1. MINDANAO MISSION ACADEMY
of Seventh-day Adventists, Inc.
The School that Offers Something Better
Manticao, Misamis Oriental
• • LEARNING MODULE FOR EMPOWERMENT TECHNOLOGIES • •
HOW ARE YOU GOING TO LEARN?
ICONS DESCRIPTION
When you see this icon, it signals that you are to do a task classified as performance task. This is now a transfer
of the knowledge that you learn from the lessons. This task merits the highest percentage in the grading system.
This icon gives you an overview of the lesson that you will be learning. It is an introduction of the lesson and a
recall of your prior knowledge regarding the topic.
This icon gives you important lessons, core values integrated in the lessons. These are important concepts and
strategies that will help you in life.
You will find this icon before some chunks of text in the following pages. It tells you to carefully study the
concepts, principles, or processes discussed in the text. It also tells you that there is a question to answer or an
idea to think about it.
✎
This icon gives you important instructions to note and follow. Read every detail of instructions so you can follow
them precisely.
You will find this icon at the end of every topic. It signals a self-test to determine how well you have achieved the
objectives set in the unit. Study the lesson well and you will perform quite well in the self-test. This will be
submitted to your teacher after you answering the self-test. Write legibly and always follow instructions properly.
☞
This icon directs you to the specific activity which you need to answer and specific lesson for you to refer to as
you answer the activity.
Content Standard: The learner demonstrates understanding of:
ICT in the context of global communication for specific professional track
the use of advanced tools and techniques found in common productivity and software applications in developing ICT
content for specific professional tracks
Performance Standard: The learner is able to:
1. at the end of the 2-week period independently compose an insightful reflection paper on the nature of ICT in the context
of their lives, society, and professional tracks (Arts, TechVoc, Sports, Academic)
2. at the end of the 2-week period independently apply advanced productivity tools to create or develop ICT content for use
in specific professional tracks. These may be in the form of, but not limited to:
Calculating spread sheet of athletic statistics (Sports)
Layout of catalogue of creative works (Arts)
Materials/ ingredients projections for batches of baked goods (Tech- Voc)
Letterhead/ business card design (Business/ Academic)
Goal: You will create a brochure
Role: Graphic/ Lay-out Artist employed under the Inter-Agency Task Force (IATF) against COVID-19
Audience: People of the Republic of the Philippines
Situation: You are a graphic artist commissioned by the IATF to create a brochure that informs the people about the possible
ethical public behaviors during pandemic. You will provide the Do’s and Don’ts of an individual when going out in public places. In
the brochure you will also put your reaction towards the IATF guidelines implemented in the different parts of the country.
Product: Brochure
Teacher’s Name: Ailo Jhon A. Echavez Gmail Account: society.enacta@gmail.com
Degree: BS – Information Technology Contact number: 0936-036-7190|0951-878-8460
Facebook Account: www.fb.com/AJAEchavezOfficial
STUDENT’S NAME:
Performance Task: Blogging Site (Website)
11
EMPOWERMENT
TECHNOLOGIES
1st Quarter
(MODULE 1)
This handout will serve as
your copy for the whole
grading.
(DO NOT RETURN THIS
TO YOUR TEACHER)
Module Submission:
2. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 2
Standard: Rubric for Brochure
As the popular saying goes, "Love makes the world go round:' But before you start looking for someone to fall in love with, you
could argue how the Internet has made the world go round for decades. Likewise, in the motivation activity, the Internet has probably
made your world go round. In this lesson, we will understand how Information and Communication Technologies have improved our lives in
such a short period of time.
Lesson Coverage
★ ★ ★ ★ ★ ★ STOP ☞ ( Go to Update your Status and Pre-test in the Activity Sheet) ★ ★ ★ ★ ★ ★
Information and Communication Technology (ICT)
Information and Communication Technology (ICT) deals with the use of different communication technologies such as mobile
phones, telephone, Internet, etc. to locate, save, send, and edit information.
Whenwemake avideocall, weuse the Internet. When wesenda text ormakeacall,we use cellular networks. When we run out of load or
battery, we use payphones which use a telephone network. Having a unified way to communicate is one of the goals of ICT. In terms ofeconomics,ICT
hassavedcompaniesalotofresources(timeandmoney) withthekind of communication technology they use, nowadays. In a similar way, we spend less
CATEGORY 5 4 3 2 1
Attractiveness&
Organization
(Design)
The brochure has
exceptionally
attractive
formattingand
well-organized
information.
The brochure
has attractive
formattingand
well-organized
information.
The brochure
has some
formatting and
organized of
information.
The brochure's has
limited formatting
andorganization of
information.
The brochure
hasno
formatting and
organization of
material.
Content -
Accuracy/
Quantity
Use of facts and the
quantity of
informationis
exceptional.
Use of facts and
quantity of
informationis very
good.
Use of facts and
quantity of
informationis
good but not
consistent.
Use of facts and
quantity of
information is
presentbut limited.
Use of facts
andquantity
of
information is
limited.
Writing -
Organization
Brochure
has
exception
al
organizati
on
Brochure has
verygood
organization.
Brochure has
good
organization.
Brochure has
limited
organization
Brochure has
no
organization
Writing -
Grammar
There are no
grammatical
mistakesin the
brochure.
There are very
few grammatical
mistakesin the
brochure.
There are some
grammatical
mistakesin the
brochure.
There are
several
grammatical
mistakes in the
brochure.
Grammatical
mistakes are so
numerous that
thereadability
of the brochure
is
impaired.
Graphics/
Pictures
(Layout)
Graphics go well
withthe text and
there is agood mix
of text and
graphics.
Graphics go well
withthe text, but
there areso many
that they distract
from the text.
Graphics go well
with the text,
but there aretoo
few and the
brochure seems
"text-heavy".
Graphics do not go
with the
accompanying text
orappear to be
randomly chosen.
Graphics
not
present in
the
brochure.
