0% found this document useful (0 votes)
76 views34 pages

Empowerment Tech Lessons

This document provides an introduction to information and communication technology (ICT). It discusses ICT in the Philippines and how the country is considered the "ICT Hub of Asia" due to growth in jobs like business process outsourcing. It also defines key terms like computer, internet, world wide web, and how web pages have evolved from static pages to dynamic pages. Trends in ICT discussed include convergence, social media, and mobile technologies. The document also covers cloud computing and its types. Finally, it discusses internet safety, security, and the ten rules of netiquette for online communication.

Uploaded by

Alyanna De Leon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views34 pages

Empowerment Tech Lessons

This document provides an introduction to information and communication technology (ICT). It discusses ICT in the Philippines and how the country is considered the "ICT Hub of Asia" due to growth in jobs like business process outsourcing. It also defines key terms like computer, internet, world wide web, and how web pages have evolved from static pages to dynamic pages. Trends in ICT discussed include convergence, social media, and mobile technologies. The document also covers cloud computing and its types. Finally, it discusses internet safety, security, and the ten rules of netiquette for online communication.

Uploaded by

Alyanna De Leon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

EMPOWERMENT

TECHNOLOGIES
Sunday, March 19, 2017

LESSON 1: INTRODUCTION TO ICT

ICT- Information and Communication- 


 It deals with the use of different communication technologies such as mobile phones,
telephone, Internet to locate, save, send and edit information 
  Is a study of computers as data processing tools. It introduces students to the
fundamental of using computer systems in an internet environment.

ICT in the Philippines


            Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-
related jobs, one of which is BPO, Business Process Outsourcing, or call centers.
         ICT Department in the Philippines is responsible for the planning, development
and promotion of the country’s information and communications technology (ICT) agenda
in support of national development.
Computer- an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program.

Internet- is the global system of interconnected computer networks that use the
internet protocol  suite (TCIP/IP) to link billions of devices worldwide.
          Means of connecting a computer to any other computer anywhere in the
world via dedicated routers and servers.
      Sometimes called simply ‘’the Net’’, is a worldwide system of computer
networks- a network of networks in which the users at any   one computer can get
information from any other computer.

World Wide Web


          An information system on the internet that allows documents to be connected to
other documents by hypertext links, enabling the user to search for information by moving
from one document to another. 
          Is an information space where documents and other web resources are identified
by URLs, interlinked by hypertext links, and can be accessed via the Internet.
          Invented by Tim-Berners Lee

Web Pages
 Web page is a hypertext document connected to the World Wide Web.   It is a
document that is   suitable for the World Wide Web.
The different online platforms of World Wide Web:

1.       Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up
of the Web pages connected by hyperlinks.

2.       Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to
see a website differently than others.
  – Allows users to interact with the page; instead of just reading the page, the user may be
able to comment or create user account.

3.       Web 3.0 –  this platform is all about semantic web.


   –  Aims to have machines (or servers) understand the user’s preferences to be able        to
deliver web content.

Static Web Page- is known as a flat page or stationary age in the sense that the page is
‘’as is’’ and cannot be manipulated by the user. The content is also the same for all users
that is referred to as Web 1.0

Dynamic Web Pages- web 2.0 is the evolution of web 1.0 by adding dynamic web pages.
The user is able to see website differently than others e.g. social networking sites, wikis,
video sharing sites.

FEATURES OF WEB 2.0


1.       Folksonomy- allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as
hashtag.
2.       Rich User Experience – content is dynamic and is responsive to user’s input
3.       User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews and
evaluation e.g. Lazada, Amazon.
4.       Long Tail- services that are offered on demand rather than on a one-time purchase. This
is synonymous to subscribing to a data plan that charges you for the amount of time you
spent in the internet.
5.       Software as a services- users will be subscribe to a software only when needed rather
than purchasing them e.g. Google docs used to create and edit word processing and
spread sheet.
6.       Mass Participation- diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.

TRENDS IN ICT
1. Convergence- is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now
use your smartphone.

2. Social Media- is a website, application, or online channel that enables web users web
users to create , co-create, discuss modify, and exchange user generated content.

