Vous êtes sur la page 1sur 26

Empowerment Technologies

Connect - bring together or into contact so that a real or notional link is established.

Co-Create - working with one or more others software’s to get an output

Disclose - to give information, acknowledge, uncover or expose

Discover - to obtain sight or knowledge

UNIT 1 LESSON 1: INTRODUCTION TO ICT

ICT- Information and Communication-

It deals with the use of different communication technologies such as mobile phones, telephone,
Internet to locate, save, send and edit information

Is a study of computers as data processing tools. It introduces students to the fundamental of using
computer systems in an internet environment.

ICT in the Philippines

Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one of
which is BPO, Business Process Outsourcing, or call centers.

ICT Department in the Philippines is responsible for the planning, development and promotion of
the country’s information and communications technology (ICT) agenda in support of national
development.
Computer- an electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.

Internet- is the global system of interconnected computer networks that use the internet protocol suite
(TCIP/IP) to link billions of devices worldwide.

Means of connecting a computer to any other computer anywhere in the world via dedicated
routers and servers.

Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a network of
networks in which the users at any one computer can get information from any other computer.

World Wide Web

An information system on the internet that allows documents to be connected to other documents
by hypertext links, enabling the user to search for information by moving from one document to
another.

Is an information space where documents and other web resources are identified by URLs,
interlinked by hypertext links, and can be accessed via the Internet.

Invented by Tim-Berners Lee

Web Pages

Web page is a hypertext document connected to the World Wide Web. It is a document that
is suitable for the World Wide Web.

The different online platforms of World Wide Web:

1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web
pages connected by hyperlinks.

2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others.

– Allows users to interact with the page; instead of just reading the page, the user may be able to
comment or create user account.

3. Web 3.0 – this platform is all about semantic web.

– Aims to have machines (or servers) understand the user’s preferences to be able to deliver web
content.

Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and
cannot be manipulated by the user. The content is also the same for all users that is referred to as Web
1.0

Dynamic Web Pages- web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able
to see website differently than others e.g. social networking sites, wikis, video sharing sites.
FEATURES OF WEB 2.0

1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g.
tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.

2. Rich User Experience – content is dynamic and is responsive to user’s input

3. User Participation- The owner of the website is not the only one who is able to put content. Others
are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada,
Amazon.

4. Long Tail- services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in the
internet.

5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.

6. Mass Participation- diverse information sharing through universal web access. Web 2.0’s content is
based on people from various cultures.

TRENDS IN ICT

1. Convergence- is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now use your
smartphone.

2. Social Media- is a website, application, or online channel that enables web users web users to create ,
co-create, discuss modify, and exchange user generated content.
Six types of Social Media:

a) Social Networks - These are sites that allows you to connect with other people with the same
interests or background. Once the user creates his/her account, he/she can set up a profile, add people,
share content, etc

Example: Facebook and Google+

b) Bookmarking Sites - Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.

Ex. Stumble Upon, Pinterest

c) Social News – Sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be rank.

Ex. Reddit and Digg

d) Media Sharing – sites that allow you to upload and share media content like images,
music and video.

Ex. Flickr, YouTube and Instagram

e) Microblogging - focus on short updates from the user. Those that subscribed to the user will be
able to receive these updates.

Ex. Twitter and Plurk

f) Blogs and Forums - allow user to post their content. Other users are able to comment
on the said topic.

Ex. Blogger, WordPress and Tumblr


3. Mobile Technologies - The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices capability to do the tasks that were originally found in PCs.
Several of these devices are capable of using a high-speed internet. Today the latest model devices use
4G Networking (LTE), which is currently the fastest.

MOBILE OS

· iOS - use in apple devices such as iPhone and iPad

· Android - an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.

· Blackberry OS - use in blackberry devices

· Windows phone OS - A closed source and proprietary operating system developed by Microsoft.

· Symbian - the original smartphone OS. Used by Nokia devices

· WebOS- originally used in smartphone; now in smart TVs.

· Windows Mobile - developed by Microsoft for smartphones and pocket PCs

4. Assistive Media - is a non- profit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.

CLOUD COMPUTING

5. Cloud computing- distributed computing on internet or delivery of computing service over


the internet.

e.g. Yahoo!, Gmail, Hotmail

-Instead of running an e-mail program on your computer, you log in to a Web

e-mail account remotely. The software and storage for your account doesn’t exist

on your computer – it’s on the service’s computer cloud.


