Lesson 1 - 15
Lesson 1 - 15
Lesson 1 - 15
Empowerment Technology
HOME
CONTACT
BLOG
It deals with the use of different communication technologies such as mobile phones,
telephone, Internet to locate, save, send and edit information
Is a study of computers as data processing tools. It introduces students to the fundamental
of using computer systems in an internet environment.
Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers.
ICT Department in the Philippines is responsible for the planning, development and
promotion of the country’s information and communications technology (ICT) agenda in
support of national development.
Computer– an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that use the internet
protocol suite (TCIP/IP) to link billions of devices worldwide.
Means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers.
Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a
network of networks in which the users at any one computer can get information from any
other computer.
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that
is suitable for the World Wide Web.
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the
Web pages connected by hyperlinks.
1. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see
a website differently than others.
– Allows users to interact with the page; instead of just reading the page, the user may be able
to comment or create user account.
– Aims to have machines (or servers) understand the user’s preferences to be able to
deliver web content.
Advertisement
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’
and cannot be manipulated by the user. The content is also the same for all users that is
referred to as Web 1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The
user is able to see website differently than others e.g. social networking sites, wikis, video
sharing sites.
1. Folksonomy- allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as
hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews and
evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent
in the internet.
5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.
TRENDS IN ICT
1. Convergence– is the synergy of technological advancements to work on a similar goal or
task. For example, besides using your personal computer to create word documents, you can
Advert isement s
REPORT THIS AD
a)Social Networks – These are sites that allows you to connect with other people with the
same interests or background. Once the user creates his/her account, he/she can set up a
profile, add people, share content, etc
b)Bookmarking Sites – Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
Advert isement s
REPORT THIS AD
d) Media Sharing – sites that allow you to upload and share media content like images,
music and video.
Ex. Flickr, YouTube and Instagram
e) Microblogging – focus on short updates from the user. Those that subscribed to the user will
be able to receive these updates.
Ex. Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other users are able to
comment on the said topic.
Ex. Blogger, WordPress and Tumblr
Advert isement s
REPORT THIS AD
1. Mobile Technologies– The popularity of smartphones and tablets has taken a major rise over
the years. This is largely because of the devices capability to do the tasks that were
originally found in PCs. Several of these devices are capable of using a high-speed internet.
Today the latest model devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS
e-mail account remotely. The software and storage for your account doesn’t exist
1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but server acts as
if they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed via
Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public.
Public cloud may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers
increased security because of its private nature.
Advert isement s
REPORT THIS AD
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public cloud.
INTERNET SAFETY- it refers to the online security or safety of people and their information
when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
Advert isement s
REPORT THIS AD
You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing
online just like you can in real life.
You are still talking to a real person with feelings even though you can’t see them.
Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.
Do not take advantage of other people just because you have more knowledge or
power than them.
Treat others as you would want them to treat you if the roles were reversed.
Internet security
Security Requirement Triad
ConfidentIality
Data confidentiality
Privacy
Integrity
Data integerity System integrity
Availability
Threat Consequence Threat Action ( Attack)
Masquerader
Hackers
Clandestine user
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormant phase
Virus is idle.
Propagation phase
Virus places an identical copy of itself into other programs or into certain system areas on t
the disk.
Triggering phase
Virus is activated to perform the function for which it was intended.
Caused by a variety of system events
Execution phase
Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Virus- a malicious program designed to transfer from one computer to another in any means
possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any
other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying money
for a fake malware removal tool.
Keyword searching
Use quotation marks to search as a phrase and keep the words linked together
Boolean
AND – enter words connect with AND- it will include sites where both words and found
NOT – searches for the first term and excludes sites that have the second term.
Question
Advanced
Features are offered on many engines by going to an “Advanced search” page and making
selections. Effective in narrowing search returns to a specific topic or phrase.
In the professional world, sending out information to convey important information is vital.
Because of ICT, things are now sent much faster than the traditional newsletters or postal mail.
