Ans Key Empowerment Technology 1 For HUMSS STEM
Ans Key Empowerment Technology 1 For HUMSS STEM
Ans Key Empowerment Technology 1 For HUMSS STEM
Empowerment
Technologies
Learner’s Material
MODULE 1
(August 23 – September 3, 2021)
Prepared by:
Richmond Abueva
Teacher’s Information:
Richmond Abueva (LPT)
Email Address: [email protected]
Fb Account Name: Richmond Abueva (BoyPogi)
Cellphone Number: 0905-179-1617
COURSE DESIGN
The course design of this module is adapting the C. A. R. E. format and it has
elements that will help you in your study.
Devotional Thought: “Pool of Bethesda”
Verse for the Day: “Jesus saith unto him, Rise, take up thy bed, and walk. – John 5:8
In John 5, we find Jesus in Jerusalem, walking by the Pool of Bethesda. He spotted a man who had
been lying by the pool for 38 years waiting for someone to help him into the pool. An angel appeared at certain
times and stirred the water of the pool; the first person to enter the pool after it was stirred was healed.
Imagine spending 38 years lying beside a pool of water, waiting to be healed. Jesus, knowing the man's
condition and long years of waiting, asked him if he wanted to be healed. Not knowing to whom he was speaking,
the man told Christ that he had no one to put him into the pool after the water was stirred. Someone else always
got there before him. Jesus looked upon him and said, Rise, take up thy bed, and walk. We are told that the
man was healed immediately and took up his bed and walked. It is interesting that the man did not hesitate to
obey. He did not say, "No, I think I will wait here for a while, as I am sure someone will eventually come to put
me in the water." Are we ready when Christ comes to us with His healing power? Think about that for a
minute. How many people, hearing the call of the Gospel, turn away. Sadly, most people do not see the need of
Christ--they do not think they need a Savior. Let us take this a step farther. How many Christians are content
to live in daily spiritual squalor, rather than take the healing Word of God to heart.
Most people tend to treat their salvation as an attachment or addendum to their real life. Is that true
salvation? One must wonder! Salvation is not an attachment or addendum to our life, rather, it is our life.
Do you think this man's life was ever the same again? Do you think he ever regretted being healed, and wished
to go back to that pool? When we come to Christ, everything changes. Old things pass away, and all things
become new.
Have you been languishing from lack of fellowship with the Lord? Go to Christ, spend time in prayer
and Bible reading, asking Christ to heal your lethargy, and bring you into that wonderful state of peace and joy
in Christ. Are you at the pool of Bethesda? Do you want to stay there? Go to Christ, He will heal you now.
Prayer: Almighty God, as you provided people to attend to Jesus, grant us healing in our spiritual struggle. Amen.
Please write your reflection with regards to our devotional in the space provided below.
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
___________________________________________________________________________________________________________.
Hi there! Please read this before you proceed!
I am glad that you are part in my class. I hope that as we journey together in this subject
you will at least learn to be responsible in social media and grow maturely in dealing with
technology. My first priority is your learning. But I can’t attain that without your
cooperation. So, I encourage you to do your best and you will see you fruits bloom. Please
remember the things below.
➢ If ever you have clarifications, and questions, you may contact me any time on the day
from 8:am to 5:pm in my contact number 09051791617. Or you can send you inquiries
in our group chat, or you can send me a private massage in facebook or email.
➢ From time to time I will be sending tutorial videos that will help you learn in this subject.
➢ Please don’t hesitate to ask questions for you to learning.
I hope you will enjoy this journey. Thank you and God bless.
Let’s Goooooooo!
Lesson Objective
At the end of this unit, the students should be able to:
1. compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.
2. apply online safety, security, ethics, and etiquette standards and practice in the
use of ICTs as it would relate to their specific professional tracks.
3. use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.
4. uses common productivity tools effectively by maximizing advanced application
techniques.
5. creates an original or derivative ICT content to effectively communicate or present
data or information related to specific professional tracks.
Internet– is the global system of interconnected computer networks that use the internet
protocol suite (TCIP/IP) to link billions of devices worldwide.
• Means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers.
• Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a
network of networks in which the users at any one computer can get information
from any other computer.
Web Pages
• Web page is a hypertext document connected to the World Wide Web. It is a
document that is suitable for the World Wide Web.
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as
is’’ and cannot be manipulated by the user. The content is also the same for all users that is
referred to as Web 1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The
user is able to see website differently than others e.g. social networking sites, wikis, video
sharing sites.
1. Folksonomy- allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to
as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put
content. Others are able to place a content of their own by means of comments,
reviews and evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase.
This is synonymous to subscribing to a data plan that charges you for the amount
of time you spent in the internet.