It has three components

1. Client computers – clients are the device that the end user interact with cloud.

2. Distributed Servers – Often servers are in geographically different places, but server acts as if they
are working next to each other.

3. Datacenters – It is collection of servers where application is placed and is accessed via Internet.

TYPES OF CLOUDS

PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public cloud
may be less secured because of its openness, e.g. e-mail

PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers increased
security because of its private nature.

COMMUNITY CLOUD allows systems and services to be accessible by group of organizations.

HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are performed
using private cloud while the non-critical activities are performed using public cloud.
UNIT 1 LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.

TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human

You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.

You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online just
like you can in real life.
You are still talking to a real person with feelings even though you can’t see them.

Rule no. 3: Know where you are in cyberspace.

Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.

Remember people have other things to do besides read your email. You are not the center of their
world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.

Be polite and pleasant to everyone.


Always check your spelling and grammar before posting.
· Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge

Ask questions online


Share what you know online.
Post the answers to your questions online because someone may have the same question you do.

Rule no. 7: Help keep flame wars under control

Netiquette does not forgive flaming.


Netiquette does however forbid people who are flaming to hurt discussion groups by putting the
group down.

Rule no. 8: Respect other people’s privacy.

Do not read other people’s mail without their permission.


Going through other people’s things could cost you, your job or you could even go to jail.
Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.

Do not take advantage of other people just because you have more knowledge or power than
them.
Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.

Do not point out mistakes to people online.


Remember that you were once the new kid on the block.
You still need to have a good manners even though you are online and cannot see the person
face to face.

Internet security

Security Requirement Triad

· Confidentiality
Data confidentiality
Privacy

· Integrity
Data integerity / System integrity

· Availability
Threat Consequence Threat Action ( Attack)

Unauthorized Disclosure Exposure: Sensitive data are directly released to an


unauthorized entity.
A circumstance or event whereby an
entity gains access to data for which the Interception: An unauthorized entity directly accesses
entity is not authorized. sensitive data traveling between authorized sources
and destinations.

Inference: A threat action whereby an unauthorized


entity indirectly accesses sensitive data by reasoning
from characteristics or byproducts of communications.

Intrusion: an unauthorized entity gains access to


sensitive data by circumventing a system's security
protections.

Disruption Incapacitation: prevents or interrupts system operation


by disabling a system component.
A circumstances or even that interrupts or
prevents the correct operation of system Corruption: Undesirably alters system operation by
services and functions. adversely modifying system functions or data.

Obstruction: A threat action that interrupts delivery of


system services by hindering system operation.
Deception
Masquerade: An unauthorized entity gains access to a
A circumstance or event that may result in
system or performs a malicious act by posing as an
an authorized entity receiving false data
authorized entity.
and believing it to be true.
Falsification: False data deceive an authorized entity.

Repudiation: An entity deceives another by falsely


denying responsibility for an act.

Usurpation Misappropriation: An entity assumes


unauthorized logical or physical control of a
A circumstances or event that results in
system resource.
control of system services or functions by
an unauthorized entity. Misuse: Causes a system component to perform a
function or service that is detrimental to system
security.
Types of System Intruders

1. Masquerader - pretend to be someone ..

2. Hackers - can refer to any skilled computer programmer, the term has become associated in popular
culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to
break into computer systems.

3. Clandestine user

Parts of Virus

1. Infection mechanism

2. Trigger

3. Payload

Virus stages

Dormant phase Virus is idle.

Propagation phase Virus places an identical copy of itself into other programs or into certain system
areas on the disk.

Triggering phase Virus is activated to perform the function for which it was
intended. Caused by a variety of system events

Execution phase Function is performed

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.

Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.

Malware- stands for malicious software.

Virus- a malicious program designed to transfer from one computer to another in any means possible.

Worms - a malicious program designed to replicate itself and transfer from one file folder to another
and also transfer to other computers.

Trojan - a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.

Spyware- a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.

Adware- a program designed to send you advertisement, mostly pop-ups.

Spam - unwanted email mostly from bots or advertisers.