You can now send much faster than the traditional newsletters or postal mail. You can now use
the Internet to send out information you need to share. What if we could still do things much
faster – an automated way of creating and sending uniform letters with different recipients?
Would that not be more convenient?
A. Mail Merge
One of the important reasons in using computers per se is its ability to do recurring
tasks automatically. But this ability has to be honed by learning the characteristics and features
of the software you use with your computer. After all, no matter how good or advance your
computer and software may be, it can only be as good as the person using it.
In this particular part of our lesson, we will learn one of the most powerful and
commonly used features of Microsoft Word called Mail Merge. As the name suggests, this
feature allows you to create documents and combine or merge them with another document or
data file. It is commonly used when sending out advertising materials to various recipients.
The simplest solution for the scenario above is to create a document and just copy
and paste it several times then just replace the details depending on whom you send it to. But
what if you have hundreds or thousands of recipients? Would not that take too many hours?
What if you have a small database of information where you can automatically generate those
letters?
1. Form Document
The first component of our mail merged document is the form document. It is
generally the document that contains the main body of the message we want to convey or send.
The main body of the message is the part of the form document that remains the same no
matter whom you send it to from among your list.
Also included in the form document is what we call place holders, also referred to
as data fields or merge fields. This marks the position on your form document where individual
data or information will be inserted. From our sample document, the place holders are denoted
or marked by the text with double-headed arrows (<< >>) on each side and with a gray
background. On a printed standard form, this will be the underlined spaces that you will see and
use as a guide to where you need to write the information that you need to fill out. In its
simplest form, a form document is literally a “form” that you fill out with individual information.
A common example of a form document is your regular tax form or application form.
The second component of our mail merged document is the list or data file. This is
where the individual information or data that needs to be plugged in (merged) to the form
document is placed and maintained. One of the best things about the mail merge feature is that
it allows data file to be created fro within the Microsoft Word application itself, or it gets data
from a file created in Microsoft Excel or other data formats. In this way, fields that needed to be
filled up on the form document can easily be maintained without accidentally altering the form
or main document. You can also easily add, remove, modify, or extract your data more
efficiently by using other data management applications like Excel or Access and import them
in Word during the mail merge process.
B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It
just makes sense that after you print out your form letters, you will need to send it to individual
recipients in an envelope with the matching address printed directly on the envelope or on a
mailing label to stick on. By using virtually the same process as a standard mail merge,
Microsoft Word will print individual addresses to a standard form that it has already pre-
formatted. Simply put, it creates a blank form document that simulates either a blank label or
envelope of pre-defined size and will use the data file that you selected to print the information,
typically individual addresses. So even in generating labels, the two essential components of
creating a merged document are present: the form document and the data file. Only in this case,
you did not have to type or create the form document yourself because it was already created
and pre-formatted in Microsoft Word. All you need to do is select the correct or appropriate size
for the label or envelope and select the data file that contains the addresses (data) to be
printed. You can also preview your merged labels before printing if you want to.
II. Integrating Images and External Materials
A. Kinds of Materials
1. Pictures
Generally, these are electronic or digital pictures or photographs you have saved in
any local storage device. There are three commonly used types of picture files. You can identify
them by the extension on their file names.
a. .JPG/JPEG
This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic
Experts Group. Like all the rest of the image file extensions, it identifies the kind of data
compression process that it uses to make it more compatible and portable through the Internet.
