MindMap Gallery Empowerment Technologies
This mind map is about Empowerment Technologies. Start to use a mind map to express and organize your ideas and knowledge right now.
Edited at 2020-09-29 07:27:18This mind map is about Wholesaling Blueprint - Steps to Wholesaling Real Estate + Simple Systems. Start to use a mind map to express and organize your ideas and knowledge right now.
This mind map is about Western Front. Start to use a mind map to express and organize your ideas and knowledge right now.
This mind map is about THE SAMPLING PROCESS. Start to use a mind map to express and organize your ideas and knowledge right now.
This mind map is about Wholesaling Blueprint - Steps to Wholesaling Real Estate + Simple Systems. Start to use a mind map to express and organize your ideas and knowledge right now.
This mind map is about Western Front. Start to use a mind map to express and organize your ideas and knowledge right now.
This mind map is about THE SAMPLING PROCESS. Start to use a mind map to express and organize your ideas and knowledge right now.
Empowerment Technologies
Mindmeister (mind mapping)
A mind map is a spider diagram that consists ofcentralized subjects
Mindmeister uses
Add child topics by pressing &+& or TAB
Type (ENTER) to add a sibling topic
Drag and drop topics according to theirsupposed positions
Create floating topics on child topics bypressing TAB
You can select a theme by changing font colorsand backgrounds of the topics
You can customize your own styles
You can add icons, pictures, and even files
You can create slides
You can add transitions
Effective Powerpoint Presentations
FONTS
32 is the minimum font
48 is better
No all caps
avoid text overload
Bullets
not more than 6
6 7 words per bullet
Capitalization must be monitored
Colors
Use dark font for light colored backgrounds andlight font for dark ones
Balance
Place graphics off center
more room for text
place graphics on left side
graphics
select good illustrations
every image has a reason
animated gifs should be discouraged
use graphs
10 20 30
10 slides
20 minutes presentation
30 is the minimum font
GIMP
It is a cross platform image editor available forGNU/linux,Osx, windows, and more operatingsystems
GNU Image Manipulation Program
File format
Joint Photographic Experts Group (JPEG)
Portable Network Graphics (PNG)
Graphics Interchange Format (GIF)
Tools used
Move tool
Pencil tool
text tool
scale tool
blend tool
rotate tool
export
duplicate layer
add layer
zoom tool
MS EXCEL
A computer program to create electronicspreadsheets
Relative cell reference
if the position of the cell that contains thereference changes, the reference itself ischanged.
Absolute cell reference
If the position of the cell that contains theformula changes, the absolute reference remainthe same
DATED IF FUNCTION
=DATESIF(START_DATE,END_DATE,&INTERVAL&)
SUM IF FUNCTION
=
=SUMIF(RANGE,CRITERIA,SUM_RANGE)
SUM IFS FUNCTION
=SUMIFS(SUM_RANGE,CRITERIA_RANGE1,CRITERIA1,...)
IF FUNCTION
=IF(LOGICALTEXT,VALUE IF TRUE, VALUE IFFALSE)
NOW()
TODAY()
Internet and Research
Research
The studious inquiry or examination accordingto Merriam Webster.
It is not just browsing the web but to expandcurrent knowledge.
Research is systematic
Identify the problem (spend sufficient time toknow what you are searching for)
Formulate the hypothesis (proposed solutionto the problem)
Start with your related literature (anything thatcontains information related to the problem)
How to improve gathering data?
Journals
Books
Internet
Understand articles by...
Skim and scan
How to use internet for research?
Refining search queries
use special characters to refine your search
(quotes) enclosing a search in quotation marksforces Google to search for the exact quotedphrase.
(wildcard) a placeholder for reserch
(tilde) Use to search synonymous words
(OR) searches alternatives
(range) use to search for values in between anupper and lower bound.
Synthesize and state your conclusion
State your conclusion if you have enoughinformation to answer your problem.
PRACTICE A LOT OF TIMES
Cite references
Use of APA format
Perspective is key
Cybercitizenship
Social Network
The online community poof people with thecommon interest with the use of the web
Sites that facilitates social network are callednetworking sites.
Creating an account
Full Name
User Name
Password
Choose a secure password
Do not use the same password as your otheronline accounts
Email Address
Personalizing your profile
Change your display picture
Change your cover photo
Change your profile information
Know what to share
Do not include sensitive information in yourprofile.
Birthday
Address
Home Number
Make sure your photos do not reveal sensitiveinfo as well.
Sending a friend request
You can send a request to those you want toconnect with.
Other users can send requests to you.
Be safe when sending requests
Only send requests you really know.
Only accept requests by people you really know
Be Vigilant
Everyone can create an account in a socialnetworking site.
A person might pretend as another person.
Keep this in mind when sending friend requests.
Wall/Timeline
Profile space where all content is posted.
Everyone has their own wall/timeline.
Posting on the wall
You can post on your own or other's wall
pics, links, and videos may be included in yourpost's attachment.
