0% found this document useful (0 votes)
38 views12 pages

Reviewer Emtech

Pe.reviewer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views12 pages

Reviewer Emtech

Pe.reviewer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

WEEK 1 and 2

EMPOWERMENT TECHNOLOGIES

INFORMATION AND COMMUNICATION TECHNOLOGIES AND ITS CURRENT STATE


Information and Communications Technology (ICT)
- It deals with the use of different communication technologies such as mobile
phones, telephone, internet, etc. to locate, save, send and edit information.
-These are digital forms of communication including tools available in the internet,
such as blogging and e-mail, as well as computer software, such as Microsoft
PowerPoint and word
ICT in the Philippines
The Philippines called as the ICT Hub of Asia
Reasons:
1. ICT Related Jobs like BPO
2. ICT shares 19.3% of the total employment population.
3. According to the study 106cp/100 Filipinos
4. Philippines-Rank 1 as the “Selfiest Cities around the world,”

The INTERNET has been a vital tool to our modern lives that is why it is also important
to make the best of the internet.
• World Wide Web ( WWW)
- is an information system on the internet that allows documents to be connected
to other documents by hypertext links, enabling the user to search for
information by moving from one document to another.
- It was invented by Tim Berners Lee in 1989

Types of Websites
• Web 1.0 or static/stationary
• Web 2.0 dynamic
• Web 3.0 Semantic web

Web 1.0 or static/stationary


• A static or stationary page wherein users cannot interact with the page. For
example: mp3.com, Wikipedia, brunch, metalsmith
• Also called as Read-Only Web
Web 2.0 dynamic
• A dynamic page wherein users can interact with the page.
• Here are some of the examples: Facebook, Instagram, tiktok, twitter and etc.
Features of Web 2.0
• FOLKSONOMY - allows users to categorize and classify/arrange information using
freely chosen keywords (e.g. tagging).
• RICH USER INTERFACE - content is dynamic and is responsive to user’s input. An
example would be a website that shows local content.
• USER PARTICIPATION - the owner of website is not the only one who is able to
put content. Others are able to place content on their own by means of comments,
reviews, and evaluation.
• LONG TAIL - services are offered on demand rather than on a one-time purchase.
Subscribing to a data plan
• SOFTWARE AS SERVICE- users will subscribe to a software only rather than
purchasing them
- rent a software for a minimal fee.
• MASS PARTICIPATION - Diverse information sharing through universal web
access.
• •Web 2.0’s content is based on people from various culture

Web 3.0 or Semantic web


• The aim of Web 3.0 is to have machines understand the user’s preferences to be
able to deliver web content specifically targeting the user.
• The internet is able to predict the best possible answers to your questions by
learning from your previous choices.

Trends in ICT
• As the world of ICT continues to grow, the industry has focused on several
innovations. These innovations cater to the needs of the people that benefit most
out of the ICT. Whether it is for business or personal use, the trends are current
front runners in the innovation of ICT.
• 1. CONVERGENCE- synergy of technological advancements to work on a similar
goal or task.
• 2. SOCIAL MEDIA- a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange user generated content.
Types of Social Media
1. Social networks – sites that allow you to connect with other people with same
interest or back ground.
Examples: Facebook, Intagram, Tiktok etc.
2. Bookmarking sites – sites that allow users you to store and manage links to various
websites and resources and to tag.
Examples: StumbleUpon, Pinterest
3. Social news – sites that allow users to post their own news item of links to other
news resources.
Examples: Reddit, Dig
4. Media Sharing – sites that allow you to upload and share media content like images,
music and video.
Examples: YouTube, Intagram, Tiktok etc.
5. Microblogging – sites that focus on short updates from the user. Those who are
subscribed will receive updates.
Examples: Twitter
6. Blogs and Forums – sites that allow users to post their content
Examples: Blogger, WordPress, Tumblr.
• ASSISTIVE MEDIA- is a non- profit service designed to help people who have
visual and reading impairments.
• A database of audio recordings is used to read to the user.
• Mobile technologies- Mobile devices are capable of using high-speed internet.
• Today the latest model devices use 5G Networking, which is currently the fastest
mobile network.

Different types of Mobile operating system


1. iOS – used in apple devices such as the iPhone and iPad.
2. Android – an open source operating system developed by google.
3. Blackberry OS - used in blackberry devices.
• Different types of Mobile operating system
4. Windows Phone OS – a closed source and propriety operating system developed by
Microsoft.
5. Symbian - the original smartphone OS used by Nokia devices.
6. WebOS – originally used for smartphones; now used for SmartTVs.
7. Windows Mobile - developed by Microsoft for smartphones and pocket PCs.