Total: 25 Points
Lesson Title Learning Competency
1 Information and
Communication Technology
compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges
apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks
2 Applied productivity tools
with advanced application
techniques
uses common productivity tools effectively by maximizing advanced application
techniques
Introduction
Lesson 1| Information and Communication Technology
3. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 3
because of ICT. As it normally costs us a peso to send a text message or SMS, with the Internet, we can send multiple messages and only be charged
by a fraction.
ICT in the Philippines
Several international companies dub the Philippines as the " ICT Hub of Asia:' It is no secret that there is a huge growth of ICT-related jobs
around the country, one of which is the call center or BPO (Business Process Outsourcing) centers. Accordingtothe2013editionofMeasuringthe
InformationSocietybytheInternationalTelecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. That would mean
that for every 100 Filipinos you meet, there is a high chance that they have a cellphone and approximately for the seven of them, they have two.
In a data gathered by the Annual Survey of Philippine Business and Industries, NSO, in 2010, the ICT industry shares
19.3% of the total employment population here in the Philippines. To add to these statistics, Time Magazine's "The Selfiest Cities around the
World" of 2013 places two cities from the Philippines in the top 1 and top 10 spots. The study was conducted using Instagram, a popular photo
sharing application.
With these numbers, there is no doubt that the Philippines is one of the countries that benefits most out of ICT.
Web 2.0: Dynamic Web Pages
The Internet has been a vital tool to our modern lives that is why it is also important to make the best of the Internet.
When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the
page is "as is" and cannot be manipulated by the user. The content is also the same for all users. This is referred to as Web 1.0.
However, the World Wide Web is more than just static pages. Pretty soon, Web 2.0 came to the picture.
Web 2.0 is a term coined by Darcy DiNucci on January 1999. In her article titled, "Fragmented Future," she wrote:
The Web we know now, which loads into a browser window in essentially static screenfuls, is only an embryo of the Web to
come. The first glimmerings of Web 2.0 are beginning to appear, and we are just starting to see how that embryo might develop.
Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website differently than others. Examples of
Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications. Web 2.0 allows users to interact with
the page: instead of just reading a page, the user may be able to comment or create a user account. Web 2.0 also allows users to use web
browsers instead of just using their operating system. Browsers can now be used for their user interface, application software (or web applications),
and even for file storage. Most websites that we visit today are Web 2.0.
Features of Web 2.0
The key features of Web 2.0 include:
1. Folksonomy - allows users to categorize and classify/arrange information usingfreely chosen keywords (e.g., tagging).
Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is also
referred to as hashtag.
2. Rich User Experience - content is dynamic and is responsive to user's input. An example would be a website that shows
local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their
website.
3. User Participation - the owner of the website is not the only one who is able to put content. Others are able to place a
content of their own by means of comments, reviews, and evaluation. Some websites allow readers to comment on an
article, participate in a poll, or review a specific product (e.g., Amazon.com, online stores).
4. Long Tail - services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing
is better than file size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.
5. Software as a Service - users will subscribe to a software only when needed rather than purchasing them. This is a cheaper
option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows
the user to create and edit word processing and spreadsheet documents online. When you need a software, like a Word Processor,
you can purchase it for a one-time huge amount and install it in your computer and it is yours forever. Software as a service
allows you to "rent" a software for a minimal fee.
6. Mass Participation - diverse information sharing through universal web access. Since most users can use the Internet,
Web 2.0's content is based on people from various cultures.
Web 3.0 and the Semantic Web
The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The W3C standard encourages web developers to include
semantic content in their web pages. The term was coined by the inventor of the World Wide Web, Tim Berners-Lee. Lee also noted that the Semantic
Web is a component for Web 3.0.
According to the W3C, "The Semantic Web provides a common framework that allows data to be shared and reused across application,
enterprise, and community boundaries!' The aim of Web 3.0 is to have machines (or servers) understand the user's preferences to be able to
deliver web content specifically targeting the user. For example, when doing a web search in Web 2.0, the topmost result is based on the
preference of several users who already searched for the item. The search engine then labels it the most common answer to the search query.
Though there are instances wherein several preferences are considered like geographic location, Web 3.0 aims to do better. This is through studying
personal preferences of an individual user and showing results based on those preferences. The Internet is able to predict the best possible answers
to your question by "learning" from your previous choices.
For example, if you search the Internet for "Where is the best place to go shopping?" Web 3.0 will aim to give you results depending
on how you made choices in the past. If you have purchased several shoes online, the Internet will give you results on the best place with the
highest rated shoes around your vicinity.
4. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 4
Another example is when you search for the best restaurant to visit in a specific area. First, it may look for your previous visits from other
restaurants and if you have rated them whether good or bad. In return, Web 3.0 will search for restaurants that have a similar menu, good rating,
and budget that fit your preference in the past.
Web 3.0 is yet to be fully realized because of several problems:
1. Compatibility. HTML files and current web browsers could not support Web 3.0.
2. Security. The user's security is also in question since the machine is saving his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words "old" and "small" would depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring
to at a given time.
Trends in ICT
As the world of ICT continues to grow, the industry has focused on several innovations. These innovations cater to the needs of the
people that benefit most out of ICT. Whether it is for business or personal use, these trends are the current front runners in the innovation
of ICT.
Convergence
Technological convergence is the synergy of technological advancements to work on a similar goal or task. For example, besides
using your personal computer to create word documents, you can now use your smartphone. It can also use cloud technologies to sync files
from one device to another while also using LTE technology which means you can access your files anytime, anywhere. Convergence is
using several technologies to accomplish a task conveniently.
Social Media
Social media is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange
user-generated content. According to Nielsen, a global information and measurement company, Internet users spend moretimeinsocial
media sites than in anyothertype ofsite.Withthis,more andmore advertisers use social media to promote their product.
