Download as pdf or txt
Download as pdf or txt
You are on page 1of 124

MODULE OF INSTRUCTION

The Current State of ICT


The world Information and Communications Technology is an ever-
changing landscape. New technologies are constantly being invented
and existing technologies keep on evolving. Improvements in
computing hardware enable the development of better software, which
in turn empower new ICT trends.

In this chapter, you will learn about current ICT concepts and
technologies that affect our everyday lives.

The Internet
As you may already know, the Internet or the World Wide Web is a
massive digital network that is connects billions of electronic devices
all over the planet. Today has many practical applications in business,
education, health care, entertainment, and many other fields.

To have a better appreciation of the current state of the Internet, first


we have to learn a few things about its history.

In a historical point of view, the Internet can be divided into


generations. Each genertion represents the combination of
technologies, trends and ways of thinking that drive the development
of the Internet. For now, there a 3 recognizable generations; Web 1.0,
Web 2.0 and Web 3.0.

It is important to note that these generations do not necessarily


represent periods of time. It is true that Web 1.0 websites were
prevalent during the late 90’s and early 2000’s but they did not entirely
disappear when Web 2.0 websites took over. Elements of an older
generation can still exist in the present and the future. Think of it like
our society, which is composed by people from different generations.

Web 1.0

Web 1.0 is the name given to the first generation of the Internet. It is
the time when most websites were Static. Webpages are usually just
single files in Hypertext Markup Language (html or htm) format that
are displayed in a web browser.

The Current State of ICT


X.X Online Search

Static websites

Websites from the Web 1.0 generation are mostly read-only or static.
The main characteristic of a static web page is that they are delivered
to the users exactly as they are stored. This is because a static web
page is only a single file, normally in html or htm (Hypertext Markup
Language) format, which is saved in a server. The contents of these
files can then be displayed in a user’s web browser when its address is
entered.

A great example of a static website from the Web 1.0 generation is the
website for the 1996 movie Space Jam. You can still view this website
here: http://www.warnerbros.com/archive/spacejam/movie/jam.htm

Notice that this website can only display text and pictures. Its elements
do not change unless its owner or administrator updates it. It is also
important to note the Uniform Resource Locator (URL) or address of
each web page in this website remains the same even if they are
accessed by different people in different locations.

Web 2.0

Web 2.0 represents the second generation of the Internet. Unlike Web
1.0 where users merely audiences or readers who absorb information
from websites, Web 2.0 focuses on user participation. Web 2.0
emphasizes on a give-and-take relationship between a website and its
users. This is accomplished by giving the users the power to share
different types of information such as text, images, sounds, and videos,
This allows for the creation of interactive with more real-life uses like
online banking, online shopping, and media sharing.

2
MODULE OF INSTRUCTION

Dynamic Websites

In contrast with static websites, dynamic websites can change their


appearance and behavior based on the users’ actions.

For example, let’s take a look at google.com. Google search is a


dynamic website, which means that its URL changes depending on the
users location, credentials and search parameters. It also recognizes
different forms of user input like keywords, voice command, and
image upload.

Notice that the address is not in HTML format and it changes


depending on what you searched for.

Social Media

Video lesson: https://youtu.be/YjJeZQWOfw4

One of the biggest elements of Web 2.0, “social media” is a term used
to define applications and websites that people use to make online
social interactions. These social interactions include sharing
information, sending messages and exchanging ideas.

The Current State of ICT


X.X Online Search

Social media relies on users to contribute web contents. For example,


Instagram lets their users upload, manage and promote their own
pictures. Facebook allows users to build their own profiles, share files,
and form online communities. These websites do not develop and
publish their own web content. Instead, they merely provide a platform
for their users to do so.

Youtube’s vast collection of videos are uploaded by users.

Wiki

Derived from the Hawiian work wikiwiki, which means “quick” or


“super fast”, a wiki is a website that allows visitors to add or edit its
contents. Each wiki page is about a single topic that is presented in a
manner similar to an encyclopedia or an educational article. Users with
the proper permissions can edit these pages. To ensure quality,
administrators can check these wikis and determine if the information
contributed by the users is correct and unbiased.

4
MODULE OF INSTRUCTION

Wikis have become popular because of their simplicity and the huge
amount of information that they contain. As you may already know,
Wikipedia is the world’s largest and most popular wiki website. The
English Wikipedia alone has more than 5 million articles. Globally,
there are more than 40 million Wikipedia articles written in 293
languages.
(source: en.wikipedia.org/wiki/Wikipedia:Size_comparisons)

Web 3.0

Some people are already referring to the current generation of the


Internet as Web 3.0.

Web 3.0’s main characteristics include, but are not limited to:
1. Real-time
Events and information are made available to users as they
happen.
2. Ubiquitous
Users are always connected to the Internet.
3. Machine learning
Computers and mobile devices can create data and make
decisions based on the user’s previous actions.

These characteristics may sound familiar because we already use them


today. For example, Facebook recently released a live stream feature
that allows users to broadcast live events. Youtube can now suggest
videos that you might like, based on the videos that you previously
watched.

The Current State of ICT


X.X Online Search

Video lesson: https://youtu.be/oZQd1c3YVuI

Web Applications
Web applications are internet-based programs that are accessed
through web browsers.

Web applications represent the next step in the evolution of the


Internet. Unlike earlier websites with mostly read-only features and
very little user interaction, modern websites offer many different kinds
of services to clients. This opened new opportunities in entertainment,
business and learning.

Most of the websites that we use today are web applications. They
allow us to do more than just reading text in a screen. Youtube, for
example is a web application that is used to upload and watch videos.
Ebay and other online shopping websites are virtual marketplaces
where people can buy and sell items. Social media and Wikis, which
will be further discussed in this chapter, are also web applications.

Web Apps vs Native Apps

Native applications are programs that are directly installed in a


computer or mobile device. Unlike web apps that are accessed through
web browsers, native apps can be run independently in the computer or
device that they are installed in.

Here are some examples of popular native apps and their web app
counterparts:

Type of App Native App Web App


Email Microsoft Outlook Gmail
Text editor Microsoft Word Google Sheets
Photo editor Adobe Photoshop Pixlr
Music streaming Spotify (Mac, PC, or mobile) Spotify Web Player
Social media Facebook (mobile app) Facebook (browser-based)

6
MODULE OF INSTRUCTION

Some developers provide both native and web-based versions of their


apps. The last 2 examples, Spotify and Facebook can both be installed
in mobile apps or accessed through Internet browsers.

Fast facts:
 The mobile apps in your phone are native apps because they
are installed to your phone.
 Facebook games that are played in computers are web-based
apps because they can only be accessed using web browsers

Cloud Computing
Video lesson: https://youtu.be/ae_DKNwK_ms

Cloud computing is the name given to Internet-based networks that are


used to store, manage, and share resources and information. To better
understand this concept, first we need to learn some new terms:

Server, client, and service

A server is a computer that does tasks for other computers. A task that
is done by a server is called a service. The computer that accesses the
services that are provided by a server is called a client.

For example, in a Local Area Network (LAN), a print server tells a


printer to print documents that are sent by client computers. The
clients don’t have direct access to the printer. Instead, they connect to
the server, which then tells the printer to print the documents.

The cloud

First of all, “the cloud” is not an actual cloud. The cloud is a network
of servers that provide different services. For example, one server may
be tasked to collect information from other servers that are tasked to
store them. All these servers work together to provide one unified
service to the client.

The Current State of ICT


X.X Online Search

To get an idea of how big these networks are; Google is estimated to


have over 1 million servers. These servers are housed in centralized
locations called data centers located in seven countries. (source:
www.google.com/about/datacenters/inside/locations)

Many cloud-based services can be used for free and you may alredy be
using some of them for free without knowing it. The most common
examples are social media platforms like Facebook, Twitter, and
Instagram.

There are also cloud-based services that were created for more serious
purposes like business and project management. These services are
commonly offered in a paid subscription basis. Businesses and
organizations have to pay certain amounts to gain access to these
services for a certain period of time.

Benefits of Cloud Computing

1. Reduced Cost

Subscibing to cloud-based services is a lot cheaper than traditional


options such as building your own programs, buying your own
hardware, and hiring more people.

2. Flexibility

Cloud-based services can be upgraded or downgraded to suit the


clients’ need. Subscribers can upgrade their subscriptions to gain
access to bigger data storage, more powerful tools, and exclusive
features. On the other hand, subscribers on a tight budget can
downgrade their subscriptions to reduce their expenses but still get the
necessary services.

3. Mobility

Because cloud-based services rely on the Internet, clients can access


them using computers and mobile devices in different locations. For
example, an employee can save his work in the cloud and access it at
home or on vacation.

4. Better Collaboration

8
MODULE OF INSTRUCTION

The cloud enables people in different location to work on the same


project. A multi-national team can communicate and share information
and resources with one another using cloud based services.

5. Updated Software

Providers of cloud-based services compete with each other in


delivering the best services to clients. Because of this, cloud-based
apps are constantly improved and these improvements are immediately
made available to the clients.

The Current State of ICT


MODULE OF INSTRUCTION

Online Safety and Security

The Internet has become a part of our daily lives. The technology has
become so advanced that the average person can now access vast
amounts of information and communicate with people from all over
the world using devices that can fit in his pocket. In what is called the
Information Age, the Internet has become not only a privilege but also
a necessity for many people.

Information Security
We usually need to submit some personal information in order to gain
access to online sites and services. These personal details are often
required to secure our online activities and transactions. However, in
the wrong hands, our personal information can be used to cause
inconvenience, loss or even harm to us and other people. Here are
some of the most commonly shared personal details, how they can be
used in dishonest and malicious ways and what you can do to secure
them.

Full Name

Almost every app and website with a log-in feature require your full
name. Most of the time, they just ask for it to determine how to
properly address you in emails and personal messages. Some sites, like
Facebook, use it to label your account and online interactions.

What’s the risk?


Your name is probably the most widely known detail about you but it
can still be used in the simplest forms of identity theft. Anyone can use
your full name to sign up and create a fake account. This account can
then be used in ways that may put you in trouble like posting
malicious content or leaving rude comments.

What can I do?


Just like in the real world, you should always be careful of whom you
tell your name to. Online, you can refrain from using your full name
especially in apps and sites where they are not really required.

Online Safety and Security 1


X.X Module Title

Username

A username is an alias that represents your online presence. It


can be your real name or combinations that totally depend on
your creativity. Some apps and websites address you by your
username instead of your full name. In many cases, your
username, along with your password are all that is needed to
log in to your account.

What’s the risk?


In the Internet, your username is as good as your actual name.
Therefore anyone who knows it can start looking for you or
sometimes-even contact you.

What can I do?


Like your real name, do not readily give out your username,
especially with people that you don’t trust. As a precaution,
you can select usernames that do not include your real name.

Password

The password is one of the most important bits of information


in the Internet. Basically, it is a group of characters that, when
paired with your username or email address can unlock your
user account. For this reason, website and app owners have
many ways to keep your password secure.

What’s the risk?


For obvious reasons, hackers take special interest in people’s
passwords. People tend to use similar if not identical passwords
for their online accounts so figuring out the password to one
account may also compromise the others.

What can I do?


There are several steps that you can do to keep your passwords
secure:
1. Do not share your password with ANYONE.
2. Memorize your password. Do not write it down
anywhere.
3. Do not use obvious passwords like important dates or
names of you or your loved ones.
4. Use combinations of uppercase letters, lowercase
letters, numbers and special characters. Some websites

2
MODULE OF INSTRUCTION

require this but it’s a good practice to do so even if it’s


not.
Tip: To prevent yourself from forgetting your
password, use phrases that are easy for you to
remember but hard for others to guess like lines from a
song or movies or phrases that have personal meaning
to you.
5. Do not use the same passwords for different accounts.
Tip: More specifically, do not use the same passwords
for apps that are used for leisure (Facebook, Instagram)
and apps that are used for financial transactions
(Paypal, eBay, online banking)
6. Change your passwords periodically
7. Do not save your password when using public
computers or other people’s device.
Tip: Web browsers commonly give you the option to
save your password when you first log in to some
websites. This feature may be convenient when using
your own computer or mobile device but it can be
dangerous if you accidentally save your password in
someone else’s computer or device especially if it is in
a public place like a library or a computer shop.

Birth Date

Birth dates are mostly required to determine if you are old enough to
access certain contents and features in the Internet. Sometimes, it is
also used in security checks to determine if it is indeed the rightful
owner who is accessing the account since birth dates are not usually
widely known.

What’s the risk?


The birth date, along with other personal details can be used to pass
security checks and hack personal accounts.

What can I do?


For your own protection, observe the age restrictions of online content.
Websites are required by law to add warnings to age-sensitive content
but it is still up to the users to choose whether or not to view them.

Online Safety and Security 3


X.X Module Title

Home Address and Locations

Some online services ask for users’ home address. Some apps
can automatically determine your current location using your
device’s GPS (Global Positioning System) feature. They do
this in order to give you location-specific contents and options.
For example, YouTube determines the user’s location and
suggests videos that are relevant to that area.

What’s the risk?


Carelessly sharing your location or home address can
ultimately compromise your physical security because it will
tell potential criminals where you are. Also, because it is
usually required information in online commerce like online
shopping, your home address can be used in identity theft.

What can I do?


Always check if a website or app requires you to submit your
address or allow them to automatically track you. If it is
required then check the settings if you can hide your address
and current location from other users. If it is not required then
don’t submit it at all.

Phone Numbers

Phone numbers are usually required by many online services in


order to have a direct line to their clients.

