Vous êtes sur la page 1sur 14

REPUBLIC OF THE PHILIPPINES

CHRIST THE KING COLLEGE


SENIOR HIGH SCHOOL
CALBAYOG CITY

COMPILATION OF REPORTS
In
Empowerment Technology
(MODULE 1-3)

Submitted by:
Pio John Vonn R. Guiret
STEM 11- St. Peter of Alcantara

Submitted to:
Mr. Jolly N. Bosque, LPT
Subject Teacher

Date: August 1, 2017


MODULE 1: Information and Communication Technology Toda
Evolution of ICT
 The Pre-mechanical Period
 The Mechanical Period
 The Electromechanical Period
 The Electronic Period
Summary
Over the last decades, governments all over the world have tried to take
advantage of information and communication technology (ICT) to improve
government operations and communication with citizens. Adoption of e-
government has increased in most countries, but at the same time, the rate of
successful adoption and operation varies from country to country. This article
outlines the evolution of ICT in the public sector over the past 25 years. It presents
general trends by examining interactions and mutual shaping processes between
ICT evolution and several inter-related institutional changes including government
operations, public services delivery, citizen participation, policy and decision
making, and governance reform. The authors suggest that within a short time
period, e-governance has evolved rapidly from rudimentary uses of ICTs as simple
tools to support highly structured administrative work to the integration of ICT
throughout government operations. The growing use of Web 2.0, social media,
and mobile and wireless ICT by citizens can also heavily impact the way public
services are delivered and how citizen engagement processes are carried out.
However, new management approaches, governance structures, and policy
frameworks are still missing, posing a challenge for governments to operate
effectively in the age of big data. Generally, developing countries are lagging
behind in e-government adoption compared with developed countries. Thus, for
developing countries to successfully adopt ICT and try to leapfrog some of the
obstacles encountered by early ICT adopters in developed countries, systematic
analyses need to be conducted to understand the interactions among stakeholders
and ICTs and co-create the institutional environment to lead to a positive impact
of ICT on public administration. Only when this relationship is clearly understood
can innovative ICTs be seamlessly integrated into the governance structure.
The Pre-mechanical Period
The premechanical age is the earliest age of information technology. It can be defined as the time between
3000B.C. and 1450A.D. We are talking about a long time ago. When humans first started communicating
they would try to use language or simple picture drawings known as petroglyths which were usually carved
in rock. Early alphabets were developed such as the Phoenician alphabet. As alphabets became more
popluar and more people were writing information down, pens and paper began to be developed. It started
off as just marks in wet clay, but later paper was created out of papyrus plant. The most popular kind of
paper made was probably by the Chinese who made paper from rags.Now that people were writing a lot of
information down they needed ways to keep it all in permanent storage. This is where the first books and
libraries are developed. You’ve probably heard of Egyptian scrolls which were popular ways of writing down
information to save. Some groups of people were actually binding paper together into a book-like
form.Also during this period were the first numbering systems. Around 100A.D. was when the first 1-9
system was created by people from India. However, it wasn’t until 875A.D. (775 years later) that the
number 0 was invented. And yes now that numbers were created, people wanted stuff to do with them so
they created calculators. A calculator was the very first sign of an information processor. The popular
model of that time was the abacus.

Mechanical

The mechanical age is when we first start to see connections between our current technology and its
ancestors. The mechanical age can be defined as the time between 1450 and 1840. A lot of new
technologies are developed in this era as there is a large explosion in interest with this area. Technologies
like the slide rule (an analog computer used for multiplying and dividing) were invented. Blaise Pascal
invented the Pascaline which was a very popular mechanical computer. Charles Babbage developed the
difference engine which tabulated polynomial equations using the method of finite differences.There were
lots of different machines created during this era and while we have not yet gottent to a machine that can
do more than one type of calculation in one, like our modern-day calculators, we are still learning about
how all of our all-in-one machines started. Also, if you look at the size of the machines invented in this
time compared to the power behind them it seems (to us) absolutely ridiculous to understand why anybody
would want to use them, but to the people living in that time ALL of thse inventions were HUGE.

