Download as pdf or txt
Download as pdf or txt
You are on page 1of 71

Empowerment Technologies

LESSONS 1-15
Posted on February 13, 2017

LESSON 1: INTRODUCTION TO ICT

ICT– Information and Communication-

It deals with the use of different communication technologies such as


mobile phones, telephone, Internet to locate, save, send and edit
information
Is a study of computers as data processing tools. It introduces students
to the fundamental of using computer systems in an internet
environment.

ICT in the Philippines

Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth


of ICT-related jobs, one of which is BPO, Business Process Outsourcing,
or call centers.
ICT Department in the Philippines is responsible for the planning,
development and promotion of the country’s information and
communications technology (ICT) agenda in support of national
development.

Computer– an electronic device for storing and processing data, typically in


binary form, according to instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that
use the internet protocol suite (TCIP/IP) to link billions of devices
worldwide.

Means of connecting a computer to any other computer anywhere


in the world via dedicated routers and servers.
Sometimes called simply ‘’the Net’’, is a worldwide system of
computer networks- a network of networks in which the users at any
one computer can get information from any other computer.
World Wide Web

An information system on the internet that allows documents to be


connected to other documents by hypertext links, enabling the user to
search for information by moving from one document to another.
Is an information space where documents and other web resources
are identified by URLs, interlinked by hypertext links, and can be
accessed via the Internet.
Invented by Tim-Berners Lee

Web Pages

Web page is a hypertext document connected to the World Wide Web.


It is a document that is suitable for the World Wide Web.

The different online platforms of World Wide Web:

1. Web 1.0 – refers to the first stage in the World Wide Web, which was
entirely made up of the Web pages connected by hyperlinks.

2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user
is able to see a website differently than others.

– Allows users to interact with the page; instead of just reading the page, the
user may be able to comment or create user account.

3. Web 3.0 – this platform is all about semantic web.

– Aims to have machines (or servers) understand the user’s preferences to


be able to deliver web content.

Static Web Page- is known as a flat page or stationary age in the sense that
the page is ‘’as is’’ and cannot be manipulated by the user. The content is also
the same for all users that is referred to as Web 1.0

Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding
dynamic web pages. The user is able to see website differently than others e.g.
social networking sites, wikis, video sharing sites.

FEATURES OF WEB 2.0

1. Folksonomy- allows user to categorize and classify information using


freely chosen keywords e.g. tagging by FB, Twitter, use tags that start
with the sign #, referred to as hashtag.
2. Rich User Experience – content is dynamic and is responsive to
user’s input
3. User Participation- The owner of the website is not the only one who is
able to put content. Others are able to place a content of their own by
means of comments, reviews and evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-
time purchase. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spent in the internet.
5. Software as a services- users will be subscribe to a software only
when needed rather than purchasing them e.g. Google docs used to
create and edit word processing and spread sheet.
6. Mass Participation– diverse information sharing through universal
web access. Web 2.0’s content is based on people from various cultures.
TRENDS IN ICT

1. Convergence– is the synergy of technological advancements to work


on a similar goal or task. For example, besides using your personal
computer to create word documents, you can now use your smartphone.

2. Social Media– is a website, application, or online channel that


enables web users web users to create , co-create, discuss modify, and
exchange user generated content.

Six types of Social Media:


a)Social Networks – These are sites that allows you to connect with other
people with the same interests or background. Once the user creates his/her
account, he/she can set up a profile, add people, share content, etc

Example: Facebook and Google+

b)Bookmarking Sites – Sites that allow you to store and manage links to
various website and resources. Most of the sites allow you to create a tag to
others.

Stumble Upon, Pinterest


c) Social News – Sites that allow users to post their own news items or
links to other news sources. The users can also comment on the post and
comments may also be rank.

Ex. Reddit and Digg

d) Media Sharing – sites that allow you to upload and share media
content like images, music and video.

Ex. Flickr, YouTube and Instagram

e) Microblogging – focus on short updates from the user. Those that


subscribed to the user will be able to receive these updates.
Ex. Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other users
are able to comment on the said topic.
Ex. Blogger, WordPress and Tumblr

3. Mobile Technologies– The popularity of smartphones and tablets has


taken a major rise over the years. This is largely because of the devices
capability to do the tasks that were originally found in PCs. Several of
these devices are capable of using a high-speed internet. Today the latest
model devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS

iOS – use in apple devices such as iPhone and iPad


Android – an open source OS developed by Google. Being open source
means mobile phone companies use this OS for free.
Blackberry OS – use in blackberry devices
Windows phone OS – A closed source and proprietary operating system
developed by Microsoft.
Symbian – the original smartphone OS. Used by Nokia devices
WebOS- originally used in smartphone; now in smart TVs.
Windows Mobile – developed by Microsoft for smartphones and pocket
PCs

4. Assistive Media– is a non- profit service designed to help people who


have visual and reading impairments. A database of audio recordings is
used to read to the user.
5. e.g. Yahoo!, Gmail, HotmailCloud computing-distributed
computing on internet or delivery of computing service over the internet.

-Instead of running an e-mail program on your computer, you log in to a Web

e-mail account remotely. The software and storage for your account doesn’t
exist

on your computer – it’s on the service’s computer cloud.

It has three components

1. Client computers – clients are the device that the end user interact
with cloud.
2. Distributed Servers – Often servers are in geographically different
places, but server acts as if they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and
is accessed via Internet.

TYPES OF CLOUDS

PUBLIC CLOUD allows systems and services to be easily accessible to the


general public. Public cloud may be less secured because of its openness, e.g.
e-mail

PRIVATE CLOUD allows systems and services to be accessible within an


organization. It offers increased security because of its private nature.

COMMUNITY CLOUD allows systems and services to be accessible by


group of organizations.

HYBRID CLOUD is a mixture of public and private cloud. However, the


critical activities are performed using private cloud while the non-critical
activities are performed using public cloud.

LESSON 2: ONLINE SAFETY, SECURITY


AND RULES OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and


their information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online
communication.

TEN RULES OF NETIQUETTE


Rule No. 1: Remember the human

You need to remember that you are talking to a real person when
you are online.
The internet brings people together who would otherwise never
meet.
Remember this saying when sending an email: Would I say this to
the person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.

You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you
should not be doing online just like you can in real life.
You are still talking to a real person with feelings even though you
can’t see them.

Rule no. 3: Know where you are in cyberspace.

Always take a look around when you enter a new domain when
surfing the web.
Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.

Remember people have other things to do besides read your email.


You are not the center of their world.
Keep your post and emails to minimum by saying what you want to
say.
Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.

Be polite and pleasant to everyone.


Always check your spelling and grammar before posting.
· Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge

Ask questions online


Share what you know online.
Post the answers to your questions online because someone may
have the same question you do.

Rule no. 7: Help keep flame wars under control

Netiquette does not forgive flaming.


