Ans Key Empowerment Technology 1 For HUMSS STEM

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

Learning Module

Empowerment
Technologies
Learner’s Material
MODULE 1
(August 23 – September 3, 2021)

Prepared by:
Richmond Abueva

Teacher’s Information:
Richmond Abueva (LPT)
Email Address: [email protected]
Fb Account Name: Richmond Abueva (BoyPogi)
Cellphone Number: 0905-179-1617
COURSE DESIGN
The course design of this module is adapting the C. A. R. E. format and it has
elements that will help you in your study.
Devotional Thought: “Pool of Bethesda”
Verse for the Day: “Jesus saith unto him, Rise, take up thy bed, and walk. – John 5:8

In John 5, we find Jesus in Jerusalem, walking by the Pool of Bethesda. He spotted a man who had
been lying by the pool for 38 years waiting for someone to help him into the pool. An angel appeared at certain
times and stirred the water of the pool; the first person to enter the pool after it was stirred was healed.

Imagine spending 38 years lying beside a pool of water, waiting to be healed. Jesus, knowing the man's
condition and long years of waiting, asked him if he wanted to be healed. Not knowing to whom he was speaking,
the man told Christ that he had no one to put him into the pool after the water was stirred. Someone else always
got there before him. Jesus looked upon him and said, Rise, take up thy bed, and walk. We are told that the
man was healed immediately and took up his bed and walked. It is interesting that the man did not hesitate to
obey. He did not say, "No, I think I will wait here for a while, as I am sure someone will eventually come to put
me in the water." Are we ready when Christ comes to us with His healing power? Think about that for a
minute. How many people, hearing the call of the Gospel, turn away. Sadly, most people do not see the need of
Christ--they do not think they need a Savior. Let us take this a step farther. How many Christians are content
to live in daily spiritual squalor, rather than take the healing Word of God to heart.

Most people tend to treat their salvation as an attachment or addendum to their real life. Is that true
salvation? One must wonder! Salvation is not an attachment or addendum to our life, rather, it is our life.
Do you think this man's life was ever the same again? Do you think he ever regretted being healed, and wished
to go back to that pool? When we come to Christ, everything changes. Old things pass away, and all things
become new.

Have you been languishing from lack of fellowship with the Lord? Go to Christ, spend time in prayer
and Bible reading, asking Christ to heal your lethargy, and bring you into that wonderful state of peace and joy
in Christ. Are you at the pool of Bethesda? Do you want to stay there? Go to Christ, He will heal you now.

Prayer: Almighty God, as you provided people to attend to Jesus, grant us healing in our spiritual struggle. Amen.

Please write your reflection with regards to our devotional in the space provided below.

____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
___________________________________________________________________________________________________________.
Hi there! Please read this before you proceed!

I am glad that you are part in my class. I hope that as we journey together in this subject
you will at least learn to be responsible in social media and grow maturely in dealing with
technology. My first priority is your learning. But I can’t attain that without your
cooperation. So, I encourage you to do your best and you will see you fruits bloom. Please
remember the things below.

➢ If ever you have clarifications, and questions, you may contact me any time on the day
from 8:am to 5:pm in my contact number 09051791617. Or you can send you inquiries
in our group chat, or you can send me a private massage in facebook or email.
➢ From time to time I will be sending tutorial videos that will help you learn in this subject.
➢ Please don’t hesitate to ask questions for you to learning.

I hope you will enjoy this journey. Thank you and God bless.

Let’s Goooooooo!

The massive world of Information and Communication Technology (ICT) has


continued to shape the world including the Philippines. This Module allows to you to
discover the world of ICT in general and helps you improve your skills in various computer
applications. It also creates several real-life scenarios where you can use these application
and resources properly.

Lesson Objective
At the end of this unit, the students should be able to:
1. compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.
2. apply online safety, security, ethics, and etiquette standards and practice in the
use of ICTs as it would relate to their specific professional tracks.
3. use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.
4. uses common productivity tools effectively by maximizing advanced application
techniques.
5. creates an original or derivative ICT content to effectively communicate or present
data or information related to specific professional tracks.