This type of image file can support 16.7 million colors that is why it is suitable for use when
working with full color photographic images. Unfortunately, it does not support transparency
and therefore, images of this file type can be difficult to integrate in terms of blending with
other materials or elements in your document. But if you are looking for the best quality image
to integrate with your document then this is the image file type for you. .JPG does not work well
on lettering, line drawings, or simple graphics. .JPG images are relatively small in file size.
b. .GIF
This stands for Graphics Interchange Format. This type of image file is capable of
displaying transparencies. Therefore, it is good for blending with other materials or elements in
your document. It is also capable of displaying simple animation. Apparently, this may not be
too useful on a printed document but if you are sending documents electronically or through
email, or even post documents into a website, then this could be quite impressive. The
downside is that it can only support up to 256 colors so it is good mostly on logos and art
decors with very limited, and generally solid colors. .GIF is much better for logos, drawings,
small text, black and white images, or low-resolution files.
c. .PNG
This is pronounced as “ping“. It stands for Portable Network Graphics. It was built
around the capabilities of .GIF. Its development was basically for the purpose of transporting
images on the Internet at faster rates. It is also good with transparencies but unlike .GIFs, it
does not support animation but it can display up to 16 million colors, so image quality for this
image file type is also remarkably improved. .PNG allows the control of the transparency level or
opacity of images.
This is generally a .GIF type; line art drawings or images used as generic
representation for ideas and objects that you might want to integrate in your document.
Microsoft Word has a library of clip arts that is built in or can be downloaded and used freely.
There are still other clip arts that you can either purchase or freely download and use that come
from third-party providers.
3. Shapes
These are printable objects or materials that you can integrate in your document to
enhance its appearance or allow you to have some tools to use for composing and representing
ideas or messages. If you are designing the layout for a poster or other graphic material for
advertising, you might find this useful.
Shapes Icon under the Insert ribbon tab.
4. Smart Art
Generally, these are predefined sets of different shapes grouped together to form
ideas that are organizational or structural in nature. If you want to graphically represent an
organization, process, relationships, or flow for infographic documents, then you will find this
easy and handy to use.
5. Chart
Another type of material that you can integrate in your Word document that allows you to
represent data characteristics and trends. This is quite useful when you are preparing
reports that correlate and present data in a graphical manner. You can create charts that
can be integrate in your document either directly in Microsoft Word or imported from
external files like Microsoft Excel.
Chart – Used to illustrate and compare data.
6. Screenshot
Sometimes, creating reports or manuals for training or procedures will require the
integration of a more realistic image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot. Microsoft Word even
provides a snipping tool for your screen shots so you can select and display only the part
that you exactly like to capture on your screen.
This is the default setting for images that are inserted or integrated in your document. It
treats your image like a text font with the bottom side totally aligned with the text line.
This setting is usually used when you need to place your image at the beginning of a
paragraph. When placed between texts in a paragraph or a sentence, it distorts the overall
appearance and arrangement of the texts in the paragraph because it will take up the
space it needs vertically, pushing whole lines of texts upward.
B. Square
This setting allows the image you inserted to be placed anywhere with the paragraph with
the text going around the image in a square pattern like frame.
C. Tight
This is almost the same as the Square setting, but here the text “hug” or conforms to the
general shape of the image. This allows you to get a more creative effect on your
document. This setting can mostly be achieved if you are using an image that supports
transparency like a .GIF or .PNG file.
D. Through
This setting allows the text on your document to flow even tighter taking the contours and
shape of the image. Again, this can be best used with .GIF or .PNG type of image.
F. Behind Text
This allows your image to be dragged and placed anywhere on your document but with all
the texts floating in front of it. It effectively makes your image look like a background.
G. In Front of Text
As it suggests, this setting allows your image to be placed right on top of the text as if
your image was dropped right on it. That means whatever part of the text you placed the
image on, it will be covered by the image.
Mail Merge – a feature that allows you to create documents and combine or merge
them with another document or data file.
Form Document – the document that contains the main body of the message we want
to convey or send.
Data File – includes the individual information or data or the recipient’s information.
Merge Field/Place Holder – marks the position on your form document where individual
data or information will be inserted.
.JPG – file extension for the Joint Photographic Experts Group picture file.
.PNG – file extension for Portable Network Graphics image file.
.GIF – file extension for the Graphics Interchange Format image file.
Clipart – line art drawings or images used as a generic representation for ideas and
objects.
Smart Art – predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature.