Phishing - acquires sensitive personal information like passwords and credits card details.

Pharming - a more complicated way of phishing where it exploits the DNS system.
Copyright - a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.

Fair Use - means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.

Keyloggers - used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.

Rogue security softwares - is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.

UNIT 1 Lesson 3: Contextualized Online Search and Research Skills


Four search strategies on the WEB

Keyword searching

Enter terms to search

Use quotation marks to search as a phrase and keep the words linked together

Common words are ignored (That, to, which, a, the ...)

+ and – can be used to include or exclude a word

Boolean

AND - enter words connect with AND- it will include sites where both words and found

Uses: joining different topics (i.e. global warming AND California)

OR - requires at least one of the terms is found.

Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)

NOT - searches for the first term and excludes sites that have the second term.

(i.e. Washington NOT school)

Question

A question may be entered in the search field of search


engine Advanced

Features are offered on many engines by going to an "Advanced search" page and making selections.
Effective in narrowing search returns to a specific topic or phrase.
UNIT 1 Lesson 4: Developing ICT content for specific purposes)
TYPES OF PRODUCTIVITY TOOLS

WORD PROCESSING

Helps people to create attractive & effective business documents

· Provides an easy way to edit and enter text

Checks spelling and grammar

Can add graphics with ease

· Also known as a document preparation system

· A program where you can type and print documents

· Replaced old typewriters

APPLICATION AREAS OF WORD PROCESS

BUSINESS- Legal copies, letterheads, letters, memos circulars etc.

EDUCATION- to develop word processing skills from the very beginning

HOME- Dealing w/ assignments being completed at home or occasionally recreational

· ADVANTAGES · DISADVANTAGES

1. Faster 1. Equipment costs

2. Can edit documents 2. Upgrade software

3. Change font style, size, colour 3. Train staff

4. Change layout 4. More complicated

5. Print many copies 5. Virus, pop-up

6. Less noise

7. Add pictures

8. Make tables

9. Email documents

SPREADSHEETS

Allows users to analyze numeric and financial data


The ability to enter complex formulas and have the computer automatically calculate it.
Can be used to make graphs and charts
Provides a structured way to look at things (organizational tool)
PRESENTATION SOFTWARE

Ideal way to communicate ideas to a group of people


Used by businesses, students, researchers
Provides a speaker with a visual aid to guide a presentation

DATABASE SOFTWARE

Managing information has become the most valuable ability of a computer


Websites depend on databases to deliver important info to visitors
Can be used to track and analyze stocks and bonds
Analyze weather data to make forecasts

PERSONAL INFORMATION MANAGEMENT SOFTWARE

· Examples are Microsoft outlook and Google Calendar


Helps individuals organize themselves

Set-up to do lists
Manage contact lists
Act as an appointment calendar
MOBILE SOFTWARE

Apps made for smartphones


Allows people to manage calendars and receive emails while away from their desk
There is also web-delivered services
Popular ones are YouTube, Google Maps and FB

RICH INTERNET APPLICATIONS

Software that is available online, often for free


· Faster internet capabilities along with advancements with web technologies and cloud computing
gave rise to RIAs

SUITES

· Packages of productivity software


· Usually includes
Word processor
preadsheet
Presentation software
Personal info management software

COMPANIES offers Package of productive software

MICROSOFT OFFICE
Corel WordPerfect Office
IBM Lotus SmartSuite
Apple iWork
Sun Microsystems Star Office
OpenOffice.org
UNIT 1 Lesson 5: The principles and techniques of design using online
creation tools, platforms, and applications to develop ICT content for
specific professional tracks

MICROSOFT EXCEL FORMULAS AND FUNCTIONS

ARITHMETIC DEFINITION EXAMPLE OF USAGE MEANING

OPERATOR

+ Addition =B3+C3 Add the value in B3 and the


value in C3

Subtract 22 from the


- Subtract =F12-22
contents of cell F12

Multiply the value in cell A3


* Multiplication =A3*B3 by the value in cell B3

Divide the contents of cell


C3 by the contents of cell
/ Division =C3/C6

Raise the value in cell C12 to


the sixth power
^ Exponentiation =C12^6

COMMON FUNCTIONS/FORMULAS

· SUM Calculates the sum of a range of cells

· MAX Displays the largest value in a range of cells

· MIN Displays the smallest value in a range of cells

· COUNT Calculates the number of values in a range of cells

· AVERAGE Calculates the average of values in arrange of cells

MS WORD
UNIT 2 Lesson 6: The principles and techniques of design using online creation
tools, platforms, and applications to develop ICT content for specific
professional tracks
IMAGING & DESIGN FOR ONLINE ENVIRONMENT