Newsfeed
Updates from friends
It may be controlled by privacy settings set bythe user.
Privacy settings on post
You can control who sees your posts.
You can create groups on your contacts list tomake this easier.
Privacy settings on wall
You can chose who can see your wall
Privacy is only for the post and not the content
You can tag photos or posts with other people
They can also tag you.
Privacy settings in tagging
Be aware of people tagging someone else whocan see the post.
Likes and comments
You can like a certain post
Further reactions of user are seen in thecomments section.
Comment responsibly
Chat
You can talk to your fellow your users through achat box.
Video call has been supported by it as well.
Stay safe with Chat
Twitter handle
Identifies you in the site
Tweet
Posts that limits until 140 characters only
Trends
The use of hashtags to indicate a certain trend.
Following people
Follow people to let their tweets appear yourtimeline.
Protecting tweets
You can set your tweets protected
Manage how people find you
Control how people will find you in the site.
Mentions
Use the @ sign to mention a person.
Retweeting
This is similar to &sharing& a post in Facebook.
Reply
You can &favorite& a tweet which is similar toliking a Facebook status.
Replying
Comment Responsibly
Microblogging nature
It is designed to encourage users to post shortmessages often.
You can turn off this feature.
Geolocation settings
Automatically indicate your location.
You can turn off this feature.
A social networking site that posts pictures.
You can &follow& people to see their pictures.
You can post photos or videos.
Use mobile app to capture picture or video.
Add captions
It is optional to add and tag people
Do not show photos and videos that showsensitive information.
Social Media Benefits
Drives participation of citizens to be active
Makes people content creators, managers, anddistributors.
Drives collaboration
Encourages people to explore and learn
Makes sharing of information andcommunication easy.
Helps develop key and real world skills.
RISKS
Identity theft
Someone can deliberate someone else's identity.
Avoid it!
Bullying/Harrassment
Cyberbullying
Cyber stalking
Denigration
Flaming
Harrassment
Impersonation
Exclusion
Outing
Trickery
How to deal with cyberbullying?
Screenshots of attacks
inform love ones and authorities
change numbers
deactivate accounts
report the account being used to bully people
Tarnished reputations
Maintain our own &personal brand& in theinternet.
GOLDEN RULE
There is no real &delete&
Once posted, always posted
Think twice before posting anything on socialmedia.
Account Hacking
Unauthorized person gains access to youraccount.
Avoid being hacked
Common Computer Problems andTroubleshooting Security
Cybercrime
Illegal acts in the web
Beware of the intruders
Hackers
People accessing networks illegally.
Crackers
People accessing networks illegally but has theintent to destroy data.
Script Kiddie
Prewritten hacking and cracking programs tobreak into computers.
Corporate spies
Hired to break into computers
Cyber extortionists
Uses email as a medium for extortion.
Cyber Terrorism
Uses internet to damage computers for politicalreasons.
Network Attacks
Virus altering computer works without user's knowledge
Worm programs copy itself
Trojan horse hides legitimate programs
Protect yourself
Protect your password
Avoid hardware theft by...
cable locks
password locks on laptops
synchronize photo storage
Software thefts
License agreements
Install software on one computer
renting of software is not allowed
distribution of software is not allowed
creation of multiple copies is not allowed
Computer problems
Being slow
not enough hard disk space
Not enough physical memory
delete unnecessary files to solve
MSCONFIG.EXE
disables a program on startup
Disk defragmenter
rearrange data blocks of files
Overheating
Strange noises on the computer
Printer is not working
Can't access to wifi
Slow net
Health concerns
Carpal tunnel syndrome
computer vision syndrome
Ergonomics and workplace design
ICT Trend
The Rise of Information Capitalism
Industrial Age
Knowledge Society
A View at the Information Society
Dematerialization
Before: Physical stores and product distribution
After: Virtual products (Books, Music, etc.)
Business Hours
Before: F2F Meetings
After: WFH
Media
Before: Information Dissemination
After: Netizen involvement and influence
Education
Before: Traditional Learning
After: Well Roundedness, E Learning
Social Relationships
Before: Traditional Courtships
After: Cyberlove
Medicine
Before: Hospital and F2F Professional Diagnosisand monitoring
After: Self Diagnosis, E Health
Datafy Now! Everything will be digital
Quicker decision support and automation
Real time delivery of data and increasinglyprocessed at the network edge
Everything on the Cloud!
Cost effectiveness
Wide geographical reach
Work anytime, anywhere
Mobility
Accessibility
&All in One& Convenience
Cybersecurity
Prevent intrusive and violation to privacy
&Before, during, and after& approach
Self Organizing Business Model Applications
Uber, Linkedln, AirBNB, Waze
Crowd sourcing
Network Reach
20 billion connected devices
Exponential growth of digital information
Video and Pervasive Screens
Watching whatever, wherever, whenever...