Electromechanical

Now we are finally getting close to some technologies that resemble our modern-day technology. The
electromechanical age can be defined as the time between 1840 and 1940. These are the beginnings of
telecommunication. The telegraph was created in the early 1800s. Morse code was created by Samuel
Morse in 1835. The telephone (one of the most popular forms of communication ever) was created by
Alexander Graham Bell in 1876. The first radio developed by Guglielmo Marconi in 1894. All of these were
extremely crucial emerging technologies that led to big advances in the information technology field.

The first large-scale automatic digital computer in the United States was the Mark 1 created by Harvard
University around 1940. This computer was 8ft high, 50ft long, 2ft wide, and weighed 5 tons - HUGE. It
was programmed using punch cards. How does your PC match up to this hunk of metal? It was from huge
machines like this that people began to look at downsizing all the parts to first make them usable by
businesses and eventually in your own home.

Electronic

The electronic age is wha we currently live in. It can be defined as the time between 1940 and right now.
The ENIAC was the first high-speed, digital computer capable of being reprogrammed to solve a full range
of computing problems. This computer was designed to be used by the U.S. Army for artillery firing tables.
This machine was even bigger than the Mark 1 taking up 680 square feet and weighing 30 tons - HUGE. It
mainly used vacuum tubes to do its calculations. There are 4 main sections of digital computing. The first
was the era of vacuum tubes and punch cards like the ENIAC and Mark 1. Rotating magnetic drums were
used for internal storage. The second generation replaced vacuum tubes with transistors, punch cards were
replaced with magnetic tape, and rotating magnetic drums were replaced by magnetic cores for internal
storage. Also during this time high-level programming languages were created such as FORTRAN and
COBOL. The third generation replaced transistors with integrated circuits, magnetic tape was used
throughout all computers, and magnetic core turned into metal oxide semiconductors. An actual operating
system showed up around this time along with the advanced programming language BASIC. The fourth and
latest generation brought in CPUs (central processing units) which contained memory, logic, and control
circuits all on a single chip. The personal comptuer was developed (Apple II). The graphical user interface
(GUI) was developed.

WHAT HAVE I LEARNED


-In this topic, I’ve learned the different stages that Information
and Communication technology passed through to come up
with today’s ICT. I’ve learned how technology improves year by
year.

The World Wide Web

 Web 1.0 or the read-only Web


 Web 2.0 or the read-and-write Web
 Web 3.0 or the semantic executing Web
Web 1.0
It is the “readable” phrase of the World Wide Web with flat data. In Web 1.0,
there is only limited interaction between sites and web users. Web 1.0 is simply an
information portal where users passively receive information without being given
the opportunity to post reviews, comments, and feedback.
Web 2.0
It is the “writable” phrase of the World Wide Web with interactive data. Unlike
Web 1.0, Web 2.0 facilitates interaction between web users and sites, so it allows
users to interact more freely with each other. Web 2.0 encourages participation,
collaboration, and information sharing. Examples of Web 2.0 applications are
Youtube, Wiki, Flickr, Facebook, and so on.
Web 3.0
It is the “executable” phrase of Word Wide Web with dynamic applications,
interactive services, and “machine-to-machine” interaction. Web 3.0 is a semantic
web which refers to the future. In Web 3.0, computers can interpret information
like humans and intelligently generate and distribute useful content tailored to the
needs of users. One example of Web 3.0 is Tivo, a digital video recorder. Its
recording program can search the web and read what it finds to you based on your
preferences.

WHAT HAVE I LEARNED


-The ideas that has been added to my knowledge is that the
web have 3 different types. I’ve learned the different purposes or
function of each type of web.