Netiquette does however forbid people who are flaming to hurt
discussion groups by putting the group down.

Rule no. 8: Respect other people’s privacy.

Do not read other people’s mail without their permission.


Going through other people’s things could cost you, your job or you
could even go to jail.
Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.

Do not take advantage of other people just because you have more
knowledge or power than them.
Treat others as you would want them to treat you if the roles were
reversed.

Rule no. 10: Be forgiving of other people’s mistake.

Do not point out mistakes to people online.


Remember that you were once the new kid on the block.
You still need to have a good manners even though you are online
and cannot see the person face to face.
Internet security

Security Requirement Triad

ConfidentIality

Data confidentiality
Privacy

Integrity
Data integerity System integrity
Availability

Threat Consequence Threat Action ( Attack)


Exposure: Sensitive data are directly
released to an unauthorized entity.

Interception: An unauthorized entity


directly accesses sensitive data traveling
between authorized sources and destinations.
Unauthorized Disclosure
Inference: A threat action whereby an
A circumstance or event whereby unauthorized entity indirectly accesses
an entity gains access to data for sensitive data by reasoning from
which the entity is not authorized. characteristics or byproducts of
communications.
Intrusion: an unauthorized entity gains
access to sensitive data by circumventing a
system’s security protections.
Incapacitation: prevents or interrupts
system operation by disabling a system
component.
Disruption Corruption: Undesirably alters system
operation by adversely modifying system
A circumstances or even that
functions or data.
interrupts or prevents the correct
operation of system services and Obstruction: A threat action that interrupts
functions. delivery of system services by hindering
system operation.
Deception
Masquerade: An unauthorized entity gains
A circumstance or event that may
access to a system or performs a malicious act
result in an authorized entity
by posing as an authorized entity.
receiving false data and believing it
to be true. Falsification: False data deceive an
authorized entity.

Repudiation: An entity deceives another by


falsely denying responsibility for an act.
Usurpation
Misappropriation: An entity assumes
A circumstances or event that
unauthorized logical or physical control of a
results in control of system services
system resource.
or functions by an unauthorized
entity.

Misuse: Causes a system component to perform a function or service that is


detrimental to system security.

Types of System Intruders

Masquerader
Hackers
Clandestine user
Parts of Virus

Infection mechanism
Trigger
PayloaD

Virus stages

Dormant phase
Virus is idle.
Propagation phase
Virus places an identical copy of itself into other
programs or into certain system areas on t the disk.
Triggering phase
Virus is activated to perform the function for which it
was intended. Caused by a variety of system
events
Execution phase
Function is performed

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.

Privacy Policy/Terms of Services (ToS) – tells the user how the website
will handle its data.

Malware- stands for malicious software.

Virus- a malicious program designed to transfer from one computer to


another in any means possible.

Worms– a malicious program designed to replicate itself and transfer from


one file folder to another and also transfer to other computers.

Trojan-a malicious program designed that is disguised as a useful program


but once downloaded or installed, leaves your PC unprotected and allows
hacker to get your information.

Spyware– a program that runs in the background without you knowing it. It
has the ability to monitor what you are currently doing and typing through
key logging.

Adware- a program designed to send you advertisement, mostly pop-ups.

Spam– unwanted email mostly from bots or advertisers.

Phishing- acquires sensitive personal information like passwords and


credits card details.

Pharming- a more complicated way of phishing where it exploits the DNS


system.

Copyright- a part of law, wherein you have the rights to work, anyone who
uses it w/o your consent is punishable by law.

Fair Use- means that an intellectual property may be used w/o consent as
long as it is used in commentaries, criticism, parodies, research and etc.

Keyloggers- used to record the keystrokes done by user. This is done to steal
passwords or any other sensitive information.
Rogue security softwares– is a form of malicious software and internet
fraud that misleads users into believing there is a virus on their computer,
and manipulates them into paying money for a fake malware removal tool.

Four search strategies

Keyword searching

Enter terms to search

Use quotation marks to search as a phrase and keep the words linked
together

Common words are ignored (That, to, which, a, the …)

+ and – can be used to include or exclude a word

Boolean

AND – enter words connect with AND- it will include sites where both words
and found

Uses: joining different topics (i.e. global warming AND California)

OR – requires at least one of the terms is found.

Uses: join similar or synonymous topics (i.e. global warming OR


greenhouse effect)

NOT – searches for the first term and excludes sites that have the second
term.

(i.e. Washington NOT school)

Question
a question may be entered in the search field of search engine

Advanced
Features are offered on many engines by going to an
“Advanced search” page and making selections. Effective in narrowing
search returns to a specific topic or phrase.

LESSON 3: Advanced Word Processing


Skills
Lesson Discussion

In the professional world, sending out information to convey important


information is vital. Because of ICT, things are now sent much faster than the
traditional newsletters or postal mail. You can now send much faster than the
traditional newsletters or postal mail. You can now use the Internet to send
out information you need to share. What if we could still do things much
faster – an automated way of creating and sending uniform letters with
different recipients? Would that not be more convenient?

I. Mail Merge and Label Generation

A. Mail Merge

One of the important reasons in using computers per se is its ability to


do recurring tasks automatically. But this ability has to be honed by learning
the characteristics and features of the software you use with your computer.
After all, no matter how good or advance your computer and software may be,
it can only be as good as the person using it.

In this particular part of our lesson, we will learn one of the most
powerful and commonly used features of Microsoft Word called Mail Merge.
As the name suggests, this feature allows you to create documents and
combine or merge them with another document or data file. It is commonly
used when sending out advertising materials to various recipients.

The simplest solution for the scenario above is to create a document


and just copy and paste it several times then just replace the details
depending on whom you send it to. But what if you have hundreds or
thousands of recipients? Would not that take too many hours? What if you
have a small database of information where you can automatically generate
those letters?

Two Components of Mail Merge


1. Form Document

The first component of our mail merged document is the form


document. It is generally the document that contains the main body of the
message we want to convey or send. The main body of the message is the part
of the form document that remains the same no matter whom you send it to
from among your list.

Also included in the form document is what we call place holders, also
referred to as data fields or merge fields. This marks the position on your
form document where individual data or information will be inserted. From
our sample document, the place holders are denoted or marked by the text
with double-headed arrows (<< >>) on each side and with a gray background.
On a printed standard form, this will be the underlined spaces that you will
see and use as a guide to where you need to write the information that you
need to fill out. In its simplest form, a form document is literally a “form” that
you fill out with individual information. A common example of a form
document is your regular tax form or application form.

2. List or Data File


The second component of our mail merged document is the list or data
file. This is where the individual information or data that needs to be plugged
in (merged) to the form document is placed and maintained. One of the best
things about the mail merge feature is that it allows data file to be created fro
within the Microsoft Word application itself, or it gets data from a file created
in Microsoft Excel or other data formats. In this way, fields that needed to be
filled up on the form document can easily be maintained without accidentally
altering the form or main document. You can also easily add, remove, modify,
or extract your data more efficiently by using other data management
applications like Excel or Access and import them in Word during the mail
merge process.