What’s the risk?


Home phone and mobile numbers should not be shared
carelessly since anyone who has your phone number has a
direct way to harass, threaten, or inconvenience you.

What can I do?


Because of the sensitivity of this information, very few apps
and websites insist on getting your phone number. Do not
submit your phone number unless it is absolutely necessary.

4
MODULE OF INSTRUCTION

Email Address

Almost every website that has a sign-up feature requires an email


address to confirm the user’s identity.

What’s the risk?


Like phone numbers, your email address is a direct link to you. The
practicality and versatility of emails make it the most used and abused
method of communication in the Internet. The most common forms of
Internet fraud such as spamming and phishing (to be discussed later in
this chapter) are done through emails.

What can I do?


You can create multiple email addresses. You can have dedicated
email address for leisure purposes like online gaming and social
media. This email can then be shared and used to sign up to apps and
websites. On the other hand, you can create another one for formal use
like job applications and schoolwork.

Financial information

This includes bank account names, account numbers, credit card


numbers and security details like pin codes and answers to security
questions. These details, especially the credit card number are used in
online commerce.

What’s the risk?


These details can be used to access your financial accounts. Therefore
anyone who has this information can spend or take the contents of
your bank account or make purchases that will be charged to you.

What can I do?


Treat this information with the same care as you do with your money
because they are as valuable as your money. Don’t do online financial
transactions with suspicious looking websites and merchants. Do a
background check to make sure that the person or website that you are
dealing with is legitimate.

Malware: Online Threats


These are some of the most common types of malicious software or
Malware. Keep in mind that while all of them can spread through the

Online Safety and Security 5


X.X Module Title

Internet, some of them also spread through offline means such as flash
drives and local area networks (LAN)

1. Virus

A virus is a program designed to interfere with your computer, device


or network's normal operation. A virus attaches itself in a program or a
file and like real-life viruses, computer viruses can multiply or make
complete copies of themselves when you copy the program or file that
it is attached to.

What can they do?


Because a virus is a program, it can be programmed to do different
sorts of harm to your system. It can slow down your device or
computer or network’s speed by running unwanted processes or it can
fill your computer’s memory with unwanted files. In the worst cases, a
virus can overload servers and cause entire networks to shut down.

How do they spread?


A computer virus can spread whenever a computer makes contact with
another computer. It can spread in a network like LAN or the Internet
or through indirect means like infecting a flash drive or a DVD. Keep
in mind that a virus relies on human action to spread. It is, therefore,
possible to have a virus in your computer and still be uninfected unless
your open the file or program that it is attached to.

2. Worm

A worm is considered as a type of virus. Like a virus, it can make


copies of itself in computers that it comes in contact with.

What can they do?


Like a virus, a worm can harm your system in different ways which
can range from minor annoyances like hiding your icons or major
damage like destroying your files or causing your computer to shut
down on it’s own.

How do they spread?


The main difference between viruses and worms is that worms don’t
rely on human action to propagate. A worm will automatically spread
and copy itself.

6
MODULE OF INSTRUCTION

3. Trojan

A Trojan Horse or simply a Trojan is a type of malware that disguises


itself as a useful and/or harmless program or file. Named after the
fictional wooden horse used by the Greeks to defeat Troy, a Trojan’s
goal is to get through your computer’s security features and cause
harm once it’s in.

What can they do?


Like a virus, a Trojan can damage your computer or system in
different ways, which include but are not limited to deleting, copying
and altering files. It can also cause harm slowing down system
performance.

How do they spread?


Unlike worms, Trojans cannot create copies of themselves. Instead,
they pose as harmless files or programs such as pictures or videos and
rely on people to send, copy, and download them.

4. Spam

A spam is an unwanted and unsolicited message/email.

What can they do?


Spam emails are usually just promotions to sites and services. Though
not normally harmful, large amounts or spam emails are annoying and
can use up your memory space. It is not uncommon to have hundreds
or even thousands of spam in your email address. In the worst of cases,
viruses can also be attached to spam emails.

How do they spread?


People who spread spam or Spammers collect emails using several
methods. The easiest way is to simply guess email addresses though
this process can be automated using programs. They can use programs
that search web pages for email addresses or by hacking mailing lists.
It is also known that some dishonest website owners sell list of their
subscribers’ emails to spammers.

5. Adware

Online Safety and Security 7


X.X Module Title

And adware is a type of malware that launches unwanted


advertisements in your Internet browser or your desktop

What can they do?


Other than being majorly bothersome, adware programs can cause
your system to slow down because they initialize automatically and
remain running in the background.

How do they spread?


Adwares are usually included in the installers of other programs or
browser add-ons. Installing these programs and add-ons will also cause
the adware to be installed.

6. Phishing

Derived from the word “fishing”, phishing is the fraudulent practice of


stealing important information from users such as passwords, pin
codes and credit card numbers.

What can they do?


Information stolen via phishing can be used in identity theft and
stealing money. For example, someone can use stolen credit card
details for purchasing items, which will then be charged to the real
account holder.

How do they spread?


Phishing is done by tricking people into submitting their personal
details. It can be done by sending emails and offers that imitate
legitimate businesses like banks and credible websites.

How to Avoid Malware


The risk of falling victim to malware will always be present as long as
mankind uses interconnected digital devices. However, there are
precautions that can be taken to minimize this risk.

1. Install an anti-virus program

An anti-virus program can detect and delete virus in your computer. It


can also block malware before they infect your system. Many trusted
anti-virus companies give out free versions of their products. Try them
and find one that suits your needs.

8
MODULE OF INSTRUCTION

2. Do not submit your email address to suspicious looking


websites

You don’t have to sign up every time you are asked to. To avoid
getting spam, weigh the benefits of signing up against the risk of
compromising your email address.

3. Don’t fall for obvious tricks

Fake prizes are probably the bread and butter of online scams. When
you receive an email or see a pop-up that says you’ve won something,
you can almost always be sure that it’s not true. As a rule, do not
believe anyone who tells you that you won a prize for a contest that
you didn’t join.

4. Don’t open spam emails

Spam emails are normally obvious. Delete these emails immediately


and block the sender.

5. Do not click suspicious looking links

If you see a link that promises a prize or offers something that s too
good to be true, like a free iPad or ways to get free Internet access, it
may direct you to a website that has malware. As a rule, do not trust
any ad or message that says you’ve won something in a contest that
you did not join.

6. Read before you install.

Sometimes even legitimate and useful programs come with unwanted


“freebies”. These so called freebies are often small programs that may
alter your computer’s settings or automatically subscribe you to
unwanted services and newsletters. Read through the installation steps
to see if another program will be installed. There is usually an option
to leave out the freebies and install only the main program.

7. Do not download pirated contents

Online Safety and Security 9


X.X Module Title

Because pirated files and software are unregulated, they tend to be a


breeding ground for malware. Also, piracy is against the law. (to be
discussed in the next chapter)

8. Install an ad-blocker

Ad-blockers are browser add-ons that prevent ads from being


displayed in your browser. Most ad-blockers are free.

10
MODULE OF INSTRUCTION

Netiquette

What is Netiquette?
Netiquette, which is short for “Network Etiquette”, is the name given
to the set of rules and guidelines about how to properly behave online.

Formal Netiquette
Netiquette can be formal or informal. Formal Netiquette involves a
strict set of rules that are imposed by online groups like message
boards, chat rooms and social media sites.

The most common rules imposed in online communities are intended


to prevent actions and practices that are disruptive or harmful to other
users and the community in general. The following are examples of
such actions:

1. Foul language

This is a common rule in formal settings such as corporate and


academic websites. Like in real life, foul language is frowned
upon in such environments.

2. Spamming

As we learned in the previous chapter, a spam is an unwanted


and unsolicited message or email. Spamming is banned in most
chat rooms and forums because it takes up a lot of space and is
annoying to other users.

3. Bullying

Netiquette 1
X.X Module Title

Recently, a lot of attention has been given to the act of bullying


and how to prevent it. Bullying is the use of strength or power
to intimidate someone into doing something that he does not
want or to make him feel bad. Cyberbullying is bullying that
is done using electronic technology.

4. Trolling

A troll is an unruly member who deliberately breaks the rules


of an online community. The most common acts of trolling
include posting inappropriate or banned contents, posting off
topic messages, and leaving sarcastic comments. These actions
are intended to disrupt the normal operation of online
communities.

5. Sock puppets

“Sock puppets” is the term used to refer to multiple accounts


that are used by the same person. Trolls use sock puppet
accounts to pose as different persons in order to advance their
agendas.

6. Flame Wars

Online discussions or “threads” may get out of hand when the


users who disagree with each other start getting emotional.
They may then post insults or threats against each other. This
incident is called a “flame war” Flame wars are harmful to
online communities because they cause a decline in the quality
of the topics that are being discussed. If allowed to persist, this
may destroy the integrity of the group as a whole.

Breaking these rules may result in a warning from website or group


administrators. An administrator or admin is a member who is tasked
with monitoring activity and imposing the rules. Admins usually have
the power to “kick” or revoke the membership of users who break the
rules and to delete posts that are deemed inappropriate.

2
MODULE OF INSTRUCTION

Plagiarism

Plagiarism is the practice of using someone else’s work as if it is


yours. It is quite common in the Internet because online information is
easy to locate and copy. In most cases, it occurs when someone uses a
quote or a part of a published work without mentioning who originally
wrote it and which publication it belongs to. Plagiarism is considered
as a fraudulent act and can be punishable by law.

Piracy

Piracy is the act of reproducing and distributing materials without the


owner’s consent. It is harmful because it denies the rightful owners the
proper compensation for their work. Ultimately, rampant piracy can
cause a stop in the production of original works because owners and
publishers will no longer have enough income to fund future projects.
Here are the most common types of piracy of copyright-protected
materials based on UNESCO’s World Anti-Piracy Observatory
(http://portal.unesco.org)

 Books

“Any unauthorised use of a copyrighted work, such as a book,


school manual, journal article or sheet music, represents an
infringement of copyright or a case of copyright piracy, unless
covered by a copyright exception. Piracy of printed works
affects both paper copies and works in digital format.”

 Music

“Music piracy includes both traditional unlawful use of music


and unauthorised use of music on on-line communication
networks.”

 Bootlegging is the unauthorized recording and


distribution of a live or broadcast performance.

 Counterfeiting is the “unauthorised copying of


the material support, labels, artwork and
packaging”

Netiquette 3
X.X Module Title

 Film

Movies and TV shows are pirated either physically by making


and selling hard copies or virtually by distributing unlicensed
copies online. Making copyrighted materials available for
online viewing or streaming without the owner’s permission is
also an act of piracy.

 Software

Commercial software such as productivity tools and games are


also counterfeited by making and selling physical copies such
as DVD’s but the most common form of software piracy is still
unauthorized online redistribution.

Copyright

All the forms of piracy mentioned above are violations of copyright.


Copyright is the legal right to own an original work. Copyright laws
may differ in every country but in all cases, they govern the use and
distributions of original works such as music, film, literature and
drawings.

In the Philippines, the REPUBLIC ACT NO. 8293, also known as the
Intellectual Property Code of the Philippines or IP Code, protects
intellectual property. The IP Code lists 15 types of works that are
covered by copyright protection. This includes books, musical
compositions, drawings, and photographic works. (Source:
ipophil.gov.ph)

Informal Netiquette
Informal Netiquette is a lot like real-world etiquette. These are
guidelines that may not be imposed by law but are expected to be
followed by everyone. Many real-life etiquettes apply online. They are
usually simple common-sense actions that make social interaction

4
MODULE OF INSTRUCTION

pleasant for everyone involved. Here are some of the most useful
netiquettes that we can follow.

1. The Golden Rule

“Do unto others as you would have them do unto you.” This
saying seems to apply in any form of human interaction. Even
in the Internet, it is still a good practice to treat others with the
same fairness and respect that we expect to receive.

2. Act as you would in real life.

It is easy to be disrespectful online because there is no threat of


physical confrontation. Acting as if you are talking face to face
with the other person will keep you grounded and levelheaded
in your online interactions

3. Know where you are and act accordingly.

Like in real-life, our online conduct may vary from place to


place. Most online environments like social media and
recreational forums tend to be casual. In these environments,
informal speech and some teasing are considered normal.
However there are also formal environments like government
portals and university websites. In these settings, be sure to use
proper language and act courteously.

4. Respect people’s privacy.

Privacy is probably a bigger deal in the Internet than it is in the


real world mainly because it is easier to invade someone’s
privacy online. Avoid communicating with people in ways that
are intrusive or overly demanding.

5. Respect other people’s properties

Netiquette 5
X.X Module Title

The Internet is a freeway of information but information is not


always free. Many online contents like music, videos and
writings are regarded as intellectual properties of their creators.
Like real-world properties, there are rules that govern the use,
sharing and reproduction of these contents. Illegally copying or
taking credit for someone else’s intellectual property is against
the law.

Mobile Device Etiquette


Mobile devices such as smart phones and tablets have become parts of
our daily lives. These handy gadgets have many useful features such as
Internet access, playing music, videos and games, taking pictures and
videos and of course making and receiving calls and texts. Their
compact and lightweight designs enable us to use them practically
anywhere. Mobile devices have certainly improved modern living.

However, using mobile devices also have negative effects. Listed


below are the practices that may lead to these negative effects and how
we can minimize or eliminate them:

1. Talking too loudly on your phone

If you talk too loudly on your phone in public places like


buses, streets, and restaurants, you may be disturbing to the
people around you.

