3rd Quarter REVIEWER IN EMPOWERMENT TECHNOLOGY
3rd Quarter REVIEWER IN EMPOWERMENT TECHNOLOGY
World Wide Web (Internet) was invented by Tim Plagiarism is the act of stealing or duplicating
Berners-Lee, most of the web pages were static another person's ideas or works without giving
web (also known as flat page or stationary them due credit
page) or the content is “as is”. The user cannot
manipulate or edit the content of the page, as What is Digital Citizenship?
well as, the content is same for all the users. Digital citizenship is the way we think, act and
Eventually evolved into Web 2.0 or also known be online
as dynamic web it has interactive
characteristics. You can comment, react and One of the threats that you must avoid is the
share. malware. This term came from the blended
words “malicious” and “software”. Internet users
What is cybercrime? usually acquired this threat through online.
Cybercrime is criminal activity that either targets Malware is an umbrella term covering five (5)
or uses a computer, a computer network or a different types:
networked device. Most cybercrime is committed 1. Virus – It is malicious program that usually
by cybercriminals or hackers who want to make transfer from one device to
money. another with the aid of the Internet and local
networks, but commonly
1. Hacking – it is unauthorized accessing of through data storage such
data from a computer network. Mostly, hackers as flash drives or hard drive.
attack commercial and government sites to
cause an alarm or to threat someone. 2. Worm – Unlike the virus, this malware
replicates itself and can transfer by any type of
2. Sport Betting – it is an illegal act of gambling means, but more often through computer
on any sports event that happened over the network.(example: ILOVEYOU worm)
Internet.
3. Trojan - this malicious program disguised as
3. Non-Delivery of Merchandise – a deceiving a useful program, however left your devices
act which the culprit posted a product or service unprotected and became vulnerable to other
on the Internet. Once the victim placed its malwares once you accessed or downloaded it.
payment, the culprit does not give the item or
service. 4. Spyware – a malicious program that monitors
the device, and the actions of the user without
4. Electronic Harassment – an anonymous its knowledge.
criminal who harass, abuse, threat, or annoy
other people. One example of this is 5. Adware – this program automatically sends
cyberbullying. pop-ups advertisements.
What is Spreadsheet?
This error is displayed when the column width
A spreadsheet is a computer program that can in excel is not enough to show the stored value
capture, display and manipulate data arranged in the cell.
in rows and columns. Example: Microsoft Excel,
Lotus 1-2-3 etc. When inserting charts on your document an
excel application will be pop-ups and allows you
1. The SUM() function, as the name suggests,
to enter the data and manage parameters
gives the total of the selected range of cell
values. What is Microsoft PowerPoint?
2. The AVERAGE() function focuses on It is a presentation-based program that uses
calculating the average of the selected range of graphics, videos, etc. to make a presentation
cell values. more interactive and interesting
3. The function COUNT() counts the total Animation – is any visual effect applied to
number of cells in a range that contains a individual slides or specific objects on slides.
number You can animate text boxes, images, tables or
indices, shapes, or any additional graphics.
4. COUNTIF - function used to count the
number of cells that contains something if the Transition – is the visual effect that occurs when
criteria are met. you move from one slide to the next during a
presentation
List of Various Excel Errors
What is Hyperlink?
1 – #DIV/0 Error
Are similar to links you might have seen on a
#DIV/0! Error is received when we work with a website. They allow you to jump back and forth
spreadsheet formula, which divides two values between specific slides in your presentation, to
in a formula and the divisor (the number being
movie files that don't work on PowerPoint slides,
to other files, or to a webpage (if you are
connected to the Internet).
Imaging and Design for Online Environment 5. Proportion - Visual elements create a sense
of unity where they relate well with one another.
What is an Image
6. Variety - This uses several design elements to
A physical likeness or representation of a draw a viewer’s attention.
person, animal, or thing, photographed, painted,
sculptured or otherwise made visible.
Inserting, Uploading and Sharing of Images
ONLINE IMAGE FILE FORMATS
over the Internet
1. Joint Photographic Expert Group-
One of the things that the Internet offers the
is a “lossy” format meaning that the image is users is the availability of
compressed to make a smaller file.JPEG files resources. Photo Sharing is one of its features
are very common on the Internet and JPEG is a since the start of the
popular format for digital cameras making it ideal development of Internet.
for web use and non-professional prints.
Photo sharing websites allows users to upload
2. Graphics Interchange Format their images to share with the online community.
are widely used for web graphics, because they
are limited to only 256 colors, can allow for These are some of the most popular photo
sharing websites:
transparency, and can be animated.
1. Photobucket.com
2. Picasa
3. Portable Network Graphics 3. Pinterest
This image is transparent/no background. 4. Imgur.com
5. Imageshack.com
4. Tagged Image File Format.