You are on page 1of 4

EMPOWERMENT TECHNOLOGY 4. User Participation.

The owner of the website is not


the only one who is able to put content. Others are able
LESSON 1: Introduction to Information and to place a content of their own by means of comment,
Communication Technologies reviews, and evaluation. Some websites allow readers
to comment on an article, participate in a poll, or
review a specific product (e.g., Amazon.com, online
Information and Communication Technologies stores).
Information and Communication Technology (ICT) 5. Software as a Service. Users will subscribe to a
deals with the use of different communication software only when needed rather than purchasing
technologies such as mobile phones, telephone, them. This is a cheaper option if you do not always
Internet, etc. to locate, save, send and edit information. need to use a software. For instance, Google Docs is a
free web-based application that allows the user to
ICT in the Philippines create and edit word processing and spreadsheet
1. “ICT Hub of Asia” documents online. When you need a software, like a
2. 106.8 cellphones per 100 Filipinos Word Processor, you can purchase it for a one-time
3. ICT industry shares 19.3% of the total employment huge amount and install it in your computer and it is
population yours forever. Software as a service allows you to
4. Time Magazine’s “The Selfiest Cities Around the “rent” a software for a minimal fee.
World” 6. Mass Participation. It is a diverse information
sharing through universal web access. Since most
WEB 1.0 users can use the Internet, Web 2.0’s content is based
When the World Wide Web was invented, most web on people from various cultures.
pages were static. Static (also known as flat page or
stationary page) in the sense that the page is “as is” Web 3.0 And the semantic web
and cannot be manipulated by the user. The content is The Semantic Web is a movement led by the World
also the same for all users. This is referred to as Web Wide Web Consortium (W3C). The W3C standard
1.0. The Inventor of WWW is Tim Berners-Lee. encourages web developers to include semantic
content in their web pages.
Web 2.0 Dynamic Web Page
Web 2.0 is the evolution of Web 1.0 by adding According to the W3C, “The Semantic Web provides a
dynamic web pages—the user is able to see a website common framework that allows data to be shared and
differently than others. Examples of Web 2.0 include reused across application, enterprise, and community
social networking sites, blogs, wikis, video sharing boundaries.”
sites, hosted services, and web applications.
The aim of Web 3.0 is to have machines (or servers)
Web 2.0 allows users to interact with the page: instead understand the user’s preferences to be able to deliver
of just reading a page, the user may be able to web content specifically targeting the user.
comment or create a user account. Web 2.0 also allows
users to use web browsers instead of just using their Several problems of web 3.0
operating system. Browsers can now be used for their 1. Compatibility HTML files and current web
user interface, application software (or web browsers could not support Web 3.0.
applications), and even for file storage. 2. Security The user’s security is also in question
since the machine is saving his or her preferences.
Most websites that we visit today are Web 2.0. 3. Vastness The World Wide Web already contains
Features of Web 2. billions of web pages.
1. Folksonomy. It allows users to categorize and 4. Vagueness Certain words are imprecise. The
classify/arrange information using freely chosen words “old” and “small” would depend on the user.
keywords (e.g., tagging). Popular social networking 5. Logic Since machines use logic, there are certain
sites such as Twitter, Instagram, Facebook, etc. use limitations for a computer to be able to predict what
tags that start with the pound sign (#). This is also the user is referring to at a given time.
referred to as hashtag.
2. Rich User Experience. Content is dynamic and is Trends in ICT
responsive to user’s input. An example would be a 1. Convergence Technological convergence is the
website that shows local content. In the case of social synergy of technological advancements to work on a
networking sites, when logged on, your account is similar goal or task.
used to modify what you see in their website.
3. Long Tail. Services are offered on demand rather 2. Social Media is a website, application, or online
than on a one-time purchase. In certain cases, time- channels that enable web users to create, co-create,
based pricing is better than file-size-based pricing or discuss, modify, and exchange user-generated content.
vice versa. This is synonymous to subscribing to a data
plan that charges you for the amount of time you spent
in the Internet, or a data plan that charges you for the
amount of bandwidth you used.
Six Types of Social Media leaves your PC unprotected and allows hackers to get
1. Social Networks. These are sites that allow you to your information.
connect with other people with the same interests or d. Spyware – a program that runs in the background
background. without you knowing it (thus called “spy”). It has the
2. Bookmarking Sites. These are sites that allow you ability to monitor what you are currently doing and
to store and manage links to various websites and typing through keylogging.
resources. *Keyloggers – used to record the keystroke done by
3. Social News. These are sites that allow users to post the users. This is done to steal their password or any
their own news items or links to other news sources. other sensitive information. It can record email,
4. Media Sharing. These are sites that allow you to messages, or any information you type using your
upload and share media content like images, music, keyboard.
and video. e. Adware – a program designed to send you
5. Microblogging. These are sites that focus on short advertisements, mostly as pop-ups.
updates from the user.
6. Blogs and Forums. These websites allow users to 2. Spam – unwanted email mostly from bots or
post their content. advertisers. It can be used to send malware.

