0% found this document useful (0 votes)
99 views35 pages

Empowerment Technologies Block 1, Sem 1: Module 1: Ict in Our Everday Lives

The document discusses the evolution of the World Wide Web and technologies. It explains that Tim Berners-Lee invented the World Wide Web (Web 1.0) in 1989 which allowed for read-only, stationary web pages. Web 2.0 emerged around 1999-2000 with the development of social media, user-generated content, and dynamic pages that enabled users to interact and collaborate. Now, Web 3.0 (Semantic Web) aims to make the web more personalized through standards that share and reuse data across applications based on user behavior. The document also outlines key trends like convergence, social media platforms, and mobile technologies that have influenced modern ICT.

Uploaded by

Kc Baro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views35 pages

Empowerment Technologies Block 1, Sem 1: Module 1: Ict in Our Everday Lives

The document discusses the evolution of the World Wide Web and technologies. It explains that Tim Berners-Lee invented the World Wide Web (Web 1.0) in 1989 which allowed for read-only, stationary web pages. Web 2.0 emerged around 1999-2000 with the development of social media, user-generated content, and dynamic pages that enabled users to interact and collaborate. Now, Web 3.0 (Semantic Web) aims to make the web more personalized through standards that share and reuse data across applications based on user behavior. The document also outlines key trends like convergence, social media platforms, and mobile technologies that have influenced modern ICT.

Uploaded by

Kc Baro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1

KEYS
Answer Subtopic Familiarize enumeration MEMORIZE

Main topic Under topic of subtopic cut of topic example

MODULE 1: ICT IN OUR EVERDAY LIVES


Lesson 1: Information and Communication Technology

Lesson 1 : Meeting

ICT- deals with the use of different communication technologies such as mobile phones,
telephone, Internet, etc. to locate, save, send, and edit information

Philippines- a country that is considered as the “ICT HUB OF ASIA”

106.8 Cellphones- the number of cellphones that Filipinos owned in the year 2012

100 per Filipinos- the amount of Filipino that used cellphones in the year 2012

Philippines- the country who placed top 1 and top 2 of the “The Selfies Cities around
the World of 2013”

Time Magazine- the one who conducted the “The Selfies Cities around the World of
2013”

Makati- the top 1 of “The Selfies Cities around the World of 2013”

Cebu- the top 10 of “The Selfies Cities around the World of 2013”
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Empowerment Technology: A Definition

Empowerment- refers to the process of giving yourself, or other people, the capacity to
achieve a specific end-goal

Empowerment technology- refers to computer technology that we use almost every day,
which enables us to do tasks that, in the past require professional help.

Empowerment through ICT

Social media - One of the most effective way to reach your audience

- is a platform commonly used by people who want to participate in an


active discussion, give and gain information or updates, and a mean of communication.

Empowerment- is strategy that aims to give individuals the tools and resources
necessary to take initiative, as well as gather and analyze information or situations,
thus making informed decisions to solve problems and improve services or performance.

Information Literacy Competency Standards for Higher Education- they are the one who
enumerated the competencies for information literacy

Enumerate the Competencies for Information Literacy

1. Determines the nature and extent of information needed


2. Accesses the needed information effectively and efficiently
3. Uses information effectively to accomplish a specific purpose
4. Understands many of the economic, legal, and social issues surrounding the use of
information, and accesses and uses information ethically and legally
5. Evaluates information and its sources critically and incorporates selected
information into his or her knowledge base and value system
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Technology literacy- the ability to use digital technology, communication tools, and/ or
networks to define an information need, access, manage, integrate, and evaluate
information, create new information or knowledge and be able to communicate this
information to others

International ICT Literacy Panel- they are the one who defined technology literacy

Lesson 2: Trends in ICT

Lesson 2: Meeting

Word Wide Web- an information system on the internet that allows documents to be
connected to other documents by hypertext links, enabling user to search for
information by moving from one document to another

1989- year where Tim Berners Lee invented WORLD WIDE WEB

Web Page- a specific collection of information provided by a website and displayed to


the user in a web browser

Web 1.0 Stationary Web Pages > Web 2.0 Dynamic Web Pages > Web 3.0 Semantic
Web Pages- These are the evolution of Web
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Latest Technology Trends

1. Convergence – is the synergy of technological advancement to work on similar goal


or task
- Is using several technologies to accomplish a task conveniently
2. Social Media- is a website, application or online channel that enables web user to
create, discuss, modify and exchange user generated content

6 Types of Social Media

a. Social Networks- these are site that allows you to


connect with other people with the same interest and
background.

