KEMBAR78
Com 111 Midterm Lecture | PDF | Hyperlink | World Wide Web
0% found this document useful (0 votes)
39 views38 pages

Com 111 Midterm Lecture

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views38 pages

Com 111 Midterm Lecture

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

COM 111

(EMPOWERMENT TECHNOLOGIES)
S.Y. 2024 - 2025

A. Interactive Lecture (Focus Instruction- “I Do”)


Topic: THE CURRENT STATE OF ICT TECHNOLOGIES, ONLINE SYSTEM, FUNCTION
AND PLATFORM

What is Information?

What is communication?

What is Technology?

Information and Communication Technology (ICT)

ICT collectively refers to the technologies, both hardware and software, that enable humans to
communicate with one another. It deals with the use of technologies such as mobile phones,
telephone, and internet to locate, save, send and edit information.

1|Page
What is computer?

Computer – an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program.

WHAT IS INTERNET?

Internet – is the global system of interconnected computer networks that use the internet
protocol suite (TCIP/IP) to link billions of devices nationwide.

WHAT IS WORLD WIDE WEB or (WWW)

The World Wide Web (WWW) is the system that enables you to access hypertext documents
and other files over the internet. The technology was proposed by Tim Berners-Lee in 1989, in
which a database and interface will be implemented to associate links in readable documents.
In the previous system, documents are numbered with addresses that should be inputted to
retrieve the file.

Web Pages – is a hypertext document connected to the World Wide Web. It is a document that
is suitable for the World Wide Web.

2|Page
Static Web page – is known as a flat page or stationary age in the sense that the page is ―as
is‖ and cannot be manipulated by the user.

Dynamic Web page – web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The
user is able to see web site differently than others e.g. social networking sites.
The different Online Platforms of World Wide Web:

1. Web 1.0 or Read-Only Web – refers to the first stage in the World Wide Web, which was
entirely made up of the Web pages connected by hyperlinks.

2. Web 2.0 or Read-and-Write Web – is the evolution of Web 1.0 by adding dynamic pages.
The user is able to see a web site differently than others.

Features of Web 2.0


1. Folksonomy

2. Rich User Experience

3|Page
3. User Participation

4. Long Tail

5. Software as a services

6. Mass participation

3. Web 3.0 or Semantic Executing Web – aims to have machines (or servers) understand the
user‘s preferences to be able to deliver Web content.

4|Page
Trends in ICT

1. Convergence – is the synergy of technological advancements to work on a similar goal


or task.

2. Social Media – the information can be in the form of ideas, pictures, videos, or anything
that you want to create and share will to the virtual communities. The information you
share will be the basis of the people to interact, share content and collaborate with you
and the large group of people.

5|Page
TYPES OF SOCIAL MEDIA :

a. Social Networks – these are the sites that allows you to connect with other people with the
same interest or background.
E.g. Facebook and Google+

b. Bookmarking Sites – sites that allow you to store and manage links to various website and
resources. E.g. Pinterest

c. Social News – sites that allows the users to post their own news items or links to other news
sources. E.g. Reddit and Digg

d. Media Sharing – sites that allow you to upload and share media content like images, music,
and video. E.g. Flickr, YouTube, and Instagram.

6|Page
e. Microblogging – focus on the short updates from the user.
E.g. Twitter and Plurk

f. Blogs and Forums – allow user to post their content.


E.g. Blogger, WordPress and Tumblr.

3. Mobile Technologies – the popularity of smartphones and tablets has taken a major rise
over the years. This is largely because of the devices capability to do the tasks that were
originally found in PCs.

Mobile OS (OPERATING SYSTEM)

OS is the program that, after being initially loaded into the computer by a boot program,
manages all of the other application program in a computer.

 iOS – use in apple devices such as iPhone and iPad

7|Page
 Android – an open source OS developed by Google.

 Blackberry OS – use the blackberry devices

 Windows phone OS – a closed source and proprietary operating system developed by


Microsoft.

 Symbiam – the original smartphone OS. Used by Nokia


devices

 webOs – originally used in smartphone: now in smart TVs.

 Window Mobile – developed by Microsoft for smartphones and pocket


PCs.

4. Assistive Media – is a non-profit service designed to help people who have visual and
reading impairments.

5. Yahoo!, Gmail, HotmailCloud computing – distributed computing on internet or delivery


of computing service over the internet.