3. Mobile Technologies The popularity of 3. Phishing – Its goal is to acquire sensitive personal
smartphones and tablets has taken a major rise over the information like passwords and credit card details.
years. This is largely because of the devices’ capability
to do tasks that were originally found in personal Copyright infringement
computers. If you create something—an idea, an invention, a form
of literary work, or a research, you have the right of
Kinds of Operating systems: how it should be used by others. This is called
a.iOS intellectual property.
b. Android
c.Blackberry OS Some tips that could help you avoid copyright
d.Windows Phone OS infringement
e.Symbian 1.Understand. Copyright protects literary works,
f.WebOS photographs, paintings, drawings, films, music (and
g.Windows Mobile lyrics), choreography, and sculptures.
2.Be Responsible.
4. Assistive Media Assistive media is a nonprofit 3.Be Creative.
service designed to help people who have visual and 4.Know the Law.
reading impairments. A database of audio recordings is
used to read to the user. Online Research
1.Have a question in mind.
2.Narrow it down.
3.Advanced Search.
LESSON 2: Rules of Netiquette 4.Look for a credible source

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to
promote your business, gain new friends, and stay in LESSON 3: Advanced Word Processing Skills
touch with the old ones. It is also a source of
entertainment. But like most things in this world, there Two Components of Mail Merge:
is always “another side of the coin.” The Internet is 1. Form Document
one of the most dangerous places, especially if you do The document that contains the main body of
not know what you are doing. the message we want to convey or send.
2. List or Data File
Internet Threats: This is where the individual information or
1. Malware – stands for malicious software data that needs to be plugged in (merged) to our form
Types: document is placed and maintained.
a. Virus – a malicious program designed to replicate
itself and transfer from one computer to another either Label Generation
through the Internet and local networks or data storage It creates a blank form document that simulates either
like flash drives and CDs a blank label or envelope of pre-defined size and will
b. Worm – a malicious program that transfers from use the data file that you selected to print the
one computer to another by any type of means. Often, information, typically, individual addresses.
it uses a computer network to spread itself.

c. Trojan – a malicious program that is disguised as a


useful program but once downloaded or installed,
Integrating Images and External Materials 7. In Front of Text – As it suggest, this setting allows
Kinds of Materials: your image to be placed right on top of the text as if
1.Pictures. Generally, these are electronic or digital your image was dropped right on it.
pictures or photographs you have saved in any local
storage device. Lesson 4: Advanced Spreadsheet Skills
a. JPG – this is pronounced as “jay-peg”, and is the
short form for .jpeg or Joint Photographic Experts Microsoft Excel provides an automated way of
Group. This type of image file can support 16.7 displaying any statistical data. It can be used to
million colors that is why it is suitable for use when automatically compute for several factors that are not
working with full color photographic images. easy to notice especially when faced by a large data.
b. .GIF - this stands for Graphic Interchange Format. Microsoft Excel includes several arithmetic and basic
This type is capable of displaying transparencies. functions that help you compute faster.
Therefore, it is good for blending with other materials
or elements in your document. COUNT – a function used to count the cells with
c. .PNG – this is pronounced as “ping” which means content in a range.
Portable Network Graphics. It does not support syntax: =count(value1,value2,…)
animation but it can display up to about 16 million
colors. SUM – a function used to compute for the summation
of the number of a range.
2. Clip Art. This is generally a .GIF type; line art syntax: = sum(value1,value2,…)
drawings or images used as generic representation for
ideas and objects that you might want to integrate in AVERAGE – a function used to compute for the
your document. average of the number of a range.
syntax: =average(cell involved)
3. Shapes. These are printable objects or materials that
you can integrate in your document to enhance its COUNTIF – a function used to count the cells with a
appearance or to allow you to have some tools to use specified content within a range.
for composing and representing ideas or messages.
4. Smart Art. Generally, these are predefined sets of SUMIF – a function used to compute for the
different shapes grouped together to form ideas that summation of a range if a certain condition is met.
are organizational or structural in nature.
AVERAGEIF – a function used to compute for the
5. Chart. Another type of material that you can average of a range if a certain condition is met.
integrate in your Word document that allows you to
represent data characteristics and trends.
6. Screenshot. Sometimes, creating reports or manuals Lesson 5: Advanced Presentation Skills
for training or procedure will require the integration of
a more realistic image of what you are discussing on Creating an Effective Presentation
your report or manual. 1. Minimize. Keep slide counts to a minimum to
maintain a clear message and to keep the audience
Image Placement attentive.
1. In Line with Text. This is the default settings for 2. Clarity. Avoid being fancy by using a font style that
images that are inserted or integrated. It treats your is hard to read. 72 is to 10ft
image like a text font with the bottomside totally 3. Simplicity. Use bullets or short sentences.
aligned with the text line. Summarize the information on the screen. Use the 6 x
2. Square – This setting allows the image you inserted 7 rule.
to be placed anywhere within the paragraph with the 4. Visuals. Use graphics to help in your presentation.
text going around the image in a square pattern like a 5. Consistency. Make your design uniform.
frame. 6. Contrast. Use light font on dark background.
3. Tight – this is almost the same as the square setting,
but here the text “hugs” or conforms to the general Using Hyperlinks in Microsoft PowerPoint:
shape of the image.
4. Through – This setting allows the text on your Link to Options:
document to flow even tighter, taking the contours and a. Existing File or Web Page – creates a hyperlink to
shape of the image. website or a local file saved in your hard drive. Just
5. Top and Bottom – this setting pushes the texts browse your file in the dialog box or type the web
away vertically to the top and/or the bottom of the address.
image. b. Place in This Document – creates a hyperlink that
6. Behind Text – This allows your image to be allows you to jump to a specific slide in your
dragged and placed anywhere on your document but presentation.
with all text floating in front of it. c. Create a New Document – creates a hyperlink that
once clicked, creates a new document on your
specified location.
d. E-mail Address – creates a hyperlink that opens
Microsoft Outlook that automatically adds your
specified recipient on a new email.