LESSON 1: INTRODUCTION TO ICT

ICT– Information and Communication-


• It deals with the use of different communication technologies such as mobile
phones, telephone, Internet to locate, save, send and edit information
• Is a study of computers as data processing tools. It introduces students to the
fundamental of using computer systems in an internet environment.
ICT in the Philippines
• Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers.
• ICT Department in the Philippines is responsible for the planning, development and
promotion of the country’s information and communications technology (ICT)
agenda in support of national development.
Computer– an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program.

Internet– is the global system of interconnected computer networks that use the internet
protocol suite (TCIP/IP) to link billions of devices worldwide.
• Means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers.
• Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a
network of networks in which the users at any one computer can get information
from any other computer.

World Wide Web


• An information system on the internet that allows documents to be connected to
other documents by hypertext links, enabling the user to search for information by
moving from one document to another.
• Is an information space where documents and other web resources are identified
by URLs, interlinked by hypertext links, and can be accessed via the Internet.
• Invented by Tim-Berners Lee

Web Pages
• Web page is a hypertext document connected to the World Wide Web. It is a
document that is suitable for the World Wide Web.

The different online platforms of World Wide Web:


1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made
up of the Web pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to
see a website differently than others. Allows users to interact with the page; instead
of just reading the page, the user may be able to comment or create user account.
3. Web 3.0 – this platform is all about semantic web. Aims to have machines (or
servers) understand the user’s preferences to be able to deliver web content.

Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as
is’’ and cannot be manipulated by the user. The content is also the same for all users that is
referred to as Web 1.0

Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The
user is able to see website differently than others e.g. social networking sites, wikis, video
sharing sites.

FEATURES OF WEB 2.0

1. Folksonomy- allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to
as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put
content. Others are able to place a content of their own by means of comments,
reviews and evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase.
This is synonymous to subscribing to a data plan that charges you for the amount
of time you spent in the internet.
5. Software as a service- users will subscribe to a software only when needed rather
than purchasing them e.g. Google docs used to create and edit word processing and
spread sheet.
6. Mass Participation– diverse information sharing through universal web access.
Web 2.0’s content is based on people from various cultures.
TRENDS IN ICT

1. Convergence– is the synergy of technological advancements to work on a similar


goal or task. For example, besides using your personal computer to create word
documents, you can now use your smartphone.

2. social media– is a website, application, or online channel that enables web


users to create, co-create, discuss, modify, and exchange user generated content.

Six types of social media:

a. Social Networks – These are sites that allows you to connect with other people with the
same interests or background. Once the user creates his/her account, he/she can set up a
profile, add people, share content, etc
Example: Facebook and Google+
b. Bookmarking Sites – Sites that allow you to store and manage links to various website
and resources. Most of the sites allow you to create a tag to others.
Stumble Upon, Pinterest

c. Social News – Sites that allow users to post their own news items or links to
other news sources. The users can also comment on the post and comments may also be
rank.
Ex. Reddit and Digg

d. Media Sharing – sites that allow you to upload and share media content like images,
music and video.
Ex. Flickr, YouTube and Instagram

e. Microblogging – focus on short updates from the user. Those that subscribed to the
user will be able to receive these updates.
Ex. Twitter and Plurk

f) Blogs and Forums – allow user to post their content. Other users are able to
comment on the said topic.
Ex. Blogger, WordPress and Tumblr

3. Mobile Technologies– The popularity of smartphones and tablets has taken a


major rise over the years. This is largely because of the devices capability to do the
tasks that were originally found in PCs. Several of these devices are capable of
using a high-speed internet. Today the latest model devices use 4G Networking
(LTE), which is currently the fastest.
MOBILE OS
• iOS – use in apple devices such as iPhone and iPad
• Android – an open source OS developed by Google. Being open source means
mobile phone companies use this OS for free.
• Blackberry OS – use in blackberry devices
• Windows phone OS – A closed source and proprietary operating system developed
by Microsoft.
• Symbian – the original smartphone OS. Used by Nokia devices
• WebOS- originally used in smartphone; now in smart TVs.
• Windows Mobile – developed by Microsoft for smartphones and pocket PCs

4. Assistive Media– is a non- profit service designed to help people who have visual
and reading impairments. A database of audio recordings is used to read to the user

e.g. Yahoo!, Gmail, HotmailCloud computing-distributed computing on internet or


delivery of computing service over the internet.