There are six types of social media:
Social Networks. These are sites that allow you to connect with other people with the same interests or background. Once a
user creates his or her account, he or she can set up a profile, add people, create groups, and share content. Examples: Facebook
and Google+
Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources. Most of these sites
allow you to create a tag that allows you and others to easily search or share them. Examples: StumbleUpon and Pinterest
Social News. These are sites that allow users to post their own news items or links to other news sources. The users can also
comment on the post and comments may alsobe ranked.They are alsocapable of votingon these newsarticlesof the website. Those
who get the most amount of votes are shown most prominently. Examples: reddit and Digg
Media Sharing. These are sites that allow you to upload and share media content like images, music, and video. Most of these sites
have additional social features like liking,commenting,andhavinguserprofiles. Examples:Flicker,YouTube,and Instagram
Microblogging.Theseare sites that focus on short updates from the user. Thosesubscribed to the user will be able to receive these
updates. Examples: Twitter and Plurk
Blogs and Forums. These websites allow users to post their content. Other users are able to comment on the said topic. There are
several free blogging platforms like Blogger, WordPress, and Tumblr. On the other hand, forums are typically part of a certain website
or web service.
Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability
to do tasks that were originally found in personal computers. Several of these devices are capable of using high-speed Internet.
Today, the latest mobile devices use 4G Networking (LTE), which is currently the fastest mobile network. Also, mobile devices use
different operating systems:
iOS - used in Apple devices such as the iPhone and iPad
Android - an open source operating system developed by Google. Being open source means several mobile phone companies
use this OS for free.
Blackberry OS - used in Blackberry devices
Windows Phone OS - a closed source and proprietary operating system developed by Microsoft®
Symbian the original smartphone OS; used by Nokia devices
WebOS - originally used for smartphones; now used for smart TVs
Windows Mobile - developed by Microsoft® for smartphones and pocket PCs
Assistive Media
Assistive media is a nonprofit service designed to help people who have visual and reading impairments. A database of audio
recordings is used to read to the user. You may visit http://www.assistivemedia.org/ for several of their audio recordings.
Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with
the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most
things in this world, there is always the “other side of the coin." The Internet is one of the most dangerous places, especially if you do
not know what you are doing with it. But there is no need to worry; it is never that late. Hopefully, by the end of this lesson,
you are able to consider how you go about your use of the Internet.
Let us visit each item and see how risky it is to share them.
5. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 5
The
Internet is
defined as
the information
superhighway. This means that anyone has access to this highway, can place information, and can grab that information. Any
information, even things that you have set privately, can be accessed one way or another. This is why social networking sites like
Facebook continue to improve their security features. Thethreatofcybercrimeisveryreal.Whileyoumaynotexperiencethethreatnow,
whateverinformation we share today could affect our future.
Tips to Stay Safe Online
The Internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using the Internet.
Be mindful of what you share online and what site you share it to.
Do not just accept terms and conditions; read it.
Check out the privacy policy page of a website to learn how the website handles the information you share.
Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan
your profile.
Do not share your password with anyone.
Avoid logging in to public networks/Wi-Fi. Browsing in "incognito (or private) mode," a feature of the browser, will not protect
you from hackers.
Do not talk to strangers whether online or face-to-face.
Never post anything about a future vacation. It is similar to posting, "Rob my house at this date."
Add friends you know in real life.
Avoid visiting untrusted websites.
Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts.
If you have a Wi-Fi at home, make it a private network by adding a password.
Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the
download is most likely not monitored by the site owner.
Typeofinformation Risks
First name There is a risk in sharing your first name. Chances are, a hacker may already
know plenty of stuff about you even if you only give out your first name.
Likewise, you cannot just walk in a room and start introducing yourself to
everyone. You do not know whom you can come across with.
Last name If sharing your first name is a small risk, having both your first and last is
riskier. You will be vulnerable to being searched for using search engines,
which include image search. Matching a name with a face is a modus to
several cybercrimes like identity theft.
Middle name Sharing your middle name alone is probably not the most risky of these
shared information, but sharing your full name would be.
Current and
previous school(s)
Most people who steal identities study their subject. They can use
this information for verification purposes.
Your cellphone
number
Your cell phone number should never be posted over the Internet. The
Internet is a public place. It is the same as posting your number on a
billboard. You would not-want random strangers to text or call you, or
worse, pretend that they are someone else.
The name of your
mother and father
Risky, yet not as risky as posting their full names, especially your
mother's maiden name. In fact, you may have already encountered
many websites that require your mother's maiden name as an answer to
a secret question whenever you lose your password.
The name of your
siblings
Disclosing this is a huge risk. Strangers may pretend or use their identity
to dupe you.
Your address Hopefully, you answered "no" to this one. Giving the Internet your
number is one thing; giving them your address is a whole other level. It
would be much easier for criminals to find you.
Your home phone
number
This shared information is riskier than sharing your personal phone
number. Scams usually use this information to deceive you, one of which
is when a stranger pretends to know your parents or pretends to be you.
Your birthday Letting people know your birthday is probably a must if you want to get
as many gifts as possible. But having it in your profile makes you
vulnerable to identity theft.
6. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 6
Buy the software; do not use pirated ones.
Do not reply or click links from suspicious emails.
Most people would dispute that there is no such thing as private over the Internet and they may be right. There are hackers who
can find a backdoor even if your profile is already set to private. You have no control of whoever is looking at your friend's screen
whenever they open your profile or chat with you. You have no control over people getting access to your friend's account and
seeing your private stuff.
We cannot assure and proclaim that following tips to stay safe online can keep us out on danger on
online world. But all we can assure and proclaim 100% is that if we have in GOD’s hand, we are all 100% safe
and 100% be guided through the right path.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware - stands for malicious software
a. Virus - a malicious program designed to replicate itself and transfer from one computer to another either through
the Internet and local networks or data storage like flash drives and CDs
b. Worm - a malicious program that transfers from one computer to another by any type of means. Often, it uses a
computernetworktospreaditself.Forexample, the ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c. Trojan - a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information
*Rogue security software - tricks the user into posing that it is a security software. It asks the user to pay to improve
his/her security but in reality, they are not protected at all.
d. Spyware -a program thatruns in thebackgroundwithout you knowingit(thuscalled"spy").Ithastheabilitytomonitor
what you are currently doing and typing through keylogging.
