focused?
 Are the outside links appropriate for the site?
 Does the site evaluate the links?

3. Coverage. This refers to how comprehensive the website is in their discussion of certain topics.
Evaluating a web site for coverage:
 Does the site claim to be selective or comprehensive?
 Are the topics explored in depth?
 Compare the value of the site’s information compared to other similar sites.
 Do the links go to outside sites rather than its own?
 Does the site provide information with no relevant outside links?
4. Currently. It refers to: (1) how current the information presented is, and (2) how often the site is
updated or maintained. It is important to know when a site was created, when it was last
updated, and if all of the links are current. Evaluating a web site for currency involves finding the
date information was:
 first written
 placed on the web
 last revised
5. Objectivity. Objective sites present information with a minimum of bias. Evaluating a web site
for objectivity:

 Is the information presented with a particular bias?


 Does the information try to sway the audience?
 Does site advertising conflict with the content?
 Is the site trying to explain, inform, persuade, or sell something?
6. Accuracy. It refers to the credibility of the website. Evaluating a web site for accuracy:

 Reliability: Is the author affiliated with a known, respectable institution?


 References: do statistics and other factual information receive proper references as
to their origin?
 Is the information comparable to other sites on the same topic?
 Does the text follow basic rules of grammar, spelling and composition?
 Is a bibliography or reference list included?

WEEK 6

Productivity Tools

Productivity Tools also known as productivity software are software that people use to create and
produce professional quality documents, presentations, databases, charts, graphs, and more

The three basic functions of these three productivity tools are:


Microsoft Word - Writing Skill
Microsoft Excel – Numeracy skills
Microsoft PowerPoint – Presentation skills

What is MS-WORD?

MS-WORD is a word processor. It is an application you use to “process”— format, manipulate, save,
print, share — a text-based document.
Word 1.0 for Windows was released in 1989, it was one of the first word processors that offered a
WYSIWYG (what you see is what you get) interface
Quick Access Toolbar – Collection of buttons that provide one click access to commonly used
commands such as Save, Undo or Redo. You can also customize this according to your preference.
Title Bar – A bar the display the name of active document.
Ribbon – The main set of commands and controls organized task in Tabs and groups, you can also
customize the ribbon according to your preference
Vertical Scroll Bar – Scroll bar to use when you want to scroll vertically through the document window
Horizontal Scroll Bar – Scroll bar to use when you want to scroll horizontally through
the document window.
Zoom Control – Used for magnifying and shrinking of the active document.
View Shortcut – Buttons used to change how the worksheet content is displayed. Print Layout, Full
Screen Reading, Web Layout, Outline or Draft.
Status Bar  – It displays information about your document, such as what page you are currently viewing
and how many words are in your document, etc.
Ruler – It used to set the alignment and margins of the elements in the documents.

What is MS Excel?

Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It
features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic
for Applications.
It has been a very widely applied spreadsheet for these platforms, especially since version 5 in 1993, and
it has replaced Lotus 1-2-3 as the industry standard for spreadsheets. Excel forms part of the Microsoft
Office suite of software.

Quick Access Toolbar


You will see this toolbar on the left-upper corner of the screen. Its purpose is to display the most
frequently used commands of the Excel. You can customize this toolbar based on your choice
commands.
File Tab
In Excel 2007, it was an “Office” button. This menu do file related operation, i.e. create new excel
documents, open an existing file, save, save as, print file, etc.
Title Bar
The header or title bar of the spreadsheet located at the top of the window. It presents the name of the
active document.
Control buttons
They are those symbols in the upper-right of the window that allows you to modify the labels, minimize,
maximize, share and close the sheet.
Menu bar
Menu bar consist of a File, Insert, Page Layout, Formulas, Data, Review, View, Help, and a Search Bar
with a light bulb icon. These menus have subcategories that simplify the distribution of information and
analysis of calculations.
Ribbon/Toolbar
There are a series of elements that are part of each menu bar. On the selection of any menu, a series
of command options/icons will display on a ribbon. For example, if you press the “Home” tab, you will
see cut, copy, paste, bold, italic, underline, and etc commands.
Dialog Box Launcher
This is a very small down arrow located in the lower-right corner of a command group on the Ribbon.
By clicking this arrow explore more options about the concerned group.
Name box
Show the location of the active cell, row or column. You can make more than one selection.
Formula bar
It is a bar that allows you to observe, insert or edit the information/formula entered in the active cell.
Scrollbars
Those are the tools that allow you to mobilize both the vertical and horizontal view of the document.
Spreadsheet Area
It is the working area where you enter your data. It constitutes the entire spreadsheet with its rows,
cells, columns and built-in information.
Leaf Bar
At the bottom, a text that says sheet1 is displayed. This sheet bar explains the spreadsheet that is
currently being worked on. Through this, we can alternate several sheets at our convenience or add a
new one.
Columns Bar
Columns are a series of boxes vertically organized in the entire sheet. It columns bar is located below
the formula bar. The columns are listed with letters of the alphabet. Start with the letter A to Z, and then
after Z, it will continue as AA, AB and so on. The maximum limit of columns is 16,384.
Rows Bar
It is that left part of the sheet where a sequence of numbers is expressed. Start with number one (1)
and as we move the cursor down, more rows will be added. The maximum number of rows goes to
1,048,576.
Cells
Cells are those that divide the spreadsheet into several segments that allow rows to be separated from
columns. The first cell of a spreadsheet is represented by the initial letter of the alphabet and the
number one (A1).
Status Bar
This bar located at the bottom of the window which shows very important information. It also shows
when something is wrong, or the document is ready to be delivered or printed.
View Buttons
It is a group of three buttons arranged at the left of the Zoom control, close the right-bottom of the
screen. Through this, you can see three different types of excel’s sheet views.
Normal view: This displays the Excel page in normal view.
Page Layout view: This displays the exact view of Excel’s page as they will be printed.
Page Break view: This shows page break preview before printing.
Zoom Control
Zoom control is located at the lower-right area of the window. It allows you to ZOOM-IN or ZOOM-OUT
a particular area of the spreadsheet. It is represented by magnifying icons with the symbols of
maximizing (+) or minimizing (-).

