SlideShare a Scribd company logo
1 of 22
MINDANAO MISSION ACADEMY
of Seventh-day Adventists, Inc.
The School that Offers Something Better
Manticao, Misamis Oriental
• • LEARNING MODULE FOR EMPOWERMENT TECHNOLOGIES • •
HOW ARE YOU GOING TO LEARN?
ICONS DESCRIPTION
When you see this icon, it signals that you are to do a task classified as performance task. This is now a transfer
of the knowledge that you learn from the lessons. This task merits the highest percentage in the grading system.
This icon gives you an overview of the lesson that you will be learning. It is an introduction of the lesson and a
recall of your prior knowledge regarding the topic.
This icon gives you important lessons, core values integrated in the lessons. These are important concepts and
strategies that will help you in life.
You will find this icon before some chunks of text in the following pages. It tells you to carefully study the
concepts, principles, or processes discussed in the text. It also tells you that there is a question to answer or an
idea to think about it.
✎
This icon gives you important instructions to note and follow. Read every detail of instructions so you can follow
them precisely.
You will find this icon at the end of every topic. It signals a self-test to determine how well you have achieved the
objectives set in the unit. Study the lesson well and you will perform quite well in the self-test. This will be
submitted to your teacher after you answering the self-test. Write legibly and always follow instructions properly.
☞
This icon directs you to the specific activity which you need to answer and specific lesson for you to refer to as
you answer the activity.
Content Standard: The learner demonstrates understanding of:
 ICT in the context of global communication for specific professional track
 the use of advanced tools and techniques found in common productivity and software applications in developing ICT
content for specific professional tracks
Performance Standard: The learner is able to:
1. at the end of the 2-week period independently compose an insightful reflection paper on the nature of ICT in the context
of their lives, society, and professional tracks (Arts, TechVoc, Sports, Academic)
2. at the end of the 2-week period independently apply advanced productivity tools to create or develop ICT content for use
in specific professional tracks. These may be in the form of, but not limited to:
 Calculating spread sheet of athletic statistics (Sports)
 Layout of catalogue of creative works (Arts)
 Materials/ ingredients projections for batches of baked goods (Tech- Voc)
 Letterhead/ business card design (Business/ Academic)
Goal: You will create a brochure
Role: Graphic/ Lay-out Artist employed under the Inter-Agency Task Force (IATF) against COVID-19
Audience: People of the Republic of the Philippines
Situation: You are a graphic artist commissioned by the IATF to create a brochure that informs the people about the possible
ethical public behaviors during pandemic. You will provide the Do’s and Don’ts of an individual when going out in public places. In
the brochure you will also put your reaction towards the IATF guidelines implemented in the different parts of the country.
Product: Brochure
Teacher’s Name: Ailo Jhon A. Echavez Gmail Account: society.enacta@gmail.com
Degree: BS – Information Technology Contact number: 0936-036-7190|0951-878-8460
Facebook Account: www.fb.com/AJAEchavezOfficial
STUDENT’S NAME:
Performance Task: Blogging Site (Website)
11
EMPOWERMENT
TECHNOLOGIES
1st Quarter
(MODULE 1)
This handout will serve as
your copy for the whole
grading.
(DO NOT RETURN THIS
TO YOUR TEACHER)
Module Submission:
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 2
Standard: Rubric for Brochure
As the popular saying goes, "Love makes the world go round:' But before you start looking for someone to fall in love with, you
could argue how the Internet has made the world go round for decades. Likewise, in the motivation activity, the Internet has probably
made your world go round. In this lesson, we will understand how Information and Communication Technologies have improved our lives in
such a short period of time.
Lesson Coverage
★ ★ ★ ★ ★ ★ STOP ☞ ( Go to Update your Status and Pre-test in the Activity Sheet) ★ ★ ★ ★ ★ ★
Information and Communication Technology (ICT)
Information and Communication Technology (ICT) deals with the use of different communication technologies such as mobile
phones, telephone, Internet, etc. to locate, save, send, and edit information.
Whenwemake avideocall, weuse the Internet. When wesenda text ormakeacall,we use cellular networks. When we run out of load or
battery, we use payphones which use a telephone network. Having a unified way to communicate is one of the goals of ICT. In terms ofeconomics,ICT
hassavedcompaniesalotofresources(timeandmoney) withthekind of communication technology they use, nowadays. In a similar way, we spend less
CATEGORY 5 4 3 2 1
Attractiveness&
Organization
(Design)
The brochure has
exceptionally
attractive
formattingand
well-organized
information.
The brochure
has attractive
formattingand
well-organized
information.
The brochure
has some
formatting and
organized of
information.
The brochure's has
limited formatting
andorganization of
information.
The brochure
hasno
formatting and
organization of
material.
Content -
Accuracy/
Quantity
Use of facts and the
quantity of
informationis
exceptional.
Use of facts and
quantity of
informationis very
good.
Use of facts and
quantity of
informationis
good but not
consistent.
Use of facts and
quantity of
information is
presentbut limited.
Use of facts
andquantity
of
information is
limited.
Writing -
Organization
Brochure
has
exception
al
organizati
on
Brochure has
verygood
organization.
Brochure has
good
organization.
Brochure has
limited
organization
Brochure has
no
organization
Writing -
Grammar
There are no
grammatical
mistakesin the
brochure.
There are very
few grammatical
mistakesin the
brochure.
There are some
grammatical
mistakesin the
brochure.
There are
several
grammatical
mistakes in the
brochure.
Grammatical
mistakes are so
numerous that
thereadability
of the brochure
is
impaired.
Graphics/
Pictures
(Layout)
Graphics go well
withthe text and
there is agood mix
of text and
graphics.
Graphics go well
withthe text, but
there areso many
that they distract
from the text.
Graphics go well
with the text,
but there aretoo
few and the
brochure seems
"text-heavy".
Graphics do not go
with the
accompanying text
orappear to be
randomly chosen.
Graphics
not
present in
the
brochure.
Total: 25 Points
Lesson Title Learning Competency
1 Information and
Communication Technology
 compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges
 apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks
2 Applied productivity tools
with advanced application
techniques
 uses common productivity tools effectively by maximizing advanced application
techniques
Introduction
Lesson 1| Information and Communication Technology
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 3
because of ICT. As it normally costs us a peso to send a text message or SMS, with the Internet, we can send multiple messages and only be charged
by a fraction.
ICT in the Philippines
Several international companies dub the Philippines as the " ICT Hub of Asia:' It is no secret that there is a huge growth of ICT-related jobs
around the country, one of which is the call center or BPO (Business Process Outsourcing) centers. Accordingtothe2013editionofMeasuringthe
InformationSocietybytheInternationalTelecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. That would mean
that for every 100 Filipinos you meet, there is a high chance that they have a cellphone and approximately for the seven of them, they have two.
In a data gathered by the Annual Survey of Philippine Business and Industries, NSO, in 2010, the ICT industry shares
19.3% of the total employment population here in the Philippines. To add to these statistics, Time Magazine's "The Selfiest Cities around the
World" of 2013 places two cities from the Philippines in the top 1 and top 10 spots. The study was conducted using Instagram, a popular photo
sharing application.
With these numbers, there is no doubt that the Philippines is one of the countries that benefits most out of ICT.
Web 2.0: Dynamic Web Pages
The Internet has been a vital tool to our modern lives that is why it is also important to make the best of the Internet.
When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the
page is "as is" and cannot be manipulated by the user. The content is also the same for all users. This is referred to as Web 1.0.
However, the World Wide Web is more than just static pages. Pretty soon, Web 2.0 came to the picture.
Web 2.0 is a term coined by Darcy DiNucci on January 1999. In her article titled, "Fragmented Future," she wrote:
The Web we know now, which loads into a browser window in essentially static screenfuls, is only an embryo of the Web to
come. The first glimmerings of Web 2.0 are beginning to appear, and we are just starting to see how that embryo might develop.
Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website differently than others. Examples of
Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications. Web 2.0 allows users to interact with
the page: instead of just reading a page, the user may be able to comment or create a user account. Web 2.0 also allows users to use web
browsers instead of just using their operating system. Browsers can now be used for their user interface, application software (or web applications),
and even for file storage. Most websites that we visit today are Web 2.0.
Features of Web 2.0
The key features of Web 2.0 include:
1. Folksonomy - allows users to categorize and classify/arrange information usingfreely chosen keywords (e.g., tagging).
Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is also
referred to as hashtag.
2. Rich User Experience - content is dynamic and is responsive to user's input. An example would be a website that shows
local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their
website.
3. User Participation - the owner of the website is not the only one who is able to put content. Others are able to place a
content of their own by means of comments, reviews, and evaluation. Some websites allow readers to comment on an
article, participate in a poll, or review a specific product (e.g., Amazon.com, online stores).
4. Long Tail - services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing
is better than file size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.
5. Software as a Service - users will subscribe to a software only when needed rather than purchasing them. This is a cheaper
option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows
the user to create and edit word processing and spreadsheet documents online. When you need a software, like a Word Processor,
you can purchase it for a one-time huge amount and install it in your computer and it is yours forever. Software as a service
allows you to "rent" a software for a minimal fee.
6. Mass Participation - diverse information sharing through universal web access. Since most users can use the Internet,
Web 2.0's content is based on people from various cultures.
Web 3.0 and the Semantic Web
The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The W3C standard encourages web developers to include
semantic content in their web pages. The term was coined by the inventor of the World Wide Web, Tim Berners-Lee. Lee also noted that the Semantic
Web is a component for Web 3.0.
According to the W3C, "The Semantic Web provides a common framework that allows data to be shared and reused across application,
enterprise, and community boundaries!' The aim of Web 3.0 is to have machines (or servers) understand the user's preferences to be able to
deliver web content specifically targeting the user. For example, when doing a web search in Web 2.0, the topmost result is based on the
preference of several users who already searched for the item. The search engine then labels it the most common answer to the search query.
Though there are instances wherein several preferences are considered like geographic location, Web 3.0 aims to do better. This is through studying
personal preferences of an individual user and showing results based on those preferences. The Internet is able to predict the best possible answers
to your question by "learning" from your previous choices.
For example, if you search the Internet for "Where is the best place to go shopping?" Web 3.0 will aim to give you results depending
on how you made choices in the past. If you have purchased several shoes online, the Internet will give you results on the best place with the
highest rated shoes around your vicinity.
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 4
Another example is when you search for the best restaurant to visit in a specific area. First, it may look for your previous visits from other
restaurants and if you have rated them whether good or bad. In return, Web 3.0 will search for restaurants that have a similar menu, good rating,
and budget that fit your preference in the past.
Web 3.0 is yet to be fully realized because of several problems:
1. Compatibility. HTML files and current web browsers could not support Web 3.0.
2. Security. The user's security is also in question since the machine is saving his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words "old" and "small" would depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring
to at a given time.
Trends in ICT
As the world of ICT continues to grow, the industry has focused on several innovations. These innovations cater to the needs of the
people that benefit most out of ICT. Whether it is for business or personal use, these trends are the current front runners in the innovation
of ICT.
 Convergence
Technological convergence is the synergy of technological advancements to work on a similar goal or task. For example, besides
using your personal computer to create word documents, you can now use your smartphone. It can also use cloud technologies to sync files
from one device to another while also using LTE technology which means you can access your files anytime, anywhere. Convergence is
using several technologies to accomplish a task conveniently.
 Social Media
Social media is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange
user-generated content. According to Nielsen, a global information and measurement company, Internet users spend moretimeinsocial
media sites than in anyothertype ofsite.Withthis,more andmore advertisers use social media to promote their product.
There are six types of social media:
Social Networks. These are sites that allow you to connect with other people with the same interests or background. Once a
user creates his or her account, he or she can set up a profile, add people, create groups, and share content. Examples: Facebook
and Google+
Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources. Most of these sites
allow you to create a tag that allows you and others to easily search or share them. Examples: StumbleUpon and Pinterest
Social News. These are sites that allow users to post their own news items or links to other news sources. The users can also
comment on the post and comments may alsobe ranked.They are alsocapable of votingon these newsarticlesof the website. Those
who get the most amount of votes are shown most prominently. Examples: reddit and Digg
Media Sharing. These are sites that allow you to upload and share media content like images, music, and video. Most of these sites
have additional social features like liking,commenting,andhavinguserprofiles. Examples:Flicker,YouTube,and Instagram
Microblogging.Theseare sites that focus on short updates from the user. Thosesubscribed to the user will be able to receive these
updates. Examples: Twitter and Plurk
Blogs and Forums. These websites allow users to post their content. Other users are able to comment on the said topic. There are
several free blogging platforms like Blogger, WordPress, and Tumblr. On the other hand, forums are typically part of a certain website
or web service.
 Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability
to do tasks that were originally found in personal computers. Several of these devices are capable of using high-speed Internet.
Today, the latest mobile devices use 4G Networking (LTE), which is currently the fastest mobile network. Also, mobile devices use
different operating systems:
iOS - used in Apple devices such as the iPhone and iPad
Android - an open source operating system developed by Google. Being open source means several mobile phone companies
use this OS for free.
Blackberry OS - used in Blackberry devices
Windows Phone OS - a closed source and proprietary operating system developed by Microsoft®
Symbian the original smartphone OS; used by Nokia devices
WebOS - originally used for smartphones; now used for smart TVs
Windows Mobile - developed by Microsoft® for smartphones and pocket PCs
 Assistive Media
Assistive media is a nonprofit service designed to help people who have visual and reading impairments. A database of audio
recordings is used to read to the user. You may visit http://www.assistivemedia.org/ for several of their audio recordings.
Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with
the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most
things in this world, there is always the “other side of the coin." The Internet is one of the most dangerous places, especially if you do
not know what you are doing with it. But there is no need to worry; it is never that late. Hopefully, by the end of this lesson,
you are able to consider how you go about your use of the Internet.
Let us visit each item and see how risky it is to share them.
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 5
The
Internet is
defined as
the information
superhighway. This means that anyone has access to this highway, can place information, and can grab that information. Any
information, even things that you have set privately, can be accessed one way or another. This is why social networking sites like
Facebook continue to improve their security features. Thethreatofcybercrimeisveryreal.Whileyoumaynotexperiencethethreatnow,
whateverinformation we share today could affect our future.
Tips to Stay Safe Online
The Internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using the Internet.
 Be mindful of what you share online and what site you share it to.
 Do not just accept terms and conditions; read it.
 Check out the privacy policy page of a website to learn how the website handles the information you share.
 Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan
your profile.
 Do not share your password with anyone.
 Avoid logging in to public networks/Wi-Fi. Browsing in "incognito (or private) mode," a feature of the browser, will not protect
you from hackers.
 Do not talk to strangers whether online or face-to-face.
 Never post anything about a future vacation. It is similar to posting, "Rob my house at this date."
 Add friends you know in real life.
 Avoid visiting untrusted websites.
 Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts.
 If you have a Wi-Fi at home, make it a private network by adding a password.
 Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the
download is most likely not monitored by the site owner.
Typeofinformation Risks
First name There is a risk in sharing your first name. Chances are, a hacker may already
know plenty of stuff about you even if you only give out your first name.
Likewise, you cannot just walk in a room and start introducing yourself to
everyone. You do not know whom you can come across with.
Last name If sharing your first name is a small risk, having both your first and last is
riskier. You will be vulnerable to being searched for using search engines,
which include image search. Matching a name with a face is a modus to
several cybercrimes like identity theft.
Middle name Sharing your middle name alone is probably not the most risky of these
shared information, but sharing your full name would be.
Current and
previous school(s)
Most people who steal identities study their subject. They can use
this information for verification purposes.
Your cellphone
number
Your cell phone number should never be posted over the Internet. The
Internet is a public place. It is the same as posting your number on a
billboard. You would not-want random strangers to text or call you, or
worse, pretend that they are someone else.
The name of your
mother and father
Risky, yet not as risky as posting their full names, especially your
mother's maiden name. In fact, you may have already encountered
many websites that require your mother's maiden name as an answer to
a secret question whenever you lose your password.
The name of your
siblings
Disclosing this is a huge risk. Strangers may pretend or use their identity
