0% found this document useful (0 votes)
176 views18 pages

ETECHmodule Week 1-4

The document discusses information and communication technology (ICT) including definitions of key terms like the internet, world wide web, static and dynamic web pages. It also covers trends in ICT like convergence, social media, mobile technologies, assistive media, and cloud computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
176 views18 pages

ETECHmodule Week 1-4

The document discusses information and communication technology (ICT) including definitions of key terms like the internet, world wide web, static and dynamic web pages. It also covers trends in ICT like convergence, social media, mobile technologies, assistive media, and cloud computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

1|Empowerm ent T echnologies – WEEK 1-4

CONTENT STANDARD
The learners demonstrate an understanding of Information Communication Technology
(ICT) in the context of global communication for the Academic Track.
PERFORMANCE STANDARD
At the end of the two-week period, the learners should be able to independently compose
an insightful reflection paper on the nature of ICT in the context of their lives, society, and
the academic track.

LESSON 1 What is Information and Communications Technology?

CONTENT
1. The current state of ICT technologies (i.e., Web 2.0, 3.0, convergent technologies, social,
mobile, and assistive media)
2. Online systems, functions, and platforms

LEARNING COMPETENCIES
Compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges.

WHAT TO KNOW?
ICT– Information and Communication-
• It deals with the use of different
communication technologies such as
mobile phones, telephone, Internet to
locate, save, send and edit information
• Is a study of computers as data
processing tools. It introduces students
to the fundamental of using computer
systems in an internet environment.

ICT in the Philippines


• Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-
related jobs, one of which is BPO, Business Process Outsourcing, or call centers.
• ICT Department in the Philippines is responsible for the planning,
development and promotion of the country’s information and communications
technology (ICT) agenda in support of national development.

Computer– an electronic device for


storing and processing data, typically
in binary form, according to
instructions given to it in a variable
program.
Internet– is the global system of
interconnected computer networks
that use the internet protocol suite
(TCIP/IP) to link billions of devices
worldwide.
2|Empowerm ent T echnologies – WEEK 1-4

• Means of connecting a computer to any other computer anywhere in the world


via dedicated routers and servers.
• Sometimes called simply ‘’the Net’’, is a worldwide system of computer
networks- a network of networks in which the users at any one computer can get
information from any other computer.

World Wide Web


• An information system on the
internet that allows documents to be
connected to other documents by
hypertext links, enabling the user to
search for information by moving from
one document to another.
• Is an information space where
documents and other web resources are
identified by URLs, interlinked by
hypertext links, and can be accessed via the Internet.
• Invented by Tim-Berners Lee

Web Pages
• Web page is a hypertext document connected to the World Wide Web. It is a
document that is suitable for the World Wide Web.
The different online platforms of World Wide Web:
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made
up of the Web pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to
see a website differently than others.
– Allows users to interact with the page; instead of just reading the page, the user may
be able to comment or create user account.

3. Web 3.0 – this platform is all about semantic web.


– Aims to have machines (or servers) understand the user’s preferences to be
able to deliver web content.

Static Web Page- is known as a flat page or stationary age in the sense that the page is
‘’as is’’ and cannot be manipulated by the user. The content is also the same for all
users that is referred to as Web 1.0

Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web
pages. The user is able to see website differently than others e.g. social networking sites,
wikis, video sharing sites.
FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to
as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put
content. Others are able to place a content of their own by means of comments,
reviews and evaluation e.g. Lazada, Amazon.
3|Empowerm ent T echnologies – WEEK 1-4

4. Long Tail– services that are offered on demand rather than on a one-time purchase.
This is synonymous to subscribing to a data plan that charges you for the amount of
time you spent in the internet.
5. Software as a services- users
will be subscribe to a software only
when needed rather than purchasing
them e.g. Google docs used to create and
edit word processing and spread sheet.
6. Mass Participation– diverse
information sharing through universal
web access. Web 2.0’s content is based
on people from various cultures.