Online Safety and Security

Information that you should not publicly disclose through the social media:
 First name
 Middle name Cellphone Number
 Current/ Previous School
 Password
 Family names and relatives
 Address
 Birthday
 as a student, LRN
Internet Threats
1. Malware- stands for malicious software

Types of Malware
1.1 Virus- a malicious program designed to replicate itself and transfer from one
computer to another either through local networks or data storage like flash
drives and CD
RESULT: DATA LOSS ; CRIPPLED FUNCTION
*Creeper Virus – first computer virus in 1971
1.2 Worm- replicates itself through a network
-delete files, others disrupt the network function , send junk mail from infected
computer.
- Users should not run attachments or open emails from unknown or suspicious
sources, delete them immediately.
I love You Worm - Love Bug or Love Letter for you, is a computer worm that
infected over ten million Windows personal computers on and after 5 May 2000.
- It started spreading as an email message with the subject line "ILOVEYOU" and
the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs
1.3 Trojan - distinguish as a useful program but once downloaded or installed,
leaves your PC unprotected and allows the hackers to get your information.
RESULT: ERASE DATA, CORRUPT FILES; PHISHING
1.4 Spyware - Program that collects information or even take control over the
computer without the knowledge of the user.
- ability to monitor what you are currently doing or typing through keylogging.
- able to monitor and collect information about the user and his internet habits and
practices.
- It is known that spyware programs also affect the performance and settings of
the computer
1.5 Adware - a program designed to send you advertisements, mostly as pop-ups.
1.6 Ransomware- from crypto virology that threatens to publish the victim's data
or perpetually block access to it unless a ransom is paid.
2. Spam - unwanted email mostly from bots or advertisers.
- It can be used to send malware.

3. Phishing - Its goal is to acquire sensitive personal information like passwords and
credit card details by appearing as a trustworthy entity.
- Internet users think that they are accessing a genuine website , phisher would
gain sensitive information
4. Hacker - person who is able to enter and control other people's computer without
authorization.
RESULT: vandalized website, steals personal information, obtains intellectual
property, and performs credit card fraud.

Tips on How to Stay Safe Online


1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of social networking site you use.
4. Do not share your password with anyone
5. Avoid logging in to public network/Wi-Fi. Browsing in “incognito mode” will not
protect you from hackers.
6. Do not talk to strangers whether online or face-to-face.
7. Never post anything about your future vacation.
8. Add friends you know in real life
9. Avoid visiting untrusted websites
10. Install and update an antivirus software on your computer. Use only one antivirus
software to avoid conflicts.
11. If you have a Wi-Fi at home, make it a private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. Buy the software; do not use pirated ones.
14. Do not reply or click links from suspicious emails.
Copyright - A part of law, wherein you have the rights to your work, anyone who uses it
without your consent is punishable by law.
Fair Use - means that an intellectual property may be used without consent as long as it
is used in commentaries, criticism, comment, news reporting, teaching, scholarship, or
research.
Copyright Infringement - It occurs when there is a violation of any of the of the
exclusive economic or moral rights granted to the copyright owner.
Netiquette, or network etiquette, is concerned with the "proper" manner of
communication in the online environment.
Rules of Netiquette
1. Remember the Human - Practice the Golden Rule: Do unto others as you would
have others do unto you. Remember, your written words are read by real people,
all deserving of respectful communication.
2. Adhere to the same standards of behavior online that you follow in real
life - Would you behave rudely to someone face-to-face? On most occasions, no.
Neither should you behave this way in the virtual world.
3. Know where you are in cyberspace - Depending on where you are in the virtual
world, the same written communication can be acceptable in one area, where it
might be considered inappropriate in another.
4. Respect other people's time and bandwidth - Make your written
communication meaningful and to the point, without extraneous text or
superfluous graphics or attachments that may take forever to download.
5. Make yourself look good online- Always check for spelling and grammar errors,
know what you're talking about and state it clearly, be pleasant and polite.
6. Share expert knowledge - When you post a question and receive intelligent
answers, share the results with others.
7. Help keep flame wars under control - When two or three people exchange
angry posts between one another, must be controlled or the camaraderie of the
group could be compromised.
8. Respect other people's privacy - Just as you expect others to respect your
privacy, so should you respect the privacy of others.
9. Don't abuse your power - Knowing more than others do or having more power
technologically than others may have does not give you the right to take
advantage of anyone.
10. Be forgiving of other people's mistakes - If it's a minor "offense," you might
want to let it slide. If you feel compelled to respond to a mistake, do so in a private
email rather than a public forum.