B. Label Generation

Included in the mail merge feature on Microsoft Word is the Label


Generator. It just makes sense that after you print out your form letters, you
will need to send it to individual recipients in an envelope with the matching
address printed directly on the envelope or on a mailing label to stick on. By
using virtually the same process as a standard mail merge, Microsoft Word
will print individual addresses to a standard form that it has already pre-
formatted. Simply put, it creates a blank form document that simulates either
a blank label or envelope of pre-defined size and will use the data file that you
selected to print the information, typically individual addresses. So even in
generating labels, the two essential components of creating a merged
document are present: the form document and the data file. Only in this case,
you did not have to type or create the form document yourself because it was
already created and pre-formatted in Microsoft Word. All you need to do is
select the correct or appropriate size for the label or envelope and select the
data file that contains the addresses (data) to be printed. You can also
preview your merged labels before printing if you want to.

II. Integrating Images and External Materials

Integrating or inserting pictures in your document is fun and it


improves the impression of your document. A common use of inserting a
picture on a document is when you are creating your resume. Though
seemingly simple to do, your knowledge on the different kinds of materials
that you can insert or integrate in a Word document and its characteristics
can help you create a more efficient, richer document not only in content but
also in physical form. A better understanding of the physical form of your
document as well as the different materials you would integrate in it would
allow you to be more efficient and versatile in using Microsoft Word.

A. Kinds of Materials

There are various kinds of materials Microsoft Word is capable of


integrating to make the documents richer, more impressive, and more
informative.

1. Pictures

Generally, these are electronic or digital pictures or photographs you


have saved in any local storage device. There are three commonly used types
of picture files. You can identify them by the extension on their file names.

a. .JPG/JPEG
This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint
Photographic Experts Group. Like all the rest of the image file extensions, it
identifies the kind of data compression process that it uses to make it more
compatible and portable through the Internet. This type of image file can
support 16.7 million colors that is why it is suitable for use when working with
full color photographic images. Unfortunately, it does not support
transparency and therefore, images of this file type can be difficult to
integrate in terms of blending with other materials or elements in your
document. But if you are looking for the best quality image to integrate with
your document then this is the image file type for you. .JPG does not work
well on lettering, line drawings, or simple graphics. .JPG images are relatively
small in file size.

b. .GIF

This stands for Graphics Interchange Format. This type of image file is
capable of displaying transparencies. Therefore, it is good for blending with
other materials or elements in your document. It is also capable of displaying
simple animation. Apparently, this may not be too useful on a printed
document but if you are sending documents electronically or through email,
or even post documents into a website, then this could be quite impressive.
The downside is that it can only support up to 256 colors so it is good mostly
on logos and art decors with very limited, and generally solid colors. .GIF is
much better for logos, drawings, small text, black and white images, or low-
resolution files.

Example of a .gif format picture.

c. .PNG

This is pronounced as “ping“. It stands for Portable Network Graphics.


It was built around the capabilities of .GIF. Its development was basically for
the purpose of transporting images on the Internet at faster rates. It is also
good with transparencies but unlike .GIFs, it does not support animation but
it can display up to 16 million colors, so image quality for this image file type
is also remarkably improved. .PNG allows the control of the transparency
level or opacity of images.

Example of .png format picture.

2. Clip Art

This is generally a .GIF type; line art drawings or images used as generic
representation for ideas and objects that you might want to integrate in your
document. Microsoft Word has a library of clip arts that is built in or can be
downloaded and used freely. There are still other clip arts that you can either
purchase or freely download and use that come from third-party providers.

Clip Art Icon in Microsoft Office 2010.

3. Shapes
These are printable objects or materials that you can integrate in your
document to enhance its appearance or allow you to have some tools to use
for composing and representing ideas or messages. If you are designing the
layout for a poster or other graphic material for advertising, you might find
this useful.

Shapes Icon under the Insert ribbon tab.

4. Smart Art

Generally, these are predefined sets of different shapes grouped


together to form ideas that are organizational or structural in nature. If you
want to graphically represent an organization, process, relationships, or flow
for infographic documents, then you will find this easy and handy to use.
Smart Art

5. Chart

Another type of material that you can integrate in your Word document that
allows you to represent data characteristics and trends. This is quite useful
when you are preparing reports that correlate and present data in a graphical
manner. You can create charts that can be integrate in your document either
directly in Microsoft Word or imported from external files like Microsoft
Excel.

Chart – Used to illustrate and compare data.

6. Screenshot

Sometimes, creating reports or manuals for training or procedures will


require the integration of a more realistic image of what you are discussing on
your report or manual. Nothing can get you a more realistic image than a
screenshot. Microsoft Word even provides a snipping tool for your screen
shots so you can select and display only the part that you exactly like to
capture on your screen.

III. Image Placement

Layout of text wrapping options.

A. In Line with Text

This is the default setting for images that are inserted or integrated in your
document. It treats your image like a text font with the bottom side totally
aligned with the text line. This setting is usually used when you need to place
your image at the beginning of a paragraph. When placed between texts in a
paragraph or a sentence, it distorts the overall appearance and arrangement
of the texts in the paragraph because it will take up the space it needs
vertically, pushing whole lines of texts upward.

B. Square

This setting allows the image you inserted to be placed anywhere with the
paragraph with the text going around the image in a square pattern like
frame.

C. Tight

This is almost the same as the Square setting, but here the text “hug” or
conforms to the general shape of the image. This allows you to get a more
creative effect on your document. This setting can mostly be achieved if you
are using an image that supports transparency like a .GIF or .PNG file.

D. Through

This setting allows the text on your document to flow even tighter taking the
contours and shape of the image. Again, this can be best used with .GIF or
.PNG type of image.

E. Top and Bottom

This setting pushes the texts away vertically to the top and/or the bottom of
the image so that the image occupies a whole text line on its own.

F. Behind Text

This allows your image to be dragged and placed anywhere on your document
but with all the texts floating in front of it. It effectively makes your image
look like a background.

G. In Front of Text
As it suggests, this setting allows your image to be placed right on top of the
text as if your image was dropped right on it. That means whatever part of the
text you placed the image on, it will be covered by the image.

IV. Key Terms

Mail Merge – a feature that allows you to create documents and


combine or merge them with another document or data file.
Form Document – the document that contains the main body of the
message we want to convey or send.
Data File – includes the individual information or data or the
recipient’s information.
Merge Field/Place Holder – marks the position on your form
document where individual data or information will be inserted.
.JPG – file extension for the Joint Photographic Experts Group picture
file.
.PNG – file extension for Portable Network Graphics image file.
.GIF – file extension for the Graphics Interchange Format image file.
Clipart – line art drawings or images used as a generic representation
for ideas and objects.
Smart Art – predefined sets of different shapes grouped together to
form ideas that are organizational or structural in nature.
Text Wrap – adjusts how the image behaves around other objects or
text.

LESSON 4: Advanced Spreadsheet Skills


1. What is a Spreadsheet Software? • allows users to organize data in rows
an columns and perform calculations on the data • These rows and
columns collectively are called worksheet.
2. 3. Examples of Spreadsheet Software: • LibreOffice Calc • OpenOffice.org
Calc • Google Sheets • Apple iWork Numbers • Kingsoft Office
Spreadsheets • StarOffice Calc • Microsoft Excel
3. 4. MICROSOFT EXCEL
4. 5. To open Microsoft Excel, Press “Windows Logo” + R then type “excel”
then enter.
5. 6. Key Terms in MS Excel: • Row – horizontal line of entries in a table •
Column – vertical line of entries in a table • Cell – the place where info.
is held in a spreadsheet
6. 7. Key Terms in MS Excel: • Active Cell – the selected cell • Column
Heading – the box at the top of each column containing a letter • Row
Heading – the row number
7. 8. Key Terms in MS Excel: • Cell Reference – the cell address of the cell
usually combine letter and number (ex. A1, B4, C2) • Merge – combining
or joining two or more cells • Formula – is an expression which
calculates the value of a cell.
8. 9. Key Terms in MS Excel: • Functions – are predefined formulas and are
already available in Excel • Formula Bar – the bar that displays the
contents of a cell
9. 10. FUNCTIONS
10. 11. BASIC MATH OPERATIONS: • =SUM(x,y) or =SUM(range) –
returns the sum of x and y or (all the numbers within the range) •
=PRODUCT(x,y) – returns the product of x and y • =QUOTIENT(x,y) –
returns the quotient of x divided by y • =x-y – returns the difference of x
subtracted by y
11. 12. BASIC MATH OPERATIONS: • =x+y – returns the sum of x and y •
=x*y – returns the product of x and y • =x/y – returns the quotient of x
divided by y • =x-y – returns the difference of x subtracted by y
12. 13. OTHER FUNCTIONS: • =ABS(x) – returns the absolute value of x •
=AVERAGE(x,y) – returns the average of x and y •
=CONCATENATE(x,y) – joins x and y
13. 14. OTHER FUNCTIONS: • =IF(Condition, x, y) – returns x if the
condition is true, else it returns y • =ISEVEN(x) – returns true if x is an
even number • =ISODD(x) – returns true if x is an odd number
14. 15. OTHER FUNCTIONS: • =COUNT(range) – counts the number of cell
containing a number within a range • =COUNTIF(range, criteria) –
count the number of cell that fits with the criteria within the range
15. 16. OTHER FUNCTIONS: • =ISNUMBER(x) – returns true if x is a
number • =ISTEXT(x) – returns true if x is a text • =LEN(x) – returns
the length of characters in x • =PROPER(x) – returns the proper casing
of x
16. 17. OTHER FUNCTIONS: • =LEFT(x,y) – returns the characters of x
specified by y (from the left) • =RIGHT(x,y) – returns the characters of x
specified by y (from the right) • =PI() – returns the value of pi
17. 18. OTHER FUNCTIONS: • =MIN(x,y) – returns the smallest number
between x and y • =MAX(x,y) – returns the largest number between x
and y • =MIN(range) – returns the smallest number within the range •
=MAX(range) – returns the largest number within the range
18. 19. OTHER FUNCTIONS: • =POWER(x,y) – returns the value of x raised
to the power of y • =ROUND(x,y) – rounds x to a specified number of
digits (y) =COLUMN(x) – returns the column number of x • =ROW(x) –
returns the row number of x
19. 20. OTHER FUNCTIONS: • =SQRT(x) – returns the square root of x •
=TRIM(x) – removes extra spaces in x • =UPPER(x) – returns x in all
capital form • =LOWER(x) – returns x in non- capital form
20. 21. OTHER FUNCTIONS: • =TODAY() – returns the current date •
=NOW() – returns the current date and time
21. 22. EXERCISES
22. 23. Consider this data: NAME MATH GRADE SCIENCE GRADE
FILIPINO GRADE ENGLISH GRADE A.P GRADE MARK 75 70 78 81 78
PETE 84 87 86 88 85 ANA 91 92 95 90 90 REA 73 75 74 75 70
23. 24. Give the formulas to get : • Mark’s , Pete’s, Ana’s and Rea’s averages •
The highest grade that Ana got • The lowest grade that Mark got? • Sum
of all Math Grade? Science? A.P.? • Sum of all Rea’s Grades • The Lowest
Number among all grades • The remarks (Passed or Failed)
24. 25. Now, consider this data: FIRST NAME MIDDLE NAME LAST NAME
MARK CURTIS WILLIAMS PETE MCCLOEY HARRISON ANA
MONROE FRITZ REA TAN COLLINS
25. 26. Give the formulas to get : • Mark’s Full Name • Ana’s Full Name in
Proper Case • Count the number of letters that Pete’s Last Name has •
“COLL” from Rea’s Last Name • “LOEY” from Pete’s Middle Name •
Combining “WILL” and “LINS” from Mark and Rea’s Last Names
respectively

LESSON 5: Advanced Presentation Skills


Powerpoint is a highly innovative and versatile program that can ensure a
successful communication whether you’re presenting in front of potential
investors, a lecture theatre or simply in front of your colleagues. The
following are the five features you should be using-if youy aren’t already.
Learn everything about these tips: they will improve your presentation skills
and allow you to communicate your message successfully. The five features of
powerpoint was

1)adding smart art

2)Inserting Shapes

3)Inserting and Image

4)Slide Transitions

5)Adding Animations

Creating an Effective Presentation


1. Minimize: Keep slides counts to a minimum to maintain a clear message
and to keep the audience attentive. Remember that the presentation is just a
visual aid. Most information should still come from the reporter.

2.Clarity: Avoid being to fancy by using font style that is easy to read. Make
sure that it is also big enough to be read by the audience. Once you start
making your presentation, consider how big the screen is during your report.

3.Simplicity: Use bullets or short sentences. Summarize the information on


the screen to have your audience focus on what the speaker is saying than on
reading the slide. Limit the content to six lines and seven words per line. This
is known as the 6 x 7 rule.

4. Visual: Use graphics to help in your presentation but not too many to
distract the audience. In addition, instead of using table of data, use charts
and graphs.

5. Consistency: Make your design uniform. Avoid having different font


styles and backgrounds.

6. Contrast: Use a light font on dark background or vice versa. This is done
so that it is easier to read. In most instances, it is easier to read on screen if
the background is dark. This is due to the brightness of the screen.