The Social Media

Social media are computer-mediated technologies that facilitate the creation and
sharing of information, ideas, career interests and other forms of expression
via virtual communities and network. The variety of stand-alone and built-in social
media services currently available introduces challenges of definition; however,
there are some common features
Research and Information Seeking
 Web search engines
 Research indexing sites
 Massive Online Open Course (MOOC) sites or tutorial sites
 Employment Web sites
 Electric commerce (e-commerce)
Web search engine is a software system that is designed to search for information on
the World Wide Web. The search results are generally presented in a line of results often
referred to as search engine results pages (SERPs). The information may be a mix of web
pages, images, and other types of files.
Search engine indexing collects, parses, and stores data to facilitate fast and
accurate information retrieval. Index design incorporates interdisciplinary concepts from
linguistics, cognitive psychology, mathematics, informatics, and computer science. An
alternate name for the process in the context of search engines designed to find web pages on
the Internet is web indexing.
Massive open online course (MOOC /muːk/) is an online course aimed at unlimited
participation and open access via the web.[1] In addition to traditional course materials such
as filmed lectures, readings, and problem sets, many MOOCs provide interactive user forums
to support community interactions among students, professors, and teaching assistants (TAs).
MOOCs are a recent and widely researched development in distance education which were
first introduced in 2006 and emerged as a popular mode of learning in 2012
Employment website is a website that deals specifically with employment or careers.
Many employment websites are designed to allow employers to post job requirements for a
position to be filled and are commonly known as job boards. Other employment sites offer
employer reviews, career and job-search advice, and describe different job descriptions or
employers. Through a job website a prospective employee can locate and fill out a job
application or submit resumes over the Internet for the advertised position.

E-commerce is a transaction of buying or selling online. Electronic commerce draws on


technologies such as mobile commerce, electronic funds transfer, supply chain
management, Internet marketing, online transaction processing, electronic data
interchange (EDI), inventory management systems, and automated data collection systems.
Modern electronic commerce typically uses the World Wide Web for at least one part of the
transaction's life cycle although it may also use other technologies such as e-mail.
Online Ethics and Etiquette
Netiquette is a combination of the words network and etiquette, and is defined as
a set of rules for acceptable online behavior. Similarly, online ethics focuses on the
acceptable use of online resources in an online social environment.

WHAT HAVE I LEARNED


-I learned the different etiquette that I should possess for my
own safeties in entering online world

Online Safety and Security


 Spam
 Phishing
 Malware
Spamming is the use of electronic messaging systems to send an unsolicited message (spam),
especially advertising, as well as sending messages repeatedly on the same site. While the
most widely recognized form of spam is email spam, the term is applied to similar abuses in
other media: instant messaging spam, Usenet newsgroup spam, Web search engine
spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging
spam, Internet forum spam, junk fax transmissions, social spam, spam mobile
apps,[1] television advertising and file sharing spam. It is named after Spam, a luncheon meat,
by way of a Monty Python sketch about a restaurant that has spam in every dish and where
patrons annoyingly shout spam over and over again.
Phishing is a form of fraud in which the attacker tries to learn information such as login
credentials or account information by masquerading as a reputable entity or person in email,
IM or other communication channels.
Malware, short for malicious software, is an umbrella term used to refer to a variety of forms
of hostile or intrusive software, including computer viruses, worms, trojan horses,
ransomware, spyware, adware, scareware, and other malicious programs.

WHAT HAVE I LEARNED


-Now, I know the different threats that I may encounter after I
learned about this topic. I should be more aware of them.
Government Provisions for Online Courtesy and Etiquette
 Republic Act 1067 or Anti-Bullying Act of 013
 Republic Act 10175 or Cybercrime Prevention of

Republic Act No. 1067, entitled “An Act Requiring All Elementary And
Secondary Schools To Adopt Policies To Prevent And Address The Acts Of Bullying
In Their Institutions” was signed by President Aquino, officially placing executive
imprimatur on the Bill passed by the 15th Congress.Also referred to as the “Anti-
Bullying Act of 2013”, the law defines the act of bullying as “any severe or
repeated use by one or more students of a written, verbal or electronic
expression, or a physical act or gesture, or any combination thereof” that is
“directed at another student.” Furthermore, such use must have the effect of
“actually causing or placing the latter in reasonable fear of physical or emotional
harm or damage to his property; creating a hostile environment at school for the
other student; infringing on the rights of the other student at school; or materially
and substantially disrupting the education process or the orderly operation of a
school.”
The Cybercrime Prevention Act of 2012, officially recorded as Republic
Act No.10175, is a law in the Philippines approved on September 12, 2012. ...
Among thecybercrime offenses included in the bill are cybersquatting, cybersex,
child pornography, identity theft, illegal access to data and libel.