The solution:

Speak softly. If the line is choppy and if the other part can’t
properly hear you, use other means of communication like
texting or email instead of raising your voice.

2. Making long phone calls

Like raising your voice in public, talking too much on your


phone can also be annoying to people who overhear your
conversation. It can also be bothersome to the person you are
talking to.

The solution:

6
MODULE OF INSTRUCTION

Keep your phone calls short and concise. Avoid small talk and
gossiping when making or taking calls in public places

3. Putting the other party on loud speaker

Although it is sometimes necessary when you can’t properly


hear the other party, putting him or her on speakerphone adds
more unwelcomed sounds to your conversation. Others also
often see it as vulgar and impolite.

The solution:

Earphones. Most mobile devices come with free earphones.


Use one if you have trouble hearing the person you are talking
to.

4. Using loud or annoying ring tones/notification sounds

While it is important to be notified when someone calls or


sends you a message, phone rings can sometimes be
unnecessarily loud. Also, people sometimes use notification
sounds that can be irritating or even unsettling to others such as
animal sounds, sirens or even gunshots.

The solution:

Normally, less than half of your phone’s full volume is enough


to hear it ring through your pocket or bag. If you put it in your
pocket most of the time, just set it to vibrate.

5. Playing music, videos, and games too loudly

We usually do these things to pass time and entertain ourselves


in public places. However it may cause frustration to the
people around you if you play music or watch videos in full
volume. Sound effects of games tend to be sharp and surprising
and can therefore be irritating to others.

The solution:

Netiquette 7
X.X Module Title

Again, earphones will do the trick. Plug in and enjoy your


music, videos, or games in private.

6. Taking pictures or videos of live performances

This is a bad idea for 3 reasons. First, because you usually have
to raise your phone above your head to get a good shot of the
performance, you may be blocking the view of the people
behind you. Secondly, some artists do not want people to take
unauthorized pictures of their shows. Lastly, focusing on
capturing the moment on camera will cause you to miss the
enjoyment of watching it live without distractions.

The solution:

If you really want to take a video or a picture of a show, keep it


short and subtle. Make sure that doing so does not spoil the
experience for you and others.

7. Using your phone in cinemas

The light coming out of your device is intrusive and


bothersome to the other members of the audience. More
importantly, using your phone in a movie theatre may give the
impression that you are taking a video of the movie, which is
against the law.

The Solution

Refrain from using your phone in side movie theaters. Most of


all do not take pictures and videos of the movie being shown.

8. Taking pictures and videos without asking permission

Taking pictures and videos of other people and their properties


such as vehicles and pets may not be against the law but it can
be seen as unethical and rude.

The solution

8
MODULE OF INSTRUCTION

As a sign of respect, always ask for permission before taking


pictures of people and their property.

9. Using your mobile device while waiting in line

Though this is not always a bad thing to do, staring at your


phone while queuing can be distracting and may cause you to
hold up the line and be an inconvenience to others.

The solution:

It is okay to use your phone while waiting in line but make sure
to stay alert so you can readily react to people and things
around you.

10. Using your mobile device while driving

Not only is it dangerous for obvious reasons, it is also illegal.

The solution:

Don’t do it.

11. Using your mobile device while walking

Like when driving, looking at your mobile device while


walking will certainly cause you to bump into people or get hit
by traffic. It may also cause you to walk slower and get in the
way of other people

The solution:

Avoid doing this as much as you can. If you absolutely have to


check your phone while walking in a crowded place, stop in a
place where you won’t get in the way of people or traffic.

12. Wearing earphones/headphones while walking.

Netiquette 9
X.X Module Title

This may seem like a common and harmless thing to do but the
sound coming from your earphones can impede your ability to
hear and act on signs of danger such as car horns, and
machinery and traffic sounds.

The solution:

When walking in streets, sidewalks, and other crowded places,


avoid using earphones that completely block your hearing.

13. Using your mobile device in social gatherings and


important events

Using your phone or tablet for extended periods of time while


in situations like group lunches, ceremonies and class
discussions is considered rude and inconsiderate because of
two main reasons. The first reason is that it takes your attention
away from the conversation or discussion. Secondly, it gives
the impression that you are not interested in the event and the
people involved.

The solution:

Excuse yourself and step away from the event or gathering if


you have to check your phone. In more formal settings like
meetings and classrooms, always ask for permission when you
have to answer calls or check your phone.

10
MODULE OF INSTRUCTION

Online Search
The need to locate electronic information has been around since the
invention of electronic computing. After the Internet was made
available to the public in 1990, this need started to become bigger as
the amount of information available online increased. Today, in what
is being called The Information Age, the ability to search for
information in the Internet has become one of the most useful skills.

Web Search Engines


The majority of online searches today are done using web search
engines. A web search engines is a single program or a system of
programs designed to look for information in the Internet based on the
user’s search requirements. The most popular examples of web search
engines are Google, Bing, Yahoo and Ask.

In this chapter we will be exploring Google, currently the most popular


search engine which hosts 69.89% of all online searches as of May
2016 (source: netmarketshare.com)

Basic Search

The most common way of making a web search is by using keywords.


To start searching using Google, go to google.com using your web
browser. You will be taken to Google’s main page, which varies from
country to country. In the Philippines, for example, it is
google.com.ph.

Online Search 1
X.X Online Search

Another way to start an online search is to use your web browser’s


search feature. Popular browsers have a search feature in which they
connect to a particular search engine whenever the user types
keywords in their address bar or search bar. You will have to go to
your browser’s settings in order to choose which search engine your
browser connects to. Here are the most commonly used web browsers
and how to use their search features.

Google Chrome

For obvious reasons, Google Chrome connects to Google Search by


default. To do a web search:
1. Open Google Chrome
2. Type a keyword in the Address Bar
3. Next, you can either:
a. Press the Enter button
OR
b. Click one of the suggestions that appear below your
keyword(s)

4. You will be directed to the Google search results page. From


there you can choose from several search results.

Tip: Most mouse wheels can be pressed just like a button. Clicking
on a search result using the mouse wheel will open the link in a
new tab. Do this to open several results at once.

2
MODULE OF INSTRUCTION

Mozilla Firefox

You can search using Mozilla Firefox by entering your keyword in


either the address bar or the search bar (located in the upper right side
right beside the address bar)

If using the address bar:


1. Type your search keyword(s) in the address bar
2. Press the Enter button

If using the search bar:


1. Type your search keyword(s) in the search bar
2. You can either:
a. Press the Enter button
b. Click the arrow button beside the text box
c. Click one of the suggestions that appear below your
keyword(s)

Safari

Apple’s Safari web browser’s address bar also doubles as the search
bar. Simply type your search keyword(s) in the address bar and press
Enter or click one of the suggested results.

Online Search 3
X.X Online Search

Tips on conducting online research


(Source RBS Empowerment Technologies, First Edition 2016)
1. Have a question in mind.
First of all, think of a question and make it your goal to find the
answer to it. You do not necessarily have to type the whole
question in the search engine. Just keep your qestion in mind as
a guide to your search.

2. Narrow it down.
Keep your queries specific. For example, if your are searching
for instructions on how to use Adobe Photoshop, you can type
“adobe photoshop instructions” or “how to photoshop”
otherwise, if you just search for “photoshop”, you will end up
be shown a wide range of results such as sites selling the
software, its official website and its social media accounts.

3. Advanced Search
The most pospular search engines such as Yahoo, Bing and
Goodle have advanced search features in which you can make
complex searches. Using advanced search, you can use
multiple keywords and entire phrases and narrow down your
search by selecting language, region, date, and file type.

Google Advanced Search


To use Google’s advanced search feature:
1. Go to the web address.
Website: https://www.google.com/advanced_search
Images: http://www.google.com/advanced_image_search
2. Enter your search terms in the “Find pages with...” section.
3. Use the filters in “Then narrow your results by...” section.
4. Click the Advanced Search button

4
MODULE OF INSTRUCTION

4. Look for a credible source.


It is important to determine whether the source of the
information is credible or not. Because the Internet is the
biggest source of information in the world, some of this
information is not always accurate or updated. Here are some
factors to consider:
a. The author. Does the article say who the author is? If so,
you can do a little background check on him/her to know if
he/she is a credible writer.

b. The article’s purpose. Why was the article written? Was it


written to share information or does it have a different
agenda? Some articles may have been written as a
promotion for a product or service. For example, an article
may look like a guide on how to repair your computer but
are actually promotional material for a store that sells
computer parts. Look for signs of commercial interest such
as mentioning brand names or recommending specific
products.

c. Publication date. Knowing the article’s publication date is


important especially if you are searching for fast-changing
matters such as statistics, technology, and current events.
An old article may have been accurate back when it was
published but it may already be outdated by time you read
it.

d. Top-level domain. The TLD is a segment of the domain


name. Identifying it can give you a lot about the website
that you are visiting. Here are the most common TLD’s:

 .com
Derived from the word commercial, .com was initially
created for business entities. Today, it is the most common
TLD and can be used by anyone.

Can I trust it?


Because .com websites are the most common in the
Internet, it falls on you, the user, to determing whether the
information found in these sites can be trusted.

 .net
From the word network, .net was originally intended for
networks such as internet service providers. This
restriction was not strictly enforced and .net became a

Online Search 5
X.X Online Search

common TLD but it is still preferred by network-related


entities.

Can I trust it?


Like .com, .net websites can now be purchased and used
by anyone. Exercise caution when using information from
these sites.

 .org
Short for organization, this TLD was intended for non-
profit entities such as online communities, open-source
(non-commercial) projects and non-profit organizations.

Can I trust it?


The .org domain is popular among non profit organizations
so it can be a good source of non-commercial information.
However, being a .org website does not guarantee
information integrity or quality.

Wikipedia, the most popular .org website, is an open-


source encyclopedia. This means that the information in
this website can be edited by anyone. While Wikipedia is
still a good source of general information, it is not
normally accepted as a valid source for formal and
important matters such as school, science and health.
However, Wikipedia and other open-source websites
usually provide a list of references at the end of their
articles. Explore these lists to see if the articles have
reliable sources.

 .gov
Derived from government, .gov is restricted to government
entities.

Can I trust it?


Yes. These websites are good sources of information because
they are from government institutions that oversee their
particular fields. For example, http://www.doh.gov.ph/ is the
official website of the Department of Health which oversees all
the matters of public health in the country. Websites like these
are a great source of official information such as policies,
bulletins, and advisories.

6
MODULE OF INSTRUCTION

 .info
The name for this TLD is derived from the word information.
However, it is similar to .com and .net in the sense that it can be
used by anyone

Can I trust it?


Although the name itself sounds official and trustworthy, .info
websites are not guaranteed to provide credible information.
Exercise the same caution as you do for .com and .net websites
when searching these sites for information.

 .edu
Derived from the word education, this TLD is reserved for
education-related institutions.

Can I trust it?


Websites that use .edu domains are almost always the
official websites of the educational institutions that they
represent. They are a good source of official information
about these schools and universities.

5. Give credit
Giving credit to the source of the information that you use is
important because of these particular reasons:

 To avoid plagiarism
 It gives credibility to the information
 It is a sign of respect to the author

To properly cite an online source you have to mention the


following:

 The name of the author or the organization that owns that


article
 The title of the article
 The article’s address or URL
 Date when you last viewed the article

Examples:

“Goldfish Care: How to take care of goldfish.” The Goldfish Tank.


http://thegoldfishtank.com/how-to-take-care-of-goldfish/. Viewed on
June 10, 2016.

Lesa Snider. “Edit your first photo in Photoshop”. Adobe Support.

Online Search 7
X.X Online Search

https://helpx.adobe.com/photoshop/how-to/photo-editor.html. Viewed
on June 10, 2016.

8
MODULE OF INSTRUCTION

Applied Productivity Tools

In the previous chapters, we discussed how Information and


Communications Technology affects our everyday lives. We learned
how ICT has changed the way we learn, play, and communicate with
one another. Now, in this chapter, we are going to learn about more
practical uses of ICT, particularly how it can help us with the not so
exciting task of paperwork.

Paperwork is something that we all have to deal with at least once in


our lives. Lists, letters, bookkeeping, accounting; these tasks may not
be considered enjoyable but someone has to do them and sometimes,
that someone happens to be you. Fortunately, today, we rarely have to
these things manually. For decades now, we’ve been using computers
to do tasks that would take a lot longer if done by hand. In this chapter
we will be learning how to do some of these tasks using programs
called productivity tools.

Productivity software or productivity tools are programs that are used


to create new information such as text documents, charts, graphs,
tables and presentations. Here are some of the most commonly used
types of productivity tools:

1. Word Processor
A word processor is a program that is used to create, view, edit,
and print documents. Think of it a digital version of a
typewriter.

2. Spreadsheet
A spreadsheet is an application tool that store, organize, and
calculate data in tables. They are used primarily used in
recordkeeping tasks and accounting.

3. Presentation program
As the name implies, a presentation program is used to design
presentations in the form of slide shows.

4. Database management system (DBMS)


A DBMS is a software tool for creating, editing, and managing
collections of informations called databases.

5. Graphics suite

Applied Productivity Tools 1


X.X Applied Productivity Tools

A graphics suite is a group of programs that are used to view,


manipulate, and print computer graphics. Popular examples are
Corel and Adobe, which includes Photoshop.

These productivity tools and others like them normally come in


software bundles called office productivity suites. The idea is to make
the most commonly used productivity tools available to the public as a
single product with uniform designs and controls so they are easier to
purchase, learn and use. Because they come in a suite, these
productivity tools can be installed all at once.