5. Software as a service- users will subscribe to a software only when needed rather
than purchasing them e.g. Google docs used to create and edit word processing and
spread sheet.
6. Mass Participation– diverse information sharing through universal web access.
Web 2.0’s content is based on people from various cultures.
TRENDS IN ICT
a. Social Networks – These are sites that allows you to connect with other people with the
same interests or background. Once the user creates his/her account, he/she can set up a
profile, add people, share content, etc
Example: Facebook and Google+
b. Bookmarking Sites – Sites that allow you to store and manage links to various website
and resources. Most of the sites allow you to create a tag to others.
Stumble Upon, Pinterest
c. Social News – Sites that allow users to post their own news items or links to
other news sources. The users can also comment on the post and comments may also be
rank.
Ex. Reddit and Digg
d. Media Sharing – sites that allow you to upload and share media content like images,
music and video.
Ex. Flickr, YouTube and Instagram
e. Microblogging – focus on short updates from the user. Those that subscribed to the
user will be able to receive these updates.
Ex. Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other users are able to
comment on the said topic.
Ex. Blogger, WordPress and Tumblr
4. Assistive Media– is a non- profit service designed to help people who have visual
and reading impairments. A database of audio recordings is used to read to the user
e-mail account remotely. The software and storage for your account doesn’t exist
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public
cloud.
INTERNET SAFETY- it refers to the online security or safety of people and their
information when using internet.
Rule No. 2: Adhere to the same standards online that you follow in real life.
• You need to behave the same way online that you do in real life.
• You need to remember that you can get caught doing things you should not be
doing online just like you can in real life.
• You are still talking to a real person with feelings even though you can’t see them.
Internet security
Security Requirement Triad ConfidentIality
Usurpation
A circumstances or event that Misappropriation: An entity assumes
results in control of system unauthorized logical or physical control of
services or functions by an a
unauthorized entity. system resource.
Parts of Virus
• Infection mechanism
• Trigger
• PayloaD
Virus stages
• Dormant phase
- Virus is idle.
• Propagation phase
- Virus places an identical copy of itself into other programs or into certain system
areas on the disk.
• Triggering phase
- Virus is activated to perform the function for which it was intended. Caused by
a variety of system events
• Execution phase
- Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Virus- a malicious program designed to transfer from one computer to another in any means
possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware– a program that runs in the background without you knowing it. It has the ability
to monitor what you are currently doing and typing through key logging.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used
in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or
any other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
• Question
A question may be entered in the search field of search engine
• Advanced
Features are offered on many engines by going to an “Advanced search” page and making
selections. Effective in narrowing search returns to a specific topic or phrase.
In this particular part of our lesson, we will learn one of the most powerful and
commonly used features of Microsoft Word called Mail Merge. As the name suggests, this
feature allows you to create documents and combine or merge them with another document
or data file. It is commonly used when sending out advertising materials to various
recipients.
The simplest solution for the scenario above is to create a document and just copy
and paste it several times then just replace the details depending on whom you send it to.
But what if you have hundreds or thousands of recipients? Would not that take too many
hours? What if you have a small database of information where you can automatically
generate those letters?
Two Components of Mail Merge
1. Form Document
The first component of our mail merged document is the form document. It is
generally the document that contains the main body of the message we want to convey or
send. The main body of the message is the part of the form document that remains the
same no matter whom you send it to from among your list.
Also included in the form document is what we call place holders, also referred to as
data fields or merge fields. This marks the position on your form document where
individual data or information will be inserted. From our sample document, the place
holders are denoted or marked by the text with double-headed arrows (<< >>) on each side
and with a gray background. On a printed standard form, this will be the underlined
spaces that you will see and use as a guide to where you need to write the information that
you need to fill out. In its simplest form, a form document is literally a “form” that you fill
out with individual information. A common example of a form document is your regular tax
form or application form.
A. Kinds of Materials
There are various kinds of materials Microsoft Word is capable of integrating to
make the documents richer, more impressive, and more informative.
1. Pictures
Generally, these are electronic or digital pictures or photographs you have saved in
any local storage device. There are three commonly used types of picture files. You can
identify them by the extension on their file names.
a. .JPG/JPEG
This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic
Experts Group. Like all the rest of the image file extensions, it identifies the kind of data
compression process that it uses to make it more compatible and portable through the
Internet. This type of image file can support 16.7 million colors that is why it is suitable for
use when working with full color photographic images. Unfortunately, it does not support
transparency and therefore, images of this file type can be difficult to integrate in terms of
blending with other materials or elements in your document. But if you are looking for the
best quality image to integrate with your document then this is the image file type for you.