-Instead of running an e-mail program on your computer, you log in to a Web

e-mail account remotely. The software and storage for your account doesn’t exist

on your computer – it’s on the service’s computer cloud.

It has three components


1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but
server acts as if they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed
via Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public.
Public cloud may be less secured because of its openness, e.g. e-mail

PRIVATE CLOUD allows systems and services to be accessible within an organization. It


offers increased security because of its private nature.

COMMUNITY CLOUD allows systems and services to be accessible by group of organizations.

HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public
cloud.

LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their
information when using internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.


TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human


• You need to remember that you are talking to a real person when you are online.
• The internet brings people together who would otherwise never meet.
• Remember this saying when sending an email: Would I say this to the person’s
face.

Rule No. 2: Adhere to the same standards online that you follow in real life.
• You need to behave the same way online that you do in real life.
• You need to remember that you can get caught doing things you should not be
doing online just like you can in real life.
• You are still talking to a real person with feelings even though you can’t see them.

Rule no. 3: Know where you are in cyberspace.


• Always take a look around when you enter a new domain when surfing the web.
• Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.


• Remember people have other things to do besides read your email. You are not the
center of their world.
• Keep your post and emails to minimum by saying what you want to say.
• Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.


• Be polite and pleasant to everyone.
• Always check your spelling and grammar before posting.
• Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge


• Ask questions online
• Share what you know online.
• Post the answers to your questions online because someone may have the same
question you do.

Rule no. 7: Help keep flame wars under control

• Netiquette does not forgive flaming.


• Netiquette does however forbid people who are flaming to hurt discussion groups
by putting the group down.

Rule no. 8: Respect other people’s privacy.


• Do not read other people’s mail without their permission.
• Going through other people’s things could cost you, your job or you could even go
to jail.
• Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.


• Do not take advantage of other people just because you have more knowledge or
power than them.
• Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.


• Do not point out mistakes to people online.
• Remember that you were once the new kid on the block.
• You still need to have a good manners even though you are online and cannot see
the person face to face.

Internet security
Security Requirement Triad ConfidentIality

Threat Consequence Threat Action ( Attack)

Exposure: Sensitive data are directly


released to an unauthorized entity.
Interception: An unauthorized entity
directly accesses sensitive data traveling
between authorized sources and
destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses
sensitive data by reasoning from
Unauthorized Disclosure characteristics or byproducts of
A circumstance or event communications.
whereby an entity gains access Intrusion: an unauthorized entity gains
to data for which the entity is access to sensitive data by circumventing
not authorized. a system’s security protections.

Disruption Incapacitation: prevents or interrupts


A circumstances or even that system operation by disabling a system
interrupts or prevents the component.
correct operation of system Corruption: Undesirably alters system
services and functions. operation by adversely modifying system
functions or data.
Deception Obstruction: A threat action that
A circumstance or event that interrupts delivery of system services by
may result in an authorized hindering system operation.
entity receiving false data and Masquerade: An unauthorized entity
believing it to be true. gains access to a system or performs a
malicious act by posing as an authorized
entity.
Falsification: False data deceive an
authorized entity.
Repudiation: An entity deceives another
by falsely denying responsibility for an
act.

Usurpation
A circumstances or event that Misappropriation: An entity assumes
results in control of system unauthorized logical or physical control of
services or functions by an a
unauthorized entity. system resource.

Misuse: Causes a system component to perform a function or service that is detrimental to


system security.

Types of System Intruders


• Masquerader
• Hackers
• Clandestine user

Parts of Virus
• Infection mechanism
• Trigger
• PayloaD

Virus stages
• Dormant phase
- Virus is idle.
• Propagation phase
- Virus places an identical copy of itself into other programs or into certain system
areas on the disk.
• Triggering phase
- Virus is activated to perform the function for which it was intended. Caused by
a variety of system events
• Execution phase
- Function is performed

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.

Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.

Malware- stands for malicious software.

Virus- a malicious program designed to transfer from one computer to another in any means
possible.

Worms– a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.

Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.

Spyware– a program that runs in the background without you knowing it. It has the ability
to monitor what you are currently doing and typing through key logging.

Adware- a program designed to send you advertisement, mostly pop-ups.

Spam– unwanted email mostly from bots or advertisers.

Phishing- acquires sensitive personal information like passwords and credits card details.

Pharming- a more complicated way of phishing where it exploits the DNS system.

Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.

Fair Use- means that an intellectual property may be used w/o consent as long as it is used
in commentaries, criticism, parodies, research and etc.

Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or
any other sensitive information.

Rogue security softwares– is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.

Four search strategies


• Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …) and – can be used to include or exclude
a word
• Boolean
AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)

OR – requires at least one of the terms is found.


Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)

NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)

• Question
A question may be entered in the search field of search engine

• Advanced

Features are offered on many engines by going to an “Advanced search” page and making
selections. Effective in narrowing search returns to a specific topic or phrase.

LESSON 3: Advanced Word Processing Skills


Lesson Discussion
In the professional world, sending out information to convey important information is vital.
Because of ICT, things are now sent much faster than the traditional newsletters or postal
mail. You can now send much faster than the traditional newsletters or postal mail. You
can now use the Internet to send out information you need to share. What if we could still
do things much faster – an automated way of creating and sending uniform letters with
different recipients? Would that not be more convenient?

I. Mail Merge and Label Generation


A. Mail Merge
One of the important reasons in using computers per se is its ability to do recurring
tasks automatically. But this ability has to be honed by learning the characteristics and
features of the software you use with your computer. After all, no matter how good or
advance your computer and software may be, it can only be as good as the person using it.

In this particular part of our lesson, we will learn one of the most powerful and
commonly used features of Microsoft Word called Mail Merge. As the name suggests, this
feature allows you to create documents and combine or merge them with another document
or data file. It is commonly used when sending out advertising materials to various
recipients.
The simplest solution for the scenario above is to create a document and just copy
and paste it several times then just replace the details depending on whom you send it to.
But what if you have hundreds or thousands of recipients? Would not that take too many
hours? What if you have a small database of information where you can automatically
generate those letters?
Two Components of Mail Merge
1. Form Document
The first component of our mail merged document is the form document. It is
generally the document that contains the main body of the message we want to convey or
send. The main body of the message is the part of the form document that remains the
same no matter whom you send it to from among your list.

Also included in the form document is what we call place holders, also referred to as
data fields or merge fields. This marks the position on your form document where
individual data or information will be inserted. From our sample document, the place
holders are denoted or marked by the text with double-headed arrows (<< >>) on each side
and with a gray background. On a printed standard form, this will be the underlined
spaces that you will see and use as a guide to where you need to write the information that
you need to fill out. In its simplest form, a form document is literally a “form” that you fill
out with individual information. A common example of a form document is your regular tax
form or application form.

2. List or Data File


The second component of our mail merged document is the list or data file. This is
where the individual information or data that needs to be plugged in (merged) to the form
document is placed and maintained. One of the best things about the mail merge feature is
that it allows data file to be created fro within the Microsoft Word application itself, or it
gets data from a file created in Microsoft Excel or other data formats. In this way, fields that
needed to be filled up on the form document can easily be maintained without accidentally
altering the form or main document. You can also easily add, remove, modify, or extract
your data more efficiently by using other data management applications like Excel or
Access and import them in Word during the mail merge process.
B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just
makes sense that after you print out your form letters, you will need to send it to individual
recipients in an envelope with the matching address printed directly on the envelope or on
a mailing label to stick on. By using virtually the same process as a standard mail merge,
Microsoft Word will print individual addresses to a standard form that it has already pre-
formatted. Simply put, it creates a blank form document that simulates either a blank label
or envelope of pre-defined size and will use the data file that you selected to print the
information, typically individual addresses. So even in generating labels, the two essential
components of creating a merged document are present: the form document and the data
file. Only in this case, you did not have to type or create the form document yourself
because it was already created and pre-formatted in Microsoft Word. All you need to do is
select the correct or appropriate size for the label or envelope and select the data file that
contains the addresses (data) to be printed. You can also preview your merged labels before
printing if you want to.
II. Integrating Images and External Materials
Integrating or inserting pictures in your document is fun and it improves the
impression of your document. A common use of inserting a picture on a document is when
you are creating your resume. Though seemingly simple to do, your knowledge on the
different kinds of materials that you can insert or integrate in a Word document and its
characteristics can help you create a more efficient, richer document not only in content
but also in physical form. A better understanding of the physical form of your document as
well as the different materials you would integrate in it would allow you to be more efficient
and versatile in using Microsoft Word.