TRENDS IN ICT

Convergence– is the synergy of


technological advancements to work on
a similar goal or task. For example,
besides using your personal computer
to create word documents, you can now
use your smartphone.
2. Social Media– is a website,
application, or online channel that enables web users web users to create , co-create,
discuss modify, and exchange user generated content.

Six types of Social Media:

a)Social Networks – These are sites that allows you to connect with other people with
the same interests or background. Once the user creates his/her account, he/she can set
up a profile, add people, share content, etc
Example: Facebook and Google+

b)Bookmarking Sites – Sites that allow you to store and


manage links to various website and resources. Most of the
sites allow you to create a tag to others.
Stumble Upon, Pinterest

c) Social News – Sites that allow


users to post their own news items or links to other news sources.
4|Empowerm ent T echnologies – WEEK 1-4

The users can also comment on the post and comments may also be rank.Ex. Reddit
and Digg

d) Media Sharing – sites that allow you to upload and


share media content like images, music and video.
Ex. Flickr, YouTube and Instagram

e) Microblogging – focus on short


updates from the user. Those that
subscribed to the user will be able to
receive these updates.
Ex. Twitter and Plurk

f) Blogs and Forums – allow user


to post their content.
Other users are able to
comment on the said topic.
Ex. Blogger, WordPress and
Tumblr

3. Mobile Technologies– The popularity of smartphones


and tablets has taken a major rise over the years. This is
largely because of the devices capability to do the tasks that were originally found
in PCs. Several of these devices are capable of using a high-speed internet. Today
the latest model devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS
• iOS – use in apple devices such as
iPhone and iPad
• Android – an open source OS developed
by Google. Being open source means mobile
phone companies use this OS for free.
• Blackberry OS – use in blackberry
devices
• Windows phone OS – A closed source
and proprietary operating system developed by Microsoft.
• Symbian – the original smartphone OS. Used by Nokia devices
• WebOS- originally used in smartphone; now in smart TVs.
• Windows Mobile – developed by Microsoft for smartphones and pocket PCs
4. Assistive Media– is a non- profit service
designed to help people who have visual and
reading impairments. A database of audio
recordings is used to read to the user.
5. e.g. Yahoo!, Gmail, HotmailCloud computing-
distributed computing on internet or delivery of
computing service over the internet.
5|Empowerm ent T echnologies – WEEK 1-4

-Instead of running an e-mail program on your computer, you log in to a Web

e-mail account remotely. The software and storage for your account doesn’t exist

on your computer – it’s on the service’s computer cloud.

It has three components


1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but
server acts as if they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed
via Internet.

TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services
to be easily accessible to the general public.
Public cloud may be less secured because of its
openness, e.g. e-mail
PRIVATE CLOUD allows systems and
services to be accessible within an organization.
It offers increased security because of its private
nature.
COMMUNITY CLOUD allows systems and
services to be accessible by group of
organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical
activities are performed using private cloud while the non-critical activities are
performed using public cloud.

WHAT TO PROCESS?
Static vs. Dynamic
Look for 5 websites and classify them as static or dynamic. What makes each websites
static or dynamic? Use the table below.

Website URL Static Dynamic Reason


6|Empowerm ent T echnologies – WEEK 1-4

What to Transfer?
True of False: Write T if the sentence is correct; otherwise, write F on the blank before each item.
_____1. Tim Berners-Lee created the World Wide Web.
_____2. People Magazine conducted the research on “The Selfiest Cities in the World.”
_____3. ICT deals with the use of different communications technology to locate, save, send, and
edit information.
_____4. Android is a mobile operating system for Apple devices
_____5. Blogging sites are sites that focus on short updates from the user.

LESSON 2 ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

CONTENT
Online safety, security, ethics, and etiquette

LEARNING COMPETENCIES
Apply Internet online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks.

WHAT TO KNOW?

INTERNET SAFETY- it refers to the online


security or safety of people and their
information when using internet.
NETIQUETTE- is network etiquette, the do’s
and don’ts of online communication.

