Professional Documents
Culture Documents
Empowerment Technology: Dee Hwa Liong Academy
Empowerment Technology: Dee Hwa Liong Academy
EMPOWERMENT
TECHNOLOGY
Angelica D.R. Banaag, LPT
This module uses Empowerment Technologies Innovative Training Works, Inc by REX Book Store, Inc.
All rights reserved to the Author. No copyright infringement intended.
MULTIPLE CHOICE: Choose the correct answer.
1. A web page that allows interaction from the user.
a. Static c. Social
b. Dynamic d. Comment
2. This refers to the feature where users are able to categorize and locate information through
tagging.
a. Hashtags c. Taxonomy
b. Folksonomy d. Rich User Experience
3. A feature of a dynamic website that allows users to put their own content.
a. Rich user experience c. User participation
b. Long Tail d. Mass participation
4. It provides common framework to allow data to be shared and reused across platform.
a. W3C c. Web 1.0
b. Semantic Web d. Web 2.0
5. Based on this magazine, Philippines is one of the top 10 as “The Selfiest Cities around the
world”.
a. People c. Reader’s Digest
b. Time d. Candy
6. This is the operating system for blackberry phones.
a. Blackberry OS c. Windows Mobile
b. Symbian d. iOS
7. Pinterest is a social media website that can be classified as _________?
a. Bookmarking site c. Microblogging
b. Media sharing d. Blogs and Forums
8. Currently, this is the fastest mobile network.
a. 2G c. 4G
b. 3G d. 5G
9. This media is designed to help people who have visual and reading impairments.
a. Assistive c. Bookmarking
b. Social d. Accessibility
10. This type of social media website focuses on short updates posted by the user.
a. Blogging c. Social Media
b. Microblogging d. Hastagging
1|P ag e
ADRB
Lesson 1: Introduction to Information and
Communication Technologies
At the end of this module, the students Communication Technologies are commonly
should be able to:
used in everyday lives. We usually use our
o improve their knowledge on how ICT
affects their everyday lives and the state phones to communicate to our family, friends,
of our nation;
o compare and contrast the differences work and business. According to the 2013
between online and platforms, sites,
and content; edition of Measuring the Information Society by
o understand the feature of Web 2.0;
the International Telecommunication Union,
o understand the future of the World
Wide Web through web 3.0 and there are 106.8 cellphones per 100 Filipinos in
o learn the different trends in ICT and use
them to their advantage. the year 2012. That would mean that for every
2|P ag e
ADRB
they have a cellphone and approximately for the seven of them, they have two.
ICT is playing a central role in the development of social businesses, especially here in the
Philippines that is why the country was dubed as “ICT Hub of Asia” because of the huge growth
of ICT related jobs, one of which Business Processing Outsourcing (BPO) or call centers.
information.
Lee in 1989 most web pages were static. Static is also known
as flat page or ordinary page, in the sense that the page is “as
the same for all user and this is also called “read-only” web, this is referred to as Web 1.0.
It allows the users to interact with the page instead of just reading a page, the user may able to
comment or create a user account that is why it is called “read-write” web. Web 2.0 also allow
users to use web browsers instead of just using their operating system. The term Web 2.0 was
coined by Darci DiNucci in 1999. Browsers can now be used for their interface, application
3|P ag e
ADRB
software or web applications, and even for file storage. Most websites that we visit today are Web
2.0.
1. Folksonomy. It allows user to categorize and classify/arrange information using freely chosen
keywords (e.g. tagging). Popular social networking sites such Facebook, Twitter, Instagram,
etc. use tags that start with the pound sign (#). This is also referred to as hashtag.
2. Rich User Experience. Content is dynamic and responsive to user’s input. A website that shows
local content would be an example. In the case of social networking sites, when you logged
on, your account is used to modify what you see in their website.
you used.
4. User Participation. The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comment, reviews, and evaluation.
user participation.
4|P ag e
ADRB
5. Software as a Service. Users will subscribe to a software
that allows the user to create and edit word processing and
like a Word Processor, you can purchase it for one-time huge amount and install it in your
computer and it is yours forever. Software as service only allows you to “rent” a software for
a minimal fee.
The Semantic Web is a movement led by World Wide Web Consortium (W3C). The W3C
standard encourages web developers to include semantic content in their web pages.