A. Kinds of Materials
There are various kinds of materials Microsoft Word is capable of integrating to
make the documents richer, more impressive, and more informative.

1. Pictures
Generally, these are electronic or digital pictures or photographs you have saved in
any local storage device. There are three commonly used types of picture files. You can
identify them by the extension on their file names.

a. .JPG/JPEG
This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic
Experts Group. Like all the rest of the image file extensions, it identifies the kind of data
compression process that it uses to make it more compatible and portable through the
Internet. This type of image file can support 16.7 million colors that is why it is suitable for
use when working with full color photographic images. Unfortunately, it does not support
transparency and therefore, images of this file type can be difficult to integrate in terms of
blending with other materials or elements in your document. But if you are looking for the
best quality image to integrate with your document then this is the image file type for you.
.JPG does not work well on lettering, line drawings, or simple graphics. .JPG images are
relatively small in file size.

b. .GIF
This stands for Graphics Interchange Format. This type of image file is capable of
displaying transparencies. Therefore, it is good for blending with other materials or
elements in your document. It is also capable of displaying simple animation. Apparently,
this may not be too useful on a printed document but if you are sending documents
electronically or through email, or even post documents into a website, then this could be
quite impressive. The downside is that it can only support up to 256 colors so it is good
mostly on logos and art decors with very limited, and generally solid colors. .GIF is much
better for logos, drawings, small text, black and white images, or low-resolution files.

c. .PNG
This is pronounced as “ping“. It stands for Portable Network Graphics. It was built
around the capabilities of .GIF. Its development was basically for the purpose of
transporting images on the Internet at faster rates. It is also good with transparencies but
unlike .GIFs, it does not support animation but it can display up to 16 million colors, so
image quality for this image file type is also remarkably improved. .PNG allows the control
of the transparency level or opacity of images.

2. Clip Art
This is generally a .GIF type; line art drawings or images used as generic
representation for ideas and objects that you might want to integrate in your document.
Microsoft Word has a library of clip arts that is built in or can be downloaded and used
freely. There are still other clip arts that you can either purchase or freely download and
use that come from third-party providers.

3. Shapes
These are printable objects or materials that you can integrate in your document to
enhance its appearance or allow you to have some tools to use for composing and
representing ideas or messages. If you are designing the layout for a poster or other graphic
material for advertising, you might find this useful.

4. Smart Art
Generally, these are predefined sets of different shapes grouped together to form
ideas that are organizational or structural in nature. If you want to graphically represent an
organization, process, relationships, or flow for infographic documents, then you will find
this easy and handy to use.

5. Chart
Another type of material that you can integrate in your Word document that allows you to
represent data characteristics and trends. This is quite useful when you are preparing
reports that correlate and present data in a graphical manner. You can create charts that
can be integrate in your document either directly in Microsoft Word or imported from
external files like Microsoft Excel.

6. Screenshot
Sometimes, creating reports or manuals for training or procedures will require the
integration of a more realistic image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot. Microsoft Word even provides
a snipping tool for your screen shots so you can select and display only the part that you
exactly like to capture on your screen.