TEN RULES OF NETIQUETTE


Rule No. 1: Remember the human

• You need to remember that you are talking to a real person


when you are online.
• The internet brings people together who would otherwise never
meet.
• Remember this saying when sending an email: Would I say
this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real
life.

• You need to behave the same way online that you do in real life.
• You need to remember that you can get caught doing things you should not be
doing online just like you can in real life.
• You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
7|Empowerm ent T echnologies – WEEK 1-4

• Always take a look around when you enter a new domain when surfing the web.
• Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.

• Remember people have other things to do besides read your email. You are not the center
of their world.
• Keep your post and emails to minimum by saying what you want to say.
• Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.

• Be polite and pleasant to everyone.


• Always check your spelling and grammar before posting.
• · Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge

• Ask questions online


• Share what you know online.
• Post the answers to your questions online because someone may have the same
question you do.
Rule no. 7: Help keep flame wars under control

• Netiquette does not forgive flaming.


• Netiquette does however forbid people who are flaming to hurt discussion groups by
putting the group down.
Rule no. 8: Respect other people’s privacy.

• Do not read other people’s mail without their permission.


• Going through other people’s things could cost you, your job or you could even go to
jail.
• Not respecting other people’s privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.

• Do not take advantage of other people just because you have more knowledge or power
than them.
• Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.

• Do not point out mistakes to people online.


• Remember that you were once the new kid on the block.
• You still need to have a good manners even though you are online and cannot see
the person face to face.
Internet security
Security Requirement Triad

ConfidentIality
Data confidentiality
Privacy
• Integrity
Data integrity
System integrity
• Availability

Threat Consequence Threat Action ( Attack)

Exposure: Sensitive data are directly released to


Unauthorized Disclosure an unauthorized entity.
8|Empowerm ent T echnologies – WEEK 1-4

A circumstance or event whereby an Interception: An unauthorized entity directly


entity gains access to data for which accesses sensitive data traveling between
the entity is not authorized. authorized sources and destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses sensitive
data by reasoning from characteristics or
byproducts of communications.
Intrusion: an unauthorized entity gains access to
sensitive data by circumventing a system’s security
protections.

Incapacitation: prevents or interrupts system


operation by disabling a system component.
Corruption: Undesirably alters system operation
by adversely modifying system functions or data.
Obstruction: A threat action that interrupts
Disruption delivery of system services by hindering system
A circumstance or even that interrupts operation.
or prevents the correct operation of Masquerade: An unauthorized entity gains access
system services and functions. to a system or performs a malicious act by posing
as an authorized entity.
Deception Falsification: False data deceive an authorized
A circumstance or event that may entity.
result in an authorized entity receiving Repudiation: An entity deceives another by
false data and believing it to be true. falsely denying responsibility for an act.

Usurpation
A circumstances or event that results Misappropriation: An entity assumes
in control of system services or unauthorized logical or physical control of a
functions by an unauthorized entity. system resource.
Misuse: Causes a system component to perform a function or service that is detrimental to
system security.
Types of System Intruders
• Masquerader
• Hackers
• Clandestine user

Parts of Virus
• Infection mechanism
• Trigger
• PayloaD

Virus stages

• Dormant phase
Virus is idle.
• Propagation phase
Virus places an identical copy of itself into other programs or into certain system areas on
the disk.
• Triggering phase
Virus is activated to perform the function for which it was intended. Caused by a variety
of system events
• Execution phase Function is performed
Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Malware- stands for malicious software.
9|Empowerm ent T echnologies – WEEK 1-4

Virus- a malicious program designed to transfer from one computer to another in any means
possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any
other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads users
into believing there is a virus on their computer, and manipulates them into paying money for a
fake malware removal tool.

Lesson 4

Contextualized Online Search and Research Skills

Four search strategies


• Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word
• Boolean
AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
• Question a question may be entered in the search field of search engine
• Advanced Features are offered on many engines by going to an “Advanced search” page
and making selections. Effective in narrowing search returns to a specific topic or phrase.