8|Page
Three (3) Components:

1. Client computers – clients are the devices that the end user interact with cloud.

2. Distributed servers – often servers are geographically different places, but servers acts as if
they are working next to each other.

3. Datacenters – it is collection of servers where application is placed and is accessed via


internet.

Content Management System (CMS) – allows one to publish, edit and manipulate, organize and
delete web content. It is commonly used in blogs, news websites, and online shopping.

Cloud Computing – is the delivery of computing services – servers, storage, database,


networking, software, analytics and more – over the internet.

Cloud Storage – is a service wherein files from users are stored online. The files are uploaded
by users and are received by a storage that hosts the service. Physical multiple storage devices
save the files that are uploaded and are waiting to be retrieve on the Web site.

9|Page
Types of Clouds

1. Public Cloud – allows systems and services to be easily accessible to the general public.
2. Private Cloud – allows systems and services to be accessible within an organization.
3. Community Cloud – allows systems and services to be accessible by group of organizations.
4. Hybrid Cloud – is a mixture of public and private cloud.

Platforms
refers to the program created by developers that can be modified or reprogrammed by
outside users. Because of the development of different platforms and APIs, the convenience of
using online tools becomes popular. The inherent characteristic of online tools introduced
convenience and probability of developing contents even on-the-go. Furthermore, the content
being developed is stored in safe storage of a server that can be remotely accessed using
security provisions such as username and password.

Online Platforms is a based on technologies designed to run within an online environment and
provides interactive online services. Online platforms nowadays offer varied services which you
can use to develop your own ICT content. These online platforms currently include, but are not
limited to: presentation or visualization, cloud computing, social media, web page creation, file
management, and mapping.

Nature of Online Platform

The nature of online platforms introduced herein is categorized based from the services they
provide.

 Presentation or Visualization – this is an online platform that allows you to present and share
presentation, infographics, and videos with other people.

 Cloud Computing – this is a platform often referred to simply as ―The Cloud. In other words,
instead of using your computer‘s hard drive, you store and access your data and programs over
the internet.

 Google Drive – it is a cloud storage created by Google. It allows users to backup files in the
cloud, share files with collaborations, and access them anywhere. These files can either be
documents, spread sheets, and presentations. Google Drive includes Google Docs, Sheets and
Slides, an office suit that permits collaborative editing to documents, spread sheets,
presentations, drawing, forms, and more.

 Web Page Creation – this is an online platform that lets you build a web page that includes
colours, text, image, and often contain links to media such as video and audio. The platform
does not require any Web programming skill as they provide a drag and drop interface and free
hosting as well.

 File Management – this is an online platform that allows you to convert and manages files like
images, videos, documents, audio and more to other formats without downloading software tool.

10 | P a g e
 Mapping – this is an online platform that provides detailed information about geographical
regions and sites around the world. It allows for embedding of maps into proprietary sites.

The Application Programming Interface (API) is a set of programming protocol or rules on how
software elements should communicate and interact with one another.

API types and their functions are presented here:


1. Access API – this is type of API runs in a remote machine, server, or computer, and the
application is accessed remotely by a guest user application to draw data and services.

2. Plug-in API – most of the time, this API is used in the user end. Generally, different
developers create different applications that can be integrated or ―plugged in‖ to core
application and/or the GUI of these applications.

4. Runtime Environment – these APIs are platform for developing different applications,
wherein programs and application codes are evaluated and compiled in the said APIs.

11 | P a g e
TOPIC : ONLINE SECURITY AND ETIQUETTE

Each individual when accessing the World Wide Web is concerned with the safety of his or her
terminal or computer and the information that will be transmitted or received. Here are a number
of threats that can be acquired from connecting to World Wide Web.

1. Spam – the fact that most of our emails accounts came with a spam or junk folder
insinuates that spam emails are a huge issue, with more than 50% of emails being
siphoned into these folders. Aside from being an annoyance, spam emails are not a
direct threat. However, many can contain malware.

2. Adware – it is a type of malware software that displays unwanted ads when a user is
surfing the internet. The ads often redirect your searches to advertising websites and
collect marketing-type data about your back, which is considered malicious.

