Sei sulla pagina 1di 2

EMPOWERMENT TECHNOLOGIES

REVIEWER
ICT – technologies used for communicating
information. BASIC PRINCIPLES OF GRAPHICS AND
WEB 1.0 – Static or flat page websites. LAYOUT
WEB 2.0 – websites that allow interaction BALANCE visual weight is evenly distributed
between the user. on the screen.
WEB 3.0 – Websites that deliver web contents EMPHASIS part of design that appear
based on user preferences. different to attract viewer’s attention.
MOVEMENT guides the viewer’s eyes around
the screen.
TRENDS IN ICT PATTERN repeating visual element.
PROPORTION creates a sense of unity
Convergence – synergy of technological
where they relate with one another.
advancements to work on a similar goal or task.
VARIETY uses several design elements to
Social Media – websites that enable web users
draw a viewer’s attention.
to create, co-create, discuss, modify, and
exchange user-generated content.
Mobile Technologies – integrates the use of WEBSITE collection of related web pages.
operating systems in small devices that can be WEB DESIGN similar process of
brought and use anywhere. presenting content in electronic web pages so
Assistive Media – a nonprofit service designed that the users can navigate and access the
to help people who have visual or reading internet easily.
impairments.
TYPEFACE refers to font style.
DNS memorizable names for websites
F-PATTERN arranging contents left to right
INTERNET Information Superhighway and top to bottom.

COPYRIGHT FAIR USE DOMAIN NAME


LAW Owner’s Intellectual property .gov – government
right over his may be used without .com – commercial
work and anyone consent if it is for .org – organization
who uses it (how commentaries, .edu – education
and where it criticisms, search .net – network
should be used, engines, news .mil - military
etc.) reports, parodies,
and education.

INTERNET THREATS

MALWARE MALICIOUS SOFTWARE SPAM unwanted e-mail


VIRUS – designed to replicate and transfer from device to mostly from bots or
another via storage or the internet. advertisers.
WORM – uses the computer network to spread itself. PHISHING Acquiring
TROJAN – disguised as a useful program to get information. sensitive information by
SPYWARE – runs in background and monitors your activities. posing as a trustworthy
. ADWARE – designed to send advertisements through pop-ups.
website.
ICONS IN MS WORD TOOLS IN GIMP

SELECTION PAINT
ITALIC FORMAT PAINTER

BOLD TEXT HIGHLIGHT COLOR

UNDERLINE SUBSCRIPT

FONT COLOR SUPERSCRIPT

ICONS IN MS EXCEL
TRANSFORM

COLUMN BAR LINE

DOUGHNUT PIE FILL COLOR

ALL BORDERS CONDITIONAL FORMATTING OTHER

MERGE AND CENTER AUTOSUM


ICONS IN MS POWERPOINT

NEW SLIDE TEXTBOX HYPERLINK

RECORD SLIDE SLIDESHOW


FORMULA IN EXCEL

SUM =SUM(A1:A5) OR =SUM(A1,A5)


=A1 + A5
DIFFERENCE =A1 – A5
PRODUCT =A1 * A5
QUOTIENT =A1 / A5
AVERAGE =AVERAGE(A1:A5)
MINIMUM =MIN(A1:A5)
MAXIMUM =MAX(A1:A5)
CONDITION =IF (A1>=74.9, “PASSED”, “FAILED”)
CONCATENATE =CONCATENATE(A1, A2, A3)
=CONCATENATE (A1, “ “, A2, “ “, A3)

Potrebbero piacerti anche