Text Wrap – adjusts how the image behaves around other objects or text.
2)Inserting Shapes
4)Slide Transitions
5)Adding Animations
Photo editing encompasses the processes of altering images, whether they are digital
photographs, traditional photo chemical photographs, or illustrations. Traditional
analog image editing is known as photo retouching, using tools such as an airbrush to
modify photographs, or editing illustrations with any traditional art medium.
Which can be broadly grouped into vector graphics editors, raster graphics editors, and
3D modelers are the primary tools with which a user may manipulate, enhance, and
transform images. Many image editing programs are also used to render or create
computer art from scratch.
BASIC OF IMAGE EDITING
1. RASTER IMAGES are stored in a computer in the form of a grid of picture elements or
pixels.
2. VECTOR IMAGES such as Adobe Illustrator, Inkscape and etc. are used to create and
modify vector images, which are stored as descriptions of lines, Bezier curves and text
instead of pixels.
DIFFERENCE BETWEEN RASTER AND VECTOR IMAGES
RASTER IMAGESuse many colored pixels or individual building blocks to form a complete
image JPEGs, GIFs and PNGs are common raster image types. Almost all of the photos
found on the web and in print catalogs are raster images.
IMAGE FORMATS
Ø JPEG is a commonly used method of lossy compression for digital images, particularly
for those images produced by a digital photography.
Ø PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics file format that supports
lossless data compression.
Ø GIF a lossless format for image files that supports both animated and static images.
Ø BMP is a raster graphics image used to store bitmap digital images
Ø SVG is an XML-based vector image format for two-dimensional graphics w/ support for
interactivity and animation
Ø .3ds is one of the file formats used by the Autodesk 3Ds Max 3D Modelling, animation
and rendering software.
SELECTION One of the prerequisites for many of the app mentioned below is a method of
selecting part(s) of an image, thus applying a change selectively without affecting the
entire picture
Ø MAGIC WAND TOOL selects objects or regions in the image defined by proximity of
color or luminance
LAYERS which are analogous to sheets of transparent acetate, stacked on top of each
other, each capable of being individually positioned, altered and blended with the layers
below, w/o affecting any of the elements on the other layers.
IMAGE SIZE resize images in a process often called image scaling, making them larger, or
smaller. High image resolution cameras can produce large images which are often
reduced in size for Internet use.
CROPPING creates a new image by selecting a desired rectangular portion from the
image being cropped. The unwanted part of the image is discarded. Image cropping does
not reduce the resolution of the area cropped.
CLONING uses the current brush to copy from an image or pattern. It has many uses: one
of the most important is to repair problem areas in digital photos.
SHARPENING AND SOFTENING– Sharpening makes images clearer. Too much sharpening
causes grains on the surface of the image. Softening makes images softer that removes
some of the highly visible flaws. Too much causes the image to blur.
SATURATION- is an expression for the relative bandwidth of the visible output from a light
source. As saturation increase, colors appear more “pure.’’ As saturation decreases,
colors appear more ‘’ washed-out.’’
Contrast of images and brighten or darken the image. Underexposed images can be often
be improved by using this feature.
Brightening lightens the image so the photo brightens up. Brightness is a relative
expression of the intensity of the energy output of a visible light source.
Adjusting contrast means adjusting brightness because they work together to make a
better image.
PHOTO MANIPULATION
DIFFERENCES
PHOTO EDITING – signifies the regular process used to enhance photos and to create
them ‘’Actual editing simple process’’. Also includes some of the regular programs used for
editing and expose how to use them.
PHOTO MANIPULATION – includes all simple editing techniques and have some
manipulation techniques like erasing, adding objects , adding some graphical effects,
background correction, creating incredible effect, change elements in an image, adding
styles , eliminating blemishes from a person’s face and changing the features of a
person’s body.
b.) Infographics
It is any graphic that display and explains information, whether that be data or words.
When we use the term ‘’infographics’’, we’re using it as a general term used to describe
data presented in a visual way.