3. Trojan – it leave your computer completely unprotected, which can mean that hackers
can steal any data from your system. Trojans often present themselves as harmless
computer programmes so that hackers can penetrate your computer without being
detected.

4. Virus – one of the most talked about internet threats is a virus. Viruses usually attach
themselves covertly to downloads as they are designed to spread at an alarming rate.
Viruses are often attached to files for download, shared via CDs, DVDs, and USB sticks,
or loaded on to computers by opening infected email attachments.

5. Worms – usually make their way on to a computer via a malicious email attachment or
USB stick. Once your computer has been infected by a worm, it will likely send itself to
every email address logged in your system. To the receiver, your email will appear
harmless, until they open it and are infected by the same worm.

12 | P a g e
6. Phishing – in its simplest terms, phishing is a form of fraudulent activity. More often than
not, official-looking emails are sent impersonating a well-known provider, such as a
bank. These emails are sent to acquire people‘s passwords and credit card details.

7. Spyware – another form of malware is spyware. Spyware is an all-encompassing


internet nasty and is usually attached to pop-ups of downloadable files. Once installed
on your computer, spyware can monitor your keystrokes, and read and delete your files,
reformat your hard drive, and access your applications. Whoever is controlling the
spyware has access to your personal details without you even knowing.

8. Keyloggers - similar to a part of spyware, Keyloggers record a user‘s keyboard actions.


Most Keyloggers will be looking for distinguishable key entries, such as bank card details
and passwords. Keylogging is often linked to identity and intellectual property theft.

9. Pharming – is more complex version of phishing that exploits the DNS system. Pharmers
often create web pages mimicking that of a trustworthy business, such as online banking
log-in page. Users will then enter their details, thinking they are logging in to their usual
service, and their details will be stolen by the pharmer.

13 | P a g e
10. Rogue Security Software – if you are ever downloading antivirus or antispyware
programmes, make sure you have purchased it from legitimate source. Rouge security
software will often ask you to pay for extra protection, which is a huge con. The security
software is completely useless and criminals have robbed you of your money.

Protecting you on the internet:


1. Do not post anything that you do not want public.
2. Minimize posting information that can identify you or your location.
3. Do not share passwords with other people.
4. Create strong passwords. And avoid using the same password everywhere. If someone
steals this information, they may use this against you.
5. There are plenty of scams on the internet. Protect yourself from fraudulent offers, such as
fake job advertisements, emails claiming that you won a lottery or request from distant strangers
to transfer funds. Be careful with links, photos and videos that are sent to you, even if they are
from people you know. Clarify with them first before opening the content.
6. How do you know if website is safe? Signs of safe websites include having ―https‖ as the
start of the website address and a lock image beside the website name. When you see https
instead of ―http‖, it means the session is secure and encrypted.

Authenticity Verification of Information from the Web, the inherited property of Web 2.0 and its
later version give viewers the privilege to influence content or give anyone the freedom to
publish his or her own web sites regardless of the content. There are no standards governing
content publishing on the World Wide Web to ensure the correctness of information, but there
are ways on how to verify if the information is trustworthy or legitimate.
1. Published author’s name
2. Credible Web sites
3. Rating, number of viewers, and number of shares
4. Reference and related articles

Government Provision for Online Courtesy and Etiquette

The Philippine government ensures the welfare of its people in their ICT experience by enacting
various laws and regulations. Laws that aim to protect the people from these illegal activities
were presented.

1. Republic Act 10627 or Anti-Bullying Act of 2013 – this law includes protections of individuals
from bullying through electronic means. Bullying invades an individual‘s privacy by using photos
and other information meant to disgrace that individual.

2. Republic Act 10175 or Cybercrime Prevention Act of 2012 – this law protects an individual
from various unwanted online and cyber acts that may harm or evade one‘s privacy and
integrity.

Online Ethics and Etiquette

14 | P a g e
The term ―netiquette is a coined portmanteau term of network and etiquette. The term
―netizen refers to the person who is a member or a part of the online community. Hence is a
set of ideal rules and conduct that a netizen should observe in communicating and/or publishing
information and materials over the World Wide Web and in ICT in general.

