Influencing policy (training slides from Fast Track Impact)
Empowering Technologies for Social Change
1. HUMSS
Francine Mae F. Cruz
POWERPOINT PRESENTATION
Dir Russel Marquez
Empowerment technologies
2.
3. What is Empowerment Technology?
Empowering the World with the use of
technology. We're so lucky because the
technologies are present everywhere it help
us to make our work quickly and accurate. It is
timely updated and always upgraded. In this
generation, technology has many uses and
important role to our lives and what we all to
do is to empower it by doing some things that
have value or good benefit to us by the use of
gadgets and computers.
4. In this lesson you will learn about
INTRODUCTION TO ICT
ONLINE SAFETY, SECURITY
AND RULES OF NETIQUETTE
ADVANCED WORD PROCESSING
SKILLS
ADVANCED SPREADSHEET
SKILLS
ADVANCED
PRESENTATION SKILLS
IMAGING AND DESIGN
FOR ONLINE ENVIRONMENT
ONLINE PLATFORMS FOR ICT CONTENT
DEVELOPMENT
BASIC WEB PAGE CREACTION
COLLABORATIVE ICT DEVELOPMENT
INTERACTIVE MULTIMEDIA
ICT AS PLATFORM FOR CHANGE
ICT PROJECT FOR SOCIAL CHANGE
ICT PROJECT PUBLICATION AND
STATISTICS
ICT PROJECT MAINTENANCE
DISADVANTAGES OF ICT
5. ICT– Information and Communication-
It deals with the use of different communication technologies such as mobile
phones, telephone, Internet to locate, save, send and edit information
Is a study of computers as data processing tools. It introduces students to the
fundamental of using computer systems in an internet environment.
ICT in the Philippines
Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-
related jobs, one of which is BPO, Business Process Outsourcing, or call centers.
ICT Department in the Philippines is responsible for the planning,
development and promotion of the country’s information and communications
technology (ICT) agenda in support of national development.
LESSON 1: INTRODUCTION TO ICT
6. Computer– an electronic device for storing and processing
data, typically in binary form, according to instructions
given to it in a variable program.
Internet– is the global system of interconnected computer
networks that use the internet protocol suite (TCIP/IP) to
link billions of devices worldwide.
Means of connecting a computer to any other computer anywhere in the world
via dedicated routers and servers.
Sometimes called simply ‘’the Net’’, is a worldwide system of computer
networks- a network of networks in which the users at any one computer can get
information from any other computer.
7. An information system on the internet that
allows documents to be connected to other
documents by hypertext links, enabling the user
to search for information by moving from one
document to another.
Is an information space where documents
and other web resources are identified by urls,
interlinked by hypertext links, and can be
accessed via the internet.
Invented by tim-berners lee
World Wide Web
Web Pages
Web page is a hypertext document connected to
the World Wide Web. It is a document that is suitable
for the World Wide Web.
8. The different online platforms of World Wide Web:
1. Web 1.0 – refers to the first stage in the World Wide Web, which
was entirely made up of the Web pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages.
The user is able to see a website differently than others.
Allows users to interact with the page; instead of just reading the
page, the user may be able to comment or create user account .
3. Web 3.0 – this platform is all about semantic web.
Aims to have machines (or servers) understand the user’s
preferences to be able to deliver web content.
Static Web Page- is known as a flat page or stationary age in the sense that the page
is ‘’as is’’ and cannot be manipulated by the user. The content is also the same for all
users that is referred to as Web 1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web
pages. The user is able to see website differently than others e.g. social networking
sites, wikis, video sharing sites.
9. FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information
using freely chosen keywords e.g. tagging by FB, Twitter, use tags
that start with the sign #, referred to as hash tag.
2.Rich User Experience – content is dynamic and is responsive to
user’s input
3.User Participation- The owner of the website is not the only one
who is able to put content. Others are able to place a content of
their own by means of comments, reviews and evaluation e.g.
Lazada , Amazon.
4. Long Tail– services that are offered on demand rather than on a
one-time purchase. This is synonymous to subscribing to a data plan
that charges you for the amount of time you spent in the internet.
5. Software as a services- users will be subscribe to a software only when needed rather
than purchasing them e.g. Google docs used to create and edit word processing and
spread sheet.
6. Mass Participation– diverse information sharing through
universal web access. Web 2.0’s content is based on people
from various cultures.
11. 1. Convergence– is the synergy of technological advancements to
work on a similar goal or task. For example, besides using your
personal computer to create word documents, you can now use
your smart phone.
2. Social Media– is a website, application, or online channel
that enables web users web users to create , co-create,
discuss modify, and exchange user generated content.
12. Six types of Social Media:
a) Social Networks – These are sites that allows you to connect with other people with the
same interests or background. Once the user creates his/her account, he/she can set up a
profile, add people, share content, etc
Example: Facebook and Google+
b) Bookmarking Sites – Sites that allow you to store and manage
links to various website and resources. Most of the sites allow you
to create a tag to others.
Stumble Upon, Pinterest
13. c) Social News – Sites that allow users to post their own news items
or links to other news sources. The users can also comment on the
post and comments may also be rank.
Ex. Reddit and Digg
d) Media Sharing – sites that allow you to upload and share media
content like images, music and video.
Ex. Flickr, YouTube and Instagram
14. e) Micro blogging – focus on short updates from the user. Those that
subscribed to the user will be able to receive these updates.
Ex. Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other
users are able to comment on the said topic.
Ex. Blogger, WordPress and Tumblr
15. 3. Mobile Technologies– The popularity of smart phones and
tablets has taken a major rise over the years. This is largely
because of the devices capability to do the tasks that were
originally found in PCs. Several of these devices are capable of
using a high-speed internet. Today the latest model devices use 4G
Networking (LTE), which is currently the fastest.
16. MOBILE OS
• iOS – use in apple devices such as iPhone and iPad.
• Android – an open source OS developed by Google. Being open source means
mobile phone companies use this OS for free.
• Blackberry OS – use in blackberry devices
• Windows phone OS – A closed source and proprietary operating system developed
by Microsoft.
• Symbian – the original smartphone OS. Used by Nokia devices
• WebOS- originally used in smartphone; now in smart TVs.
• Windows Mobile – developed by Microsoft for smartphones and pocket PCs
4. Assistive Media– is a non- profit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to read
to the user
17. 5. e.g. Yahoo!, Gmail, HotmailCloud computing-
distributed computing on internet or delivery of
computing service over the internet.
• Instead of running an e-mail program on your computer, you
log in to a Web e-mail account remotely. The software and
storage for your account doesn’t exist on your computer – it’s
on the service’s computer cloud.
18. It has three components
1. Client computers – clients are the device that the end user interact with
cloud.