According to W3C, “The Semantic Web provides a common framework that allows data to be
shared and reused across application, enterprise, and community boundaries”. The aim of Web 3.0
is to have machines or servers to understand the user’s preferences to be able to deliver web content
1. Compatibility
HTML files and current web browsers could not support Web 3.0.
2. Security
5|P ag e
ADRB
The user’s security is also in questions since the machine is saving his or her preferences.
3. Vastness
4. Vagueness
Certain word are imprecise. The words “old” and “small” would depend on the user.
5. Logic
Since machines use logic, there are certain limitations for a computer to be able to predict
Trends in ICT
1. Convergence
or task.
2. Social Media
A website, application, or online channels that enable web users to create, co-create,
6|P ag e
ADRB
Six Types of Social Media
background.
resources.
c. Social News. These are sites that allow users to post their own news items or links to other
news sources.
and video.
e. Microblogging. These are sites that focus on short updates from the user.
their content.
7|P ag e
ADRB
3. Mobile Technologies
personal computers.
a. iOS
b. Android
c. Blackberry OS
- Used in Blackberry OS
d. Windows Phone OS
e. Symbian
f. Web OS
- Originally was used for smartphones, now used for Smart TV’s.
g. Windows Mobile
4. Assistive Media
8|P ag e
ADRB
Directions: There are 10 images below, create as many hashtags as you think per image.
1. 6.
2. 7.
3. 8.
4. 9.
10.
5.
9|P ag e
ADRB
Compose atleast 5 sentences, how does the Information and Communication Technology
affects your life?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
Sources:
https://my2017net.wordpress.com/2017/10/07/philippines-ict-hub-of-asia/
https://www.ericsson.com/en/reports-and-papers/networked-society-insights/social-business/social-impact-of-
ict
https://aboutprojectict.wordpress.com/2017/01/26/ict-in-philippines/
10 | P a g e
ADRB
MULTIPLE CHOICE: Choose the correct answer.
a. Spyware c. Spam
b. Adware d. Virus
a. Worm c. Phishing
b. Trojan d. Malware
3. Unwanted email mostly from bots or advertisers and it can be used to send malware.
a. Spam c. Pharming
b. Phishing d. Malware
a. Adware c. Spam
b. Keyloggers d. Malware
5. A malicious program designed to replicate itself and transfer from one computer to another.
a. Worm c. Trojan
b. Virus d. Pharming
a. Pharming c. Worm
b. Trojan d. CSS
11 | P a g e
ADRB
Lesson 2: Rules of Netiquette
Objectives:
Online Safety and Security
At the end of this module, the students
should be able to: The internet, is truly a powerful tool. It can
o consider one’s and others safety when be used to promote your business, gain new
sharing information using the internet;
friends, and stay in touch with the old ones. It
o consider one’s and others reputation
when using the internet; is also a source of entertainment. But like most
o determine and avoid the dangers of the things in this world, there is always “another
internet;
side of the coin”. The internet is one of the most
o be responsible in the use of social
networking sites and; dangerous places, especially if you do not
o browse the internet efficiently and know what you are doing.
properly through properly referencing.
12 | P a g e
ADRB
Below are different types of information that are usually present in social media. Put a
check ( ∕ ) on the box of Yes, if you disclose that information in your social media accounts and
put a check ( ∕ ) on the box of No, if you do not disclose that information on your social media
accounts.
The following are the risks of disclosing those types of information above in your social
media accounts.
13 | P a g e
ADRB
6. Who your Mother Risky, yet as not risky as posting their full names, especially your
and Father are mother’s maiden name. In fact, if you have already encountered many
websites that require your mother’s maiden name as an answer to answer
to a secret question whenever you lose your password.
7. Who your siblings This is a huge risk, especially if you have younger siblings. Strangers
are may pretend or use their identity to dupe you.
8. Your address Hopefully you answered no to this one. Giving the internet your number
is one thing, giving them your address is a whole other level. It would be
much easier for criminals to find you.
9. Your home phone This shared information is more risky than sharing your personal phone
number number. Scams usually use this information to deceive you, one of which
is when a stranger pretends to know your parents or pretends to be you.