LESSON 6: Imaging and Design for Online


Environment
PHOTO EDITING

Photo editing encompasses the processes of altering images, whether


they are digital photographs, traditional photo chemical photographs, or
illustrations. Traditional analog image editing is known as photo
retouching, using tools such as an airbrush to modify photographs, or
editing illustrations with any traditional art medium.
Graphic software programs

Which can be broadly grouped into vector graphics editors, raster


graphics editors, and 3D modelers are the primary tools with which a
user may manipulate, enhance, and transform images. Many image
editing programs are also used to render or create computer art from
scratch.

BASIC OF IMAGE EDITING

1. RASTER IMAGESare stored in a computer in the form of a grid of


picture elements or pixels.
2. VECTOR IMAGESsuch as Adobe Illustrator, Inkscape and etc. are
used to create and modify vector images, which are stored as
descriptions of lines, Bezier curves and text instead of pixels.

DIFFERENCE BETWEEN RASTER AND VECTOR IMAGES


RASTER IMAGESuse many colored pixels or individual building blocks to
form a complete image JPEGs, GIFs and PNGs are common raster image
types. Almost all of the photos found on the web and in print catalogs are
raster images.

VECTOR IMAGES alternatively, allow for more flexibility. Constructed


using mathematical formulas rather than individual colored blocks,
vector file types such as EPS, AI and PDF are excellent for creating
graphics that frequently require resizing.
3. 3D MODELING (OR MODELLING) is the process of developing a
mathematical representation of any three dimensional surface of an
object via specialized software. The product is called a 3D model. It can
be displayed as a two-dimensional image through a process called 3D
rendering or used in a computer simulation or physical phenomena. The
model can also be physically created using 3D printing devices.

IMAGE FORMATS

Ø JPEG is a commonly used method of lossy compression for digital images,


particularly for those images produced by a digital photography.
Ø PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics file
format that supports lossless data compression.

Ø GIF a lossless format for image files that supports both animated and
static images.

Ø BMP is a raster graphics image used to store bitmap digital images

Ø EPS used in vector-based images in Adobe Illustrator.

Ø SVG is an XML-based vector image format for two-dimensional graphics


w/ support for interactivity and animation

Ø .3ds is one of the file formats used by the Autodesk 3Ds Max 3D
Modelling, animation and rendering software.

Ø .fbx is an exchange format, in particular for interoperability between


Autodesk products and other digital content creation software

FEATURES OF IMAGE EDITORS

SELECTION One of the prerequisites for many of the app mentioned below
is a method of selecting part(s) of an image, thus applying a change
selectively without affecting the entire picture

Ø MARQUEE TOOL for selecting rectangular or other regular polygon-


shaped regions

Ø LASSO TOOL for freehand selection of a region

Ø MAGIC WAND TOOL selects objects or regions in the image defined by


proximity of color or luminance
LAYERS which are analogous to sheets of transparent acetate, stacked on
top of each other, each capable of being individually positioned, altered and
blended with the layers below, w/o affecting any of the elements on the other
layers.

IMAGE SIZE resize images in a process often called image scaling, making
them larger, or smaller. High image resolution cameras can produce large
images which are often reduced in size for Internet use.

CROPPING creates a new image by selecting a desired rectangular portion


from the image being cropped. The unwanted part of the image is discarded.
Image cropping does not reduce the resolution of the area cropped.

CLONING uses the current brush to copy from an image or pattern. It has
many uses: one of the most important is to repair problem areas in digital
photos.

IMAGE ORIENTATION – Image editors are capable of altering an image


to be rotated in any direction and to any degree. Mirror images can be created
and images can be horizontally flipped or vertically flopped. Rotated image
usually require cropping afterwards, in order to remove the resulting gaps at
the image edges.
PERSPECTIVE – is the art of drawing solid objects on a two- dimensional
surface so as to give the right impression of their height, width, depth and
position in relation to each other when viewed from a particular point.
SHARPENING AND SOFTENING– Sharpening makes images clearer.
Too much sharpening causes grains on the surface of the image. Softening
makes images softer that removes some of the highly visible flaws. Too much
causes the image to blur.

SATURATION- is an expression for the relative bandwidth of the visible


output from a light source. As saturation increase, colors appear more “pure.’’
As saturation decreases, colors appear more ‘’ washed-out.’’
CONTRAST AND BRIGHTENING

Contrast of images and brighten or darken the image. Underexposed images


can be often be improved by using this feature.

Brightening lightens the image so the photo brightens up. Brightness is a


relative expression of the intensity of the energy output of a visible light
source.

Adjusting contrast means adjusting brightness because they work together to


make a better image.
PHOTO MANIPULATION

Photo manipulation involves transforming or altering a photograph using


various methods and techniques to achieve desired results. Some photo
manipulations are considered skillful artwork while others are frowned upon
as unethical practices, especially when used to deceive the public, such as hat
used for political propaganda , or to make a product or person look better.
DIFFERENCES
PHOTO EDITING – signifies the regular process used to enhance photos
and to create them ‘’Actual editing simple process’’. Also includes some of the
regular programs used for editing and expose how to use them.
PHOTO MANIPULATION – includes all simple editing techniques and
have some manipulation techniques like erasing, adding objects , adding
some graphical effects, background correction, creating incredible effect,
change elements in an image, adding styles , eliminating blemishes from a
person’s face and changing the features of a person’s body.
b.) Infographics

also known as data visualization, information design, and communication


design

It is any graphic that display and explains information, whether that be


data or words. When we use the term ‘’infographics’’, we’re using it as a
general term used to describe data presented in a visual way.
Infographics are important because they change the way people find and
experience stories. Infographics are being used to augment editorial
content on the web, it create a new way of seeing the world of data, and
they help communicate complex ideas in a clear and beautiful way.

TYPES OF INFOGRAPHICS

1. Statistical
2. Process Flow
3. Geographic
PROCESS OF MAKING INFOGRAPHICS

1. Research
2. a)Know what is needed
3. b)Take a reference
4. c)Know the audience
5. d)Decide the type of infographics
6. Brainstorm
7. a)Gather ideas
8. b)Build thought process
9. Design
10. a) Choose your tool and start designing
11. Review
12. a) Cross check the data to deliver flawless output
13. Launch
14. a) Make it viral
15. b) Share on social network

BEST PRACTICES WHEN CREATING INFOGRAPHICS

1. a)Maintain a structure
2. b)Don’t use more than 3 color palletes
3. c)Typography matters a lot
4. d)Include source and references

LESSON 7: Online Platforms for ICT


Content Development
1. Marketplace – allows members to post, read and respond to classified
ads.
2. Groups – allows members who have common interests to find each other
and interact.
3. Events – allows members to publicize an event, invite guests and track
who plans to attend.
4. Pages – allows members to create and promote a public page built
around a specific topic.
5. Presence technology – allows members to see which contacts are online
and chat.

