Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

REVIEWER IN EMPOWERMENT TECHNOLOGIES

research, library archiving, teaching and


ONLINE SAFETY AND SECURITY, ETHICS AND NETIQUETTE education.

Common issues and crimes on the internet: ONLINE RESEARCH


1. Cyberbullying Advance Search – best way to filter information you get
2. Hacking from search engines. This will allow you to filter information
3. Identity Theft you do not need.
4. Plagiarism
5. Intellectual Property rights and copyright issues Microsoft search engine, Bing, you can use certain
keywords and symbols:
Online safety and security defines how you are going to BOOLEAN OPERATORS / FUNCTIONS
keep yourself safe while surfing the web. There are different Symbol Function
types of personal information easily stolen online when + Finds web pages that contain all terms
caution is not practiced. Examples of these information “” Find the exact words in a phrase
are: First, Middle and Last Name, Current and Previous () Finds or excludes web pages that
School, Cellphone Number, Parents and Siblings Name, contain group of words
Address, Home number and birthday AND or & Find web pages that contain all the
terms or phrases
NETIQUETTE – from words “net” (from internet) and NOT or - Excluded web pages that contain a
“etiquette”. It focuses on acceptable behavior of the term or phrase
person while using the internet resource. OR or | Finds web pages that contain either of
the terms or phrases.
INTERNET THREATS
1. MALWARE – malicious software Google Search
a. Virus – malicious program designed to
OPERATORS / FUNCTIONS
replicate itself and transfer from one
Symbol Function
computer to another either through internet,
Minus ( - ) Symbol to exclude terms
local networks or data storage and devices.
Tilde ( ~ ) Symbol to search using
b. Worm – malicious program that transfer from
synonyms
one computer to another by any type of
means. site:website.com Provide result from the
c. Trojan – malicious program that disguise as a specific website
useful program but once downloaded or Asterisk ( * ) If you don’t know the exact
installed, leaves your PC unprotected and term
allows hackers to get your information related.website.com To provide related website
i. Rogue security software – tricks user into
posing that it is a security software. • Use google as calculator
d. Spyware – a program that runs in the • Use google to convert currencies and
background without you knowing it. It has the measurements
ability to monitor what you are currently doing • Use google to provide actual weather
and typing though keylogging. • Use google to provide actual time.
i. Keyloggers – use to record the keystroke
done by the users. Can record email, ONLINE SYSTEMS
messages or any information you type Chrome OS: An operating system for the web – developed
using keyboard. by Google, the person’s data relies on the cloud (via
e. Adware – a program designed to send you Google’s services such as Google Docs), meaning, the
advertisements, mostly as pop-ups. system needs to be connected to the internet.
2. SPAM – unwanted email mostly from bots or
advertisers. It can be used to send malware. Learning Management Systems
3. PHISHING – its goal is to acquire sensitive personal 1. Edmodo – started in 2008, being used in 90% of all
information like password and credit card details. schools in the US. Free for students and teachers.
a. Pharming – a more complicated way of 2. Moodle – free and open-source. Second largest
phishing where it exploits the DNS (domain provider of LMS to universities and colleges with
name service) system. 23% market share.
3. Blackboard – started in 1997, has evolved into
becoming one of the preferred LMS especially in
IP Rights – right refers to the general term for the the US. It has many issues such as numerous
assignment of property rights through patents, copyrights glitches and for being expensive.
and trademarks.
© - copyright sign; PRODUCTIVITY TOOLS can be a freeware or shareware.
® - registered sign; • FREEWARE is copyrighted, which can be used for
™ - trademark sign free and for an unlimited time.
• Patent – exclusive right granted for an invention • SHAREWARE is commercial software that is
• IP – (intellectual property) – is the creation in mind copyrighted which can be copied for trial but
• Republic Act 8293 otherwise known as “An act needs to be purchased for continued use.
prescribing the intellectual property code of the
Philippines…” MICROSOFT OFFICE developed by Microsoft is one of the
- IPOPhil – Intellectual Property Office of the most popular productivity tools. It includes processing
Philippines – is a government agency in software, electronic spreadsheet, presentation software,
charge of registration of intellectual property and database and desktop publishing program.
and conflict resolution of intellectual property