Example: Facebook

b. Book marking sites- these are sites that allow you to


store and manage links to various websites and
resources
Example: Pinterest, StumbleUpon
c. Social News- these are sites that allow users to post
their own items or links to other sources
Example: Digg, Reddit
d. Media Sharing- these are site that allows you to
upload and share media content like images, music,
and video

Example: YouTube, Instagram

e. Microblogging- these are sites that focus on short


updates from the users
Example: Twitter, Plurk
f. Blogs and forums- these allows users to post their
content.
Example: WordPress, Tumblr, Blogger
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
3. Mobile Technologies- The popularities of smartphones and tablets has taken a
major rise over the years.

Evolution of the WEB

Tim Berners-Lee- a British scientist who invented the World Wide Web

Web- it is an open-source information space where documents

- Came for the word World Wide Web

Tim O’Reilly and Dale Dougherty- they are the tech moguls who defined the version 2
of the web of Web 2.0

Darcy DiNucci in 1999- the one who originally made the term for the Web 2.0

Web 2.0- had no update on technical specifications, but rather on the cumulative
changes in the way web pages were made and used

- was the Read-write Web

- Web of Interaction, or Participative Web

- site allowed users to interact and collaborate with each other through social
media dialogue where they could create use-generated content in a virtual community

- These included social networking sites, blogs, folksonomies, wikis, video sharing
sites, hosted services, web applications, and mashups.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Web 3.0- is historically known as the Semantic Web or Web of Data as Tim Berners-
Lee coined it

-worked as a personal assistant

The Semantic Web- is an extension of Web 2.0 by virtue of the standards of the
World Wide Web Consortium (W3C) as stated by the W3C

- provides a common framework that allows data to be shared and


reused across application, enterprise, and community boundaries.

CRAWL WALK RUN


WEB 1.0 WEB 2.0 WEB 3.0
Read-only Read-Write Portable and Personal
Company Focus Community Focus Individual Focus
Home pages Blogs/ Wikis Life streams / Waves
Owning content Sharing Content Consolidating Content
Web forms Web Applications Smart Application
Directories Tagging User Behavior
Page Views Cost Per Click User Engagement
Banner Advertising Interactive Advertising Behavioral Advertising
Britannica Online Wikipedia The Semantic Web
HTML XML/RSS RDF / RDFS / OWL
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Type of Web Pages

1. Web 1.0 Stationary Web pages


a. Also known as the “flat” or “stationary page” in the sense that the
pages are “as is” and cannot be manipulated by the suer
2. Web 2.0 Dynamic Web Pages
a. Is the evolution of WEB 1.0 by adding dynamic web pages
b. Dynamic Web- Pages – the user is the able to see a website differently
than others
c. It allows user to Interact with the page

Features of Web 2.0

1. Folksonomy- allows user to categorize and classify/arrange information using freely


chosen keywords (e.g., tagging).

hashtag. (#)- Also known for the Use tags that starts with the
pound/number

Examples:

-Facebook, Instagram, Twitter, etc.

2. Rich User Experience- content is dynamic and is responsive to user’s input.

Examples:

- A website that shows local content.

- In social networking sites, when logged on, your account is used


to modify what you see in their website.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
3. User Participation- the owner of the website is not the only one who is able to
put the content. Others are able to place a content of their own by means of
comments, reviews, and evaluation.

Examples:

- Facebook, Amazon.com, etc.

4. Long Tail- services that are offered on demand rather than on one-time
purchased.

Example:

- This is synonymous to subscribing to a data plan that charges


you for the amount of time you spent to use the data.

5. Software as a Service- users will subscribe to a software only when needed rather
than purchasing them.

Example:

- Google Docs (free-web based application)

6. Mass Participation- diverse information sharing through universal web access.

Example:

- Since most users can use the internet, Web 2.0’s content is
based on people from various cultures.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
3. Web 3.0 Semantic Web Pages

Web 3.0- is the third generation of internet services for websites and
applications that will focus on using a machine-based understanding of data to provide a
data-driven and semantic web.

To create more intelligent, connected and open websites- the ultimate goal of
Web 3.0

One feature of the Web 3.0- is its preference saving technology which provides
the users of technology suggested results based from his/her previous searches.