What to Process?
1. Visit a social networking site and look for the site’s privacy policy. The link is typically
found at the bottom of the page and sometimes labeled only as “Privacy.” Write a summary
on how the website handles both your private and public information.
Write your answer here

2. Do you agree or disagree with the provision of the copyright law? Defend your answer.
10 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

Write your answer here

3. How do you feel if someone posted something embarrassing about you? What would you
do?
Write your answer here

What to transfer?
Matching Type: Match Column A to Column B. Write the letter of the correct answer on the space
before each number.
A B
1. Virus A Designed to send you ads.
2. rogue B Sends an official looking email and is
designed to steal sensitive personal
information
3. key logger C A provision that allows you to use
copyrighted work without consent with
certain limitations
4. adware D A browser feature that is synonymous to
“private” browsing
5. spam E Replicates and can transfer from one
computer to another
6. phishing F Exploits the DNS system
7. fair use G States that anyone who uses your network
without your consent is punishable by law
8. spyware H Runs in the background and monitors what
you are doing.
9. private I Unwanted email mostly from bots
10. malware J Disguise as useful program but is not
11. incognito K The information superhighway
12. internet L Trick the user into posing that it is a
security software
13. trojan M A malicious software
14. copyright N An option to hide a post so that search
engines could not scan it
15. pharming O Used to record the keystrokes done by the
user

CONTENT STANDARD
The learners demonstrate an understanding of: the use of advanced tools and techniques
found in common productivity and software applications in developing ICT content for the
academic track.

PERFORMANCE STANDARD
At the end of the two-week period, learners should be able to independently apply advanced
productivity tools to create or develop ICT content for use in the academic track. These
may be in the form of, but not limited to designing letterheads and business cards.
11 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

Lesson 4 Developing ICT Content for Specific Purposes

WHAT TO KNOW?
Lesson Discussion

In the professional world, sending out information to convey important information is vital.
Because of ICT, things are now sent much faster than the traditional newsletters or postal mail.
You can now send much faster than the traditional newsletters or postal mail. You can now use
the Internet to send out information you need to share. What if we could still do things much faster
– an automated way of creating and sending uniform letters with different recipients? Would that
not be more convenient?

I. Mail Merge and Label Generation

A. Mail Merge
One of the important reasons in using computers per se is its ability to do recurring tasks
automatically. But this ability has to be honed
by learning the characteristics and features of
the software you use with your computer. After
all, no matter how good or advance your
computer and software may be, it can only be
as good as the person using it.

In this particular part of our lesson, we


will learn one of the most powerful and
commonly used features of Microsoft Word
called Mail Merge. As the name suggests, this
feature allows you to create documents and
combine or merge them with another document
or data file. It is commonly used when sending
out advertising materials to various recipients.

The simplest solution for the scenario


above is to create a document and just copy and
paste it several times then just replace the details depending on whom you send it to. But what if
you have hundreds or thousands of recipients? Would not that take too many hours? What if you
have a small database of information where you can automatically generate those letters?

Two Components of Mail Merge

1. Form Document

The first component of our mail merged document is the form document. It is generally the
document that contains the main body of the message we want to convey or send. The main body
of the message is the part of the form document that remains the same no matter whom you send
it to from among your list.

Also included in the form document is what we call place holders, also referred to as data
fields or merge fields. This marks the position on your form document where individual data or
information will be inserted. From our sample document, the place holders are denoted or marked
by the text with double-headed arrows (<< >>) on each side and with a gray background. On a
printed standard form, this will be the underlined spaces that you will see and use as a guide to
where you need to write the information that you need to fill out. In its simplest form, a form
12 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

document is literally a “form” that you fill out with individual information. A common example
of a form document is your regular tax form or application form.