LibreOffice

In this chapter, we will be using LibreOffice, an open-source office


productivity suite. Open-source means it was developed through the
collaboration of a public community of developers and can be altered,
improved, and distributed by anyone. Open source programs like
LibreOffice are usually non-commercial and free to use.

Download and Installation

Source: www.libreoffice.org/get-help/install-howto/windows

To download LibreOffice, go to their official website in libreoffice.org


and look for the download link. For personal use, download
LibreOffice Fresh, the LibreOffice version that has the latest features.

2
MODULE OF INSTRUCTION

Once the installer has been downloaded, double-click it to start the


installation process. During installation, you will be given options to
customize LibreOffice to fit your needs. You can choose which
features you want to install, what language the applications will use,
etc. For a step-by step guide, follow the instructions here:
www.libreoffice.org/get-help/install-howto/windows

Mail Merge
Now that you have LibreOffice installed and ready to use, it’s time to
learn some tasks that we can do with it. First off, we will learn about
mail merge. Mail merge is the process of adding information from a
database to a document.

Mail merge can be used to create documents that have pretty much the
same content but have different specific details. For example, if you
have to send letters with the same message to different people, you can
use mail merge to collect the names of the receipients from a list and
create a letter for each of them. This is a lot easier then having copy
the letter over and over again and typing the names one by one.

For this lesson, we will be using mail merge to create ID cards.


Imagine that your school org is organizing a convention, which will be
attended by hundreds students from different campuses. To avoid
awkward introduction, you’ve been tasked to create ID cards for each
attendee. Each ID card will have the person’s name, nickname, school,
organization and position. Now remember, we’re expecting hundreds
of people so we can’t just type each ID one by one.

The document

The first thing that we have to do is design the ID card. We will be


doing this using Writer, LibreOffice’s word processor application. To
access Writer and other LibreOffice productivity tools, open
LibreOffice in your desktop or Stert Menu. You will see the home
screen with a list of actions and tools on the left side.

Applied Productivity Tools 3


X.X Applied Productivity Tools

Click Writer Document. This will open a blank text document. Notice
that it looks a lot like Microsoft Word. The two office productivity
suites have many similar features so if you are familiar with MS
Office, you won’t have a hard time learning LibreOffice.

Feel free to use your imagination to come up with an interesting


design. Just remember to leave space for the information that we will
be adding.

4
MODULE OF INSTRUCTION

The Spreadsheet

The details that we will be adding to the ID’s will come from a
database, to do this, first we need a spreadsheet containing all the
details. Create one using Calc, which can also be accessed from the
LibreOffice home screen. Calc is a lot like Microsoft Excel and adding
rows of information is practical and easy to do. Once you’ve entered
all the information, save your file, which should look a lot like this:

The Database

We will then use this spreadsheet to create a database. To do this, open


Database, which is also in the LibreOffice home screen. A Database
Wizard will open.

Applied Productivity Tools 5


X.X Applied Productivity Tools

Follow these steps:


1. Click “Connect to an exising database” then click the list
button and select Spreadsheet. After that, click Next>>
2. Click Browse and look for the spreadsheet that you have
created then double-click it. Click Next>>
3. In the 3rd step, do not change any of the default settings.
Simply click Finish.
4. Name your database and click Save.
5. Once saved, the database will automatically open. To check if
the information was properly imported, double-click Sheet 1. A
table that is identical to your spreadsheet should open. You can
close the database after you have checked it.

Merging

Now that we have all the files that we need, we can proceed with the
merging. This is a little tricky so please follow these steps so you
won’t get confused:

1. In the text document, Click View then Datasources. This will


open all the registered databases.
2. In the list, double-click the name of our database. Double click
Tables then double-click Sheet1. This will open your table.

6
MODULE OF INSTRUCTION

3. Click and drag each column into the space where you want
them to be displayed. Don’t forget to delete the placeholders
that you used.

4. Once you’re satisfied with the design, click File then Print. A
message saying “Your document contains address database
fields. Do you want to print a form letter?” will appear. Click
Yes.
5. In the window that will appear, Click File under Output. Then
click OK.

Applied Productivity Tools 7


X.X Applied Productivity Tools

6. Name your file. If you want to open it using Microsoft Word,


select “Microsoft Word 2007-2013” in File Type. Once you’re
done, click Save.
7. Go to the folder where you saved your file and open it. You
may want to make changes to your design. To saveyour
changes, repeat steps 4 to 6

Spreadsheet formulas
In this part of the lesson, we will learn how to use LibreOffice Calc in
making mathematical calculations. This is useful in bookkeeping and
accounting tasks.

Before we go ahead and make calculations, first, we have to get


familiarized with the parts of a spreadsheet program, particularly
LibreOffice Calc.

Parts of a spreadsheet

Toolbars

The sets of icons on the top part of the page are called toolbars. You
may have noticed that these are present in most LibreOffice tools as
well as tools made by other companies like Microsoft Office. Each
icon in the toolbars has a different function such as changing font style
and size, printing, saving your document and zooming in and out.
Toolbars can be moved in different areas of the page but as beginners,
it is advisable to leave them in their original place to avoid confusion.

8
MODULE OF INSTRUCTION

Formula Bar

The section below the toolbars is called the formula bar. The textbox
in the right side is called the Input Line. Later we will learn how it is
integral to adding formulas.

Cell - Each box in the table is called a cell. Each cell is named after the
combination of the Row and Collumn that they belong to. For
example, the upper-left-most cell is A1. The cell below it is A2 and the
one beside is is B1.

Collumns – The vertical groupings of cells marked by letters are called


collumns. They are used to group different categories of data in a
table. For example, in the spreadsheet that we created on the first part
of this lesson, Name, Nickname, School, etc are collumns.

Rows – Each horizontal group of cells marked by a number is called a


row. Cells that belong in a row normaly belong to a single entry in the
spreasheet. In our previous activity, all the information that are
included in each ID that we created belongs to an individual row in the
spreadsheet.

Formula

A formula is a mathematical equation that can be applied to one or


multiple cells. Formulas can use data from it’s own cell and other cells
to come up with a result. To add a formula to a cell, select the cell and
type the formula in the formula bar. Here re the most common
formulas used in Calc:

Basic operations
Use these signs to perform basic operations:
 + for Addition
 - for subtraction

Applied Productivity Tools 9


X.X Applied Productivity Tools

 * for multiplication
 / for division

In the following examples, the results of several formulas are


displayed in Cell C2

=A2+B2

=B2/A2

=B2-20

=B2*A2+A3

In the last example, we used two different operations. You can make
complex formulas in Calc as long as you follow the proper
composition.

=SUM(B2:B6)

10
MODULE OF INSTRUCTION

This formula calculates the sum of cells B2 to B6. You can also
calculate the sum of multiple non-consequtive cells by adding a
comma (,) between them instead of a colon (:)

To learn more about Calc formulas, visit LibreOffice’s tutorial article


here: https://help.libreoffice.org/Calc/Calculating_With_Formulas

Spreadsheet Activity: Savings Tracker

In this activity, you will create a spreadsheet that will help you record
and calculate your weekly savings. We’ll call it the Savings Tracker.

Features:
 Lets you set a goal or how much you want to save
 Automatically computes total allowance, total savings, and
total spendings for the year.
 Automatically displays your progress in percentage

Applied Productivity Tools 11


X.X Applied Productivity Tools

Instructions:
1. Like the example above, create the following labels:
a. Goal for 2016 (A1)
b. Total Allowance (A2)
c. Total Spendings (A3)
d. Total Savings (A4)
e. Balance (A5)
f. Progress (A6)
2. In the cell beside Goal for 2016, input how much money you
want to save for the year. Make it realistic.
3. Select the rows right next to the first 5 labels (B1 to B5) then
click the dropdown button beside the Dollar sign on the
uppermost toolbar. In the list, look for and select the peso sign.
This will format the cells as currency.

4. In the 8th row, add the following labels:


a. Week (A8)
b. Start Date (B8)
c. Allowance (C8)
d. Savings (D8)
5. Right below Start Date, select B9 to B80

Right-click the selected cells and click Format Cells. In the


Numbers tab, select Date under Category. In Format, select a
display style. Click OK once you’re done.

12
MODULE OF INSTRUCTION

6. Select the rows below Allowance and Savings (C9 to C80, D9


to D80) and set their format as Peso currency, just like what
you did in Step 2.
7. To add the formulas, select the cells beside the following labels
and enter the corresponding formulas:
a. Total Allowance
Formula: =SUM(C9:C80)
Purpose: Displays the sum of the Allowance column

b. Total Savings
Formula: =SUM(D9:D80)
Purpose: Displays the sum of the Savings column

c. Total Spendings
Formula: =B2-B3
Purpose: Displays the difference of Total allowance and
Total Savings

d. Balance
Formula: =B1-B3
Purpose: Displays the remainder of the Goal after
Savings has been subtracted

e. Progress
Formula: =B3/B1
Purpose: The percentage of the Total Savings divided
by the Goal. To change its format, select the cell and
click the % icon beside the Dollar sign in the toolbar.

Applied Productivity Tools 13


X.X Applied Productivity Tools

8. Now, to check if you’ve set the formulas correctly, enter some


data to simulate a couple of weeks and check if the fields show
correct results.

14
MODULE OF INSTRUCTION

Email

As the name implies, electronic mail or emails are messages that are
transmitted through computer networks.

Why use email?

The email has become the successor of the traditional postal mail or
snail mail. Unlike the old-fashioned snail mail, emails are purely
electronic, meaning they do not have a physical form. This makes
email more efficient and more practical. It can be sent and received
instantly. Modern emails can contain large amounts of information.
For example, a hundred-page document can be attached to just one
email. Furthermore, emails are better for the environment because they
do not need to be printed in paper and delivered by hand.

The Email Address


An email address is a unique name that represents a destination where
emails can be delivered to and sent from. Just like in the real-world
postal system, people who want to send you letters need to know your
address. On the other hand, when you send a letter, you have to
include your address so that the receiver will know where to send a
reply. The email address functions as your home address in the World
Wide Web.

Today the email address is one of the most important personal


information that a person can have. Besides being a destination for
emails, the email address is also used to represent the identity of its
owner. Almost all forms of online registration require an email
address. (See chapter Online Safety and Security)

Parts of an Email Address

An email address is composed of 2 parts separated by @ or the “at


sign”. To illustrate these parts, we will be using this sample email
“myname@website.com”

Emails 1
X.X Emails

1. Local part

The part to the left of the @ sign is called the local part. This is the
part of the email address that is chosen by you, the owner. It has to be
unique and has to follow certain naming rules (to be discussed later in
this chapter). In our example the local part is myname

2. Domain part

The part on the right of the @ sign is called the domain part. It is the
domain name of the website that provides you the emailing service.
Unlike the local part, you cannot personalize the domain part. In our
example, the domain part is website.com.

How to Create an Email Address

An email address can be created in minutes. For this lesson, we will be


creating an email address using Gmail, a free email service owned and
operated by Google. (source: support.google.com)

Step 1: Go to Google’s sign-up page.

In your Internet browser, type accounts.google.com/SignUp and press


Enter

Figure 1 Create your Google Account

2
MODULE OF INSTRUCTION

Step 2. Enter your information

In the signup page, you will be asked to enter some personal details.
Some of them are required while some of them are not.

Required:

 Name (first name and last name)


 Username
 Password (needs to be entered twice for confirmation)
 Birthday
 Gender
 CAPTCHA
 Terms of Service and Privacy Policy (needs to be checked)

Figure 2

What is CAPTCHA?

Short for “Completely Automated Public Turing Test To Tell


Computers and Humans Apart”, CAPTCHA is a test used to determine
if the user is human and not a program or robot. This is done to
prevent hackers from using automated programs to sign up and use
websites.

Emails 3
X.X Emails

Figure 3 Prove you’re not a robot

Not required:

 Mobile Number
 Your current email address
 Location (automatic)

Figure 4

Tips:

1. To make your email address presentable and easy to remember,


use your full name or variations of your full name. For
example: juandelacruz@gmail.com, jdelacruz@gmail.com, or
juan.delacruz@gmail.com.
2. Gmail will automatically check your “password strength”. Use
this as a guide to creating a secure password.

4
MODULE OF INSTRUCTION

Step 3. Click the “Next step” button.

Figure 6. Welcome!

You have successfully created an email address. Go to gmail.com to


log in and start sending emails.

The Email Client


You can now start using the email address that you have created.
Using an email client is easy but there are some things that you have to
learn first.

What is an email client?

An email client is an application used for sending, receiving, and


organizing emails. Gmail is the email client for the email address that
we created. Other popular email clients include Microsoft Outlook,
Apple Mail, Mozilla Thunderbird, and Yahoo Mail.

How to log in to Gmail:

1. Go to accounts.google.com

2. Enter your email address and click Next.

3. Enter your password and click Sign in

Tip: Click the “Stay signed in” checkbox below the Sign in button so
you won’t have to sign in everytime you open your email. For security
purposes, do not use this feature when using other people’s computers.

Emails 5
X.X Emails

Email Folders

Folders are sections of an email client that are used to store different
kinds of email. It is important to know that each email client has its
own way of organizing and naming folders. Some even allow users to
create their own customized folders. However, there are some types of
folders that are essential to organizing emails. These folders can be
found in almost all email clients:

Figure 6. Welcome!

Inbox

Like in mobile phones, an email client’s inbox contains the messages


you have received. In the inbox, unopened emails are marked as
unread while those that have already been opened are marked read.