*Keyloggers - used to record the keystroke done by the users. This is done to steal their password or any other
sensitive information. It can record email, messages, or any information you type using your keyboard.
e. Adware - a program designed to send you advertisements, mostly as pop-ups
2. Spam - unwanted email mostly from bots or advertisers. It can be used to send malware
3. Phishing - Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending
you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal
information.
4. Pharming - a more complicated way of phishing where it exploits the DNS (Domain NameService) system.
Protecting Reputations Online
In the past, doing something embarrassing was not much of a big deal. It happened; people would laugh at it, and they would move on.
Nowadays, embarrassing moments are captured using any device you could imagine. What is worse is that people can easily upload it to
the Internet, where it can be stored forever. This could impact not only your reputation but also the people around you. What is worse is
that people tend to ignore this fact, and suffer from it later in their life.
Once you post something over the Internet, search engines keep them in their archives for search results. This makes anything you
post to last forever even if you delete it in your page. Something you and your friends find funny today may be something that could harm
someone's reputation later.
Before hiring, companies do a background check on the applicant, and the easiest way to check your background is to visit
pages that are related to you. Thus, if they find disreputable information about you, it may harm your reputation even if this
information has been discarded.
Think Before You Click
Here are things you might want to consider before posting something over the Internet:
Before you post something on the web, ask these questions to yourself: Would you want your parents or
grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have
no control of who sees your posts.
Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
Set your post to "private." In this way, search engines will not be able to scan that post.
Avoid using names. Names are easy for search engines to scan.
If you feel that a post can affect you or other's reputation, ask the one who posted it to pull it down or report it as
inappropriate.
We all know that 100% we are secured when we are in GOD’s hand, but we cannot avoid that there are
many temptations in this earth just like in the internet, there are also Threats but According to James
4:7 “Submit yourselves, then, to God. Resist the devil, and he will flee from you.”.
Copyright Infringement
If you create something—an idea, an invention, a form of literary work, or a research, you have the right as to how it should
be used by others. This is called intellectual property. In other words, the copyright law includes your rights over your work, and
IFL
IFL
7. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 7
anyone who uses it without your consent is punishable by law. Try grabbing any book then browse its first few pages and you will find
a page with a disclaimer with the words: "No part of this book may be copied, reproduced..."That is a copyright page.
As a responsible user of the Internet, you have to consider that not everything out there is free for you to use. Just like your
own, contents that you see from websites have their respective copyrights. There are several instances where employees or business
owners face copyright infringement and are sentenced to a huge fine due to reckless copying of materials.
Here are some tips that could help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics),
choreography, andsculptures, but it generally doesNOT protect underlying ideas and facts. This means that you can
express something using your own words, but you should give credit to the source.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense against copyright.
Be responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you or something made
from somebody else's creativity. It is important to add your own creative genius in everything that will be
credited to you.
4. Know the law. There are some limitations to copyright laws. For instance, in the Philippines, copyrights
only last a lifetime (of the author) plus 50 years. There are also provisions for "fair use" which
mean that an intellectual property may be used without a consent as long as it is used in
commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching,
and education. If you have doubts that what you are doing does not fall under the policy of fair
use, seek permission first.
Another misconception is that fan-fiction is not copyright infringement. In reality, it is and some copyright
holders ignore them but they can opt to use their rights.
Online search
Online search is the process of interactively searching for and retrieving requested information via a computer
from databases that are online. Interactive searches became possible in the 1980s with the advent of faster databases
and smart terminals.
Advantages:
• Ability to obtain a large sample, which increases statistical power
• Data is automatically coded so no data entry errors
• Reduced cost of conducting research
Disadvantages:
• Online is not totally secure and theft is one of the numerous danger it poses, researchers personal information is at
risk of being access by rogue persons.
• Some of the materials on the internet have not been evaluated by experts or thoroughly screened.
• Lack of accreditation and low quality
Mail Merge and Label Generation Mail Merge
One of the important reasons in using computers per se is its ability to do recurring tasks automatically. But this ability has to be
honed by learning the characteristics and features of the software you use with your computer. After all, no matter how good or
advance your computer and software may be, it can only be as good as the person using it.
In this particular part of our lesson, we will learn one of the most powerful and commonly used features of Microsoft® Word called
"Mail Merge." As the name suggests, this feature allows you to create documents and combine or merge them with another document
or data file. It is commonly used when sending out advertising materials to various recipients.
The simplest solution for the scenario above is to create a document and just copy and paste it several times then just replace the details
depending on whom you send it to. But what if you have hundreds or thousands of recipients? Would not that take too many hours? What if you
have a small database of information where you can automatically generate those letters?
Mail merging basically requires two components: the document that contains the message and the document or file that generally
contains the list of names and addresses, as in our scenario. When these two documents arecombined (merged) during mail merging, feed your
printer with enough paper until all mailers are printed out. Each document includes the individual names and addresses you need to send
it to.
Let us assume this is the mailer that you would want to send:
Lesson 2| Applied productivity tools with advanced application techniques
Sample Form Document
8. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 8
Two Components of Mail Merge
1. Form Document
Our sample letter above is what we call a form document—the first component of our mail merged document. It is
generally the document that contains the main body of the message we want to convey or send. The main body of the
message is the part of the form document that remains the same no matter whom you send it to from among your list.
Also included in the form document is what we call place holders, also referred to as data fields or merge fields. This marks the
position on your form document where individual data or information will be inserted. From our sample document, the place
holders are denoted or marked by the text with double-headed arrows (« ») on each side and with a gray background. On a
printed standard form, this will be the underlined spaces that you will see and use as guide to where you need to write the
information that you need to fill out. In its simplest form, a form document is literally a "form" that you fill out with individual
information. A common example of a form document is your regular tax form or application form. Then there is also a form letter
which is exactly like the one in our example above.