Wireless networks and the Internet of Things (IoT)- are two great examples of
what we call Web 3.0 that is being developed even more.

Latest Technology Trends

Gartner, Inc., - a leading information technology research and advisory company,


highlighted the Top 10 Strategic Technology Trends of 2017 at their Gartner
Symposium held in 2016 in Orlando, Florida.

1. AI and Advanced Machine Learning – These are composed of many technologies


and techniques (deep learning, neural networks, and natural-language processing)
that make smart things “intelligent.”
2. Intelligent Apps – virtual personal assistants, like Siri and Google Home, that
perform some human assistance functions, making task easier.
3. Intelligent Things – this refers to the physical things that are imbued with
machine learning capabilities through rigid programming.

Examples of intelligent things:

-autonomous cars -Google Car

-Internet of Things (Iot) smart appliances


EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Gartner- the one who sees a future when these devices will have a
collaborative “Intelligent things” model rather than a standalone.

4. Virtual and Augmented Reality – These refer to the immersive technologies that
are now dominating the market.

Basic virtual reality- is now accessible to consumers through different


wearables, like VR boxes that are cheap, and smartphones capable of running
focused right now on gaming.

5. Digital Twin – this refers to the dynamic software model of a machine or a thing
or system that uses data from various sensors and improvement of operations.
This includes a combination of metadata and analytics.
6. Blockchain and Distributed Ledgers – According to Gartner, Inc, it is “a type
distributed ledger in which value exchange transactions (in bitcoin or other
tokens) are sequentially grouped into blocks.
7. Conversational System – We have Siri on our Apple devices and Cortana for
Windows devices helping us as virtual personal assistants.
8. Mesh App and Service Architecture – Constant processing of information requires
better, ultra-efficient architectures to handle the demand.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Lesson 3: Rules of Netiquette
Lesson 3: Meeting
Types of Computer Security Threats
1. Computer Virus
2. Spyware Threats
3. Hackers and Predators
4. Phishing

Netiquette: Ethics on the Internet

Netiquette- is a combination of the words network and etiquette and is defined as a


set of rules for acceptable online behavior.

Netizen- which itself is a contraction of the words internet and citizen and refers to
both a person who uses the internet to participate in society, and an individual who has
accepted the responsibility of using the internet in productive and socially responsible
ways

Mohammad Mortada- the one who made The Rules of Netiquette

The 10 Rules of Netiquette

Rule #1 The Human Element- Words, photos, or videos that you post are read by real
people and they all deserve respectful communication

Rule #2 If you Wouldn’t Do It in Real Life, Don’t Do It Online- address are community
standards that people tend to ignore in the cyberspace. Would stand in front someone
and be rude face-to-face? Hopefully, you don’t. Stick to that standard online as well.

Rule #3 Cyberspace is a Diverse Place- You might be super awkward or funny around
your friends, but you behave somehow formally at work; the online space is also
geographically dispersed
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Rule #4 Respect People’s Time and Bandwidth- Online communication consumes time and
bandwidth (megabytes) and people lead busy lives these days; between work, school and social
life, you don’t want to be that stop sign with your fancy elaborated paragraph. Keep it short
and simple, and tone down on sending videos and photos that people need to download.

Rule #5 Check Yourself- Nobody can judge your appearance, voice tone, or what you wear. You
will, however, be judged based on your content and engagement, so keep these tips in mind:
Perform spell-checking and grammar errors, especially in professional communications. Be positive
and courteous in your general behavior.

Rule #6 Share Your Expertise- The term “Social Media” was a revolution for a reason – it’s
Social! That means you are not limited to communicating with companies only, but to the world
at large. Information that you provide can live on the internet forever.

Rule #7 Extinguish Flame Wars- Flaming is when people express their annoyance on a subject
without withholding their emotions. We often see these in posts where people are
wholeheartedly expressing their opinion. Flame wars, however, is when two or more people
exchange angry and explicit posts between each other, and this must be controlled before it
escalates to compromise the integrity of the group, you’re in. Don’t feed the flames; extinguish
them by guiding the discussion back to a more productive direction.

Rule #8 Respect People’s Privacy- Privacy is a universal concern, and it got that attention for
a reason. The consequences are sometimes critical. You often see this phenomenon with
journalists who invade people’s lives to get a story. You might make the same mistake without
even knowing

Rule #9 With Great Power Comes Great Responsibility- make sure you’re not abusing your
power to hurt others. Thou shalt not hack your friends, for instance.