to dupe you.
Your address Hopefully, you answered "no" to this one. Giving the Internet your
number is one thing; giving them your address is a whole other level. It
would be much easier for criminals to find you.
Your home phone
number
This shared information is riskier than sharing your personal phone
number. Scams usually use this information to deceive you, one of which
is when a stranger pretends to know your parents or pretends to be you.
Your birthday Letting people know your birthday is probably a must if you want to get
as many gifts as possible. But having it in your profile makes you
vulnerable to identity theft.
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 6
 Buy the software; do not use pirated ones.
 Do not reply or click links from suspicious emails.
Most people would dispute that there is no such thing as private over the Internet and they may be right. There are hackers who
can find a backdoor even if your profile is already set to private. You have no control of whoever is looking at your friend's screen
whenever they open your profile or chat with you. You have no control over people getting access to your friend's account and
seeing your private stuff.
We cannot assure and proclaim that following tips to stay safe online can keep us out on danger on
online world. But all we can assure and proclaim 100% is that if we have in GOD’s hand, we are all 100% safe
and 100% be guided through the right path.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware - stands for malicious software
a. Virus - a malicious program designed to replicate itself and transfer from one computer to another either through
the Internet and local networks or data storage like flash drives and CDs
b. Worm - a malicious program that transfers from one computer to another by any type of means. Often, it uses a
computernetworktospreaditself.Forexample, the ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c. Trojan - a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information
*Rogue security software - tricks the user into posing that it is a security software. It asks the user to pay to improve
his/her security but in reality, they are not protected at all.
d. Spyware -a program thatruns in thebackgroundwithout you knowingit(thuscalled"spy").Ithastheabilitytomonitor
what you are currently doing and typing through keylogging.
*Keyloggers - used to record the keystroke done by the users. This is done to steal their password or any other
sensitive information. It can record email, messages, or any information you type using your keyboard.
e. Adware - a program designed to send you advertisements, mostly as pop-ups
2. Spam - unwanted email mostly from bots or advertisers. It can be used to send malware
3. Phishing - Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending
you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal
information.
4. Pharming - a more complicated way of phishing where it exploits the DNS (Domain NameService) system.
Protecting Reputations Online
In the past, doing something embarrassing was not much of a big deal. It happened; people would laugh at it, and they would move on.
Nowadays, embarrassing moments are captured using any device you could imagine. What is worse is that people can easily upload it to
the Internet, where it can be stored forever. This could impact not only your reputation but also the people around you. What is worse is
that people tend to ignore this fact, and suffer from it later in their life.
Once you post something over the Internet, search engines keep them in their archives for search results. This makes anything you
post to last forever even if you delete it in your page. Something you and your friends find funny today may be something that could harm
someone's reputation later.
Before hiring, companies do a background check on the applicant, and the easiest way to check your background is to visit
pages that are related to you. Thus, if they find disreputable information about you, it may harm your reputation even if this
information has been discarded.
Think Before You Click
Here are things you might want to consider before posting something over the Internet:
 Before you post something on the web, ask these questions to yourself: Would you want your parents or
grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have
no control of who sees your posts.
 Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
 Set your post to "private." In this way, search engines will not be able to scan that post.
 Avoid using names. Names are easy for search engines to scan.
 If you feel that a post can affect you or other's reputation, ask the one who posted it to pull it down or report it as
inappropriate.
We all know that 100% we are secured when we are in GOD’s hand, but we cannot avoid that there are
many temptations in this earth just like in the internet, there are also Threats but According to James
4:7 “Submit yourselves, then, to God. Resist the devil, and he will flee from you.”.
Copyright Infringement
If you create something—an idea, an invention, a form of literary work, or a research, you have the right as to how it should
be used by others. This is called intellectual property. In other words, the copyright law includes your rights over your work, and
IFL
IFL
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 7
anyone who uses it without your consent is punishable by law. Try grabbing any book then browse its first few pages and you will find
a page with a disclaimer with the words: "No part of this book may be copied, reproduced..."That is a copyright page.
As a responsible user of the Internet, you have to consider that not everything out there is free for you to use. Just like your
own, contents that you see from websites have their respective copyrights. There are several instances where employees or business
owners face copyright infringement and are sentenced to a huge fine due to reckless copying of materials.
Here are some tips that could help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics),
choreography, andsculptures, but it generally doesNOT protect underlying ideas and facts. This means that you can
express something using your own words, but you should give credit to the source.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense against copyright.
Be responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you or something made
from somebody else's creativity. It is important to add your own creative genius in everything that will be
credited to you.
4. Know the law. There are some limitations to copyright laws. For instance, in the Philippines, copyrights
only last a lifetime (of the author) plus 50 years. There are also provisions for "fair use" which
mean that an intellectual property may be used without a consent as long as it is used in
commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching,
and education. If you have doubts that what you are doing does not fall under the policy of fair
use, seek permission first.
Another misconception is that fan-fiction is not copyright infringement. In reality, it is and some copyright
holders ignore them but they can opt to use their rights.
Online search
Online search is the process of interactively searching for and retrieving requested information via a computer
from databases that are online. Interactive searches became possible in the 1980s with the advent of faster databases
and smart terminals.
Advantages:
• Ability to obtain a large sample, which increases statistical power
• Data is automatically coded so no data entry errors
• Reduced cost of conducting research
Disadvantages:
• Online is not totally secure and theft is one of the numerous danger it poses, researchers personal information is at
risk of being access by rogue persons.
• Some of the materials on the internet have not been evaluated by experts or thoroughly screened.
• Lack of accreditation and low quality
Mail Merge and Label Generation Mail Merge
One of the important reasons in using computers per se is its ability to do recurring tasks automatically. But this ability has to be
honed by learning the characteristics and features of the software you use with your computer. After all, no matter how good or
advance your computer and software may be, it can only be as good as the person using it.
In this particular part of our lesson, we will learn one of the most powerful and commonly used features of Microsoft® Word called
"Mail Merge." As the name suggests, this feature allows you to create documents and combine or merge them with another document
or data file. It is commonly used when sending out advertising materials to various recipients.
The simplest solution for the scenario above is to create a document and just copy and paste it several times then just replace the details
depending on whom you send it to. But what if you have hundreds or thousands of recipients? Would not that take too many hours? What if you
have a small database of information where you can automatically generate those letters?
Mail merging basically requires two components: the document that contains the message and the document or file that generally
contains the list of names and addresses, as in our scenario. When these two documents arecombined (merged) during mail merging, feed your
printer with enough paper until all mailers are printed out. Each document includes the individual names and addresses you need to send
it to.
Let us assume this is the mailer that you would want to send:
Lesson 2| Applied productivity tools with advanced application techniques
Sample Form Document
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 8
Two Components of Mail Merge
1. Form Document
Our sample letter above is what we call a form document—the first component of our mail merged document. It is
generally the document that contains the main body of the message we want to convey or send. The main body of the
message is the part of the form document that remains the same no matter whom you send it to from among your list.
Also included in the form document is what we call place holders, also referred to as data fields or merge fields. This marks the
position on your form document where individual data or information will be inserted. From our sample document, the place
holders are denoted or marked by the text with double-headed arrows (« ») on each side and with a gray background. On a
printed standard form, this will be the underlined spaces that you will see and use as guide to where you need to write the
information that you need to fill out. In its simplest form, a form document is literally a "form" that you fill out with individual
information. A common example of a form document is your regular tax form or application form. Then there is also a form letter
which is exactly like the one in our example above.
2. List or Data File
The second component of our mail merged document is the list or data file. This is where the individual information or
data that needs to be plugged in (merged) to the form document is placed and maintained. One of the best things about the
mail merge feature is that it allows data file to be created from within the Microsoft® Word application itself, or it gets data from a file
created in Microsoft® Excel or other data formats. In this way, fields that needed to be filled up on the form document can easily be
July 28, 2020
<<Name>>
<<Company>>
<<Address Line 1>>
<<Address Line 2>>
<<Address Line3>>
Dear <<Title>>,
We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified! Being one of
our loyal customers. we would like to thank you for trusting and carrying our product line in your store.
Included in this promo kit are the mechanics of our promo and the catalog from where you can see and choose from
our exciting new products.
Please do not hesitate to contact us should you have further inquiries regarding the details of the promo or about any
of the new products in our catalog. We look forward to doing more business with you.
Again: thank you very much and more power.
Your partner in merchandising.
Red Dragon. Inc.
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 9
maintained without accidentally altering the form or main document. You can easily add, remove, modify, or extract your data
more efficiently by using other data management applications like Excel or Access and import them in Word during the mail
merge process.
Label Generation
Included in the mail merge feature on Microsoft® Word is the Label Generator. It just makes sense that after you print out your
form letters, you will need to send it to individual recipients in an envelope with the matching address printed directly on the
envelope or on a mailing label tostick on. By using virtually, the same process as a standard mailmerge, Microsoft' Word will print individual
addresses to a standard form that it has already pre-formatted. Simply put, it creates a blank form document that simulates either a
blank label or envelope of pre-defined size and will use the data file that you selected to print the information, typically individual
addresses. So even in generating labels, the two essential components of creating a merged document are present: the form document
and the data file. Only in this case, you did not have to type or create the form document yourself because it was already created and pre-
formatted in Microsoft® Word. All you need to do is select the correct or appropriate size for the label or envelope and select the data file that
contains the addresses (data) to be printed. You can also preview your merged labels before printing if you want to.
✓Learning Competency: Uses common productivity tools effectively by maximizing advanced application techniques.
✓Learning Outcome: Create a simple mail merge document using common productivity tool such as Microsoft word.
Now that we have learned the components needed to accomplish a successful mail merge, let us put theory into practice. Let us take a
look at the steps to create a simple mail merge document.
Following our scenario, take the following steps to create and merge a simple covering letter to a list of names that you were tasked to send
the letters to. To prepare for this activity, let us build a list of at least ten names of people with their corresponding title, company name, and
address. You may use the following fields: title, name, company, address line 1, address line 2, and address line 3. Refer to the table on the next
page for the format of the list as an example. You may just write down your list on a piece of paper to make it handy and available when you
need it during the course of this activity. Exchanging names and addresses with your classmates could be a good idea to build your list quickly.
Steps in creating a simple mail merge:
Step 1. Open Microsoft° Word and start a new blank
document. You can use the keyboard shortcut Ctrl+N
after Microsoft' Word has been loaded or opened.
Step 2. On the Mailings tab, from the Start
Mail Merge group, choose Start Mail Merge—
►Letters.
Type the letter below. You will be typing in only the
common parts of the letter. The text that does not change
for each copy you print.
Title Name Company Address Address Address
Sir Arnold Reyes ABC Inc. 23 Sierra St. Alabang Muntinlupa City
Madam Maria Santos XYZ Corp. 45 Oro Drive San Juan Metro Manila
… … … … … …
Activity no. 1: Mail Merge and Label Generation
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 10
Step 3.
Save your letter and name it "Sample Letter:'
Step 4. Insert the fields you need in the letter (Name,
Company, Address Line 1, Address Line 2, Address Line 3, and Title). You may want to make special markings on these fields
as you are typing it. Most common marking you can do is by typing it in capital letters or ALL CAPS so you can easily identify them
later.
July 28, 2020
Dear ,
We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified! Being
one of our loyal customers. we would like to thank you for trusting and carrying our product line in your
store.
Included in this promo kit are the mechanics of our promo and the catalog from where you can see and
choose from our exciting new products.
Please do not hesitate to contact us should you have further inquiries regarding the details of the promo or
about any of the new products in our catalog. We look forward to doing more business with you.
Again: thank you very much and more power.
Your partner in merchandising.
Red Dragon. Inc.
July 28, 2020
NAME
COMPANY
ADDRESS LINE 1
ADDRESS LINE 2
ADDRESS LINE 3
Dear TITLE,
We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified!
Being one of our loyal customers. we would like to thank you for trusting and carrying our product
line in your store.
Included in this promo kit are the mechanics of our promo and the catalog from where you can see and
choose from our exciting new products.
Please do not hesitate to contact us should you have further inquiries regarding the details of the promo
or about any of the new products in our catalog. We look forward to doing more business with you.
Again: thank you very much and more power.
Your partner in merchandising.
Red Dragon. Inc.
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 11
Step 5. Save the main document once more. You can use Ctrl+S to quickly do
this step.
Step 6. On the Mailings tab in the Start Mail Merge group, choose Select
Recipients Type a New List.
Step 7. Click the Customize Columns button on the dialog box for
the New Address List.
* This will allow you to modify the fields in the address list
that Microsoft word has pre-determined.
Step 8. Select a field that you do not need then click the Delete
button. A confirmation dialog box appears.
Step 9. Click Yes in the confirmation dialog box. The dialog box closes, and the unnecessary field
disappears.
Step 10. Repeat steps 8 and 9 for each field you do not need. After removing the excess fields, the next step is
to add the fields you need.
Step 11. To add a field that you need in your
document, click the Add button.
Step 12. Type the field name on the prompt inside
a small Add Field dialog box and click the OK
button.
Step 13. Repeat steps 11 and 12 for each new field
you need in your main document.
Step 14. Click the OK button on the Customize Address List dialog box to confirm your changes.
Step 15. The New Address List dialog box will appear again ready for you to type in your data.
Step 16. Type the individual data from your list corresponding to Name, Company, Address Line 1, Address Line 2,
Address Line 3, and Title.
Step 17. Press the Tab key each time to enter the next field.
Step 18. To add a new record, press the Tab key after inputting the last field. When you press the Tab key
on the last field in a record, a new record is automatically created and added on the next line.
Step 19. Repeat steps 16 through 18 until you enter all the records you want.
Once you are done typing
your data, click the OK button on the
Add New List dialog box to save your
data. A special Save Address List
dialog box pops up, allowing you to
save the recipient list.
Step 20. Type a name for the address
list. Name it "Client List."
Step 21. Click the Save button. You
should be back on your main document
soon after.
Step 22. Select a field placeholder
(ALL CAPS) in the main document.
Step 23. Click the Insert Merge
Field command button.
Step 24. Choose the proper field to
insert into your text. For example, if
you are replacing the text name in
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 12
your document with a name field, choose the Name Field from the Insert
Merge Field menu. The field is inserted into your document and
replaces the ALL CAPS text.
Step 25. Continue adding fields until the document is complete. Repeat
steps 22 through 24 as necessary to stick all fields into your document.
Step 26. Save the main document.
Step 27. Choose Finish & Merge to edit, print, or send your merged documents
through email.
Step 28. Or you may want to choose Preview
Results to check your work before you send it.
Step 29. You should get a merged document close to this one:
If you
decide to print the document, the Merge to Printer dialog box appears, from which you can choose records to
print. Choose All to print your entire document. Alternatively, you can specify which records to print. Click OK. The
traditional Print dialog box appears. Click the OK button again to print your documents.
Step 30. Save and close your document. Congratulations, you have just created a simple mail merge document.
Integrating Images and External Materials
Integrating or inserting pictures in your document is fun and it improves the impression of your document. A common
use of inserting a picture on a document is when you are creating your resume. Though seemingly simple to do, your
July 28, 2020
Arnold Reyes
ABC Inc.
23 Sierra St.
Alabang
Muntinlupa City
Dear Sir,