rights in the Philippines. SEARCH AND REVIEW FOR THE COMMON SHORTCUT KEYS
• Copyright Infringement – is the use of works OF THE FOLLOWING COMMANDS:
protected by copyright law without permission. Copy, Paste, New, Highlight, Save, Project, Print, Editing
• Fair Use Policy – an IP may be used without a Font and Paragraph Alignment, Find, Open, Cut, Redo,
consent as long as it is used in commentaries, Undo, etc.
criticisms, search engines, parodies, news reports,
REVIEWER IN EMPOWERMENT TECHNOLOGIES
MS WORD – new features include hyperlink, macros, and EXAMPLE: =MIN(A1:A20)
mail merge. - RANGE – the range of cells where you want to
• HYPERLINK – is a link that will direct you to another look for the criteria.
page or part of the same document. It can be an - CRITERIA – a value or label that determines id
image, word, phrase, symbol or different element a cell is part of the range to be averaged.
in the document. - AVERAGE RANGE – the actual range of cells
• INTEGRATING IMAGES AND OTHER EXTERNAL that will be averaged, if omitted, the range
MATERIALS – integrating or inserting pictures in your will be used instead.
document is fun and it improves the impression of
your document. MS POWERPOINT – format text and images, adding
KINDS OF MATERIALS animations and other multimedia components
1. Picture – has three types: .jpeg/.jpg, .gif, interactively.
/png. • SLIDE ANIMATION – a moving computer graphic
2. Clipart effect that can be added to the object, text or
3. Shapes the entire slide itself.
4. SmartArt • SLIDE TRANSITION – control how your presentation
5. Charts moves from slide to slide.
6. Screenshot – other option is by using • HYPERLINKS – allows you to go to other slides in the
keyboard command ( fn+prt sc) or by same presentation or in another presentation or in
using desktop snipping tool a web page and even to e-mail addresses.
• EMBEDDED FILES AND DATA – multimedia file can • ACTION BUTTON – allows you to play sounds,
be inserted or embedded into the web page. animate, or run a program. Allows you to move
• MAIL MERGE - allows user to quickly produce and from one slide to another without using the using
send information, newsletter, resume’s or next button in a slide show.
brochure to many people.
- Form Document – first component of our mail CREATING AN EFFECTIVE PRESENTATION
merge document. It contains the main body
of the message we want to convey or send. 1. MINIMIZE – slide counts to a minimum to
Also included are the place holders, also maintain a clear message.
referred to as data fields or merge fields. 2. CLARITY – use font style and size that are
Place holdersx`x` are marked by the text with easy to read.
double-headed arrows ( << >>) on each side. 3. SIMPLICITY – use bullets or short sentences.
- List or Data File – second component of mail 4. VISUALS – use graphics to help in your
merge. This is where individual information or presentation
data that needs to be plugged in to the form 5. CONSISTENCY – make you design uniform.
document. 6. CONTRAST – use light font on dark
IMAGE PLACEMENT background, vice versa.
1. In line with text
2. Square PRODUCTIVITY APPS AND METHODS
3. Tight
4. Through Aside from MS Office applications, there are various
5. Top and Bottom desktop or mobile software that guides us in prioritizing our
6. Behind Text tasks and workload. They are:
7. In front of Text 1. 1-3-5 list
2. Carrot
MS EXCEL – simulate a paper worksheet. Composed of 3. Wunderlist
cells that are represented in rows and columns designed 4. Teux-deux
to perform basic arithmetic operation. Widely used in 5. Bullet Journaling
accounting and financial operations, as well as statistics 6. Today.txt
and engineering calculations. 7. Post it
• FORMULAS – excel formulas always begin with an 8. Evernote
equal sign ( = ). 9. Trello
- COUNT – a function used to count the cells 10. Asana
with content in a range. 11. Get it done
Formula: =COUNT(range) 12. Pomodoro
Example: =COUNT(A1:A20) 13. Kanban
- SUM – a function used to compute for the
summation of the number of a range. ONLINE SOFTWARES AND THEIR BENEFITS
Formula: =SUM(range) There are various online software that can be used in
Example: =SUM(A1:A20) mobile devices. Examples are Google Apps, Evernote,
- AVERAGE – a function used to compute for Google Docs and Pocket.
the average of the number of a range.
FORMULA: =AVERAGE(range) Benefits of Online Software
EXAMPLE: =AVERAGE(A1:A20) 1. Convenience
- COUNTIF – used to count the cells with a 2. Scalability
specified content within a range. 3. Safety
FORMULA: =COUNTIF(range,criteria) 4. Sustainability
EXAMPLE: =COUNTIF(A1:A20,”Batangas”)
- IF –
FORMULA: =IF(B4<70,”FAIL”,”PASS”)
- MAX – gives the maximum value in a range of
cells
FORMULA: =MAX(range)
EXAMPLE: =MAX(A1:A20)
- MIN – gives the minimum value in a range of
cells.
FORMULA: =MIN(range)

You might also like