Rule #10 Forgive- Not everyone has the same amount of experience working in the virtual
world. And not everyone knows the rules of netiquette. If you feel compelled to respond to a
mistake, do so in a private email rather than a public forum.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Lesson 4: Advanced Word Processing Skills
Lesson 4: Meeting
Microsoft word- is a word processing application developed by the Microsoft
Corporation

Microsoft Word

Microsoft Word- is a word processing application developed by the Microsoft Corporation

-It lets you create documents for your assignments, term paper or
research work, letters, and certificates or just edit any text document.

- It provides several features that make your work, like copying and
pasting text from different sources, inserting objects, laying out content,
and editing and proofreading documents, much easier.

References: Citations and Bibliography

References: Citations and Bibliography- In writing a research paper, you will most likely
get information from the internet. This gives you easy access to needed ideas and
information but puts you at risk of committing plagiarism. To prevent committing that
offense, you need to learn how to paraphrase text and add citations.

Steps in putting References: Citations and Bibliography

1. Open Microsoft Word, go to Reference Tab> select the desired style in the
Citations and Bibliography group.
2. You need to cite the authors in your documents for the information you got
from them. To do this, click the Insert Citation command in the References Tab,
and select Add New Source. A dialog box will appear. Just enter the requested
information, like the author’s name, title, and publication details. Then, click OK.
3. You can easily create the bibliography or references at the end of your document
once you encode the list of sources in step 2. In the References Tab, select the
Bibliography command, then choose the desired style. (GCF Learn for Free,
2016)
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1

Finalizing and protecting Documents

Finalizing and Protecting Documents- Microsoft Word has another feature that will help
you finalize and protect your document to keep it private and discourage others from
editing your file.

Documents Inspector

Document Inspector- Whenever you create or edit a document, certain personal


information may be added to the file automatically. You can use the document
inspector to remove this type of information before sharing a document with others.

Steps in putting Documents Inspector

1. Open Microsoft Word, click the File Tab to go to Backstage view.


2. From the Info Pane, click Check for Issues, then select Inspect Document from the
drop-down menu.
3. The Document Inspector will appear. Check or uncheck the boxes, depending on the
content you want to review, then click Inspect. In our example, we’ll leave
everything selected.
4. The results will show an exclamation mark for any category found to have potentially
sensitive data, and it will also have a Remove All button for each of these
categories. Click Remove All to remove the data.
5. When you are done removing, click close.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Protecting your Document
Protecting your document- By default, anyone with access to your document will
be able to open, copy, and edit its content unless you protect it

Steps in Protecting your document


1. Open Microsoft Word, click the File Tab to go to Backstage view.
2. From the Info Pane, click the Protect Document command.
3. In the drop-down menu, choose the option that best suits your needs. Marking
your document as final will prevent others from editing the file while they can
still view it. Other options allow for even more control if needed.
4. A dialog box will appear, prompting you to save. Just click OK.
5. The document will now be marked as final. Your document will look like this.

Mail Merge

Mail Merge- is another feature by Microsoft Word that will allow you to create mass
letters, labels, envelopes, etc. using the pieces of information that are stored in a list,
database, or spreadsheet.

-allow companies to send the same letter to a large number of people


without having to manually change the name, address, and other contact details of the
recipients.

Steps in Protecting your Document

1. Open Microsoft Word, click on the Mailings Tab, and click on Start Mail Merge.
2. A drop-down box will appear where you can select what document you would like
to use a mail merge for. In this tutorial, I will be using the Letters document
type.
3. Next, click on the Select Recipients button which is next to the ‘Start Mail
Merge Button.’ Once clicked, a drop-down list will appear where you can select a
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
data source for your mail merge. If you do not have a database to use or an
address book you can Type a New Listwhich I will be using in this guide.
4. A Dialog Box will appear where you can enter the details about customers you
want to include in the mail merge. If you want to add a new record you can
click the “New Entry” button, and if you wish to delete it, you can click the
“Delete Entry” button.
5. Press OK after all your records have been entered and save the data source with
an appropriate filename such as “Customer Records.”
6. When writing a letter, insert merge fields for things that are unique to each
person such as First & Last Name or Address. To do this, click on the Insert
Merge Fieldbutton where a drop-down list will appear where you can select the
fields.
7. Eventually your letter should look something like this Merged Fields that have
“<<” and “>>” between them. Such as “<<Last_Name>>”.
8. Once your merge fields are entered into Microsoft Word, click Finish & Merge
button which can be found at the top of the Mailings Ribbon. When clicked, you
can choose to either send as e-mails to each person or print the documents.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
MODULE 2: CREATE OR INNOVATE
PRODUCTS AND PROCESS USING ICT TOOLS
Lesson 5: Microsoft Excel

Lesson 5: Record

Microsoft Excel- this is developed by Microsoft for Windows, Mac IOS, Android, and
IOS.