2. List or Data File
The second component of our mail merged document is the list or data file. This is where the individual information or
data that needs to be plugged in (merged) to the form document is placed and maintained. One of the best things about the
mail merge feature is that it allows data file to be created from within the Microsoft® Word application itself, or it gets data from a file
created in Microsoft® Excel or other data formats. In this way, fields that needed to be filled up on the form document can easily be
July 28, 2020
<<Name>>
<<Company>>
<<Address Line 1>>
<<Address Line 2>>
<<Address Line3>>
Dear <<Title>>,
We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified! Being one of
our loyal customers. we would like to thank you for trusting and carrying our product line in your store.
Included in this promo kit are the mechanics of our promo and the catalog from where you can see and choose from
our exciting new products.
Please do not hesitate to contact us should you have further inquiries regarding the details of the promo or about any
of the new products in our catalog. We look forward to doing more business with you.
Again: thank you very much and more power.
Your partner in merchandising.
Red Dragon. Inc.
9. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 9
maintained without accidentally altering the form or main document. You can easily add, remove, modify, or extract your data
more efficiently by using other data management applications like Excel or Access and import them in Word during the mail
merge process.
Label Generation
Included in the mail merge feature on Microsoft® Word is the Label Generator. It just makes sense that after you print out your
form letters, you will need to send it to individual recipients in an envelope with the matching address printed directly on the
envelope or on a mailing label tostick on. By using virtually, the same process as a standard mailmerge, Microsoft' Word will print individual
addresses to a standard form that it has already pre-formatted. Simply put, it creates a blank form document that simulates either a
blank label or envelope of pre-defined size and will use the data file that you selected to print the information, typically individual
addresses. So even in generating labels, the two essential components of creating a merged document are present: the form document
and the data file. Only in this case, you did not have to type or create the form document yourself because it was already created and pre-
formatted in Microsoft® Word. All you need to do is select the correct or appropriate size for the label or envelope and select the data file that
contains the addresses (data) to be printed. You can also preview your merged labels before printing if you want to.
✓Learning Competency: Uses common productivity tools effectively by maximizing advanced application techniques.
✓Learning Outcome: Create a simple mail merge document using common productivity tool such as Microsoft word.
Now that we have learned the components needed to accomplish a successful mail merge, let us put theory into practice. Let us take a
look at the steps to create a simple mail merge document.
Following our scenario, take the following steps to create and merge a simple covering letter to a list of names that you were tasked to send
the letters to. To prepare for this activity, let us build a list of at least ten names of people with their corresponding title, company name, and
address. You may use the following fields: title, name, company, address line 1, address line 2, and address line 3. Refer to the table on the next
page for the format of the list as an example. You may just write down your list on a piece of paper to make it handy and available when you
need it during the course of this activity. Exchanging names and addresses with your classmates could be a good idea to build your list quickly.
Steps in creating a simple mail merge:
Step 1. Open Microsoft° Word and start a new blank
document. You can use the keyboard shortcut Ctrl+N
after Microsoft' Word has been loaded or opened.
Step 2. On the Mailings tab, from the Start
Mail Merge group, choose Start Mail Merge—
►Letters.
Type the letter below. You will be typing in only the
common parts of the letter. The text that does not change
for each copy you print.
Title Name Company Address Address Address
Sir Arnold Reyes ABC Inc. 23 Sierra St. Alabang Muntinlupa City
Madam Maria Santos XYZ Corp. 45 Oro Drive San Juan Metro Manila
… … … … … …
Activity no. 1: Mail Merge and Label Generation
10. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 10
Step 3.
Save your letter and name it "Sample Letter:'
Step 4. Insert the fields you need in the letter (Name,
Company, Address Line 1, Address Line 2, Address Line 3, and Title). You may want to make special markings on these fields
as you are typing it. Most common marking you can do is by typing it in capital letters or ALL CAPS so you can easily identify them
later.
July 28, 2020
Dear ,
We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified! Being
one of our loyal customers. we would like to thank you for trusting and carrying our product line in your
store.
Included in this promo kit are the mechanics of our promo and the catalog from where you can see and
choose from our exciting new products.
Please do not hesitate to contact us should you have further inquiries regarding the details of the promo or
about any of the new products in our catalog. We look forward to doing more business with you.
Again: thank you very much and more power.
Your partner in merchandising.
Red Dragon. Inc.
July 28, 2020
NAME
COMPANY
ADDRESS LINE 1
ADDRESS LINE 2
ADDRESS LINE 3
Dear TITLE,
We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified!
Being one of our loyal customers. we would like to thank you for trusting and carrying our product
line in your store.
Included in this promo kit are the mechanics of our promo and the catalog from where you can see and
choose from our exciting new products.
Please do not hesitate to contact us should you have further inquiries regarding the details of the promo
or about any of the new products in our catalog. We look forward to doing more business with you.
Again: thank you very much and more power.
Your partner in merchandising.
Red Dragon. Inc.
11. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 11
Step 5. Save the main document once more. You can use Ctrl+S to quickly do
this step.
Step 6. On the Mailings tab in the Start Mail Merge group, choose Select
Recipients Type a New List.
Step 7. Click the Customize Columns button on the dialog box for
the New Address List.
* This will allow you to modify the fields in the address list
that Microsoft word has pre-determined.
Step 8. Select a field that you do not need then click the Delete
button. A confirmation dialog box appears.
Step 9. Click Yes in the confirmation dialog box. The dialog box closes, and the unnecessary field
disappears.
Step 10. Repeat steps 8 and 9 for each field you do not need. After removing the excess fields, the next step is
to add the fields you need.
Step 11. To add a field that you need in your
document, click the Add button.
Step 12. Type the field name on the prompt inside
a small Add Field dialog box and click the OK
button.
Step 13. Repeat steps 11 and 12 for each new field
you need in your main document.
Step 14. Click the OK button on the Customize Address List dialog box to confirm your changes.
Step 15. The New Address List dialog box will appear again ready for you to type in your data.
