Empowerment Technologies

Plan your projects and define important tasks and actions

Get Started. It's Free
or sign up with your email address
Empowerment Technologies by Mind Map: Empowerment Technologies

1. Current State of ICT

1.1. What is ICT

1.1.1. It means Information and Communication Technology

1.1.2. It is the application of telecommunication techniques that enables society to create, collect, consolidate, communicate, and process information in multimedia.

1.1.3. According to UNESCO, it is “The scientific, technological and engineering disciplines and the management techniques used to handle and transmit information [between] men and machines”.

1.1.4. According to Digital Video Technical Glossary, it is “The computing and communications facilities and features that support teaching, learning and a range of activities in education.”

1.2. The Impact of ICT to Society

1.2.1. It has allowed exchanging of information anytime and anywhere in digital formats.

1.2.2. It gives the essential ingredient in developing new ideas.

1.2.3. The development of communication systems underlies this topic.

1.2.4. It has linked up arts of the world.

1.2.5. ICT decreased the distance between the world closer to us.

1.3. The Impact of ICT in Scientific Exploration

1.3.1. It helps scientists able to invent new technology for terrestrial use or in space.

1.3.2. It finds new ways of communicating over vast distances.

1.3.3. Powerful computers, satellites, and rockets are inventions with the influence of ICT that are capable to send men in space with communication.

1.4. The Impact of ICT in the Military

1.4.1. To protect the arm from enemies with a  good network of communication.

1.4.2. It plays a key role in developing and organized military force providing real - time information.

1.5. The Impact of ICT in Economy

1.5.1. It brings strong economical structure in the financial  growth of a country.

1.5.2. It handles the economic backbone which strengthens the economy by providing proper knowledge about the economy of developed countries.

1.6. The Impact of ICT in Recreation

1.6.1. It gives a number of recreational components such as digital television, online or mobile radio, DVD, Blu-ray, Mp3, game consoles, mobile reading, and gaming devices.

1.7. The Impact of ICT in Transportation

1.7.1. It decreases the distance between places, save valuable travel time, and has provided an easy transport.

1.7.2. It can narrow travelling shorter to get to the destination swiftly.

1.8. The Impact of ICT in Knowledge Management

1.8.1. It makes processing knowledge and disseminating easier to the others.

1.9. The Impact of ICT in Information Institution

1.9.1. It plays roles in library and other information institutions with the possibility to... Process information in digital format networking and sharing information resources are possible It saved library space by creating digital library materials Online access and file transfer in libraries

1.10. The Impact of ICT on User Communities

1.10.1. Influence community users in different ways Increase level of technology literacy Increase demand for better access to information Aggravates discrepancies between poor information and rich information Establish a balanced service for all user stages It kept users updated by being provided with current information Skills are improved in using technological components of the computer

1.11. Trends in ICT

1.11.1. In a nutshell

1.11.2. From your research... Renewable enrgy Artificial Intelligence Modular or Wearable Devices and Gadgets 3D Printing Wireless Connectivity Virtual Reality and Immersion Environmental Technology Medical Technology Security Transportation Drones Video games Big data Holograms

1.11.3. Emotional Computing

1.11.4. Active Technoogy Face Recognition and Applications Voice Recognition and Applications

1.11.5. Artificial Intelligence It is described as the science of making computers do things that require human intelligence

1.11.6. Neural Networks Computational models inspired by an animal's central nervous system which is capable of machine learning

1.11.7. Expert Systems A user interface Allows a non - expert user to query the expert system A knowledge base Collection of facts and rules An inference engine Acts rather like search engine that examines knowledge base for information


2.1. Select Recipients

2.1.1. A list of people you intend to send letters

2.2. Mail merge

2.2.1. personalize bulk mail

2.3. Finish and Merge

2.3.1. Edit individual documents

2.4. Save = Ctrl + S

2.5. Paste = Ctrl + V

2.6. Bold = Ctrl + B

2.7. Italic = Ctrl + I

2.8. Underline = Ctrl + U

3. The Core Rules Of Netiquette

3.1. 1) Remember the human

3.1.1. We have the free will to explore the net and we have the responsibility to respect the people as net users even if our life profile is hidden.

3.2. 2) Adhere to the same standards of behavior online that you follow in real life

3.2.1. It is important to be ethical inside the web because rules that we follow in real life are still applied in the net.