Outbox or Sent

The folder for the emails that you sent is called the outbox or sent
folder depending on the email client that you use. Other than the
emails that you composed and sent, the outbox or sent folder also
contains emails that you replied to.

Drafts

This folder contains the finished or unfinished emails that you have
composed but did not send. You can write an email and just save it.
Later, you can reopen this email from your drafts folder and send it. A

6
MODULE OF INSTRUCTION

majority of email clients automatically save your emails to prevent


loss of data.

Flagged or Starred

You can mark important emails so that it will be easier to find them in
the future. To do this in Gmail, you can click the star icon beside the
email header. This will cause the email to be included in your Starred
folder. Other email clients use a flag icon; hence the name “flagged”
emails.

Spam

As the name implies, the spam folder is where suspicious emails are
kept. This is done as a security measure to prevent you from
accidentally opening these emails. Most email clients can
automatically identify suspicious emails and send them to the spam
folder. You can also manually mark an email as spam.

Trash

Instead of permanently deleting an email, it is sent to the Trash folder.


This prevents you from accidentally deleting emails. Emails in the
trash folder can be recovered. However, emails that remain in trash
will be permanently deleted after a scheduled number of days. For
example, Gmail deletes messages that have been in trash for more than
30 days.

Important note: It is possible for an email to be found in several


different folders. This is mainly because an email can contain the
original message from its creator and several replies from other
people. For example, if you reply to an email that was sent to you, it
will appear in both your inbox and outbox.

How to send an email

Follow these steps to send an email using your Gmail account.


(https://support.google.com)

1. Click the Compose button on the upper-left side of the screen. A


new message window will appear.

2. In the “To” section, type the email address of the recipient. You can
add multiple recepients.

Emails 7
X.X Emails

Use CC (carbon copy) or BCC (blind carbon copy) to include the


email addresses of people who are not the target of the email but need
to be informed about it. The only difference is that the CC will be
visible to all the receipients of the email while BCC is hidden to the
other receipients.

3. In the Subject section, enter the subject or title of the email.

4. Type your message in the large section below Subject. You can edit
the text’s size, format, font, and color. You can also attach files such
as pictures and documents.

5. Click the Send button

Optional Elements:

Tips:

 Keep your subject short and simple. Avoid adding too many
details. For example, instead of “Here is the information that
you asked me to research for our Biology homework” you can
shorten it to “Research Data for Biology Homework”
 Write your email as if you are writing traditional snail mail. As
a sign of respect to the recepients, begin your message with a
greeting.
 As a formality, add a “signature” containing your name, title,
and contact details at the end of the email even if your name is
already indicated. Here’s an example:

Juan A. Dela Cruz


Grade 7, Section 1
St. Nicholas National High School
09190000000

8
MODULE OF INSTRUCTION

Graphic Design

Here’s a thought experiment: Imagine something. Anything. Ok, are


you done? You don’t have to describe what you imagined but answer
this: How did you imagine it? More likely than not, you saw a picture
or a scene in your head. That’s human nature. Humans are very visual
creatures. We rely heavily on visual images to understand the world
around us.

In this chapter, you will learn how to use ICT to create images for
whatever purpose you choose. In this chapter, you will learn about
graphics design.

In simple terms, graphics design is a form of visual communication


that uses words and images to express an idea or send a message.
Graphic design is used for various purposes. Take the following
examples:

Figure 1.0: Safety and direction

Traffic signs are a common example of graphic design. As a rule,


traffic and safety signs need to have simple designs that are easy to
understand. They also use bright colors such as yellow and red to catch
people’s attention

Graphic Design 1
X.X Graphic Design

Figure 2.0: Branding and advertising

Effective graphics design can make ideas stick to people’s minds. For
example, Coca-Cola’s simple red and white logo is easily one of the
most popular designs in history. Graphics design is widely used in
commerce to promote products.

Figure 3.0: Public relations

KEEP CALM AND CARRY ON was a motivational poster created by


the British government to raise the morale of the population duting
World War 2. Its striking color and well-balanced typography sent a
clear message of courage and perseverance.

2
MODULE OF INSTRUCTION

Digital Image
Before we start creating some graphics, first we have to learn how
digital imaging works. A digital image is simply the digital version of
a two-dimentional image. A digital image can either be a vector or a
raster.

Vector vs Raster

Figure 4.0 Vector vs Raster


Vector
A vector image file contains points, lines, and shapes. A vector image
retains its quality even if you zoom in on it. An example of vector
image is the fonts that you use in your word processor apps. Notice
how the text remains smooth and readable no matter how big or small
you make them.

Raster
A raster image is composed of a grid of dots called pixels. Each pixel
can have a different color. Therefore, groups of pixels can appear to
form an image. Most of the pictures that you see in the Internet are
raster images.

For a more detailed explanation, check out this Youtube video:


https://youtu.be/-Fs2t6P5AjY

Graphic Design 3
X.X Graphic Design

Lossy vs Lossless

Our next topic will be image formats but we can’t understand those
without knowing the difference between lossy and lossless
compression. Compression is the method of reducing the file’s size or
the number of bits that it is composed of. Lossless compression retains
all the original data in the file while lossy compression removes some
of the data to make the file smaller.

Think of it like packing a pile of clothes into a bag. Lossless


compression is like squeezing all the clothes into the bag until they all
fit while lossy compression is very much like removing some items of
clothing from the pile so that the rest can fit into the bag.

Image File Formats

By now, you might have already noticed that some digital images have
“.jpg” at the end of their file names. Some have “.png” and so on.
These are file formats. A file format is a standard way in which digital
information is written and stored in a computer. All digital files have
formats and different formats are good for different uses. Here are the
most common formats of digital images and what they are best
suitable for:

JPG or JPEG
JPEG stands Joint Photographic Experts Group, the organization that
created it. JPEG uses lossy format. JPEG can be greatly compressed,
which makes it ideal for online use. JPEG is commonly used in
websites, and digital cameras.

GIF
You may have already heard of the debate about the pronounciation of
GIF. Some say gif as in “gift” while some say jif as in “Jill”. We’re not
gonna settle that debate here so please, pick a side and start arguing.

Anyway, GIF stands for Graphics Interchange Format. It uses lossless


compression and supports 256 colors. It is ideal for images with sharp
edges and few colors such as letters and logos. GIF also supports basic
animation.

PNG
Short for Portable Network Graphics, PNG was created as an open-
source alternative to GIF. Like GIF, PNG also uses lossless

4
MODULE OF INSTRUCTION

compression. However, unlike GIF, which recognizes only 256 colors,


PNG supports 16 million colors.

GIMP
Time to do some actual graphics design. For this lesson, we will be
using GIMP. Short for GNU Image Manipulation Program, GIMP is
open-source, which means anyone can download and use it for free.

First, some background information. GIMP has been around for 20


years now. It was first released in 1996 under the name General Image
Manipulation Program. Eventually, the word general was replaced by
GNU. Without going into much detail, GNU is the operating system in
which GIMP was first associated with.

To be perfectly honest, GIMP is quite complicated. It’s probably the


most complicated app that you will use this semester and there’s no
way we can discuss everything in just one chapter. But don’t worry
because you don’t have to learn everything about GIMP in order to use
it effectively. Think of it like a car. You don’t need to be a highly
trained professionl to drive one. You just need the basic skills. The rest
of it, you will learn along the way.

Download and Installation

Downloading and installing GIMP is pretty straightforward. First, go


to their official website at gimp.org. One of the first things that you
will see is the download link for the latest version. Just click it to start
your download. Once you’ve downloaded the installer file, open it and
follow the instructions to instll GIMP.

Graphic Design 5
X.X Graphic Design

The User Manual

As meantioned earlier, GIMP is quite complex and we won’t be able


to discuss every detail in this chapter. Fortunately, there’s a free user
manual, which can be accessed from the GIMP website. Simply click
the Docs tab then click the link for the English user manual.

For the rest of this chapter, we will only be discussing the bare basics
of GIMP. However, further information about every item that we will
discuss can be found in the user manual.

Creating a Document

To create a new document, click File then New. In the window that
will open, you can set the size of the image. Click the px dropdown
button to select what unit of measurement you want to use. You can
choose from pixels (px), inches, millimeters, centimeters, etc. Click
OK once you’re done choosing.

6
MODULE OF INSTRUCTION

Basic Concepts:

Here are some of the most important concepts that you need to be
familiar with.

Images
In GIMP terms, an image is a single file like a JPG or a PNG. In the
GIMP app, a single window display corresponds to one image

Layers
An image can be composed of one or several layers. Basically, a layer
in itself is an image with transparent areas. Layers are stacked on top
of each other to form an image. An image or a GIMP file can have one
or several layers. We’ll discuss this further later in this lesson

Resolution
By now, you’re already familiar with pixels. Resolution is the ratio
between the size of the image in pixels and its physical size when
printed on paper. The more pixles there are in an image, the better the
quality of the image is. The most common unit of measurement for
resolution is pixels per inch or ppi.

Selections
When using GIMP, you will want to isolate some parts of an image so
that your actions will only apply to that part and not to the rest of the
image. This part is called a selection. In GIMP, moving dashed lines,
which are sometimes called “marching ants”, marks a selection. There
are several ways to make a selection, which will be discussed later.

Undoing
You can undo an action or go back to the state of the image before the
action is done. This is useful when you make mistakes. For example, if

Graphic Design 7
X.X Graphic Design

you accidentally erased a part of an image, you can simply undo the
erase action and start over. GIMP keeps track of your actions or your
history. This feature will allow you to undo several actions at once.

Main Windows

Before we proceed, you may want to know that GIMP has 2 modes.
The first one is the multi-window mode, which is usually the default
mode. Frankly speaking, multi-window mode is needlessly
complicated. You may want to switch to the other mode which is the
single-window mode by clicking Windows (top part of the screen)
then Single-Window Mode.

Now that’s out of the way, let’s talk about the main windows in the
GIMP app. There are five main windows that are composed of dozens
of different functions. Again, we won’t be discussing everything in
detail. More detailed information can be found in the user manual.
(http://docs.gimp.org/2.8/en/gimp-concepts-main-windows.html)

Some of these windows can be moved. As a beginner, it is advisable to


not move any of these windows to avoid confusion.

1. Main Toolbox
The main toolbox contains several icons. Each icon represents
a tool. At the bottom of the main toolbox, you will see the
foreground and background colors.

8
MODULE OF INSTRUCTION

2. Tool Options
Below the main toolbox is the Tool Options. Here, you will see
the options for the tool that is currently selected. In the
example below, Tool Options shows the options for the brush
tool.

3. Image Window
In the middle of the screen, you will see the image window.
This is the window that displays the image that you are
currently working on. It is possible to open several image
windows at once but you can only work on one image window
at a time.

Graphic Design 9
X.X Graphic Design

10
MODULE OF INSTRUCTION

4. The Layers, Channels, Paths, Undo History dock


This window is in the upper right part of the screen. Layers,
Channels, Paths, and Undo History can be accessed through
tabs in this window.

5. Brushes/Patterns/Gradients
Another tabbed window, this one can be found it the lower
right part of the screen. Each tab manages brushes, patterns,
and gradients, respectively.

Graphic Design 11
X.X Graphic Design

Exercise: Birthday Party Invitation

In this exercise, we will learn to make a simple invitation for a kid’s


birthday party. The methods that we will be using here can also be
applied in creating other kids of graphics like posters, tarpaulins, and
flyers.

Step 1. Create a new image.


Because this image will be printed, we need to make sure to use a
good resolution. Click Template and select 1024x768. Click the arrow
beside Advanced Options and type 300 in the resolution. Finally, click
OK.

Step 2. Change the background color


a. Select a forground color at the bottom of the main toolbox.
b. Select the Bucket Fill Tool (the bucket icon)
c. Click anywhere in the image window to apply the color to the
background layer.

12
MODULE OF INSTRUCTION

3. Add pictures
In this case we will be using a birthday cake clipart that we found
online and a picture of the birthday celebrant.

a. Drag and drop the clipart to the image window. This will create
a separate layer for the picture.
b. Use the Scale tool (shortcut: shift+T) to resize the image
c. Use the Move tool (shortcut: M) to move the picture

4. Add Text
To make sure that the colors in our design match, simply copy colors
from other parts of the image and use them as font colors.
a. Select the color picker tool (shortcut: O) and click on the color
that you want to copy. This will set the copied color as the
foreground color.
b. Right click anywhere in the image then click layer, New Layer,
and then OK. This will add a new blank layer.
c. Select the Text tool (letter A icon) then click and drag in the
image. Type your text and use the tool options to customize the
font syle, color, size, etc.
You can repeat this step several times to add different text styles.

Graphic Design 13
X.X Graphic Design

5. Save your work


a. Click File then Save (or use shortcut Ctrl+S). Type a name for
your image then click Save. This will save a GIMP file for
your image with the extension xcf. Use this file if you want to
edit your image.

b. To save your project in an image file format, click File then


Export (Ctrl+E). Click the arrow beside Select File Type and
choose a format. By default, the export format is png. Which
will do just fine. Click Export.
c. Finally, go to the folder where you exported the image and
open it.
d.

14
MODULE OF INSTRUCTION

Tips:

Now that we’re done with the technical stuff, here are some tips that
you can follow:
1. Consider the viewer.
Remember that graphic design is a form of communication so
always consider if your work will capture your intended
viewers’s attention and if the message that you want to convey
will be clearly understood. When choosing between what you
like and what the viewers will like, always choose the what
your viewers will like.

