Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

EMPOWERMENT TECHNOLOGIES: ICT FOR Berners-Lee, it could be considered the “read-only

STEM (ELECTIVE) web.” In other words, the early web allowed us to


search for information and read it.

Lesson 1: Introduction to Information and ● Only has limited web and sites
Communication Technology ● Information portal only

Information and Communication


Technologies (ICT) deals with the use of different
communication technologies such as mobile
phones, telephones, the internet, etc. to locate, save,
and edit Information.

ICT in the Philippines


● Philippines is dubbed as the ICT Hub of
Asia
● According to the 2013 edition of Measuring
the Information Society by the International
Telecommunication
● Union, that are 106.8 cell phones per every
100 Filipinos in the year of 2012. This
implies that for every 100 Filipinos, seven of Web 2.0 ( read,write web)
them own two cell phones.
● The ICT industry shares 19.3% of the total Web 2.0 is the evolution of Web 1.0 by
employment population here in the adding dynamic web pages-the user is able to see a
Philippines. website differently than others.
● Time Magazine declared Makati City,
Philippines as Selfie capital of the world Web 2.0 is a term coined by Darcy DiNucci
while Cebu City ranks 9. on January 1999 in her article “Fragment of
Future”
Evolution of World Wide Web (like a big hard
drive ) Allows users to interact with the pages, and
allows us to use a web browser.
WEB 1.0 ( early web and read only web)

When the World Wide Web was invented,


most pages were static (also known as Flat page
or Stationary Page) in the sense that the page was
"as is" and could not be manipulated by the user.
The content was also the same for all users. This
was referred to as Web 1.0

The first implementation of the web


represents the Web 1.0, which, according to Tim
data plan that charges you for the amount of
Features of Web 2.0 bandwidth you use.
5. Software as a Service – Users will
1. Folksonomy – Allows the user to subscribe to software only when needed
categorize and classify/arrange rather than purchasing them. This is a
information using a freely chosen word cheaper option if you do not always need to
(e.g., tagging). Popular social networking use the software.
sites such as Twitter, Instagram, Facebook,
etc. use tags to start with the pound sign (#).
This is also referred to as HASHTAG.
2. Rich User Interface – Content is dynamic
and is responsive to the user's input. An
example would be a website that shows
local content. In the case of the social 6. Mass Participation – Diverse information
networking site, when logged on, your sharing through universal web access.
account is used to modify what you see on Since most users can use the internet, Web
their website. 2.0's content is based on people from
3. User Participation – The owner of the various cultures.
website is not the only one who can put
content. Others can place on their own using
comments, reviews, and evaluations. Some
websites allow readers to comment on an
article, participate in polls, or review a
specific product (e.g., Amazon.com, online
stores).