TEN RULES OF NETIQUETTE


Rule No. 1 Remember the human
Rule No. 2 Adhere to the same standards online that you follow in real life
Rule No. 3 Know where you are in cyberspace
Rule No. 4 Respect other people‘s time and bandwidth
Rule No. 5 Make yourself look good online
Rule No. 6 Share expert knowledge
Rule No. 7 Help keep flame wars under control
Rule No. 8 Respect other people‘s privacy
Rule No. 9 Do not abuse your power
Rule No. 10 Be forgiving of other people‘s mistake

The rules of conduct in the Web vary from one community to another. However, there are some
key points to keep in mind to maintain a good conduct over the internet.
 Recognize that your cyber avatar, or your online presentation, is not another world but an
extension of your personality and an extension of the existing society that you are part of.
 You should apply the values and conduct learnt since childhood in the online extension of our
society.  Keep in mind that there are laws existing in our society and on the web. Remember
that there are punishments laid by the government, not for the sake of punishing, but for peace
and order among the citizens.
 Keep in mind that there are differences among the individuals you will interact with and
individuals who will read your published contents. Be sensitive with their beliefs, culture, and
religions.
 Everything published on the World Wide Web should be considered as copyrighted or owned
by another individual.
 In sending correspondence in either e-mail or chat, be careful in selecting words to
communicate. As much as possible, use the appropriate manner of communication and avoid
threatening and disrespectful words.

15 | P a g e
TOPIC: REASEARCH AND SEEKING INFORMATON

A. Interactive Lecture (Focus Instruction- “I Do”)

There are number of information source over the internet, some of which are presented below:

 Web Search Engines – these are programs designed to search or mine the World Wide Web
based on the keywords provided by the users.

 Research Indexing Sites – these are the websites dedicated to compile and index researches
done by academic researchers, engineers, and social scientists, and so on.

 Massive Online Open Course (MOOC) sites or tutorial sites – these are the websites
dedicated to teach and inform users focused different areas. The delivery of information is
similar to a classroom lecture setup, wherein lectures and assignments are delivered and
submitted, respectively online.

 Employment Web sites – these are the web sites that enable companies to post job vacancies
and also accommodate job seekers by providing a resume-submission facility.

 Electronic commerce (e-commerce) – this is a technology that uses electronic means to trade
products and currencies. It also includes any technology that introduces case in business
management and customer convenience.

The following is a set of tips to help you build smart search skills, as adapted from Common
Sense Media.

A. Find the Hidden Calculator


B. Definitions and More

16 | P a g e
C. Age-Appropriate Results
D. Time-Zone Challenged
E. The Perfect Search
F. Photo Magic
G. Just for fun

Citing Your Sources


Every time you use information from the internet or any print source, you must give credit to the
author otherwise, you risk being charged of plagiarism.

Four Search Strategies


 Keyword searching – enter terms to search. Use quotation marks to search as a phrase and
keep the words are ignored (That, to, which, a, the …) +and can be used to include or exclude a
word
 Boolean AND – enter words connect with AND- it will include sites where both words and
found OR – requires at least one of the terms is found NOT – searches for the first term and
excludes sites that have the second term.
 Question – a question may be entered in the search field of search engine
 Advance – features are offered on many engines going to an ―Advance search‖ page and
making selections.

Plagiarism
means to steal and pass off (the ideas or words of another) as one‘s own, to use (another‘s
production) without crediting the source, to commit literary theft, to present as new and original
an idea or product derived from an existing source.

All of the following are considered plagiarism:


 Turning in someone else‘s work as your own
 Copying words or ideas from someone else without giving credit
 Failing to put a quotation in quotation marks
 Giving incorrect information about the source of a quotation
 Changing words but copying the sentence structure of a source without giving credit
 Copying so many words or ideas from a source that it makes up the majority of your work,
whether you give credit or not.

Using an image, video or piece of music in a work you have produced without receiving proper
permission or providing appropriate citation is plagiarism. The following activities are very
common in today‘s society. Despite their popularity, they still count as plagiarism.

 Copying media (especially image) from other websites to paste them into your own papers or
websites  Making a video using footage from others‘ video or using copyrighted music as part
of the soundtrack  Performing another person‘s copyrighted music (i.e. playing a cover)
 Composing a piece of music that borrows heavily from another composition

Certainly, these media pose situations in which it can be challenging to determine whether or
not the copyrights of a work are being violated. For example:
 A photograph or scan of a copyrighted image
 Recording audio or video in which copyrighted music or video is playing in the background
 Re-creating a visual work in the same medium.
 Re-creating a visual work in a different medium.
 Re-mixing or altering copyrighted images, videos, or audio, even if done so in an original way.