Within each member’s personal profile, there are several key networking
components. The most popular is arguably the Wall, which is essentially a
virtual bulletin board. Messages left on a member’s Wall can be text, video or
photos. Another popular component is the virtual Photo Album. Photos can
be uploaded from the desktop or directly from a smartphone camera. There is
no limitation on quantity, but Facebook staff will remove inappropriate or
copyrighted images. An interactive album feature allows the member’s
contacts (who are called generically called “friends”) to comment on each
other’s photos and identify (tag) people in the photos. Another popular
profile component is status updates, a microbloggingfeature that allows
members to broadcast short Twitter-like announcements to their friends. All
interactions are published in a news feed, which is distributed in real-time to
the member’s friends.

Facebook offers a range of privacy options to its members. A member can


make all his communications visible to everyone, he can block specific
connections or he can keep all his communications private. Members can
choose whether or not to be searchable, decide which parts of their profile are
public, decide what not to put in their news feed and determine exactly who
can see their posts. For those members who wish to use Facebook to
communicate privately, there is a message feature, which closely resembles
email.

2. Instagram
Instagram is an online mobile photo-sharing site that allows its users to
share pictures and videos either publicly or privately on the app, as well as
through a variety of other social networking platforms, such
as Facebook, Twitter, Tumblr, and Flickr. Originally, a distinctive feature was
that it confined photos to a square shape, similar to Kodak Instamatic and
Polaroid SX-70 images, in contrast to the 4:3 aspect ratio typically used by
mobile device cameras. In August 2015, version 7.5 was released, allowing
users to upload media captured in any aspect ratio. Users can also apply
digital filters to their images. Videos on Instagram debuted in June 2013,
allowing prerecorded square standard definition resolution clips of up to 15
seconds to be shared; later improvements added support
for widescreenresolutions of up to 1080p and longer recording times for
either prerecorded (up to one minute) or disappearing live (up to one hour)
videos.

Instagram was created by Kevin Systrom and Mike Krieger, and launched in
October 2010 as a free mobile app. The service rapidly gained popularity,
with over 100 million active users as of April 2012[10][11] and over 300 million
as of December 2014.[12] Instagram is distributed through the Apple App
Store and Google Play.[13]Support for the app is available
for iPhone, iPad, iPod Touch, Windows 10 devices and Android handsets,
while third-party Instagram apps are available for BlackBerry 10 and Nokia-
Symbian Devices.

3. Twitter
Twitter is an online news and social networking service where users post
and interact with messages, “tweets,” restricted to
140 characters. Registered users can post tweets, but those who are
unregistered can only read them. Users access Twitter through its website
interface, SMS or a mobile device app.[10] Twitter Inc. is based in San
Francisco, California, United States, and has more than 25 offices around the
world.

Twitter is about learning and adding value


It is also about adding value to others by giving or sharing something valuable
to them so that they are able to learn something. That is why I usually tweet
about stuff that I read, learned or have good value. I have learned so much
from the others that is why I love twitter. It is also about helping others, I
disagree with many‘experts’ that say you should only follow ‘influential’ users
because I don’t judge someone that way, and because I believe the people at
Twitter don’t believe in them either. I also disagree that you should only share
your own stuff otherwise you will dilute your brand. Sure it makes sense but
24/7 sharing your own blog post and following influential people?

BLOGGING SITES
1. Weebly
Weebly is one of the easiest website builders in the market. They allow you to
drag and drop content into a website, so it’s very intuitive to use (click here to
see our opinion on Weebly).

By using Weebly’s website building elements, you can literally drag them into
your website and have a website built relatively quickly, and painlessly. The
beauty of this system is that you can pretty much drag the elements to
wherever you want – so it’s not very restrictive on where and how you place
your website content.

Weebly’s elements include pictures, paragraphs, videos, buttons, maps,


contact forms – basically all the basics for website building.

2. Tumblr

Tumblr is a popular microblogging platform designed for creative self-


expression. It is considered a mindful alternative to Facebook and other
social media websites where users blog on a myriad of topics.
You can link your Tumblr account to other social networks you use and you
can feed your traditional blog or other RSS feed to your Tumblelog. You can
also create static pages such as your own Questions page that people are
automatically taken to when they ask you a question. If you want to make
your Tumblelog look more lie a traditional website, you can do it by adding
pages. You can make your Tumblelog private or just make specific posts
private as needed, and you can schedule posts to publish in the future.

Tumblr is perfect for people who don’t need a full blog to publish lengthy
posts. It’s also great for people who prefer to publish quick multimedia posts,
particularly from their mobile devices. Tumblr is also a great choice for
people who want to join a larger community. If a blog is too much or too big
for you, but Twitter is too small or too little for you and Instagram isn’t
versatile enough for you, then Tumblr might be just right for you.

It’s also easy to invite other people to contribute to your Tumblelog.

If you want to track your stats, you can add any analytics tracking code to
your Tumblelog. Some users will even burn a feed with Feedburner, create
custom themes, and use their own domain names

3. Pinterest

Pinterest is a free website that requires registration to use.Users can upload,


save, sort, and manage images—known as pins—and other media content
(e.g., videos) through collections known as pinboards. Pinterest acts as a
personalized media platform. Users can browse the content of others in their
feed. Users can then save individual pins to one of their own boards using the
“Pin It” button, with pinboards typically organized by a central topic or
theme. Users can personalize their experience by pinning items, creating
boards, and interacting with other members. The end result is that the “pin
feed” of each user displays unique, personalized results.

Content can also be found outside of Pinterest and similarly uploaded to a


board via the “Pin It” button, which can be downloaded to the bookmark bar
on a web browser, or be implemented by a webmaster directly on the website.
They also have the option of sending a pin to other Pinterest users and email
accounts through the “Send” button. Some websites include red and white
“pin it” buttons on items, which allow Pinterest users to pin them directly.

Initially, there were several ways to register a new Pinterest account.


Potential users could either receive an invitation from an already registered
friend, or they could request an invitation directly from the Pinterest website
that could take some time to receive. An account can also be created and
accessed by linking Pinterest to a Facebook or Twitter profile. When a user
re-posts or re-pins an image to their own board, they have the option of
notifying their Facebook and Twitter followers. This feature can be managed
on the settings page.

On the main Pinterest page, a “pin feed” appears, displaying the


chronological activity from the Pinterest boards that a user follows.

A “board” is where the user’s pins are located. Users can have several boards
for various items such as quotes, travel or, most popularly, weddings. A “pin”
is an image that has either been uploaded or linked from a website. Once
users create boards and add pins, other users can now repin, meaning they
can pin one user’s image to their board as well. Once the user has set up their
account and boards, they can browse, comment, and like other pins. Users
might be discouraged by repeated images and difficult-to-follow direct
linking features. Pinterest has also added the option of making boards
“secret” so that the user can pin to and view boards that only the user can see
when logged into their own account.