Six types of Social Media:

a)      Social Networks - These are sites that allows you to connect with other people with
the same interests or background. Once the user creates his/her account, he/she can set
up a profile, add people, share content, etc
           Example: Facebook and Google+

b)      Bookmarking Sites - Sites that allow you to store and manage links to various website
and resources. Most of the sites allow you to create a tag to others.
                
      Ex. Stumble Upon, Pinterest

c)       Social News – Sites that allow users to post their own news items or links to
other news sources. The users can also comment on the post and comments may also be
rank.                        
                
       Ex. Reddit and Digg
  d)      Media Sharing – sites that allow you to upload and share media content like images,
music and  video.
                                    
         Ex. Flickr, YouTube and Instagram

  e)      Microblogging - focus on short updates from the user. Those that subscribed to the
user will be able to receive these updates.
                                
      Ex. Twitter and Plurk
      f)       Blogs and Forums - allow user to post their content. Other               users are able
to comment on the said topic.
            
Ex. Blogger, WordPress and Tumblr

            

                      
ile Technologies - The popularity of smartphones and tablets has taken a major rise over the years. This
is largely because of the devices capability to do the tasks that were originally found in PCs.
Several of these devices are capable of using a high-speed internet. Today the latest model
devices use 4G Networking (LTE), which is currently the fastest.

MOBILE OS
         iOS - use in apple devices such as iPhone and iPad
         Android - an open source OS developed by Google. Being open source means mobile
phone companies use this OS for free.
         Blackberry OS - use in blackberry devices
         Windows phone OS - A closed source and proprietary operating system developed by
Microsoft.
         Symbian - the original smartphone OS. Used by Nokia devices
         WebOS- originally used in smartphone; now in smart TVs.
         Windows Mobile - developed by Microsoft for smartphones and pocket PCs

Assistive Media -   is a non- profit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.

CLOUD COMPUTING
oud computing- distributed computing on internet or delivery of computing service over the internet.

 e.g. Yahoo!, Gmail, Hotmail


  
-Instead of running an e-mail program on your computer, you log in to a Web
 e-mail account remotely. The software and storage for your account doesn’t exist
 on your computer – it’s on the service’s computer cloud.

It has three components


1.       Client computers   –   clients are the device that the end user interact with cloud.
2.       Distributed Servers – Often servers are in geographically different places, but server acts
as if they are working next to each other.
3.     Datacenters – It is collection of servers where application is placed and is accessed via
Internet.
TYPES OF CLOUDS

PUBLIC CLOUD allows systems and services to be easily accessible to the general public.
Public cloud may be less secured because of its openness, e.g. e-mail

PRIVATE CLOUD allows systems and services to be accessible within an organization. It


offers increased security because of its private nature.

COMMUNITY CLOUD allows systems and services to be accessible by group of


organizations.

HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public
cloud.

LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF


NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information
when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.

TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human


          You need to remember that you are talking to a real person when you are
online.
          The internet brings people together who would otherwise never meet.
          Remember this saying when sending an email: Would I say this to the person’s
face.

Rule No. 2: Adhere to the same standards online that you follow in real life.
       You need to behave the same way online that you do in real life.
       You need to remember that you can get caught doing things you should not be
doing       online just like you can in real life.
         You are still talking to a real person with feelings even though you can’t see
them.

Rule no. 3: Know where you are in cyberspace.


          Always take a look around when you enter a new domain when surfing the
web.
          Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.


          Remember people have other things to do besides read your email. You are
not the center of their world.
          Keep your post and emails to minimum by saying what you want to say.
          Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.


          Be polite and pleasant to everyone.
          Always check your spelling and grammar before posting.
 ·        Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
         Ask questions online
         Share what you know online.
         Post the answers to your questions online because someone may have the
same question         you do.

Rule no. 7: Help keep flame wars under control


         Netiquette does not forgive flaming.
         Netiquette does however forbid people who are flaming to hurt discussion
groups by putting the group down.

Rule no. 8: Respect other people’s privacy.


          Do not read other people’s mail without their permission.
          Going through other people’s things could cost you, your job or you could even
go to jail.
          Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.


          Do not take advantage of other people just because you have more knowledge
or power than them.
          Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.


          Do not point out mistakes to people online.
          Remember that you were once the new kid on the block.
          You still need to have a good manners even though you are online and cannot
see the          person face to face.