Infographics are important because they change the way people find and experience
stories. Infographics are being used to augment editorial content on the web, it create
a new way of seeing the world of data, and they help communicate complex ideas in a
clear and beautiful way.
TYPES OF INFOGRAPHICS
1. Statistical
2. Process Flow
3. Geographic
PROCESS OF MAKING INFOGRAPHICS
1. Research
2. a)Know what is needed
3. b)Take a reference
4. c)Know the audience
5. d)Decide the type of infographics
6. Brainstorm
7. a)Gather ideas
8. b)Build thought process
9. Design
10. a) Choose your tool and start designing
11. Review
12. a) Cross check the data to deliver flawless output
13. Launch
14. a) Make it viral
15. b) Share on social network
BEST PRACTICES WHEN CREATING INFOGRAPHICS
1. a)Maintain a structure
2. b)Don’t use more than 3 color palletes
3. c)Typography matters a lot
4. d)Include source and references
Facebook offers a range of privacy options to its members. A member can make all his
communications visible to everyone, he can block specific connections or he can keep all
his communications private. Members can choose whether or not to be searchable, decide
which parts of their profile are public, decide what not to put in their news feed and
determine exactly who can see their posts. For those members who wish to use Facebook
to communicate privately, there is a message feature, which closely resembles email.
2. Instagram
Instagram is an online mobile photo-sharing site that allows its users to share pictures
and videos either publicly or privately on the app, as well as through a variety of other
social networking platforms, such as Facebook, Twitter, Tumblr, and Flickr. Originally, a
distinctive feature was that it confined photos to a square shape, similar to Kodak
Instamatic and Polaroid SX-70 images, in contrast to the 4:3 aspect ratio typically used by
mobile device cameras. In August 2015, version 7.5 was released, allowing users to
upload media captured in any aspect ratio. Users can also apply digital filters to their
images. Videos on Instagram debuted in June 2013, allowing prerecorded square standard
definition resolution clips of up to 15 seconds to be shared; later improvements added
support for widescreenresolutions of up to 1080p and longer recording times for either
prerecorded (up to one minute) or disappearing live (up to one hour) videos.
Instagram was created by Kevin Systrom and Mike Krieger, and launched in October
2010 as a free mobile app. The service rapidly gained popularity, with over 100 million
active users as of April 2012 [10][11] and over 300 million as of December 2014.
[12] Instagram is distributed through the Apple App Store and Google Play.[13]Support for
the app is available for iPhone, iPad, iPod Touch, Windows 10 devices
and Android handsets, while third-party Instagram apps are available for BlackBerry
10 and Nokia-Symbian Devices.
3. Twitter
Twitter is an online news and social networking service where users post and interact
with messages, “tweets,” restricted to 140 characters. Registered users can post
tweets, but those who are unregistered can only read them. Users access Twitter through
its website interface, SMS or a mobile device app.[10] Twitter Inc. is based in San
Francisco, California, United States, and has more than 25 offices around the world.
It is also about adding value to others by giving or sharing something valuable to them so
that they are able to learn something. That is why I usually tweet about stuff that I read,
learned or have good value. I have learned so much from the others that is why I love
twitter. It is also about helping others, I disagree with many ‘experts’ that say you should
only follow ‘influential’ users because I don’t judge someone that way, and because I
believe the people at Twitter don’t believe in them either. I also disagree that you should
only share your own stuff otherwise you will dilute your brand. Sure it makes sense but
24/7 sharing your own blog post and following influential people?
BLOGGING SITES
1.
Weebly
Weebly is one of the easiest website builders in the market. They allow you to drag and
drop content into a website, so it’s very intuitive to use (click here to see our opinion on
Weebly).
By using Weebly’s website building elements, you can literally drag them into your website
and have a website built relatively quickly, and painlessly. The beauty of this system is
that you can pretty much drag the elements to wherever you want – so it’s not very
restrictive on where and how you place your website content.