2. List or Data File

The second component of our mail merged document is the list or data file. This is where
the individual information or data that needs to be plugged in (merged) to the form document is
placed and maintained. One of the best things about the mail merge feature is that it allows data
file to be created fro within the Microsoft Word application itself, or it gets data from a file created
in Microsoft Excel or other data formats. In this way, fields that needed to be filled up on the form
document can easily be maintained without accidentally altering the form or main document. You
can also easily add, remove, modify, or extract your data more efficiently by using other data
management applications like Excel or Access and import them in Word during the mail merge
process.

B. Label Generation

Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes
sense that after you print out your form letters, you will need to send it to individual recipients in
an envelope with the matching address printed directly on the envelope or on a mailing label to
stick on. By using virtually the same process as a standard mail merge, Microsoft Word will print
individual addresses to a standard form that it has already pre-formatted. Simply put, it creates a
blank form document that simulates either a blank label or envelope of pre-defined size and will
use the data file that you selected to print the information, typically individual addresses. So even
in generating labels, the two essential components of creating a merged document are present: the
form document and the data file. Only in this case, you did not have to type or create the form
document yourself because it was already created and pre-formatted in Microsoft Word. All you
need to do is select the correct or appropriate size for the label or envelope and select the data file
that contains the addresses (data) to be printed. You can also preview your merged labels before
printing if you want to.

II. Integrating Images and External Materials

Integrating or inserting pictures in your document is fun and it improves the impression of
your document. A common use of inserting a picture on a document is when you are creating your
resume. Though seemingly simple to do, your knowledge on the different kinds of materials that
you can insert or integrate in a Word document and its characteristics can help you create a more
efficient, richer document not only in content but also in physical form. A better understanding of
the physical form of your document as well as the different materials you would integrate in it
would allow you to be more efficient and versatile in using Microsoft Word.

A. Kinds of Materials

There are various kinds of materials Microsoft Word is capable of integrating to make the
documents richer, more impressive, and more informative.

1. Pictures

Generally, these are electronic or digital pictures or photographs you have saved in any local
storage device. There are three commonly used types of picture files. You can identify them by
the extension on their file names.

a. .JPG/JPEG

This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic Experts
Group. Like all the rest of the image file extensions, it identifies the kind of data compression
13 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

process that it uses to make it more compatible and portable through the Internet. This type of
image file can support 16.7 million colors that is why it is suitable for use when working with full
color photographic images. Unfortunately, it does not support transparency and therefore, images
of this file type can be difficult to integrate in terms of blending with other materials or elements
in your document. But if you are looking for the best quality image to integrate with your document
then this is the image file type for you. .JPG does not work well on lettering, line drawings, or
simple graphics. .JPG images are relatively small in file size.

b. .GIF

This stands for Graphics Interchange Format. This type of image file is capable of displaying
transparencies. Therefore, it is good for blending with other materials or elements in your
document. It is also capable of displaying simple animation. Apparently, this may not be too useful
on a printed document but if you are sending documents electronically or through email, or even
post documents into a website, then this could be quite impressive. The downside is that it can
only support up to 256 colors so it is good mostly on logos and art decors with very limited, and
generally solid colors. .GIF is much better for logos, drawings, small text, black and white images,
or low-resolution files.

c. .PNG

This is pronounced as “ping“. It stands for Portable Network Graphics. It was built around
the capabilities of .GIF. Its development was basically for the purpose of transporting images on
the Internet at faster rates. It is also good with transparencies but unlike .GIFs, it does not support
animation but it can display up to 16 million colors, so image quality for this image file type is
also remarkably improved. .PNG allows the control of the transparency level or opacity of images.

2. Clip Art

This is generally a .GIF type; line art drawings


or images used as generic representation for ideas and
objects that you might want to integrate in your
document. Microsoft Word has a library of clip arts
that is built in or can be downloaded and used freely.
There are still other clip arts that you can either
purchase or freely download and use that come from
third-party providers.