2. Distributed Servers – Often servers are in geographically different places,
but server acts as if they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is
accessed via Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the
general public. Public cloud may be less secured because of its openness,
e.g. e-mail
19. PRIVATE CLOUD allows systems and services to be accessible within an
organization. It offers increased security because of its private nature.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to
the general public. Public cloud may be less secured because of its
openness, e.g. e-mail
COMMUNITY CLOUD allows systems and services to be accessible by group
of organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical
activities are performed using private cloud while the non-critical activities are
performed using public cloud.
20. LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF
NETIQUETTE
INTERNET SAFETY- it refers to the online security or safety of people and their
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
21. TEN RULES OF NETIQUETTE
Rule No. 1: Remember the human
You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not
be doing online just like you can in real life.
You are still talking to a real person with feelings even though you can’t see
them.
Rule no. 3: Know where you are in cyberspace.
Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.
22. Rule no. 4: Respect other people’s time and bandwidth.
Remember people have other things to do besides read your email. You are not the
center of their world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
Be polite and pleasant to everyone.
Always check your spelling and grammar before posting.
Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
Ask questions online
Share what you know online.
Post the answers to your questions online because someone may have the same
question you do.
Rule no. 7: Help keep flame wars under control
Netiquette does not forgive flaming.
Netiquette does however forbid people who are flaming to hurt discussion groups by
putting the group down.
23. Rule no. 8: Respect other people’s privacy.
Do not read other people’s mail without their permission.
Going through other people’s things could cost you, your job or you could even go
to jail.
Not respecting other people’s privacy is a bad netiquett
Rule no. 9: Don’t abuse your power.
Do not take advantage of other people just because you have more knowledge or
power than them.
Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
Do not point out mistakes to people online.
Remember that you were once the new kid on the block.
You still need to have a good manners even though you are online and cannot
see the person face to face.
25. Threat Consequence Threat Action ( Attack)
Unauthorized Disclosure
A circumstance or event
whereby an entity gains access
to data for which the entity is
not authorized.
Exposure: Sensitive data are directly
released to an unauthorized entity.
Interception: An unauthorized entity directly
accesses sensitive data traveling between
authorized sources and destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses
sensitive data by reasoning from
characteristics or byproducts of
communications.
Intrusion: an unauthorized entity gains access
to sensitive data by circumventing a system’s
security protections.
26. Disruption
A circumstances or even that
interrupts or prevents the correct
operation of system services and
functions.
Incapacitation:
prevents or interrupts system operation by
disabling a system component.
Deception
A circumstance or event that may
result in an authorized entity
receiving false data and believing
it to be true.
Corruption: Undesirably alters system
operation by adversely modifying system
functions or data.
Obstruction: A threat action that interrupts
delivery of system services by hindering
system operation.
Masquerade: An unauthorized entity gains
access to a system or performs a malicious act
by posing as an authorized entity.
Falsification: False data deceive an authorized
entity.
Repudiation: An entity deceives another by
falsely denying responsibility for an act.
27. Usurpation
A circumstances or event that
results in control of system services
or functions by an unauthorized
entity.
Misappropriation: An entity assumes
unauthorized logical or physical control of a
system resource.
Misuse: Causes a system component to
perform a function or service that is
detrimental to system security.
Types of System Intruders
Masquerader
Hackers
Clandestine user
28. Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormant phase
Virus is idle.
Propagation phase
Virus places an identical copy of itself into other programs or into certain system areas on
the disk.
Triggering phase
Virus is activated to perform the function for which it was
intended. Caused by a variety of system events.
Execution phase
Function is performed
29. Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its
data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any
means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan- a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware– a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups..
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
30. Pharming- a more complicated way of phishing where it exploits the DNS system..
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used
in commentaries, criticism, parodies, research and etc.
Key loggers- used to record the keystrokes done by user. This is done to steal passwords or any
other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.
Four search strategies
•Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word
31. Boolean
AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
•Question
a question may be entered in the search field of search engine
• Advanced
Features are offered on many engines by going to an “Advanced search” page
and making selections. Effective in narrowing search returns to a specific topic or
phrase.
32. LESSON 3: Advanced Word Processing Skills
Lesson Discussion
In the professional world, sending out information to convey important information is vital.
Because of ICT, things are now sent much faster than the traditional newsletters or postal
mail. You can now send much faster than the traditional newsletters or postal mail. You can
now use the Internet to send out information you need to share. What if we could still do
things much faster – an automated way of creating and sending uniform letters with
different recipients? Would that not be more convenient?
I. Mail Merge and Label Generation
A. Mail Merge
One of the important reasons in using computers per se is its ability to do recurring tasks
automatically. But this ability has to be honed by learning the characteristics and features
of the software you use with your computer. After all, no matter how good or advance your
computer and software may be, it can only be as good as the person using it.
In this particular part of our lesson, we will learn one of the most powerful and commonly
used features of Microsoft Word called Mail Merge. As the name suggests, this feature allows
you to create documents and combine or merge them with another document or data file. It is
commonly used when sending out advertising materials to various recipients.
33. The simplest solution for the scenario above is to create a document and just copy and
paste it several times then just replace the details depending on whom you send it to. But
what if you have hundreds or thousands of recipients? Would not that take too many
hours? What if you have a small database of information where you can automatically
generate those letters?
34. Two Components of Mail Merge
1. Form Document
The first component of our mail merged document is the form document. It is generally
the document that contains the main body of the message we want to convey or send. The
main body of the message is the part of the form document that remains the same no
matter whom you send it to from among your list.
Also included in the form document is what we call place holders, also referred to as data
fields or merge fields. This marks the position on your form document where individual data
or information will be inserted. From our sample document, the place holders are denoted or
marked by the text with double-headed arrows (<< >>) on each side and with a gray
background. On a printed standard form, this will be the underlined spaces that you will see
and use as a guide to where you need to write the information that you need to fill out. In its
simplest form, a form document is literally a “form” that you fill out with individual
information. A common example of a form document is your regular tax form or application
form.
35. 2. List or Data File
The second component of our mail merged document is the list or data file. This is where
the individual information or data that needs to be plugged in (merged) to the form
document is placed and maintained. One of the best things about the mail merge feature is
that it allows data file to be created fro within the Microsoft Word application itself, or it
gets data from a file created in Microsoft Excel or other data formats. In this way, fields that
needed to be filled up on the form document can easily be maintained without accidentally
altering the form or main document. You can also easily add, remove, modify, or extract your
data more efficiently by using other data management applications like Excel or Access and
import them in Word during the mail merge process.