We would like to announce and invite you to avail of our 3rd quarter promo, for which you are
qualified! Being one of our loyal customers. we would like to thank you for trusting and
carrying our product line in your store.
Included in this promo kit are the mechanics of our promo and the catalog from where you can
see and choose from our exciting new products.
Please do not hesitate to contact us should you have further inquiries regarding the details of the
promo or about any of the new products in our catalog. We look forward to doing more
business with you.
Again: thank you very much and more power.
Your partner in merchandising.
Red Dragon. Inc.
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 13
knowledge on the different kinds of materials that you can insert or integrate in a Word document and its characteristics can help
you create a more efficient, richer document not only in content but also in physical form. A better understanding of the physical form
of your document as well as the different materials you integrate in it would allow you to be more efficient and versatile in using
Microsoft® Word.
Let us consider the interesting aspects of inserting or integrating images and other external materials which is
categorized as an advanced feature.
Kinds of Materials
There are various kinds of materials Microsoft' Word is capable of integrating to make your documents richer, more impressive, and
more informative.
The screenshot above shows the kinds of materials that can be integrated or inserted in your Microsoft® Word document. One can
easily get excited and instead create a collage of what is generally called images and arts rather than an enriched text document. One
important thing to remember is that images and other materials are not to be inserted as images for design purposes only, but they are
used to enhance or improve the effectiveness of the message you want to convey. Let us describe each of them.
1
. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in any local storage device. There
are three commonly used types of picture files. You can identify them by the extension on their file names.
a. .JPG. This ispronouncedas"jay-peg," andistheshort form for .jpegorJoint Photographic Experts Group. Like all the rest of
the image file extensions, it identifies the kind of data compression process that it uses to make it more compatible
and portable through the Internet. This type of image file can support 16.7 million colors that is why it is suitable for
use when working with full color photographic images. Unfortunately, it does not support transparency and therefore,
images of this file type can be difficultto integrateintermsofblending withothermaterialsorelementsinyourdocument.
But if you are looking for the best quality image to integrate with your document, then this is the image file type for
you. JPG does not work well on lettering, line drawings, or simple graphics. .JPG images are relatively small in file size.
b. .GIF. This stands for Graphics Interchange Format. This type of image file is capable of displaying transparencies.
Therefore, it is good for blending with other materials or elements in your document. It is also capable of displaying
simple animation. Apparently, this may not be too useful on a printed document but if you are sending documents
electronically or through email, or even post documents into a website, then this could be quite impressive. The
downside is that it can only support up to 256 colors so it is good mostly on logos and art decors with very limited,
and generally solid colors. .GIF is much better for logos, drawings, small text, black and white images, or low-
resolution files.
c. .PNG. This is pronounced as "ping." It stands for Portable Network Graphics. It was built around the capabilities of .GIF.
Its development was basically for the purpose of transporting images on the Internet at faster rates. It is also good with
transparencies but unlike. GIFs, it does not support animation but it can display up to about 16 million colors, so
image quality for this image file type is also remarkably improved. .PNG allows the control of the transparency level or
opacity of images.
2. Clip Art. This is generally a .GIF type; line art drawings or images used as generic representation for ideas and objects that you might want
to integrate in your document. Microsoft® Word has a library of clip arts that is built in or can be downloaded and used freely. There
are still other clip arts that you can either purchase or freely download and use that come from third-party providers.
3. Shapes. These are printable objects or materials that you can integrate in your document to enhance its appearance or to allow you to
have some tools to use for composing and representing ideas or messages. If you are designing the layout for a poster or other
graphic material for advertising, you might find this useful.
4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form ideas that are organizational or
structural in nature. If you want to graphically represent an organization, process, relationships, or flow for infographic documents, then
you will find this easy and handy to use.
5. Chart. Another type of
material that you can
integrate in your Word document that allows you to represent data characteristics and trends. This is quite useful when you are
preparing reports that correlate and present data in a graphical manner. You can create charts that can be integrated in your document
either directly in Microsoft' Word or imported from external files like Microsoft® Excel.
6. Screenshot. Sometimes, creating reports or manuals for training or procedures will require the integration of a more realistic image
of what you are discussing on your report or manual. Nothing can get you a more realistic image than a screenshot. Microsoft' Word
even provides a snipping tool for your screen shots so you can select and display only the part that you exactly like to capture on
your screen.
Image Placement
In practice, inserting an image or any other material in your document is quite easy especially if the material already exists in your
local storage device. It is just a matter of opening up the image file through the Microsoft' Word dialog box or wizard. Sometimes, if
the image you would like to insert is on a web page currently displayed on your screen, it could be copied and pasted. The real challenge
Figure 3. Wrap Text drop-down menu in Word 2010 showing the preset options
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 14
is where to put the image you inserted or where tomove it.Inthispart ofthe lesson, wewillstudy thedifferentcharacteristicsoftext wrapping
options that you can use with the image you integrated in your document.
1
. In Line with Text. This is the default setting for images that are inserted or integrated in your document. It treats your
image like a text font with the bottom side totally aligned with the text line. This setting is usually used when you need to place
your image at the beginning of a paragraph. When placed between texts in a paragraph or sentence, it distorts the overall
appearance and arrangement of the texts in the paragraph because it will take up the space it needs vertically, pushing whole lines
of texts upward as in the example below.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae;
Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum
elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis
omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae;
Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum
elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis
omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus
2. Square. This setting allows the image you inserted to be placed anywhere within the paragraph with the text going around
the image in a square pattern like a frame.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim
in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida,
quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut
venenatis purus
3. Tight. This is almost the same as the Square setting, but here the text "hugs" or conforms to the general shape of the image.
This allows you to get a more creative effect on your document. This setting can mostly be achieved if you are using an image that
supports transparency like a .GIF or .PNG file.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim
in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida,
quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut
venenatis purus.
4. Through. This setting allows the text on your document to flow even tighter, taking the contours and shape of the image. Again,
this can be best used with a .GIF or .PNG type of image.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim
in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla
gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui.
Donec ut venenatis purus.
5. Top and Bottom. This setting pushes the texts away vertically to the top and/or the bottom of
the image so that the image occupies a whole text line on its own as in the example.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim
in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus
suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus.
6. Behind Text. This allows your image to be dragged and placed anywhere on your document but with all the texts
floating in front of it. It effectively makes your image look like a background.
Example:
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 15
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in
sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut
quis egestas neque, vitae sagittis dui. Donec ut venenatis purus.
7. In Front of Text. As it suggests, this setting allows your image to be placed right on top of the text as if your
image was dropped right on it. That means whatever part of the text you placed the image on, it will be covered by
the image. In our example below, notice the difference between using a .PNG file (on the left) with a transparency
effect, and a JPG file on the right.
Example:
Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum
bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in
sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut
quis egestas neque, vitae sagittis dui. Donec ut venenatis purus.
The Bible is a written word the very essential document we have to keep.
Creating an Effective Presentation
Designing your presentation is the fun part of creating a report for it gives you a chance to be creative. Placing animations,
transitions, and art could be on your mind right now. But whether or not these features would help is generally up to you. Sometimes, these
things could actually distract your audience rather than help you. Here are some quick tips in creating an effective presentation.
1. Minimize. Keep slide counts to a minimum to maintain a clear message and to keep the audience attentive. Remember that the
presentation is just a visual aid. Most information should still come from the reporter.
2. Clarity. Avoid being fancy by using a font style that is easy to read. Make sure thatitisalsobigenoughtobereadbytheaudience.
Onceyou startmakingyour presentation, consider how big the screen is during your report.
Tip: A font size of 72 is about an inch (depends on the screen size). A one-inch letter is readable 10 feet away; a two-inch letter
is readable 20 feet away.
3. Simplicity. Use bullets or short sentences. Summarize the information on the screen to have your audience focus on what the
speaker is saying than on reading the slide. Limit the content to six lines and seven words per line. This is known as the 6 x 7 rule.
4. Visuals. Use graphics to help in your presentation but not too many to distract the audience. In addition, instead of using a
table of data, use charts and graphs.
5. Consistency. Make your design uniform. Avoid having different font styles and backgrounds.
6. Contrast. Use light font on dark background or vice versa. This is done so that it is easier to read. In most instances, it is easier to
read on screen if the background is dark. This is due to the brightness of the screen.
* Sample output for a serenade service.
IFL
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 16
As you can see from the sample presentation, not all information is presented in the visual aid.
Using Hyperlinks in Microsoft® PowerPoint
Using hyperlinks in your presentation is an easy way to navigate slides during your presentation. In your group's case, it may
be wise to insert action buttons for most slides or ace hyperlinks to your Excel file in case your audience asks a specific question.
Ways to insert hyperlinks:
1
. Open a PowerPoint application and type any Words. Select an object or highlight a text.
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 17
2. Go to Insert > Hyperlinks (under links category) or use the shortcut key Ctrl + K
The Insert Hyperlink dialog box would appear.
Link to options:
a. Existing File or Web
Page - creates a
hyperlink to website or a
local file saved in your
hard drive. Just browse
your file in the dialog
box or type the web
address.
b. Place in This Document
- creates a hyperlink that allows you to jump to a specific slide in your presentation
c. Create a New Document - creates a hyperlink that once clicked, creates a new document
on your specified location
d. E-mail Address - creates a hyperlink that opens Microsoft' Outlook that automatically adds
your specified recipient on a new email
3. For example, you choose the Existing File or Web Page. When done, click OK to apply your hyperlink.
Embedding Objects in Microsoft' PowerPoint
Embedding objects is easy using Microsoft® PowerPoint. With this option, you
can insert an Excel file that would look like a table to a presentation.
Embedding an Excel File to your Slide presentation
1. Go to the Insert tab.
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 18
2. On the Text group, click on Object.
3. The Insert Object dialog box would appear:
Options:
a. Creates New - creates a new file from scratch. You can select on a wide
variety of files listed.
b. Create from File - creates a file from an existing file saved on your hard
drive; simply browse the file to use it. Putting a check on the "link" option will allow you
to modify the Excel file inside your presentation.
4. Once you are done, click OK.
Emphasizing ideas as we relate ourselves to this we are the living word that are easily seen by people
just like PowerPoint presentation we only present highlights of the documents. In the same way the way we treat
other people is easily highlighted.
Spreadsheet Skills
Estimating the Product Cost using Microsoft® Excel
Let us assume that we are going to sell milk tea with the following information:
ProductInformation
ProductName/Brand:StarbukoOrganic MilkTea
Company/Group Name:Starbuko FoodsCorporation
Product Description: Starbuko MilkTeais aspecialmilk tea usingorganic ingredients especiallymade for Filipinos.
Ingredients/Materials:Organic tea, water,condensedmilk, ice, specialsweetener
Estimated Sale Price: 25PHP percup
We will use Microsoft' Excel to find out if our estimated sale price is reasonable considering the actual price of the ingredients.
1. Copy the information below:
Note: Values with PHP or Philippine peso sign use the Accounting Number format. Its default uses the dollar symbol ($). To
change this, click the drop-down arrow at the currency button then select More Accounting Formats, then change the symbol to
PHP.
IFL
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 19
2. Use the SUM formula to get the summation of the values
from C4 to C7. The SUM formula is =SUM (C4:C7). Type this on
cell C8 as shown below:
3. Check if our estimated price will earn us profit. Type the
additional information shown below then apply the
arithmetic formula for subtraction:
4. The result is PHP2.20. Our estimated price is not profitable.
Let us make an adjustment. Include the information below and
deduct the Total from the New Sale Price:
5. The result is PHP7.80. This is definitely profitable at this price.
However, this does not guarantee our product's success.
6. Save your file as L4 Cost of Ingredients.xlsx.
Excel-is like the word of God if you are looking for complete and accurate truth you just turn to his words.
★ ★ ★ ★ ★ ★ STOP ☞ ( Go to Activity 2: Valuing ICT & Post-test ) ★ ★ ★ ★ ★ ★
(2016). Empowerment Techologies. Quezon City: Rex Book Store.
REFERENCE USED IN THIS LESSON
s
IFL
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 20
MINDANAO MISSION ACADEMY
of Seventh-day Adventists, Inc.
The School that Offers Something Better
Manticao, Misamis Oriental
• • ACTIVITY SHEETS • •
STUDENT’S NAME: CONTACT #: SCORE:
Update your Status
Instruction: Before you will explore what is Information Technology all about, update your Status First by using Facebook application. Write
your status in the space provided below. You can write what you are feeling right now or you may also write what you wanted to know about
information technology. You can use hashtags and emoticons if you want.
Pre-test
Let’s find out how much you already know about this module.
A. Instruction: Identify what is being asked. Write your answer on the space before each number.
B. Instruction: Define each word according to what you already know. Write your answers on the space provided. 5 points each.
1. Information -
2. Technology -
✓Learning Competency: Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class
objectives or address situational challenges.
✓Learning Outcome: Differentiate the three essential Microsoft applications.
___________ 1. Is a website, application, or online channel that enables web users to create, co-create, discuss, modify,
and exchange user-generated content.
___________ 2. It treats your image like a text font with the bottom side totally aligned with the text line.
___________ 3. Allows users to categorize and classify/arrange information usingfreely chosen keywords (e.g., tagging).
___________ 4. This is generallya .GIF type;line art drawingsor images used as generic representation for ideas and objects that
you might want to integrate in your document.
___________ 5. Another type of material that you can integrate in your Word document that allows you to represent data
characteristics and trends.
___________ 6. This allows your image to be dragged and placed anywhere on your document but with all the
texts floating in front of it.
___________ 7. Is the process of interactively searching for and retrieving requested information via a computer from
databases that are online.
___________ 8. Basically requires two components: the document that contains the message and the document or file
that generally contains the list of names and addresses, as in our scenario.
___________ 9. These are printable objects or materials that you can integrate in your document to enhance its
appearance or to allow you to have some tools to use for composing and representing ideas or messages.
___________ 10. A more complicated way of phishing where it exploits the DNS (Domain NameService) system.
RETURN THIS TO YOUR
TEACHER
Module Submission:
11
EMPOWERMENT
TECHNOLOGIES
1st Quarter
(MODULE 1)
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 21
Instruction: Using Triple Venn Diagram, compare Microsoft Word, PowerPoint and Excel. Write down their similarities and
differences in the space. You may use the diagram below for your guide.
Guide:
Answer:
Activity no. 2: Venn Diagram
*Similarities of
Excel and
PowerPoint
Microsoft Excel
Microsoft PowerPoint
*Similarities of
Word and
PowerPoint
*Similarities of
Word,
PowerPoint
and Excel
Microsoft Word
*Similarities of
Word
and Excel
EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 22
Post-test
Let’s find out how much you have learned about this module.
A. Instruction: You are going to fill out the space provided for KWL Chart.
TOPIC: Information and Communication Technology & Applied productivity tools with advanced application techniques
KWL Chart
What I KNOW What I WANT to Know What I LEARNED
(Use this space to discuss your background
knowledge about the topic.)
(Look at what you already know and note
some of the questions sparked by your
background knowledge.)
(Summarize your learning here and note
whether the lesson answered the
questions you had at the beginning.)
B. Instruction: Make a short discussion for each item. Write your answer in the space provided.
1. Sharing my username and password to anyone.
Answer:
2. Putting all the content on the PowerPoint presentation rather than putting the key points and simplifying the content.
Answer:
3. Keeping my information public on social media such as home address, contact number and other important information.
Answer:
4. Installing an anti-virus on my computer.
Answer:
✦ ✦ (Congratulations! You are done for 1st quarter 1st Module, you are now ready to learn for the next lessons (Imaging and Design
for the Online Environment) ✦ ✦

