Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 25

Empowerment Technologies

Quarter 1 – Module 1:
Introduction to Information and Communication Technologies
and Rules of Netiquette

RONEL VON D. BASIRGO


12-HUMILITAS

WHAT I KNOW

1. C.

2. B.

3. D.

4. C.

5. C.

6. D.

7. D.

8. A.

9. A.

10. C.

What’s In

1. I always checking my phone every time it is like I’m obsessed of it.

2. I did not post any status updates on my Facebook today or for the past few weeks.

3. Yes, I use the internet for an hour, possibly more, after I woke up this morning.

4. Yes, I follow a few celebrities on different social media platforms. However, I do not go out of my way
to check on their status updates.
WHAT’S MORE

A.

1. TRUE

2. FALSE

3. FALSE

4. TRUE

5. TRUE

6. TRUE

7. FALSE

8. FALSE

9. TRUE

10. TRUE

B.

1. SO

2. MI

3. MI

4. BF

5. SN

6. SO

7. MS

8. BS

9. BF

10. BS
what I have learned
What I can do
LESSON 2

Rules of Netiquette

WHAT’S IN

WHAT’S NEW

1. YES

2. YES

3. NO

4. YES

5. NO

6. NO

7. NO

8. NO

9. NO
10. YES

WHAT’S MORE

1. I agree with the provisions of the copyright law since it allows citizens to know and exercise their right
over theirown work and defend it from misuse and illegal usage such as people using it without any
form of consent

2. I would confront them about it and ask them to take it down and apologize and if they refuse to do
so, I would take legal action since I have the right to do so.

3.
WHAT I HAVE LEARNED

1. To stay safe, I must do the following:

   Keep your computers and mobile devices up to date.  Having the latest security
software, web browser, and operating system are the best defenses against viruses,
malware, and other online threats. Turn on automatic updates so you receive the
newest fixes as they become available.
 Set strong passwords. A strong password is at least eight characters in length and
includes a mix of upper and lowercase letters, numbers, and special characters.
 Watch out for phishing scams. Phishing scams use fraudulent emails and websites
to trick users into disclosing private account or login information. Do not click on
links or open any attachments or pop-up screens from sources you are not familiar
with. Forward phishing emails to the Federal Trade Commission (FTC) at
spam@uce.gov – and to the company, bank, or organization impersonated in the
email.
 Keep personal information personal. Hackers can use social media profiles to figure
out your passwords and answer those security questions in the password reset
tools. Lock down your privacy settings and avoid posting things like birthdays,
addresses, mother’s maiden name, etc.  Be wary of requests to connect from people
you do not know.
 Secure your internet connection. Always protect your home wireless network with a
password. When connecting to public Wi-Fi networks, be cautious about what
information you are sending over it.
 Shop safely. Before shopping online, make sure the website uses secure
technology. When you are at the checkout screen, verify that the web address
begins with https. Also, check to see if a tiny locked padlock symbol appears on the
page.
 Read the site’s privacy policies. Though long and complex, privacy policies tell you
how the site protects the personal information it collects. If you don’t see or
understand a site’s privacy policy, consider doing business elsewhere.

2. There are several internet threats which include malware, spam, or phishing.

3. Malwares could be in the form of a virus, worm, Trojan, spyware, or adware.

4. It is our responsibility to protect other’s reputation online so we should be thinking first before we
click.

5. It is important for everyone to understand the laws particularly on Copyright Infringement in order to
know and

exercise your rights over your own published work.


WHAT I CAN DO

A. Identifying the Correct Web Platform for Social Change

Community Problem: shortage of vaccine

Vicinity: San Jose, Cebu City

Campaign Name: “Make Vaccine”

Type of Social Media Used: social networks

Website Used: Facebook

What will be the content of your social media site?

It would be pictures of those people who died because of covid and does not receive covid vaccine also I
will post it in Facebook so that I will capture those on the authority.