PHOTO EDITING - Photo editing encompasses the processes of altering images, whether they are digital
photographs, traditional photo chemical photographs, or illustrations. Traditional analog image editing
is known as photo retouching, using tools such as an airbrush to modify photographs, or editing
illustrations with any traditional art medium.

Graphic software programs - Which can be broadly grouped into vector graphics editors, raster graphics
editors, and 3D modelers are the primary tools with which a user may manipulate, enhance, and
transform images. Many image editing programs are also used to render or create computer art from
scratch.

BASIC OF IMAGE EDITING

1. RASTER IMAGES are stored in a computer in the form of a grid of picture elements or pixels.
2. VECTOR IMAGES such as Adobe Illustrator, Inkscape and etc. are used to create and modify vector
images, which are stored as descriptions of lines, Bezier curves and text instead of pixels.

DIFFERENCE BETWEEN RASTER AND VECTOR IMAGES

· RASTER IMAGES use many colored pixels or individual building blocks to form a complete image JPEGs,
GIFs and PNGs are common raster image types. Almost all of the photos found on the web and in print
catalogs are raster images.
· VECTOR IMAGES alternatively, allow for more flexibility. Constructed using mathematical formulas
rather than individual colored blocks, vector file types such as EPS, AI and PDF are excellent for creating
graphics that frequently require resizing.

3. 3D MODELING (OR MODELLING) is the process of developing a mathematical representation of any


three dimensional surface of an object via specialized software. The product is called a 3D model. It can
be displayed as a two-dimensional image through a process called 3D rendering or used in a computer
simulation or physical phenomena. The model can also be physically created using 3D printing devices.
IMAGE FORMATS

JPEG is a commonly used method of lossy compression for digital images, particularly for those images
produced by a digital photography.
PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics file format that supports lossless data
compression.
GIF a lossless format for image files that supports both animated and static images.
BMP is a raster graphics image used to store bitmap digital images
EPS used in vector-based images in Adobe Illustrator.
SVG is an XML-based vector image format for two-dimensional graphics w/ support for interactivity and
animation

3ds- is one of the file formats used by the Autodesk 3Ds Max 3D Modelling, animation and rendering
software.
fbx- is an exchange format, in particular for interoperability between Autodesk products and other
digital content creation software

FEATURES OF IMAGE EDITORS

SELECTION One of the prerequisites for many of the app mentioned below is a method of selecting
part(s) of an image, thus applying a change selectively without affecting the entire picture

MARQUEE TOOL for selecting rectangular or other regular polygon-shaped regions

LASSO TOOL for freehand selection of a region

MAGIC WAND TOOL selects objects or regions in the image defined by proximity of color or luminance

LAYERS which are analogous to sheets of transparent acetate, stacked on top of each other, each
capable of being individually positioned, altered and blended with the layers below, w/o affecting any of
the elements on the other layers.

IMAGE SIZE resize images in a process often called image scaling, making them larger, or smaller. High
image resolution cameras can produce large images which are often reduced in size for Internet use.

CROPPING creates a new image by selecting a desired rectangular portion from the image being
cropped. The unwanted part of the image is discarded. Image cropping does not reduce the resolution
of the area cropped.
CLONING uses the current brush to copy from an image or pattern. It has many uses: one of the most
important is to repair problem areas in digital photos.

IMAGE ORIENTATION - Image editors are capable of altering an image to be rotated in any direction and
to any degree. Mirror images can be created and images can be horizontally flipped or vertically flopped.
Rotated image usually require cropping afterwards, in order to remove the resulting gaps at the image
edges.

PERSPECTIVE - is the art of drawing solid objects on a two- dimensional surface so as to give the right
impression of their height, width, depth and position in relation to each other when viewed from a
particular point.