III. Image Placement


A. In Line with Text

This is the default setting for images that are inserted or integrated in your document. It
treats your image like a text font with the bottom side totally aligned with the text line. This
setting is usually used when you need to place your image at the beginning of a paragraph.
When placed between texts in a paragraph or a sentence, it distorts the overall appearance
and arrangement of the texts in the paragraph because it will take up the space it needs
vertically, pushing whole lines of texts upward.

B. Square

This setting allows the image you inserted to be placed anywhere with the paragraph with
the text going around the image in a square pattern like frame.

C. Tight

This is almost the same as the Square setting, but here the text “hug” or conforms to the
general shape of the image. This allows you to get a more creative effect on your document.
This setting can mostly be achieved if you are using an image that supports transparency
like a .GIF or .PNG file.

D. Through

This setting allows the text on your document to flow even tighter taking the contours and
shape of the image. Again, this can be best used with .GIF or .PNG type of image.

E. Top and Bottom

This setting pushes the texts away vertically to the top and/or the bottom of the image so
that the image occupies a whole text line on its own.

F. Behind Text

This allows your image to be dragged and placed anywhere on your document but with all
the texts floating in front of it. It effectively makes your image look like a background.

G. In Front of Text

As it suggests, this setting allows your image to be placed right on top of the text as if your
image was dropped right on it. That means whatever part of the text you placed the image
on, it will be covered by the image.

IV. Key Terms


• Mail Merge – a feature that allows you to create documents and combine or
merge them with another document or data file.
• Form Document – the document that contains the main body of the message we
want to convey or send.
• Data File – includes the individual information or data or the recipient’s
information.
• Merge Field/Place Holder – marks the position on your form document where
individual data or information will be inserted.
• .JPG – file extension for the Joint Photographic Experts Group picture file.
• .PNG – file extension for Portable Network Graphics image file.
• .GIF – file extension for the Graphics Interchange Format image file.
• Clipart – line art drawings or images used as a generic representation for ideas
and objects.
• Smart Art – predefined sets of different shapes grouped together to form ideas
that are organizational or structural in nature.
• Text Wrap – adjusts how the image behaves around other objects or text.

LESSON 4: Advanced Spreadsheet Skills


What is a Spreadsheet Software?
- allows users to organize data in rows an columns and perform calculations on
the data. These rows and columns collectively are called worksheet.
Examples of Spreadsheet Software:
• LibreOffice Calc
• OpenOffice.org Calc
• Google Sheets
• Apple iWork Numbers
• Kingsoft Office Spreadsheets
• Star Office Calc
• Microsoft Excel

MICROSOFT EXCEL
To open Microsoft Excel, Press “Windows Logo” + R then type “excel” then enter.

Key Terms in MS Excel:


Row – horizontal line of entries in a table
Column – vertical line of entries in a table
Cell – the place where info. is held in a spreadsheet
Active Cell – the selected cell
Column Heading – the box at the top of each column containing a letter
Row Heading – the row number
Cell Reference – the cell address of the cell usually combine letter and number (ex.
A1, B4, C2)
Merge – combining or joining two or more cells
Formula – is an expression which calculates the value of a cell.
Functions – are predefined formulas and are already available in Excel
Formula Bar – the bar that displays the contents of a cell