Online Research
Internet Research - It is the profound impact on the way ideas are formed and
knowledge is created.
- Internet research is the practice of using internet information,
especially free information on the World Wide Web, in research.
Contextual Research - an attempt to be more precise in providing the list of
documents according to the words used by the user to search the Internet.
Search Engines- a computer program that searches documents especially on the WWW
for a specified word or words and provides a list of documents in which they are found.

Strength and Weaknesses of Research


Strengths
1. It is faster than other medium.
2. It will save user’s physical distance.
3. You can share information with other people.
4. Quality of information speed, immediacy, and complete disregard for physical
distance.
Weaknesses
1. Uncertainty over the validity of the data and sampling issues.
2. There are misleading and false information that surface over the internet.
3. It can lead to perpetrator to phish pertinent information.
Enhancing and Improving Research Skills
1. Critical Thinking - most important in drawing conclusion to the various ideas
and arguments that one encounters, and to be able to draw from these data for
their real treasure.
- means the ability to digest, reflect, and conclude info
2. Analytical Skill - requires the ability to look, verbalize, conceptualize, and gather
data attuned to the context of the subject. And then, apply synthesis, focus, and
critical thinking to extract the useful information in the pile of research.
3. Problem Solving Capability - the ability to present solutions or solve problems
by presenting a decision based on the given information.
4. Organized Data Mining- well-planned design of the database of all the research
materials either inside the computer or hard copies.
5. Research Presentation - the ability to present the ideas and draw conclusions
from the research, be able to explain in writing the purpose, steps, goals, and
objective of the research.
6. Creativity and Developed Imagination - the ability to look for alternative
solutions to the problems needed to solve in the research and thinking not only
within the context but also beyond the usual approaches to the research
objectives.
7. Computer Literacy - Knowledge of the various computer applications and tools
when working with large amount of data helps the researcher manage this
information.
Satirical Sites - are websites that report untrue or false stories meant to amuse or
entertain. These sites take their cue from TV shows that report exaggerated news that
are untrue but intriguing and funny.
-These sites started as spoofs of real public figures such as political leaders or
movie personalities with real stories from known news sources such as ABS-CBN,
RAPPLER, Philippine Daily Inquirer, Star, GMA7, and other news sources on the
Internet.
Untrue stories should not be shared with your friends, family, and contacts. You need to
be careful and analytical with what you share in the social media even if shared by your
friends or people you respect, sometimes, they themselves are unaware that the news is
not true. You should be warned against believing everything of what you read online.

How to detect Satirical News


 If it is too good to be true, then it must be so.
 Familiarize yourself with reputable news sources.
 Look for details that are clearly unrealistic or absurd.
Software Application and Platforms
Online Platform - specially developed platform using Internet technology. It has
revolutionized access to any information.
Web Search Engines - is a software system designed to search for information on the
World Wide Web (WWW).
Communication Services - these are outsourced enterprise communications solutions
that can be leased from a single vendor or provider.
Payment System - any system used to settle financial transactions through the
transfer of monetary value and consist of the various mechanisms.
Advertising Platforms - allows users to create and manage advertising campaign,
generate reports, and retrieve information about the ads, campaigns and organizations
associated with an account.
Platform for Hash tagging –a label used in social media sites that makes it easier to
find posts or information. example: Twitter
Platform for Grouping - set of users who share a common purpose. Groups may
perform tasks such as approving change requests, resolving incidents, receiving email
notifications, or performing work order tasks. example: LinkedIn
Platform for Teaching -combined set of cloud- based services that provides
professors and faculty with the information, tools, and resources required to support and
enhance educational delivery and management in higher education. example:
YouTube
Platform for Analyzing Business-creates value by facilitating exchanges between two
or more interdependent groups, usually consumers and producers. example: Pinterest