17 | P a g e
The legality of these situations, and others, would be dependent upon the intent and context
within which they are produced. The two safest approaches to take in regards to these
situations are:
 Avoid them altogether; or
 Confirm the works‘ usage permission and cite them properly.

When you cite a source, you give credit to the source by citing in-text and then writing down
your list of references. When writing a research paper, the reference list is usually the last page
of your manuscript

Source: https://www.plagiarism.org

18 | P a g e
Topic: Mail Merge and Hyperlink

Mail merge
is a word processing tool used to combine information stored on a spreadsheet with a template
created using a word processor. The advantage brought about by this tool is that it can save
time, as compared with the manual editing. This function can also help you further customize
the template by adding decisions based on the entries of the spreadsheet.

These are the steps in using Mail Merge:

1. Create a dataset with title headings on a spreadsheet application.


2. Create the template of the letter or document that will receive the dataset in a word
processor.
3. Insert the label of customized detail in the word processor and insert the label that
corresponds to the spreadsheet.
4. Select the option preview in the word processor to generate all of the pages with different
information.

Mail Merge Utilization


1. Create spreadsheet containing your information and make sure that the labels are
written in the first row. (Figure 1)

2. Indicate the source of information on your word processor (Figure 1.1)


a. On the upper part of the word processor, click the Mailings tab.
b. Under the Mailings tab, click the Select Recipients option.
c. Then under the Select Recipients option, click Use Existing List.

3. Select the spreadsheet file you‘ve created in Step 1.


a. Brows the directory where you saved the spreadsheet file containing the information you are
going to use (Figure 1.3).

19 | P a g e
4. Select which spreadsheet in the file contains the information.
a. Select the sheet that you are going to use as your reference for the information.
b. Click OK, after highlighting the sheet.

20 | P a g e
Hyperlink is a tool that can embed a file in a word or image written or inserted in a word
processor or presentation. By using hyperlinks, the time spent to search a file directory is
lessened. Furthermore, Web sites can be hyperlinked in the Word processor. This is a good
way of bookmarking a web site in a customized manner.

A hyperlink is a reference to another file that is represented by a word, an image, or any


document element on a document processor. The file referred to by the hyperlink can be
21 | P a g e
accessed by clicking or hovering the cursor on the hyperlink itself. The source code is a term
used to describe a document that contains hyperlinked elements. Usually, hyperlink texts are
colored blue for distinction and notice ability.

Two (2) types of links:

 Anchor link – this is hyperlink that points to a portion of the same document. The contents are
embedded in the same document but are located in some other location within the document.
 Inline link – this is a hyperlink wherein the content is located in other or remote files. The link
searches for the path of the document before displaying it. Also, the contents of the link are not
embedded in the document.

22 | P a g e
23 | P a g e
24 | P a g e
Topic: Basic Principle of Graphics and Layout

The main reason why you have to know about free online graphic design tools is to save your
time. As a designer, you have probably torn apart when multitasking every single day. Design,
just like any other creative field, demands a great deal of concentration and stamina. The
following are the 14 free online graphic design tools.

 ColorZilla – ultimate CSS Gradient Generator is an impressive online graphic design tool for
specifying gradients with pure CSS3.

 Canva – offers phenom quality at hand. Its potential is not limited to photo design online.

 BeFunky – is a reliable platform if you need to design online. It has three main tools. They are
free and can be used once you click on Get Started Button.
 Snappa – the free subscription plan from Snappa offers you 50,000+ HD photos and graphics
and 5 download per month.

 Pablo – is a super simple graphic design tool. Its aim is to help you choose an appropriate
image from 600+k options and add some next to it.

 Pictaculous – the main reason to use Pictaculous is to learn what colors denominate the
image you are about to use. This tool can come in handy if you want to stay consistent with your
project.

25 | P a g e
 Infogram – is an online graphic design tool famous for its easy graphic design. Infogram offers
you a free subscription plan with numerous advantages.

 Pxlr Editor – this online graphic design tool supports five popular file formats (.png, .jpeg., jpg.,
.bmp, .tiff). what is more, Pixlr Editor has its own specific file format.