Embedding Objects in Microsoft PowerPoint

Embedding objects is easy using PowerPoint


Presentation. With this option, you can insert an Excel
file that would look like a table to a PowerPoint
Presentation. Principles and Basic Techniques of Image
Manipulation
Embedding an Excel File to your PowerPoint 1. Choose the right file format. Try to make a
Presentation real-life photograph into GIF to see the
Options: difference between PNG, GIF, and JPEG.
a. Create New – creates a new file from scratch. You Knowing the purpose is the key to finding out
can select on a wide variety of files listed. the best file format.
b. Create from File – creates a file from an existing 2. Choose the right image size. A camera with
file saved on your hard drive; simply browse the file to 12 megapixels constitutes to a bigger image
use it. size. Monitors have a resolution limit, so even
if you have a million megapixels, it will not
display everything.
Lesson 6: Imaging and Design for Online 3. Caption it. Remember to put a caption on
Environment images whenever possible. If it is not related
to the web page, then remove it.
Basic Principles of Graphics and Layout
1. Balance. The visual weight of objects, texture, Creating and Manipulating Images using
colors, and space is evenly distributed on the screen. PhotoScape
2. Emphasis. An area in the design that may appear - PhotoScape is a good tool because it is feasible for
different in size, texture, shape or color to attract the beginners and advanced users alike.
viewer’s attention. - On PhotoScape’s main screen, you will see the
3. Movement. Visual elements guide the viewer’s eyes many features it has that you can use for creating web
around the screen. content as follows:
4. Pattern, Repetition, and Rhythm. These are the 1. Viewer – as the name implies, is a picture viewer.
repeating visual element on an image or layout to 2. Editor – alters the appearance of a single image.
create unity in the layout or image. Rhythm is 3. Batch Editor – alters the appearance of multiple
achieved when visual elements create a sense of images.
organized movement. 4. Page – arranges several photos to create a single one
5. Proportion. Visual elements create a sense of unity 5. Combine – links several images together to form a
where they relate well with one another. bigger image.
6. Variety. This uses several design elements to draw 6. Animated GIF – Allows you to create an animated
a viewer’s attention. image from several pictures.
7. Print – readies picture for printing.
Infographics 8. Splitter – divides a single picture into multiple
Information graphics or infographics are used to parts.
represent information, statistical data, or knowledge in 9. Screen Capture – captures the screen.
a graphical manner usually done in a creative way to 10.Color Picker – grabs a pixel from your screen to be
attract the viewer’s attention. used in editing
11. Raw Converter – converts Raw images to JPEG
Creating Infographics using Piktochart 12. Rename – allows you to rename a batch of photos
1. Graphics – allows you to insert lines, shapes, 13. Paper Print – useful tool for printing your own
icons,and even photos. calendars, sheets, lined paper, etc.
2. Uploads – allows you to upload images.
3. Background – changes the background of the block
4. Text – allows you insert text to your infographic. Sharing Photos with Photobucket
5. Styles – allows you to modify the color scheme of a. View Uploads – views photos you just uploaded
your infographic. which also grants you options to share and edit them
6. Tools – allows you to create charts. individually
to save your work in your computer, click on b. Share Album – shares everything you just uploaded
Download and select the medium-sized and PNG file plus the other contents of your specified folder
type. c. Edit Photos – uses Photobucket’s photo editing
tools to manipulate your image

You might also like