WEEK 3

In the professional world, sending out information to convey important information is


vital. Because of ICT, things are now sent much faster than the traditional newsletters or
postal mail. You can now use the internet to send out information you need to share
much faster.
Mail Merge and Label Generation
Mail Merge is one of the most powerful and commonly used features of Microsoft
Word. It allows you to create documents and merge them with another document. It is
commonly used when sending out advertising materials to various recipients.
Two components of Mail Merge
1. Form Document is the first component of our mail merged document that contains
the main body of the message we want to convey or send.
• Place holders are data fields or merge fields which marks the position on your form
document where individual data or information will be inserted and are denoted by the
text with double-headed arrows (<< >>) on each side.
2. List or Data File. This is where the individual information or data that needs to be
plugged in (merged) to the form document is placed and maintained.
Label Generator is a mail merge feature included on Microsoft Word. Microsoft Word
will print individual addresses to a standard form that it has already pre-formatted. It
creates a blank form document that simulates either a blank label or envelope of pre-
defined size and will use the data file that you selected to print the individual addresses.
Custom Animations in PowerPoint
Importance of Animations in Presentations
1. Engagement - Animations capture attention and keep your audience engaged,
making your presentation more memorable.
2. Clarity - Visually illustrate complex concepts, showcasing relationships and
connections in an easily digestible way.
3. Professionalism - Professional animations add polish and visual appeal, reflecting
well on your presentation.
4. Impact - Drive home key messages and create lasting impressions with carefully
designed animations.

Types of Animations in Powerpoint

Entrance - How objects appear on the slide, like a fade-in, zoom, or fly-in effect.
Emphasis - Draws attention to specific elements by changing their appearance or
adding a visual effect.
Exit- How objects disappear from the slide, for example, fading out, shrinking, or
flying away.

Controlling Animation Timing and Sequences

Timing- Set the speed and duration of each animation, determining how quickly or
slowly it plays.
Delay - Control the timing between animations, creating a sense of rhythm and
flow within the presentation.

Sequence - Define the order in which animations play, building a narrative and
guiding the viewer's attention.

HYPERLINK
 Microsoft PowerPoint is a tool that helps you to present data whether it is
scientific, statistical, or a book report.

Creating an Effective Presentation

 1. Minimize. Keep slide counts to a minimum to maintain clear message and keep
the audience attentive.
 2. Clarity. Use font style that is easy to read.
Tip: a font size of 72 is about an inch (depends on the screen size). A one-inch
letter is readable 10 ft away; two-inch letter is readable 20 ft away.
 3. Simplicity. Use bullets or short sentences by summarizing the information on
the screen. Limit the content to six lines and seven words per line. (6 x 7 rule)
 4. Visuals. Use graphics to help in your presentation. Instead of using a table of
data, use charts and graphs.
 5. Consistency. Make your design uniform and avoid different font styles and
backgrounds.
 6. Contrast. Use light font on dark background or vice versa.

Ways to insert hyperlinks:


1. Select an object or highlight a text.
2. Go to Insert>Hyperlinks (under links category) or use the shortcut key
Ctrl+K.

• Link to options:
• a. Existing File or Web Page – creates a hyperlink to website or a local file
saved in your hard drive. Just browse your file in the dialog box or type the web
address.
• b. Place in This Document – creates hyperlink that allows you to jump to a
specific slide in your presentation.
• c. Create a New Document – creates a hyperlink that once clicked, creates a
new document on your specified location
• d. E-mail Address – creates a hyperlink that opens Microsoft Outlook that
automatically adds your specified recipient on a new email
• E. When done, click OK to apply your hyperlink.

WEEK 4

Spreadsheet
- Is a software that lets you work with numbers using columns and rows.
- It is also designed to hold numbers and short text.

Microsoft excel
A software program created by Microsoft that uses spreadsheets to organize
numbers and data with formulas and functions.

Parts of Microsoft Excel


WEEK 5

Graphic Design vs. Layout


Graphic design is an artistic way of communicating ideas and messages through visual
expressions using texts, images, and symbols
Graphic designers work on the quality of the output they serve for the audience or
clients like websites, advertisements, posters, flyers, logos, videos, and any other
multimedia form.

Design is a plan of creating an idea through a combination of texts, images, and other
elements that are placed together artistically, whereas, the layout is a term used as the
process of organizing and arranging these elements in a design as you plot it in a paper.