SHARPENING AND SOFTENING – Sharpening makes images clearer. Too much sharpening causes grains
on the surface of the image. Softening makes images softer that removes some of the highly visible
flaws. Too much causes the image to blur.
SATURATION- is an expression for the relative bandwidth of the visible output from a light source. As
saturation increase, colors appear more “pure.’’ As saturation decreases, colors appear more ‘’ washed-
out.’’

CONTRAST AND BRIGHTENING


Contrast of images and brighten or darken the image. Underexposed images can be often be improved
by using this feature.
Brightening lightens the image so the photo brightens up. Brightness is a relative expression of the
intensity of the energy output of a visible light source.
Adjusting contrast means adjusting brightness because they work together to make a better image.

PHOTO MANIPULATION
Photo manipulation involves transforming or altering a photograph using various methods and
techniques to achieve desired results. Some photo manipulations are considered skillful artwork while
others are frowned upon as unethical practices, especially when used to deceive the public, such as hat
used for political propaganda , or to make a product or person look better.
DIFFERENCES

PHOTO EDITING – signifies the regular process used to enhance photos and to create them ‘’Actual
editing simple process’’. Also includes some of the regular programs used for editing and expose how to
use them.

PHOTO MANIPULATION – includes all simple editing techniques and have some manipulation techniques
like erasing, adding objects , adding some graphical effects, background correction, creating incredible
effect, change elements in an image, adding styles , eliminating blemishes from a person’s face and
changing the features of a person’s body.

PROJECT Infographics also known as data visualization, information design, and


communication design

· It is any graphic that display and explains information, whether that be data or words. When we
use the term ‘’infographics’’, we’re using it as a general term used to describe data presented in a visual
way.
· Infographics are important because they change the way people find and experience stories.
Infographics are being used to augment editorial content on the web, it create a new way of seeing the
world of data, and they help communicate complex ideas in a clear and beautiful way.

TYPES OF INFOGRAPHICS
1. Statistical

2. Process Flow

3. Geographic

PROCESS OF MAKING INFOGRAPHICS


1. Research
a) Know what is needed
b) Take a reference
c) Know the audience
d) Decide the type of infographics

2. Brainstorm
a) Gather ideas
b) Build thought process
3. Design
a) Choose your tool and start designing
4. Review
a) Cross check the data to deliver flawless output
5. Launch
a) Make it viral
b) Share on social network

BEST PRACTICES WHEN CREATING INFOGRAPHICS


a) Maintain a structure
b) Don’t use more than 3 color palletes
c) Typography matters a lot
d) Include source and references
UNIT 2 Lesson 7: Integrating ICT content through collaboration with classmate and teacher as both
peer and partner

BASIC PRINCIPLES OF WEB GRAPHICS AND LAY-OUT

 BALANCE- The visual weight of objects, textures, colors, and space is evenly distributed on the
screen.
 EMPHASIS - An area in the design that may appear different in size, texture, shape or color to
attract the viewer's attention.
 MOVEMENT - Visual elements guide the viewer's eyes around the screen.
 PATTERN AND REPETITION - These are the repeating visual element on an image or lay-out to
create unity in the lay-out or image.
 RHYTHM - is achieved when visual elements create a sense of organized movement.
 PROPORTION - Visual elements create a sense of unity where they relate well with one another.
 VARIETY - This uses several design elements to draw a viewer's attention.

BLOGGING ETHICS

 ACCOUNTABILITY - Authors must be accountable on whatever they write on their blogs.


Accountability means holding responsibilities to high standards of performance, the goal is to
produce the best content with our readers' interest in mind. They are, after all, the only reason
we write.
 ACCURACY - As a content creator, educator, news relayed, information slayer, your job as a
blogger is to give your readers the most accurate information - identifying your sources,
checking facts, never sacrificing accuracy and fairness for the sake of a "good" study. This
includes citing and attributing everything you've used, read and referenced when writing a post.
 INDEPENDENCE - means freedom from outside control or support, a blogger can write anything
he or she wants to share without having someone saying he/she must do.
 TONE - bloggers must write with their intended audience in mind. The key to successful blogging
is alignment of interests between writer and reader. It's that sweet spot where what's good for
your readers matches what's good for you. Don't focus on having a great blog. Focus on
producing a blog that's great for your readers.
UNIT 3 Lesson 8: Multimedia and ICT
Basic Web Page Creation

UNIT 3 Lesson 9: ICTs as platform for change


Web Portal- A web portal is a website that contains information from different sources
and places them in a one location in a uniform way. An example of a web portal is Google.