Web 3.0 and Semantic Web

The Semantic Web is a movement led by


4. Long Tail – Services that are offered the World Wide Web Consortium (W3C). The
on-demand rather than on a one-time W3C standard encourages web developers to
purchase. In certain cases, time-based include semantic content in their web pages. The
pricing is better than file size- based pricing term was coined by the inventor of the World
or vice versa. This is synonymous with Wide Web, Tim Berners-
subscribing to a data plan that charges you Lee. Lee also noted that the semantic web is a
for the amount you spend on the internet or component of Web 3.0.
Semantic web prioritize the language
Web 3.0 is yet to be fully realized because of time on social media sites than in
several problems: any other type of site. With this,
more and more advertisers use social
● Compatibility – HTML files and current media to promote their products.
web browsers could not support Web 3.0
● Security – The user's security is also TYPES OF SOCIAL MEDIA
questionable since the machine is saving his
or her preferences ● Social Network – These are the sites that
● Vastness – The World Wide Web already allow you to connect with other people
contains billions of web pages. with the same interest or background. Once
● Vagueness – Certain words are imprecise. a user creates his or her account, he or she
The word "old" and "small" would depend can set up a profile, add people, create
on the users. groups, and share content.
● Logic – Since machines use logic, there is a Example: Facebook and Google+
certain limitation for a computer to be able
to predict what the user is referring to at a ● Bookmarking Sites – These are the sites
given time. that allow you to store and manage links
to various websites and resources. Most of
Trend in Information and Communication these allow you to create a tag that allows
Technology you and others to easily search or share
them.
1. CONVERGENCE TECHNOLOGY Example: StumbleUpon and Pinterest
- Technological Convergence is the
synergy of technological ● Social News – These are sites that allow
advancements to work on a similar users to post their news items or links to
goal or task. For example, besides other news sources.
using your personal computer to Example: Reddit and Digg
create word documents, you can now
use your smartphones. It can use ● Media Sharing – These are sites that allow
cloud technologies to sync files from you to upload and share media content
one device to another while also like images, music, and video.
using LTE technology which means Example: Flickr, YouTube, and Instagram
you can access your files anytime,
anywhere. Convergence is using ● Microblogging - These are sites that allow
several technologies to accomplish a users to focus on short updates. Those
task conveniently. who subscribed to the user will be able to
2. SOCIAL MEDIA receive these updates.
- Social Media is a website, Example: Twitter and Plurk
application, or online channel that
enables web users to create, ● Blogs and Forums - These are websites that
co-create, discuss, modify, and allow users to post their content. Other
exchange user-generated content. users can comment on the said topic.
According to Nielsen, a global Example: Blogger, WordPress and Tumblr
information and measurement
company, Internet users spend more
● ASSISTIVE MEDIA- is a non-profit
service designed to help people who
3. MOBILE TECHNOLOGY have visual and reading impairments. A
- The popularity of smartphones database of audio recording is used to read
and tablets have taken a major rise the user.
over the years. The devices' large
capacity to do tasks that was LESSON 2: RULES OF NETIQUETTE
originally found in PCs.
Netiquette is short for "Internet etiquette"
MOBILES THAT USE DIFFERENT just like etiquette is a code of polite
OPERATING SYSTEM behavior in society, netiquette is a code of
good behavior on the internet. This
● iOS – is used in Apple devices such as includes several aspects of the internet,
iPhone and iPad. such as email, social media, online chat,
web forums, website comments,
multiplayer gaming, and other types of
online communication.

RULES OF NETIQUETTE

Rule 1: Remember the Human


• “Do unto others what you want others to
do unto you.”
• People often forget that when they converse
online, they converse with real people.
● Android - an open source OS developed by • Would you say it to the person’s face?
Google. • Your words are written!

Rule 2: Adhere to some standards of behavior


online that you follow in real life
• Be ethical.
• Standards of behavior may be different in
cyberspace, but they are not lower than in real life.
• Breaking the law is bad netiquette.
• Do your best to act within the laws of
society and cyberspace.
● Blackberry OS – is used in blackberry
Rule 3: Know where you are in cyberspace
devices.
• Netiquette varies from domain to domain.
● Symbian - the original smartphone OS used
• What’s good in one area may be bad in another.
by Nokia devices.
• Lurk before you leap.
● WebOS - originally used in smartphones;
• Stop, read, and observe before making
now used in smart TVs.
any move.
● Windows Mobile - developed by Microsoft
for smartphones and pocket PCs.
Rule 4: Respect other people’s ONLINE AND SAFETY SECURITY
time and bandwidth
• Netiquette varies from domain to domain
• What’s good in one area may be bad in another
• Lurk before you leap
• Stop, read, and observe before making any move

Rule 5: Make yourself look good online


• Netiquette varies from domain to domain
• What’s good in one area may be bad in another
• Lurk before you leap
• Stop, read, and observe before making
any move

Rule 6: Share expert knowledge


• Don’t be afraid to share what you know.
• It is especially polite to share the result of your
question with others.
• Sharing your knowledge is fun. It is a long-time
net tradition.

Rule 7: Help keep flame wars under control


• “Flaming” – It is what people do when they
express a strongly held opinion without holding
back any emotion.
• Netiquette does not forbid flaming, what it forbids The Internet is defined as the Information
is the perpetuation of flame wars. superhighway. This means that anyone has access
to this highway, can place information, and can
Rule 8: Respect others privacy grab that information. Any information, even things
• Failing to respect other people's privacy is not just that have been set privately, can be accessed one
bad netiquette, it could also cost you your job and way or another. This is why social networking sites
integrity. like Facebook continue to improve their security
features. The threat of cybercrime is very real.
Rule 9: Don’t abuse your power While you may not experience that threat now,
• Knowing more than others, or having more power Whatever information we share today can affect our
than they do, does not give you the right to take future.
advantage of them.