2. Learn from other people.


If you encounter a problem or if you want to learn a new trick
in GIMP, just google it. More often than not, you will find a
how-to guide, a forum thread, or an instructional video about
the topic.

3. Take advantage of free stuff.


The Internet is full of free graphic design resources like stock
photos, color palettes, fonts, etc. Just be careful not to
plagiarize or break copyright laws.

4. Keep it simple.
If your design has too many elements, the viewers may get
confused and lose interest. So keep your design simple. Do not
use more than two fonts. Choose matching colors. Focus on
one element and make the other elements match it.

Graphic Design 15
MODULE OF INSTRUCTION

Web Content Development

Web content development is the process of planning, researching,


creating, and maintaining information for online publication.
Practically, all information that we see in websites is produced using
this practice.

As of 2016, there are more than 1 billion websites in the Internet.


(source: internetlivestats.com) Because of this, coming up with ideas
for new websites has become a very challenging task. In a time where
there is 1 website for every 7 people in the planet, how can we create
web content that is unique, useful, and interesting to the public?

What is web content?

Web content is the term used to describe text, sounds, images, videos,
and other media that are published in a website.

What is web traffic?

Web traffic is the number of visitors in a website and the number of


web pages that they visit. Web traffic is used to measure the popularity
of websites and web contents.

Web Content Lifecycle


Web content lifecycle is a series of steps or phases that web content
has to go through before and after it is published. There are no official
steps for web content lifecycle because people and organizations that
develop and publish web contents have different practices and
methods. However, for the purpose of this lesson, we will be exploring
5 most common stages:

1. Planning

The logical first step, planning is where the idea for a web content is
born. In this stage, we determine what type of web content should be
created, how it fits in the website’s objectives, and whether or not it
will be interesting to the readers. Here we also lay out important
details such as budgets and deadlines.

The Current State of ICT


X.X Online Search

2. Creation

After a solid plan has been created, it is time to create our web content.
The creation stage involves research, writing, and other creative tasks
such as graphics design, photography, and video editing.

3. Deployment

After the content is completed, it is now ready to be delivered to the


readers. Deploying web content may not be as simple as posting a
copy of it in a website. It has to be made available to different regions
and different types of devices and Internet browsers. The content may
also have to be translated to different languages in order to be more
accessible to people from all around the world.

3. Promotion

Web content needs to be seen by as many people as possible but just


because your web content can be accessed by anyone doesn’t mean
that everyone will see it. Promotion has to be done to persuade Internet
users to view web contents. Here are some strategies that are used to
reach potential viewers:
a. Social media
Internet users spend most of their online time in social media
sites and apps like Facebook, Twitter, and Instagram. This
makes social media a great way to attract potential website
visitors. It is now a common practice for websites to have
social media accounts so they can reach out to people and
promote their contents.

b. Paid ads
Basically, you can pay others to promote your content for you.
Many websites earn money by displaying advertisements for
products, services and other websites. For example, you may
see short commercials that play before Youtube videos or
search-related ads at the top of your Google search results.

c. Email advertising
Websites can ask users to sign up and receive emails that will
inform them about the latest contents and offers. These email
newsletters are often sent in a regular basis and contain links
that will direct the recipient to the featured content

2
MODULE OF INSTRUCTION

d. Web syndication
You can give other websites permission to publish your
original contents. These websites are required to give you
credit and even include a link to your website. This will make
your contents visible to other websites’ traffic.

e. Search Engine Optimization


SEO is a popular practice used to make web contents more
visible to online search engines. There are numerous SEO
techniques but all of them require knowledge of how search
engines work and how people use them. For example,
keywords that are related to your content’s topic are
strategically placed in titles, sentences and URLs to increase
the chance that a search engine will pick up your content
whenever someone searches for these keywords.

4. Maintenance

Web content maintenance is the process updating existing web


contents. Certain elements of the content such as pictures, statistics
dates and sources can be updated to keep it fresh, useful, and
interesting to the viewers. Aside from constantly creating new
contents, updating the old ones is a good way to attract web traffic.
Web content can generate a steady stream of traffic for years if it is
properly maintained.

5. Retirement

During this step, old and unpopular web contents are removed from
the website. These web contents can either be archived or permanently
deleted. Web content that become outdated or unpopular have to be
removed for several reasons:
 Digital information takes up memory space. Removing old and
unused contents will free that can be used to store new data.
 Removing the old and unpopular web contents brings focus to
the new and popular ones.
 Outdated contents are bad for the website’s image. If a website
has more old contents than new ones, viewers may get the
impression that it is poorly managed and not credible.

What is archiving?
Archiving is the process of gathering and preserving information for
future use. Outdated web contents can be unpublished and moved to an

The Current State of ICT


X.X Online Search

archive instead of being totally erased. Archived content can be


viewed in the archive and used as a source of historical data.

Content Management System


A Content Management System or CMS is a software application or a
set of softare applications that is used to create, publish, and manage
online content. Modern CMS applications have collaborative
environments, which allow multiple users to work on a single project.
Today, you don’t have to be a programmer or an ICT expert to create
and publish web content. In this lesson, you will learn how to work in
a team to produce and promote your very own content.

Blog:

Short for weblog, a blog is an online journal owned by an individual or


a group. A web content that is published in a blog is called a post and
bloggers normally publish them on a regular basis. Unlike a website
which has it’s own unique web address which has to be bought, a blog
can be hosted by a CMS for free.

WordPress
Wordpress is one of the top content management systems today. It is
free and easy to use. In this lesson, we will learn how to create a
WordPress blog.

How to Create a WordPress Blog

Figure 1. The WordPress homepage

4
MODULE OF INSTRUCTION

To begin, go to wordpress.com. Here you will see the “Get Sterted”


button. Click this and you will be taken to the first step of the creation
process.

Step 1: Select a category.

Figure 1.1. What is your website about?

In the list provided, select a category that best describes the type of
contents that you will be creating.

Step 2: Select a layout.

Figure 1.2. What would you like your homepage to look like?

A layout is how the parts of your blog will be arranged. Choose one
that suits your taste.

The Current State of ICT


X.X Online Search

Step 3: Select a theme.

Figure 1.3. Choose a Theme

A theme is a set of design elements such as font, colors and icons that
work together to your blog a certain style. WordPress themes can be
changed so the one that you will select in this step will not be
permanent.

Step 4. Find a domain name

Figure 1.4. Let’s find a domain

During this step, you will be asked to name your domain. WordPress
will check if the name that you selected is available. If it is already
tken, wordpress will suggest a name close to the one that you chose.
Free blogs have “wordpress.com” included in the domain name.

6
MODULE OF INSTRUCTION

What is a domain?

As the name implies, your domain is your online territory. A domain is


a part of the Internet that is under the control of a particular person or
group. Examples of domain name are wordpress.com and ama.edu.ph.
Step 5. Select a plan

Figure 1.5. Pick a plan that's right for you.

For the purpose of this lesson, just select the Free Plan.

Step 6. Create a WordPress account

Figure 1.6 Create your account

You will need a wordpress account to access your blog. To create one,
enter your email address and set a password then click the “Create My
Account” button. WordPress will send you an email. Open the email
and click the “Confirm now” button. This will open the log in page.
Enter your email address and password to complete access your blog.

The Current State of ICT


X.X Online Search

Figure 1.7 Check out amaempowertech.wordpress.com. This is


an actual blog created using the steps that we just learned.

Congratulations! You have successful created a blog. You can now


explore your WordPress account and post your original web content. If
you need help on how to use WordPress, you can visit its support page
at en.support.wordpress.com

8
MODULE OF INSTRUCTION

Web Page Design

By now, you probably have a clear understanding of how the Internet


works. You probably already know that electronic data is stored in
computers and shared with other computers through a massive global
network. Now, think about how this information is presented to you.
As a user, you prefer to view information in a manner that makes sense
to you. Information should be delivered in a way that is organized and
easy to locate and understand. This is achieved through websites. In
this chapter, we will learn what makes up a website and what goes into
building one.

What is a website?
In simple terms, a website is a collection of web pages that can be
accessed through the Internet. A website typically serves a single topic
or function. Technically speaking, a website an online location that
points to a group of web pages.

What is a web page?


A web page is an electronic document that is stored in a server and can
be accessed through the Internet using a web browser. Web pages are
the backbone of websites.

Parts of a website
When designing a website, you have to take into consideration the
people who will use it. One of the main goals of a designer is to make
the website simple and easy to use. This is why even though some
creative liberties can be taken in designing a website, it is still
important to include features that the users are familiar with.

The following are the most common components found in websites:

1. Header
Also known as a masthead, the header is usually located at the
top of each web page and contains the website’s name and
logo. Its purpose is to display the websites name and logo in
order to make it instantly recognizable to users.

2. Navigation
The navigation section is an interactive list that contains the
names of the webpages in a website. It can be located

Online Search 1
X.X Online Search

anywhere in the webpage but it is preferable to place it where it


can be easily seen. Users can go to another web page by
clicking its name in the navigation.

3. Content Section
As you may already know, contents are the main focus of any
website. Contents like texts, images, and videos take up the
largest space in websites.

4. Contact Section
The contact section is usually in a separate web page. It
contains the website’s contact information such as phone
numbers, email address, and office address. It is also a
common practice to add a message box in the contact section
so that the user can leave a direct message for the website
owners.

5. Call to Action
A call to action is a message or instruction that urges the users
to do an action. It is typically in the form of a command like
“Click here”, “Sign our petition” or “Watch the trailer here.”
This is important to websites that are created to gather public
response such as advocacies and commercial enterprises.

6. About us
“About us” can be a section or a page that tells the users about
the persons or organization that owns the website. The purpose
of this page is to establish the credibility of the website owner.
It usually contains a biography or history of the owner, their
achievements and their Mission and Vision.

7. Footer
As the name implies, the footer is always at the bottom of the
web page. Its purpose is to display links to important
information. The most common details that can be accessed
through the footer are Terms of Service, Copyright
information, FAQ’s (frequently asked questions) and personal
information about the creators of the site.

2
MODULE OF INSTRUCTION

Weebly
It is not surprising to learn that most commercial websites are created
and maintained by skilled and experienced developers. Such skills and
experience are required to come up with unique and groundbreaking
designs and features.

However, there are also ways to design a website even if you are not a
programmer or a designer. There are tools called website builders that
can be used to create websites without having to write code. These
tools can either be native or web-based. For this lesson, we will learn
how to build a website using one of these tools.

We will be creating a website using Weebly. Weebly is a web hosting


service and a website building tool. Weebly relies primarily on its
drag-and-drop feature to place and manipulate design elements.

You can use weebly for free but you can also sign up for a paid
membership to gain access to exclusive features.

Follow these steps to sign up and create your website:

Step 1. In your web browser, go to www.weebly.com

Step 2. Click Sign Up. In the Sign Up window, enter you name, email
address and your preferred password then click the Sign Up button at
the bottom.

Online Search 3
X.X Online Search

Step 3. Select a theme. The themes are grouped into categories such as
Business, Online Services, Personal, etc.

Step 4. Choose Your Website Domain. Type your preferred domain


name under the “Use a Subdomain of Weebly.com” box. As a free
user, your address will have “.weebly.com”

4
MODULE OF INSTRUCTION

Step 5. Get started. Your website has been created. Now you can start
designing it.

Website Design

Explore the following features to come up with your own designs.


Weebly provides tutorial articles in their help center. Check them out
here: https://hc.weebly.com/hc/en-us

Each design element that we will discuss will include a Youtube video.
These videos were created by Weebly as quick reference materials for
first-time users like you:

Dashboard
The dashboard or home page is the first page that you will see after
you log in. From here, you can access the other features like the page
editor. Here, you can also see statistics related to your website.

Online Search 5
X.X Online Search

Elements
On the left side of the Editor page, you will see Weebly Elements.
Weebly elements is a collection of design elements that you can add to
your website.These include text, image, slideshow and map. To add an
element, click, drag then drop it to the spot where you want to place it.

Check out this video to learn more about elements:


https://youtu.be/CXFZ-0HHO1I

Pages and Navigation


You can add multiple pages in your website through the Pages tab.
Here you can also edit, copy and delete existing web pages.

A navigation feature is automatically included in your website but its


design and location depends on the theme that you use.

For more details, check out Weebly’s how-to video about pages and
navigation: https://youtu.be/a7_LQq1teyo

6
MODULE OF INSTRUCTION

Themes
You can change the look of your website in the Theme tab. Here you
can select a different color scheme or change your website’s theme
and fonts

To select a new theme, click Change Theme, which will bring you to
the Theme Gallery. Browse thrugh the categories to find a theme that
you like. Weebly themes work with computers and mobile devices.

To learn more, follow the instructions on this video:


https://youtu.be/4TZqFc5bDhA

Page Layout
Weebly layouts are sets of elements that you can add to your website.
By using a layout, you can immediately fill your pages with matching
elements. You can then edit these elements to add your own details.

To do this click “Choose a Layout” in the middle of a blank page. This


will open the list of layouts grouped by category. Click a layout to see
a preview of it. Click Keep to use this layour or Cancel to go back to
the list.
Video reference: https://youtu.be/Vu4lwfbO6ko

Online Search 7
X.X Online Search

Activity: Designing your own website

In this activity, you will use everything tht you have learned so far in
designing your own website.

Before we start, you have to think of a purpose for your website. It can
be the official website of an organization, a personal website that
features your portfolio, or a marketing site for selling your products.