Video captures for message delivery,messaging, advertising, etc.
Smart cars, smart homes, smart appliances
The smaller, the more powerful
IT Experts Acquisitions
Non IT companies will acquire technologycompanies for analytics, innovations, and mainoperations
The Core Rules Of Netiquette
1) Remember the human
We have the free will to explore the net and wehave the responsibility to respect the people asnet users even if our life profile is hidden.
2) Adhere to the same standards of behavioronline that you follow in real life
It is important to be ethical inside the webbecause rules that we follow in real life are stillapplied in the net.
3) Know where you are in cyberspace
Check the unknown site you are visitingbecause any site can be illegal and it mightbring you as a user to danger.
4) Respect other people's time and bandwidth
Before copying people on your messages, askyourself whether if it is really important forthem to know about the information you areconveying.
5) Make yourself look good online
Do not give yourself a bad impression toeveryone because it will show how cruel theweb can be to new users without knowing thatsome sites are much friendlier than others.
6) Share expert knowledge
The world stay connected through the web toget to know each other very well. Questioningand answering people will show a goodimpression to your fellow users.
7) Help keep flame wars under control
Prevent the series of angry letters of usersbecause it destroys the camaraderie of adiscussion group.
8) Respect other people's privacy
Do not interfere with a user's profile since youhave no involvement.
9) Don't abuse your power
Your expertise in every office and system doesnot allow you to take advantage of other users.
10) Be forgiving of other people's mistakes
Allow your senses to forgive the web users whohave caused trouble through his/her mistakes inthe web.
MS WORD
Select Recipients
A list of people you intend to send letters
Mail merge
personalize bulk mail
Finish and Merge
Edit individual documents
Save = Ctrl + S
Paste = Ctrl + V
Bold = Ctrl + B
Italic = Ctrl + I
Underline = Ctrl + U
Current State of ICT
What is ICT
It means Information and CommunicationTechnology
It is the application of telecommunicationtechniques that enables society to create,collect, consolidate, communicate, and processinformation in multimedia.
According to UNESCO, it is “The scientific,technological and engineering disciplines andthe management
techniques used to handle and transmitinformation [between] men and
machines”.
According to Digital Video Technical Glossary, itis “The computing and communicationsfacilities and features that support
teaching, learning and a range of activities ineducation.”
The Impact of ICT to Society
It has allowed exchanging of informationanytime and anywhere in digital formats.
It gives the essential ingredient in developingnew ideas.
The development of communication systemsunderlies this topic.
It has linked up arts of the world.
ICT decreased the distance between the worldcloser to us.
The Impact of ICT in Scientific Exploration
It helps scientists able to invent new technologyfor terrestrial use or in space.
It finds new ways of communicating over vastdistances.
Powerful computers, satellites, and rockets areinventions with the influence of ICT that arecapable to send men in space withcommunication.
The Impact of ICT in the Military
To protect the arm from enemies with a goodnetwork of communication.
It plays a key role in developing and organizedmilitary force providing real time information.
The Impact of ICT in Economy
It brings strong economical structure in thefinancial growth of a country.
It handles the economic backbone whichstrengthens the economy by providing properknowledge about the economy of developedcountries.
The Impact of ICT in Recreation
It gives a number of recreational componentssuch as digital television, online or mobile radio,DVD, Blu-ray, Mp3, game consoles, mobilereading, and gaming devices.
The Impact of ICT in Transportation
It decreases the distance between places, savevaluable travel time, and has provided an easytransport.
It can narrow travelling shorter to get to thedestination swiftly.
The Impact of ICT in Knowledge Management
It makes processing knowledge anddisseminating easier to the others.
The Impact of ICT in Information Institution
It plays roles in library and other informationinstitutions with the possibility to...
Process information in digital format
networking and sharing information resourcesare possible
It saved library space by creating digital librarymaterials
Online access and file transfer in libraries
The Impact of ICT on User Communities
Influence community users in different ways
Increase level of technology literacy
Increase demand for better access toinformation
Aggravates discrepancies between poorinformation and rich information
Establish a balanced service for all user stages
It kept users updated by being provided withcurrent information
Skills are improved in using technologicalcomponents of the computer
Trends in ICT
In a nutshell
From your research...
Renewable enrgy
Artificial Intelligence
Modular or Wearable Devices and Gadgets
3D Printing
Wireless Connectivity
Virtual Reality and Immersion
Environmental Technology
Medical Technology
Security
Transportation
Drones
Video games
Big data
Holograms
Emotional Computing
Active Technoogy
Face Recognition and Applications
Voice Recognition and Applications
Artificial Intelligence
It is described as the science of makingcomputers do things that require humanintelligence
Neural Networks
Computational models inspired by an animal's central nervous system which is capable ofmachine learning
Expert Systems
A user interface
Allows a non expert user to query the expertsystem
A knowledge base
Collection of facts and rules
An inference engine
Acts rather like search engine that examinesknowledge base for information