10. Your birthday Letting people know your birthday is probably a must if you want to get
as many gifts as possible. But having it in your profile makes you
vulnerable to identity theft.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions, read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode”, will
not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, “my house at this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one antivirus software to
avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-
peer downloads (torrents) as the download is the most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
14 | P a g e
ADRB
Internet Threats
1. Malware. Stands for malicious software
a. Virus. A malicious program designed to replicate itself and transfer from one computer to
another either through the Internet and local networks or data storage like flash drives and
CD’s.
b. Worm. A malicious program that transfer from one
computer to another by any type of means. Often it
uses a computer network to spread itself. An
example is the ILOVEYOU worm (Love Bug
Worm) which infected over ten million windows
personal computers on and after May 4, 2000, it
started spreading as an email message with the
subject line “ILOVEYOU” and the attachment
“LOVE-LETTER-FOR-YOU.txt.vbs”. The ILOVEYOU worm infected computers all
over the world and it was created by a Filipino.
c. Trojan. A malicious program that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information.
❖ Rogue security software. Tricks the user into posing that is a security software. It asks
the user to pay to improve his/her security but in reality, they are not protected at all.
d. Spyware. A program that runs in the background without you knowing it (thus called
“spy”). It has the ability to monitor what you are currently doing and typing through
keylogging. Keyloggers used to record the keystroke done by the users. This is done to
steal their password or any other sensitive information. It can record email, messages, or
any information you type using your keyboard.
e. Adware. A program designed to send you advertisements, mostly as pop-ups.
2. Spam. Unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing. Its goal is to acquire sensitive personal information like password and credit card
details. This is done by sending you an email that will direct the card, or personal information.
The user will be ask to visit a website and update his/her username, password and credit card
pin.
❖ Pharming. A more complicated way of phishing where it exploits the DNS (Domain
Name Service) system.
15 | P a g e
ADRB
Protecting Online Reputations and Think before you Click
Remember the following:
❖ Before you post something on the web, ask these questions to yourself:
o Would you want your parents or relatives see it?
o Would you want your future boss to see it?
Once you post something on the web, you have no control of who sees your posts.
❖ Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.
❖ Set your post to “private’. In this way, search engines will not be able to scan that
post.
❖ Avoid using names. Names are easy for search engines to scan.
❖ If you feel that a post can affect you or other’s reputation, ask the one who posted it
to pull it down or report it as inappropriate.
Copyright Infringement
If you create something, an idea, an invention, a form of literary work, or a research you
have the right of how it should be used by others. This is called intellectual property.
1. Understand. Copyright protects literary works, photographs, painting, drawings, films, music
(and lyrics), choreography and sculptures but does not generally protect underlying ideas and
facts.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not valid against
copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you or
something made from somebody else’s creativity.
4. Know the Law. There are some limitations to copyright laws. In the Philippines, lifetime (of
the creator) plus 50 years and Fair Use provisions.
Online Research
Information that we need is more likely already in the Internet. It is just a matter of how
to look.
16 | P a g e
ADRB
1. Have a question in mind. Focus on a question you want answered. If it is a series of
questions, start with one. Never search everything on one go.
2. Narrow it down. Use filters to determine the most appropriate result.
3. Advance search. It is the best way to filter information
4. Look for Credible Source. Some wikis, filled with updated information, are not credible
source. When using wikis, check out the link of the cited texts and read references.
5. Give Credit. Give credit to the original author of the page or information.
17 | P a g e
ADRB
As a student how will you show your sense of responsibility in using the internet and social
media platforms?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
Sources:
https://prezi.com/p/ohjjvo6vqt65/lesson-2-rules-of-netiquette/
18 | P a g e
ADRB
MULTIPLE CHOICE: Choose the correct answer.
19 | P a g e
ADRB
Lesson 3: Advanced Word Processing
Skills
Word
Objectives:
At the end of this module, the students
should be able to: In the professional world, sending out
information to convey important information is
o Use some advanced capabilities of
Microsoft Word used to increase vital. Because of ICT, things are now sent much
productivity and efficiency; faster than the traditional newsletter or postal
o Effectively use these features to help
mail. You can now send much faster than the
improve the productivity of an
organization through maximizing the traditional newsletter of postal mail. You can
potential of MS Word; now use the Internet to send out information you
o Create form letters or documents for
need to share. What if we could still do things
distribution to various recipients;
o Create labels and envelops for much faster – an automated way of creating and
distribution and; sending uniform letters with different
o Create media rich documents for
recipients? Would that not be more convenient?
printing or publishing.