More Related Content

What's hot

[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
 
SCREEN THE PROPOSED SOLUTIONS BASED ON VIABILITY,PROFITABILITY, AND CUSTOMERS...
SCREEN THE PROPOSED SOLUTIONS BASED ON VIABILITY,PROFITABILITY, AND CUSTOMERS...SCREEN THE PROPOSED SOLUTIONS BASED ON VIABILITY,PROFITABILITY, AND CUSTOMERS...
SCREEN THE PROPOSED SOLUTIONS BASED ON VIABILITY,PROFITABILITY, AND CUSTOMERS...Joace Gayrama
 
2 History of Philippine Art
2 History of Philippine Art2 History of Philippine Art
2 History of Philippine ArtOphelynn Cano
 
Overview on Community Engagement, Solidarity and Citizenship
Overview on Community Engagement, Solidarity and CitizenshipOverview on Community Engagement, Solidarity and Citizenship
Overview on Community Engagement, Solidarity and CitizenshipConan Rogador
 
Characteristics of a Trend
Characteristics of a TrendCharacteristics of a Trend
Characteristics of a TrendConan Rogador
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)bloodyblade06
 
Contemporary philippine arts from the regions
Contemporary philippine arts from the regionsContemporary philippine arts from the regions
Contemporary philippine arts from the regionsThesally Sosa
 
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and Migration
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and MigrationTrends, Network and Critical Thinking Unit 3 Global Networks Labor and Migration
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and MigrationEman Bustamante
 
Trends, Networks, and Critical_Lesson_5.pptx
Trends, Networks, and Critical_Lesson_5.pptxTrends, Networks, and Critical_Lesson_5.pptx
Trends, Networks, and Critical_Lesson_5.pptxnelsondizor2
 
FUNCTION AND IMPORTANCE OF EDUCATION IN THE SOCIETY (Group 2).pptx
FUNCTION AND IMPORTANCE OF EDUCATION IN THE SOCIETY (Group 2).pptxFUNCTION AND IMPORTANCE OF EDUCATION IN THE SOCIETY (Group 2).pptx
FUNCTION AND IMPORTANCE OF EDUCATION IN THE SOCIETY (Group 2).pptxCeliselDLeron
 
Understanding the concepts of anthropology, sociology,
Understanding the concepts of anthropology, sociology,Understanding the concepts of anthropology, sociology,
Understanding the concepts of anthropology, sociology,Kellykhel Parena
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Detailed Lesson Plan in Introduction to Philosophy of the Human Person.docx
Detailed Lesson Plan in Introduction to Philosophy of the Human Person.docxDetailed Lesson Plan in Introduction to Philosophy of the Human Person.docx
Detailed Lesson Plan in Introduction to Philosophy of the Human Person.docxRENECATALANLACABA
 
Empowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsEmpowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsLany Lyn Magdaraog
 
Sustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeSustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeMark Jhon Oxillo
 
Lesson Plan in Trends, Networks and Critical Thinking in the 21st Century
Lesson Plan in Trends, Networks and Critical Thinking in the 21st CenturyLesson Plan in Trends, Networks and Critical Thinking in the 21st Century
Lesson Plan in Trends, Networks and Critical Thinking in the 21st Centuryjess salvilla
 
Integrative Art as applied to Contemporary Art.pptx
Integrative Art as applied to Contemporary Art.pptxIntegrative Art as applied to Contemporary Art.pptx
Integrative Art as applied to Contemporary Art.pptxAILEEN H. BANAGUAS
 

What's hot (20)

[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
Filipino Philosopher
Filipino PhilosopherFilipino Philosopher
Filipino Philosopher
 
SCREEN THE PROPOSED SOLUTIONS BASED ON VIABILITY,PROFITABILITY, AND CUSTOMERS...
SCREEN THE PROPOSED SOLUTIONS BASED ON VIABILITY,PROFITABILITY, AND CUSTOMERS...SCREEN THE PROPOSED SOLUTIONS BASED ON VIABILITY,PROFITABILITY, AND CUSTOMERS...
SCREEN THE PROPOSED SOLUTIONS BASED ON VIABILITY,PROFITABILITY, AND CUSTOMERS...
 