  Internet security
  Security Requirement Triad
            
                   Confidentiality
          Data confidentiality
          Privacy
                  Integrity
         Data integerity                                                        System integrity
                  Availability
Threat Consequence Threat Action ( Attack)

Unauthorized Disclosure Exposure: Sensitive data are directly released to an


A circumstance or event whereby an unauthorized entity.
entity gains access to data for which the Interception: An unauthorized entity directly
entity is not authorized. accesses sensitive data traveling between authorized
sources and destinations.
Inference: A threat action whereby an unauthorized
entity indirectly accesses sensitive data by
reasoning from characteristics or byproducts of
communications.
Intrusion: an unauthorized entity gains access to
sensitive data by circumventing a system's security
protections.

Disruption Incapacitation: prevents or interrupts system


A circumstances or even that interrupts operation by disabling a system component.
or prevents the correct operation of Corruption: Undesirably alters system operation
system services and functions. by adversely modifying system functions or data.
Obstruction: A threat action that interrupts
Deception delivery of system services by hindering system
A circumstance or event that may result operation.
in an authorized entity receiving false Masquerade: An unauthorized entity gains access
data and believing it to be true. to a system or performs a malicious act by posing as
an authorized entity.
Falsification: False data deceive an authorized
entity.
Repudiation: An entity deceives another by falsely
denying responsibility for an act.

Usurpation Misappropriation: An entity assumes


A circumstances or event that results in unauthorized logical or physical control of a
control of system services or functions  system resource.
by an unauthorized entity.
Misuse: Causes a system component to perform a
function or service that is detrimental to system
security.

Types of System Intruders


          Masquerader
          Hackers
          Clandestine user
    

 Parts of Virus 
  Infection mechanism
  Trigger
   Payload

Virus stages
    Dormant phase                                                                                                          
Virus is idle.
       Propagation  phase                                                                                                
Virus places an identical copy of itself into other programs or into certain system areas on t  
the disk.
    Triggering phase                                                                                                        
Virus is activated to perform the function for which it was intended.                                        
Caused by a variety of system events
        Execution phase                                                                                                    
Function is performed

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its
data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any
means possible.
Worms- a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware- a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam- unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used
in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords
or any other sensitive information.
Rogue security softwares- is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.

Four search strategies


     Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the ...)
+ and – can be used to include or exclude a word
     Boolean
AND - enter words connect with AND- it will include sites where both words and found
   Uses: joining different topics (i.e. global warming AND California)
OR   -  requires at least one of the terms is found.
   Uses: join similar or synonymous topics (i.e. global warming OR greenhouse
effect)
NOT - searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)

 Question                                                                                                                                   

 a question may be entered in the search field of search engine    

         Advanced                                                                                                                                    

 Features are offered on many engines by going to an "Advanced search" page and
making selections. Effective in narrowing search returns to a specific topic or phrase.

LESSON 4: TEXT AND IMAGE WRAPPING

TYPES OF PRODUCTIVITY TOOLS


WORD PROCESSING
         
      Helps people to create attractive &  effective business documents
         Provides an easy way to edit and enter text
  Checks spelling and grammar
  Can add graphics with ease
 ·         Also known as a document preparation system
 ·         A program where you can type and print documents
 ·         Replaced old typewriters

APPLICATION AREAS OF WORD PROCESS


   BUSINESS- Legal copies, letterheads, letters, memos circulars etc.
 EDUCATION- to develop word processing skills from the very beginning
 HOME- Dealing w/ assignments being completed at home or occasionally
recreational

     ADVANTAGES             DISADVANTAGES

      
1.      Faster                                            1.      Equipment costs
2.      Can edit documents       2.      Upgrade software
3.      Change font style, size, colour       3.      Train staff
4.      Change layout                                 4.      More complicated
5.      Print many copies       5.      Virus, pop-up
6.      Less noise
7.      Add pictures
8.      Make tables
9.      Email documents
SPREADSHEETS

  Allows users to analyze numeric and financial data


  The ability to enter complex formulas and have the computer automatically calculate
it.
    Can be used to make graphs and charts

     Provides a structured way to look at things (organizational tool)

PRESENTATION SOFTWARE

       Ideal way to communicate ideas to a group of people


  Used by businesses, students, researchers
  Provides  a speaker with a visual aid to guide a presentation