 Tinkercad – with the help of tinkercad, you can build elegant 3D design online. Once you are
done with grouping multiple shapes, feel free to turn them into 3D models easy.

 Vectr – the best part about choosing this online tool is that you do not need to be professional
designer to create a visually attractive vector graphics.

26 | P a g e
 Figma – is a free for personal use which makes this online graphic tool quite a catch. Created
as a unique platform that connects the dots for designer, Figma allows you to design, prototype,
and communicate.

 Crello – it can be used for creating almost all possible designs, from Instgram adds to
business cards.
 Design Wizard – is excellent graphic design software that create high-quality visual content in
minutes.

 Poster My Wall – is an easy solution for anyone who wants to create stunning posters without
any required artistic or designer skills.

 Piktochart – infographic design application ―that requires very little effort to produce,
beautiful, high quality graphics.

 GIMP (GNU Image Manipulation Program) – is a free and open-source raster graphics editor
used for image retouching and editing, free-form drawing, resizing, cropping, photo montage,
converting between different image formats, and more specialize tasks.
27 | P a g e
The workflow of a designer is a fragile thing. That is why you have to be careful when speeding
it up.

The term “Infographic” is a short term for information graphic, which refers to an image that
combines information, storytelling, and perceptions that help that cause of an individual or an
institution to communicate a message to viewers.

Using infographics brings about numerous advantages. People rely mostly on their sense of
sight. By creating a catchy and attractive infographic, one can effectively communicate a
message to viewers.

Three (3) Basic Elements of Layout and Design


1. Lines – are the most basic of all the elements. Lines can define the characteristics of an
infographic.

2. Color – is one of the powerful and influential elements in an infographic. Using the right
combination of colors can catch the attention of a passerby or even glancing viewers.

28 | P a g e
3. Shapes – these are defined by the enclosure created by a combination of lines.

Principles of Design

The use of different design elements defines the message and ideas that the image
depicts. Presented are the principles of design that will ensure a harmonious relationship
between the viewer and the image itself.
1. Balance – this describes the placements of elements, shapes, or lines throughout the
image.
Two types of Balance
 Formal Balance – when objects are placed symmetrically and are properly distributed
 Informal Balance – includes nonsymmetrical distribution of elements but is
compensated in different aspects such as colors and lines.

2. Contrast – the arrangement of elements in an image may be done by combining


elements with different properties and characteristics.

29 | P a g e
3. Unity – it is when all of the elements seem to be singular element in unison. This makes
the design pleasing to the viewers.

4. Proportion – this is the correlation of all the elements with one another. The practice of
having proportion among the elements ensures balance and unity.

5. Rhythm – this describes the product of having the elements placed in harmony with one
another. Rhythm can be done by using patterns and by repeating various elements.

30 | P a g e
GNU Image Manipulation Program (GIMP) – image editor is a web extension for tasks as photo
and image retouching, image composition and image authoring. It is integration with the Linux
Desktop app GIMP, a freely distributed program that provides many capabilities. It can be used
as a simple paint program, image editor, an expert quality photo retouching program, an image
renderer, or an image format converter.
Its main features are:

-pixel sampling for all paint tools for high quality anti-aliasing.

ll alpha channel support

Programming Algorithms
GIMP provides extensibility through integration with many programming languages including
Scheme, Python, Perl, C, C++ and more. The result is a high level of customization as
demonstrated by the large number of scripts and plug-ins created by the community.

GIMP provides top-notch color management features to ensure high-fidelity color reproduction
across digital and printed media. It is best used in workflows involving other free software such
as Scribus, Inkscape, and SwatchBooker.