ASSESSMENT

1. A.

2. B.

3. C.

4. B.

5. C.

6. C.

7. B.

8. D.

9. C.

10. B.
EMPOWERMENT TECHNOLOGIES
QUARTER 1 – MODULE 2:LESSON 1
Contextualized Online Search and Research Skills
RONEL VON D. BASIRGO
12-HUMULITAS
WHAT I KNOW

1. A.

2. A.

3. C.

4. C.

5. D.

6. A.

7. A.

8. C.

9. C.

10. A.

WHAT’S IN

In order to be safe and protected online, I would advise online users to always be cautious of what they
click, or more commonly known as “think before you click”. This phrase simply means that one must be
careful of the information that you see and share online.

WHAT’S MORE

1. True

2. False

3. True

4. False
5. True

WHAT I HAVE LEARNED

I have learned that when researching online, I have to remember to always double cross and check
between various reliable sources. I also have to take note of consistency of details to ensure the
credibility of the information I gather. I need to only visit sites I know for sure are reliable and known.
Since, fabricated and manipulated information are rampant on the internet, it is crucial to take extra
precautions when gathering information.

LESSON 2

Advanced Word Processing Skills

WHAT’S IN

The following are the things you need to consider in conducting online research:

1. Start with a solid research plan

2. Be specific3. Keep the language simple4. Keep it short

5. Define relevant participants

6. Make it personal

7. Be clear about the nature of your research

8. Offer an incentive

9. Test continuously
10. Combine different research methods

WHAT’S NEW

Task 1: I will create message using Microsoft word and create a folder then send it to each

recepients.

Task 2 I will make a design of so that its more interesting and give it to the recipient with the name of
who sent

WHAT’S MORE

1. Pictures- are electronic or digital photographs commonly saved in any local storage device.

2. PNG- stands for Portable Network Graphics built around the capabilities of GIF for the purpose of
transporting

images in the internet at faster rates but do not support animation.

3. Tight

4. Square-

5. JPG- stands for Joint Photographic Group. It is a kind of data compression process.

6. GIF-a lossless format for image files that supports both animated and static images

7. Mail Merge-the automatic addition of names and addresses from a database to letters and
envelopes in order to facilitate sending mail, especially advertising, to many addresses.

8. Image-visually descriptive or figurative language, especially in a literary work.

9. Shapes- these are printable objects or materials that you can integrate in your document to allow you
to have

some tools to use for composing and representing ideas.

10. Screenshot-an image of the data displayed on the screen of a computer or mobile device

11. Text Wrap-a facility allowing text to surround embedded features such as pictures.

12. Through-moving in one side and out of the other side.


WHAT I HAVE LEARNED

LESSON 3

Advanced Spreadsheet Skills

WHAT’S IN
Since my chosen future career is a career in education, I believe that a lot of features in Microsoft Word
would deem useful to me as a teacher especially since we have experienced a situation where
everything must be done in a distance and mostly online. Inserting images in my documents can be
quite useful in catching my students’ attention. The mail merge feature would actually be quite useful to
my chosen profession as well.

WHAT’S NEW
The logo shown in the photo is of Microsoft Excel. I am quite familiar with this application since we were
taught about its
features during our ICT Program in junior high as well as our Computer subject during elementary
school.

WHAT’S MORE
1. AVERAGEIF
2. MAX(range)
3. MIN(range)
4. SUMIF
5. SUMIF
6. MIN(range)
WHAT I HAVE LEARNED
1. MICROSOFT EXCEL
2. MERGE
3. FUNCTIONS
4. GOOGLE SHEETS
5. WORKSHEET
ASSESSMENT
1. A.
2. D.
3. C.
4. B.
5. A.
6. B.
7. A.
8. C.
9. D.
10. B.
EMPOWERMENT TECHNOLOGIES
QUARTER 1 – MODULE 3:LESSON 1
Contextualized Online Search and Research Skills
RONEL VON D. BASIRGO

LESSON 1

Advanced Presentation Skills

WHAT I KNOW

1. FALSE

2. TRUE

3. FALSE

4. TRUE

5. FALSE

6. TRUE

7. TRUE

8. TRUE

9. TRUE

10. TRUE

WHAT’S IN

● Mail merge

● Label generator

● Smart art

● Text wrap

● Image integration

WHAT’S NEW
Yes, I am familiar with the logo. It is the logo for Microsoft PowerPoint. I am familiar with this software
since I use it a lot when presenting information and doing academic reports. I know quite a lot of its
features such as hyperlinks, animations, effects, smart art, etc.