Step 16. Type the individual data from your list corresponding to Name, Company, Address Line 1, Address Line 2,
Address Line 3, and Title.
Step 17. Press the Tab key each time to enter the next field.
Step 18. To add a new record, press the Tab key after inputting the last field. When you press the Tab key
on the last field in a record, a new record is automatically created and added on the next line.
Step 19. Repeat steps 16 through 18 until you enter all the records you want.
Once you are done typing
your data, click the OK button on the
Add New List dialog box to save your
data. A special Save Address List
dialog box pops up, allowing you to
save the recipient list.
Step 20. Type a name for the address
list. Name it "Client List."
Step 21. Click the Save button. You
should be back on your main document
soon after.
Step 22. Select a field placeholder
(ALL CAPS) in the main document.
Step 23. Click the Insert Merge
Field command button.
Step 24. Choose the proper field to
insert into your text. For example, if
you are replacing the text name in
12. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 12
your document with a name field, choose the Name Field from the Insert
Merge Field menu. The field is inserted into your document and
replaces the ALL CAPS text.
Step 25. Continue adding fields until the document is complete. Repeat
steps 22 through 24 as necessary to stick all fields into your document.
Step 26. Save the main document.
Step 27. Choose Finish & Merge to edit, print, or send your merged documents
through email.
Step 28. Or you may want to choose Preview
Results to check your work before you send it.
Step 29. You should get a merged document close to this one:
If you
decide to print the document, the Merge to Printer dialog box appears, from which you can choose records to
print. Choose All to print your entire document. Alternatively, you can specify which records to print. Click OK. The
traditional Print dialog box appears. Click the OK button again to print your documents.
Step 30. Save and close your document. Congratulations, you have just created a simple mail merge document.
Integrating Images and External Materials
Integrating or inserting pictures in your document is fun and it improves the impression of your document. A common
use of inserting a picture on a document is when you are creating your resume. Though seemingly simple to do, your
July 28, 2020
Arnold Reyes
ABC Inc.
23 Sierra St.
Alabang
Muntinlupa City
Dear Sir,
We would like to announce and invite you to avail of our 3rd quarter promo, for which you are
qualified! Being one of our loyal customers. we would like to thank you for trusting and
carrying our product line in your store.
Included in this promo kit are the mechanics of our promo and the catalog from where you can
see and choose from our exciting new products.
Please do not hesitate to contact us should you have further inquiries regarding the details of the
promo or about any of the new products in our catalog. We look forward to doing more
business with you.
Again: thank you very much and more power.
Your partner in merchandising.
Red Dragon. Inc.
13. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 13
knowledge on the different kinds of materials that you can insert or integrate in a Word document and its characteristics can help
you create a more efficient, richer document not only in content but also in physical form. A better understanding of the physical form
of your document as well as the different materials you integrate in it would allow you to be more efficient and versatile in using
Microsoft® Word.
Let us consider the interesting aspects of inserting or integrating images and other external materials which is
categorized as an advanced feature.
Kinds of Materials
There are various kinds of materials Microsoft' Word is capable of integrating to make your documents richer, more impressive, and
more informative.
The screenshot above shows the kinds of materials that can be integrated or inserted in your Microsoft® Word document. One can
easily get excited and instead create a collage of what is generally called images and arts rather than an enriched text document. One
important thing to remember is that images and other materials are not to be inserted as images for design purposes only, but they are
used to enhance or improve the effectiveness of the message you want to convey. Let us describe each of them.
1
. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in any local storage device. There
are three commonly used types of picture files. You can identify them by the extension on their file names.
a. .JPG. This ispronouncedas"jay-peg," andistheshort form for .jpegorJoint Photographic Experts Group. Like all the rest of
the image file extensions, it identifies the kind of data compression process that it uses to make it more compatible
and portable through the Internet. This type of image file can support 16.7 million colors that is why it is suitable for
use when working with full color photographic images. Unfortunately, it does not support transparency and therefore,
images of this file type can be difficultto integrateintermsofblending withothermaterialsorelementsinyourdocument.
But if you are looking for the best quality image to integrate with your document, then this is the image file type for
you. JPG does not work well on lettering, line drawings, or simple graphics. .JPG images are relatively small in file size.
b. .GIF. This stands for Graphics Interchange Format. This type of image file is capable of displaying transparencies.
Therefore, it is good for blending with other materials or elements in your document. It is also capable of displaying
simple animation. Apparently, this may not be too useful on a printed document but if you are sending documents
electronically or through email, or even post documents into a website, then this could be quite impressive. The
downside is that it can only support up to 256 colors so it is good mostly on logos and art decors with very limited,
and generally solid colors. .GIF is much better for logos, drawings, small text, black and white images, or low-
resolution files.
c. .PNG. This is pronounced as "ping." It stands for Portable Network Graphics. It was built around the capabilities of .GIF.
Its development was basically for the purpose of transporting images on the Internet at faster rates. It is also good with
transparencies but unlike. GIFs, it does not support animation but it can display up to about 16 million colors, so
image quality for this image file type is also remarkably improved. .PNG allows the control of the transparency level or
opacity of images.
2. Clip Art. This is generally a .GIF type; line art drawings or images used as generic representation for ideas and objects that you might want
to integrate in your document. Microsoft® Word has a library of clip arts that is built in or can be downloaded and used freely. There
are still other clip arts that you can either purchase or freely download and use that come from third-party providers.
3. Shapes. These are printable objects or materials that you can integrate in your document to enhance its appearance or to allow you to
have some tools to use for composing and representing ideas or messages. If you are designing the layout for a poster or other
graphic material for advertising, you might find this useful.
4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form ideas that are organizational or
structural in nature. If you want to graphically represent an organization, process, relationships, or flow for infographic documents, then
you will find this easy and handy to use.
5. Chart. Another type of
material that you can
integrate in your Word document that allows you to represent data characteristics and trends. This is quite useful when you are
preparing reports that correlate and present data in a graphical manner. You can create charts that can be integrated in your document
either directly in Microsoft' Word or imported from external files like Microsoft® Excel.