36. B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes
sense that after you print out your form letters, you will need to send it to individual
recipients in an envelope with the matching address printed directly on the envelope or on
a mailing label to stick on. By using virtually the same process as a standard mail merge,
Microsoft Word will print individual addresses to a standard form that it has already pre-
formatted. Simply put, it creates a blank form document that simulates either a blank
label or envelope of pre-defined size and will use the data file that you selected to print
the information, typically individual addresses. So even in generating labels, the two
essential components of creating a merged document are present: the form document and
the data file. Only in this case, you did not have to type or create the form document
yourself because it was already created and pre-formatted in Microsoft Word. All you
need to do is select the correct or appropriate size for the label or envelope and select the
data file that contains the addresses (data) to be printed. You can also preview your
merged labels before printing if you want to.
37. II. Integrating Images and External Materials
Integrating or inserting pictures in your document is fun and it improves the impression of
your document. A common use of inserting a picture on a document is when you are
creating your resume. Though seemingly simple to do, your knowledge on the different
kinds of materials that you can insert or integrate in a Word document and its
characteristics can help you create a more efficient, richer document not only in content
but also in physical form. A better understanding of the physical form of your document as
well as the different materials you would integrate in it would allow you to be more
efficient and versatile in using Microsoft Word.
A. Kinds of Materials
There are various kinds of materials Microsoft Word is capable of integrating to make
the documents richer, more impressive, and more informative.
1. Pictures
Generally, these are electronic or digital pictures or photographs you have saved in any local
storage device. There are three commonly used types of picture files. You can identify them
by the extension on their file names.
38. a. .JPG/JPEG
This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic
Experts Group. Like all the rest of the image file extensions, it identifies the kind of data
compression process that it uses to make it more compatible and portable through the
Internet. This type of image file can support 16.7 million colors that is why it is suitable for
use when working with full color photographic images. Unfortunately, it does not support
transparency and therefore, images of this file type can be difficult to integrate in terms of
blending with other materials or elements in your document. But if you are looking for the
best quality image to integrate with your document then this is the image file type for you.
.JPG does not work well on lettering, line drawings, or simple graphics. .JPG images are
relatively small in file size.
b. .GIF
This stands for Graphics Interchange Format. This type of image file is capable of
displaying transparencies. Therefore, it is good for blending with other materials or
elements in your document. It is also capable of displaying simple animation.
Apparently, this may not be too useful on a printed document but if you are sending
documents electronically or through email, or even post documents into a website,
then this could be quite impressive. The downside is that it can only support up to 256
colors so it is good mostly on logos and art decors with very limited, and generally solid
colors. .GIF is much better for logos, drawings, small text, black and white images, or
low-resolution files.
39. c. .PNG
This is pronounced as “ping“. It stands for Portable Network Graphics. It was built
around the capabilities of .GIF. Its development was basically for the purpose of
transporting images on the Internet at faster rates. It is also good with transparencies
but unlike .GIFs, it does not support animation but it can display up to 16 million colors,
so image quality for this image file type is also remarkably improved. .PNG allows the
control of the transparency level or opacity of images.
40. 2. Clip Art
This is generally a .GIF type; line art drawings or images used as generic
representation for ideas and objects that you might want to integrate in your document.
Microsoft Word has a library of clip arts that is built in or can be downloaded and used
freely. There are still other clip arts that you can either purchase or freely download and
use that come from third-party providers.
3. Shapes
These are printable objects or materials that you can integrate in your document to
enhance its appearance or allow you to have some tools to use for composing and
representing ideas or messages. If you are designing the layout for a poster or other
graphic material for advertising, you might find this useful.
41. 4. Smart Art
Generally, these are predefined sets of different shapes grouped together to
form ideas that are organizational or structural in nature. If you want to
graphically represent an organization, process, relationships, or flow for
infographic documents, then you will find this easy and handy to use.
5. Chart
Another type of material that you can integrate in your Word document that allows
you to represent data characteristics and trends. This is quite useful when you are
preparing reports that correlate and present data in a graphical manner. You can create
charts that can be integrate in your document either directly in Microsoft Word or
imported from external files like Microsoft Excel.
42. Sometimes, creating reports or manuals for training or procedures will require the
integration of a more realistic image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot. Microsoft Word even
provides a snipping tool for your screen shots so you can select and display only the part
that you exactly like to capture on your screen.
III. Image Placement
43. A. In Line with Text
This is the default setting for images that are inserted or integrated in your document. It
treats your image like a text font with the bottom side totally aligned with the text line. This
setting is usually used when you need to place your image at the beginning of a paragraph.
When placed between texts in a paragraph or a sentence, it distorts the overall appearance
and arrangement of the texts in the paragraph because it will take up the space it needs
vertically, pushing whole lines of texts upward.
B. Square
This setting allows the image you inserted to be placed anywhere with the paragraph with
the text going around the image in a square pattern like frame.
C. Tight
This is almost the same as the Square setting, but here the text “hug” or conforms to the
general shape of the image. This allows you to get a more creative effect on your
document. This setting can mostly be achieved if you are using an image that supports
transparency like a .GIF or .PNG file.
D. Through
This setting allows the text on your document to flow even tighter taking the contours
and shape of the image. Again, this can be best used with .GIF or .PNG type of image.
44. E. Top and Bottom
This setting pushes the texts away vertically to the top and/or the bottom of the image so
that the image occupies a whole text line on its own.
F. Behind Text
This allows your image to be dragged and placed anywhere on your document but with all
the texts floating in front of it. It effectively makes your image look like a background.
G. In Front of Text
As it suggests, this setting allows your image to be placed right on top of the text as if your
image was dropped right on it. That means whatever part of the text you placed the image
on, it will be covered by the image.
IV. Key Terms
Mail Merge – a feature that allows you to create documents and combine or merge them
with another document or data file.
Form Document – the document that contains the main body of the message we want to
convey or send.
Data File – includes the individual information or data or the recipient’s information.
Merge Field/Place Holder – marks the position on your form document where individual
data or information will be inserted.
.JPG – file extension for the Joint Photographic Experts Group picture file.
45. .GIF – file extension for the Graphics Interchange Format image
file.
Clipart – line art drawings or images used as a generic
representation for ideas and objects.
Smart Art – predefined sets of different shapes grouped together
to form ideas that are organizational or structural in nature.
Text Wrap – adjusts how the image behaves around
46. LESSON 4: Advanced Spreadsheet Skills
1. What is a Spreadsheet Software? • allows users to organize data in rows an columns and
perform calculations on the data • These rows and columns collectively are called
worksheet.
2. 3. Examples of Spreadsheet Software: • LibreOffice Calc • OpenOffice.org Calc • Google
Sheets • Apple iWork Numbers • Kingsoft Office Spreadsheets • StarOffice Calc •
Microsoft Excel
3. 4. MICROSOFT EXCEL
4. 5. To open Microsoft Excel, Press “Windows
Logo” + R then type “excel” then enter.