Weebly’s elements include pictures, paragraphs, videos, buttons, maps, contact forms –
basically all the basics for website building.
2. Tumblr
Tumblr is a popular microblogging platform designed for creative self-expression. It is
considered a mindful alternative to Facebook and other social media websites where
users blog on a myriad of topics.
You can link your Tumblr account to other social networks you use and you can feed your
traditional blog or other RSS feed to your Tumblelog. You can also create static pages
such as your own Questions page that people are automatically taken to when they ask
you a question. If you want to make your Tumblelog look more lie a traditional website,
you can do it by adding pages. You can make your Tumblelog private or just make specific
posts private as needed, and you can schedule posts to publish in the future.
Tumblr is perfect for people who don’t need a full blog to publish lengthy posts. It’s also
great for people who prefer to publish quick multimedia posts, particularly from their
mobile devices. Tumblr is also a great choice for people who want to join a larger
community. If a blog is too much or too big for you, but Twitter is too small or too little for
you and Instagram isn’t versatile enough for you, then Tumblr might be just right for you.
It’s also easy to invite other people to contribute to your Tumblelog.
If you want to track your stats, you can add any analytics tracking code to your
Tumblelog. Some users will even burn a feed with Feedburner, create custom themes, and
use their own domain names
3. Pinterest
Pinterest is a free website that requires registration to use.Users can upload, save, sort,
and manage images—known as pins—and other media content (e.g., videos) through
collections known as pinboards. Pinterest acts as a personalized media platform. Users
can browse the content of others in their feed. Users can then save individual pins to one
of their own boards using the “Pin It” button, with pinboards typically organized by a
central topic or theme. Users can personalize their experience by pinning items, creating
boards, and interacting with other members. The end result is that the “pin feed” of each
user displays unique, personalized results.
Content can also be found outside of Pinterest and similarly uploaded to a board via the
“Pin It” button, which can be downloaded to the bookmark bar on a web browser, or be
implemented by a webmaster directly on the website. They also have the option of
sending a pin to other Pinterest users and email accounts through the “Send” button.
Some websites include red and white “pin it” buttons on items, which allow Pinterest
users to pin them directly.
Initially, there were several ways to register a new Pinterest account. Potential users
could either receive an invitation from an already registered friend, or they could request
an invitation directly from the Pinterest website that could take some time to receive. An
account can also be created and accessed by linking Pinterest to
a Facebook or Twitter profile. When a user re-posts or re-pins an image to their own
board, they have the option of notifying their Facebook and Twitter followers. This feature
can be managed on the settings page.
On the main Pinterest page, a “pin feed” appears, displaying the chronological activity
from the Pinterest boards that a user follows.
A “board” is where the user’s pins are located. Users can have several boards for various
items such as quotes, travel or, most popularly, weddings. A “pin” is an image that has
either been uploaded or linked from a website. Once users create boards and add pins,
other users can now repin, meaning they can pin one user’s image to their board as
well. Once the user has set up their account and boards, they can browse, comment, and
like other pins. Users might be discouraged by repeated images and difficult-to-follow
direct linking features. Pinterest has also added the option of making boards “secret” so
that the user can pin to and view boards that only the user can see when logged into their
own account.
Pinterest does not generate its own content; rather, it draws from many resources around
the web and compiles them in one convenient location for users.
ADVANTAGE :
– Everything moves fluently, and you can easily preview what you want.
DISADVANTAGE :
-A lot of HTML code churned out by the editors is superfluous which makes the web pages
bulky in file size
-WYSIWYG editors let you ignore certain aspects that are important.
-WYSIWYG editors simply do not provide enough support and help in optimizing your web
site for search engines.
2.) List Down (3) more WYSIWYG web hosting services and their URL.
world-wide-wait
WWW
CNN
now hosts videos placed on their home page, which was unthinkable in the past because
of slow internet speed
on-demand
Videos way back then were never on the home page and can be viewed “____________” or
only when a user clicks on it.
videos (youtube)
podcasts (ted talks, ear biscuits, the starters, stuff you should know)
Throughout recent history, the Philippines have been one of a few nations that
demonstrate unity for a call to action or social change. These campaigns for social change
would have not been successful if it were not for ICT.