2 History of Philippine Art
2 History of Philippine Art2 History of Philippine Art
2 History of Philippine Art
 
Overview on Community Engagement, Solidarity and Citizenship
Overview on Community Engagement, Solidarity and CitizenshipOverview on Community Engagement, Solidarity and Citizenship
Overview on Community Engagement, Solidarity and Citizenship
 
Characteristics of a Trend
Characteristics of a TrendCharacteristics of a Trend
Characteristics of a Trend
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
Contemporary philippine arts from the regions
Contemporary philippine arts from the regionsContemporary philippine arts from the regions
Contemporary philippine arts from the regions
 
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and Migration
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and MigrationTrends, Network and Critical Thinking Unit 3 Global Networks Labor and Migration
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and Migration
 
Trends, Networks, and Critical_Lesson_5.pptx
Trends, Networks, and Critical_Lesson_5.pptxTrends, Networks, and Critical_Lesson_5.pptx
Trends, Networks, and Critical_Lesson_5.pptx
 
FUNCTION AND IMPORTANCE OF EDUCATION IN THE SOCIETY (Group 2).pptx
FUNCTION AND IMPORTANCE OF EDUCATION IN THE SOCIETY (Group 2).pptxFUNCTION AND IMPORTANCE OF EDUCATION IN THE SOCIETY (Group 2).pptx
FUNCTION AND IMPORTANCE OF EDUCATION IN THE SOCIETY (Group 2).pptx
 
Understanding the concepts of anthropology, sociology,
Understanding the concepts of anthropology, sociology,Understanding the concepts of anthropology, sociology,
Understanding the concepts of anthropology, sociology,
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Detailed Lesson Plan in Introduction to Philosophy of the Human Person.docx
Detailed Lesson Plan in Introduction to Philosophy of the Human Person.docxDetailed Lesson Plan in Introduction to Philosophy of the Human Person.docx
Detailed Lesson Plan in Introduction to Philosophy of the Human Person.docx
 
Empowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsEmpowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and Elements
 
Sustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeSustaining an ICT Project for Social Change
Sustaining an ICT Project for Social Change
 
Lesson Plan in Trends, Networks and Critical Thinking in the 21st Century
Lesson Plan in Trends, Networks and Critical Thinking in the 21st CenturyLesson Plan in Trends, Networks and Critical Thinking in the 21st Century
Lesson Plan in Trends, Networks and Critical Thinking in the 21st Century
 
Day 1. 6.12.16
Day 1. 6.12.16Day 1. 6.12.16
Day 1. 6.12.16
 
Integrative Art as applied to Contemporary Art.pptx
Integrative Art as applied to Contemporary Art.pptxIntegrative Art as applied to Contemporary Art.pptx
Integrative Art as applied to Contemporary Art.pptx
 
FOLK ARTS FROM VISAYAS REGION
FOLK ARTS FROM VISAYAS REGIONFOLK ARTS FROM VISAYAS REGION
FOLK ARTS FROM VISAYAS REGION
 

Similar to 1st-Quarter-Learning-Module-1-Empowerment-Technologies.docx

non conventional
non conventionalnon conventional
non conventionalChiDio
 
Empowerment Tech-Mod8_Developing and Constructing the ICT Project.pdf
Empowerment Tech-Mod8_Developing and Constructing the ICT Project.pdfEmpowerment Tech-Mod8_Developing and Constructing the ICT Project.pdf
Empowerment Tech-Mod8_Developing and Constructing the ICT Project.pdfChris selebio
 
with MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxwith MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxhelzerpatrina
 
Nt1330 Unit 3 Assignment 3
Nt1330 Unit 3 Assignment 3Nt1330 Unit 3 Assignment 3
Nt1330 Unit 3 Assignment 3Ashley Davis
 
Reflections on Technical Communication
Reflections on Technical CommunicationReflections on Technical Communication
Reflections on Technical CommunicationJohn Toland
 
with MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxwith MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxadolphoyonker
 
with MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxwith MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxmansonagnus
 
Coaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdfCoaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdfBrodoto
 
How Business Alignment Is The Relationship Between It...
How Business Alignment Is The Relationship Between It...How Business Alignment Is The Relationship Between It...
How Business Alignment Is The Relationship Between It...Robin Anderson
 
Business communication today-_Bovée, Courtland L._ Thill, John V. -Pearson E...
Business communication today-_Bovée, Courtland  L._ Thill, John V. -Pearson E...Business communication today-_Bovée, Courtland  L._ Thill, John V. -Pearson E...
Business communication today-_Bovée, Courtland L._ Thill, John V. -Pearson E...AakashBhalla2
 
Planning mlearning project
Planning mlearning projectPlanning mlearning project
Planning mlearning projectInge de Waard
 
Enterprise User Experience in Higher Education
Enterprise User Experience in Higher EducationEnterprise User Experience in Higher Education
Enterprise User Experience in Higher EducationTarik (Rick) Dzekman
 
Entrepreneur in the age of Web2.0 2014
Entrepreneur in the age of Web2.0 2014Entrepreneur in the age of Web2.0 2014
Entrepreneur in the age of Web2.0 2014Lukas Ritzel
 
01 effective communications_for_leaders_in_the_21st_century_final
01 effective communications_for_leaders_in_the_21st_century_final01 effective communications_for_leaders_in_the_21st_century_final
01 effective communications_for_leaders_in_the_21st_century_finalJames Murphy
 
Eddie Gomez's "It's A Mobile World" @MiamiAdSchool
Eddie Gomez's "It's A Mobile World" @MiamiAdSchoolEddie Gomez's "It's A Mobile World" @MiamiAdSchool
Eddie Gomez's "It's A Mobile World" @MiamiAdSchoolEddie Gomez
 
Digital Citizenship WebQuest Info
Digital Citizenship WebQuest InfoDigital Citizenship WebQuest Info
Digital Citizenship WebQuest InfoMiguel Guhlin
 

Similar to 1st-Quarter-Learning-Module-1-Empowerment-Technologies.docx (20)

non conventional
non conventionalnon conventional
non conventional
 
Empowerment Tech-Mod8_Developing and Constructing the ICT Project.pdf
Empowerment Tech-Mod8_Developing and Constructing the ICT Project.pdfEmpowerment Tech-Mod8_Developing and Constructing the ICT Project.pdf
Empowerment Tech-Mod8_Developing and Constructing the ICT Project.pdf
 
with MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxwith MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docx
 
Nt1330 Unit 3 Assignment 3
Nt1330 Unit 3 Assignment 3Nt1330 Unit 3 Assignment 3
Nt1330 Unit 3 Assignment 3
 
Reflections on Technical Communication
Reflections on Technical CommunicationReflections on Technical Communication
Reflections on Technical Communication
 
with MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxwith MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docx
 
with MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docxwith MyLab BusinessCommunication®• Reporting Dashboar.docx
with MyLab BusinessCommunication®• Reporting Dashboar.docx
 
Coaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdfCoaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdf
 
Dario de Judicibus - IBM at E20Forum
Dario de Judicibus - IBM at E20ForumDario de Judicibus - IBM at E20Forum
Dario de Judicibus - IBM at E20Forum
 
Get Ready For Abundance Culture At High School
Get Ready For Abundance Culture At High SchoolGet Ready For Abundance Culture At High School
Get Ready For Abundance Culture At High School
 
Chapter 1 Concept of CALL
Chapter 1 Concept of CALLChapter 1 Concept of CALL
Chapter 1 Concept of CALL
 
How Business Alignment Is The Relationship Between It...
How Business Alignment Is The Relationship Between It...How Business Alignment Is The Relationship Between It...
How Business Alignment Is The Relationship Between It...
 
Business communication today-_Bovée, Courtland L._ Thill, John V. -Pearson E...
Business communication today-_Bovée, Courtland  L._ Thill, John V. -Pearson E...Business communication today-_Bovée, Courtland  L._ Thill, John V. -Pearson E...
Business communication today-_Bovée, Courtland L._ Thill, John V. -Pearson E...
 
1.docx
1.docx1.docx
1.docx
 
Planning mlearning project
Planning mlearning projectPlanning mlearning project
Planning mlearning project
 
Enterprise User Experience in Higher Education
Enterprise User Experience in Higher EducationEnterprise User Experience in Higher Education
Enterprise User Experience in Higher Education
 
Entrepreneur in the age of Web2.0 2014
Entrepreneur in the age of Web2.0 2014Entrepreneur in the age of Web2.0 2014
Entrepreneur in the age of Web2.0 2014
 
01 effective communications_for_leaders_in_the_21st_century_final
01 effective communications_for_leaders_in_the_21st_century_final01 effective communications_for_leaders_in_the_21st_century_final
01 effective communications_for_leaders_in_the_21st_century_final
 
Eddie Gomez's "It's A Mobile World" @MiamiAdSchool
Eddie Gomez's "It's A Mobile World" @MiamiAdSchoolEddie Gomez's "It's A Mobile World" @MiamiAdSchool
Eddie Gomez's "It's A Mobile World" @MiamiAdSchool
 
Digital Citizenship WebQuest Info
Digital Citizenship WebQuest InfoDigital Citizenship WebQuest Info
Digital Citizenship WebQuest Info
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