WHAT’S MORE

A.

a. 2

b. 1

c. 3

B.

a. 1

b. 2

c. 4

d. 3

WHAT I HAVE LEARNED

1. MICROSOFT POWERPOINT

2. HYPERLINKS

3. Ctrl + K

4. MINIMIZE

5. CONTRAST

LESSON 2
Manipulating Text, Graphics, and Image

To Create ICT Content for an Online Environment

WHAT’S IN

Based on my learning in the previous lesson, creating an effective presentation requires you to keep
slides to a minimum, utilize font size that is easy to read, use short sentences or bullets in summarizing
information, make use of graphics in your presentation, uniformity in designs, and lastly, use a light font
on dark backgrounds and dark on light.

WHAT’S MORE

1. GRAPHICS

2. VARIETY

3. EMPHASIS

4. PROPORTION

5. INFOGRAPHICS

6. TOOLS

7. BALANCE

8. STYLES

9. PIKTOCHART

10. MOVEMENT

WHAT I HAVE LEARNED

1. To create an effective PowerPoint presentation, I will take the basic principles of graphics and layout
into consideration. Utilizing infographics is also effective in improving your presentation since it attracts
the viewer’s attention and makes complex data more appealing to users.

2. The basic principles of graphics and layout include balance, emphasis, movement, pattern, repetition,
and rhythm, proportion, and variety.

ASSESSMENT
1. C.

2. C.

3. B.

4. D.

5. A.

6. A.

7. B.

8. C.

9. D.

10. A.

What I can do
EMPOWERMENT TECHNOLOGIES
QUARTER 1 – MODULE 4:LESSON 1
Contextualized Online Search and Research Skills
RONEL VON D. BASIRGO

WHAT I KNOW

1.C

2.B

3.A

4.A

5.B

6.A

7.C

8.A

9.C

10.B

What’s New

A picture is worth a thousand words” is one of the famous and common


proverbs. It means an artwork or an image can convey meanings more
effectively than descriptions. This phrase is usually used in newspaper
advertisements. It shows that graphic illustrations are more useful to express
the clear thoughts hidden behind a notion rather than words. Most artists,
especially in the modern arts, share their message through their art piece.
These artworks bring various interpretations and are also hard to get it right.
However, an image can undoubtedly give an important message or tell a story
using colors, designs, themes, and more.
What I can do
What’s more

Across

2. print

5. batch editor

6. page

8.viewer

9. combine

10. editor

Down

1.splitter

3. paper print

4. rename

5. crop

Assessment
1.C
2.B
3.C
4.A
5.A
6.C
7.A
8.C
9.B
10.B
EMPOWERMENT TECHNOLOGIES
QUARTER 1 – MODULE 5:LESSON 1
Contextualized Online Search and Research Skills
RONEL VON D. BASIRGO
What I can do
EMPOWERMENT TECHNOLOGIES
QUARTER 1 – MODULE 6:LESSON 1
Contextualized Online Search and Research Skills
RONEL VON D. BASIRGO

What I know

1.A

2.C

3.D

4.B

5.A

6.B

7.C

8.D

9.A

10.D

What’s New

1. Globally, ICTs have emerged as strategically important tools for social and economic
change. The purpose of the ICT collaboration is to build research relationships and
networks through shared training and technological and
product development agendas.
2. The purpose of the ICT collaboration is to build research relationships and
networks through shared training and technological and product development
agendas.
What I can do
1. Make a list of all the values, beliefs, customs, and practices of the local
community; itemize them, classify them, and prioritize the list.
2. Identify every book written about these values, beliefs, customs, and
practices with the highest priority. Select your favorite books for your
academic purposes; then select your favorite passages from those books.
3. Assemble a syllabus based on your selected reading. That should do it.

Assessment
1.A 3.A 5.D 7.D 9.A
2.C 4.B 6. A 8.C 10.A

You might also like