These are the following tools used in GIMP Image Editor

31 | P a g e
– used to select a part of the image in a rectangular shape
– used to select a part of the image in ellipse or circular shape
– used to select a customized shape by hand-drawing the bounding line
– used to select an area intelligently by the computer
– used to select a certain color. All the areas in the workspace with the
same color will be selected
– used to select a shape determined by the edges defined in the image
– used to select and separate the subject in the image against the
background of the image
– used to create a customized path for editing
– used to select a specified color from the image
– used to adjust the scale and size of the image relative to the viewer
– used to measure the distance between two points. It can also
measure the angles of separation of two points
– used to select a part of the image and transfer it to another area
– used to align all the layers in the image
– used to remove or cut a certain part of the image
– used to rotate the image, either clockwise or counter clockwise
– used to scale large or scale small the image in the workspace
– used to make the image look slanted or inclined on one side
– used to make the image look as if viewed from a certain angle
ol – used to flip or invert the view of the image horizontally
– used to insert a textbox for insertion of characters or words
– used to automatically fill the entire selection with your chosen
color
– used to fill the selected area with a color gradient
– used to draw on a selected image similar to pencil stroke
– used to influence the selected image with brush type strokes with
the chosen color and thickness
– used to delete an unwanted area in the image
– used to apply airbrush strokes with varying pressure
– used to calligraphy-style paintings
– used to copy a certain pattern from an image to be used to the selected portion
– used to correct irregularities in a selected portion of the image
– used to apply a cloned pattern from a selected image after
applying a perspective transformation
– used to blur a election by using a paintbrush
– used to smudge a selection using a brush
– used to lighten or darken a selection using a brush

Image File Format

File formats, specifically image file formats, are facilities or methods to store and organize digital
images. The manner of interpreting digital image file is due to the format of storing and coding
the image files
The elements of picture, which are referred to as Pixels or picture elements, are arranged and
stored in manner dictated by the format of the image.

There are a number of file formats for images, some of which are presented here:

JPG) – this is the compression method that


complies with the JPEG File Interchange Format (JFIF). This format applies a ―lossy‖

32 | P a g e
compression method to image files, which means that a huge number of pixels are lost
or discarded in storing the image.
– this is a less common file format supported by
Web browsers. This file format can use either the lossless or the lossy compression
method.

– this is a popular file format for storing


graphical images with fewer colors. GIF compression method uses lossless
compression techniques.
– the intention for the creation of this file
format is to be free and open source substitute for GIF. This file format is expected to be
fully compatible with online applications. This is a lossless compression method; thus, it
is also used in editing applications.

33 | P a g e
Web design is a similar process of creation with the intention of presenting the content on
electronic web pages, which the end-users can access through the internet with the help of
browser.

Here are the factors that greatly contribute to this goal:

1. Purpose – a Web site can be categorized primarily in terms of the goal it aims to fulfill. Web
sites can be categorized into different types and functions depending on the purpose they serve
the user or audience. Web site visitors may want to look for information, be entertained, play
games, socialize, or transact business. In creating a Web page, the designer should define first
the purpose of the Web page to determine the theme of the site. This will help the developer
create a more organized and relevant site.
2. Communication – essentially, when we visit a Web site, the primary objective is to absorb as
much as possible in the shortest amount of time. Thus, the information or text on a Web site
should be concise and direct to the point. The arrangement of the text should be organized in a
manner that would entice readers. To effectively apply this, use headings, subheadings, or bullets.
Outlining will also avoid long fuzzy sentences.
3. Typefaces – this is an essential factor in Web site design because this is considered the most
dominant and noticeable in terms of visuals. Typeface deals with text format, text style, and text.
The appearance of texts can greatly contribute to the perception of the visitors to the Web site.
Academic Web sites will use simple typefaces, whereas those that deal with entertainment will
use fancy and artistic typefaces
4. Colors – these enhance the experience of visitors of the Web site. The appropriate combination
of the foreground color and background color can produce a better viewing experience not only
in the images and pictures but also in the texts. Furthermore, colors can introduce a mood or
make the Web site lively and enticing for viewers. Colors can also introduce the perception of a
modern or classic look on the Web site. Border colors of images or button colors can define the
mood that the Web site reflects.
5. Images – images alone place on the Web site can deliver a complete message that the Web
site wishes to communicate to the audience. Choosing the correct images can connect the Web
site to viewers or the audience effectively. The most commonly used images are infographics.
Images with proper balance, color, and contrast accompanied by texts can deliver great impact
and information to the audience. The ratio of the size of the image with respect to the Web page
and text can also contribute to its impact on the site visitors.
6. Navigation – refers to the facility that the audience can use to go through the Web site and its
subpages. There are several ways on how to create an effective and good navigation system on
a Web site. One of these includes a hierarchical organization of information, so that users can
logically anticipate the location of information. Another is by placing buttons or links to direct the
audience to a specific page or location on the Web site. Last is the use of search bars to enable
the audience to type key words and phrases. Whatever method is chosen for navigation, the
three-click rule should be followed, wherein the user should find the prospect information within
three mouse clicks.
7. Layout – a layout refers to the physical arrangement of the content and elements on a Web
site. There are various ways on how to do an effective layout on a Web site, and typically, these
ways are determined by the creator or developer. However, there are categories that classify a
layout that will guide the users with the suitable layout for their target audience. Possible layouts
are presented here.
Grid – without direction or organization, placing the content of the Web site will most likely
appear chaotic. Grid layouts can be useful because they will enable the user to create
sections or groups of related information. Another is that the information can be arranged