DATABASE SOFTWARE

  Managing information has become the most valuable ability of a computer


  Websites depend on databases to deliver important info to visitors
  Can be used to track and analyze stocks and bonds
  Analyze weather data to make forecasts
PERSONAL INFORMATION MANAGEMENT SOFTWARE

         Examples are Microsoft outlook and Google Calendar


            Helps individuals organize themselves

  Set-up to do lists
  Manage contact lists
  Act as an appointment calendar

MOBILE SOFTWARE
         Apps made for smartphones
         Allows people to manage calendars and receive emails while away from their desk
         There is also web-delivered services
  Popular ones are YouTube , Google Maps and FB

RICH INTERNET APPLICATIONS


       

Software that is available online, often for free


            

         Faster internet capabilities along with advancements with web technologies and cloud
computing gave rise to RIAs

SUITES
         Packages of productivity software
         Usually includes
  Word processor
  Spreadsheet
  Presentation software
  Personal info management software

MICROSOFT OFFICE is the most popular and widely used form of productivity
software. It includes:

1.      Microsoft Word
2.      Excel
3.      PowerPoint
4.      OneNote
5.      Outlook
6.      Publisher
OTHER COMPANIES - Competitors to Microsoft include:
 ·         Corel WordPerfect Office
 ·         IBM Lotus SmartSuite
 ·         Apple iWork
 ·         Sun Microsystems Star Office
 ·         OpenOffice.org

  Business Effects of using productivity tools


  Enhances performance of employees
  Easy to use
  Provides a common format

TEXT and IMAGE WRAPPING: Text wrapping options

1.  In-line wrapping - Doesn’t give you much control. You can’t add a border.
2.  Square wrapping - Gives you much more control. You can add a border and effects
and drag the image.
3.  Tight wrapping - The text sits nearer the image. You can add a border & effects,
and drag the image.
4.  Behind text wrapping - Useful if you want to put a watermark on a page or in a
table.
5.  In front of text wrapping – Text underneath the image is visible.
6.  Through wrapping – Similar to tight but if there are any blank spaces at the sides of
the image, text will flow into those areas. Best used in PNG images.
7.  Top & bottom wrapping – This is the one used most often in books. The image
breaks up lines of text not just paragraphs, so you may have to nudge it up or down so it
sits between paragraphs.

LESSON 5 & 6: ADVANCED SPREADSHEET AND


PRESENTATION SKILLS
MICROSOFT EXCEL FORMULAS AND FUNCTIONS

Three types of information can be typed into a spreadsheet cell

1. LABELS
 Text entries
Identify values in columns and rows
Left-aligned
Type an apostrophe (‘) before a number to treat the number like a label.
EX.
‘2007
‘402-6900
2. VALUES
Numbers
To be used in calculations
Right-aligned
#### Size the cell larger
#### appears if the number is too larger for the size of the cell

3. FORMULAS
Used to perform calculations
Begin with = sign
Type the cell address that contain the values you want to calculate.

ARITHMETIC DEFINITION EXAMPLE OF USAGE MEANING


OPERATOR

 + Addition =B3+C3 Add the value in B3 and


the value in C3
              
                - Subtract =F12-22 Subtract 22 from the
contents of cell F12

                * Multiplication =A3*B3 Multiply the value in cell


A3 by the value in cell B3
              
                / Division =C3/C6 Divide the contents of cell
C3 by the contents of cell

 ^ Exponentiation =C12^6 Raise the value in cell


C12 to the sixth power
COMMON FUNCTIONS/FORMULAS
         SUM
  Calculates the sum of a range of cells
         MAX
  Displays the largest value in a range of cells
         MIN
  Displays the smallest value in a range of cells
         COUNT
  Calculates the number of values in a range of cells
         AVERAGE
  Calculates the average of values in arrange of cells
CELL REFERENCES
  Always use cell references in formulas. A cell reference in the column letter and the row
number.

Why?