5. 6. Key Terms in MS Excel: • Row – horizontal line of entries in a table • Column – vertical
line of entries in a table • Cell – the place where info. is held in a spreadsheet
6. 7. Key Terms in MS Excel: • Active Cell – the selected cell • Column Heading – the box at
the top of each column containing a letter • Row Heading – the row number
7. 8. Key Terms in MS Excel: • Cell Reference – the cell address of the cell usually combine
letter and number (ex. A1, B4, C2) • Merge – combining or joining two or more cells •
Formula – is an expression which calculates the value of a cell.
47. 8. 9. Key Terms in MS Excel: • Functions – are predefined formulas and are already
available in Excel • Formula Bar – the bar that displays the contents of a cell
9. 10. FUNCTIONS
10. 11. BASIC MATH OPERATIONS: • =SUM(x,y) or =SUM(range) – returns the sum of x and
y or (all the numbers within the range) • =PRODUCT(x,y) – returns the product of x and y •
=QUOTIENT(x,y) – returns the quotient of x divided by y • =x-y – returns the difference of x
subtracted by y
11. 12. BASIC MATH OPERATIONS: • =x+y – returns the sum of x and y • =x*y – returns the
product of x and y • =x/y – returns the quotient of x divided by y • =x-y – returns the
difference of x subtracted by y
12. 13. OTHER FUNCTIONS: • =ABS(x) – returns the absolute value of x • =AVERAGE(x,y) –
returns the average of x and y • =CONCATENATE(x,y) – joins x and y
13. 14. OTHER FUNCTIONS: • =IF(Condition, x, y) – returns x if the condition is true, else it
returns y • =ISEVEN(x) – returns true if x is an even number • =ISODD(x) – returns true if x
is an odd number
14. 15. OTHER FUNCTIONS: • =COUNT(range) – counts the number of cell containing a
number within a range • =COUNTIF(range, criteria) – count the number of cell that fits
with the criteria within the range
48. 15. 16. OTHER FUNCTIONS: • =ISNUMBER(x) – returns true if x is a number • =ISTEXT(x) –
returns true if x is a text • =LEN(x) – returns the length of characters in x • =PROPER(x) –
returns the proper casing of x
16. 17. OTHER FUNCTIONS: • =LEFT(x,y) – returns the characters of x specified by y (from
the left) • =RIGHT(x,y) – returns the characters of x specified by y (from the right) • =PI() –
returns the value of pi
17. 18. OTHER FUNCTIONS: • =MIN(x,y) – returns the smallest number between x and y •
=MAX(x,y) – returns the largest number between x and y • =MIN(range) – returns the
smallest number within the range • =MAX(range) – returns the largest number within the
range
18. 19. OTHER FUNCTIONS: • =POWER(x,y) – returns the value of x raised to the power of
y • =ROUND(x,y) – rounds x to a specified number of digits (y) =COLUMN(x) – returns the
column number of x • =ROW(x) – returns the row number of x
19. 20. OTHER FUNCTIONS: • =SQRT(x) – returns the square root of x • =TRIM(x) –
removes extra spaces in x • =UPPER(x) – returns x in all capital form • =LOWER(x) – returns
x in non- capital form
20. 21. OTHER FUNCTIONS: • =TODAY() – returns the current date • =NOW() – returns the
current date and time
49. 21. 22. EXERCISES
22. 23. Consider this data: NAME MATH GRADE SCIENCE GRADE FILIPINO GRADE ENGLISH
GRADE A.P GRADE MARK 75 70 78 81 78 PETE 84 87 86 88 85 ANA 91 92 95 90 90 REA 73
75 74 75 70
23. 24. Give the formulas to get : • Mark’s , Pete’s, Ana’s and Rea’s averages • The highest
grade that Ana got • The lowest grade that Mark got? • Sum of all Math Grade? Science?
A.P.? • Sum of all Rea’s Grades • The Lowest Number among all grades • The remarks
(Passed or Failed)
24. 25. Now, consider this data: FIRST NAME MIDDLE NAME LAST NAME MARK CURTIS
WILLIAMS PETE MCCLOEY HARRISON ANA MONROE FRITZ REA TAN COLLINS
25. 26. Give the formulas to get : • Mark’s Full Name • Ana’s Full Name in Proper Case •
Count the number of letters that Pete’s Last Name has • “COLL” from Rea’s Last Name •
“LOEY” from Pete’s Middle Name • Combining “WILL” and “LINS” from Mark and Rea’s
Last Names respectively
50. LESSON 5: Advanced Presentation Skills
Powerpoint is a highly innovative and versatile program that can ensure a successful
communication whether you’re presenting in front of potential investors, a lecture
theatre or simply in front of your colleagues. The following are the five features you
should be using-if youy aren’t already. Learn everything about these tips: they will
improve your presentation skills and allow you to communicate your message
successfully. The five features of powerpoint was
1)adding smart art
2)Inserting Shapes
3)Inserting and Image
4)Slide Transitions
5)Adding Animations
Creating an Effective Presentation
1. Minimize: Keep slides counts to a minimum to maintain a clear message and to
keep the audience attentive. Remember that the presentation is just a visual aid.
Most information should still come from the reporter.
51. 2.Clarity: Avoid being to fancy by using font style that is easy to read. Make
sure that it is also big enough to be read by the audience. Once you start
making your presentation, consider how big the screen is during your
report.
3.Simplicity: Use bullets or short sentences. Summarize the information on
the screen to have your audience focus on what the speaker is saying than
on reading the slide. Limit the content to six lines and seven words per line.
This is known as the 6 x 7 rule.
4. Visual: Use graphics to help in your presentation but not too many to
distract the audience. In addition, instead of using table of data, use charts
and graphs.
5. Consistency: Make your design uniform. Avoid having different font styles
and backgrounds.
6. Contrast: Use a light font on dark background or vice versa. This is done
so that it is easier to read. In most instances, it is easier to read on screen if
the background is dark. This is due to the brightness of the screen.
52. LESSON 6: Imaging and Design for Online
Environment
PHOTO EDITING
Photo editing encompasses the processes of altering images, whether they are digital
photographs, traditional photo chemical photographs, or illustrations. Traditional analog
image editing is known as photo retouching, using tools such as an airbrush to modify
photographs, or editing illustrations with any traditional art medium.
53. Graphic software programs
Which can be broadly grouped into vector graphics editors, raster graphics editors,
and 3D modelers are the primary tools with which a user may manipulate, enhance,
and transform images. Many image editing programs are also used to render or create
computer art from scratch.
BASIC OF IMAGE EDITING
1. RASTER IMAGES -are stored in a computer in the form of a grid of
picture elements or pixels.
2.VECTOR IMAGES -such as Adobe Illustrator, Inkscape and etc. are used to create and
modify vector images, which are stored as descriptions of lines, Bezier curves and text
instead of pixels.
DIFFERENCE BETWEEN RASTER AND VECTOR
IMAGES
54. RASTER IMAGES-use many colored pixels or individual building blocks to form a complete
image JPEGs, GIFs and PNGs are common raster image types. Almost all of the photos
found on the web and in print catalogs are raster images.
VECTOR IMAGES- alternatively, allow for more flexibility. Constructed using
mathematical formulas rather than individual colored blocks, vector file types such as
EPS, AI and PDF are excellent for creating graphics that frequently require resizing.
3. 3D MODELING (OR MODELLING) is the process of developing a mathematical
representation of any three dimensional surface of an object via specialized software.
The product is called a 3D model. It can be displayed as a two-dimensional image
through a process called 3D rendering or used in a computer simulation or physical
phenomena. The model can also be physically created using 3D printing devices.
55. IMAGE FORMATS
Ø JPEG is a commonly used method of lossy compression for digital
images, particularly for those images produced by a digital
photography.
Ø PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics file
format that supports lossless data compression.
Ø GIF a lossless format for image files that supports both animated
and static images.
Ø BMP is a raster graphics image used to store bitmap digital
images
Ø EPS used in vector-based images in Adobe Illustrator.
Ø SVG is an XML-based vector image format for two-dimensional
graphics w/ support for interactivity and animation
Ø .3ds is one of the file formats used by the Autodesk 3Ds Max 3D
Modelling, animation and rendering software.
Ø .fbx is an exchange format, in particular for interoperability
between Autodesk products and other digital content creation
software
56. FEATURES OF IMAGE EDITORS
SELECTION One of the prerequisites for many of the app mentioned below is a method
of selecting part(s) of an image, thus applying a change selectively without affecting the
entire picture
Ø MARQUEE TOOL for selecting rectangular or other regular polygon-shaped regions
Ø LASSO TOOL for freehand selection of a region
Ø MAGIC WAND TOOL selects objects or regions in the image defined by proximity of
color or luminance
LAYERS which are analogous to sheets of transparent acetate, stacked on top of each other,
each capable of being individually positioned, altered and blended with the layers below,
w/o affecting any of the elements on the other layers.
57. IMAGE SIZE resize images in a process often called image scaling, making them larger, or
smaller. High image resolution cameras can produce large images which are often
reduced in size for Internet use.
CROPPING creates a new image by selecting a desired rectangular portion from the
image being cropped. The unwanted part of the image is discarded. Image cropping does
not reduce the resolution of the area cropped.
CLONING uses the current brush to copy from an image or pattern. It has many uses:
one of the most important is to repair problem areas in digital photos.
IMAGE ORIENTATION – Image editors are capable of altering an image to be rotated in
any direction and to any degree. Mirror images can be created and images can be
horizontally flipped or vertically flopped. Rotated image usually require cropping
afterwards, in order to remove the resulting gaps at the image edges.
58. PERSPECTIVE – is the art of drawing solid objects on a two- dimensional surface so
as to give the right impression of their height, width, depth and position in
relation to each other when viewed from a particular point.
59. SHARPENING AND SOFTENING– Sharpening makes images clearer. Too much
sharpening causes grains on the surface of the image. Softening makes images softer
that removes some of the highly visible flaws. Too much causes the image to blur.
SATURATION- is an expression for the relative bandwidth of the visible output from a light
source. As saturation increase, colors appear more “pure.’’ As saturation decreases, colors
appear more ‘’ washed-out.’’
60. CONTRAST AND BRIGHTENING
Contrast of images and brighten or darken the image. Underexposed images can be often
be improved by using this feature.
Brightening lightens the image so the photo brightens up. Brightness is a relative
expression of the intensity of the energy output of a visible light source.
Adjusting contrast means adjusting brightness because they work together to make a
better image.
PHOTO MANIPULATION
Photo manipulation involves transforming or altering a photograph using various methods
and techniques to achieve desired results. Some photo manipulations are considered skillful
artwork while others are frowned upon as unethical practices, especially when used to
deceive the public, such as hat used for political propaganda , or to make a product or person
look better.
61. DIFFERENCES
PHOTO EDITING – signifies the regular process used to enhance photos and to create them
‘’Actual editing simple process’’. Also includes some of the regular programs used for editing
and expose how to use them.
PHOTO MANIPULATION – includes all simple editing techniques and have some
manipulation techniques like erasing, adding objects , adding some graphical effects,
background correction, creating incredible effect, change elements in an image, adding
styles , eliminating blemishes from a person’s face and changing the features of a person’s
body.
b.) Infographics
also known as data visualization, information design, and communication design
62. • It is any graphic that display and explains information, whether that be data or
words. When we use the term ‘’infographics’’, we’re using it as a general term used
to describe data presented in a visual way.
• Infographics are important because they change the way people find and
experience stories. Infographics are being used to augment editorial content on the
web, it create a new way of seeing the world of data, and they help communicate
complex ideas in a clear and beautiful way.
TYPES OF INFOGRAPHICS
1. Statistical
2. Process Flow
3. Geographic
63. PROCESS OF MAKING INFOGRAPHICS
1. Research
2. a)Know what is needed
3. b)Take a reference
4. c)Know the audience
5. d)Decide the type of infographics
6. Brainstorm
7. a)Gather ideas
8. b)Build thought process
9. Design
10. a) Choose your tool and start designing
11. Review
12. a) Cross check the data to deliver flawless output
13. Launch
14. a) Make it viral
15. b) Share on social network
BEST PRACTICES WHEN CREATING INFOGRAPHICS
1. a)Maintain a structure
2. b)Don’t use more than 3 color palletes
3. c)Typography matters a lot
4. d)Include source and references
64. LESSON 7: Online Platforms for ICT Content
Development
1.Facebook
Posted on February 13, 2017
1. Marketplace – allows members to post, read and respond to classified ads.
2. Groups – allows members who have common interests to find each other
and interact.
3. Events – allows members to publicize an event, invite guests and track
who plans to attend.
4. Pages – allows members to create and promote a public page built around
a specific topic.
5. Presence technology – allows members to see which contacts are online
and chat.
Within each member’s personal profile, there are several key networking components. The most
popular is arguably the Wall, which is essentially a virtual bulletin board. Messages left on a
member’s Wall can be text, video or photos. Another popular component is the virtual Photo
Album. Photos can be uploaded from the desktop or directly from a smartphone camera. There
is no limitation on quantity, but Facebook staff will remove inappropriate or copyrighted
images. An interactive album feature allows the member’s contacts (who are called generically
called “friends”) to comment on each other’s photos and identify (tag) people in the photos.
Another popular profile component is status updates, a microbloggingfeature that allows
members to broadcast short Twitter-like announcements to their friends. All interactions are
published in a news feed, which is distributed in real-time to the member’s friends.