FUNCTIONS
BASIC MATH OPERATIONS:
➢ =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the numbers
within the range)
➢ =PRODUCT(x,y) – returns the product of x and y
➢ =QUOTIENT(x,y) – returns the quotient of x divided by y
➢ =x-y – returns the difference of x subtracted by y
➢ =x+y – returns the sum of x and y
➢ =x*y – returns the product of x and y
➢ =x/y – returns the quotient of x divided by y
➢ =x-y – returns the difference of x subtracted by y
OTHER FUNCTIONS:
➢ =ABS(x) – returns the absolute value of x
➢ =AVERAGE(x,y) – returns the average of x and y
➢ =CONCATENATE(x,y) – joins x and y
➢ =IF(Condition, x, y) – returns x if the condition is true, else it returns y
➢ =ISEVEN(x) – returns true if x is an even number
➢ =ISODD(x) – returns true if x is an odd number
➢ =COUNT(range) – counts the number of cell containing a number within a
range
➢ =COUNTIF(range, criteria) – count the number of cell that fits with the criteria
within the range
➢ =ISNUMBER(x) – returns true if x is a number
➢ =ISTEXT(x) – returns true if x is a text
➢ =LEN(x) – returns the length of characters in x
➢ =PROPER(x) – returns the proper casing of x
➢ =LEFT(x,y) – returns the characters of x specified by y (from the left)
➢ =RIGHT(x,y) – returns the characters of x specified by y (from the right)
➢ =PI() – returns the value of pi
➢ =MIN(x,y) – returns the smallest number between x and y
➢ =MAX(x,y) – returns the largest number between x and y
➢ =MIN(range) – returns the smallest number within the range
➢ =MAX(range) – returns the largest number within the range
➢ =POWER(x,y) – returns the value of x raised to the power of y
➢ =ROUND(x,y) – rounds x to a specified number of digits (y) =COLUMN(x) –
returns the column number of x
➢ =ROW(x) – returns the row number of x
➢ =SQRT(x) – returns the square root of x
➢ =TRIM(x) – removes extra spaces in x
➢ =UPPER(x) – returns x in all capital form
➢ =LOWER(x) – returns x in non- capital form
➢ =TODAY() – returns the current date
➢ =NOW() – returns the current date and time

LESSON 5: Advanced Presentation Skills


Powerpoint is a highly innovative and versatile program that can ensure a successful
communication whether you’re presenting in front of potential investors, a lecture theatre
or simply in front of your colleagues. The following are the five features you should be
using-if youy aren’t already. Learn everything about these tips: they will improve your
presentation skills and allow you to communicate your message successfully. The five
features of powerpoint was

1)adding smart art

2)Inserting Shapes

3)Inserting and Image

4)Slide Transitions
5)Adding Animations

Creating an Effective Presentation


1. Minimize: Keep slides counts to a minimum to maintain a clear message and to keep
the audience attentive. Remember that the presentation is just a visual aid. Most
information should still come from the reporter.
2.Clarity: Avoid being to fancy by using font style that is easy to read. Make sure that it is
also big enough to be read by the audience. Once you start making your presentation,
consider how big the screen is during your report.
3.Simplicity: Use bullets or short sentences. Summarize the information on the screen to
have your audience focus on what the speaker is saying than on reading the slide. Limit the
content to six lines and seven words per line. This is known as the 6 x 7 rule.
4. Visual: Use graphics to help in your presentation but not too many to distract the
audience. In addition, instead of using table of data, use charts and graphs.
5. Consistency: Make your design uniform. Avoid having different font styles and
backgrounds.
6. Contrast: Use a light font on dark background or vice versa. This is done so that it is
easier to read. In most instances, it is easier to read on screen if the background is dark.
This is due to the brightness of the screen.

Answer the following.


I. TRUE or FALSE: Write T on the line if the sentence is true, otherwise, write F if
it is false.
__T___ 1. Tim Berners-Lee created the World Wide Web.
__F___ 2. People Magazine conducted the research on “The Selfiest Cities
in the world”.
__T____ 3. Web 2.0 introduced static web pages that allows users to
interact with web page.
__T___ 4. Folksonomy allows users to categorize and locate information.
__T____ 5. Technological convergence is the synergy of technological
advancements to work on a similar goal or task.
__T____ 6. According to Nielsen, users who use the Internet spend more
time is social media sites that in any other types of sites.
__T____ 7. Blogging sites are sites that focus on short updates from the
user.
__F___ 8. Android is a mobile operating system for Apple devices.
__T____ 9. Assistive media is a nonprofit service designed to help people
who have visual and reading impairments.
__F___ 10 Information and Communication Technology (ICT) deals with
the use of different communications technology to locate, save,
send, and edit information.