1st-Quarter-Learning-Module-1-Empowerment-Technologies.docx

  • 1. MINDANAO MISSION ACADEMY of Seventh-day Adventists, Inc. The School that Offers Something Better Manticao, Misamis Oriental • • LEARNING MODULE FOR EMPOWERMENT TECHNOLOGIES • • HOW ARE YOU GOING TO LEARN? ICONS DESCRIPTION When you see this icon, it signals that you are to do a task classified as performance task. This is now a transfer of the knowledge that you learn from the lessons. This task merits the highest percentage in the grading system. This icon gives you an overview of the lesson that you will be learning. It is an introduction of the lesson and a recall of your prior knowledge regarding the topic. This icon gives you important lessons, core values integrated in the lessons. These are important concepts and strategies that will help you in life. You will find this icon before some chunks of text in the following pages. It tells you to carefully study the concepts, principles, or processes discussed in the text. It also tells you that there is a question to answer or an idea to think about it. ✎ This icon gives you important instructions to note and follow. Read every detail of instructions so you can follow them precisely. You will find this icon at the end of every topic. It signals a self-test to determine how well you have achieved the objectives set in the unit. Study the lesson well and you will perform quite well in the self-test. This will be submitted to your teacher after you answering the self-test. Write legibly and always follow instructions properly. ☞ This icon directs you to the specific activity which you need to answer and specific lesson for you to refer to as you answer the activity. Content Standard: The learner demonstrates understanding of:  ICT in the context of global communication for specific professional track  the use of advanced tools and techniques found in common productivity and software applications in developing ICT content for specific professional tracks Performance Standard: The learner is able to: 1. at the end of the 2-week period independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and professional tracks (Arts, TechVoc, Sports, Academic) 2. at the end of the 2-week period independently apply advanced productivity tools to create or develop ICT content for use in specific professional tracks. These may be in the form of, but not limited to:  Calculating spread sheet of athletic statistics (Sports)  Layout of catalogue of creative works (Arts)  Materials/ ingredients projections for batches of baked goods (Tech- Voc)  Letterhead/ business card design (Business/ Academic) Goal: You will create a brochure Role: Graphic/ Lay-out Artist employed under the Inter-Agency Task Force (IATF) against COVID-19 Audience: People of the Republic of the Philippines Situation: You are a graphic artist commissioned by the IATF to create a brochure that informs the people about the possible ethical public behaviors during pandemic. You will provide the Do’s and Don’ts of an individual when going out in public places. In the brochure you will also put your reaction towards the IATF guidelines implemented in the different parts of the country. Product: Brochure Teacher’s Name: Ailo Jhon A. Echavez Gmail Account: society.enacta@gmail.com Degree: BS – Information Technology Contact number: 0936-036-7190|0951-878-8460 Facebook Account: www.fb.com/AJAEchavezOfficial STUDENT’S NAME: Performance Task: Blogging Site (Website) 11 EMPOWERMENT TECHNOLOGIES 1st Quarter (MODULE 1) This handout will serve as your copy for the whole grading. (DO NOT RETURN THIS TO YOUR TEACHER) Module Submission:
  • 2. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 2 Standard: Rubric for Brochure As the popular saying goes, "Love makes the world go round:' But before you start looking for someone to fall in love with, you could argue how the Internet has made the world go round for decades. Likewise, in the motivation activity, the Internet has probably made your world go round. In this lesson, we will understand how Information and Communication Technologies have improved our lives in such a short period of time. Lesson Coverage ★ ★ ★ ★ ★ ★ STOP ☞ ( Go to Update your Status and Pre-test in the Activity Sheet) ★ ★ ★ ★ ★ ★ Information and Communication Technology (ICT) Information and Communication Technology (ICT) deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information. Whenwemake avideocall, weuse the Internet. When wesenda text ormakeacall,we use cellular networks. When we run out of load or battery, we use payphones which use a telephone network. Having a unified way to communicate is one of the goals of ICT. In terms ofeconomics,ICT hassavedcompaniesalotofresources(timeandmoney) withthekind of communication technology they use, nowadays. In a similar way, we spend less CATEGORY 5 4 3 2 1 Attractiveness& Organization (Design) The brochure has exceptionally attractive formattingand well-organized information. The brochure has attractive formattingand well-organized information. The brochure has some formatting and organized of information. The brochure's has limited formatting andorganization of information. The brochure hasno formatting and organization of material. Content - Accuracy/ Quantity Use of facts and the quantity of informationis exceptional. Use of facts and quantity of informationis very good. Use of facts and quantity of informationis good but not consistent. Use of facts and quantity of information is presentbut limited. Use of facts andquantity of information is limited. Writing - Organization Brochure has exception al organizati on Brochure has verygood organization. Brochure has good organization. Brochure has limited organization Brochure has no organization Writing - Grammar There are no grammatical mistakesin the brochure. There are very few grammatical mistakesin the brochure. There are some grammatical mistakesin the brochure. There are several grammatical mistakes in the brochure. Grammatical mistakes are so numerous that thereadability of the brochure is impaired. Graphics/ Pictures (Layout) Graphics go well withthe text and there is agood mix of text and graphics. Graphics go well withthe text, but there areso many that they distract from the text. Graphics go well with the text, but there aretoo few and the brochure seems "text-heavy". Graphics do not go with the accompanying text orappear to be randomly chosen. Graphics not present in the brochure. Total: 25 Points Lesson Title Learning Competency 1 Information and Communication Technology  compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges  apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks 2 Applied productivity tools with advanced application techniques  uses common productivity tools effectively by maximizing advanced application techniques Introduction Lesson 1| Information and Communication Technology
  • 3. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 3 because of ICT. As it normally costs us a peso to send a text message or SMS, with the Internet, we can send multiple messages and only be charged by a fraction. ICT in the Philippines Several international companies dub the Philippines as the " ICT Hub of Asia:' It is no secret that there is a huge growth of ICT-related jobs around the country, one of which is the call center or BPO (Business Process Outsourcing) centers. Accordingtothe2013editionofMeasuringthe InformationSocietybytheInternationalTelecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. That would mean that for every 100 Filipinos you meet, there is a high chance that they have a cellphone and approximately for the seven of them, they have two. In a data gathered by the Annual Survey of Philippine Business and Industries, NSO, in 2010, the ICT industry shares 19.3% of the total employment population here in the Philippines. To add to these statistics, Time Magazine's "The Selfiest Cities around the World" of 2013 places two cities from the Philippines in the top 1 and top 10 spots. The study was conducted using Instagram, a popular photo sharing application. With these numbers, there is no doubt that the Philippines is one of the countries that benefits most out of ICT. Web 2.0: Dynamic Web Pages The Internet has been a vital tool to our modern lives that is why it is also important to make the best of the Internet. When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the page is "as is" and cannot be manipulated by the user. The content is also the same for all users. This is referred to as Web 1.0. However, the World Wide Web is more than just static pages. Pretty soon, Web 2.0 came to the picture. Web 2.0 is a term coined by Darcy DiNucci on January 1999. In her article titled, "Fragmented Future," she wrote: The Web we know now, which loads into a browser window in essentially static screenfuls, is only an embryo of the Web to come. The first glimmerings of Web 2.0 are beginning to appear, and we are just starting to see how that embryo might develop. Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website differently than others. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications. Web 2.0 allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account. Web 2.0 also allows users to use web browsers instead of just using their operating system. Browsers can now be used for their user interface, application software (or web applications), and even for file storage. Most websites that we visit today are Web 2.0. Features of Web 2.0 The key features of Web 2.0 include: 1. Folksonomy - allows users to categorize and classify/arrange information usingfreely chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is also referred to as hashtag. 2. Rich User Experience - content is dynamic and is responsive to user's input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website. 3. User Participation - the owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews, and evaluation. Some websites allow readers to comment on an article, participate in a poll, or review a specific product (e.g., Amazon.com, online stores). 4. Long Tail - services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used. 5. Software as a Service - users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows the user to create and edit word processing and spreadsheet documents online. When you need a software, like a Word Processor, you can purchase it for a one-time huge amount and install it in your computer and it is yours forever. Software as a service allows you to "rent" a software for a minimal fee. 6. Mass Participation - diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0's content is based on people from various cultures. Web 3.0 and the Semantic Web The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The W3C standard encourages web developers to include semantic content in their web pages. The term was coined by the inventor of the World Wide Web, Tim Berners-Lee. Lee also noted that the Semantic Web is a component for Web 3.0. According to the W3C, "The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries!' The aim of Web 3.0 is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user. For example, when doing a web search in Web 2.0, the topmost result is based on the preference of several users who already searched for the item. The search engine then labels it the most common answer to the search query. Though there are instances wherein several preferences are considered like geographic location, Web 3.0 aims to do better. This is through studying personal preferences of an individual user and showing results based on those preferences. The Internet is able to predict the best possible answers to your question by "learning" from your previous choices. For example, if you search the Internet for "Where is the best place to go shopping?" Web 3.0 will aim to give you results depending on how you made choices in the past. If you have purchased several shoes online, the Internet will give you results on the best place with the highest rated shoes around your vicinity.
  • 4. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 4 Another example is when you search for the best restaurant to visit in a specific area. First, it may look for your previous visits from other restaurants and if you have rated them whether good or bad. In return, Web 3.0 will search for restaurants that have a similar menu, good rating, and budget that fit your preference in the past. Web 3.0 is yet to be fully realized because of several problems: 1. Compatibility. HTML files and current web browsers could not support Web 3.0. 2. Security. The user's security is also in question since the machine is saving his or her preferences. 3. Vastness. The World Wide Web already contains billions of web pages. 4. Vagueness. Certain words are imprecise. The words "old" and "small" would depend on the user. 5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time. Trends in ICT As the world of ICT continues to grow, the industry has focused on several innovations. These innovations cater to the needs of the people that benefit most out of ICT. Whether it is for business or personal use, these trends are the current front runners in the innovation of ICT.  Convergence Technological convergence is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. It can also use cloud technologies to sync files from one device to another while also using LTE technology which means you can access your files anytime, anywhere. Convergence is using several technologies to accomplish a task conveniently.  Social Media Social media is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content. According to Nielsen, a global information and measurement company, Internet users spend moretimeinsocial media sites than in anyothertype ofsite.Withthis,more andmore advertisers use social media to promote their product. There are six types of social media: Social Networks. These are sites that allow you to connect with other people with the same interests or background. Once a user creates his or her account, he or she can set up a profile, add people, create groups, and share content. Examples: Facebook and Google+ Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources. Most of these sites allow you to create a tag that allows you and others to easily search or share them. Examples: StumbleUpon and Pinterest Social News. These are sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may alsobe ranked.They are alsocapable of votingon these newsarticlesof the website. Those who get the most amount of votes are shown most prominently. Examples: reddit and Digg Media Sharing. These are sites that allow you to upload and share media content like images, music, and video. Most of these sites have additional social features like liking,commenting,andhavinguserprofiles. Examples:Flicker,YouTube,and Instagram Microblogging.Theseare sites that focus on short updates from the user. Thosesubscribed to the user will be able to receive these updates. Examples: Twitter and Plurk Blogs and Forums. These websites allow users to post their content. Other users are able to comment on the said topic. There are several free blogging platforms like Blogger, WordPress, and Tumblr. On the other hand, forums are typically part of a certain website or web service.  Mobile Technologies The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do tasks that were originally found in personal computers. Several of these devices are capable of using high-speed Internet. Today, the latest mobile devices use 4G Networking (LTE), which is currently the fastest mobile network. Also, mobile devices use different operating systems: iOS - used in Apple devices such as the iPhone and iPad Android - an open source operating system developed by Google. Being open source means several mobile phone companies use this OS for free. Blackberry OS - used in Blackberry devices Windows Phone OS - a closed source and proprietary operating system developed by Microsoft® Symbian the original smartphone OS; used by Nokia devices WebOS - originally used for smartphones; now used for smart TVs Windows Mobile - developed by Microsoft® for smartphones and pocket PCs  Assistive Media Assistive media is a nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user. You may visit http://www.assistivemedia.org/ for several of their audio recordings. Online Safety and Security The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things in this world, there is always the “other side of the coin." The Internet is one of the most dangerous places, especially if you do not know what you are doing with it. But there is no need to worry; it is never that late. Hopefully, by the end of this lesson, you are able to consider how you go about your use of the Internet. Let us visit each item and see how risky it is to share them.
  • 5. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 5 The Internet is defined as the information superhighway. This means that anyone has access to this highway, can place information, and can grab that information. Any information, even things that you have set privately, can be accessed one way or another. This is why social networking sites like Facebook continue to improve their security features. Thethreatofcybercrimeisveryreal.Whileyoumaynotexperiencethethreatnow, whateverinformation we share today could affect our future. Tips to Stay Safe Online The Internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using the Internet.  Be mindful of what you share online and what site you share it to.  Do not just accept terms and conditions; read it.  Check out the privacy policy page of a website to learn how the website handles the information you share.  Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.  Do not share your password with anyone.  Avoid logging in to public networks/Wi-Fi. Browsing in "incognito (or private) mode," a feature of the browser, will not protect you from hackers.  Do not talk to strangers whether online or face-to-face.  Never post anything about a future vacation. It is similar to posting, "Rob my house at this date."  Add friends you know in real life.  Avoid visiting untrusted websites.  Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts.  If you have a Wi-Fi at home, make it a private network by adding a password.  Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner. Typeofinformation Risks First name There is a risk in sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you only give out your first name. Likewise, you cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with. Last name If sharing your first name is a small risk, having both your first and last is riskier. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face is a modus to several cybercrimes like identity theft. Middle name Sharing your middle name alone is probably not the most risky of these shared information, but sharing your full name would be. Current and previous school(s) Most people who steal identities study their subject. They can use this information for verification purposes. Your cellphone number Your cell phone number should never be posted over the Internet. The Internet is a public place. It is the same as posting your number on a billboard. You would not-want random strangers to text or call you, or worse, pretend that they are someone else. The name of your mother and father Risky, yet not as risky as posting their full names, especially your mother's maiden name. In fact, you may have already encountered many websites that require your mother's maiden name as an answer to a secret question whenever you lose your password. The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe you. Your address Hopefully, you answered "no" to this one. Giving the Internet your number is one thing; giving them your address is a whole other level. It would be much easier for criminals to find you. Your home phone number This shared information is riskier than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you. Your birthday Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.
  • 6. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 6  Buy the software; do not use pirated ones.  Do not reply or click links from suspicious emails. Most people would dispute that there is no such thing as private over the Internet and they may be right. There are hackers who can find a backdoor even if your profile is already set to private. You have no control of whoever is looking at your friend's screen whenever they open your profile or chat with you. You have no control over people getting access to your friend's account and seeing your private stuff. We cannot assure and proclaim that following tips to stay safe online can keep us out on danger on online world. But all we can assure and proclaim 100% is that if we have in GOD’s hand, we are all 100% safe and 100% be guided through the right path. Internet Threats Here are some of the threats you should be aware of when using the Internet: 1. Malware - stands for malicious software a. Virus - a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs b. Worm - a malicious program that transfers from one computer to another by any type of means. Often, it uses a computernetworktospreaditself.Forexample, the ILOVEYOU worm (Love Bug Worm) created by a Filipino. c. Trojan - a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information *Rogue security software - tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all. d. Spyware -a program thatruns in thebackgroundwithout you knowingit(thuscalled"spy").Ithastheabilitytomonitor what you are currently doing and typing through keylogging. *Keyloggers - used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard. e. Adware - a program designed to send you advertisements, mostly as pop-ups 2. Spam - unwanted email mostly from bots or advertisers. It can be used to send malware 3. Phishing - Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information. 4. Pharming - a more complicated way of phishing where it exploits the DNS (Domain NameService) system. Protecting Reputations Online In the past, doing something embarrassing was not much of a big deal. It happened; people would laugh at it, and they would move on. Nowadays, embarrassing moments are captured using any device you could imagine. What is worse is that people can easily upload it to the Internet, where it can be stored forever. This could impact not only your reputation but also the people around you. What is worse is that people tend to ignore this fact, and suffer from it later in their life. Once you post something over the Internet, search engines keep them in their archives for search results. This makes anything you post to last forever even if you delete it in your page. Something you and your friends find funny today may be something that could harm someone's reputation later. Before hiring, companies do a background check on the applicant, and the easiest way to check your background is to visit pages that are related to you. Thus, if they find disreputable information about you, it may harm your reputation even if this information has been discarded. Think Before You Click Here are things you might want to consider before posting something over the Internet:  Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts.  Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.  Set your post to "private." In this way, search engines will not be able to scan that post.  Avoid using names. Names are easy for search engines to scan.  If you feel that a post can affect you or other's reputation, ask the one who posted it to pull it down or report it as inappropriate. We all know that 100% we are secured when we are in GOD’s hand, but we cannot avoid that there are many temptations in this earth just like in the internet, there are also Threats but According to James 4:7 “Submit yourselves, then, to God. Resist the devil, and he will flee from you.”. Copyright Infringement If you create something—an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others. This is called intellectual property. In other words, the copyright law includes your rights over your work, and IFL IFL
  • 7. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 7 anyone who uses it without your consent is punishable by law. Try grabbing any book then browse its first few pages and you will find a page with a disclaimer with the words: "No part of this book may be copied, reproduced..."That is a copyright page. As a responsible user of the Internet, you have to consider that not everything out there is free for you to use. Just like your own, contents that you see from websites have their respective copyrights. There are several instances where employees or business owners face copyright infringement and are sentenced to a huge fine due to reckless copying of materials. Here are some tips that could help you avoid copyright infringement: 1. Understand. Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics), choreography, andsculptures, but it generally doesNOT protect underlying ideas and facts. This means that you can express something using your own words, but you should give credit to the source. 2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be responsible enough to know if something has a copyright. 3. Be creative. Ask yourself whether what you are making is something that came from you or something made from somebody else's creativity. It is important to add your own creative genius in everything that will be credited to you. 4. Know the law. There are some limitations to copyright laws. For instance, in the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also provisions for "fair use" which mean that an intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education. If you have doubts that what you are doing does not fall under the policy of fair use, seek permission first. Another misconception is that fan-fiction is not copyright infringement. In reality, it is and some copyright holders ignore them but they can opt to use their rights. Online search Online search is the process of interactively searching for and retrieving requested information via a computer from databases that are online. Interactive searches became possible in the 1980s with the advent of faster databases and smart terminals. Advantages: • Ability to obtain a large sample, which increases statistical power • Data is automatically coded so no data entry errors • Reduced cost of conducting research Disadvantages: • Online is not totally secure and theft is one of the numerous danger it poses, researchers personal information is at risk of being access by rogue persons. • Some of the materials on the internet have not been evaluated by experts or thoroughly screened. • Lack of accreditation and low quality Mail Merge and Label Generation Mail Merge One of the important reasons in using computers per se is its ability to do recurring tasks automatically. But this ability has to be honed by learning the characteristics and features of the software you use with your computer. After all, no matter how good or advance your computer and software may be, it can only be as good as the person using it. In this particular part of our lesson, we will learn one of the most powerful and commonly used features of Microsoft® Word called "Mail Merge." As the name suggests, this feature allows you to create documents and combine or merge them with another document or data file. It is commonly used when sending out advertising materials to various recipients. The simplest solution for the scenario above is to create a document and just copy and paste it several times then just replace the details depending on whom you send it to. But what if you have hundreds or thousands of recipients? Would not that take too many hours? What if you have a small database of information where you can automatically generate those letters? Mail merging basically requires two components: the document that contains the message and the document or file that generally contains the list of names and addresses, as in our scenario. When these two documents arecombined (merged) during mail merging, feed your printer with enough paper until all mailers are printed out. Each document includes the individual names and addresses you need to send it to. Let us assume this is the mailer that you would want to send: Lesson 2| Applied productivity tools with advanced application techniques Sample Form Document
  • 8. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 8 Two Components of Mail Merge 1. Form Document Our sample letter above is what we call a form document—the first component of our mail merged document. It is generally the document that contains the main body of the message we want to convey or send. The main body of the message is the part of the form document that remains the same no matter whom you send it to from among your list. Also included in the form document is what we call place holders, also referred to as data fields or merge fields. This marks the position on your form document where individual data or information will be inserted. From our sample document, the place holders are denoted or marked by the text with double-headed arrows (« ») on each side and with a gray background. On a printed standard form, this will be the underlined spaces that you will see and use as guide to where you need to write the information that you need to fill out. In its simplest form, a form document is literally a "form" that you fill out with individual information. A common example of a form document is your regular tax form or application form. Then there is also a form letter which is exactly like the one in our example above. 2. List or Data File The second component of our mail merged document is the list or data file. This is where the individual information or data that needs to be plugged in (merged) to the form document is placed and maintained. One of the best things about the mail merge feature is that it allows data file to be created from within the Microsoft® Word application itself, or it gets data from a file created in Microsoft® Excel or other data formats. In this way, fields that needed to be filled up on the form document can easily be July 28, 2020 <<Name>> <<Company>> <<Address Line 1>> <<Address Line 2>> <<Address Line3>> Dear <<Title>>, We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified! Being one of our loyal customers. we would like to thank you for trusting and carrying our product line in your store. Included in this promo kit are the mechanics of our promo and the catalog from where you can see and choose from our exciting new products. Please do not hesitate to contact us should you have further inquiries regarding the details of the promo or about any of the new products in our catalog. We look forward to doing more business with you. Again: thank you very much and more power. Your partner in merchandising. Red Dragon. Inc.
  • 9. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 9 maintained without accidentally altering the form or main document. You can easily add, remove, modify, or extract your data more efficiently by using other data management applications like Excel or Access and import them in Word during the mail merge process. Label Generation Included in the mail merge feature on Microsoft® Word is the Label Generator. It just makes sense that after you print out your form letters, you will need to send it to individual recipients in an envelope with the matching address printed directly on the envelope or on a mailing label tostick on. By using virtually, the same process as a standard mailmerge, Microsoft' Word will print individual addresses to a standard form that it has already pre-formatted. Simply put, it creates a blank form document that simulates either a blank label or envelope of pre-defined size and will use the data file that you selected to print the information, typically individual addresses. So even in generating labels, the two essential components of creating a merged document are present: the form document and the data file. Only in this case, you did not have to type or create the form document yourself because it was already created and pre- formatted in Microsoft® Word. All you need to do is select the correct or appropriate size for the label or envelope and select the data file that contains the addresses (data) to be printed. You can also preview your merged labels before printing if you want to. ✓Learning Competency: Uses common productivity tools effectively by maximizing advanced application techniques. ✓Learning Outcome: Create a simple mail merge document using common productivity tool such as Microsoft word. Now that we have learned the components needed to accomplish a successful mail merge, let us put theory into practice. Let us take a look at the steps to create a simple mail merge document. Following our scenario, take the following steps to create and merge a simple covering letter to a list of names that you were tasked to send the letters to. To prepare for this activity, let us build a list of at least ten names of people with their corresponding title, company name, and address. You may use the following fields: title, name, company, address line 1, address line 2, and address line 3. Refer to the table on the next page for the format of the list as an example. You may just write down your list on a piece of paper to make it handy and available when you need it during the course of this activity. Exchanging names and addresses with your classmates could be a good idea to build your list quickly. Steps in creating a simple mail merge: Step 1. Open Microsoft° Word and start a new blank document. You can use the keyboard shortcut Ctrl+N after Microsoft' Word has been loaded or opened. Step 2. On the Mailings tab, from the Start Mail Merge group, choose Start Mail Merge— ►Letters. Type the letter below. You will be typing in only the common parts of the letter. The text that does not change for each copy you print. Title Name Company Address Address Address Sir Arnold Reyes ABC Inc. 23 Sierra St. Alabang Muntinlupa City Madam Maria Santos XYZ Corp. 45 Oro Drive San Juan Metro Manila … … … … … … Activity no. 1: Mail Merge and Label Generation
  • 10. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 10 Step 3. Save your letter and name it "Sample Letter:' Step 4. Insert the fields you need in the letter (Name, Company, Address Line 1, Address Line 2, Address Line 3, and Title). You may want to make special markings on these fields as you are typing it. Most common marking you can do is by typing it in capital letters or ALL CAPS so you can easily identify them later. July 28, 2020 Dear , We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified! Being one of our loyal customers. we would like to thank you for trusting and carrying our product line in your store. Included in this promo kit are the mechanics of our promo and the catalog from where you can see and choose from our exciting new products. Please do not hesitate to contact us should you have further inquiries regarding the details of the promo or about any of the new products in our catalog. We look forward to doing more business with you. Again: thank you very much and more power. Your partner in merchandising. Red Dragon. Inc. July 28, 2020 NAME COMPANY ADDRESS LINE 1 ADDRESS LINE 2 ADDRESS LINE 3 Dear TITLE, We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified! Being one of our loyal customers. we would like to thank you for trusting and carrying our product line in your store. Included in this promo kit are the mechanics of our promo and the catalog from where you can see and choose from our exciting new products. Please do not hesitate to contact us should you have further inquiries regarding the details of the promo or about any of the new products in our catalog. We look forward to doing more business with you. Again: thank you very much and more power. Your partner in merchandising. Red Dragon. Inc.
  • 11. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 11 Step 5. Save the main document once more. You can use Ctrl+S to quickly do this step. Step 6. On the Mailings tab in the Start Mail Merge group, choose Select Recipients Type a New List. Step 7. Click the Customize Columns button on the dialog box for the New Address List. * This will allow you to modify the fields in the address list that Microsoft word has pre-determined. Step 8. Select a field that you do not need then click the Delete button. A confirmation dialog box appears. Step 9. Click Yes in the confirmation dialog box. The dialog box closes, and the unnecessary field disappears. Step 10. Repeat steps 8 and 9 for each field you do not need. After removing the excess fields, the next step is to add the fields you need. Step 11. To add a field that you need in your document, click the Add button. Step 12. Type the field name on the prompt inside a small Add Field dialog box and click the OK button. Step 13. Repeat steps 11 and 12 for each new field you need in your main document. Step 14. Click the OK button on the Customize Address List dialog box to confirm your changes. Step 15. The New Address List dialog box will appear again ready for you to type in your data. Step 16. Type the individual data from your list corresponding to Name, Company, Address Line 1, Address Line 2, Address Line 3, and Title. Step 17. Press the Tab key each time to enter the next field. Step 18. To add a new record, press the Tab key after inputting the last field. When you press the Tab key on the last field in a record, a new record is automatically created and added on the next line. Step 19. Repeat steps 16 through 18 until you enter all the records you want. Once you are done typing your data, click the OK button on the Add New List dialog box to save your data. A special Save Address List dialog box pops up, allowing you to save the recipient list. Step 20. Type a name for the address list. Name it "Client List." Step 21. Click the Save button. You should be back on your main document soon after. Step 22. Select a field placeholder (ALL CAPS) in the main document. Step 23. Click the Insert Merge Field command button. Step 24. Choose the proper field to insert into your text. For example, if you are replacing the text name in
  • 12. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 12 your document with a name field, choose the Name Field from the Insert Merge Field menu. The field is inserted into your document and replaces the ALL CAPS text. Step 25. Continue adding fields until the document is complete. Repeat steps 22 through 24 as necessary to stick all fields into your document. Step 26. Save the main document. Step 27. Choose Finish & Merge to edit, print, or send your merged documents through email. Step 28. Or you may want to choose Preview Results to check your work before you send it. Step 29. You should get a merged document close to this one: If you decide to print the document, the Merge to Printer dialog box appears, from which you can choose records to print. Choose All to print your entire document. Alternatively, you can specify which records to print. Click OK. The traditional Print dialog box appears. Click the OK button again to print your documents. Step 30. Save and close your document. Congratulations, you have just created a simple mail merge document. Integrating Images and External Materials Integrating or inserting pictures in your document is fun and it improves the impression of your document. A common use of inserting a picture on a document is when you are creating your resume. Though seemingly simple to do, your July 28, 2020 Arnold Reyes ABC Inc. 23 Sierra St. Alabang Muntinlupa City Dear Sir, We would like to announce and invite you to avail of our 3rd quarter promo, for which you are qualified! Being one of our loyal customers. we would like to thank you for trusting and carrying our product line in your store. Included in this promo kit are the mechanics of our promo and the catalog from where you can see and choose from our exciting new products. Please do not hesitate to contact us should you have further inquiries regarding the details of the promo or about any of the new products in our catalog. We look forward to doing more business with you. Again: thank you very much and more power. Your partner in merchandising. Red Dragon. Inc.