3. Shapes

These are printable objects or materials that you


can integrate in your document to enhance its appearance or allow you to have some tools to use
for composing and representing ideas or messages. If you are designing the layout for a poster or
other graphic material for advertising, you might find this useful.

4. Smart Art
14 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

Generally, these are predefined sets of different shapes grouped together to form ideas that
are organizational or structural in nature. If you want to graphically represent an organization,
process, relationships, or flow for
infographic documents, then you will find
this easy and handy to use.

5. Chart

Another type of material that you can


integrate in your Word document that
allows you to represent data characteristics
and trends. This is quite useful when you are
preparing reports that correlate and present
data in a graphical manner. You can create
charts that can be integrate in your
document either directly in Microsoft Word or imported from external files like Microsoft Excel.

6. Screenshot

Sometimes, creating reports or manuals for training or procedures will require the integration of a
more realistic image of what you are discussing on your report or manual. Nothing can get you a
more realistic image than a screenshot. Microsoft Word even provides a snipping tool for your
screen shots so you can select and display only the part that you exactly like to capture on your
screen.

III. Image Placement

A. In Line with Text

This is the default setting for images that are


inserted or integrated in your document. It
treats your image like a text font with the
bottom side totally aligned with the text line.
This setting is usually used when you need to
place your image at the beginning of a
paragraph. When placed between texts in a
paragraph or a sentence, it distorts the overall
appearance and arrangement of the texts in the
paragraph because it will take up the space it
needs vertically, pushing whole lines of texts
upward.

B. Square

This setting allows the image you inserted to be placed anywhere with the paragraph with the text
going around the image in a square pattern like frame.

C. Tight

This is almost the same as the Square setting, but here the text “hug” or conforms to the general
shape of the image. This allows you to get a more creative effect on your document. This setting
can mostly be achieved if you are using an image that supports transparency like a .GIF or .PNG
file.

D. Through
15 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

This setting allows the text on your document to flow even tighter taking the contours and shape
of the image. Again, this can be best used with .GIF or .PNG type of image.

E. Top and Bottom

This setting pushes the texts away vertically to the top and/or the bottom of the image so that the
image occupies a whole text line on its own.

F. Behind Text

This allows your image to be dragged and placed anywhere on your document but with all the texts
floating in front of it. It effectively makes your image look like a background.

G. In Front of Text

As it suggests, this setting allows your image to be placed right on top of the text as if your image
was dropped right on it. That means whatever part of the text you placed the image on, it will be
covered by the image.

IV. Key Terms

Mail Merge – a feature that allows you to create documents and combine or merge them with
another document or data file.
Form Document – the document that contains the main body of the message we want to convey or
send.
Data File – includes the individual information or data or the recipient’s information.
Merge Field/Place Holder – marks the position on your form document where individual data or
information will be inserted.
.JPG – file extension for the Joint Photographic Experts Group picture file.
.PNG – file extension for Portable Network Graphics image file.
.GIF – file extension for the Graphics Interchange Format image file.
Clipart – line art drawings or images used as a generic representation for ideas and objects.
Smart Art – predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature.
Text Wrap – adjusts how the image behaves around other objects or text.

WHAT TO PROCESS?
Lesson 5. Imaging and Design for Online Environment

GOAL
At the end of the 2-week period, you will be able to independently apply the techniques of
image manipulation and graphic design to create original or derivative ICT content from
existing images, text and graphic elements for use in specific professional tracks.

WHAT TO KNOW?
What is an Image? - a representation of the external form of a person or thing in art. Images
may be 2-dimensional, such as a photograph or screen display, or 3-dimensional, such as a
statue or hologram. They may be captured by optical devices – such as cameras, mirrors,
lenses, telescopes, microscopes, etc. and natural objects and phenomena, such as the human
eye or water.
16 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

Graphics - are visual images or designs on some surface, such as a wall, canvas, screen,
paper, or stone to inform, illustrate, or entertain.
Examples of Graphics:
-Photographs -Drawings -Line art -Graphs -Diagrams -Typography -Numbers -Symbols -
Geometric designs -Maps -Computer Graphics -Engineering drawings, or other images.
Layout - is part of graphic design that deals in the arrangement of visual elements on a
page.