For this activity, we will be designing a website for our subject;


Empowerment Technologies.

1. Choose your theme.


By now, you should alreay know how to open the Editor page. To start
building your website, first select a theme. You can use the one that
you selected during signup or if you want to, you can change it in the
THEME tab. Each theme comes with a default image but you can
easily change it.

2. Design your home page


By default, your website has one page. We will turn this page into the
Home page. Change the page name to Home. You may notice that the
lower part of the page is blank. Click “Start with a Layout” and select
a layout that will fill this part. Remember that all Elements can be
customized. You can move or delete elements or add new ones in the
BUILD tab.

8
MODULE OF INSTRUCTION

3. Add more pages


You can add and design more pages depending on what your website
needs. For the Empower-Tech website, we will add pages for
Chapters, References, and Activities.

To add a new page, click the + sign in the PAGES tab then click
Standard Page. You can experiment with other types of pages like
Blog and Store but most of the time, Standard is what you’ll need. Add
a name for your page. The name of the page will automatically appear
in the navigation section.

Like what we did in the Home page, you can customize your header
and add elements either by using a layout or by manually adding them
from the BUILD tab.Activities

4. Add an About Us page


As discussed earlier in this chapter, the “About Us” page or section
contains information about the owner of the website. In this case, the
owner is you. Create a new page named “About Us” if you work in a
team or “About the Author” if you work alone. Add some details about
yourself such as your experience in the website’s topic, your career,
and your other projects.

There are Layouts that are designed specially for this purpose. You can
choose one of the “About” layouts and add it to your page.

Online Search 9
X.X Online Search

5. Add a Contact Us page


As you already know, it is important to give your readers a way to
contact you. This is accomplished by adding a Contact Us page. For
this activity, you don’t have to include your real contact details. Just
add dummy phone numbers, email addresses, etc.
Just like the “About” page, you can use a layout designed for the
Contact page. You can also build it from scratch from the BUILD tab.

There you go. That’s pretty much all the components that your website
will need. It may look generic now but imagine what you can
accomplish if you spend more time adding contents and improving the
design.

To see the website that we created, go to


http://empowertechlessons.weebly.com/. Don’t forget to check out the
mobile version in your phone’s browser

10
MODULE OF INSTRUCTION

Presentation Skills

A presentation is the delivery of a topic to an audience using a


combination of speaking and visual aids. In this lesson, we will learn
how to create and deliver presentations with the aid presentation
programs.

Prezi
Introduction:
http://prezi.com/cdntnn993dyb/?utm_campaign=share&utm_mediu
m=copy&rc=ex0share

Prezi is a web-based presentation program. Because it’s web based, it


can be accessed using an Internet browser and does not need to be
installed in your computer. Prezi can be used for free although they
also offer paid services. The main difference between the two is that
presentations created using free accounts can be viewed by anyone
while paying users can make their presentations private. For this
lesson we’ll be using Prezi’s free services.

How to create a Prezi account

Signing up is easy. Follow these steps to create your own prezi


account:

Step 1:
Go to prezi.com and click GET STARTED

Online Search 1
X.X Online Search

Step 2:
In the pricing page, click CONTINUE FREE to avail of Prezi’s free
services.

Step 3
Enter your first name, last name, email address and preferred password
then click Create your free Public account.

2
MODULE OF INSTRUCTION

Step 4
At this point you have successfully created your Prezi account. Click
Get started to view a short tutorial.

Creating your first prezi

Video Tutorial: https://youtu.be/WGckQjH_tMM

Now that you have a account it is now time to log in and start creating
your first prezi. Follow these instructions and watch the video to get
started:

Step 1
Go to prezi.com and log in using your email and password

Online Search 3
X.X Online Search

Step 2
In your dashboard, click Create a new prezi.

Step 3
There are 2 ways to do this next step. First, you can search for a
template by typing a keyword in the search bar. Once you’ve found
one that you like, click it then click Use template.

You can also choose to start from scratch by clicking Start blank prezi.

4
MODULE OF INSTRUCTION

Step 4
Whether you choose to use a template or start from scratch, you will
be directed to the prezi editor. Here you can add your contents and
costumize your prezi. Follow the instructions on this video to get an
idea: https://youtu.be/WGckQjH_tMM

The Prezi Editor

Video tutorial:
https://youtu.be/_kwA4TU-x4Q

Tutorial article:
https://prezi.com/support/article/steps/getting-to-know-the-prezi-editor/

Top menu
The Prezi editor’s top menu contains many essential controls and
information.

The left side contains the title of your prezi, the undo (left arrow) and
redo (right arrow) buttons, the save button and the time when your
prezi was last saved

Online Search 5
X.X Online Search

On the right side, you will find the insert menu where you can add
content and the customize button.

From the right side, you can play your presentation, share your
presentation, change the screen ratio, and exit the Prezi editor.

Transformation tool
Use the transformation tool to manipulate and customize the objects in
your canvas. With it you can change the frame type, change the color,
resize, rotate, etc.

6
MODULE OF INSTRUCTION

Text box
Click anywhere in the screen to add a text box. Use it to add and
customize texts

Zoom buttons
Hover your cursor on the middle-right part of the screen to see the
zoom buttons. Click the + icon to zoom in, the – icon to zoom out, and
the home icon to display the whole canvas.

Left Sidebar
The rectungalar bax on the left side of the screen is the left sidebar.
Use it to add a new frame and edit your path. The path is the order in
which your frames are displayed.

Online Search 7
X.X Online Search

Navigating your Canvas


Video tutorial: https://youtu.be/rdILh2hOnzc

Panning
To move around the canvas, click and hold anywhere in the screen
using your left mouse button then drag to any direction.

Zooming
There are several ways to zoom in and out of your canvas.
 Click Zoom to frame in the transformation tool
 Use the zoom buttons on the right side of the page
 Scroll using your mouse wheel

To learn more about Prezi, visit their knowledge base at:


prezi.com/support/article
There you will find many tutorials with articles and videos.

Creating an Effective Presentation


Not that you’ve learned the basic and some advanced skills in using
presentation tools, it is now time to focus on how you present your
topic. The following are some of the most common mistakes that
presenters make. After each one is a guideline that you can follow to to
avoid making the same mistakes.

(Source: RBS Empowerment Technologies)

Minimize

The mistake:
It is quite common for inexperienced presenters to use too many slides
or frames. Doing this will make the report unnecessarily long. The
audience may eventually lose focus and get bored.

The solution:
Use as few slides as possible. Include only the most important details
in the slides and deliver the supporting details by speaking. This way,
the audience will have an easier time absorbing the topic.

Clarity

The mistake:
Presentations are almost always designed in computers with small
screens then presented in a bigger monitor or projector. Because of

8
MODULE OF INSTRUCTION

this, the scale of the texts can be misjudged. The text can be too small
when viewed from a distance.
The solution:
Consider how your audience will view your presentation. If you will
be speaking to a large audience, use bigger fonts so your report can
still be read from the back of the room.

Simplicity

The mistake
Another common mistake that beginners make is to write the whole
report in the slideshow and just read it to the audience. This defeats the
purpose of using visual aids in your presentation. If what the slideshow
and the speaker say are the same, then the audience can just listen and
not read the slides or read the slides and not listen.

The solution
First of all, do not use your slideshow as a script. The slideshow
should only contain a summary of the report and not the report itself.
Use bullets, numbered lists and short lines instead of paragraphs and
long sentences.

Visuals

The mistake
It’s easy to get over-excited with graphics, colors and fonts. Using too
much animation, bright colors and fancy lettering can distract the
audience from the topic.

The solution
Use simple design elements. It is ok to animate your slides and
customize your texts as long as they are easy to read and not
distracting.

Consistency

This is a mistake that is usually made by those who are just starting to
learn the features of a presentation program. The slides may end up
looking different from each other, with different fonts, different colors
and an assortment of non-uniform graphics.

Online Search 9
X.X Online Search

The solution
Plan your design right from the beginning and stick to it throughout
your presentation. Most presentation programs allow you to set the
default look of every slide. Use this feature to keep your design
uniform.

Contrast

The mistake
Some colors simply do not match. A mismatched background and font
color can render the text unreadable.

The solution
Make sure that your text has a good contrast with your background.
Use a dark background with light text and vice versa.

It is also important to remember that your slideshow or prezi is only


one part of your presentation. It is a useful part of your presentation
but it is not the most important part. Your main goal is to make the
audience understand your topic and ideas. Coming up with a cool prezi
or slideshow does not ensure that your presentation will be successful.

Here’s a short video about how to give a powerful presentation. Notice


that the speaker didn’t even use a presentation tool. He just used a
white board and a marker as visual aids.
https://youtu.be/i68a6M5FFBc

10
MODULE OF INSTRUCTION

Collaboration Tools

Now that you have an idea of how the team setting works, it’s time to
learn about the tools that you will need.

Groupware

Collaborative software or groupware are programs or sets of programs


that people use to achieve a common goal. These tools allow people to
share information and communicate with each other even if they are in
different locations. In the ICT community, it is now a common
practice for people in different countries to work together on a single
project.

Types of Groupware

1. Synchronous groupware
These are groupware or collaborative tools that allow the
sharing of information in real-time. This means that the
recipient can instantly see the information that was sent or
shared. Synchronous groupware include but are not limited to:

a. Online chat
This is a technology that enables two or more people to
send and receive short messages instantly. Messages
sent by all parties are displayed in a chat room or chat
box and can be viewed by all members.

b. VoIP
It is safe to say that VoIP is simply an Internet-powered
telephone service. Short for “voice over Internet
protocol”, this technology allows people to make voice
calls through the Internet.

c. Videoconferencing
Videoconferencing is the collection several ICT
technologies that allow 2 or more people to
communicate through real-time audio and video. The
most popular example is Skype.

Online Search 1
X.X Online Search

2. Asynchronous groupware
Information shared using asynchronous groupware are not
instantly displayed to other members of the group. Most of the
time, participants are free to choose when they want to view
the shared information. Asynchronous groupware include but
are not limited to:
a. Email
As discussed in a previous chapter, emails are sent and
stored in the receipient’s inbox. The receipient can then
read the email when he logs in.

b. Online forums
Also known as message boards, forums are online
services where people can post messages for others to
read and reply to. Forums are virtually identical to
comment sections in social networking sites.

c. Wiki
By now, you must know what a wiki is. Wikis qualify
as asynchronous collaboration tools because they can
be edited by members of an online community.

d. Shared calendar
A shared calendar is simply an online calendar with
many users. Shared calendars are used by groups to
coordinate time and schadule activities.

What to remember:
Some apps and services have both synchronous and asynchrounous
features. Skype, for example focuses primarily on video conferencing
but also has a feature where users can record and send voice messages.

2
MODULE OF INSTRUCTION

Google Drive: Cloud Based Collaboration


As you have learned in the beginning of this course, cloud computing
is currently one of the most powerful and promising ICT technologies.
Now, we will learn the practical applications of cloud computing in a
collaborative environment. In this lesson, we will be exploring Google
Drive.

Google Drive is a cloud-based file storage and sharing service owned


and operated by Google. Google drive is a software suite or a
collection of several programs that allow users communicate and
create, store and share files. Google Drive can be used for free by
anyone with a Google/Gmail account.

My Drive

Video Tutorial: https://youtu.be/jWvKAYKlnnM

My Drive is Google Drive’s home page or main page. Google Drive


productivity apps, which we you will learn about later in this chapter,
can be launched from My Drive. From here, you can also access the
files that you have created as well as the files that other people shared
with you. This is also

How to open My Drive

There are 2 ways to open My Drive. First, in your Gmail account, click
the square icon on the upper right hand of the screen then click the
Drive icon. This will open My Drive in a new browser tab.

Online Search 3
X.X Online Search

To open My Drive directly, go to drive.google.com. You may have to


log in using your Google (Gmail) account If you haven’t done so
already.

How to upload a file

You can upload any type of file to google drive. There are 2 ways to
do it. The first one is via the “NEW” button:

Step 1. Click the red “NEW” button then click File upload

4
MODULE OF INSTRUCTION

Step 2. Select the file that you want to upload.

Step 3. Wait for the upload to finish.

The simpler way to upload a file is by simply dragging and dropping it


to the My Drive page.

Online Search 5
X.X Online Search

How to share a file

File sharing is one of Google Drive’s primary features. Follow these


steps to share a file that you have uploaded:

Step 1. Right click a file in My Drive then click Share.

Step 2. Enter the name or email address of one or more person whome
you want to share the file with. You can also choose if they will be
allowed to edit the file or if they will be restricted to viewing and
commenting. Once your finished, click Done.

6
MODULE OF INSTRUCTION

How to open a file

Files like Word documents, spreadsheets, Powerpoint presentations,


audio, and video can be opened and viewed in Google Drive. If you
doubleclick an uploaded file, Google Drive will analyze it to
determined if it can be opened.

Google Drive Productivity Apps


Source: https://support.google.com/
“Overview of Google Docs, Sheets, and Slides”

Google Docs, Sheets, and Slides are collaborative productivity apps


that are included in Google Drive. They have features and controls that
are very similar to other popular office productivity suites like
Microsoft Office so if you ar familiar with Microsoft Word, Excel, and
Powerpoint then learning Docs, Sheets and Slides will be easy.
Furthermore, Google Drive productivity tools can recognize and open
Microsoft Office file types like doc and xlsx.

There are 2 ways to access these apps. First is by clicking the New
button in My Drive. Doing so will open a list of options that include
Google Docs, Google Sheets, and Google Slides. Simply click one to
get started.