Rule 10: Be forgiving to other people’s mistake


• When someone makes a mistake, be kind about it.
• If you do decide to inform someone of a mistake,
point it out politely.
improve his/her security but in 28
INTERNET THREATS reality, they are not protected at all.

What is Malware? ● Spyware – a program that runs in the


background without you knowing it (thus
● Malware is the collective name for several called "spy"). It can monitor what you are
malicious software variants, including currently doing and typing through
viruses, ransomware, and spyware. keylogging.
Shorthand for malicious software, malware - Keylogger – used to record the
typically consists of code developed by keystroke done by the users. This is
cyber attackers, designed to cause extensive done to steal their password or any
damage to data and systems or to gain other sensitive information. It can
unauthorized access to a network. record emails, messages, or any
information you type using your
● Malware is typically delivered in the form of keyboard.
a link or file over email and requires the
user to click on the link or open the file to ● Adware – a program designed to send you
execute the malware. advertisements, mostly as pop-ups.

TYPES OF MALWARE ● Ransomware – is a form of malware that


essentially holds a computer system
● Virus - a malicious program designed to captive while demanding a ransom. The
replicate itself and transfer from one malware restricts user access to the
computer to another either through the computer either by encrypting files on the
internet and local networks or data storage hard drive or locking down the system and
like flash drives and CDs. displaying messages that are intended to
force the user to pay the malware creator to
● Worm - a malicious program that transfers remove the restrictions and regain access to
from one computer to another by any type their computer.
of means. Often, it uses a computer network
to spread itself. What is Spam?
- For example, the ILOVEYOU worm unwanted email mostly from bots or
(Love Bug Worm) created by a advertisers. It can be used to send malware.
Filipino.
What is Phishing?
● Trojan – a malicious program that is Its goal is to acquire sensitive personal
disguised as a useful program but once information like passwords and credit card
downloaded or installed, leaves your PC details.
unprotected and allows hackers to get your
information What is Botnet?
group a compromised computer connected
- Rogue Security Software – tricks to a network (“zombie”).
the user into posing that it is security
software. It asks the user to pay to
What is Denial of Service organization? Is the author qualified
Attack ? to write on this topic?
- disrupts computer access to internet services ● Objectivity
- Does the sponsor have comercial
interest? Is advertising included in
LESSON 3: CONTEXTUALIZED ONLINE the page? Are there obvious biases?
SEARCH AND RESEARCH SKILLS ● Currency
- Is the publication date indicated? Is
Internet Research there a date for the last update? Does
is the practice of using Internet Information, the topic not change frequently?
especially free information on the World Wide Web ● Coverage
- Are the topics covered legit? Does
Research Process ( Barron and Ives, 1996) the content appear to be complete

Step 1 : Questioning CONDUCTING ONLINE RESEARCH


- Before going on the internet, you should
structure your questions. Use advanced search
Step 2 : Planning - Maximize the use of operators and search in
- Develop a search strategy with a list of sites feature to get the desired results
to investigate Look for Credible source/s
Step 3 : Gathering - E.g. look for superscript link in wikipedia
- Use the Web to collect and gather Give Credit
information - < name of the person or org> “<Title of page
Step 4 : Sorting and Sifting in Italics>,” <URL>. Data last seen/
- Analyze and categorize the data they retrieved.
gathered on the web
Step 5 : Synthesizing COPYRIGHT AND COPYRIGHT
- Integrate the information into the lesson and INFRINGEMENT
draw conclusions.
Step 6 : Evaluating
- Asses the result and if necessary, begin the Copyright
process again - Is a part of the law, wherein you have the
right to your work and anyone who uses it
Analyzing web resources without your consent is punishable by law.

