EMPOWERMENT-TECHNOLOGY.pdf
Document Details
Uploaded by Deleted User
Tags
Full Transcript
E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Digital Native -person surrounded by ICT since birth ICT Information and Communication and Technology ICT -deals with different communication technology to locate, save, send, and edit information. ICT in the Philippines =...
E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Digital Native -person surrounded by ICT since birth ICT Information and Communication and Technology ICT -deals with different communication technology to locate, save, send, and edit information. ICT in the Philippines = ICT Hub of Asia Philippine outsourcing 1997 – multination BPO 1999 – first call center 2010 – BPO capital of the world 525k Asians employed 2022 – 30billion dollars 70% of the BPO sectors in Ph 1.3m Filipinos employed in over 1000 BPO company growing by 8- 10% every year Holds 10-15% of the global BPO market 1.5m Filipinos freelance workers work on a digital platform, 2.8m employed 2023 – over 1.5m Filipinos were employed full-time BPO companies Increasing full time call center employees to 2.8m by 2028 600,00 call center jobs E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY World Wide Web – created by Sir Tim Berners-Lee in 1989 Static = Web 1.0, cannot be manipulated ex: myspace/ myjournal Dynamic = Web 2.0, can be manipulated/ changed ex: Facebook, Instagram Web 2.0 -a term coined by Darcy DiNucci on January 1999 -is the evolution of web 1.0 adding dynamic web pages\ 5 Key Features of Web 2.0 Folksonomy -free clarification of information, allows user to collectively classify. Rich User Experience -dynamic content, response to user input. User Participation -information flow two ways, site owner and user by means of evaluation and commenting. Software as a Service -Web 2.0 sites developed API’s to allow automated usage. Mass Participation -universal web access leads to differentiation of concerns. E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Web 3.0 -the third generation of the WWW, Web 3.0 is meant to be decentralized, open to everyone and built on top of block chain technologies and develops in the semantic web, which describes the web as a network of meaningfully linked data -user preference (detects your history/algorithm) Trends in the ICT Convergence -it is the integration of two or more different technologies in a single device system Social Media -it is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content -Types of Social Media Social Network – allows you to connect with other people with the same interest of background. ex: Facebook Book Marking Sites – allow you to store and manage links to various websites and resources. ex: Pinterest Social News – allow you to post their own news item or links to other resources. ex: reddit Media Sharing – allows you to upload and share media content like image, music, and video. ex: Instagram, YouTube Microblogging – sites that focus on short updates from users. ex: Threads, Twitter Blogs and Forums – allow users to post their content. ex: articles E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Mobile Technologies -system of each mobile -IOS, Android, Blackberry OS, Windows Phone OS, Symbian, WebOS, Windows Mobile Assistive Media -is a nonprofit service designed to help people wo have visual and reading impairments. E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Online Platform Social Media Search Engine -Google, Bing, Ask, Yahoo!, Eco Asia, Yandex -allows you to search internet content Communication Services -allows/ provides communication solutions -(internet) -Globe, PLDT, Converge FiberX, Sky Fiber Payment System -use online payment -Paymaya, Paypal, Gcash, coins.ph Advertising Platforms -any social media platforms with advertisements -Facebook, ads, Google Ads E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Rules of Netiquette -proper use of the internet Tips to Stay Safe Online 1. Be mindful of what you share online and what site you share it to 2. Do not just accept terms and conditions; read it 3. Check out the privacy policy page of a website to learn how the website handles the information you share 4. Know the security features of the social networking site you use 5. Do not share your password with anyone 6. Avoid logging in to public Networks/Wi-Fi. Browsing in incognito mode(or private mode) 7. Do not talk to strangers whether online or face-to-face 8. Never post anything about a future vacation 9. Add friends you know in real life 10. Avoid visiting untrusted website 11. Install and update an antivirus software on your computer 12. if you have Wi-Fi at home , make it a private network by adding a password 13. Avoid downloading anything from untrusted websites 14. Buy the software; do not use pirated ones 15. Do not reply or click link from suspicious emails E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Internet threats Malware -referred to suspicious/malicious software Types of Malwares -Virus -designed to replicate itself -happens to local networks and online networks -Worm -transfers from one computer to another computer, by any types of means -ex: love-letter-foryou.txt.vbs – Made by Onel De Guzman, May 5, 2000 vbs- visual basic script -Trojan -disguise as a useful program but not a useful program -ex: rogue security software -Spyware -program that runs in the background without you knowing -ex: Keyloggers -Adware -a program designed to send you advertisements mostly as pop-ups Spam -unwanted email mostly from bots or advertisers. it can be used to send malware. Phishing -acquire sensitive personal information like passwords -Pharming – a way more complicated way of phishing where it exploits DNS E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Cybercrime -is any criminal activity that involves a computer network device -RA 10175 of 2012 Copyright Infringement - occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed or made into a derivative work without the permission of the copyright owner -how is plagiarism different from copyright? – plagiarism is not under the law ( under academic ) copyright has legal bridge, act of stealing ( under law ) Intellectual Property -RA 8293 -gives rightful owner the protection of their creation -ex: copyright E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY Mail Merge Two components of mail merge FORM DOCUMENT -first document of mail merge that contains the main body of the message we want to convey or send -place holder are data fields or merge fields which marks the position on your form document where individual data or information will be inserted. LIST OR DATA FILE -where the individual information or data that needs to be plugged in to the form document is placed and maintained INTERGRATING IMAGES AND EXTERNAL MATERIALS Kinds of materials: 1. Pictures -electronic or digital pictures -jpeg( joint photographic experts group) small, doesn’t support transparency -png(portable network graphics) high quality -gif(graphics interchange format) moving picture 2. Clip art -line art drawings , looks like a photo grid 3. Shapes -use for composing and representing ideas 4. Smart art -graphic organizers, predefined sets of different shapes 5. Chart -represent data characteristics 6. Screenshot E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY IMAGE PLACEMENT 1. In line with text 2. Square 3. Tight 4. Through 5. Top and bottom 6. Behind text 7. In front of text MICROSOFT POWERPOINT -is a tool that help you present data whether it is scientific, statistical, or a book report TIPS IN CREATING AN EFECTIVE PRESENTATION 1. Minimize -keep slide counts minimum to maintain clear message and keep the audience attentive 2. Clarity -use font style that is easy to read 3. Simplicity -use bullets or short sentences by summarizing the info on the screen 4. Visuals -use graphics to help in your presentation 5. Consistency -make your design uniform 6. Contrast -use light font on dark background and vice versa E-TECH GR-11 ST.BR. JACOB SAMUEL EMPOWERMENT TECHNOLOGY BASIC PRINCIPLES OF GRAPHICS AND LAYOUT 1. Balance -visual weight of objects, texture, colors, and space are evenly distributed on the screen 2. Emphasis -an area in the design that may appear different in size, texture, shape, or color to attract the viewer’s attention 3. Movement -visual element guide the viewer’s eyes around the screen 4. Pattern, Repetition, and Rhythm -these are repeating visual element on an image or layout to create unity in it 5. Proportion -visual elements create a sense of unity where they relate well with one another 6. Variety -this uses several design elements to draw a viewer’s attention