.JPG does not work well on lettering, line drawings, or simple graphics. .JPG images are
relatively small in file size.
b. .GIF
This stands for Graphics Interchange Format. This type of image file is capable of
displaying transparencies. Therefore, it is good for blending with other materials or
elements in your document. It is also capable of displaying simple animation. Apparently,
this may not be too useful on a printed document but if you are sending documents
electronically or through email, or even post documents into a website, then this could be
quite impressive. The downside is that it can only support up to 256 colors so it is good
mostly on logos and art decors with very limited, and generally solid colors. .GIF is much
better for logos, drawings, small text, black and white images, or low-resolution files.
c. .PNG
This is pronounced as “ping“. It stands for Portable Network Graphics. It was built
around the capabilities of .GIF. Its development was basically for the purpose of
transporting images on the Internet at faster rates. It is also good with transparencies but
unlike .GIFs, it does not support animation but it can display up to 16 million colors, so
image quality for this image file type is also remarkably improved. .PNG allows the control
of the transparency level or opacity of images.
2. Clip Art
This is generally a .GIF type; line art drawings or images used as generic
representation for ideas and objects that you might want to integrate in your document.
Microsoft Word has a library of clip arts that is built in or can be downloaded and used
freely. There are still other clip arts that you can either purchase or freely download and
use that come from third-party providers.
3. Shapes
These are printable objects or materials that you can integrate in your document to
enhance its appearance or allow you to have some tools to use for composing and
representing ideas or messages. If you are designing the layout for a poster or other graphic
material for advertising, you might find this useful.
4. Smart Art
Generally, these are predefined sets of different shapes grouped together to form
ideas that are organizational or structural in nature. If you want to graphically represent an
organization, process, relationships, or flow for infographic documents, then you will find
this easy and handy to use.
5. Chart
Another type of material that you can integrate in your Word document that allows you to
represent data characteristics and trends. This is quite useful when you are preparing
reports that correlate and present data in a graphical manner. You can create charts that
can be integrate in your document either directly in Microsoft Word or imported from
external files like Microsoft Excel.
6. Screenshot
Sometimes, creating reports or manuals for training or procedures will require the
integration of a more realistic image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot. Microsoft Word even provides
a snipping tool for your screen shots so you can select and display only the part that you
exactly like to capture on your screen.
This is the default setting for images that are inserted or integrated in your document. It
treats your image like a text font with the bottom side totally aligned with the text line. This
setting is usually used when you need to place your image at the beginning of a paragraph.
When placed between texts in a paragraph or a sentence, it distorts the overall appearance
and arrangement of the texts in the paragraph because it will take up the space it needs
vertically, pushing whole lines of texts upward.
B. Square
This setting allows the image you inserted to be placed anywhere with the paragraph with
the text going around the image in a square pattern like frame.
C. Tight
This is almost the same as the Square setting, but here the text “hug” or conforms to the
general shape of the image. This allows you to get a more creative effect on your document.
This setting can mostly be achieved if you are using an image that supports transparency
like a .GIF or .PNG file.
D. Through
This setting allows the text on your document to flow even tighter taking the contours and
shape of the image. Again, this can be best used with .GIF or .PNG type of image.
This setting pushes the texts away vertically to the top and/or the bottom of the image so
that the image occupies a whole text line on its own.
F. Behind Text
This allows your image to be dragged and placed anywhere on your document but with all
the texts floating in front of it. It effectively makes your image look like a background.
G. In Front of Text
As it suggests, this setting allows your image to be placed right on top of the text as if your
image was dropped right on it. That means whatever part of the text you placed the image
on, it will be covered by the image.
MICROSOFT EXCEL
To open Microsoft Excel, Press “Windows Logo” + R then type “excel” then enter.