-It features calculations, graphical, pivot tables and programming a long


wage, called Visual Basic for Application

Column- it runs horizontally

-identified as header at the top of the sheet

Rows- it runs vertically

-identified as numbers

Active Cell- called for the select cell

Function- always start with an equal sign

DIFFERENT FUNCTION

Different Function

a. Math Functions
b. Statistical Functions
c. Text Functions
d. Conditional Functions
e. Lookup or Reference Functions
f. Date function
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
To see the different functions that you can for excel:

1. Click the formula tab


2. Click Insert Function
3. Click the Category that you prefer

MATH FUNCTIONS

1. SUM FUNCTION- adds all the numbers in a range of cells

Example:

=SUM(C2:C13)

2. SUMIF FUNCTION

Sumif Function- enables you to tell excel to add together the numbers
in a particular range only

-add the cells specified by a given condition or criteria

Example:

=SUMIF(A2:A13,”Lemon Tarts”,C2:C13)

STATISTICAL FUNCTIONS

1. AVERAGE FUNCTION- returns the average (arithmetic mean) of its arguments,


which can be numbers or names, arrays or references that contain numbers
Example:
=AVERAGE(C2:C13)
2. MINIMUM FUNTION- returns the smallest number in a range of values. Ignores
logical values and text

Example:

=MIN(C2:C13)
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
3. MAXIMUM FUNCTION- returns the largest number in a range of values. Ignores
logical values and text
Example:
=MAX(C2:c13)

TEXT FUNCTIONS

1. CONCATENATE FUNCTION- it combines the value of the selected cells

-joins several text strings into one text string

Example:
=CONCATENATE(E6,” “,F6,” “,G6)

2. LEN FUNCTION- short term for length, returns the characters in a text
cells. It also counts the letter inside the selected cell
-returns the number of characters in a text string
Example:
=LEN(C7)

CONDITIONAL FUNTIONS- the SUMIF from Math function is also considered as this
function

-checks whether in conditions met, and returns one value if


TRUE, and another value FALSE

1. IF FUNCTION
Example:
=IF(C2>150,”GOOD”,”BAD”)
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
LOOK UP OR REFERENCE FUNCTION- looks for a value in the leftmost column of a
table, and then returns a value in the same row from a column you specify. By default,
the table must be sorted in an ascending order

1. VLOOKUP
Example:
=VLOOKUP(A2,A1:B13,2,FALSE)

DATE FUNTIONS

1. TODAY- returns the current date formatted as a date


Example:
=TODAY()
Product: 11/8/2020

2. NOW- returns the current date formatted as a date and time

Example:

=NOW()

Product: 11/8/2020 22:43pm


EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Lesson 5: LMS

Microsoft Excel is a software program produced by Microsoft that allows users to organize,
format and calculate data with formulas using a spreadsheet system.

There are two basic ways to perform calculations in Excel: Formulas and Functions.

1. Formulas- is an expression that operates on values in a range of cells or a cell.

For example, =A1+A2+A3, which finds the sum of the range of values from cell A1 to cell A3.

2. Functions- are predefined formulas in Excel. They eliminate laborious manual entry of formulas
while giving them human-friendly names.

For example: =SUM (A1:A3). The function sums all the values from A1 to A3

1.1 FUNCTIONS

a. SUM- is the first must-know formula in Excel. It usually aggregates values


from a selection of columns or rows from your selected range.

=SUM(number1, [number2], …)

b. AVERAGE- function should remind you of simple averages of data such as the
average number of shareholders in a given shareholding pool.

=AVERAGE(number1, [number2], …)

Example:

=AVERAGE(B2:B11) – Shows a simple average, also similar


to (SUM(B2:B11)/10)
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
c. COUNT-function counts all cells in a given range that contain only numeric
values.

=COUNT(value1, [value2], …)

Example:

COUNT(A:A) – Counts all values that are numerical in A


column. However, you must adjust the range inside the formula to
count rows.

