0% found this document useful (0 votes)
21 views6 pages

Talaga Reviewer

The document provides guidance on developing an ICT project proposal, including sections on project objectives, desired impact, risk management, organization, work plan, budget, and conclusion. It also discusses using interactive multimedia and online platforms for advocacy and digital citizenship.

Uploaded by

divinegarcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views6 pages

Talaga Reviewer

The document provides guidance on developing an ICT project proposal, including sections on project objectives, desired impact, risk management, organization, work plan, budget, and conclusion. It also discusses using interactive multimedia and online platforms for advocacy and digital citizenship.

Uploaded by

divinegarcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

EMPOWERMENT TECHNOLOGY REVIEWER

Development of ICT Project for


Social Change 3. Project Objectives
● The goals of the project should
Demographics already be set from the
● The information can be beginning.
categorized into different labels 4. Desired Impact and Outcome of
such as age, gender, income, the Project
religion, and profession. ● describes the long-term effect
● used to learn the characteristics of the project and specific
of the target audience and the measures to sustain it.
key features. 5. Risk Management Plan
● it includes the risks and factors
Psychographic that may hamper or hinder the
● information is described as successful implementation of
uncountable information from the project activities and the
people such as interests, achievement of project outputs.
opinions, and insights. This also includes measures to
● can describe and capitalize on mitigate the effects of project
the interest of the subject by risks encountered.
observing certain information. 6. Project organization and
Staffing
Writing a Project Proposal ● describes the people involved
and their responsibilities in the
1. Project Information / project.
Description 7. Work Plan
● This section is meant to provide ● a detailed project schedule. It is
an overall picture of the project a list of tasks that will be
that can be seen at glance as performed for the project. The
well as convey important work plan is a means to expose
project details. the project’s risks which could
be used to make reasonable
a. Project Title: (PROJECT TITLE); estimates of the man hours
b. Type of Project: required to complete it. A
(education-training/ health-medical milestone chart can also be
mission/ art exhibit, etc.); used in this section to monitor
c. Project Proponent/s: (Name of work progress at any given
organization/ name of the people time.
involves); 8. Budget Requirement
d. Project Beneficiaries: (Urban ● A detailed, line item budget that
poor, women, youth, etc.); includes the cost needed for
e. Date of Implementation/ every part of the project. The
Duration: (Start date/ number of following table may be used to
implementation days); repeat budget requirements.
f. Budget Requirement: (overall 9. Other Relevant Information
amount of budget requirement); ● includes any information that
g. Project Contacts: (List of will support a request for
individuals involved with the project.) funding such as brief
enumeration of stakeholders’
2. Project Background pledge and lined-up projects to
● explains what needs/ problems complement the current.
you are trying to solve, and why 10. Conclusion
these needs/ problems are ● a short summary that explains
worth solving. The project’s the potential value of the
brief history, references, and project.
other supporting documentation
may also be provided here.
11. Appendix Talks, The Starters, Ear
● refers to additional charts, Biscuits).
graphs, reports, etc. that are 7. Vodcasts
cited in the proposal, but were ● An episodic series of video
not appropriate to be placed in streamed online (e.g., YouTube
the main body of the document. series/shows like Video Game
High School, Good Mythical
INTERACTIVE MULTIMEDIA AND Morning).
ICT AS PLATFORM FOR CHANGE
What is an Advocacy?
INTERACTIVE MULTIMEDIA ● Advocacy is a process of
● is any computer delivered supporting and enabling people
electronic system that allows to express their views and
the user to control, combine, concerns, access information
and manipulate different types and services, defend and
of media, such as text, sound, promote their rights and
video, computer graphics, and responsibilities.
animation.
DIGITAL CITIZENSHIP
MULTIMEDIA CONTENT ● is referring to the utilization of
information technology (IT) in
1. Videos order to engage in society,
● Through video hosting sites, politics, and government. K.
you can take a video and show Mossberger, et al. define digital
it to the entire world (e.g. citizens as "those who use the
YouTube). Internet “regularly and
2. Sound, Music or Audio effectively".
● If videos are too much for you,