FUNCTIONS
BASIC MATH OPERATIONS:
➢ =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the numbers
within the range)
➢ =PRODUCT(x,y) – returns the product of x and y
➢ =QUOTIENT(x,y) – returns the quotient of x divided by y
➢ =x-y – returns the difference of x subtracted by y
➢ =x+y – returns the sum of x and y
➢ =x*y – returns the product of x and y
➢ =x/y – returns the quotient of x divided by y
➢ =x-y – returns the difference of x subtracted by y
OTHER FUNCTIONS:
➢ =ABS(x) – returns the absolute value of x
➢ =AVERAGE(x,y) – returns the average of x and y
➢ =CONCATENATE(x,y) – joins x and y
➢ =IF(Condition, x, y) – returns x if the condition is true, else it returns y
➢ =ISEVEN(x) – returns true if x is an even number
➢ =ISODD(x) – returns true if x is an odd number
➢ =COUNT(range) – counts the number of cell containing a number within a
range
➢ =COUNTIF(range, criteria) – count the number of cell that fits with the criteria
within the range
➢ =ISNUMBER(x) – returns true if x is a number
➢ =ISTEXT(x) – returns true if x is a text
➢ =LEN(x) – returns the length of characters in x
➢ =PROPER(x) – returns the proper casing of x
➢ =LEFT(x,y) – returns the characters of x specified by y (from the left)
➢ =RIGHT(x,y) – returns the characters of x specified by y (from the right)
➢ =PI() – returns the value of pi
➢ =MIN(x,y) – returns the smallest number between x and y
➢ =MAX(x,y) – returns the largest number between x and y
➢ =MIN(range) – returns the smallest number within the range
➢ =MAX(range) – returns the largest number within the range
➢ =POWER(x,y) – returns the value of x raised to the power of y
➢ =ROUND(x,y) – rounds x to a specified number of digits (y) =COLUMN(x) –
returns the column number of x
➢ =ROW(x) – returns the row number of x
➢ =SQRT(x) – returns the square root of x
➢ =TRIM(x) – removes extra spaces in x
➢ =UPPER(x) – returns x in all capital form
➢ =LOWER(x) – returns x in non- capital form
➢ =TODAY() – returns the current date
➢ =NOW() – returns the current date and time
2)Inserting Shapes
4)Slide Transitions
5)Adding Animations
II. Write SN if the social media website is a social network, BS for bookmarking site,
SNS for social news, MS for media sharing, MI for microblogging, and BF for logs
and forums.
_____SN_____ 1. Facebook ____SN______ 6. Google +TM
_____MI_____ 2. Plurk ____MS______ 7. Instagram
_____MI_____ 3. Twitter ____BS______ 8. Pinterest
_____BF_____ 4. Tumblr ____BF______ 9. Blogger
_____SNS_____ 5. Reddit ____BS______ 10 StumbleUpon
III. Matching Type: Match column A with Column B. Write the letter of the correct
answers on the line before each number.
A B
__e___ 1. Virus a. Deigned to send you advertisements
b. Sends and official-looking email and is
__l___ 2. Rogue designed to steal sensitive personal
information
c. A provision that allows you to use copyright
__o___ 3. Keylogger
work without consent with certain limitations
d. A browser feature that is synonymous to
__a___ 4. Adware
“private” browsing
e. Malicious software program loaded onto a
__i___ 5. Spam user’s computer without the user’s knowledge
and performs malicious actions
__b___ 6. Phishing f. Exploit the DNS system
g. States that anyone who uses your work
__c___ 7. Fair use
without your consent is punishable by law
h. Runs in the background and monitors what
__h___ 8. Spyware
you are doing
__d___ 9. Private i. Unwanted emails mostly from boots
__m___ 10. Malware j. Disguised as a useful program but is not
__n___ 11. Incognito k. The information superhighway
l. Tricks the user into posing that it is a security
__k___ 12. Internet
software
__j___ 13. Trojan m. A malicious software
n. An option to hide a post so that search engines
__g___ 14. Copyright
could not scan it
o. Used to record the keystrokes done by the
__f___ 15. pharming
user
Form Document 2. What are the two components of the Mail Merge?
& Data File
Mailings Tab 3. Where can you find the Start Mail Merge button?
Preview 5. This button allows you to see the result of your Mail Merge
even before you print or send it out?
Data Source 6. What file contains the information that you nee to merge
with your main document?
Illustrations 10. Under what ribbon group does “Insert→Smart Art” fall?
Microsoft Excel 11. A program designed to create spreadsheets which can later
be used to analyze statistical data.
Accounting 12. A number format that puts a dollar symbol before each
Format value by default.
Alignment Tab 14. This is the tab in the format cell dialog box where you can
change the orientation of a text.
Ctrl+1 18. The shortcut key for the format cell dialog box is
Average Range 19. A syntax in the AVERAGEIF function that includes the
value or label that determines if the cell is part of the range to
be averaged.
V. Easy.
1. How important it is the mail merge feature of MS Word in many different
organization/institutions?
______________________________________________________________________________
______________________________________________________________________________
__________________________________________
2. Give an instance where it would be better to use the Mail merge feature of MS Word?
______________________________________________________________________________
______________________________________________________________________________
__________________________________________
3. When do images or graphics in MS Word hurt the document rather than help?
______________________________________________________________________________
______________________________________________________________________________
__________________________________________
5. Give an instance where it would be better to use the Mail merge feature of MS Excel?
______________________________________________________________________________
______________________________________________________________________________
__________________________________________
NOTE: “Don’t allow technology (computers, phones, internet) to use you. Use it.”
Many lives and relationship were broken because of it. Don’t allow it to happen to you.
Instead, make it as an instrument to glorify God.
Read 1 Corinthian 10:31 and make comment on the verse relating with our use of
technology today. 2 or 3 sentences only.
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
____________________________________________________________.