Empowerment Technologies

Empowerment Technologies
Mindmeister (mind mapping)
A mind map is a spider diagram that consists of
centralized subjects
Mindmeister uses
Add child topics by pressing &+& or TAB
Type (ENTER) to add a sibling topic
Drag and drop topics according to their
supposed positions
Create floating topics on child topics by
pressing TAB
You can select a theme by changing font colors
and backgrounds of the topics
You can customize your own styles
You can add icons, pictures, and even files
You can create slides
You can add transitions
Effective Powerpoint Presentations
32 is the minimum font
48 is better
No all caps
avoid text overload
not more than 6
6 7 words per bullet
Capitalization must be monitored
Use dark font for light colored backgrounds and
light font for dark ones
Place graphics off center
more room for text
place graphics on left side
select good illustrations
every image has a reason
animated gifs should be discouraged
use graphs
10 20 30
10 slides
20 minutes presentation
30 is the minimum font
It  is a cross platform image editor available for
GNU/linux,Osx, windows, and more operating
GNU Image Manipulation Program
File format
Joint Photographic Experts Group (JPEG)
Portable Network Graphics (PNG)
Graphics Interchange Format (GIF)
Tools used
Move tool
Pencil tool
text tool
scale tool
blend tool
rotate tool
duplicate layer
add layer
zoom tool
A computer program to create electronic
Relative cell reference
if the position of the cell that contains the
reference changes, the reference itself is
Absolute cell reference
If the position of the cell that contains the
formula changes, the absolute reference remain
the same
Internet and Research
The studious inquiry or examination according
to Merriam Webster.
It is not just browsing the web but to expand
current knowledge.
Research is systematic
Identify the problem (spend sufficient time to
know what you are searching for)
Formulate the hypothesis (proposed solution
to the problem)
Start with your related literature (anything that
contains information related to the problem)
How to improve gathering data?
Understand articles by...
Skim and scan
How to use internet for research?
Refining search queries
use special characters to refine your search
(quotes) enclosing a search in quotation marks
forces Google to search for the exact quoted
(wildcard) a placeholder for reserch
(tilde) Use to search synonymous words
(OR) searches alternatives
(range) use to search for values in between an
upper and lower bound.
Synthesize and state your conclusion
State your conclusion if you have enough
information to answer your problem.
Cite references
Use of APA format
Perspective is key
Social Network
The online community poof people with the
common interest with the use of the web
Sites that facilitates social network are called
networking sites.
Creating an account
Full Name
User Name
Choose a secure password
Do not use the same password as your other
online accounts
Email Address
Personalizing your profile
Change your display picture
Change your cover photo
Change your profile information
Know what to share
Do not include sensitive information in your
Home Number
Make sure your photos do not reveal sensitive
info as well.
Sending a friend request
You can send a request to those you want to
connect with.
Other users can send requests to you.
Be safe when sending requests
Only send requests you really know.
Only accept requests by people you really know
Be Vigilant
Everyone can create an account in a social
networking site.
A person might pretend as another person.
Keep this in mind when sending friend requests.
Profile space where all content is posted.
Everyone has their own wall/timeline.
Posting on the wall
You can post on your own or other's wall
pics, links, and videos may be included in your
post's attachment.
Updates from friends
It may be controlled by privacy settings set by
the user.
Privacy settings on post
You can control who sees your posts.
You can create groups on your contacts list to
make this easier.
Privacy settings on wall
You can chose who can see your wall
Privacy is only for the post and not the content
You can tag photos or posts with other people
They can also tag you.
Privacy settings in tagging
Be aware of people tagging someone else who
can see the post.
Likes and comments
You can like a certain post
Further reactions of user are seen in the
comments section.
Comment responsibly
You can talk to your fellow your users through a
chat box.
Video call has been supported by it as well.
Stay safe with Chat
Twitter handle
Identifies you in the site
Posts that limits until 140 characters only
The use of hashtags to indicate a certain trend.
Following people
Follow people to let their tweets appear your
Protecting tweets
You can set your tweets protected
Manage how people find you
Control how people will find you in the site.