Pinterest does not generate its own content; rather, it draws from many
resources around the web and compiles them in one convenient location for
users.

LESSON 8: Basic Web Page Creation


1.) What are the advantages and disadvantages of a WYSIWYG
editor?

ADVANTAGE :

-You don’t need any scripting/coding experience.

– It’s simple and easy for beginners.

– Everything moves fluently, and you can easily preview what you want.

DISADVANTAGE :

-A lot of HTML code churned out by the editors is superfluous which makes
the web pages bulky in file size

-WYSIWYG editors let you ignore certain aspects that are important.

-WYSIWYG editors simply do not provide enough support and help in


optimizing your web site for search engines.

2.) List Down (3) more WYSIWYG web hosting services and their
URL.

– Weebly Web Builder ( https://www.weebly.com/ )

– Wix Web Builder ( https://www.wix.com/ )

– Siteground Builder ( https://www.siteground.com/)


LESSON 9: Collaborative ICT Development

LESSON 10: Interactive Multimedia


World Wide Web

world-wide-wait

videos (youtube)

sound, music, or audio (soundcloud)

online games (farmville)

online tests (iq and personality test)

courseware (e-learning courses)

podcasts (ted talks, ear biscuits, the starters, stuff you should know)

vodcasts (video game high school and gmm)

LESSON 11: ICT as Platform for Change


The Role of ICT in Recent History

Throughout recent history, the Philippines have been one of a few nations
that demonstrate unity for a call to action or social change. These campaigns
for social change would have not been successful if it were not for ICT.

1. EDSA (PEOPLE POWER REVOLUTION). The people power


revolution lasted from 1083 to 1986. During a radio broadcast of Radio
Veritas, Cardinal Sin encouraged the Filipinos to help end the regime of
then President Ferdinand Marcos. A major protest took place along the
EDSA from February 22 to 25, 1986 involving two million Filipinos from
different sectors. These included civilians, political parties, the military
and religious groups.

2. EDSA DOS.This is also known as the 2001 EDSA Revolution, happened


during January 17 to 21, 2001. It was fueled after 11 prosecutors of the
President Joseph Estrada walked out of the impeachment trial. As a
result, the crowd in EDSA grew over the course of a few days through
text brigades.
3. Million People March.This is a series pf protest that mainly took
place in Luneta Park from august 22 to 26, 2013. There were also several
demonstrations that happened around key cities in the Philippines and
some location overseas. The organizers and promoters of the Million
People March used Facebook and Change.org as their, mediums.

4. Yolanda People Finder.Recent storms in Philippines history gave


birth to the People finder database powered by Google. During typhoon
Yolanda, the people finder was a vital tool for people across the globe to
track the situation of their relatives. This proved to be successful and is
now adapted by more organizations to help people track relatives during
calamities.

Change.org

Change.org is dubbed as the “world’s platform for change” where anyone


from the online community can create a petition and ask others to sign in it.
During the past times petitions are only done through signing a paper,
usually done by a group asking for signatures via travel. Change.org gives
access to more people by allowing the online community to affix their digital
signatures on petition.

Signing an Online Petition

1. VisitChange.org
2. Change.org works this way. If this is your first time to use Change.org,
click Sign up or log in with Facebook. Otherwise, just input your log in
details.

3. You can then start your own petition, but for now click on any petition
you want under tending petitions.

4. Read the petitions description to see if this petition matters to you. If it


is, sign the petition by filling up the information on the right side of the
screen.

5. Share the petition on Facebook to promote it.

Alternatively, you can check out petitions of your friends on Facebook, and
then click on those petitions to read about it and sign it.

LESSON 12: ICT Project for Social Change

Before starting your project, your group should be able to do the necessary
paperwork. This allows experts to see if your project is doable over the time
frame that was given and if it is significant enough to be made into reality.

Five elements of a concept paper

1.Introduction-includes tour group’s mission and vision and a brief


introduction of your project.

2.Purpose-includes the reasons why this project is worth your group and
your sponsor’s time, effort and money.

3.Description-includes all the necessary information about the project. In


ICT, it involves the sites you are going to produce and the purpose of each
and how they work in unison.

4.Support-contains the budget needed for the project. Some concept papers
do not specify any amount requested from the sponsor.

5.Contact information-includes information on how the group be


contacted.

Simplified ICT Project Process Overview

1.Planning-Involves the following task (but not limited to):

1. Conceptualizing your project project


2. Researching on available data about your topic
3. Setting deadlines and meetings
4. Assigning people to various tasks
5. Finding a web or blog host
6. Creating a site map for tour website
7. Listing down all applications, that you need including web apps
8. Funding (If applicable)
2.Development-involves the actual creation of the website(s), involves the
production of images, infographics, etc.

3.Release and Promotion-involves the actual release of the website for


public view and promoting it. Promotion typically starts before the actual
release.

4.Maintenance-involves responding to feedback of your site visitors and


continuing to improve your website.

LESSON 13: ICT Project Publication and


Statistics
Monitoring Site Statistics on Different Platforms

1. WordPress

Once you log in to your WordPress account, you are on the Reader tab by
default. Simply click on My Sites and from there you will see the statistics
for your blog.

2. Facebook

In your Facebook page, a summary of the statistics will appear on the right
side of your cover photo: Hovering your mouse pointer over “Post
Reach” will give you more insights on which recent post reached the most
people: Clicking on the Insights tab will give more in-depth statistics:

1. Overview– contains the summary of statistics about your page

Definition of terms on your Facebook statistics:

Reach: Organic – your posts seen through the page’s wall, shares by users,
and the news feed
Reach: Paid – your posts seen through paid ads

Post Clicks – number of clicks done to your posts

Likes, Comments, and Shares – actual interaction done by your audience


either through liking the post, commenting on it, or sharing it on their walls.

1. Likes– contains the statistics about the trend of page likes


2. Reach– contains information about the number of people who was
reached by your post
3. Visits– contains data of the number of times your page tabs (like the
Timeline) are visited
4. Post– contains data showing when (day and time) you site visitors visit
your site
5. People– contains statistics about your audience’s demographics (age,
location, gender, language, and country). It is also includes
demographics about the people you have reached and engaged with.

Demographics refers to the statistics characterizing human population


usually divided by age, gender, income, location, and language.

LESSON 14: ICT Project Maintenance


Creating online surveys feedbacks forms.
The Internet will give you a lot of options in gathering your audience’s
feedback. The only difference that you and your group may notice is how
these services are presented. Some of them, because they are free to use, may
have too many ads or some features are lacking. In any case, it’s your group’s
choice which of these services is t cumbersome to reach your objective.
Google offers one of the easiest ways to gather user’s feedback. Google forms
allow your audience to answer a set of questions you have set. These can be
used for surveys, feedback, online registrations, and customer care support.