Basic Excel Formulas:


Addition (+)
Subtraction (-)
Multiplication (*)
Division (/)
*type <=> before the formula, thus: =a1+a2 <then, hit the ENTER key>
What is MS PowerPoint?

Microsoft PowerPoint is a presentation program, created by Robert Gaskins and Dennis Austin at a
software company named Forethought, Inc. It was released on April 20, 1987, initially for Macintosh
System Operating system based computers only.
Microsoft acquired PowerPoint for about $14 million three months after it appeared.
PowerPoint became a component of the Microsoft Office suite, first offered in 1989 for Macintosh[11]
and in 1990 for Windows which bundled several Microsoft apps. Beginning with PowerPoint 4.0 (1994),
PowerPoint was integrated into Microsoft Office development, and adopted shared common
components and a converged user interface.

A. File Menu and Backstage View


When you click the File menu, you see the Backstage view that contains all the
creation, save, share, and print options for your presentations.
B. Quick Access Toolbar (QAT)
Is a customizable toolbar placed by default above the Ribbon. Here, you can add icons
for your often used commands. The QAT can also be placed below the Ribbon.
C. Ribbon
The Ribbon has tabs which in turn contain groups of buttons for various options. Some
groups also contain galleries (for example galleries for Themes and Theme Colors).
D. Slides Pane
Located on the left side of the interface, the Slides pane shows thumbnails of all the
slides in the open presentation.
E. Slide Area
Displays the active slide. Explore our Slide Area in PowerPoint page for more info.
F. Task Pane
The Task Pane contains more options and appears when you choose an option in one
of the Ribbon tabs. For example if you click the Format Background button within the
Design tab of the Ribbon, the Format Background task pane
G. Status Bar
A horizontal strip that provides information about the opened presentation like slide
number, applied Theme, etc. It also includes the view and zoom options.
H. Notes Pane
Right below the active slide, this is where the speaker notes are written for the current
slide. Note that none of this content is visible on the actual slide while presenting,
although it is visible in both Notes Page view and Presenter view.
I. View Buttons
Essentially there are three view buttons on the Status Bar displayed towards the left of
the zoom-in and zoom-out options:
Normal
If you are in some other view such as Slide Sorter view, click the Normal button on the
Status Bar to switch to Normal view. Shift-clicking this button gets you to Slide Master
view.
Slide Sorter
Click this button to switch from any other view to Slide Sorter view. The Slide Sorter
view displays zoom-able thumbnails of every slide in the open presentation. Shift-
clicking this button gets you to Handout Master view.
Reading View
Click this button to switch from any other view to Reading view.
Slide Show
Show the presentation as a full-screen slide show from the currently selected slide.
Shift-clicking brings up the Set Up Show dialog box.
J. Mini Toolbar
It is a semitransparent floating toolbar that spawns right next to selected text. Hover the
cursor upon it, and you can see the Mini Toolbar.

WEEK 7 & 8

Imaging and Design for Online Environment

What is an IMAGE?

 a representation of the external form of a person or thing in art


Images can be 2-dimensional (2D) or 3-dimensional (3D)
They may be captured by optical devices – such as cameras, mirrors, lenses, telescopes,
microscopes, and natural objects and phenomena, such as the human eye or water.

2-Dimensional Image
Two Dimensional Object is an object with just height and width, and without depth; therefore, two
dimensional objects are flat.
3-Dimensional Image
describes an image that provides the perception of depth.