WHAT HAVE I LEARNED


-I have learned the different republic act that may help me if I’m going
to encounter such cases.
MODULE 2: Productivity Tools: Application Techniques

Mail Merge
 Mail Merge Utilization

Mail merge is a process to create personalized letters and pre-addressed envelopes or


mailing labels for mass mailings from a form letter.[1] The feature is usually employed in
a word processing document which contains fixed text (which is the same in each output
document) and variables (which act as placeholders that are replaced by text from the data
source). The feature dates back to early word processors on personal computers, circa
1980. WordStar was perhaps the earliest to provide this, originally via an ancillary program
called Mail merge. WordPerfect also offered this capacity for CP/M and MS-DOS systems,
and Microsoft Word added it later on.[2]
The data source is typically a spreadsheet or a database which has a field or column for each
variable in the template. When the mail merge process is run, the word processing system
creates an output document for each row in the database, using the fixed text exactly as it
appears.
Hyperlink
Hyperlink, or simply a link, is a reference to data that the reader can directly follow either by clicking,
tapping, or hovering.[1] A hyperlink points to a whole document or to a specific element within a
document. Hypertext is text with hyperlinks. The text that is linked from is called anchor text. A software
system that is used for viewing and creating hypertext is a hypertext system, and to create a hyperlink is to
hyperlink (or simply to link). A user following hyperlinks is said to navigate or browse the hypertext.
The document containing a hyperlink is known as its source document. For example, in an online reference
work such as Wikipedia, many words and terms in the text are hyperlinked to definitions of those terms.
Hyperlinks are often used to implement reference mechanisms such as tables of
contents, footnotes, bibliographies, indexes, letters and glossaries.
In some hypertext hyperlinks can be bidirectional: they can be followed in two directions, so both ends act
as anchors and as targets. More complex arrangements exist, such as many-to-many links.

Hyperlink Utilization
 Hyperlinking in Word Processors
 Hyperlinking in Presentation
 Things and Animation in Presentation
Comparison: Mail Merge and Hyperlinking
The Mail Merge and the Hyperlinking tools are almost similar in that they
make it easier for you to retrieve and place important information or
sources. However, they do have their own strengthens and weaknesses.
Using the Mail Merge will enable you to create multiple pages that depend
on a dataset on a spreadsheet. This saves time in copy-pasting a template
with some parts constantly edited. Mail Merge can help you customize some
parts of the template by using the Rules option. This option enables you to
create a decision function based on the information supplied in the
spreadsheet.
MODULE 3: Visual Design: Imaging and Layout Design

Basic Principles of Graphics and Layout


 Lines
 Color
 Shapes
Principles of Design
The principles of design describe the ways that artists use the elements of art in a work
of art.

Balance is the distribution of the visual weight of objects, colors, texture, and space. If the
design was a scale, these elements should be balanced to make a design feel stable. In
symmetrical balance, the elements used on one side of the design are similar to those on the
other side; in asymmetrical balance, the sides are different but still look balanced. In radial
balance, the elements are arranged around a central point and may be similar.

Emphasis is the part of the design that catches the viewer’s attention. Usually the artist will
make one area stand out by contrasting it with other areas. The area could be different in size,
color, texture, shape, etc.

Movement is the path the viewer’s eye takes through the work of art, often to focal areas.
Such movement can be directed along lines, edges, shape, and color within the work of art.