Top 10 Web Portals


MySpace
Baidu
Wikipedia
Blogger
MSN
Facebook
Youtube
Yahoo
Google

Portlet- Interactive elements that gives information to the user.

Online Collaboration- Simply put, online collaboration lets a group of people work together in real-time
over the internet

Web Conference- provides live audio/video communication between two or more locations to conduct
meetings, training, or presentations via the Internet.

The difference between Online Collaboration and Web conference is that Online collaboration is sharing
information to each other to come with a way to achieve the groups goal. While in Web Conference is
more like a meeting to discuss about a certain topic.

Encryption- additional layer of security that makes content unreadable for people with malicious
intent.

SSL( Secure Socket Layer )- is the standard security technology for establishing an encrypted link
between a web server and a browser.

Tips to have a successful collaboration tool


Easy to use
Have features that will fit your purpose
Ability to upload documents
Security Features
UNIT 3 Lesson 10 – How to work with peers and external publics/partners for the
development of an ICT project that advocates or mobilizes for a specific Social Change
or Cause

Interactive Multimedia
Rich content in the online environment

Multimedia and interactivity

POWERPOINT PRESENTATION (ANIMATION)

UNIT 4 Lesson 11-ICT as a Platform for Change (Summary)

ICT as a platform for social change came into effect in some of the following events in the Philippines:

 EDSA People Power Revolution (22-25 February 1986) - The People Power Revolution lasted
from 1983 to 1986. During a radio broadcast of Radyo Veritas, Cardinal Sin encouraged the
Filipinos to help end the regime of (then) President Ferdinand Marcos. A major protest took
place along EDSA from 22-25 February 1986, involving two million Filipinos from different
sectors.

EDSA People Power Revolution


Cardinal Jaime Sin

 EDSA Dos (17-21 January 2001) - Also known as the 2001 EDSA Revolution, this mass protest
was fueled after 11 prosecutors of (then) President Joseph Estrada walked out of the
impeachment trial. This revolution became successful through text brigades.

EDSA Dos (1)

EDSA Dos (2)

A Nokia phone used for text brigades

 Million People March (22-26 Aug 2013) - This is a series of protests that mainly took place in
Luneta Park. There were also several demonstrations that happened around key cities in the
Philippines and some overseas locations. This protest was to condemn the misuse of the Priority
Development Assistance Fund (PDAF). Though it was dubbed as the "Million People March", the
number of total attendees were only around 400,000. Social Media was used as a means of
spreading campaigns/goals intended to be achieved in this protest.
Million People March

Yolanda People Finder - A people finder database powered by Google, this was a means for people
searching for missing friends/relatives during the Typhoon Yolanda (Internationally known as Haiyan)
last November 2013.

Screenshot from Google People Finder

Change.org

Change.org is dubbed as the world's platform for change where anyone from the online community can
create a petition and ask others to sign it.

Change.org's mission is to help people from around the world to create the change they want to see. For
years, Change.org hosted several petitions that help solve the following problems: economic problems,
criminal injustice,. abuse of human rights, animal rights protection, and so on.
UNIT 4 Lesson 12: ICT PROJECT FOR SOCIAL CHANGE

In this Lesson, learned the meaning of concept paper .


Concept paper- is a document used to convince a panel of potential funders to help a product program
or device became a reality

Five Element
1. Introduction- includes your group mission and vision and a brief introduction
of your project
2.Purpose - includes the reasons why this project is worth.
3.Description- includes all the necessary information about the project
4.Support - Contain the budget needed for the project
5.Contact information- includes information on how the group can be contacted

UNIT 4 Lesson 13: Reflecting on the nature of ICT and the manner by which
the learning process has changed your worldview

FINAL OUTPUT MAKE A BLOG or FB PAGE


Using the five elements from Lesson 12

TOPIC
The nature of ICT and the manner by which the learning process has
changed your worldview

Vous aimerez peut-être aussi