What are GRAPHICS?

 these are visual images or designs on some surface, such as a wall, canvas, screen, paper, or
stone to inform, illustrate, or entertain.

What is LAYOUT ?

 It is part of graphic design that deals in the arrangement of visual elements on a page.

Basic Principles of Graphics and Layout

1. Balance - The visual weight of objects, texture, colors, and space is evenly distributed on the
screen.
There are two kinds of balance:

Symmetrical Balance. The visual weight is distributed evenly, either vertically or horizontally. You can
draw a line straight through the middle of the design, and the visual balance would be evenly distributed.
Asymmetrical Balance. There is an artistic and different intensity on one side of the page.

2. Color - is used for emphasis or may elicit emotions from viewers. Determined by its :
hue (name of color),
intensity (purity of the hue)
value (lightness or darkness of hue)
3. ALIGNMENT - is simply the way visual elements are arranged so that they line up in some way.
There are two basic kinds of alignment:
Edge alignment determines the placement of elements in relation to the edge of the page or
canvas. This can mean the elements are aligned to the left side or right side, but it can also mean
they are aligned to the top or bottom of the page, so long as it uses an edge to organize
everything.
Center alignment aligns all the elements so that an invisible, central line on the page will always
be in the center of the elements.

4. REPETITION It is the process of repeating elements throughout a design to give a unified look.
Repetition goes with consistency of your design on font, font size, patterns, and colors.

5. PROXIMITY is simply the process of ensuring related design elements are placed together. Any
unrelated items should be spaced apart. Close proximity indicates that items are connected or
have a relationship to each other and become one visual unit which helps to organize or give
structure to a layout (Smith, 2017).

6. CONTRAST is the divergence of opposing elements (opposite colors on the color wheel, or value
light / dark, or direction – horizontal / vertical). Contrast allows us to emphasize or highlight key
elements in your design.

 White Space is the art of nothing. It is also known as the negative space. It is the portion of a
page left unmarked: margins, gutters, and space between columns, lines of type, graphics,
figures, or objects drawn or depicted.

Purpose of Visual Information

1. Gain Attention
2. Creating Meaning
3. Facilitate Retention

Infographics

 Information graphics or infographics are used to represent information, statistical data, or


knowledge in a graphical manner usually done in a creative way to attract the viewer’s attention.

Principles in Making an Effective Infographic Design

1. Be unique
2. Make it simple
3. Be creative and bold
4. Less is more
5. The importance of getting it across

ONLINE FILE FORMATS FOR IMAGES AND TEXTS


 A standard process that data is encoded for storage in a computer file.
 Defines how bits are used to encode information in a digital storage device.
 Most information comes from different format.

JPEG:
 JPEG stands for Joint Photographic Expert Group
 Most common used format by Digital Camera and other capturing device
 Most common format when saving pictures on the internet
 Size over Quality
GIF:
 GIF stands for Graphic Interchange Format
 Not recommended for large images with many colors
 File size are very small and load very fast
 Good choice for simple animation
PNG:
 PNG stands for Portable Network Graphics.
 Supports 24-bit images and generate background transparency without jagged edges
 Best format for logos that involves transparency and fading
PDF:
 PDF stands for Portable Document File
 It is optimized in a smaller file size without losing the file quality
 Can be viewed using its Reader or through Web Browers
DOC:
 DOC is short for Document File
 File format created by Microsoft and commonly used by Microsoft Word
 Can include charts, illustration, formatted texts, tables and etc.

Image Manipulation PRINCIPLES

 Choose the right file format. Try to make a real-life photograph into GIF to see the difference
between PNG, GIF, and JPEG. Knowing the purpose is the key to finding out the best file
format.
 Choose the right image size. A camera with 12 megapixels constitutes to a bigger image size.
Monitors have a resolution limit, so even if you have a million megapixels, it will not display
everything.
 Caption it. Remember to put a caption on images whenever possible. If it is not related to the
web page, then remove it.

Image Manipulation TECHNIQUES

1. Cropping - Cutting parts away to remove distracting or irrelevant elements.


2. Color Balance - The ambience and the tone of light of the picture (ex. Warm or cool light)
3. Brightness and Contrast - One of the most basic techniques in image editing, making the
image darker or lighter.
4. Compression and Resizing - The higher the quality and the larger the photo is, the bigger the
file size of the picture is.

5. Filters - Making the image look sketched, grainy, classic black and white or even let it have
neon colors. This gives your image a twist from its original look
6. Cloning - Copying or duplicating a part of an image.
7. Changing the Background - Adding background to make your image stand out .
8. Removing the Color - Removing certain colors in your image or desaturating the color of the
image.
9. Combining Text, Graphics and Image - Adding multiple elements in your layout.

You might also like