Use the @ sign to mention a person.
This is similar to &sharing& a post in Facebook.
You can &favorite& a tweet which is similar to
liking a Facebook status.
Comment Responsibly
Microblogging nature
It is designed to encourage users to post short
messages often.
You can turn off this feature.
Geolocation settings
Automatically indicate your location.
You can turn off this feature.
A social networking site that posts pictures.
You can &follow& people to see their pictures.
You can post photos or videos.
Use mobile app to capture picture or video.
Add captions
It is optional to add and tag people
Do not show photos and videos that show
sensitive information.
Social Media Benefits
Drives participation of citizens to be active
Makes people content creators, managers, and
Drives collaboration
Encourages people to explore and learn
Makes sharing of information and
communication easy.
Helps develop key and real world skills.
Identity theft
Someone can deliberate someone else's
Avoid it!
Cyber stalking
How to deal with cyberbullying?
Screenshots of attacks
inform love ones and authorities
change numbers
deactivate accounts
report the account being used to bully people
Tarnished reputations
Maintain our own &personal brand& in the
There is no real &delete&
Once posted, always posted
Think twice before posting anything on social
Account Hacking
Unauthorized person gains access to your
Avoid being hacked
Common Computer Problems and
Troubleshooting Security
Illegal acts in the web
Beware of the intruders
People accessing networks illegally.
People accessing networks illegally but has the
intent to destroy data.
Script Kiddie
Prewritten hacking and cracking programs to
break into computers.
Corporate spies
Hired to break into computers
Cyber extortionists
Uses email as a medium for extortion.
Cyber Terrorism
Uses internet to damage computers for political
Network Attacks
Virus altering computer works without user's
Worm programs copy itself
Trojan horse hides legitimate programs
Protect yourself
Protect your password
Avoid hardware theft by...
cable locks
password locks on laptops
synchronize photo storage
Software thefts
License agreements
Install software on one computer
renting of software is not allowed
distribution of  software is not allowed
creation of multiple copies is not allowed
Computer problems
Being slow
not enough hard disk space
Not enough physical memory
delete unnecessary files to solve
disables a program on startup
Disk defragmenter
rearrange data blocks of files
Strange noises on the computer
Printer is not working
Can't access to wifi
Slow net
Health concerns
Carpal tunnel syndrome
computer vision syndrome
Ergonomics and workplace design
ICT Trend
The Rise of Information Capitalism
Industrial Age
Knowledge Society
A View at the Information Society
Before: Physical stores and product distribution
After: Virtual products (Books, Music, etc.)
Business Hours
Before: F2F Meetings
After: WFH
Before: Information Dissemination
After: Netizen involvement and influence
Before: Traditional Learning
After: Well Roundedness, E Learning
Social Relationships
Before: Traditional Courtships
After: Cyberlove
Before: Hospital and F2F Professional Diagnosis
and monitoring
After: Self Diagnosis, E Health
Datafy Now! Everything will be digital
Quicker decision support and automation
Real time delivery of data and increasingly
processed at the network edge
Everything on the Cloud!
Cost effectiveness
Wide geographical reach
Work anytime, anywhere
&All in One& Convenience
Prevent intrusive and violation to privacy
&Before, during, and after& approach
Self Organizing Business Model Applications
Uber, Linkedln, AirBNB, Waze
Crowd sourcing
Network Reach
20 billion connected devices
Exponential growth of digital information
Video and Pervasive Screens
Watching whatever, wherever, whenever...
Video captures for message delivery,
messaging, advertising, etc.
Smart cars, smart homes, smart appliances
The smaller, the more powerful
IT Experts Acquisitions
Non IT companies will acquire technology
companies for analytics, innovations, and main
The Core Rules Of Netiquette
1) Remember the human
We have the free will to explore the net and we
have the responsibility to respect the people as
net users even if our life profile is hidden.
2) Adhere to the same standards of behavior
online that you follow in real life
It is important to be ethical inside the web
because rules that we follow in real life are still
applied in the net.
3) Know where you are in cyberspace
Check the unknown site you are visiting
because any site can be illegal and it might
bring you as a user to danger.