3.3. 3) Know where you are in cyberspace

3.3.1. Check the unknown site you are visiting because any site can be illegal and it might bring you as a user to danger.

3.4. 4) Respect other people's time and bandwidth

3.4.1. Before copying people on your messages, ask yourself whether if it is really important for them to know about the information you are conveying.

3.5. 5) Make yourself look good online

3.5.1. Do not give yourself a bad impression to everyone because it will show how cruel the web can be to new users without knowing that some sites are much friendlier than others.

3.6. 6) Share expert knowledge

3.6.1. The world stay connected through the web to get to know each other very well. Questioning and answering people will show a good impression to your fellow users.

3.7. 7) Help keep flame wars under control

3.7.1. Prevent the series of angry letters of users because it destroys the camaraderie of a discussion group.

3.8. 8) Respect other people's privacy

3.8.1. Do not interfere with a user's profile since you have no involvement.

3.9. 9) Don't abuse your power

3.9.1. Your expertise in every office and system does not allow you to take advantage of other users.

3.10. 10) Be forgiving of other people's mistakes

3.10.1. Allow your senses to forgive the web users who have caused trouble through his/her mistakes in the web.

4. ICT Trend

4.1. The Rise of Information Capitalism

4.1.1. Industrial Age

4.1.2. Knowledge Society

4.2. A View at the Information Society

4.2.1. Dematerialization Before: Physical stores and product distribution After: Virtual products (Books, Music, etc.)

4.2.2. Business Hours Before: F2F Meetings After: WFH

4.2.3. Media Before: Information Dissemination After: Netizen involvement and influence

4.2.4. Education Before: Traditional Learning After: Well - Roundedness, E - Learning

4.2.5. Social Relationships Before: Traditional Courtships After: Cyberlove

4.2.6. Medicine Before: Hospital and F2F Professional Diagnosis and monitoring After: Self Diagnosis, E - Health

4.3. Datafy Now! Everything will be digital

4.3.1. Quicker decision support and automation

4.3.2. Real - time delivery of data and increasingly processed at the network edge

4.4. Everything on the Cloud!

4.4.1. Cost effectiveness

4.4.2. Wide geographical reach

4.4.3. Work anytime, anywhere

4.5. Mobility

4.5.1. Accessibility

4.5.2. "All in One" Convenience

4.6. Cybersecurity

4.6.1. Prevent intrusive and violation to privacy

4.6.2. "Before, during, and after" approach

4.7. Self - Organizing Business Model Applications

4.7.1. Uber, Linkedln, AirBNB, Waze

4.7.2. Crowd - sourcing

4.8. Network Reach

4.8.1. 20 billion connected devices

4.8.2. Exponential growth of digital information

4.9. Video and Pervasive Screens

4.9.1. Watching whatever, wherever, whenever...

4.9.2. Video captures for message delivery, messaging, advertising, etc.

4.10. Smart cars, smart homes, smart appliances

4.11. The smaller, the more powerful

4.12. IT Experts Acquisitions

4.12.1. Non - IT companies will acquire technology companies for analytics, innovations, and main operations

5. Common Computer Problems and Troubleshooting Security

5.1. Cybercrime

5.1.1. Illegal acts in the web

5.2. Beware of the intruders

5.2.1. Hackers People accessing networks illegally.

5.2.2. Crackers People accessing networks illegally but has the intent to destroy data.

5.2.3. Script Kiddie Prewritten hacking and cracking programs to break into computers.

5.2.4. Corporate spies Hired to break into computers

5.2.5. Cyber extortionists Uses email as a medium for extortion.

5.2.6. Cyber Terrorism Uses internet to damage computers for political reasons.

5.3. Network Attacks

5.3.1. Virus - altering computer works without user's knowledge

5.3.2. Worm - programs copy itself

5.3.3. Trojan horse - hides legitimate programs

5.4. Protect yourself

5.5. Protect your password

5.6. Avoid hardware theft by...

5.6.1. cable locks

5.6.2. password locks on laptops

5.6.3. synchronize photo storage

5.7. Software thefts

5.7.1. License agreements Install software on one computer renting of software is not allowed distribution of  software is not allowed creation of multiple copies is not allowed