34 | P a g e
in columns and group boxes that can be placed anywhere on the Web site. This will help
creating an eye-soothing arrangement of texts and photos.
F-pattern – based on the studies, human vision flows like the letter F. this means that
humans tend to look heavily at the left side of a visual material more than the right side.
Furthermore, humans tend to look at the upper portion than the lower portion of the visual
material. Thus, the pattern is similar with letter F. As Web site developers, this can be
capitalized by placing more information at the top and left part of the screen.
Mobile – the popularity of using mobile devices in viewing Web content is increasing. This
is because of the portability and convenience brought about by mobile devices to their
users. The display devices vary depending on the system an individual uses. The
developer then should consider the layout for mobile and work stations. A desktop
computer‘s display is usually bigger than mobile displays, and because of this, the content
should be accessible for both devices.
8. Load Time – another basis for the success of a Web site is the time that the Website will load
or appear onto the viewers‘display device. Nowadays, people demand information at a very fast
pace. If the web site takes some time to load, most especially if there are too much content, the
users will most likely search for another source. It is best to minimize the elements in a Web page
and remove the elements that are not important in delivering the information. Another method is
to optimize the size and resolution of the images.

35 | P a g e
WYSIWYG in Web site design is an acronym for What You See Is What You Get. It is an
application that is used to create a Web site either online or offline. This type of application uses
the capability of directly handling the components of the Web site. The developer can directly
drag and drop elements to manipulate the layout of the Web site. The finished product is similar
to the designed placement of the components. The traditional method involves several developer
string commands in an editor program. A program will then convert the commands into visual
elements that will compose the layout of the Web site. Presented here are some of the WYSIWYG
applications for both online and offline development.

Adobe Dreamweaver – this is an offline proprietary Web development tool offered by Adobe
Systems. This tool presents a wide range of tools for drag-and-drop option. The layout will most
likely turn out the same as planned by the developer.
Furthermore, Adobe Dreamweaver can produce the equivalent program codes of the
layout created by the designer.

a. Application bar
b. Document toolbar
c. Document window
d. Workspace switcher
e. Panels
f. Code view
g. Status bar
h. Tag selector
i. Live view
j. Toolbar

Amaya – is an open source Web site development tool used to update documents directly on
a running Web site. (An open source software is a kind of software that can be freely used,
changed, and share by its users). Amaya enables continuous browsing and editing of a Web
site. It also enables the collaborative development of a Web site.

36 | P a g e
Microsoft Expression Web – this is propriety Web site development tool create by
Microsoft. Previously, Microsoft Expression Web is integrated to the now defunct Microsoft
Expression Studio. Developing a web site is easy using Microsoft Expression Web. Simply drag
and drop the elements to create the layout and function of the Web site.

IM Creator – this is Web site that caters to both experienced and inexperienced users, and to
creators of Web sites and Web pages. IM Creator offers predesigned templates that will aid
inexperience users in creating their own Web sites. IM Creator provides a ready-made Web site
with complete functioning buttons, links, and design. The only thing that the user should do is to
edit texts and insert videos and photos. A number of themed templates can be chosen by the
user. For the more dynamic users, IM Creator offers a blank Web site and tools that they can
use to create their Web site from scratch.

37 | P a g e
Wix – is another Web site that offers its users to create their own Web site. The advantage of
using Wix is that knowledge of Web site programming is not a prerequisite. It also offers a wide
range of templates. These templates have been designed for every purpose intended by the
user. This is possible because different Web site developers contribute to the pool of themes
available. Wix offers a drag and drop facility. Users can simply grab an element such as
textboxes, photos, and shapes to arrange them in the layout they want.

38 | P a g e

You might also like