you can always record sounds. PUBLISHING AN ICT PROJECT
You can share your sound bites
to the entire world (e.g. ONLINE PLATFORM
SoundCloud). ● Online platform is a base of
3. Online Games technologies designed to run
● Game developers now create within an online environment
what is called “browser-based and provide interactive online
games.” You do not need to services.
install these games to your WEBSITE MANAGEMENT
computer as they run in most ● It is an integrated set of tools
updated web browsers that allows teams to create,
(AdventureQuest, Farmville, design, develop, launch,
Candy Crush, BigFish). manage, administer, and
4. Online Tests monitor website contents.
● Online survey forms and tests WordPress
that automatically display the ● Is a free and open-Source
results when finished (Online IQ content (CMS) management
and Personality Tests). System based on PHP and
5. Courseware MySQL.
● Online courses that simulate the Joomla
classroom online (e.g., ● Is a free and open source
E-learning Courses using a content management system
Learning Management System). Joomla! (CMS) for publishing
6. Podcasts web content. Joomla is written
● An episodic series of audio or in PHP, uses Object-oriented
text files streamed online (e.g., programming (OOP) techniques.
Stuff You Should Know, TED
Social Media advertisements, e-mail and
● Social network integrates with other Google
● Media sharing products.
● Bookmarking
Facebook Analytics
● With Facebook analytics you can
PROMOTION, TRACTION AND see the ways to take action
TRAFFIC MONITORING right away. It creates an
1. Use interactive multimedia overview dashboard where you
2. Us various online tools can see the number of new
3. Use images users, the number of unique
4. Use blog users, and The percentage of
5. Collaborate online people who return to your site.
6. Update
BASIC PRINCIPLES OF GRAPHICS
TRACTION TOOLS AND AND LAY OUT
VALIDATION FEEDBACKS
BALANCE
Linkedin - visual weights of the objects,
● Is a social networking site texture, colors and space evenly
Designed specifically for the distributed on screen.
business community. The goal EMPHASIS
of the site is to allow registered - An area in design that may
members to establish and appear different in size, texture,
document networks of people shape or color to attract the
they know and trust viewers attention.
professionally. MOVEMENT
Google Adwords - Visual elements guide the
● Is an advertising service by viewer’s eyes around the
google for businesses wanting screen.
to display ads on google and its PATTERN, REPETITION AND
advertising network. RHYTHM
Reddit - repeating visual elements on an
● Reddit is an American social image or lay out to create unity
news aggregation, web content in the lay out or image.
rating, and discussion website. - Rhythm is achieved when visual
Registered members submit elements create a sense of
content to the site such as organized movements.
links, text posts, and Images, PROPORTION
which are then voled up or - visual elements create a sense
down by other members. of unity where they relate well
Facebook Ads with one another.
● purchased on an auction basis, VARIETY
where advertisers are charged - uses several design elements to
based on either clicks, draw a viewer’s choice.
impressions or actions.
Google Analytics INFOGRAPHICS
● It provides real-lime statistics
and analysis of user interaction ● information graphic
with the website. It enables ● is a visual representation of
website owners to analyze Their information which aims to make
visitors, with the objective of the data easily understandable
interpreting and optimizing at a first glance.
website's performance. It can ● minimal use of text and can be
also track all forms of digital a powerful tool for displaying
media and web destinations, data
● explaining concepts, simplifying Art
presentations, mapping - 25 years from the date of
● relationships, showing trends creation
● providing essential insights Photographic work
- 50 years from publication
KINDS OF INFOGRAPHICS Audio- visual work
● Informational Infographics - 50 years from publication
● Charts Infographics Sound recording
● Process Infographics - 50 years from year recording
● Timeline infographics took place
● Resume Infographics Broadcast recording
● Number Infographic - 20 years from date of broadcast
● Comparison Infographics Trademark
● Pie Chart Infographics - Valid for 10 years and may be
renewed for a periods of 10
ELEMENTS OF INFOGRAPHICS years
Invention Patent
COLOR - Valid for 20 years from filing
- Use no more than five colors in date application
a single layout. You can use
different shades of a single Non-patentable Inventions
color to distinguish
TYPOGRAPHY
- All fonts should be legible and
appropriate for what you are
communicating.
ICONOGRAPHY
- Icons should be simple, easy to
understand and universal.
They're meant to enhance
comprehension, never distract.