II. Write SN if the social media website is a social network, BS for bookmarking site,
SNS for social news, MS for media sharing, MI for microblogging, and BF for logs
and forums.
_____SN_____ 1. Facebook ____SN______ 6. Google +TM
_____MI_____ 2. Plurk ____MS______ 7. Instagram
_____MI_____ 3. Twitter ____BS______ 8. Pinterest
_____BF_____ 4. Tumblr ____BF______ 9. Blogger
_____SNS_____ 5. Reddit ____BS______ 10 StumbleUpon

III. Matching Type: Match column A with Column B. Write the letter of the correct
answers on the line before each number.
A B
__e___ 1. Virus a. Deigned to send you advertisements
b. Sends and official-looking email and is
__l___ 2. Rogue designed to steal sensitive personal
information
c. A provision that allows you to use copyright
__o___ 3. Keylogger
work without consent with certain limitations
d. A browser feature that is synonymous to
__a___ 4. Adware
“private” browsing
e. Malicious software program loaded onto a
__i___ 5. Spam user’s computer without the user’s knowledge
and performs malicious actions
__b___ 6. Phishing f. Exploit the DNS system
g. States that anyone who uses your work
__c___ 7. Fair use
without your consent is punishable by law
h. Runs in the background and monitors what
__h___ 8. Spyware
you are doing
__d___ 9. Private i. Unwanted emails mostly from boots
__m___ 10. Malware j. Disguised as a useful program but is not
__n___ 11. Incognito k. The information superhighway
l. Tricks the user into posing that it is a security
__k___ 12. Internet
software
__j___ 13. Trojan m. A malicious software
n. An option to hide a post so that search engines
__g___ 14. Copyright
could not scan it
o. Used to record the keystrokes done by the
__f___ 15. pharming
user

Answer the following.


IV. Identification:
Mail Merge 1. What feature of MS (Microsoft) Word allows you to
efficiently create document that have the same general content
but may have different recipients or purpose?

Form Document 2. What are the two components of the Mail Merge?
& Data File
Mailings Tab 3. Where can you find the Start Mail Merge button?

Merge Fields 4. It tell MS Word exactly where to place the information


coming from the data file to the main document.

Preview 5. This button allows you to see the result of your Mail Merge
even before you print or send it out?

Data Source 6. What file contains the information that you nee to merge
with your main document?

Data file 7. What essential component of Mail Merge is required from


users when generating labels?

GIF 8. What image file type is capable of displaying simple


animation?

PNG 9. Which image compression type allows you to display images


in full color just like digital pictures?

Illustrations 10. Under what ribbon group does “Insert→Smart Art” fall?

Microsoft Excel 11. A program designed to create spreadsheets which can later
be used to analyze statistical data.

Accounting 12. A number format that puts a dollar symbol before each
Format value by default.

AutoSum 13. A function that add range of cells.

Alignment Tab 14. This is the tab in the format cell dialog box where you can
change the orientation of a text.

Average 15. A function that gets the average of a range of cells.


COUNTIF 16. A function used to count the number of cells that contain
something in them if the criteria are met.

SUMIF 17. A function used to add a certain range of cell if a condition


is met

Ctrl+1 18. The shortcut key for the format cell dialog box is

Average Range 19. A syntax in the AVERAGEIF function that includes the
value or label that determines if the cell is part of the range to
be averaged.

V. Easy.
1. How important it is the mail merge feature of MS Word in many different
organization/institutions?
______________________________________________________________________________
______________________________________________________________________________
__________________________________________

2. Give an instance where it would be better to use the Mail merge feature of MS Word?
______________________________________________________________________________
______________________________________________________________________________
__________________________________________

3. When do images or graphics in MS Word hurt the document rather than help?
______________________________________________________________________________
______________________________________________________________________________
__________________________________________

4. How important MS Excel nowadays?


______________________________________________________________________________
______________________________________________________________________________
__________________________________________

5. Give an instance where it would be better to use the Mail merge feature of MS Excel?
______________________________________________________________________________
______________________________________________________________________________
__________________________________________
NOTE: “Don’t allow technology (computers, phones, internet) to use you. Use it.”
Many lives and relationship were broken because of it. Don’t allow it to happen to you.
Instead, make it as an instrument to glorify God.
Read 1 Corinthian 10:31 and make comment on the verse relating with our use of
technology today. 2 or 3 sentences only.
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
____________________________________________________________.

Thank you & God Bless!

You might also like