65. Facebook offers a range of privacy options to its members. A member can make all his
communications visible to everyone, he can block specific connections or he can keep all his
communications private. Members can choose whether or not to be searchable, decide
which parts of their profile are public, decide what not to put in their news feed and
determine exactly who can see their posts. For those members who wish to use Facebook to
communicate privately, there is a message feature, which closely resembles email.
2. Instagram
Instagram is an online mobile photo-sharing site that allows its users to share pictures and
videos either publicly or privately on the app, as well as through a variety of other social
networking platforms, such as Facebook, Twitter, Tumblr, and Flickr. Originally, a distinctive
feature was that it confined photos to a square shape, similar to Kodak Instamatic and Polaroid
SX-70 images, in contrast to the 4:3 aspect ratio typically used by mobile device cameras. In
August 2015, version 7.5 was released, allowing users to upload media captured in any aspect
ratio. Users can also apply digital filters to their images. Videos on Instagram debuted in June
2013, allowing prerecorded square standard definition resolution clips of up to 15 seconds to be
shared; later improvements added support for widescreenresolutions of up to 1080p and longer
recording times for either prerecorded (up to one minute) or disappearing live (up to one hour)
videos.
66. Instagram was created by Kevin Systrom and Mike Krieger, and launched in October 2010 as
a free mobile app. The service rapidly gained popularity, with over 100 million active users
as of April 2012[10][11] and over 300 million as of December 2014.[12] Instagram is distributed
through the Apple App Store and Google Play.[13]Support for the app is available
for iPhone, iPad, iPod Touch, Windows 10 devices and Android handsets, while third-party
Instagram apps are available for BlackBerry 10 and Nokia-Symbian Devices.
3. Twitter
Twitter is an online news and social networking service where users post and
interact with messages, “tweets,” restricted to 140 characters. Registered users can
post tweets, but those who are unregistered can only read them. Users access Twitter
through its website interface, SMS or a mobile device app.[10] Twitter Inc. is based
in San Francisco, California, United States, and has more than 25 offices around the
world.
67. Twitter is about learning and adding value
It is also about adding value to others by giving or sharing something valuable to them so
that they are able to learn something. That is why I usually tweet about stuff that I read,
learned or have good value. I have learned so much from the others that is why I love
twitter. It is also about helping others, I disagree with many‘experts’ that say you should
only follow ‘influential’ users because I don’t judge someone that way, and because I
believe the people at Twitter don’t believe in them either. I also disagree that you should
only share your own stuff otherwise you will dilute your brand. Sure it makes sense but
24/7 sharing your own blog post and following influential people?
BLOGGING SITES
1. Weebly
68. Weebly is one of the easiest website builders in the market. They allow you to drag and
drop content into a website, so it’s very intuitive to use (click here to see our opinion on
Weebly).
By using Weebly’s website building elements, you can literally drag them into your
website and have a website built relatively quickly, and painlessly. The beauty of this
system is that you can pretty much drag the elements to wherever you want – so it’s not
very restrictive on where and how you place your website content.
Weebly’s elements include pictures, paragraphs, videos, buttons, maps, contact forms –
basically all the basics for website building.
2. Tumblr
Tumblr is a popular microblogging platform designed for creative self-expression. It is
considered a mindful alternative to Facebook and other social media websites where
users blog on a myriad of topics.
69. You can link your Tumblr account to other social networks you use and you can feed your
traditional blog or other RSS feed to your Tumblelog. You can also create static pages such
as your own Questions page that people are automatically taken to when they ask you a
question. If you want to make your Tumblelog look more lie a traditional website, you can
do it by adding pages. You can make your Tumblelog private or just make specific posts
private as needed, and you can schedule posts to publish in the future.
Tumblr is perfect for people who don’t need a full blog to publish lengthy posts. It’s also
great for people who prefer to publish quick multimedia posts, particularly from their
mobile devices. Tumblr is also a great choice for people who want to join a larger
community. If a blog is too much or too big for you, but Twitter is too small or too little for
you and Instagram isn’t versatile enough for you, then Tumblr might be just right for you.
It’s also easy to invite other people to contribute to your Tumblelog.
If you want to track your stats, you can add any analytics tracking code to your Tumblelog.
Some users will even burn a feed with Feedburner, create custom themes, and use their
own domain names
3. Pinterest
70. Pinterest is a free website that requires registration to use.Users can upload, save, sort, and
manage images—known as pins—and other media content (e.g., videos) through collections
known as pinboards. Pinterest acts as a personalized media platform. Users can browse the
content of others in their feed. Users can then save individual pins to one of their own boards
using the “Pin It” button, with pinboards typically organized by a central topic or theme. Users
can personalize their experience by pinning items, creating boards, and interacting with other
members. The end result is that the “pin feed” of each user displays unique, personalized
results.
Content can also be found outside of Pinterest and similarly uploaded to a board via the “Pin It”
button, which can be downloaded to the bookmark bar on a web browser, or be implemented
by a webmaster directly on the website. They also have the option of sending a pin to other
Pinterest users and email accounts through the “Send” button. Some websites include red and
white “pin it” buttons on items, which allow Pinterest users to pin them directly.
Initially, there were several ways to register a new Pinterest account. Potential users could either
receive an invitation from an already registered friend, or they could request an invitation
directly from the Pinterest website that could take some time to receive. An account can also be
created and accessed by linking Pinterest to a Facebook or Twitter profile. When a user re-posts
or re-pins an image to their own board, they have the option of notifying their Facebook and
Twitter followers. This feature can be managed on the settings page.
On the main Pinterest page, a “pin feed” appears, displaying the chronological activity from the
Pinterest boards that a user follows.
71. A “board” is where the user’s pins are located. Users can have
several boards for various items such as quotes, travel or, most
popularly, weddings. A “pin” is an image that has either been
uploaded or linked from a website. Once users create boards and
add pins, other users can now repin, meaning they can pin one
user’s image to their board as well. Once the user has set up their
account and boards, they can browse, comment, and like
other pins. Users might be discouraged by repeated images and
difficult-to-follow direct linking features. Pinterest has also added
the option of making boards “secret” so that the user can pin to
and view boards that only the user can see when logged into their
own account.
Pinterest does not generate its own content; rather, it draws from
many resources around the web and compiles them in one
convenient location for users.
72. LESSON 8: Basic Web Page Creation
1.) What are the advantages and disadvantages of a WYSIWYG editor?
ADVANTAGE :
-You don’t need any scripting/coding experience.
– It’s simple and easy for beginners.
– Everything moves fluently, and you can easily preview what you want.
DISADVANTAGE :
-A lot of HTML code churned out by the editors is superfluous which makes the web
pages bulky in file size
-WYSIWYG editors let you ignore certain aspects that are important.
-WYSIWYG editors simply do not provide enough support and help in optimizing your
web site for search engines.
2.) List Down (3) more WYSIWYG web hosting services and their URL.
– Weebly Web Builder ( https://www.weebly.com/ )
– Wix Web Builder ( https://www.wix.com/ )
– Siteground Builder ( https://www.siteground.com/)
73. LESSON 9: Collaborative ICT Development
Web portal
a website that contains information from different sources and places them in one location in
a uniform way
Yahoo!
example of a web portal
yahoo.com
offers a web portal where news, email, weather, etc. are found in one place
Facebook groups ; WordPress ; Google Drive ; Microsoft Office Online ; Microsoft’s
Yammer ; Trello
examples of online collaborative tools
Facebook groups
used to create a group page that will allow people in your group to communicate your ideas
WordPress
allows you to multiple contributors for a single blog
Google Drive and Microsoft Office Online
allow multiple people to work on different office files and even have their own group’s cloud
storage
Microsoft’s Yammer
offers companies to have their own social network that allows sharing and managing content
Trello
offer an online to-do checklist for your entire team
74. LESSON 10: Interactive Multimedia
World Wide Web
world-wide-wait
WWW
CNN
now hosts videos placed on their home page, which was unthinkable in the past because of slow internet
speed
on-demand
Videos way back then were never on the home page and can be viewed “____________” or only when a
user clicks on it.
videos (youtube)
sound, music, or audio (soundcloud)
online games (farmville)
online tests (iq and personality test)
courseware (e-learning courses)
podcasts (ted talks, ear biscuits, the starters, stuff you should know)
vodcasts (video game high school and gmm)
multimedia contents (7)
online tests
online survey forms and tests that automatically display the results when finished
courseware
online courses that stimulate the classroom online
podcasts
an episodic series of audio or text files streamed online
embed
to place an object from one site to another
75. LESSON 11: ICT as Platform for Change
The Role of ICT in Recent History
Throughout recent history, the Philippines have been one of a few nations that demonstrate
unity for a call to action or social change. These campaigns for social change would have not
been successful if it were not for ICT.
1. EDSA (PEOPLE POWER REVOLUTION). The people power revolution lasted from 1083 to
1986. During a radio broadcast of Radio Veritas, Cardinal Sin encouraged the Filipinos to help
end the regime of then President Ferdinand Marcos. A major protest took place along the
EDSA from February 22 to 25, 1986 involving two million Filipinos from different sectors.
These included civilians, political parties, the military and religious groups.
2. EDSA DOS.This is also known as the 2001 EDSA Revolution, happened during January 17 to
21, 2001. It was fueled after 11 prosecutors of the President Joseph Estrada walked out of
the impeachment trial. As a result, the crowd in EDSA grew over the course of a few days
through text brigades.
3. Million People March.This is a series pf protest that mainly took place in Luneta Park from
august 22 to 26, 2013. There were also several demonstrations that happened around key cities
in the Philippines and some location overseas. The organizers and promoters of the Million
People March used Facebook and Change.org as their, mediums.
76. 4. Yolanda People Finder.Recent storms in Philippines history gave birth to the People
finder database powered by Google. During typhoon Yolanda, the people finder was a vital
tool for people across the globe to track the situation of their relatives. This proved to be
successful and is now adapted by more organizations to help people track relatives during
calamities.
Change.org
Change.org is dubbed as the “world’s platform for change” where anyone
from the online community can create a petition and ask others to sign in it.
During the past times petitions are only done through signing a paper, usually
done by a group asking for signatures via travel. Change.org gives access to more
people by allowing the online community to affix their digital signatures on
petition.
Signing an Online Petition
1. VisitChange.org
2. Change.org works this way. If this is your first time to use Change.org, click Sign up or log in
with Facebook. Otherwise, just input your log in details.
3. You can then start your own petition, but for now click on any petition you want under
tending petitions.
4. Read the petitions description to see if this petition matters to you. If it is, sign the petition
by filling up the information on the right side of the screen.
5. Share the petition on Facebook to promote it.
Alternatively, you can check out petitions of your friends on Facebook, and then click on
those petitions to read about it and sign it.
77. LESSON 12: ICT Project for Social Change
Before starting your project, your group should be able to do the necessary
paperwork. This allows experts to see if your project is doable over the time
frame that was given and if it is significant enough to be made into reality.
78. Five elements of a concept paper
1.Introduction-includes tour group’s mission and vision and a brief introduction of your
project.
2.Purpose-includes the reasons why this project is worth your group and your sponsor’s
time, effort and money.
3.Description-includes all the necessary information about the project. In ICT, it involves
the sites you are going to produce and the purpose of each and how they work in unison.
4.Support-contains the budget needed for the project. Some concept papers do not
specify any amount requested from the sponsor.
5.Contact information-includes information on how the group be contacted.
Simplified ICT Project Process Overview
1.Planning-Involves the following task (but not limited to):
1. Conceptualizing your project project
2. Researching on available data about your topic
3. Setting deadlines and meetings
4. Assigning people to various tasks
5. Finding a web or blog host
6. Creating a site map for tour website
7. Listing down all applications, that you need including web apps
8. Funding (If applicable)
79. 2.Development-involves the actual creation of the website(s), involves the production of
images, infographics, etc.
3.Release and Promotion-involves the actual release of the website for public view and
promoting it. Promotion typically starts before the actual release.
4.Maintenance-involves responding to feedback of your site visitors and continuing to
improve your website.
LESSON 13: ICT Project Publication and
Statistics
Monitoring Site Statistics on Different Platforms
1. WordPress
Once you log in to your WordPress account, you are on the Reader tab by default.
Simply click on My Sites and from there you will see the statistics for your blog.
2. Facebook
In your Facebook page, a summary of the statistics will appear on the right side of
your cover photo: Hovering your mouse pointer over “Post Reach” will give you more
insights on which recent post reached the most people: Clicking on the Insights tab
will give more in-depth statistics:
80. 2. Overview– contains the summary of statistics about your page
Definition of terms on your Facebook statistics:
Reach: Organic – your posts seen through the page’s wall, shares by users, and
the news feed
Reach: Paid – your posts seen through paid ads
Post Clicks – number of clicks done to your posts
1. Likes– contains the statistics about the trend of page likes
2. Reach– contains information about the number of people who was reached by your
post
3. Visits– contains data of the number of times your page tabs (like the Timeline) are
visited
4. Post– contains data showing when (day and time) you site visitors visit your site
5. People– contains statistics about your audience’s demographics (age, location,
gender, language, and country). It is also includes demographics about the people
you have reached and engaged with.
Demographics refers to the statistics characterizing human population usually divided
by age, gender, income, location, and language.
81. LESSON 14: ICT Project Maintenance
Creating online surveys feedbacks forms.