Basic Principles of Graphics and Layout :


1. Balance. The visual weight of objects, texture, colors, and space is evenly distributed on
the screen.
2. Emphasis. An area in the design that may appear different in size, texture, shape or color
to attract the viewer’s attention.
3. Movement. Visual elements guide the viewer’s eyes around the screen.
4. Pattern, Repetition, and Rhythm. These are the repeating visual element on an image or
layout to create unity in the layout or image. Rhythm is achieved when visual elements
create a sense of organized movement.
5. Proportion. Visual elements create a sense of unity where they relate well with one
another.
6. Variety. This uses several design elements to draw a viewer’s attention.

INFOGRAPHICS - Information graphics or infographics are used to represent information,


statistical data, or knowledge in a graphical manner usually done in a creative way to attract the
viewer’s attention.

5 Principles in Making an Effective Infographic Design


1. Be Unique 4. Less is More
2. Make It Simple 5. The Importance of Getting it
3. Be Creative and Bold Across

Online Image File Formats


1. Joint Photographic Experts Group (JPEG) – does not support transparency and animation
(.jpeg or jpg)
2. Graphics Interchange Format (GIF) – supports transparency and animation (.gif)
3. Portable Networks Graphics (PNG) – supports transparency but not in animation (.png)

Image Manipulation Principles


1. Choose the right file format. Try to make a real-life photograph into GIF to see the
difference between PNG, GIF, and JPEG. Knowing the purpose is the key to finding out
the best file format.
2. Choose the right image size. A camera with 12 megapixels constitutes to a bigger image
size. Monitors have a resolution limit, so even if you have a million megapixels, it will not
display everything.
3. Caption it. Remember to put a caption on images whenever possible. If it is not related
to the web page, then remove it.

IMAGE MANIPULATIONS TECHNIQUES


1. Cropping. Cutting parts away to remove distracting or irrelevant elements
2. Color Balance. The ambience and the tone of light of the picture (ex. Warm or cool light)
3. Brightness and Contrast. One of the most basic techniques in image editing, making the image
darker or lighter
17 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

4. Compression and Resizing. The higher the quality and the larger the photo is, the bigger the file
size of the picture is.
5. Filters. Making the image look sketched, grainy, classic black and white or even let it have neon
colors. This gives your image a twist from its original look.
6. Cloning. Copying or duplicating a part of an image.
7. Changing the Background. Adding background to make your image stand out
8. Removing the Color. Removing certain colors in your image or desaturating the color of the
image.
9. Combining Text, Graphics and Image. Adding multiple elements in your layout

Image hosting and sharing


- Google+ Photos - 500px - DropBox
- Flickr - Photobucket - Chevereto
- Smugmug - Amazon Prime - Imageshack
- Imgur Photos

WHAT TO TRANSFER?
1. Give three websites that you visit. What makes their site design work?
Write your answer here

2. Research on Photobucket and to more free image hosting site and check out the
limitations of the free account. What is the best hosting site for you and why?
Write your answer here

3. What are the limitations of PhotoScape compared to other image editors?


Write your answer here

Multiple choice: Write the letter of the correct answer on the space before each number.
____1. Balance is to even distribution; emphasis is to
a. Attracting c. Design
b. Colors d. Weight
____2. Movement is to guiding the eye; rhythm is to create
a. Attraction c. Visuals
b. Organization d. Unity
____3. These are visual elements creating a sense of unity where they relate well with one another.
a. Style c. Variety
b. Proportion d. Emphasis
____4. It uses several design elements to draw a viewer’s attention.
a. Style c. Variety
b. Proportion d. Emphasis
____5. It makes complex data become more visually appealing to the average user.
a. Tables c. Infographics
b. Piktocharts d. Slideshows
18 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4

You might also like