COUNT(A1:C1) – Now it can count rows.

d. COUNTA- counts all cells in a given rage. It also counts dates, times, strings,
logical values, errors, empty string, or text.

=COUNTA(value1, [value2], …)

Example:

COUNTA(C2:C13) – Counts rows 2 to 13 in column C


regardless of type. However, like COUNT, you can’t use the same
formula to count rows. You must make an adjustment to
the selection inside the brackets – for example,
COUNTA(C2:H2) will count columns C to H.

1.2 Conditional Functions

A. IF- this function is often used when you want to sort your data according to
a given logic

=IF(logical_test, [value_if_true], [value_if_false])

Example:

=IF(C2<D3, ‘TRUE,’ ‘FALSE’) – Checks if the value at C3


is less than the value at D3. If the logic is true, let the cell value
be TRUE, else, FALSE
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
Lesson 6: Advance Presentation Skills

2.1 Use Hyperlinking for PowerPoint Presentation

To hyperlink to another slide in PowerPoint, simply select the text or object (see
hyperlink best practices below) that you want to use as your trigger and open the
Hyperlink dialog box.

To add a hyperlink to another slide, simply:

1. Select the Text or an Object on your slide.

2. Open the Insert Hyperlink dialog box (Ctrl + K on your keyboard).

3. Within the dialog box, Select Place in this Document ‘on the left.

4. Choose the slide you want to hyperlink to.

5. Click OK.

6. After adding a hyperlink, simply run your presentation in slideshow mode and click
the link.

7. You can also click through to a hyperlink in the Normal View of your presentation by
holding the Ctrl key on your keyboard and then clicking the hyperlink
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
2.2 Embedded files and Data to your PowerPoint Presentation

2.2.1 Embed Excel Data In PowerPoint

1. Highlight the data you want to copy in Excel. Then press CTRL+C on your keyboard
OR right-click on your mouse then select Copy.

2. In PowerPoint, right-click on the slide where you want to add the Excel data OR go
to Home > Paste > Paste Special.

Icons you will see if you’re copying DATA from Excel

a. First option – Use Destination Styles

Use this option if you want your data to use the format or theme of your
presentation. Note how the table background is light blue. This is because of the
default Office theme color I’m using.

b. Second option – Keep Source

Use this option if you want your data to use the format of your Excel spreadsheet
(not your PowerPoint theme). Since my Excel spreadsheet just has a plain white
background, this is how my data looks in PowerPoint, too. If I change the background in
Excel to yellow, then the table below will also have a yellow background.

c. Third option – Embed

Use this Embed option if you want to copy AND edit your data in Excel later. Note
that this option will also use Excel’s format, not PowerPoint, just like the second
option above.

d. Fourth option – Picture

Use this option to paste your Excel data as an image or picture in PowerPoint. This is
the best option if you don’t want other people to edit your data.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
e. Fifth option – Keep Text Only

Use this option if you only want to copy the text from your data (no formatting at
all). The cell values will be separated by tab spaces and each row will be in a separate
paragraph.

2.2.2 Embed an Excel Chart in PowerPoint

1. Highlight the chart you want to copy in Excel. Then press CTRL+C on your keyboard
OR right-click on your mouse then select Copy.

2. In PowerPoint, right-click on the slide where you want to add the Excel chart OR go
to Home > Paste > Paste Special. You will then see 5 icons like you see in the
screenshot below in Paste Options:

Icons you will see if you’re copying Charts from Excel

a. First option – Use Destination Theme & Embed Workbook

Use this option if you want your chart to use your PowerPoint
file’s theme and formatting. This allows your chart to blend in nicely with
the rest of your slides.

b. Second option – Keep Source Formatting & Embed Workbook

Use this option if you want to use your Excel file’s formatting.
This means that the chart will look exactly the same in PowerPoint and
Excel.

c. Third option – Use Destination Theme And Link Data

Use this option to use your PowerPoint file’s formatting and keep
the chart linked to the original Excel file.

d. Fourth option – Keep Source Formatting And Link Data

Use this option to use your Excel file’s formatting and keep the
chart linked to the original Excel file.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
e. Fifth option – Picture

Use this option to paste your Excel chart as a picture. You can’t
edit the chart but you can replace it with another image and apply
picture formatting.