4. You will be taken to Google Form’s interface:


Next is !
Lets move on to !
6. Once you are done editing the question, click Done.
7. To add a new question or item, click on Add Item, clicking on the drop
down arrow at the right side of the Add Item button will bring up other
options for layout:
a. Section Header – adds a header for a specific a part of your survey.
b. Page break- adds a page break which means that the items at the button of
the page will be added to the next page: necessarily if your survey is too long.
c. Image- adds an image to your survey
d. Video- adds a video to your survey

iii. Multiple Choice – can be answered by only one answer in a set of options
Creating feedback forms using Google forms
Lesson objectives
• Evaluate the effectiveness of their online campaign through user feedback;
• Improve the online campaign using various tools; and
• Check the impact of their online campaign.

Steps !

1) Open your browser and go to drive.google.com


2) Sign in or create an account.
3) On the left hand hair of your My Drive page,
click New> More> Google Forms

Steps !
5. You may now fill out the form questions:
A. Question Title- Includes the question that will be answered by your
audience.
B. Help Text- Creates a subtext under the question to give more information
about a question.
C. Question Type- changes the type question according to your preference.
These questions include:
i. Text – can be answered in a short text.
ii. Paragraph Text – can be answered in a long text.
iv. Checkboxes – a question that can be answered with multiple answers in a
set of options.
v. Choose from a list- similar to a multiple-choice question but options are
revealed in a drop-down list.
vi. Scale- a question that can be answered with a numerical range.
vii. Grid- a question that contains sub questions with similar options as
shown;
• Date- a question that can be answered with a specified date
• Time- a question that can be answered with a specified time
.

d. Advanced Settings: Contains more options for the specified question type.
8. Edit the Confirmation Page option at the bottom as you see fit.
A. Show link to submit another response- allows the user to answer the same
form again.
B. Publish and show a public link to form results- allows users to see the
summarized results for your survey.
C. Allow responders to edits responses after submitting- allows users to back
and edit their answers
.

9. Click the Send Form button. The Send Form dialog box will appear these
options as you see fit.

a. Link to share- contains the URL that you can share on your website.
b. Embed- contains an embed code to attach to your HTML.
c. Short URL- generates a shorter URL necessary for limited spaces like
sharing on twitter.
d. Share link via- allows you to share the link to Google+, Facebook, and
Twitter.
e. Send form via email- allows you to share the form via email.
f. Add collaborators- Allows others to edit your form, necessary when working
on groups.

1. The easiest way to view the result is viewing a summary of the responses.
Click on Responses> Summary of Responses.
2. You will be taken to a Summary of Responses page. This is particularly
useful for viewing your results from time to time.

However, after a set amount of time, you may want to use this data in a
spreadsheet and eventually create your own charts.
3. To use the data collected through responses, click View Responses button
found on the upper part of the page.

Analyzing your Google Forms Result


4. Choose if you want to create a new Google Sheet as the destination of your
response results or if you want to put it on an existing Google Sheet.

LESSON 15: Disadvantages of ICT


Cybercrimes are illegal acts done through the use of the internet. People all
over the world use the Internet to commit a host of crimes, some of which the
public doesn’t even know are capable of being done electronically.

1. Phishing and Spoofing

Spoofing attack is when a malicious party impersonates another device or


user on a network in order to launch attacks against network hosts, steal data,
spread malware or bypass access controls. There are several different types of
spoofing attacks that malicious parties can use to accomplish this.

Phishing is the attempt to acquire sensitive information such as usernames,


passwords, and credit card details (and sometimes, indirectly, money), often
for malicious reasons, by masquerading as a trustworthy entity in an
electronic communication.

2. Blackmail/Extortion

Extortion (also called blackmail, shakedown, out wresting, and exaction)


is a criminal offence of unlawfully obtaining money, property, or services
from a person, entity, or institution, through coercion. Refraining from doing
harm is sometimes euphemistically called protection. Using the Internet to
threaten to cause damage with the intent to extort from any person any
money or other thing of value.

3. Accessing Stored Communications


Accessing Stored Communications or hacking; Intentionally accessing,
without authorization, a facility through which an electronic communication
service is provided. The act of obtaining unauthorized access to data from
computer network. This is typically done to commercial and government sites
to threaten its owner. In late 2015, a group of Anonymous Philippines hacked
the Twitter account of actress Maine Mendoza, who plays the famous
character Yaya Dub of the popular AlDub tandem and posted links and
messages on the account

4. Sports Betting

Sports Beating is engaging in the business of betting or wagering on any


sporting event or contest over the Internet. In some countries, gambling
(including sports betting) is illegal even if you are doing it over the Internet.
5. Non-Delivery of Merchandise

Devising any scheme to defraud, or for obtaining money or property by


means of false or fraudulent pretenses, or promises, and using the Internet
for the purpose of executing the scheme. The non-delivery scam occurs when
the scammer places an item up for sale when there is actually no item at all.
The item is subsequently never delivered to the buyer after they purchase the
item.

6. Electronic/ Cyber Harassment

Cyber harassment refers to online harassment. Cyber harassment or


bullying is the use of email, instant messaging, and derogatory websites to
bully or otherwise harass an individual or group through personal attacks.
Cyber harassment can be in the form of flames, comments made in chat
rooms, sending of offensive or cruel e-mail, or even harassing others by
posting on blogs or social networking sites. Cyber harassment is often
difficult to track as the person responsible for the acts of cyber harassment
remains anonymous while threatening others online. This usually applies to
school-age children.

Using the Internet to transmit child pornography. Child pornography is


distributed nowadays mainly through the Internet. Child pornography are
produced not only on a professional scale by commercial providers, but also
privately using victims from the producer’s own environment, from the
exploitation of children by clients of child prostitutes. Child pornography is
sold over commercial websites and also exchanged in closed groups or via
peer-to-peer networks. Criminal groups also use the Internet to make big
money selling child pornography.

8. Prostitution

Persuading, inducing, enticing, or coercing any individual to travel in


interstate commerce to engage in prostitution.The internet has become one of
the preferred methods of communication for prostitution, as clients and
prostitutes are less vulnerable to arrest or assault and for its convenience

9. Drug Trafficking

Delivering, distributing, or dispensing a controlled substance by means of the


Internet. Darknet markets are used to buy and sell recreational drugs online.
Some drug traffickers use encrypted messaging tools to communicate with
drug mules. The dark web site Silk Road was a major online marketplace for
drugs before it was shut down by law enforcement (then reopened under new
management, and then shut down by law enforcement again)

10. Criminal Copyright Infringement

Criminal Copyright Infringement, the act of piracy mainly for financial gain.
In late 2014, the number one pirate website, The PirateBay, was raided for
the second time due to years of pirating movies, music, games, books, and
other software. These kinds of websites earn money through advertsing.

You might also like