1. Balance
It refers to the proper arrangement of the elements, which gives a visual
weight for the design. There are two types of balance, Symmetrical or
Asymmetrical. Symmetrical balance is where the elements are equally distributed
on both sides of your design, technically a mirror-based design. In contrast,
Asymmetrical balance is a free layout where the elements can be placed in any
order or the opposite of symmetrical.
2. Emphasis
It refers to something that needs to stand-out or emphasize. When working
on emphasis, you can change the color, size, or even the element itself to lead the
eye to the focal interest.
3. Pattern, Repetition and Rhythm
The use of repetitive elements such as lines, shapes, forms, textures, space,
colors, font, style, and the like to create texture, movement, continuity, and
consistency of the design. It also makes the design formal and more comfortable
to read because of its uniformity.
4. Alignment
It refers to the proper placement of an element to your design, just like
invisibly placing or aligning your texts or images diagonally, vertically, and
horizontally. The standard texts or paragraph alignment we apply are center, right,
left, and justified.
5. Hierarchy
It refers to the proper arrangement of the details such as text, characters,
numbers, and symbols. Changing its character size, thickness, spaces, or even font
type to stand out is its most critical features. By applying this principle, it can help
the viewer to recognize and navigate the highlight of the event smoothly.
6. Contrast
It refers to the use of different or opposite elements such as sizes (large or
small), shapes (geometric or organic), spaces (negative or positive), form (real or
abstract), colors (monochromatic, complementary, triadic, tetradic), texture
(smooth or rough), and values (light or dark). The contrast gives visual weight to
an object or design. You must consider and limit the use of different elements,
color, style, and typography to avoid cluttered design. When creating contrast in
color and text, it is advised to choose a color from the background to create
consistency of your design. Always remember that the details must be readable by
having a dark-light value of either text and background or vice-versa.
7. Unity and Harmony
It refers to the relationship of the elements or the contents when you place
them together. The elements of the design must work together and agree to its
meaning, theme, feeling, or mood.

WEEK 6

Image Manipulation
- -refers to a process of bringing chance to a digitalized image for transforming it
to a desired image.
- -the chance is made possible by resorting to image processing
Principles and techniques in Image Manipulation
Cropping- Cutting parts away to remove distracting or irrelevant elements
Color Balance- The ambiance and the tone of light of the picture (warm or cool Light)
Brightness and contrast- Making the image darker.
- It refers to the overall lightness or darkness of the image. Contrast is the
difference in the brightness between object regions.
Filter – Making the image look sketched, grainy, classic black and white or even let it
have neon color.
-This gives your image a twist from its original look.
Changing the Background – adding background to make your image stand out.
Removing the color – removing the certain colors in your image or desaturating the
color of the image.
Combining text, Graphics and Image – Adding multiple elements in your layout.
Combining text, and Graphics and Image:
- Transparent shapes
- Fonts and shapes
- Text and background
- Clean and clear background

Week 7
A Web page is a document for the World Wide Web that can be accessed and displayed
on a monitor or smartphone using any web browser. Web pages are made up of
Hypertext Markup Language (HTML) and can be created and modified by using basic
application like Notepad and professional HTML editors.

HTML is Easy to Learn and Use


HTML is easy to learn and understand. For someone who wants to learn web
development, HTML is the first and foremost computer language that you need to take
note but do not worry, it is not a sensitive case and as simple as it is. It already has some
tags that serve a specific purpose to make. One can easily understand others’ code and
make changes in it when required without reading a whole book of a manual. Moreover,
it does not throw any error or create any problem like other programming languages do
when the developer forgets to close the tags or makes mistakes in coding.

HTML is Free
One of the biggest advantages of HTML is that it is free of all cost and there is no need to
purchase specific software for it to be used.
Online Website Builder - Easy Use of Drag-And-Drop Interface
For those who love to make changes to their website, a drag-and-drop interface is
convenient.
WYSIWYG
WYSIWYG is the acronym for What You See Is What You Get. This means that whatever
you will type, insert, draw, place, rearrange, or whatever you do on a web page is what
the audience will see. Just like using the Microsoft Word, WYSIWYG shows and prints
whatever you will type on the screen.

HTML
• HTML stands for Hyper Text Markup Language
• HTML describes the structure of a web page
• HTML consists of a series of elements
• HTML elements tell the browser how to display the content
• HTML elements are represented by TAGS
• HTML TAGS label pieces of content such as “heading”, “paragraph”, “table”
and so on...
• Browsers do not display the HTML tags, but use them to render the content
of the page
Requirements in creating a web page using the html
1. Editor – using the Notepad (source code) in text and extension name - .html or .htm.
2. Browser – responsible for reading HTML instruction and displaying the web page
output. (ex. Internet
Explorer, Mozilla Firefox, Google Chrome)

You might also like