         By using it in the formula, you can use the powerful recalculation feature in Excel.
 If you change the contents of a cell that is included in a formula, the worksheet
will automatically recalculate it.
 PRESENTATION SOFTWARE

Quick tips in creating effective presentation


        
      Minimize- Keep slide count to a minimum to maintain a clear message and to keep the
audience attentive. Remember that the presentation is just a visual aid. Most info should
still come from the reporter.
         Clarity- Avoid being fancy by using a font style that is easy to read. Make sure that it is
also big enough to read by the audience.
         Simplicity- Use bullets or short sentences. Summarize the information on the screen
to have your audience focus on what the speaker is saying than on reading the slide.
         Visuals-Use graphics to help your presentation but not too many to distract the
audience in addition, instead of using table of data. Use charts and graphs.
         Consistency- Make your design uniform. Avoid having different font styles and
background.
         Contrast- Use light font on dark background or vice versa. This is done because it is
easier to read on the screen.

LESSON 6: IMAGING & DESIGN FOR ONLINE


ENVIRONMENT

PHOTO EDITING
         Photo editing encompasses the processes of altering images, whether they are digital
photographs, traditional photo chemical photographs, or illustrations. Traditional analog
image editing is known as photo retouching, using tools such as an airbrush to modify
photographs, or editing illustrations with any traditional art medium.
Graphic software programs

         Which can be broadly grouped into vector graphics editors, raster graphics editors, and 3D
modelers are the primary tools with which a user may manipulate, enhance, and transform
images. Many image editing programs are also used to render or create computer art from
scratch.

BASIC OF IMAGE EDITING

1. RASTER IMAGES are stored in a computer in the form of a grid of picture elements or


pixels.
2. VECTOR IMAGES such as Adobe Illustrator, Inkscape and etc. are used to create and
modify vector images, which are stored as descriptions of lines, Bezier curves and text
instead of pixels.

DIFFERENCE BETWEEN RASTER AND VECTOR IMAGES


 RASTER IMAGES use many colored pixels or individual building blocks to form a
complete image JPEGs, GIFs and PNGs are common raster image types. Almost all of the
photos found on the web and in print catalogs are raster images.

         VECTOR IMAGES alternatively, allow for more flexibility. Constructed using mathematical


formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF
are excellent for creating graphics that frequently require resizing.

3. 3D MODELING (OR MODELLING) is the process of developing a mathematical


representation of any three dimensional surface of an object via specialized software. The
product is called a 3D model. It can be displayed as a two-dimensional image through a
process called 3D rendering or used in a computer simulation or physical phenomena. The
model can also be physically created using 3D printing devices.

IMAGE FORMATS
  JPEG is a commonly used method of lossy compression for digital images, particularly for
those images produced by a digital photography.
  PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics file format that supports
lossless data compression.
  GIF a lossless format for image files that supports both animated and static images.
  BMP is a raster graphics image used to store bitmap digital images
  EPS used in vector-based images in Adobe Illustrator.
  SVG is an XML-based vector image format for two-dimensional graphics w/ support for
interactivity and animation
  .3ds is one of the file formats used by the Autodesk 3Ds Max 3D Modelling, animation and
rendering software.
  .fbx is an exchange format, in particular for interoperability between Autodesk products and
other digital content creation software

FEATURES OF IMAGE EDITORS

SELECTION One of the prerequisites for many of the app mentioned below is a method of
selecting part(s) of an image, thus applying a change selectively without affecting the entire
picture
  MARQUEE TOOL for selecting rectangular or other regular polygon-shaped regions
  LASSO TOOL for freehand selection of a region
  MAGIC WAND TOOL selects objects or regions in the image defined by proximity of color or
luminance

LAYERS which are analogous to sheets of transparent acetate, stacked on top of each


other, each capable of being individually positioned, altered and blended with the layers
below, w/o affecting any of the elements on the other layers.
IMAGE SIZE resize images in a process often called image scaling, making them larger, or
smaller. High image resolution cameras can produce large images which are often reduced
in size for Internet use.
CROPPING creates a new image by selecting a desired rectangular portion from the image
being cropped. The unwanted part of the image is discarded. Image cropping does not
reduce the resolution of the area cropped.

CLONING uses the current brush to copy from an image or pattern. It has many uses: one
of the most important is to repair problem areas in digital photos.
IMAGE ORIENTATION - Image editors are capable of altering an image to be rotated in
any direction and to any degree. Mirror images can be created and images can be
horizontally flipped or vertically flopped. Rotated image usually require cropping afterwards,
in order to remove the resulting gaps at the image edges.
PERSPECTIVE - is the art of drawing solid objects on a two- dimensional surface so as to
give the right impression of their height, width, depth and position in relation to each other
when viewed from a particular point.