The Internet will give you a lot of options in gathering your audience’s feedback. The only
difference that you and your group may notice is how these services are presented. Some
of them, because they are free to use, may have too many ads or some features are
lacking. In any case, it’s your group’s choice which of these services is t cumbersome to
reach your objective.
Google offers one of the easiest ways to gather user’s feedback. Google forms allow your
audience to answer a set of questions you have set. These can be used for surveys,
feedback, online registrations, and customer care support.
4. You will be taken to Google Form’s interface:
Next is !
Lets move on to !
6. Once you are done editing the question, click Done.
7. To add a new question or item, click on Add Item, clicking on the drop down arrow at the
right side of the Add Item button will bring up other options for layout:
a. Section Header – adds a header for a specific a part of your survey.
b. Page break- adds a page break which means that the items at the button of the page will
be added to the next page: necessarily if your survey is too long.
c. Image- adds an image to your survey
d. Video- adds a video to your survey
82. iii. Multiple Choice – can be answered by only one answer in a set of options
Creating feedback forms using Google forms
Lesson objectives
• Evaluate the effectiveness of their online campaign through user feedback;
• Improve the online campaign using various tools; and
• Check the impact of their online campaign.
Steps !
1) Open your browser and go to drive.google.com
2) Sign in or create an account.
3) On the left hand hair of your My Drive page,
click New> More> Google Forms
Steps !
5. You may now fill out the form questions:
A. Question Title- Includes the question that will be answered by your audience.
B. Help Text- Creates a subtext under the question to give more information about a
question.
C. Question Type- changes the type question according to your preference. These questions
include:
i. Text – can be answered in a short text.
ii. Paragraph Text – can be answered in a long text.
iv. Checkboxes – a question that can be answered with multiple answers in a set of options.
v. Choose from a list- similar to a multiple-choice question but options are revealed in a drop-
down list.
vi. Scale- a question that can be answered with a numerical range.
vii. Grid- a question that contains sub questions with similar options as shown;
83. • Date- a question that can be answered with a specified date
• Time- a question that can be answered with a specified time
.
d. Advanced Settings: Contains more options for the specified question type.
8. Edit the Confirmation Page option at the bottom as you see fit.
A. Show link to submit another response- allows the user to answer the same form again.
B. Publish and show a public link to form results- allows users to see the summarized results
for your survey.
C. Allow responders to edits responses after submitting- allows users to back and edit their
answers
.
9. Click the Send Form button. The Send Form dialog box will appear these options as you see
fit.
a. Link to share- contains the URL that you can share on your website.
b. Embed- contains an embed code to attach to your HTML.
c. Short URL- generates a shorter URL necessary for limited spaces like sharing on twitter.
d. Share link via- allows you to share the link to Google+, Facebook, and Twitter.
e. Send form via email- allows you to share the form via email.
f. Add collaborators- Allows others to edit your form, necessary when working on groups.
84. 1. The easiest way to view the result is viewing a summary of the
responses. Click on Responses> Summary of Responses.
2. You will be taken to a Summary of Responses page. This is
particularly useful for viewing your results from time to time.
However, after a set amount of time, you may want to use this data
in a spreadsheet and eventually create your own charts.
3. To use the data collected through responses, click View Responses
button found on the upper part of the page.
Analyzing your Google Forms Result
4. Choose if you want to create a new Google Sheet as the
destination of your response results or if you want to put it on an
existing Google Sheet.
85. LESSON 15: Disadvantages of ICT
Cybercrimes are illegal acts done through the use of the internet. People all over the
world use the Internet to commit a host of crimes, some of which the public doesn’t even
know are capable of being done electronically.
1. Phishing and Spoofing
Spoofing attack is when a malicious party impersonates another device or user on a network
in order to launch attacks against network hosts, steal data, spread malware or bypass access
controls. There are several different types of spoofing attacks that malicious parties can use to
accomplish this.
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and
credit card details (and sometimes, indirectly, money), often for malicious reasons, by
masquerading as a trustworthy entity in an electronic communication.
86. 2. Blackmail/Extortion
Extortion (also called blackmail, shakedown, out wresting, and exaction) is a criminal
offence of unlawfully obtaining money, property, or services from a person, entity, or
institution, through coercion. Refraining from doing harm is sometimes euphemistically
called protection. Using the Internet to threaten to cause damage with the intent to extort
from any person any money or other thing of value.
3. Accessing Stored Communications
87. Accessing Stored Communications or hacking; Intentionally accessing, without
authorization, a facility through which an electronic communication service is provided.
The act of obtaining unauthorized access to data from computer network. This is typically
done to commercial and government sites to threaten its owner. In late 2015, a group
of Anonymous Philippines hacked the Twitter account of actress Maine Mendoza, who
plays the famous character Yaya Dub of the popular AlDub tandem and posted links and
messages on the account
4. Sports Betting
Sports Beating is engaging in the business of betting or wagering
on any sporting event or contest over the Internet. In some
countries, gambling (including sports betting) is illegal even if you
are doing it over the Internet.
88. 5. Non-Delivery of Merchandise
Devising any scheme to defraud, or for obtaining money or property by means of false or
fraudulent pretenses, or promises, and using the Internet for the purpose of executing
the scheme. The non-delivery scam occurs when the scammer places an item up for sale
when there is actually no item at all. The item is subsequently never delivered to the
buyer after they purchase the item.
6. Electronic/ Cyber Harassment
89. Cyber harassment refers to online harassment. Cyber harassment or bullying is the use of
email, instant messaging, and derogatory websites to bully or otherwise harass an
individual or group through personal attacks. Cyber harassment can be in the form of
flames, comments made in chat rooms, sending of offensive or cruel e-mail, or even
harassing others by posting on blogs or social networking sites. Cyber harassment is often
difficult to track as the person responsible for the acts of cyber harassment remains
anonymous while threatening others online. This usually applies to school-age children.
7. Child Pornography
Using the Internet to transmit child pornography. Child pornography is distributed
nowadays mainly through the Internet. Child pornography are produced not only
on a professional scale by commercial providers, but also privately using victims
from the producer’s own environment, from the exploitation of children by
clients of child prostitutes. Child pornography is sold over commercial websites
and also exchanged in closed groups or via peer-to-peer networks. Criminal
groups also use the Internet to make big money selling child pornography.
90. 8. Prostitution
Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce
to engage in prostitution.The internet has become one of the preferred methods of
communication for prostitution, as clients and prostitutes are less vulnerable to arrest or
assault and for its convenience
9. Drug Trafficking
91. 10. Criminal Copyright Infringement
Criminal Copyright Infringement, the act of piracy mainly for financial gain. In
late 2014, the number one pirate website, The PirateBay, was raided for the
second time due to years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through advertsing.