6. Screenshot. Sometimes, creating reports or manuals for training or procedures will require the integration of a more realistic image
of what you are discussing on your report or manual. Nothing can get you a more realistic image than a screenshot. Microsoft' Word
even provides a snipping tool for your screen shots so you can select and display only the part that you exactly like to capture on
your screen.
Image Placement
In practice, inserting an image or any other material in your document is quite easy especially if the material already exists in your
local storage device. It is just a matter of opening up the image file through the Microsoft' Word dialog box or wizard. Sometimes, if
the image you would like to insert is on a web page currently displayed on your screen, it could be copied and pasted. The real challenge
Figure 3. Wrap Text drop-down menu in Word 2010 showing the preset options
14. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 14
is where to put the image you inserted or where tomove it.Inthispart ofthe lesson, wewillstudy thedifferentcharacteristicsoftext wrapping
options that you can use with the image you integrated in your document.
1
. In Line with Text. This is the default setting for images that are inserted or integrated in your document. It treats your
image like a text font with the bottom side totally aligned with the text line. This setting is usually used when you need to place
your image at the beginning of a paragraph. When placed between texts in a paragraph or sentence, it distorts the overall
appearance and arrangement of the texts in the paragraph because it will take up the space it needs vertically, pushing whole lines
of texts upward as in the example below.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae;
Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum
elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis
omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae;
Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum
elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis
omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus
2. Square. This setting allows the image you inserted to be placed anywhere within the paragraph with the text going around
the image in a square pattern like a frame.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim
in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida,
quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut
venenatis purus
3. Tight. This is almost the same as the Square setting, but here the text "hugs" or conforms to the general shape of the image.
This allows you to get a more creative effect on your document. This setting can mostly be achieved if you are using an image that
supports transparency like a .GIF or .PNG file.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim
in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida,
quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut
venenatis purus.
4. Through. This setting allows the text on your document to flow even tighter, taking the contours and shape of the image. Again,
this can be best used with a .GIF or .PNG type of image.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim
in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla
gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui.
Donec ut venenatis purus.
5. Top and Bottom. This setting pushes the texts away vertically to the top and/or the bottom of
the image so that the image occupies a whole text line on its own as in the example.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim
in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus
suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus.
6. Behind Text. This allows your image to be dragged and placed anywhere on your document but with all the texts
floating in front of it. It effectively makes your image look like a background.
Example:
15. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 15
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in
sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut
quis egestas neque, vitae sagittis dui. Donec ut venenatis purus.
7. In Front of Text. As it suggests, this setting allows your image to be placed right on top of the text as if your
image was dropped right on it. That means whatever part of the text you placed the image on, it will be covered by
the image. In our example below, notice the difference between using a .PNG file (on the left) with a transparency
effect, and a JPG file on the right.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in
sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut
quis egestas neque, vitae sagittis dui. Donec ut venenatis purus.
The Bible is a written word the very essential document we have to keep.
Creating an Effective Presentation
Designing your presentation is the fun part of creating a report for it gives you a chance to be creative. Placing animations,
transitions, and art could be on your mind right now. But whether or not these features would help is generally up to you. Sometimes, these
things could actually distract your audience rather than help you. Here are some quick tips in creating an effective presentation.
1. Minimize. Keep slide counts to a minimum to maintain a clear message and to keep the audience attentive. Remember that the
presentation is just a visual aid. Most information should still come from the reporter.
2. Clarity. Avoid being fancy by using a font style that is easy to read. Make sure thatitisalsobigenoughtobereadbytheaudience.
Onceyou startmakingyour presentation, consider how big the screen is during your report.
Tip: A font size of 72 is about an inch (depends on the screen size). A one-inch letter is readable 10 feet away; a two-inch letter
is readable 20 feet away.
3. Simplicity. Use bullets or short sentences. Summarize the information on the screen to have your audience focus on what the
speaker is saying than on reading the slide. Limit the content to six lines and seven words per line. This is known as the 6 x 7 rule.
4. Visuals. Use graphics to help in your presentation but not too many to distract the audience. In addition, instead of using a
table of data, use charts and graphs.
5. Consistency. Make your design uniform. Avoid having different font styles and backgrounds.
6. Contrast. Use light font on dark background or vice versa. This is done so that it is easier to read. In most instances, it is easier to
read on screen if the background is dark. This is due to the brightness of the screen.
* Sample output for a serenade service.
IFL
16. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 16
As you can see from the sample presentation, not all information is presented in the visual aid.
Using Hyperlinks in Microsoft® PowerPoint
Using hyperlinks in your presentation is an easy way to navigate slides during your presentation. In your group's case, it may
be wise to insert action buttons for most slides or ace hyperlinks to your Excel file in case your audience asks a specific question.
Ways to insert hyperlinks:
1
. Open a PowerPoint application and type any Words. Select an object or highlight a text.
17. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 17
2. Go to Insert > Hyperlinks (under links category) or use the shortcut key Ctrl + K
The Insert Hyperlink dialog box would appear.
Link to options:
a. Existing File or Web
Page - creates a
hyperlink to website or a
local file saved in your
hard drive. Just browse
your file in the dialog
box or type the web
address.
b. Place in This Document
- creates a hyperlink that allows you to jump to a specific slide in your presentation
c. Create a New Document - creates a hyperlink that once clicked, creates a new document
on your specified location
d. E-mail Address - creates a hyperlink that opens Microsoft' Outlook that automatically adds
your specified recipient on a new email
3. For example, you choose the Existing File or Web Page. When done, click OK to apply your hyperlink.
Embedding Objects in Microsoft' PowerPoint
Embedding objects is easy using Microsoft® PowerPoint. With this option, you
can insert an Excel file that would look like a table to a presentation.
Embedding an Excel File to your Slide presentation
1. Go to the Insert tab.
18. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 18
2. On the Text group, click on Object.
3. The Insert Object dialog box would appear:
Options:
a. Creates New - creates a new file from scratch. You can select on a wide
variety of files listed.
b. Create from File - creates a file from an existing file saved on your hard
drive; simply browse the file to use it. Putting a check on the "link" option will allow you
to modify the Excel file inside your presentation.