SHARPENING AND SOFTENING – Sharpening makes images clearer. Too much


sharpening causes grains on the surface of the image. Softening makes images softer that
removes some of the highly visible flaws. Too much causes the image to blur.

SATURATION- is an expression for the relative bandwidth of the visible output from a light
source. As saturation increase, colors appear more “pure.’’ As saturation decreases, colors
appear more ‘’ washed-out.’’
CONTRAST AND BRIGHTENING
Contrast of images and brighten or darken the image. Underexposed images can be often
be improved by using this feature.
Brightening lightens the image so the photo brightens up. Brightness is a relative
expression of the intensity of the energy output of a visible light source.
Adjusting contrast means adjusting brightness because they work together to make a better
image.

PHOTO MANIPULATION
Photo manipulation involves transforming or altering a photograph using various methods
and techniques to achieve desired results. Some photo manipulations are considered skillful
artwork while others are frowned upon as unethical practices, especially when used to
deceive the public, such as hat used for political propaganda , or to make a product or
person look better.
DIFFERENCES

PHOTO EDITING – signifies the regular process used to enhance photos and to create
them ‘’Actual editing simple process’’. Also includes some of the regular programs used for
editing and expose how to use them.

PHOTO MANIPULATION – includes all simple editing techniques and have some
manipulation techniques like erasing, adding objects , adding some graphical effects,
background correction, creating incredible effect, change elements in an image,  adding
styles , eliminating blemishes from a  person’s face and changing the features of a person’s
body.
b.) Infographics
 also known as data visualization, information design, and communication design

         It is any graphic that display and explains information, whether that be data or words. When
we use the term ‘’infographics’’, we’re using it as a general term used to describe data
presented in a visual way.

         Infographics are important because they change the way people find and experience
stories. Infographics are being used to augment editorial content on the web, it create a new
way of seeing the world of data, and they help communicate complex ideas in a clear and
beautiful way.

TYPES OF INFOGRAPHICS

1.       Statistical
2.       Process Flow
3.       Geographic

PROCESS OF MAKING INFOGRAPHICS


1.       Research
a)      Know what is needed
b)      Take a reference
c)       Know the audience
d)      Decide the type of infographics
2.       Brainstorm
a)      Gather ideas
b)      Build thought process
3.       Design
                             a)    Choose your tool and start designing
4.       Review
                             a)     Cross check the data to deliver flawless output
5.       Launch
                             a)    Make it viral
                             b)    Share on social network

BEST PRACTICES WHEN CREATING INFOGRAPHICS


a)      Maintain a structure
b)      Don’t use more than 3 color palletes
c)       Typography matters a lot
d)      Include source and references

LESSON 7
BASIC PRINCIPLES OF WEB GRAPHICS AND LAY-OUT

 BALANCE- The visual weight of objects, textures, colors, and space is evenly distributed on
the screen.
 EMPHASIS - An area in the design that may appear different in size, texture, shape or color
to attract the viewer's attention.
 MOVEMENT - Visual elements guide the viewer's eyes around the screen.
 PATTERN AND REPETITION - These are the repeating visual element on an image or lay-out
to create unity in the lay-out or image.
 RHYTHM - is achieved when visual elements create a sense of organized movement.
 PROPORTION - Visual elements create a sense of unity where they relate well with one
another.
 VARIETY - This uses several design elements to draw a viewer's attention.

BLOGGING ETHICS

 ACCOUNTABILITY - Authors must be accountable on whatever they write on their blogs.


Accountability means holding responsibilities to high standards of performance, the goal is to
produce the best content with our readers' interest in mind. They are, after all, the only reason we
write.
 ACCURACY - As a content creator, educator, news relayed, information slayer, your job as a
blogger is to give your readers the most accurate information - identifying your sources, checking
facts, never sacrificing accuracy and fairness for the sake of a "good" study. This includes citing and
attributing everything you've used, read and referenced when writing a post.
 INDEPENDENCE - means freedom from outside control or support, a blogger can write
anything he or she wants to share without having someone saying he/she must do.
 TONE - bloggers must write with their intended audience in mind. The key to successful
blogging is alignment of interests between writer and reader. It's that sweet spot where what's
good for your readers matches what's good for you. Don't focus on having a great blog. Focus on
producing a blog that's great for your readers.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy