0% found this document useful (0 votes)
22 views5 pages

3rd Quarter REVIEWER IN EMPOWERMENT TECHNOLOGY

The document discusses various technology and computing terms including ICT, cybercrime, plagiarism, digital citizenship, malware, Microsoft Word, mail merge, spreadsheets, and common spreadsheet errors.

Uploaded by

Dina A Peralta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views5 pages

3rd Quarter REVIEWER IN EMPOWERMENT TECHNOLOGY

The document discusses various technology and computing terms including ICT, cybercrime, plagiarism, digital citizenship, malware, Microsoft Word, mail merge, spreadsheets, and common spreadsheet errors.

Uploaded by

Dina A Peralta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

REVIEWER IN EMPOWERMENT and installing the presentation software on

TECHNOLOGY your device


15. Yahoo.com - is a website that contains
information from different sources and
Terms to Remember places them in one location in a uniform way
16. Uniform Resource Locator - A web page is
accessed using this.
1. Text-to-speech - TTS can help people who
17. Newsletter - a periodically sent email that
struggle with reading and is a type of
educate readers about new products,
assistive technology that reads digital text
highlight employees, share successes, and
aloud
announce upcoming events or promotions
2. Ecosia - uses the ad revenue from your
18. Trello - visual tool that empowers your team
searches to plant trees where they are
to manage any type of project, workflow, or
needed the most
task tracking. It serves as an online to-do
3. Indigenous knowledge - refers to the
checklist.
understandings, skills and philosophies
19. Yammer - collaborative tool where
developed by societies with long histories of
businesses can create their own social
interaction with their natural surroundings.
network for managing and sharing content
4. Tatsuo Horiuchi - a 73-year-old Japanese
20. Google - is an internet search engine. It
artist who began experimenting with Excel’s uses a proprietary algorithm that's designed
artistic capabilities 13 years ago. to retrieve and order search results to
5. red-eye reduction - a method of reducing or provide the most relevant and dependable
eliminating red-eye from flash photographs sources of data possible
by using a short burst of light, or pre-flash, to 21. Infographics – used to represent
momentarily "stop-down" the pupils of the information, statistical data, or knowledge in
subject's eyes prior to the actual flash graphical manner; it makes complex data
exposure. become more visually appealing to an
6. Tiff - is a standard file format that is largely average user
used in the publishing and printing industry.
7. Jpeg - image file format used for online
photos and/or artwork.
8. Canva - an Australian graphic design
platform that used to create social media
graphics, presentations, posters,
documents, and other visual content.
9. PhotoScape - A free image manipulation
tool that contains features such as splitter,
color picker and raw converter.
10. WordPress - Content Management System
is a software where you can easily create,
update, organize and publish the content of
your website.
11. Streamyard - is a live video production tool
in your browser.
12. portable design - You may see how your
website appeared on a tablet, phone, and a
large screen using Google Sites' preview
tool.
13. Wix, Weebly - online tools that have drag
and drop tools to make web page creation
easy without the need of coding knowledge.
14. Prezi, Slideshare - image and presentation
software without the trouble of purchasing
What is ICT? 7. Criminal Copyright Infringement – it is an
unauthorized use or stealing of intellectual
ICT stands for Information and Communication property, such as movies and music, for
Technology it deals with the use of different profitable benefit.
communication technologies that locates, saves,
send, and edit information. What is Plagiarism?

World Wide Web (Internet) was invented by Tim Plagiarism is the act of stealing or duplicating
Berners-Lee, most of the web pages were static another person's ideas or works without giving
web (also known as flat page or stationary them due credit
page) or the content is “as is”. The user cannot
manipulate or edit the content of the page, as What is Digital Citizenship?
well as, the content is same for all the users. Digital citizenship is the way we think, act and
Eventually evolved into Web 2.0 or also known be online
as dynamic web it has interactive
characteristics. You can comment, react and One of the threats that you must avoid is the
share. malware. This term came from the blended
words “malicious” and “software”. Internet users
What is cybercrime? usually acquired this threat through online.
Cybercrime is criminal activity that either targets Malware is an umbrella term covering five (5)
or uses a computer, a computer network or a different types:
networked device. Most cybercrime is committed 1. Virus – It is malicious program that usually
by cybercriminals or hackers who want to make transfer from one device to
money. another with the aid of the Internet and local
networks, but commonly
1. Hacking – it is unauthorized accessing of through data storage such
data from a computer network. Mostly, hackers as flash drives or hard drive.
attack commercial and government sites to
cause an alarm or to threat someone. 2. Worm – Unlike the virus, this malware
replicates itself and can transfer by any type of
2. Sport Betting – it is an illegal act of gambling means, but more often through computer
on any sports event that happened over the network.(example: ILOVEYOU worm)
Internet.
3. Trojan - this malicious program disguised as
3. Non-Delivery of Merchandise – a deceiving a useful program, however left your devices
act which the culprit posted a product or service unprotected and became vulnerable to other
on the Internet. Once the victim placed its malwares once you accessed or downloaded it.
payment, the culprit does not give the item or
service. 4. Spyware – a malicious program that monitors
the device, and the actions of the user without
4. Electronic Harassment – an anonymous its knowledge.
criminal who harass, abuse, threat, or annoy
other people. One example of this is 5. Adware – this program automatically sends
cyberbullying. pop-ups advertisements.