1. EDSA (PEOPLE POWER REVOLUTION). The people power revolution lasted from 1083 to
1986. During a radio broadcast of Radio Veritas, Cardinal Sin encouraged the Filipinos
to help end the regime of then President Ferdinand Marcos. A major protest took place
along the EDSA from February 22 to 25, 1986 involving two million Filipinos from
different sectors. These included civilians, political parties, the military and religious
groups.
1. EDSA DOS.This is also known as the 2001 EDSA Revolution, happened during January
17 to 21, 2001. It was fueled after 11 prosecutors of the President Joseph Estrada
walked out of the impeachment trial. As a result, the crowd in EDSA grew over the
course of a few days through text brigades.
2. Million People March.This is a series pf protest that mainly took place in Luneta Park
from august 22 to 26, 2013. There were also several demonstrations that happened
around key cities in the Philippines and some location overseas. The organizers and
promoters of the Million People March used Facebook and Change.org as their,
mediums.
1. Yolanda People Finder.Recent storms in Philippines history gave birth to the People
finder database powered by Google. During typhoon Yolanda, the people finder was a
vital tool for people across the globe to track the situation of their relatives. This
proved to be successful and is now adapted by more organizations to help people track
relatives during calamities.
Change.org
Change.org is dubbed as the “world’s platform for change” where anyone from the
online community can create a petition and ask others to sign in it. During the past times
petitions are only done through signing a paper, usually done by a group asking for
signatures via travel. Change.org gives access to more people by allowing the online
community to affix their digital signatures on petition.
1. VisitChange.org
1. Change.org works this way. If this is your first time to use Change.org, click Sign up or
log in with Facebook. Otherwise, just input your log in details.
1. You can then start your own petition, but for now click on any petition you want under
tending petitions.
1. Read the petitions description to see if this petition matters to you. If it is, sign the
petition by filling up the information on the right side of the screen.
1. Share the petition on Facebook to promote it.
Alternatively, you can check out petitions of your friends on Facebook, and then click
on those petitions to read about it and sign it.
LESSON 12: ICT Project for Social
Change
Before starting your project, your group should be able to do the necessary paperwork.
This allows experts to see if your project is doable over the time frame that was given and
if it is significant enough to be made into reality.
1.Introduction-includes tour group’s mission and vision and a brief introduction of your
project.
2.Purpose-includes the reasons why this project is worth your group and your sponsor’s
time, effort and money.
3.Description-includes all the necessary information about the project. In ICT, it involves
the sites you are going to produce and the purpose of each and how they work in unison.
4.Support-contains the budget needed for the project. Some concept papers do not specify
any amount requested from the sponsor.
3.Release and Promotion-involves the actual release of the website for public view and
promoting it. Promotion typically starts before the actual release.
1. WordPress
Once you log in to your WordPress account, you are on the Reader tab by default. Simply
click on My Sites and from there you will see the statistics for your blog.
1. Facebook
In your Facebook page, a summary of the statistics will appear on the right side of your
cover photo: Hovering your mouse pointer over “Post Reach” will give you more insights
on which recent post reached the most people: Clicking on the Insights tab will give
more in-depth statistics:
Reach: Organic – your posts seen through the page’s wall, shares by users, and the news
feed
Likes, Comments, and Shares – actual interaction done by your audience either through
liking the post, commenting on it, or sharing it on their walls.
iii. Multiple Choice – can be answered by only one answer in a set of options
Creating feedback forms using Google forms
Lesson objectives
• Evaluate the effectiveness of their online campaign through user feedback;
• Improve the online campaign using various tools; and
• Check the impact of their online campaign.
Steps !
Steps !