Online Search 7
X.X Online Search

The second way is to click My Drive then clicking on one of the three
apps.

Real-time collaboration

Google Docs, Sheets, and Slides also allow real-time collaborative


editing, which means that several people can view and edit documents
at the same time. To use this feature, first you have to share your
documents.

Sharing Docs, Sheets, and Slides documents is practically the same as


sharing uploaded files. In all three programs, just click the Share
button on the upper right hand corner. This will open the “Share with
others” window just like the one in My Drive.

8
MODULE OF INSTRUCTION

Google Docs

Google Docs is a web-based word processor program. It has features


and controls that are similar to Microsoft Word and LibreOffice
Writer.

Here are some of Google Docs’ features:

 Your documents will be stored in the Cloud. You can log in


and edit your files using any computer that is connected to the
Internet.
 Your work will be constantly automatically saved as long as
you are connected to the Internet.
 Shared documents can be opened and edited by several people
at the same time.
 Your documents can be downloaded in different formats like
Microsoft Word, OpenOffice and PDF

For more lessons about how to use Google Docs, you can visit
https://support.google.com/docs/topic/21008

Online Search 9
X.X Online Search

Google Sheets

Google Sheets is a Google Drive’s spreadsheet app. It works a lot like


other popular spreadsheet programs like Microsoft Excel and
LibreOffice Calc.

Google Sheets’ features include:

 Spreadsheet formatting such as font, text color, background


color and text size
 Auto-save functionality
 Spreadsheet sharing and real-time group editing
 Download your spreadsheet as Microsoft excel, PDF, and other
formats

For more instructions on how to use Google Sheets, you can visit
https://support.google.com/docs/topic/20322

10
MODULE OF INSTRUCTION

Google Slides

Google Slides is an Google’s presentation app. It looks like and works


a lot like Microsoft Powerpoint. The main difference between the two
is that Slides is cloud based while Powerpoint is native program.

Here are some of its features:

 Ready-made presentation templates


 Add pictures and videos to your presentations
 Import and edit Microsoft Powerpoint presentations
 Presentations can be shared to and viewed by others
 Presentations can be downloaded as other formats such as
Powerpoint, PDF and jpg

Check out Google’s introduction to Slides here:


https://support.google.com/docs/topic/19431

Online Search 11
MODULE OF INSTRUCTION

ICT For Social Change

By now, you must already have a clear idea as to how ICT has
changed the way people work, learn, play, and communicate.

In this chapter, you will learn how Information and Communications


Technology helps society as a whole.

ICT and Society

Now, knowing how much ICT can improve your life, imagine how it
can improve society as a whole. Here are some examples of how ICT
was used to help others and influence social change.

Disaster Response

The Internet has proven to be an effective way to collect and share


information during emergency situations. The following are two
examples of online applications that are currently used to deliver
valuable data during natural and man-made disasters:

Google Person Finder

Google Person Finder is an open source web application. Volunteer


engineers from Google created it after the Haiti Earthquake back in
2010. It serves as a center for collection and delivery of information
that can help disaster survivors and relief and rescue operations.

ICT For Social Change 1


X.X ICT For Social Change

People can use this app to search for their loved ones after a disaster.
Google Person Finder collects data from several sources sich as CNN
and The New York Times and makes it available to the public in
several languages, focusing on the native language of the disaster
stricken areas.

It also searves as an information hub where people can see crucial


information such as satellite photographs, locations of evacuation
areas, road conditions, etc.

So far, Google People Finder has been used in the aftermath of dozens
of natural and man-made disasters including:

 Haiti Earthquake (2010)


 Chile Earthquake (2010)
 Pakistan Flood (2010)
 Boston Marathon bombing (2011)
 Typhoon Haiyan/Yolanda (2013)

For more information, you can visit google.org/personfinder.

Facebook Safety Check

Facebook Safety Check is a Facebook feature that is activated during


and after natural and man-made disasters. It enables Facebook users in
disaster stricken areas to let their friends and family know that they are
safe.

2
MODULE OF INSTRUCTION

Because Facebook can track your current location, they can determine
if you are in an aread affected by a disaster. Facebook then gives you
the option to use the Safety Check feature to mark yourself as “safe”.
It will then make this information available in your contacts’ news
feeds.

Charity

Electronic money transfer is a technology that has revolutionized


commerce in the 21st century. Recently, it has also been used to collect
funds to help people in need.

One great example was the support that came in the aftermath of
Typhoon Yolanda. Several organizations form all over the world such
as the United Nations Children’s Fund (UNICEF) collected donations
through online oney transfer platforms like Paypal.

Social Awareness

Change can start with social awareness. In recent times, ICT has been
used to inform the public about issues that affect people. This
awareness can cause people to act and work together to find a solution.

Youtube video: https://youtu.be/AmesCzIN0uc

You may remember the ALS Ice Bucket Challenge that went viral a
couple of years ago. It is probably the most successful attempt of using
social media to raise awareness and gather donations for a cause. In
this case, the cause was for the research about a disease called
amyotrophic lateral sclerosis or Lou Gehrig's Disease.

The movement has a generated more the 220 million dollars of


donations. (Source: als.net/icebucketchallenge)

Petitions

A petition is basically a request to do something. Traditionally, a


petition is a document signed by concerned persons and is addressed to
a governing body such as school administration or local government.
The aim of a petition is to express the people’s opinion about a certain
issue and to persuade the governing body to take action.

Today, petitions can be created and signed online. This makes it easier
to reach out to the public. There are several websites that host online
petitions.

ICT For Social Change 3


X.X ICT For Social Change

Change.org

Change.org is an online petition site that hosts petitions for free. You
can use it to start a petition or sign petitions created by others.

To sign up, just go to change.org and click log in. It will give you the
options to log in using an existing account or sign up if you don’t have
one. You can manually enter your information or use their “Sign up
with Facebook” feature. This will allow Change.org to connect to your
Facebook account and use your information there to create an account.
This will make it easier to promote petitions via Facebook.

Youtube video: https://youtu.be/UcT1rgZDko4

4
MODULE OF INSTRUCTION

The Team Setting


Before we discuss your final project, let’s talk about the people that
you will be working with. For the next few weeks, you will be a part
of a team and you will work as a team every step of the way.
Traditionally, a team has a leader, who makes the important decisions
and has the power to give orders to the members.

It’s quite obvious why this system is not a good choice in a learning
environment. First of all, it is not fair to give most of the power and
responsibility to just one person. Secondly it denies the members the
opportunity to explore their potential's and to learn leadership skills.

Holacracy

(Source: http://www.holacracy.org/)

So far, this subject has been about new and more efficient ways to do
traditional tasks. Therefore, for your next project, we will be using a
new approach to the team structure. We will be exploring holacracy.

Holacracy is an organizational structure in which decision-making and


leadership responsibilities are distributed to every member of the team.

To better holacracy, say let's compare it to the traditional team


structure. A traditional team can be compared to a triangle or a
pyramid with the leader on top and the members on the lower level.

ICT For Social Change 5


X.X ICT For Social Change

A holacracy on the other hand can be compared to a circle. This circle


is composed of every member of the team. Each member can have the
chance to lead at some point. There can still be a leader but he or she
will be just another part of the circle.

For example, Member 1 or M1 is good at graphics design, so we’ll put


him in charge of graphics. M2 is a student journalist so she’ll be in
charge of documentation. M3 is a good public speaker so he will be in
charge of presentations. In his area of expertise, which is graphics, M1
has authority over M2 and M3 but in other areas, like M2’s
documentions, he still acts as a subordinate.

For your final project, think of an area where you excel and volunteer
to take charge of that area. At the same time, give full cooperation
when working in other areas of your project.

ICT Project for Social Change


In the past chapters, you have learned how to use Information and
Communications Techology for personal gain. You’ve learned how
social media has enabled people from all over the world to
communicate and form social relations with each other. You have also
learned new ways to express your ideas through online publishing,
computer graphics, and online collaboration.

6
MODULE OF INSTRUCTION

It is now time to put all this new knowledge to good use. In this
chapter, you will learn how to execute a project with the goal of
helping your community and society at large.

The Concept Paper

(Source RBS Empowerment Technologies, First Edition 2016)

Before you can start doing some actual work, first you have to prove
why your cause is worthy. In the real world, you will have to convince
people or organizations to sponsor or fund your project. For the
purpose of this lesson, this role will be played by your teacher. To
convince him/her, you will have to submit a concept letter.

A concept letter is a document that aims to persuade a person or a


group to sponsor your project. It is composed of five elements:
1. Introduction
Start by introducing the members of your team. Then give a
brief but clear description of the issue that you wish to
address.

2. Purpose
Give the reasons why you want to take action. Focus on how
your project can make a difference and who will benefit from
it.

3. Description
Explain how you plan to accomplish your goal. Mention what
tools, concepts, and methods you will use and why they are the
best choice. You can also give an estimation of the time it will
take to finish your project.

ICT For Social Change 7


X.X ICT For Social Change

4. Support
This is the part where you tell the potential sponsors what
resources you will need from them. Normally, this includes how
much funding is needed but for the purpose of this lesson, you can
use this part to ask for permission to use school facilities and
equipment such as conference rooms and computers. You may
also take this time to ask for permission if your project will
require you to do some research outside of your campus.

5. Contact Information
This may include the phone numbers and email addresses of your
members. You can also create an email address for the sole
purpose of this project.

Here’s an example:

For years, many students depend on the school’s drinking fountain. Aside
from saving the money, schools drinking fountain has filters to make the
water safe enough to drink. But according to research, the last time the
water was tested was about about three years ago and by using the
drinking fountains arround school, it is highly questionable about the water
is still safe for drinking. Our group has theorized that the natural wear and
tear of the drinking fountain has led to the waters unpleasant taste. Our
group, the Mosaic Alliance aims to create several online sources that will
help promote the awareness of people involved about this problem and
create an online petition with the goal of improving our drinking fountains
here in school.

Our group aims to create a Change.org petition, a Facebook group and a


blog to help achieve our goals. We will be creating infographics and other
related information connected to the dangers of drinking unsafe water
especially at her young age. The scope of our project is to be able to reach
the school’s administration, parents, teachers, and students to sign our
petition.

We will be requiring a week to develop this project project and we will


start our promotion right after we hve uploaded the website. We will also
be using our own resources so the funding for this project will be close to
None. Our expenses will include the printing of campaign materials on the
Internet and computer shop rentals in case we need more time outside
school hours. We will be also using free services already offered by
Facebook, Blogger, and Change.org.

Should you have any questions about our project feel free to contact us at
mosaicalliance@email.com.

8
MODULE OF INSTRUCTION

Simplified IT Project Process

Once you get support and approval for your project, you can start
doing some actual work. We will divide the project process into four
stages. These stages may and should remind you about the web content
lifecycle, which we discussed in Chapter 8.

Stage 1: Planning

Like most endeavors, a successful project has to start with careful


planning. During this stage, you will have to accomplish several tasks
including but not limited to the following:
a. Conceptualizing your project
At this point, you have already delivered a concept paper. Use
the data in it to lay out broader concepts about your project.
This will determine what step you will have to take to
accomplish your goal.

b. Assigning people to various tasks


As we discussed earlier in this chapter, your team will be
devided into several areas or “departments”, which will be led
by different members of your team. At this point you will have
to determine which members will lead the different
departments and what is expected of them

c. Researching about your topic


Here you will have to use the skills and knowledge that you
learned in Chapter 4. You may also have to do some real-world
research like doing interviews and conducting surveys. Be sure
to keep a record of all the information that you gather. It may
be a good idea put someone in charge of research and
recordkeeping.

d. Setting deadlines and scheduling meetings


Because each department should be able to work
independently, it is important to have team meetings so that
everyone will have a clear idea about what the other members
are doing. During meetings, everyone is required to give a
report about the progress of their assigned tasks and to convey
any concern they may have.

e. Finding a web or blog host


A website or blog is where you will publish the progress and
results of your project. You can choose from the apps that we

ICT For Social Change 9


X.X ICT For Social Change

have discussed in the previous chapters like Weebly and


WordPress.

f. Creating a site map for your website


Whichever web or blog host you choose, it is important to
create a site map. A site map is basically a list of web pages in
your blog or website. It is a lot like the navigation section of a
website.

g. Determine what other applications you will need


Other than a website or a blog, you will also have to use other
apps for different purposes such as:
 Cloud storage
 File sharing
 Word processing
 Spreadsheet
 Presentation
Look back on previous chapters to determine which ones suit
your purpose.

h. Funding (if applicable)

Step 2: Development

This stage will probably take up most of your time. This is the part
where you execute your planned tasks and activities.

Some of the steps can be done simultaneously. If a particular step is


ready, you don’t have to wait for other steps to finish first. For
example, You can start promoting your project in social media while
you are still gathering information. This is an added benefit of
holacracy, your team can accomplish different tasks at once because
each task will be led by a different person.

Step 3: Release and Promotion

This is the point where you present your accomplishments to the


public. While it is advisable to post updates on the progress of your
work and to promote your project even before its entirety is delivered,
it is also important to release the most important details in a single
event.

10
MODULE OF INSTRUCTION

Step 4: Maintenance

Your project doesn’t end at the delivery of your results. After your
grand release, you will probably get feedbacks from your sponsors and
the public. They can be in the form of criticsm, suggestion, or even
praise. To assure the continued success of your project, you have to
take these feedbacks into consideration and respond to them in a
constructive and courteous manner.

ICT For Social Change 11

You might also like