4) Respect other people's time and bandwidth
Before copying people on your messages, ask
yourself whether if it is really important for
them to know about the information you are
5) Make yourself look good online
Do not give yourself a bad impression to
everyone because it will show how cruel the
web can be to new users without knowing that
some sites are much friendlier than others.
6) Share expert knowledge
The world stay connected through the web to
get to know each other very well. Questioning
and answering people will show a good
impression to your fellow users.
7) Help keep flame wars under control
Prevent the series of angry letters of users
because it destroys the camaraderie of a
discussion group.
8) Respect other people's privacy
Do not interfere with a user's profile since you
have no involvement.
9) Don't abuse your power
Your expertise in every office and system does
not allow you to take advantage of other users.
10) Be forgiving of other people's mistakes
Allow your senses to forgive the web users who
have caused trouble through his/her mistakes in
the web.
Select Recipients
A list of people you intend to send letters
Mail merge
personalize bulk mail
Finish and Merge
Edit individual documents
Save = Ctrl + S
Paste = Ctrl + V
Bold = Ctrl + B
Italic = Ctrl + I
Underline = Ctrl + U
Current State of ICT
What is ICT
It means Information and Communication
It is the application of telecommunication
techniques that enables society to create,
collect, consolidate, communicate, and process
information in multimedia.
According to UNESCO, it is “The scientific,
technological and engineering disciplines and
the management
techniques used to handle and transmit
information [between] men and
According to Digital Video Technical Glossary, it
is “The computing and communications
facilities and features that support
teaching, learning and a range of activities in
The Impact of ICT to Society
It has allowed exchanging of information
anytime and anywhere in digital formats.
It gives the essential ingredient in developing
new ideas.
The development of communication systems
underlies this topic.
It has linked up arts of the world.
ICT decreased the distance between the world
closer to us.
The Impact of ICT in Scientific Exploration
It helps scientists able to invent new technology
for terrestrial use or in space.
It finds new ways of communicating over vast
Powerful computers, satellites, and rockets are
inventions with the influence of ICT that are
capable to send men in space with
The Impact of ICT in the Military
To protect the arm from enemies with a  good
network of communication.
It plays a key role in developing and organized
military force providing real time information.
The Impact of ICT in Economy
It brings strong economical structure in the
financial  growth of a country.
It handles the economic backbone which
strengthens the economy by providing proper
knowledge about the economy of developed
The Impact of ICT in Recreation
It gives a number of recreational components
such as digital television, online or mobile radio,
DVD, Blu-ray, Mp3, game consoles, mobile
reading, and gaming devices.
The Impact of ICT in Transportation
It decreases the distance between places, save
valuable travel time, and has provided an easy
It can narrow travelling shorter to get to the
destination swiftly.
The Impact of ICT in Knowledge Management
It makes processing knowledge and
disseminating easier to the others.
The Impact of ICT in Information Institution
It plays roles in library and other information
institutions with the possibility to...
Process information in digital format
networking and sharing information resources
are possible
It saved library space by creating digital library
Online access and file transfer in libraries
The Impact of ICT on User Communities
Influence community users in different ways
Increase level of technology literacy
Increase demand for better access to
Aggravates discrepancies between poor
information and rich information
Establish a balanced service for all user stages
It kept users updated by being provided with
current information
Skills are improved in using technological
components of the computer
Trends in ICT
In a nutshell
From your research...
Renewable enrgy
Artificial Intelligence
Modular or Wearable Devices and Gadgets
3D Printing
Wireless Connectivity
Virtual Reality and Immersion
Environmental Technology
Medical Technology
Video games
Big data
Emotional Computing
Active Technoogy
Face Recognition and Applications
Voice Recognition and Applications
Artificial Intelligence
It is described as the science of making
computers do things that require human
Neural Networks
Computational models inspired by an animal's
central nervous system which is capable of
machine learning
Expert Systems
A user interface
Allows a non expert user to query the expert
A knowledge base
Collection of facts and rules
An inference engine
Acts rather like search engine that examines
knowledge base for information