5.8. Computer problems

5.8.1. Being slow not enough hard disk space Not enough physical memory delete unnecessary files to solve

5.8.2. MSCONFIG.EXE disables a program on startup

5.8.3. Disk defragmenter rearrange data blocks of files

5.8.4. Overheating

5.8.5. Strange noises on the computer

5.8.6. Printer is not working

5.8.7. Can't access to wifi

5.8.8. Slow net

5.9. Health concerns

5.9.1. Carpal tunnel syndrome

5.9.2. computer vision syndrome

5.9.3. Ergonomics and workplace design

6. Cybercitizenship

6.1. Social Network

6.1.1. The online community poof people with the common interest with the use of the web

6.1.2. Sites that facilitates social network are called networking sites. Facebook Twitter Instagram

6.2. Creating an account

6.2.1. Full Name

6.2.2. User Name

6.2.3. Password Choose a secure password Do not use the same password as your other online accounts

6.2.4. Email Address

6.3. Personalizing your profile

6.3.1. Change your display picture

6.3.2. Change your cover photo

6.3.3. Change your profile information

6.4. Know what to share

6.4.1. Do not include sensitive information in your profile. Birthday Address Home Number

6.4.2. Make sure your photos do not reveal sensitive info as well.

6.5. Sending a friend request

6.5.1. You can send a request to those you want to connect with.

6.5.2. Other users can send requests to you.

6.5.3. Be safe when sending requests Only send requests you really know. Only accept requests by people you really know

6.6. Be Vigilant

6.6.1. Everyone can create an account in a social networking site.

6.6.2. A person might pretend as another person.

6.6.3. Keep this in mind when sending friend requests.

6.7. Wall/Timeline

6.7.1. Profile space where all content is posted.

6.7.2. Everyone has their own wall/timeline.

6.8. Posting on the wall

6.8.1. You can post on your own or other's wall

6.8.2. pics, links, and videos may be included in your post's attachment.

6.9. Newsfeed

6.9.1. Updates from friends

6.9.2. It may be controlled by privacy settings set by the user.

6.10. Privacy settings on post

6.10.1. You can control who sees your posts.

6.10.2. You can create groups on your contacts list to make this easier.

6.11. Privacy settings on wall

6.11.1. You can chose who can see your wall

6.12. Privacy is only for the post and not the content

6.13. You can tag photos or posts with other people

6.13.1. They can also tag you.

6.14. Privacy settings in tagging

6.14.1. Be aware of people tagging someone else who can see the post.

6.15. Likes and comments

6.15.1. You can like a certain post

6.15.2. Further reactions of user are seen in the comments section.

6.15.3. Comment responsibly

6.16. Chat

6.16.1. You can talk to your fellow your users through a chat box.

6.16.2. Video call has been supported by it as well.

6.16.3. Stay safe with Chat

6.17. Twitter

6.17.1. Twitter handle Identifies you in the site

6.17.2. Tweet Posts that limits until 140 characters only

6.17.3. Trends The use of hashtags to indicate a certain trend.

6.17.4. Following people Follow people to let their tweets appear your timeline.

6.17.5. Protecting tweets You can set your tweets protected

6.17.6. Manage how people find you Control how people will find you in the site.

6.17.7. Mentions Use the @ sign to mention a person.

6.17.8. Retweeting This is similar to "sharing" a post in Facebook.

6.17.9. Reply You can "favorite" a tweet which is similar to liking a Facebook status.

6.17.10. Replying

6.17.11. Comment Responsibly

6.17.12. Microblogging nature It is designed to encourage users to post short messages often. You can turn - off this feature.

6.17.13. Geolocation settings Automatically indicate your location. You can turn - off this feature.

6.18. Instagram

6.18.1. A social networking site that posts pictures.

6.18.2. You can "follow" people to see their pictures.

6.18.3. You can post photos or videos. Use mobile app to capture picture or video. Add captions It is optional to add and tag people