Pattern is the repeating of an object or symbol all over the work of art. Repetition works with
pattern to make the work of art seem active.

The repetition of elements of design creates unity within the work of art.
Proportion is the feeling of unity created when all parts (sizes, amounts, or number) relate
well with each other. When drawing the human figure, proportion can refer to the size of the
head compared to the rest of the body.

Rhythm is created when one or more elements of design are used repeatedly to create a
feeling of organized movement. Rhythm creates a mood like music or dancing. To keep rhythm
exciting and active, variety is essential.

Variety is the use of several elements of design to hold the viewer’s attention and to guide
the viewer’s eye through and around the work of art.

Unity is the feeling of harmony between all parts of the work of art, which creates a sense of
completeness.
Image File Formats
 Joint Photographic Experts Group (JPEG or JPG)
 Tagged Image File Format (TIFF)
Image file formats are standardized means of organizing and storing digital
images. Image files are composed of digital data in one of these formats that can
be rasterized for use on a computer display or printer. An image file format may
store data in uncompressed, compressed, or vector formats. Once rasterized, an
image becomes a grid of pixels, each of which has a number of bits to designate its
color equal to the color depth of the device displaying it.
Image Manipulation
Photo manipulation involves transforming or altering a photograph using
various methods and techniques to achieve desired results. Some photo
manipulations are considered skillful artwork while others are frowned upon as
unethical practices, especially when used to deceive the public, such as that used
for political propaganda, or to make a product or person look better.
Depending on the application and intent, some photo manipulations are
considered an art form because it involves the creation of unique images and in
some instances, signature expressions of art by photographic artists. For
example, Ansel Adams employed some of the more common manipulations
using darkroom exposure techniques, such as burning (darkening) and dodging
(lightening) a photograph.[1][2] Other examples of photo manipulation include
retouching photographs using ink or paint, airbrushing, double exposure, piecing
photos or negatives together in the darkroom, scratching instant films, or through
the use of software-based manipulation tools applied to digital images. There are a
number of software applications available for digital image manipulation, ranging
from professional applications to very basic imaging software for casual users.

The Components of the GIMP


GIMP was originally released as the General Image Manipulation Program.[8] In 1995 Spencer
Kimball and Peter Mattis began developing GIMP as a semester-long project at the University
of California, Berkeley for the eXperimental Computing Facility. In 1996 GIMP (0.54) was
released as the first publicly available release.[9][10] In the following year Richard
Stallman visited UC Berkeley where Spencer Kimball and Peter Mattis asked if they could
change General to GNU (the name given to the operating system created by
Stallman).[11] Richard Stallman approved and the definition of the acronym GIMP was
changed to be the GNU Image Manipulation Program. This reflected its new existence as being
developed as Free Software as a part of the GNU Project
SketchUp
Sketchup, is a 3D modeling computer program for a wide range of drawing applications such
as architectural, interior design, landscape architecture, civil and mechanical engineering, film
and video game design. It is available as a freeware version, SketchUp Make, and a paid
version with additional functionality, SketchUp Pro.
SketchUp is owned by Trimble Inc.,[1][4] a mapping, surveying and navigation equipment
company.[5] There is an online library of free model assemblies (e.g. windows, doors,
automobiles), 3D Warehouse, to which users may contribute models. The program includes
drawing layout functionality, allows surface rendering in variable "styles", supports third-party
"plug-in" programs hosted on a site called Extension Warehouse to provide other capabilities
(e.g. near photo-realistic rendering) and enables placement of its models within Google Earth.

Online Image Hosting Web Sites


 Google+ Photos
 Flickr
 Smugmug
 Imgur
 500 px

WHAT HAVE I LEARNED


I learned how to evaluate existing websites and online
-

resources based on principles of layout, graphic, and visual


message design. I learned how to use image manipulation
techniques on existing images to change or to enhance current
state to communicate a message for a specific purpose. Now, I
know how to create an original or derivative ICT content to
effectively communicate visual message in an online environment
related to professional tracks

Vous aimerez peut-être aussi