  • 13. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 13 knowledge on the different kinds of materials that you can insert or integrate in a Word document and its characteristics can help you create a more efficient, richer document not only in content but also in physical form. A better understanding of the physical form of your document as well as the different materials you integrate in it would allow you to be more efficient and versatile in using Microsoft® Word. Let us consider the interesting aspects of inserting or integrating images and other external materials which is categorized as an advanced feature. Kinds of Materials There are various kinds of materials Microsoft' Word is capable of integrating to make your documents richer, more impressive, and more informative. The screenshot above shows the kinds of materials that can be integrated or inserted in your Microsoft® Word document. One can easily get excited and instead create a collage of what is generally called images and arts rather than an enriched text document. One important thing to remember is that images and other materials are not to be inserted as images for design purposes only, but they are used to enhance or improve the effectiveness of the message you want to convey. Let us describe each of them. 1 . Pictures. Generally, these are electronic or digital pictures or photographs you have saved in any local storage device. There are three commonly used types of picture files. You can identify them by the extension on their file names. a. .JPG. This ispronouncedas"jay-peg," andistheshort form for .jpegorJoint Photographic Experts Group. Like all the rest of the image file extensions, it identifies the kind of data compression process that it uses to make it more compatible and portable through the Internet. This type of image file can support 16.7 million colors that is why it is suitable for use when working with full color photographic images. Unfortunately, it does not support transparency and therefore, images of this file type can be difficultto integrateintermsofblending withothermaterialsorelementsinyourdocument. But if you are looking for the best quality image to integrate with your document, then this is the image file type for you. JPG does not work well on lettering, line drawings, or simple graphics. .JPG images are relatively small in file size. b. .GIF. This stands for Graphics Interchange Format. This type of image file is capable of displaying transparencies. Therefore, it is good for blending with other materials or elements in your document. It is also capable of displaying simple animation. Apparently, this may not be too useful on a printed document but if you are sending documents electronically or through email, or even post documents into a website, then this could be quite impressive. The downside is that it can only support up to 256 colors so it is good mostly on logos and art decors with very limited, and generally solid colors. .GIF is much better for logos, drawings, small text, black and white images, or low- resolution files. c. .PNG. This is pronounced as "ping." It stands for Portable Network Graphics. It was built around the capabilities of .GIF. Its development was basically for the purpose of transporting images on the Internet at faster rates. It is also good with transparencies but unlike. GIFs, it does not support animation but it can display up to about 16 million colors, so image quality for this image file type is also remarkably improved. .PNG allows the control of the transparency level or opacity of images. 2. Clip Art. This is generally a .GIF type; line art drawings or images used as generic representation for ideas and objects that you might want to integrate in your document. Microsoft® Word has a library of clip arts that is built in or can be downloaded and used freely. There are still other clip arts that you can either purchase or freely download and use that come from third-party providers. 3. Shapes. These are printable objects or materials that you can integrate in your document to enhance its appearance or to allow you to have some tools to use for composing and representing ideas or messages. If you are designing the layout for a poster or other graphic material for advertising, you might find this useful. 4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form ideas that are organizational or structural in nature. If you want to graphically represent an organization, process, relationships, or flow for infographic documents, then you will find this easy and handy to use. 5. Chart. Another type of material that you can integrate in your Word document that allows you to represent data characteristics and trends. This is quite useful when you are preparing reports that correlate and present data in a graphical manner. You can create charts that can be integrated in your document either directly in Microsoft' Word or imported from external files like Microsoft® Excel. 6. Screenshot. Sometimes, creating reports or manuals for training or procedures will require the integration of a more realistic image of what you are discussing on your report or manual. Nothing can get you a more realistic image than a screenshot. Microsoft' Word even provides a snipping tool for your screen shots so you can select and display only the part that you exactly like to capture on your screen. Image Placement In practice, inserting an image or any other material in your document is quite easy especially if the material already exists in your local storage device. It is just a matter of opening up the image file through the Microsoft' Word dialog box or wizard. Sometimes, if the image you would like to insert is on a web page currently displayed on your screen, it could be copied and pasted. The real challenge Figure 3. Wrap Text drop-down menu in Word 2010 showing the preset options
  • 14. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 14 is where to put the image you inserted or where tomove it.Inthispart ofthe lesson, wewillstudy thedifferentcharacteristicsoftext wrapping options that you can use with the image you integrated in your document. 1 . In Line with Text. This is the default setting for images that are inserted or integrated in your document. It treats your image like a text font with the bottom side totally aligned with the text line. This setting is usually used when you need to place your image at the beginning of a paragraph. When placed between texts in a paragraph or sentence, it distorts the overall appearance and arrangement of the texts in the paragraph because it will take up the space it needs vertically, pushing whole lines of texts upward as in the example below. Example: Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus 2. Square. This setting allows the image you inserted to be placed anywhere within the paragraph with the text going around the image in a square pattern like a frame. Example: Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus 3. Tight. This is almost the same as the Square setting, but here the text "hugs" or conforms to the general shape of the image. This allows you to get a more creative effect on your document. This setting can mostly be achieved if you are using an image that supports transparency like a .GIF or .PNG file. Example: Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus. 4. Through. This setting allows the text on your document to flow even tighter, taking the contours and shape of the image. Again, this can be best used with a .GIF or .PNG type of image. Example: Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus. 5. Top and Bottom. This setting pushes the texts away vertically to the top and/or the bottom of the image so that the image occupies a whole text line on its own as in the example. Example: Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus. 6. Behind Text. This allows your image to be dragged and placed anywhere on your document but with all the texts floating in front of it. It effectively makes your image look like a background. Example:
  • 15. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 15 Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus. 7. In Front of Text. As it suggests, this setting allows your image to be placed right on top of the text as if your image was dropped right on it. That means whatever part of the text you placed the image on, it will be covered by the image. In our example below, notice the difference between using a .PNG file (on the left) with a transparency effect, and a JPG file on the right. Example: Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Vestibulum bibendum condimentum tristique. Quisque feugiat laoreet lorem at pharetra. Sed ipsum elit, dignissim in sodales in, feugiat sagittis ligula. Pellentesque mollis lorem ac nulla gravida, quis omare metus suscipit. Ut quis egestas neque, vitae sagittis dui. Donec ut venenatis purus. The Bible is a written word the very essential document we have to keep. Creating an Effective Presentation Designing your presentation is the fun part of creating a report for it gives you a chance to be creative. Placing animations, transitions, and art could be on your mind right now. But whether or not these features would help is generally up to you. Sometimes, these things could actually distract your audience rather than help you. Here are some quick tips in creating an effective presentation. 1. Minimize. Keep slide counts to a minimum to maintain a clear message and to keep the audience attentive. Remember that the presentation is just a visual aid. Most information should still come from the reporter. 2. Clarity. Avoid being fancy by using a font style that is easy to read. Make sure thatitisalsobigenoughtobereadbytheaudience. Onceyou startmakingyour presentation, consider how big the screen is during your report. Tip: A font size of 72 is about an inch (depends on the screen size). A one-inch letter is readable 10 feet away; a two-inch letter is readable 20 feet away. 3. Simplicity. Use bullets or short sentences. Summarize the information on the screen to have your audience focus on what the speaker is saying than on reading the slide. Limit the content to six lines and seven words per line. This is known as the 6 x 7 rule. 4. Visuals. Use graphics to help in your presentation but not too many to distract the audience. In addition, instead of using a table of data, use charts and graphs. 5. Consistency. Make your design uniform. Avoid having different font styles and backgrounds. 6. Contrast. Use light font on dark background or vice versa. This is done so that it is easier to read. In most instances, it is easier to read on screen if the background is dark. This is due to the brightness of the screen. * Sample output for a serenade service. IFL
  • 16. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 16 As you can see from the sample presentation, not all information is presented in the visual aid. Using Hyperlinks in Microsoft® PowerPoint Using hyperlinks in your presentation is an easy way to navigate slides during your presentation. In your group's case, it may be wise to insert action buttons for most slides or ace hyperlinks to your Excel file in case your audience asks a specific question. Ways to insert hyperlinks: 1 . Open a PowerPoint application and type any Words. Select an object or highlight a text.
  • 17. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 17 2. Go to Insert > Hyperlinks (under links category) or use the shortcut key Ctrl + K The Insert Hyperlink dialog box would appear. Link to options: a. Existing File or Web Page - creates a hyperlink to website or a local file saved in your hard drive. Just browse your file in the dialog box or type the web address. b. Place in This Document - creates a hyperlink that allows you to jump to a specific slide in your presentation c. Create a New Document - creates a hyperlink that once clicked, creates a new document on your specified location d. E-mail Address - creates a hyperlink that opens Microsoft' Outlook that automatically adds your specified recipient on a new email 3. For example, you choose the Existing File or Web Page. When done, click OK to apply your hyperlink. Embedding Objects in Microsoft' PowerPoint Embedding objects is easy using Microsoft® PowerPoint. With this option, you can insert an Excel file that would look like a table to a presentation. Embedding an Excel File to your Slide presentation 1. Go to the Insert tab.
  • 18. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 18 2. On the Text group, click on Object. 3. The Insert Object dialog box would appear: Options: a. Creates New - creates a new file from scratch. You can select on a wide variety of files listed. b. Create from File - creates a file from an existing file saved on your hard drive; simply browse the file to use it. Putting a check on the "link" option will allow you to modify the Excel file inside your presentation. 4. Once you are done, click OK. Emphasizing ideas as we relate ourselves to this we are the living word that are easily seen by people just like PowerPoint presentation we only present highlights of the documents. In the same way the way we treat other people is easily highlighted. Spreadsheet Skills Estimating the Product Cost using Microsoft® Excel Let us assume that we are going to sell milk tea with the following information: ProductInformation ProductName/Brand:StarbukoOrganic MilkTea Company/Group Name:Starbuko FoodsCorporation Product Description: Starbuko MilkTeais aspecialmilk tea usingorganic ingredients especiallymade for Filipinos. Ingredients/Materials:Organic tea, water,condensedmilk, ice, specialsweetener Estimated Sale Price: 25PHP percup We will use Microsoft' Excel to find out if our estimated sale price is reasonable considering the actual price of the ingredients. 1. Copy the information below: Note: Values with PHP or Philippine peso sign use the Accounting Number format. Its default uses the dollar symbol ($). To change this, click the drop-down arrow at the currency button then select More Accounting Formats, then change the symbol to PHP. IFL
  • 19. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 19 2. Use the SUM formula to get the summation of the values from C4 to C7. The SUM formula is =SUM (C4:C7). Type this on cell C8 as shown below: 3. Check if our estimated price will earn us profit. Type the additional information shown below then apply the arithmetic formula for subtraction: 4. The result is PHP2.20. Our estimated price is not profitable. Let us make an adjustment. Include the information below and deduct the Total from the New Sale Price: 5. The result is PHP7.80. This is definitely profitable at this price. However, this does not guarantee our product's success. 6. Save your file as L4 Cost of Ingredients.xlsx. Excel-is like the word of God if you are looking for complete and accurate truth you just turn to his words. ★ ★ ★ ★ ★ ★ STOP ☞ ( Go to Activity 2: Valuing ICT & Post-test ) ★ ★ ★ ★ ★ ★ (2016). Empowerment Techologies. Quezon City: Rex Book Store. REFERENCE USED IN THIS LESSON s IFL
  • 20. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 20 MINDANAO MISSION ACADEMY of Seventh-day Adventists, Inc. The School that Offers Something Better Manticao, Misamis Oriental • • ACTIVITY SHEETS • • STUDENT’S NAME: CONTACT #: SCORE: Update your Status Instruction: Before you will explore what is Information Technology all about, update your Status First by using Facebook application. Write your status in the space provided below. You can write what you are feeling right now or you may also write what you wanted to know about information technology. You can use hashtags and emoticons if you want. Pre-test Let’s find out how much you already know about this module. A. Instruction: Identify what is being asked. Write your answer on the space before each number. B. Instruction: Define each word according to what you already know. Write your answers on the space provided. 5 points each. 1. Information - 2. Technology - ✓Learning Competency: Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges. ✓Learning Outcome: Differentiate the three essential Microsoft applications. ___________ 1. Is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content. ___________ 2. It treats your image like a text font with the bottom side totally aligned with the text line. ___________ 3. Allows users to categorize and classify/arrange information usingfreely chosen keywords (e.g., tagging). ___________ 4. This is generallya .GIF type;line art drawingsor images used as generic representation for ideas and objects that you might want to integrate in your document. ___________ 5. Another type of material that you can integrate in your Word document that allows you to represent data characteristics and trends. ___________ 6. This allows your image to be dragged and placed anywhere on your document but with all the texts floating in front of it. ___________ 7. Is the process of interactively searching for and retrieving requested information via a computer from databases that are online. ___________ 8. Basically requires two components: the document that contains the message and the document or file that generally contains the list of names and addresses, as in our scenario. ___________ 9. These are printable objects or materials that you can integrate in your document to enhance its appearance or to allow you to have some tools to use for composing and representing ideas or messages. ___________ 10. A more complicated way of phishing where it exploits the DNS (Domain NameService) system. RETURN THIS TO YOUR TEACHER Module Submission: 11 EMPOWERMENT TECHNOLOGIES 1st Quarter (MODULE 1)
  • 21. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 21 Instruction: Using Triple Venn Diagram, compare Microsoft Word, PowerPoint and Excel. Write down their similarities and differences in the space. You may use the diagram below for your guide. Guide: Answer: Activity no. 2: Venn Diagram *Similarities of Excel and PowerPoint Microsoft Excel Microsoft PowerPoint *Similarities of Word and PowerPoint *Similarities of Word, PowerPoint and Excel Microsoft Word *Similarities of Word and Excel
  • 22. EMPOWERMENT TECHNOLOGIES • AJA ECHAVEZ • ABM |PAGE 22 Post-test Let’s find out how much you have learned about this module. A. Instruction: You are going to fill out the space provided for KWL Chart. TOPIC: Information and Communication Technology & Applied productivity tools with advanced application techniques KWL Chart What I KNOW What I WANT to Know What I LEARNED (Use this space to discuss your background knowledge about the topic.) (Look at what you already know and note some of the questions sparked by your background knowledge.) (Summarize your learning here and note whether the lesson answered the questions you had at the beginning.) B. Instruction: Make a short discussion for each item. Write your answer in the space provided. 1. Sharing my username and password to anyone. Answer: 2. Putting all the content on the PowerPoint presentation rather than putting the key points and simplifying the content. Answer: 3. Keeping my information public on social media such as home address, contact number and other important information. Answer: 4. Installing an anti-virus on my computer. Answer: ✦ ✦ (Congratulations! You are done for 1st quarter 1st Module, you are now ready to learn for the next lessons (Imaging and Design for the Online Environment) ✦ ✦