INFOGRAPHIC TOOLS 1. Discoveries, scientific theories,


- Piktochart and mathematical methods
- Canva 2. Schemes, rules and methods of
- Venngage performing mental acts, playing
- Visme games or doing business and
- Easelly programs and computers
3. Methods of treatment of the
INTELLECTUAL PROPERTY & human or animal body by
Challenges In The Virtual World surgery or therapy and
diagnostic methods practiced on
- refers to creations of the mind, the human or animal body
such as inventions; literary and 4. Anything which is contrary or
artistic works; designs; and public order or morality
symbols, names and images
used in commerce. Types of Plagiarism
● The cut and paste
Republic act 8293 ● Word-switch
INTELLECTUAL PROPERTY CODE ● Style
OF THE PHILIPPINES ● Metaphor
● Idea
Literary works
- During the lifetime of the author Fabrication
plus 50 years after death - is the reproduction of data or
results them as true and correct
Falsification PUNISHABLE ACTS Section 4.
- is the manipulation, Cybercrime Offenses. — The
modification or omission of data following acts constitute the
to meet a certain results offense of cybercrime punishable
under this Act:
Challenges In The Virtual World
A) Offenses against the
Money theft/phishing confidentiality, integrity, and
- refers to the process of availability of computer data and
harvesting bank details, in systems:
particular, personal
identification numbers (PINs) (1) Illegal Access – The access to
and transaction authentication the whole or any part of a computer
numbers (TANs), with the intent system without right.
to ransack other people’s bank (2) Illegal Interception – The
accounts interception made by technical means
Commercial fraud without right of any non-public
- Commercial fraud happens transmission of computer data to,
when sellers pretend to sell from, or within a computer system
goods or services which, after including electromagnetic emissions
payment, either do not show from a computer system carrying such
the promised attributes or are computer data.
not delivered at all. (3) Data Interference — The
Grooming intentional or reckless alteration,
- refers to pedophiles using the damaging, deletion or deterioration of
Internet as a means to contact computer data, electronic document,
children and young people while or electronic data message, without
concealing their adult identity. right, including the introduction or
Bullying transmission of viruses.
- Flaming (4) System Interference — The
- Harassment intentional alteration or reckless
- Cyberstalking hindering or interference with the
- Denigration functioning of a computer or computer
- Masquerade network by inputting, transmitting,
- Outing and Tricking damaging, deleting, deteriorating,
- Exclusion altering or suppressing computer data
or program, electronic document, or
Various types of bullying seem always electronic data message, without right
to be part of people’s lives. Even or authority, including the introduction
though publishing content like or transmission of viruses.
defamatory pictures can be part of (5) Misuse of Devices (i) The use,
bullying, the phenomenon is chiefly production, sale, procurement,
related to online contact. importation, distribution, or otherwise
making available, without right, of:
Computer addiction (6) Cyber-squatting – The
- the excessive use of computers acquisition of a domain name over the
to the extent that it interferes internet in bad faith to profit, mislead,
with daily life destroy reputation, and deprive others
from registering the same.

(b) Computer-related Offenses:

(1) Computer-related Forgery (i)


The input, alteration, or deletion of
any computer data without right
resulting in inauthentic data with the
intent that it be considered or acted the sender to its existing users,
upon for legal purposes as if it were subscribers or customers; or
authentic, regardless whether or not (4) Libel — The unlawful or
the data is directly readable and prohibited acts of libel as defined in
intelligible; or Article 355 of the Revised Penal Code,
(2) Computer-related Fraud — The as amended, committed through a
unauthorized input, alteration, or computer system or any other similar
deletion of computer data or program means which may be devised in the
or interference in the functioning of a future.
computer system, causing damage
thereby with fraudulent intent:
Provided, That if no damage has yet
been caused, the penalty imposable
shall be one (1) degree lower.
(3) Computer-related Identity
Theft – The intentional acquisition,
use, misuse, transfer, possession,
alteration or deletion of identifying
information belonging to another,
whether natural or juridical, without
right: Provided, That if no damage has
yet been caused, the penalty
imposable shall be one (1) degree
Lower.

(c) Content-related Offenses:

(1) Cybersex — The willful


engagement, maintenance, control, or
operation, directly or indirectly, of any
lascivious exhibition of sexual organs
or sexual activity, with the aid of a
computer system, for favor or
consideration.
(2) Child Pornography — The
unlawful or prohibited acts defined
and punishable by Republic Act No.
9775 or the Anti-Child Pornography
Act of 2009, committed through a
computer system: Provided, That the
penalty to be imposed shall be (1) one
degree higher than that provided for
in Republic Act No. 9775.
(3) Unsolicited Commercial
Communications. — The
transmission of commercial electronic
communication with the use of
computer system which seek to
advertise, sell, or
offer for sale products and services
are prohibited unless:
(i) There is prior affirmative consent
from the recipient; or
(ii) The primary intent of the
communication is for service and/or
administrative announcements from

You might also like