● Accuracy Works that are protected under copyright


- Are sources listed for the facts? Can ● Written Works
the information be verified through ● Musical works
other sources? Has the size been ● Dramatic/ Choreographed works
edited for grammar, spelling , etc.? ● Physical artwork
● Authority ● Architecture
- IS the publisher reportable? Is the ● Computer program
sponsorship clear? Is a phone ● Original Website content
number or postal address available?
Is there a link to the sponsoring Works not protected by Copyright
● Intangible forms of expression - Title bar is on the top of the window when
● Common knowledge, phrases, design you open a Microsoft Word application.
● Government works
● Ideas, procedures and process Menu Bar
● Content in public domain
● Fair use of copyright

What is copyright infringement - Menu bar contains all the menus such as
- Occurs when there is a violation of any of File, Home, and Insert, Page Layout, etc.
the exclusive economic or moral rights
Toolbar
granted to the copyright owner.
- These are the categories of functions and
Penalties provided by Philippine Law for features dived under Menus according to
Copyright Infringement their use.
● Imprisonment of between 1 to 3 years and a
fine of between 50,000 to 150,000 for the Ruler Bar
first offense
● Imprisonment of 3 years and 1 day to6 years
plus a fine of 150,000 to 500,000 pesos for
the second offense - Ruler bar is most important to understand. A
● Imprisonment of 6 years and 1 day to 9 rule bar is used to align the document. You
years plus a fine of 500,000 to 1,500,000 for can set margin and paragraph spaces by
third offense using it.
● The offending party will also be ordered to
pay civil damage Scrolling Bar
Fair use
- The act of copying copyrighted materials
done for purposes such as
commenting,criticizing, or parodying work - Scrollbar is used to scroll the page up/down
without permission from the copyright and right/left when page zoom is high or
owner. low.

LESSON 4: ADVANCED WORD Status Bar


PROCESSING SKILL

Microsoft Word - The Status bar showcases page number, total


words, selected words, etc.
It is a word processing application that allows you
to create a variety of documents like letters, flyers,
and reports
HOW TO USE WORD & EXCEL FOR MAIL
MERGE
Microsoft Word Interface
Mail Merge
Title Bar
- Mail merges are one of the quickest ways to ● Envelopes
customize documents like emails, ● Mailing labels
newsletters, and other personalized ● Newsletters
messages. ● Custom catalogs
● Form letters
Two Components of Mail Merge ● And more!
1. Template File HOW TO USE MAIL MERGE IN WORD
AND EXCEL TO SEND LETTERS
- This is the document that you’ll be sending
out — like a letter or an email. It contains The mail merge template is a form letter in
placeholders for the personalization data Microsoft Word and the data file is an Excel
(names, addresses, etc.) that are fetched spreadsheet containing your recipients’ details.
from a data file
A. Creating and formatting your address list
in Microsoft Excel

The first step is creating and formatting your


address list (data file).

1. Step 1

- Open MS Excel

2. Step 2
2. Data File

- This is a data source like a Microsoft Excel


spreadsheet or a Google Sheets file. It
contains the personalized information
(names, addresses, etc.) that will be added to
your template file.

- Click on Blank workbook to open


a blank document in Excel.

Mail merges can be used to create personalized


3. Step 3
messages automatically for documents such as:

● Marketing emails
- Now you can start entering the details of - This is the main document in
your address list into the Excel spreadsheet. your mail merge that will be sent to
- Enter your column headers only in the first each recipient.
row, starting in cell A1
- The column headers in your Excel
spreadsheet must be the same as the
placeholder names you want to use in your
Word template document.
- For example, if the column names in your
Excel sheet are “FirstName,” “LastName,”
and “Email,” the field names in your Word
document will also be “FirstName,”
“LastName,” and “Email.”

.4. Step 4 2. Step 2

- Click on the Mailings tab and select Start


Mail Merge.
- A drop-down menu displaying every
different mail merge document type will
- Enter your contact information as one record
appear.
per row, starting in cell A2.
- You can select the document type for
5. Step 5 letters, emails, envelopes, mailing labels, or
a directory.
Once you’re done creating the contact - Since we’re creating a Word mail merge for
sheet, you can save your Excel document sending letters, choose Letters as your
by pressing the Ctrl+S keys or by going to merge document.
File > Save or File > Save As.