5. Child Pornography – Based on Republic Act What is Microsoft Word?


no 9775 or known as Anti-Child Pornography
Act of 2009, it is an act of real or simulated a word processing program that allows for the
explicit sexual activities that involves any child creation of both simple and complex
aged18 and below. documents.

6. Prostitution – it is an illegal act engage in


any sexual activities.
divided by) is zero. It stands for divide by zero
error.

What is mail merge?

Allows you to create documents and combine or


merge them in another document or data file. It
2 – #N/A Error
is commonly used when sending out advertising
materials to various recipients.
This error means “no value available” or “not
STEPS IN CREATING SIMPLE MAIL MERGE available.” It indicates that the formula
cannot find the value that we suppose it may
Step 1: Set Up the Excel Data File. ... return
Step 2: Set Up the Main Document. ...
3 – #NAME? Error
Step 3: Specify the Excel Data Source.
Step 4: Select the Recipients. ... This error is displayed when we usually misspell
Step 5: Complete the Letter and Add Merge the function name.
Fields. 4 – #NULL! Error
Step 6: Save the Document
This error is usually displayed when cell
Step 7: Preview the Letters and Fine-Tune the references are not specified correctly.
Recipient List
Step 8: Complete the Merge 5 – ##### Error

What is Spreadsheet?
This error is displayed when the column width
A spreadsheet is a computer program that can in excel is not enough to show the stored value
capture, display and manipulate data arranged in the cell.
in rows and columns. Example: Microsoft Excel,
Lotus 1-2-3 etc. When inserting charts on your document an
excel application will be pop-ups and allows you
1. The SUM() function, as the name suggests,
to enter the data and manage parameters
gives the total of the selected range of cell
values. What is Microsoft PowerPoint?
2. The AVERAGE() function focuses on It is a presentation-based program that uses
calculating the average of the selected range of graphics, videos, etc. to make a presentation
cell values. more interactive and interesting
3. The function COUNT() counts the total Animation – is any visual effect applied to
number of cells in a range that contains a individual slides or specific objects on slides.
number You can animate text boxes, images, tables or
indices, shapes, or any additional graphics.
4. COUNTIF - function used to count the
number of cells that contains something if the Transition – is the visual effect that occurs when
criteria are met. you move from one slide to the next during a
presentation
List of Various Excel Errors
What is Hyperlink?
1 – #DIV/0 Error
Are similar to links you might have seen on a
#DIV/0! Error is received when we work with a website. They allow you to jump back and forth
spreadsheet formula, which divides two values between specific slides in your presentation, to
in a formula and the divisor (the number being
movie files that don't work on PowerPoint slides,
to other files, or to a webpage (if you are
connected to the Internet).

The 6 Basic Principles of Graphic Design


STEPS IN INSERTING HYPERLINK
1. Balance- The visual weight of objects,
Step 1: Select an object or Text texture, colors, and space is evenly distributed
on the screen.
Step 2: On the Insert tab, click Hyperlink. You
can also right-click and choose Hyperlink. 2. Emphasis- An area in the design that may
Steps 3: Choose one of the link options appear different in size, texture, shape or color
to attract the viewer's attention.
Option 1: Existing File or Webpage
Option 2: Place in this documents 3. Movement - visual elements guide the
Option 3: Create new documents viewer’s eyes around the screen.
Option 4: Email Address
4. Rhythm is achieved when visual elements
Step 4: Click OK to apply your hyperlink
create a sense of organized movement.

Imaging and Design for Online Environment 5. Proportion - Visual elements create a sense
of unity where they relate well with one another.
What is an Image
6. Variety - This uses several design elements to
A physical likeness or representation of a draw a viewer’s attention.
person, animal, or thing, photographed, painted,
sculptured or otherwise made visible.
Inserting, Uploading and Sharing of Images
ONLINE IMAGE FILE FORMATS
over the Internet
1. Joint Photographic Expert Group-
One of the things that the Internet offers the
is a “lossy” format meaning that the image is users is the availability of
compressed to make a smaller file.JPEG files resources. Photo Sharing is one of its features
are very common on the Internet and JPEG is a since the start of the
popular format for digital cameras making it ideal development of Internet.
for web use and non-professional prints.
Photo sharing websites allows users to upload
2. Graphics Interchange Format their images to share with the online community.
are widely used for web graphics, because they
are limited to only 256 colors, can allow for These are some of the most popular photo
sharing websites:
transparency, and can be animated.
1. Photobucket.com
2. Picasa
3. Portable Network Graphics 3. Pinterest
This image is transparent/no background. 4. Imgur.com
5. Imageshack.com
4. Tagged Image File Format.

is a standard file format that is largely used in


WYSIWYG means WHAT YOU SEE, IS WHAT
the publishing and printing industry.
YOU GET that whatever you type, insert, draw,
place, rearrange and everything you do on a
page is what the audience will see.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy