The document discusses the introduction and components of ICT, as well as the benefits and challenges of ICT. Some key benefits include additional jobs, convenience in banking and finance, easier business transactions, improved education, and increased safety and security. Some challenges include additional costs, health problems from overuse of technology, invasion of privacy, less in-person interaction, and reliability of online information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
20 views15 pages
e Tech Reviewer
The document discusses the introduction and components of ICT, as well as the benefits and challenges of ICT. Some key benefits include additional jobs, convenience in banking and finance, easier business transactions, improved education, and increased safety and security. Some challenges include additional costs, health problems from overuse of technology, invasion of privacy, less in-person interaction, and reliability of online information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15
1.
1 INTRODUCTION TO ICT Keyboards, mouse, joysticks, microphones, and
touch screens are all input devices. 2. Convenience in Banking and Finance ICT – Information and Communication Technology c. Processor – refers to a component of a ● People today have easier access to their is an extensional term for Information Technology computer that processes data, specifically CPUs. bank accounts using online banking (IT). d. Storage – refers to all the hardware that are services without the need to visit the capable of holding information, either temporarily bank. The term ICT is also used to refer to the or permanently such as hard disks. ● Items bought and ordered from online convergence of audiovisual and telephone shops can now also be paid through networks with computer networks through a single 3. Information – result of processing data. This is online payment. cabling or link system. the output from the system. ● They can also deposit and withdraw cash anytime and anywhere using nearby ATM 4. People or users – these are the individuals machines. IT vs. ICT that supply and enter the data through various ● There are even mobile applications that IT (Information Technology) - Refers to an entire methods. They make the decisions that affect the help users manage their finances by industry that uses computers, networking, output that will be supplied by the system. letting them track their expenses, income, software, and other equipment to manage and savings. information. 5. Procedures – actions and steps that must be ● Higher efficiency in banking services, taken to ensure that the system executes the easier and faster business processes, ICT (Information and Communications tasks that is expected to do. and better financial management are Technology) - This can be seen as an integration achieved using IT. of IT with media broadcasting technologies, 6. Software – computer programs that provide ● Electronically linked branch networks, audio/video processing, and transmission of the step-by-step instructions that must be done to ATM machines, automated telephone telephony. finish a task. banking, and online or mobile banking--made banking and finance more convenient to people. Components of ICT: 1.2 THE WORLD OF ICT 1. Data – these are raw facts, figures, and 3. Easier and Faster Business Transactions statistics that are encoded so that they can be BENEFITS OF ICT ● Communication is very essential in processed by the system to provide information. making a small business grow. 1. Additional Jobs and Employment ● Instead of going to various places, 2. Hardware – these are the physical components ● A lot of job opportunities are created due businessmen now use technology to of a computer required to input and process data. to the introduction of ICT, such as Web communicate with their clients or Examples of hardware are as follows: Developers, Network Administrators, and customers who are far away through a. Communication devices – facilitate Programmers. social media, texts, calls, chats, emails, communication by using specific media. ● Part-time work also became more and video conferences. b. Input devices – devices that can be used by available allowing people to double their the user to give instructions to the computer. income and manage their time. 4. Health Awareness and Better Healthcare ● New technologies increased the security pain, neck pain, and eye strain- to major ● Today, there are already small and in residences, establishments, and other problems- such as obesity, heart disease, wireless devices that can be worn by private properties. The police can use and diabetes. patients, as well as smartphone apps, GPRS to track someone's car or a stolen that can monitor and keep track of one's mobile phone, use (CTV cameras to get 3. Invasion of Privacy health including heart rate and blood a profile of a criminal's face, and the ● Users are becoming worried about the pressure. identity of thieves could be obtained safety and protection of their data and ● Managing chronic conditions such as through fingerprints. information for it might get stolen or asthma, diabetes, and heart disease is hacked. now easier and cheaper. 7. Wide Range of Entertainment ● Since the Internet is now widely used for ● People are now capable of entertaining business transactions and as a means of 5. Improved and Advanced Education themselves by watching series and payment, and a lot of personal ● ICT helps both students and teachers by movies, playing online or offline games, information is also being shared data leak providing an easier way of learning and listening to music, browsing the web, and is a major concern. teaching through the introduction of chatting or calling friends or relatives modern technologies such as laptops, from other places. 4. Less Interaction desktops, and more. ● Nowadays, a lot of relationships start and ● With the rise of the Internet, people now develop from online communications easily gather updated data and CHALLENGES OF ICT rather than real conversations--making information, as well as educational videos people more individualistic and in just a click that old books cannot 1. Additional Cost introverted provide. ● For businesses and companies, the ● ICT made it easier for people to purchase and maintenance of ICT communicate in spite of distance, but it 6. Increased Safety and Security hardware and software come at a high also created emotional distance. ● ICT improved the flow of information cost. It can be quite expensive to ● People, especially youngsters, tend to which helps public safety agencies. With purchase and maintain. focus more on gadgets and ICT, they are able to respond quickly in ● Having a system usually requires a unconsciously ignore the people around critical situations, operations, and Specialist to handle and supervise it. Too them. manhunt. many expenses can cause a funding ● Smart analytics are used by public safety problem for an organization. 5. Reliability of Information officers in identifying and capturing data ● The Internet has now become the major that can be useful for national security. 2. Health Problems tool or source of information; however, ● During an emergency crisis, the ● People who are exposed to gadgets may checking the credibility of any information capability of public safety officers to adopt a lifestyle that is characterized by is still needed. exchange information through wireless inactivity and lack of physical exercise ● Remember that not all information on the communication plays a vital role. ● This often leads to health problems from web is reliable and accurate. Most people minor ones – such as headache, back have access to a computer and to the Internet, so posting information online RICH USER INTERFACE can be done easily. THE THREE FUNDAMENTAL TECHNOLOGIES ● Web 2.0 offers rich user experience ● Judging the reliability of sources found on ● HTML - Hypertext Markup Language wherein a website’s content is dynamic the Internet may be crucial because there ● URL - Uniform Resource Locator and responsive to a user’s input. is no regulating body that monitors the ● HTTP - Hypertext Transfer Protocol reliability of what is on the web. USER PARTICIPATION WORLD WIDE WEB CONSORTIUM (W3C) ● Web 2.0, users can now put content such 6. Unemployment ● An international community devoted to as comments, evaluations, and reviews. ● Manual operations are now being developing open web standards. replaced by automation. To reduce ● Tim moved from CERN to Massachusetts ADVANTAGES OF WEB 2.0 expenses, companies replace workers Institute of Technology in 1994 and ● Accessible anytime and anywhere with a machine or equipment that can do became the founder of W3C. He is the ● Creates learning communities the same or higher amount of work. overall Director of the W3C up until today. ● Easy to use and user-friendly ● Gives a variety of media WEB 2.0 DYNAMIC WEB ● Involves users in creating information 2.1 THE ICT TODAY ● Also known as DYNAMIC PAGE ● Provides real-time discussion ● allows users to create, collaborate, and WORLD WIDE WEB share their work with others without any WEB 3.0: SEMANTIC WEB ● An open-source service that is available web design or publishing skills. ● A web where all information is to the public to obtain information and is ● Examples of web 2.0 include Blogs, categorized and stored in a way that a interconnected worldwide. Hosted services, Social networking site, computer can understand it like a human. ● In 1989, Tim Berners-Lee, a computer Video sharing sites, Web application, and ● In 2006, John Markoff of the New York scientist at the European Council for Wikis. Times called the upcoming phase of the Nuclear Research (CERN) invented the web as Web 3.0, also referred as the World Wide Web (www) to allow the Semantic Web or the Intelligent Web. automatic sharing of information between FOLKSONOMY ● Semantics refers to the Science of Scientists across the globe. ● Allows users to arrange and classify machine comprehension of text. information using keywords such as WEB 1.0: STATIC WEB tagging. WEB 2.0 WEB 3.0 ● The first website in history ● The original web server is a NeXT LONGTAIL Browser Google Brave computer, one of Steve Jobs’ early ● These are services that are offered on Chrome products. demand rather than on a onetime ● April 1993, CERN opened the World purchase. Messaging WeChat, Status WhatsApp Wide Web to the public. ● Tim also wrote the three fundamental Operating Android, iOS Essentia.one, technologies ASSISTIVE MEDIA media – anywhere on the internet where System EOS ● Nonprofit service designed to help people people usually participate or share Social Facebook, Steemit, who have visual and reading content. Network Twitter Akasha impairments. 2. Cyberstalking Storage Dropbox, Storj, UPDATED TRENDS IN ICT ● The act of stalking and repeatedly Google Drive Filecoin, IPFS EXTENDED REALITY harassing someone else through the ● Refers to technologies used to create internet or other electronic devices. Video-Audio Skype, Experty more engaging digital experiences ● The stalker blackmails the victim by Calls Messenger, Google Meet, including VR and AR. gaining access to their social media Zoom accounts, SMS, chats, and more. 5G ● The latest generation of connectivity after 3. Hacking TRENDS IN ICT 4G or LTE. ● Act of gaining access to or controlling CONVERGENCE one's account or computer secretly to ● Synergy of technological advancements AUTOMATION gain something, make a statement, or to work on a similar goal or task. ● The application of advanced technologies challenge oneself. to automate tasks. WEBSITE 4. Identity Theft ● Website, application, or online channel BLOCKCHAINS ● Happens when someone steals another that enables web users to create, ● A technology used to record and secure person's personal information and uses it co-create, discuss, modify, and exchange transactions through encryption. without permission. usergenerated content.
M-COMMERCE 5. Inappropriate Contents
SIX MAJOR TYPES OF SOCIAL MEDIA ● Use of mobile devices for different ● Might include texts, photos, and videos 1. Social Networks monetary transactions. that are illegal, offensive, or inappropriate 2. Bookmarking Sites for some age groups. 3. Social News 4. Media Sharing 2.2 ONLINE THREATS AND RISKS 6. Internet Bots / BotNets 5. Microblogging ● A network of compromised computers 6. Forums RISKS AND THREATS controlled by a robot that performs 1. Cyberbullying malicious acts for its creator. MOBILE TECHNOLOGIES ● Smartphones and tables have taken a ● Act of embarrassing, harassing, or bullying a person using the internet and 7. Internet Scams major rise over the years. communication technologies. ● Act of deceiving a user through fabricated ● It can occur through SMS, gaming, promises or stories, typically, to gain instant messaging apps, and social money from the victim. It comes in many forms – through online shopping, 12. Spams However, fake pages are usually badly written, banking, charity, social networking, ● Unwanted and unsolicited messages, have misspelled words, or low-resolution images. gaming, gambling, and dating sites. often through email. They can also be found on internet forums, text messages, 2. Be familiar with scams – learn about the 8. Online Grooming blog comments, and social media. different types of online scams and what can be ● Happens when someone manipulates, done to avoid them. exploits, or abuses a minor online. 13. Blended Threats Pedophiles use the internet to contact ● Computer viruses can be codes or 3. Install a firewall – a firewall is a network teens or even children; some are even programs loaded onto the computer device that blocks certain kinds of network traffic, pretending to be at the same age as the without the user’s permission. forming a barrier between a trusted and an victim. ● They are man-made and can replicate untrusted network. It prevents possible themselves. cyber-attacks and attempts to block the spread of 9. Pharming ● A blended threat is a pack of viruses, computer attacks. ● Uses malicious codes that direct users to worms, Trojan horses, and malicious a fake website to collect personal codes into a single threat. 4. Keep up-to-date – use the latest security information. Malicious codes are installed patches to make regular updates and let the on the computer or server. software do some scanning once in a while. 2.3 ONLINE SAFETY 10. Phishing 5. Protect your information – always be careful. ● Act of sending an email claiming to be an All data in a computer, smartphone, or tablet SAFETY MEASURES established enterprise asking for should be backed up to avoid data theft or data personal information. loss. PERSONAL INFORMATION ● It is almost similar to pharming. However, Here are the types of information that should not pharming is automatically redirects a user 6. Shop safely – do not make important and be easily shared online: to a fake website, as opposed to phishing personal transactions on websites without “https” ● Birthday; which tricks a user into accessing it and a padlock icon beside the URL. ● Complete address; himself. ● Contact numbers; 7. Use your common sense – the best ● Current and previous schools; 11. Spoofing protection when surfing the web is using common ● E-mail address; ● Act of pretending to be a legitimate sense. When something suspicious pops up, do ● Family members’ complete names, and; ● business, a neighbor, or someone else. It not open it. Personal pictures and Videos. is done by fraudsters to gain confidence, get access to computers or systems, 8. Use unique passwords – use uncrackable TIPS TO STAY SAFE ONLINE steal data and money, or spread ones or anything that is not easy to guess. 1. Always examine – there are fake sites with an malware. It happens in email, SMS, caller address that is very similar to another site. ID, URL, and GPS. 9. Watch the Wi-Fi connectivity. – change the router’s settings and make sure to have the connection password-protected to protect the WINDOWS SECURITY vulnerability, fix any bugs in the operating network. Changing User Accounts system, and more. Parents, siblings, children, best friends, or lovers Netiquette: What is NETIQUETTE? might be the other possible users of an account 2. Firewall Netiquette, or internet Etiquette, is the standard aside from its actual owner. ● helps protect the computer from way of communicating on the internet. It unauthorized entries, viruses, or worms represents the essence of proper manners and There are three types of user accounts: from the internet, network, installers, and behavior online. It covers numerous parts of the 1. Computer Administrator – controls all the downloads. It is recommended to keep web such as e-mail, multiplayer gaming, online contents and users of the computer, installs this setting ON. chat, social media, web forums, web comments, programs, and then adds and deletes users. and other means of communication online. 2. Limited account – has limited control and only 3. Virus protection access a particular account. ● is meant to locate and remove virus THE TEN COMMANDMENTS 3. Guest accounts – are created for temporary threats that are already in the computer. 1. Thou shalt not use a computer to harm other users and do not have access to other accounts ● It also prevents malware from entering people. and their content. into the computer. 2. Thou shalt not interfere with other people’s ● Virus protection should be constantly computer work. 4. The secure networks – as much as possible, updated to ensure that its antivirus 3. Thou shalt not snoop around in other people’s do not immediately connect to a network that is definition is up-to-date. files. not familiar. Be careful when using free Wi-Fi in 4. Thou shalt not use a computer to steal. 5. Thou public places. shalt not use a computer to bear false witness. 3.1 PRODUCTIVITY TOOLS 6. Thou shalt not use or copy software which you have not paid. CHANGING A PASSWORD PRODUCTIVITY TOOLS 7. Thou shalt not use other people’s computer A password is useful when owning a computer. To ● computer applications that allow users to resources without authorization. 8. Thou shalt not avoid other people from going through personal view, create, and modify office appropriate other people’s intellectual output. files, it is advisable to change the password once documents quickly and easily. 9. Thou shalt think about the social consequences in a while. ● Productivity tools enable people to be of the program you write. 10. Thou shalt use a more efficient, effective, and produce computer in many ways that show consideration. THE SECURITY CENTER more satisfying results in their daily work The Security Center allows the user to set and activities. CYBER LAW additional protection for a computer from threats, In reality, there are really people who take especially when using the internet. Productivity Tools: advantage of the online platform to scam other Google Calendar users, With that in mind, netizens should be 1. Microsoft updates Notion aware of how to have a safer and more secure ● are commonly meant to update some Grammarly experience while online. features in Windows secure areas of Google drive Microsoft OneNote Google docs software programs developed by Todoist FIVE COMPUTER-BASED SUITE Microsoft. Dropbox iWORK ● includes Word (word processor), Excel ● an office suite developed by Apple Inc. (spreadsheet), PowerPoint OFFICE SUITE for computers and mobile devices (slideshow), OneNote (notebook), ● term "office suite" refers to a group of running Mac OS X and iOS. Outlook (Information manager), rooms in which people gather to hold ● free on all Mac, iPhone, and iPad Access (database), Publisher meetings and other small events. devices; and is downloadable in the App (publishing), and SharePoint ● known as an application suite or Store (document and storage). productivity suite. ● package includes applications named ● designed to allow users to create and ● can be used by either a singular person Pages (word processor), Numbers communicate faster with time-saving or in collaboration with other people (spreadsheet), and Keynote features, a new modern look, and built-in doing similar things on their own devices (presentation). collaboration tools. regardless of time and place ● allows opening, editing, saving, and sharing documents from their Microsoft OpenOffice Examples of Office suites: Office counterparts. ● a free and open-source productivity suite Microsoft Office developed by Apache Software Google Workplace LibreOffice Foundation. Microsoft 365 ● most developed free and open-source ● package includes programs called Base LibreOffice Office Suite. (database), Calc (spreadsheet), Draw Wordperfect ● developed by The Document Foundation (graphics), Impress (presentation), Quickoffice ● includes Base (database), Calc Math (formulas and equations), and iWork (spreadsheet), Draw (graphics), Writer (word processor). OpenOffice Impress (presentation), Math ● It uses a dual-licensing scheme for WPS Office (formulas and equations), and Writer source code contributions. OpenOffice (word processor). can be downloaded online for free. COMPUTER-BASED SUITE ● It supports the file formats of other - A computer-based suite requires the user to well-known Office Suites and is available WordPerfect install the program itself on a computer using a in Windows, Mac, Linux, and Android. ● an all-in-one office suite developed by DVD-ROM device, flash drives, or through online ● LibreOffice was a fork of OpenOffice and Corel. installation. is built on the original OpenOffice code ● main applications include WordPerfect base which is the reason why the two (word processor), Quattro Pro ★ iWork have a lot of similarities. (spreadsheet), Presentations ★ LibreOffice (slideshow), WordPerfect Lightning ★ Microsoft Office Microsoft Office (notebook), and the latest ★ OpenOffice ● one of the most widely used and became addition-AlterShot (photo editing). ★ WordPerfect the standard suite of office automation ● supports over 60 file types and provides competitor of Google Apps. It does not any computer and program without useful features to make working and operating system an internet require any special plug-in and can be collaboration simpler as long as there is connection navigated in any popular browser. ● WordPerfect Office was originally an Internet ● accessible offline with Chrome. Once it is access. developed by Borland Software Corp. to installed in browsers, it can be used to compete against Microsoft Office and Users can access Web-based access Word and othe Microsoft AppleWorks. the latest version programs tend programs. Files are saved online in the of the software to run slower user's automatically. than those that WEB-BASED SUITES are stored in an - allows users to create, modify, and store files actual local hard OFFICE 365 online. These packages are offered in the form of drive. ● a line of subscription services offered by web applications. With online office suites, users Microsoft. It consists of Word, Excel, and can insert comments, share files, and invite other GOOGLE APPLICATIONS other Office programs which are readily people to collaborate with them. Multiple users ● widely known as Google Apps, is the accessible online. can also edit the same file simultaneously. rebranded version of G Suite developed ● Those who subscribed are given 1 TB of by Google. storage through OneDrive. ● The three core applications, Docs (word ● Office 365 allows them to share files and PROS CONS processing). Sheets (spreadsheet), control its access. This web-based suite Users can access If the server and Slides (slideshow), are accessible is also compatible with the latest documents using goes down, it through the Google Drive interface. It browsers and Office formats. any computer and will prevent all also includes Gmail (e-mail), Calendar ● In Nov 2018 update; 3D embedded operating system its users from as long as there is accessing the (schedule), and Hangout (messaging). images in Word PowerPoint, converting an Internet application. handwritten text into pri text if the user access. has an ink or touch-compatible device, iWORK ● Users can access the three main and digital pens are available in Word Users can access Remote the latest version services may programs online by setting up iCloud and PowerPoint. of the software compromise Drive or by using an Apple ID on the web automatically and leak private ZOHO information through iCloud. which can be ● offers an online suite of office tools with a very risky to the variety of applications for different tasks. user's side. Most can be run as stand-alone apps on OFFICE ONLINE mobile devices. It offers! of tools for Users can access Users may not documents using access the ● a completely free, web-based version of collaboration, training and conferencing, Microsoft Office and the closest e-mail, communication project management tools. ● has minor features that are not found in ● allows users to insert HTML and CSS other web-based programs. directly from files on the web TYPES OF PRODUCTIVITY TOOLS ➡ Popular presentation programs are shapes), modify the document layout, and PowerPoint, Prezi, and Zoho. proofread documents. 1. DATABASE SOFTWARE ➡ word processing programs - Word, Docs, ➡ also known as database management 3. SPREADSHEET SOFTWARE Word Perfect, and Writer. system (DBMS), ➡ made to verify, ➡ programs used to sort, compute, organize manipulate, specify, retrieve, and manage numerical data. stored data. ➡ It is comprised of formulas, graphs, charts, Benefits of using productivity tools: ➡ commonly used for customer account and calculations, value presentations. handling, product information, financial ➡ contains a series of worksheets for easy ‣ allows instant collaboration among people records, and other business transactions. data management wherein information is allows quick access regardless of location. ➡ Some examples are MySQL, Microsoft stored in cell Spreadsheet software are SQL Server, and Oracle Database commonly used in financial, academic, that ‣ increases productivity and accuracy. requires calculated data. ‣ increases productivity and accuracy. 2.PRESENTATION SOFTWARE ➡ Well-known examples are Excel, Google ‣ makes it easier to keep projects on track. ➡ used to display interactive slideshows to Sheets, and Calc. or any sector. express ideas, projections, and proposals ‣ offers different formats and sources. whether for educational or business purposes. 4. WORD PROCESSING SOFTWARE ‣ saves an ample amount of time. ➡Presentation software are considered as ➡ allows users to type and format texts, effective presentational tools for every type of insert and modify objects (images, clip arts, ‣ secures and protects information from being leaked. audience. 3.2 USING GRAPHIC FOR ICT CONTENT ● Is a principle of art that occurs when an ■ Single chart Infographics element is dominant and stands out from ■ Timeline Infographics BASIC PRINCIPLES OF GRAPHICS AND the rest. ■ Visualized Numbers Infographics LAYOUT MOVEMENT ➽ Anatomical Infographics ➨ Layout ● Refers to the way the eye moves over a ● Breaks down the data and shows exactly part of any graphic design that deals with the design. how it works. arrangement of visual elements on a page ➨ Graphic PATTERN ➽ Comparison Infographics any design or visual image, that can be found on ● Is the creation of unity on a design - Used when two products, people, ideas, any surface, designed to inform, illustrate, or through the use of repetition of visual things, events, or places are compared. entertain. elements. ➽ Hierarchical Infographics Graphics and Layout Have Six Basic PROPORTION - Frequently seen in the shape of a Principles: ● Refers to the virtual size of an element pyramid wherein the information is ★ Balance within an image compared to other arranged according to levels ★ Emphasis elements or based on a Meet ★ Movement usrecognized standard. ➽ How-to/Guide Infographics ★ Pattern VARIETY - Describes the steps that are involved in ★ Proportion ● Is the use of different design elements to the process of creating something. ★ Variety attract and retain attention. ➽ Informational/ List Infographics BALANCE - Organizes text about a specific topic with ● Refers how the objects, texture, colors, INFOGRAPHICS the help of icon and eyecatching color and space are distributed to achieve - The graphic visual representation of data and schemes. equality or stability. information in a graphic format designed to present the data in a clear and understandable ➽ Location-based infographics ➢ Symmetrical manner. - Uses a map with various icons and - Is when the weight and elements is evenly color-coded region to visualize divided on both sides. Types of Infographics: geographical data. ■ Anatomical Infographics ➢ Asymmetrical ■ Comparison Infographics ➽ Mixed Chart Infographic - Uses scale, contrast, and color to achieve the ■ Hierarchical Infographics - Uses different combinations of various flow in design. ■ How-to/Guide Infographics charts and graphs. ➢ Radial ■ Informational/ List Infographics - Is the arrangement of visual elements around a ■ Location based infographics ➽ Photographic Infographics central point. ■ Mixed Chart Infographic - It puts an emphasis on using photos ■ Photographic Infographics rather than text to send the message by EMPHASIS ■ Process Infographics using graphics elements. ■ Resume Infographics ➽ Process Infographics ● Make sure that every source in the ONLINE FILE FORMATS - Commonly referred to us flow chart or a infographic is reliable, true, accurate, and decision- tree. up to date. Raster File Formats Raster images are resolution dependent, ➽ Resume Infographics Focus on the flow pixel-based graphics, and typically used in - An infographic that helps applicants to ● An infographic is a good storyteller as it photos, digital artwork, and web graphics. get noticed during the recruitment can convey ideas in a seamless a process. manner. The flow will help the user pay GIF (.gif) Graphic Interchange Format attention to the message that is being – web animations, transparent images, and for ➽ Single chart Infographics presented. smaller file. - Uses a chart as the focal point to visualize specific data. Keep it focus JPEG (.jpg) Joint Photographic Experts Group ● The infographic should be streamlined – online images, photos for printing, and quick ➽ Timeline Infographics and focused on a single topic, and not preview image. - Use to show how a subject has changed unorganized combination of facts and over time or to tell a story in chronological figures. PNG (.png) Portable Network Graphics order – web graphics, illustrations with limited colors, Keep it simple and smaller files. ➽ Visualized Numbers Infographics ● Display advanced ideas in a simple visual - Add visual interest to individual units of form. RAW information by using large numbers, – Raw image files are data from a digital camera icons, or other graphic elements. Manage the length and size or image scanner that are not yet processed and ● Making it bigger that 8,000 pixel could therefore, cannot be edited or printed yet. Keys in Making an Infographic affect the viewer’s attention and cause Add white spaces lost of interest. TIFF (.tif) Tagged Image File Format ● A good infographic design must have a – used for high quality graphics and scans but not balance of visual elements with the Put a powerful headline for web graphics. necesssary negative space to guide ● It gains more viewers the more unique viewers as they look at the infographic. and catchier it is. Vector File Formats – Vector images are resolution independent, Create based on the target audience Present things visually curvedbased graphics, and ideal for logos, icons, ● Keep infographic specific, relevant, and ● Text and image could be balances. and text. targeted. Cite Sources AI (.ai) Adobe Illustrator Make it easy to view ● Use updated sources and cite the – typically used when editing a vector design and ● Make sure thatr even the smallest font on sources of information used. creating logos, icons, onepage print piece, and the infographic could be seen without too text. much difficulty
Check the facts and figures
► IMAGE MANIPULATION Image Hosting - is an internet service that allows organize information using the Internet. people to upload and share images through Online platforms and applications are Photo Manipulation - refers to the process of image hosting websites. strong innovators and play an important altering or changing photographs through different role in digital society. methods and techniques to achieve the desired CHARACTERISTICS OF A GOOD IMAGE results. HOSTING PLATFORM Benefits of Using Online Platforms/Applications: ✎Ease of Access ● Communication became much easier Basic Techniques ✎Ease of Use ● Sharing information became more fun ● Adding Filters ✎Printability and creative ● Adjusting Brightness and Contrast ✎Quality ● Anyone with Internet access can share ● Adjusting the Color Balance ✎Shareability ideas, opinions, and views about ● Changing the Background ✎Space everything ● Cloning ● Users with the same interest can build a ● Compression and Resizing Image Hosting Platforms community ● Cropping ● Removing the Color 500px – Platform for serious photographers Challenges of Using Online wanting to socialize with other photo enthusiast. Platforms/Applications: Basic Principles ● Interactions became less personal ■ Add a caption Dropbox – Free cloud storage for sending and ● There is less privacy A good caption can tell the story of a photo in an sharing photos and other file types. ● Possible gathering of false information instant. Flickr – Flickr is one of the oldest free image Common Online Platforms ■ Choose the right file hosting social network perfect for creating Knowing the format correct format to be used for organized photo album. 1. Cloud Computing - Cloud computing is the a specific purpose is a vital in image manipulation use of hardware and software to deliver a service Google Photos – one of the most useful and over a network. It allows users to access files ■ Choose the right image size popular among user for its unlimited free storage and use applications from any device that can • File size – refers to the size of the image files. It and automatic back-up feature. access the Internet. corresponds to its quality. • File type – standardized means of organizing Imgur – this site is known for effortless uploading Dropbox - is a hosting service that offers cloud and storing digital images and other types of files. of high-quality photos of any format, and sharing storage, file, synchronization, personal cloud, • Physical size – image information which them in other social media sites. and client software. It also keeps the users’ files determines how much space will the image safe, synched, and easy to share. occupy. • Resolution – refers to the total number of pixel in 3.3 ONLINE PLATFORMS AND Google Drive - allows users to store photos, an image. APPLICATIONS stories, designs, drawings, recordings, and videos. It can be accessed anytime and ► IMAGE HOSTING AND SHARING Online Applications and Online platforms anywhere from any device and file backup along - or websites are digital services designed with 15 GB storage free. to enable users create content and 2. File Management - File management facilitate these activities anytime and anywhere platforms are designed to manage files such as Tumblr - a micro-blogging platform and social documents and records. These platforms provide Prezi - is a web-based tool for creating networking site that allows the users to blog and users with an interface that can be used for a presentations as an alternative for making share stories, photos, GIFs etc. in a really simple variety of purposes - which include naming, programs such as PowerPoint. Prezi uses one way. Users can subscribe to as many pages they storing, handling, and managing data files in a large canvas instead of slides and has unique like and can share written entries with friends computer. features that allows users to pan and zoom and followers. parts. Word2pdf - is an online tool that converts DOC Twitter/X - an online social networking site that and DOCX formats into PDF files within seconds Slideshare - is a slide hosting service where allows the users to post and share short and can be freely used without hidden charges. It users can upload various files such as 140-character messages and interact with can be used without signing up. PowerPoint and PDF, which can be viewed either messages called “tweets”. Some individuals use privately or publicly. The slides can be viewed on Twitter to discover interesting people and Zamzar - is an online file converter that allows the site or can be linked on other sites companies online to follow their tweets. users to convert files without installing a software tool and supports over 1,000 various formats. ZOHO - allows the users to create, collaborate, 6. Web Page Creation - The use of web Users can provide a URL or upload one or more present, broadcast, and publish presentations in pages to accomplish different strategies to files to use it. a more efficient way. It gives the presentation a help a users’ identity, site, blog, business, stable URL and share slide deck without and etc grow. Web page creation covers a 3. Mapping - Mapping is the creation of maps, compromising the quality number of important elements including which are detailed graphic and symbolic color, layout, and overall graphical representations of the surface of the Earth and 5. Social Media - Social media are the appearance. its significant features. interactive computer-mediated technologies that facilitate the processing which people, Weebly - A web-hosting service that Google Maps - is a web mapping service companies, and other organizations create, features a drag-and-drop website builder developed by Google that offers satellite and share, and exchange information, ideas, career and guides the users in finishing created panoramic along with the traditional view of interests, and pictures or videos in virtual web pages faster with no coding needed. street maps, real-time traffic conditions and route communities and networks. planning for travel Wix - A cloud-based web development Facebook - an online social networking site that platform that allows users to create 4. Presentation/Visualization - Presentation allows the users to connect with their family, HTML5 websites and mobile sites through online platforms are programs that allow the user friends and other people they know. Facebook the use of their online drag and drop tools. to deliver information in a clear and efficient services include timeline, newsfeed, messages, manner by presenting a topic using a slideshow groups, and mobile apps. or lectures to educate or convince the audience. Instagram - a photo and video-sharing social Mind Meister - is an online mind mapping networking site that allows its users to upload application that let its users visualize, share, and photos and videos which can be edited with present ideas online. It offers ways to envision various filters, organized tags and location information in mind maps while providing tools to information. WEB DESIGN PRINCIPLES AND - Must be presented clearly, neatly, and - Image can represent a thousand words ELEMENTS accurately for the users - Content must be understanda ble without - Choosing the right images for a website Web Design Principles: any confusion will help with connecting to the target audience AESTHETIC VISUAL ELEMENTS - Use design elements and whitespace in a - Represent signs to the users to focus LAYOUT innovative way their attention to where they need to go - A webpage with randomly placed content - Whitespace makes a website less and elements urges visitors to look distracting and more appealing. elsewhere due to the lack of emphasis on - Light design guides users to where they Web Design Elements: the content along with its disorganized want to go and what they want to do appearance. Content must be arranged COLORS and managed properly to attract attention DESIGNED ACCORDING TO DETAILS - Attracts user’s attention from potential visitors. - It involves being attentive to element - Enhances the web design and user down to its details experience LOADING TIME - Contrasting color usage for text and - A website must have optimized image EMPHASIS background will make reading easier on size and compressed code to speed up - Must communica te information in a clear the eye. its loading time, since a page that takes manner too long to load is unpopular - Solves a specific problem, want, or need COMMUNICATION of the user - Must have organized information MOBILE MOBILE-FRIENDLY headlines - It is important to remember that a website FUNCTIONAL - Uses bullet points must be mobile friendly - Must be clear and easy to use - It must be accessible in any kind of - Links and buttons must respond correctly FONTS device - Must have an appropriate typeface and INNOVATIVE ideal font size for the users to read the NAVIGATION - must meet a specific category of content online content conveniently - Effective navigation buttons are essential - content and design must be clear and to any website. THe three-click rule must detailed PATTERN be followed; which states that users must - People scan computer screens in a be able to easily gain access to the SIMPLICITY pattern that resembles an “F” required information within three clicks. - Must be clutter-fre, even if numerous - People sees the top and left of the screen elements which might cause distraciton while the right side is rarely seen PURPOSE to any user that will visit the website are - Design should work with a reader’s - A focus-driven web design and content in use natural behavior and display information serve visitors efficiently. It specifies a clear purpose which makes information UNDERSTANDABLE IMAGES easily accessible to any user that visits the webiste. BASIC WEB PAGE CREATION
STEPS IN CREATING A WEB PAGE
1. Type “notepad” on the search bar or click on Start Button - All Apps - Windows Accesories - Notepad 2. Write or copy the HTML source code into Notepad. 3. Save the file in the computer. Select File - Save As in the menu. Name the file as “index.htm” and set the encoding to UTF-8 which is preferred encoding for HTML 4. There is no difference between the .htm or .html file extensions and either one of these can be used. 5. View the HTML page in the browser. Open the saved HTML file in the browser.