Note – Ensure that all edits to the Excel


spreadsheet are done before starting the mail merge
process. Making edits to an Excel sheet once you’ve
already begun a mail merge is a complicated
additional step.

B. Creating the main document in MS Word

- The next step is to create the form letter


template (your main document) in MS Word.

1. Step 1

- Open a blank document in Word. 3. Step 3


- Write the body of the letter.

C. . Selecting the recipient list

1. Step 1

- Click on the Select Recipients option in the


Mailings tab. A drop-down menu appears,
showing different mail merge list sources. Note – If your Excel spreadsheet has only one
- As your contact information is already worksheet, you’ll only see Sheet1 in the Select
available as an Excel file, click on Use an Table window.
Existing List.
4. Step 4

- If you want to edit your mail merge


recipients list, click on the Edit Recipient
List tab.
- In the Mail Merge Recipients window that
pops-up, clear the checkbox of the person
you don’t want in your mailing list.

2. Step 2

- In the dialog box that pops-up, select the


Excel sheet you created earlier, and click
Open

3. Step 3

- A Select Table window appears. Choose the HOW TO CREATE BULK CERTIFICATES
Excel worksheet you want to merge with the
Step 1
Word template and click OK
- Make a Certificate Lay-out in Microsoft
Word.
Step 2 - To insert a recipient’s address from your
Excel worksheet, click on Address Block
- List of Certificates Recipients in Microsoft from the Write & Insert Fields section. In
Excel with Header the window that appears, choose an address
- Make your Excel File (with names) to your block format of your choice and click OK.
Certificate lay-out. - An address placeholder («AddressBlock»)
will be inserted automatically into your
Step 3
letter
- Insert Merge Field in your Certificate
Layout

Step 4

- Finish and Merge

D. Adding personalized messages


- The next step is to add personalized content,
like contact names and addresses, to your
form letter template (Word document).

In Word, you can insert three personalization


variables into your document:

● Insert Address Block – add a recipient’s


address to your document.
● Insert Greeting Line – include a
personalized greeting or salutation in your
letter. 2. Step 2 – Insert greeting line
● Insert Merge Field – insert other mail
merge fields from your Excel file. - To insert a greeting line, click on Greeting
Line from the Write & Insert fields section.
Note – You can add a personalization variable at In the dialog box that pops up, select the
an insertion point of your choice in the Word format you want to use and click OK.
document. For example, to add a greeting line
before the body of your letter, simply place the
text cursor at the point you want to add it.

1. Step 1 – Insert Address Block


- A greeting placeholder («GreetingLine») - Click on the mail merge fields you want to
will be automatically added to your add to your letter.
document. - This is how my form letter looks after
inserting the placeholders I needed:

Note – You can also use the Match Fields feature


to match your Excel column fields with the Word
placeholders manually. This way, you can ensure
that all the mail merge fields are accurately
3. Step 3 – Insert Merge Field mapped to your Excel column names.

- You can also add other mail merge fields — E. Previewing and finishing the mail merge
like your contact’s first name, company process
name, email id, etc. — from your Excel - After personalizing the form letter for each
worksheet to your Word template. To do recipient, you can preview the letters to see
this, click on Insert Merge Field from the how they look with the data you inserted
Write & Insert fields group. from your Excel worksheet.
- You can see a drop-down list of some mail
merge labels. These labels are the column 1. Step 1
names in your Excel spreadsheet
- Click on Preview Results under the Mailings
tab.

2. Step 2

- To preview the result for each recipient, you


can enter the recipient number (the
corresponding row number in your Excel
spreadsheet) in the text box.

3. Step 3

- After previewing the form letter, click on


Finish & Merge to finish the Word mail
merge process.

From the drop-down list that appears, you can


choose to:
Edit Individual Documents – if you want to edit
each letter further, separately.

Print Documents – if you want to print the letters.

Send Email Messages – if you want to send the


letters as emails

F. Saving the form letter


- After you’ve finished working with the
merged document, you can save it by
pressing the Ctrl+S keys or by going to the
File menu and clicking Save or Save As.

You can also reuse the merged document for


sending additional letters — just open it and click
Yes when Word prompts you with this alert:

You might also like