Lesson 7: Elements and Principles of Design

a. Elements of Design

1. Line- horizontal, vertical, diagonal, straight, curved, dotted, broken, thick, thin

Shape. 2D- two dimensional

Flat Geometric- square, circle, oval, triangle

Organic- All other shapes

2. Form- 3D- three dimensional

Geometric- cube, sphere, cone

Organic- all other forms such as: people, animals, tables, chairs, etc

3. Color- refers to the wavelengths of light

-refers to hue (name)

-refers to value (lightness/darkness)

-refers to intensity (saturation, or amount of pigment)

-refers to tint, tone and shade

4. Value- the lightness or darkness of an image (or part of an image)

5. texture- the feel, appearance, thickness, or stickiness of a surface

example: smooth, rough, silky, furry

6. Space- the area round, within, or between images or parts of an image (relates to
perspective). Positive and negative space
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
b. Principles of Design

1. Pattern- a regular arrangement of alternated or repeated elements (shapes, lines, colors)


or motifs

2. Contrast- the juxtaposition of different elements o design in order to highlight their


differences and/or create visual interest or a focal point

Example: rough and smooth texture

3. Emphasis- special attention/importance given to one part of a work art

-can be achieved through placement, contrast, color, size, repetition. Relates to focal point

Example a dark shape in a light composition:

4. Balance- a feeling of these results when the elements of design are arranged symmetrically
or asymmetrically to create the impression of equality in weight or importance

5. Proportion/ Scale- the relationship between objects with respect to size, number, and so
on, including the relation between parts of a whole

6. Harmony- the arrangement of elements to give the viewer the feeling that all the parts
of the piece form a coherent whole

7. Rhythm/Movement- the use of recurring elements to direct the movement of the eye
through the artwork. The way the elements are organized to lead the eye to the focal area.,
Movement can be directed for example, along edges and by means of shape and colour

There are give kinds of rhythm:

Random

Regular

Alternating

Progressive

Flowing
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
C. BASIC IMAGE MANIPULATION USING GIMP

1. Editing and Creating Images with the GIMP

The GNU Image Manipulation Program (GIMP) is a powerful application that can
alter, manipulate, enhance, and create digital image files.

FIXME discusses how to start the application.

2. Saving an Image

To save an image file, right-click on the image, choose File, and select either Save
or Save As. The Save Image window opens. Navigate to the directory where you would
like to save your file. Enter a name for your file in the field at the bottom of the
window.

You must choose a file type for your image. By default, the GIMP will save your
file according to the extension you type at the end of your file name. You may also
select the file type from the Determine File Type drop-down menu above the file name
field. When you are ready to save, click the OK button.

Depending on the file type you selected, another window with options may open. In
general, it is a good idea to accept the settings that the GIMP suggests. Click
the OK. button again to complete the save process.

3. Editing an Image

To crop an image:

1. Open the image.

2. Right click on the image and select Tools => Transform Tools => Crop and Resize.

Left-click and drag the mouse pointer to create a frame that fits the part of the
image to keep.

3. Click the Crop button in the window that opens as you drag the frame across
the image.

4. If you are unhappy with the cropped image, press [Ctrl]-[Z].


EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
To Rotate an Image:

1. Open the image.

2. Right-click on the image and select Image => Transform, then select any of
the Flip or Rotate options.

3. If you are unhappy with the changes, press [Ctrl]-[Z].

To Add Text to an Image:

1. Open the image.

2. Right-click on the image and select Tools => Paint Tools => Text.

3. Left-click where the text should begin.

4. Type the text into the GIMP Text Editor window.

5. Click the OK button.

6. Your text appears on the image.

7. If you are unhappy with the changes, press [Ctrl]-[Z].

To apply a filter:

1. Open the file.

2. Right-click on the image and select Filters.

3. Choose any of the filters available.

4. Choose options for the filter.

5. Click the OK button.

6. If you are unhappy with the changes, press [Ctrl]-[Z].


EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
To create a new image:

1. Choose File => New.

2. Enter the image size, image type, and fill type of the file.

3. Click the OK button.

4. Edit and manipulate the image with the GIMP&#39;s various tools.

5. Save your file.

Lesson 8: Graphic Design versus Information Design

A. Graphic Design

Graphics Design is mostly concerned with the element of design such as typography,
color, images and use of space.

Information design is the effective presentation of information using design elements and
techniques.

B. What is Infographics.?

An infographic is a collection of imagery, charts, and minimal text that gives an easy-
to-understand overview of a topic.