4. Once you are done, click OK.
Emphasizing ideas as we relate ourselves to this we are the living word that are easily seen by people
just like PowerPoint presentation we only present highlights of the documents. In the same way the way we treat
other people is easily highlighted.
Spreadsheet Skills
Estimating the Product Cost using Microsoft® Excel
Let us assume that we are going to sell milk tea with the following information:
ProductInformation
ProductName/Brand:StarbukoOrganic MilkTea
Company/Group Name:Starbuko FoodsCorporation
Product Description: Starbuko MilkTeais aspecialmilk tea usingorganic ingredients especiallymade for Filipinos.
Ingredients/Materials:Organic tea, water,condensedmilk, ice, specialsweetener
Estimated Sale Price: 25PHP percup
We will use Microsoft' Excel to find out if our estimated sale price is reasonable considering the actual price of the ingredients.
1. Copy the information below:
Note: Values with PHP or Philippine peso sign use the Accounting Number format. Its default uses the dollar symbol ($). To
change this, click the drop-down arrow at the currency button then select More Accounting Formats, then change the symbol to
PHP.
IFL
19. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 19
2. Use the SUM formula to get the summation of the values
from C4 to C7. The SUM formula is =SUM (C4:C7). Type this on
cell C8 as shown below:
3. Check if our estimated price will earn us profit. Type the
additional information shown below then apply the
arithmetic formula for subtraction:
4. The result is PHP2.20. Our estimated price is not profitable.
Let us make an adjustment. Include the information below and
deduct the Total from the New Sale Price:
5. The result is PHP7.80. This is definitely profitable at this price.
However, this does not guarantee our product's success.
6. Save your file as L4 Cost of Ingredients.xlsx.
Excel-is like the word of God if you are looking for complete and accurate truth you just turn to his words.
★ ★ ★ ★ ★ ★ STOP ☞ ( Go to Activity 2: Valuing ICT & Post-test ) ★ ★ ★ ★ ★ ★
(2016). Empowerment Techologies. Quezon City: Rex Book Store.
REFERENCE USED IN THIS LESSON
s
IFL
20. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 20
MINDANAO MISSION ACADEMY
of Seventh-day Adventists, Inc.
The School that Offers Something Better
Manticao, Misamis Oriental
• • ACTIVITY SHEETS • •
STUDENT’S NAME: CONTACT #: SCORE:
Update your Status
Instruction: Before you will explore what is Information Technology all about, update your Status First by using Facebook application. Write
your status in the space provided below. You can write what you are feeling right now or you may also write what you wanted to know about
information technology. You can use hashtags and emoticons if you want.
Pre-test
Let’s find out how much you already know about this module.
A. Instruction: Identify what is being asked. Write your answer on the space before each number.
B. Instruction: Define each word according to what you already know. Write your answers on the space provided. 5 points each.
1. Information -
2. Technology -
✓Learning Competency: Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class
objectives or address situational challenges.
✓Learning Outcome: Differentiate the three essential Microsoft applications.
___________ 1. Is a website, application, or online channel that enables web users to create, co-create, discuss, modify,
and exchange user-generated content.
___________ 2. It treats your image like a text font with the bottom side totally aligned with the text line.
___________ 3. Allows users to categorize and classify/arrange information usingfreely chosen keywords (e.g., tagging).
___________ 4. This is generallya .GIF type;line art drawingsor images used as generic representation for ideas and objects that
you might want to integrate in your document.
___________ 5. Another type of material that you can integrate in your Word document that allows you to represent data
characteristics and trends.
___________ 6. This allows your image to be dragged and placed anywhere on your document but with all the
texts floating in front of it.
___________ 7. Is the process of interactively searching for and retrieving requested information via a computer from
databases that are online.
___________ 8. Basically requires two components: the document that contains the message and the document or file
that generally contains the list of names and addresses, as in our scenario.
___________ 9. These are printable objects or materials that you can integrate in your document to enhance its
appearance or to allow you to have some tools to use for composing and representing ideas or messages.
___________ 10. A more complicated way of phishing where it exploits the DNS (Domain NameService) system.
RETURN THIS TO YOUR
TEACHER
Module Submission:
11
EMPOWERMENT
TECHNOLOGIES
1st Quarter
(MODULE 1)
21. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 21
Instruction: Using Triple Venn Diagram, compare Microsoft Word, PowerPoint and Excel. Write down their similarities and
differences in the space. You may use the diagram below for your guide.
Guide:
Answer:
Activity no. 2: Venn Diagram
*Similarities of
Excel and
PowerPoint
Microsoft Excel
Microsoft PowerPoint
*Similarities of
Word and
PowerPoint
*Similarities of
Word,
PowerPoint
and Excel
Microsoft Word
*Similarities of
Word
and Excel
22. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 22
Post-test
Let’s find out how much you have learned about this module.
A. Instruction: You are going to fill out the space provided for KWL Chart.
TOPIC: Information and Communication Technology & Applied productivity tools with advanced application techniques
KWL Chart
What I KNOW What I WANT to Know What I LEARNED
(Use this space to discuss your background
knowledge about the topic.)
(Look at what you already know and note
some of the questions sparked by your
background knowledge.)
(Summarize your learning here and note
whether the lesson answered the
questions you had at the beginning.)
B. Instruction: Make a short discussion for each item. Write your answer in the space provided.
1. Sharing my username and password to anyone.
Answer:
2. Putting all the content on the PowerPoint presentation rather than putting the key points and simplifying the content.
Answer:
3. Keeping my information public on social media such as home address, contact number and other important information.
Answer:
4. Installing an anti-virus on my computer.
Answer:
✦ ✦ (Congratulations! You are done for 1st quarter 1st Module, you are now ready to learn for the next lessons (Imaging and Design
for the Online Environment) ✦ ✦