6.18.4. Do not show photos and videos that show sensitive information.

6.19. Social Media Benefits

6.19.1. Drives participation of citizens to be active

6.19.2. Makes people content creators, managers, and distributors.

6.19.3. Drives collaboration

6.19.4. Encourages people to explore and learn

6.19.5. Makes sharing of information and communication easy.

6.19.6. Helps develop key and real world skills.

6.20. RISKS

6.20.1. Identity theft Someone can deliberate someone else's identity. Avoid it!

6.20.2. Bullying/Harrassment Cyberbullying Cyber stalking Denigration Flaming Harrassment Impersonation Exclusion Outing Trickery How to deal with cyberbullying? Screenshots of attacks inform love ones and authorities change numbers deactivate accounts report the account being used to bully people

6.20.3. Tarnished reputations Maintain our own "personal brand" in the internet.


6.21.1. There is no real "delete"

6.21.2. Once posted, always posted

6.21.3. Think twice before posting anything on social media.

6.22. Account Hacking

6.22.1. Unauthorized person gains access to your account.

6.22.2. Avoid being hacked

7. Internet and Research

7.1. Research

7.1.1. The studious inquiry or examination according to Merriam Webster.

7.1.2. It is not just browsing the web but to expand current knowledge.

7.2. Research is systematic

7.2.1. Identify the problem (spend sufficient time to know what you are searching for)

7.2.2. Formulate the hypothesis (proposed solution to the problem)

7.2.3. Start with your related literature (anything that contains information related to the problem)

7.3. How to improve gathering data?

7.3.1. Journals

7.3.2. Books

7.3.3. Internet

7.4. Understand articles by...

7.4.1. Skim and scan

7.5. How to use internet for research?

7.5.1. Refining search queries use special characters to refine your search (quotes) - enclosing a search in quotation marks forces Google to search for the exact quoted phrase. (wildcard) - a placeholder for reserch (tilde) - Use to search synonymous words (OR) - searches alternatives (range) - use to search for values in between an upper and lower bound.

7.6. Synthesize and state your conclusion

7.6.1. State your conclusion if you have enough information to answer your problem.


7.8. Cite references

7.8.1. Use of APA format

7.8.2. Perspective is key


8.1. A computer program to create electronic spreadsheets

8.2. Relative cell reference

8.2.1. if the position of the cell that contains the reference changes, the reference itself is changed.

8.3. Absolute cell reference

8.3.1. If the position of the cell that contains the formula changes, the absolute reference remain the same









8.8. NOW()

8.9. TODAY()


9.1. It  is a cross platform image editor available for GNU/linux,Osx, windows, and more operating systems

9.2. GNU Image Manipulation Program

9.3. File format

9.3.1. Joint Photographic Experts Group (JPEG)

9.3.2. Portable Network Graphics (PNG)

9.3.3. Graphics Interchange Format (GIF)

9.4. Tools used

9.4.1. Move tool

9.4.2. Pencil tool

9.4.3. text tool

9.4.4. scale tool

9.4.5. blend tool

9.4.6. rotate tool

9.4.7. export

9.4.8. duplicate layer

9.4.9. add layer

9.4.10. zoom tool

10. Effective Powerpoint Presentations

10.1. FONTS

10.1.1. 32 is the minimum font

10.1.2. 48 is better

10.1.3. No all caps

10.1.4. avoid text overload

10.2. Bullets

10.2.1. not more than 6

10.2.2. 6 - 7 words per bullet

10.2.3. Capitalization must be monitored

10.3. Colors

10.3.1. Use dark font for light colored backgrounds and light font for dark ones

10.4. Balance

10.4.1. Place graphics off center

10.4.2. more room for text

10.4.3. place graphics on left side

10.5. graphics

10.5.1. select good illustrations

10.5.2. every image has a reason

10.5.3. animated gifs should be discouraged

10.5.4. use graphs

10.6. 10 - 20 - 30

10.6.1. 10 slides

10.6.2. 20 minutes presentation

10.6.3. 30 is the minimum font

11. Mindmeister (mind mapping)

11.1. A mind map is a spider diagram that consists of centralized subjects

11.2. Mindmeister uses

11.2.1. Add child topics by pressing "+" or TAB

11.2.2. Type (ENTER) to add a sibling topic

11.2.3. Drag and drop topics according to their supposed positions

11.2.4. Create floating topics on child topics by pressing TAB

11.2.5. You can select a theme by changing font colors and backgrounds of the topics

11.2.6. You can customize your own styles

11.2.7. You can add icons, pictures, and even files

11.2.8. You can create slides

11.2.9. You can add transitions