Why are infographics used?

Infographics are great for making complex information easy to digest. They can be
helpful anytime you want to:

1. Provide a quick overview of a topic


2. Explain a complex process
3. Display research findings or survey data
4. Summarize a long blog post or report
5. Raise awareness about an issue or cause
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1

Infographic- this is a good way when you need to give someone a really quick rundown
on something that can be hard to explain in words alone

What are the different types of infographics?

Infographic templates is sorted into 9 different categories:

1. Statistical infographics
2. Informational infographics
3. Timeline infographics
4. Process infographics
5. Geographic infographics
6. Comparison infographics
7. Hierarchical infographics
8. List infographics
9. Resume infographics

How to make an Infographic?

1. Create an outline for your timeline infographic

There are four major components of a timeline infographic that


should be detailed in the outline:

• Dates
• Descriptions
• Headers (optional)
• Images (optional)
2. Keep descriptions brief
3. Find simple visuals
4. Create the framework for your timeline
5. Embellish your timeline infographic with colors, fonts, and decorative
shapes
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
C. File Formats used

• PRINT FORMATS
a. PSD (photoshop document)- native file format for photoshop files.
Supports transparency, channels, masks, and vector type and
objects, paths, layers. For print/photos only. Can be either faster,
vector or combination of both
b. TIF (Tagged Image File Format)- older file format for images and
photoshop files. Can be saved with layers, channels, masks, and
path but does not support transparency in the saved color file,
limited transparency in grayscale and bitmap files. For print files
only
c. PDF/AI (portable document format/adobe illustrator)- pdf file
format used for print or display as it retains vector attributed.
Adobe Illustrator is for creating vector content. AI file format for
print; SVG for web
d. JPG (Joint Photo Expert Group)- raster file format used for
images, pictures, is destructive, more compression of the image,
smaller file size, more degradation of image quality. Not good for
type, logos, graphic, cannot be made transparent
• WEB FORMATS
e. GIF (Graphic Interchange Format)- for raster type, logos, graphics
saved to very small file sizes, Uses limited number of RGB colors
(256 or less) so not good for images. Can be transparent or
animated for web only
f. JPG (Joint Photo Expert Group)- taster file format used for
images pictures. Is destructive, more compression of the image,
smaller file size, more degradation of image quality. Best for
images, not good for type, logos; graphics. Cannot be made
transparent
g. SVG (Scalable Vector Graphic)- used to render 2D vector format,
ed files as well as for animation. Ideal for type, logos, graphics, and
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
vector shapes. Based on XML, it is used only for the web. Can be
compressed with out any loss of quality
h. PNG (Portable Network Graphic)- uses limited range of RGB colors
(up to 256), not ideal for images, Can be made transparent,
options are PNG-8 or PNG-24 for true transparent effects. Best
for graphics, type and logos, web only

Lesson 9: Upload and Share our Files Online

File management is the process of naming, editing, storing and sharing files.

Online File Management and Storage Services

The following are some of the most widely used online storage system for files that
offer smart file management.

A. Google Drive - is a file storage and synchronization service developed by Google.


Launched on April 24, 2012, It allows users to store files on their servers, synchronize
files across devices, and share files.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1
B. One Drive - Microsoft OneDrive is a file hosting service and synchronization service
operated by Microsoft as part of its web version of Office.

C. Dropbox - is a file hosting service operated by the American company Dropbox, Inc.,
headquartered in San Francisco, California, that offers cloud storage, file synchronization,
personal cloud, and client software.

1. Sharing Files with Google Drive

File sharing is a key feature of any modern cloud service. That includes Google
Drive, the most popular cloud storage option of all.

There are two ways to share a files stored in google drive.

a. First method requires you to enter the email address of the people you want
to share the file with. To do this right- click the file and select share. Enter the email
address of the people you want to share the folder (or file) with, then on the convo
box on the side, choose which kind of access you want to give them.
EMPOWERMENT TECHNOLOGIES BLOCK 1, SEM 1

b. Second way, if you don’t want to manually enter tons of email address, is to share
using “Shareable Link” which is automatically generated by google. You can also specify
needed access limits.

Online Image Hosting Platforms

Chances are high that the resolutions, and thus the quality, of the videos and images
that you posted on Facebook weren’t as good as the original since social media sites
need to reduce resolution of uploaded material to ensure fast loading of content.

You might also like