5. You may now fill out the form questions:
A. Question Title- Includes the question that will be answered by your audience.
B. Help Text- Creates a subtext under the question to give more information about a
question.
C. Question Type- changes the type question according to your preference. These
questions include:
i. Text – can be answered in a short text.
ii. Paragraph Text – can be answered in a long text.
iv. Checkboxes – a question that can be answered with multiple answers in a set of
options.
v. Choose from a list- similar to a multiple-choice question but options are revealed in a
drop-down list.
vi. Scale- a question that can be answered with a numerical range.
vii. Grid- a question that contains sub questions with similar options as shown;
• Date- a question that can be answered with a specified date
• Time- a question that can be answered with a specified time
.
d. Advanced Settings: Contains more options for the specified question type.
8. Edit the Confirmation Page option at the bottom as you see fit.
A. Show link to submit another response- allows the user to answer the same form again.
B. Publish and show a public link to form results- allows users to see the summarized
results for your survey.
C. Allow responders to edits responses after submitting- allows users to back and edit
their answers
.
9. Click the Send Form button. The Send Form dialog box will appear these options as you
see fit.
a. Link to share- contains the URL that you can share on your website.
b. Embed- contains an embed code to attach to your HTML.
c. Short URL- generates a shorter URL necessary for limited spaces like sharing on twitter.
d. Share link via- allows you to share the link to Google+, Facebook, and Twitter.
e. Send form via email- allows you to share the form via email.
f. Add collaborators- Allows others to edit your form, necessary when working on groups.
1. The easiest way to view the result is viewing a summary of the responses. Click on
Responses> Summary of Responses.
2. You will be taken to a Summary of Responses page. This is particularly useful for
viewing your results from time to time.
However, after a set amount of time, you may want to use this data in a spreadsheet and
eventually create your own charts.
3. To use the data collected through responses, click View Responses button found on the
upper part of the page.
Extortion (also called blackmail, shakedown, out wresting, and exaction) is a criminal
offence of unlawfully obtaining money, property, or services from a person, entity, or
institution, through coercion. Refraining from doing harm is sometimes euphemistically
called protection. Using the Internet to threaten to cause damage with the intent to
extort from any person any money or other thing of value.
3. Accessing Stored Communications
Sports Beating is engaging in the business of betting or wagering on any sporting event or
contest over the Internet. In some countries, gambling (including sports betting) is illegal
even if you are doing it over the Internet.
5. Non-Delivery of Merchandise
Devising any scheme to defraud, or for obtaining money or property by means of false or
fraudulent pretenses, or promises, and using the Internet for the purpose of executing the
scheme. The non-delivery scam occurs when the scammer places an item up for sale
when there is actually no item at all. The item is subsequently never delivered to the buyer
after they purchase the item.
6. Electronic/ Cyber Harassment
Cyber harassment refers to online harassment. Cyber harassment or bullying is the use of
email, instant messaging, and derogatory websites to bully or otherwise harass an
individual or group through personal attacks. Cyber harassment can be in the form of
flames, comments made in chat rooms, sending of offensive or cruel e-mail, or even
harassing others by posting on blogs or social networking sites. Cyber harassment is often
difficult to track as the person responsible for the acts of cyber harassment remains
anonymous while threatening others online. This usually applies to school-age children.
7. Child Pornography
Using the Internet to transmit child pornography. Child pornography is distributed
nowadays mainly through the Internet. Child pornography are produced not only on a
professional scale by commercial providers, but also privately using victims from the
producer’s own environment, from the exploitation of children by clients of child
prostitutes. Child pornography is sold over commercial websites and also exchanged in
closed groups or via peer-to-peer networks. Criminal groups also use the Internet to make
big money selling child pornography.
8. Prostitution
Criminal Copyright Infringement, the act of piracy mainly for financial gain. In late 2014,
the number one pirate website, The PirateBay, was raided for the second time due to
years of pirating movies, music, games, books, and other software. These kinds of
websites earn money through advertsing.