20 | P a g e
ADRB
Word Processing is the use of computer to create, edit and print document. Word processor
is a software program that is capable in creating and printing document. Microsoft Word is a
widely used commercial word processor designed by Microsoft. Microsoft Word is a component
of the Microsoft Office suite of productivity software, but can also be purchased as stand-alone
product. It was initially launched in 1983 and has since been revised numerous times.
Mail Merge. Allows to create documents or merge them with another document or data file.
21 | P a g e
ADRB
Two Components of Mail Merge
1. Form Document. It is generally the document that contains the main body of the message we want
to convey or send. The main body of the message is the part of the form document that remains
the same no matter whom you send to from among your list. Data or merge fields marks the
position on your form where individual data or information will be inserted. It id denoted by the
symbol (<<>>).
2. List or Data File. This where the individual information or data that needs to be plugged in
(merged) to form document is placed and maintained. Mail merge allows data file to be created
within the Microsoft Word application itself, or it gets data from a file created in Microsoft Excel
or other formats.
22 | P a g e
ADRB
Label Generation. It creates a blank form document that simulates either a blank label of pre-
defined size and will use the data file that you selected to print the information, typically individual
addresses.
You may visit the link below for the step by step procedure on how to mail merge in Microsoft
Word.
Link: https://www.youtube.com/watch?v=4dozr7K2_9Y
Kinds of Materials
1. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in
any local storage device.
3 Types of Picture Files
a. .JPG (Joint Photographic Experts Group). It does not work well on lettering, line, drawings
or simple graphics. .JPG are relatively small in file size and supports 16 million colors.
b. .GIF (Graphics Interchange Format). It is capable of displaying simple animation. .GIF is
much better for logos, small text, black and white images, or low resolution files. It
supports 256 colors.
c. .PNG (Portable Network Graphics). Its development was basically for the purpose of
transporting images on the internet at faster rates. .PNG support
23 | P a g e
ADRB
2. Clip Art. This generally a .GIF type, line art drawings or images used as generic representation
for ideas and objects that you might want to integrate in your document.
3. Shapes. Printable objects or material that you can integrate in your document to enhance its
appearance or to allow you to have some tools to use for composing and representing ideas or
messages.
4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form
ideas that are organizational or structural in nature.
5. Chart. Another type of material that you can integrate in your Word document that allows you
to present data characteristics and trends.
6. Screenshot. In creating manual for training or procedure will require the integration of a more
realistic image of what you are discussing on your report or manual.
Image Placement
24 | P a g e
ADRB
a. In line with text. This is the default setting for images that are inserted or integrated in your
document. It treats your image like a text font with the bottom side totally aligned with the text
line. This setting is usually used when you need to place your image at the beginning of a
paragraph. When placed between texts in a paragraph or a sentence, it distorts the overall
appearance and arrangement of the texts in the paragraph because it will take up the space it
needs vertically, pushing whole line of texts upward.
b. Square. This settings allows the image you inserted to be placed anywhere with the paragraph
with the text going around the image in a square pattern like a frame.
c. Tight. It is almost the same as the Square setting, but here the text “hug” or conforms to the
general shape of the image. This allows you to get a more creative effect on your document.
This setting can mostly be achieved if you are using an image that supports transparency like
.GIF or .PNG file.
d. Through. This setting allows the text on your document to flow even tighter taking the contours
and shape of the image. Again, this can be best used with .GIF or .PNG type of image.
e. Top and Bottom. This setting pushes the texts away vertically to the top and/or the bottom of
the image so that the image occupies a whole text line on its own.
f. Behind Text. This allows your image to be dragged and placed anywhere on your document
but with all the texts floating in front of it. It effectively makes your image look like a
background.
g. In Front of Text. This setting allows your image to be placed right on top of the text a s if your
image was dropped right on it. That means whatever part of the text you placed the image on,
it will be covered by the image.
25 | P a g e
ADRB
You are task to apply what you have learned about mail merge. Below is the form document
that will serve as your pattern for this activity. Create atleast 10 recipients and complete all the
information needed base on the form document. Make sure to save 2 documents such as the list or
data file and the merged document, name your file as your Last name and send it to me through
email.
Sources:
https://www.coursehero.com/file/32710444/Lesson-3pptx/
https://elenakitcats.wordpress.com/2018/02/23/the-journey-begins/
26 | P a g e
ADRB