0% found this document useful (0 votes)
24 views25 pages

Pricess RR

Uploaded by

cloudith626
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views25 pages

Pricess RR

Uploaded by

cloudith626
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Is an information space where documents and other

Empowerment web resources are identified by URLs, interlinked by


hypertext links, and can be accessed via the Internet.
Technologies
Invented by Tim-Berners Lee
Web Pages
Web page is a hypertext document connected to the
LESSON 1: INTRODUCTION TO ICT World Wide Web. It is a document that is suitable for
the World Wide Web.

ICT– Information and Communication- It deals with


the use of different communication technologies such as
mobile phones, telephone, Internet to locate, save, send,
The different online platforms of World
and edit information. Wide Web:
Is a study of computers as data processing tools. It
introduces students to the fundamental of using
Web 1.0 – refers to the first stage in the World Wide
computer systems in an internet environment.
Web, which was entirely made up of the Web pages
connected by hyperlinks.

ICT in the Philippines- Philippines is dub as the Web 2.0 – is the evolution of Web 1.0 by adding
‘’ICT Hub of Asia” because of huge growth of ICT- dynamic pages. The user can see a website differently
related jobs, one of which is BPO, Business Process than others. Allows users to interact with the page;
Outsourcing, or call centers. instead of just reading the page, the user may be able to
comment or create user account.
ICT Department in the Philippines is responsible
for the planning, development and promotion of the Web 3.0 – this platform is all about semantic web. Aims
country’s information and communications technology to have machines (or servers) understand the user’s
(ICT) agenda in support of national development. preferences to be able to deliver web content.

Computer– an electronic device for storing and Static Web Page- is known as a flat page or stationary
processing data, typically in binary form, according to age in the sense that the page is ‘’as is’’ and cannot be
instructions given to it in a variable program. manipulated by the user. The content is also the same for
all users that is referred to as Web 1.0
Internet– is the global system of interconnected
computer networks that use the internet protocol suite
(TCIP/IP) to link billions of devices worldwide. Means
of connecting a computer to any other computer
anywhere in the world via dedicated routers and servers. Dynamic Web Pages– web 2.0 is the evolution of web
1.0 by adding dynamic web pages. The user can see
The Net’’, is a worldwide system of computer website differently than others e.g., social networking
networks- a network of networks in which the users at sites, wikis, video sharing sites.
any one computer can get information from any other
computer.
FEATURES OF WEB 2.0
World Wide Web
An information system on the internet that allows Folksonomy- allows user to categorize and classify
documents to be connected to other documents by information using freely chosen keywords e.g., tagging
hypertext links, enabling the user to search for by FB, Twitter, use tags that start with the sign #,
information by moving from one document to another. referred to as hashtag.
Rich User Experience – content is dynamic and is Stumble Upon, Pinterest
responsive to user’s input.

User Participation- The owner of the website is not the c) Social News – Sites that allow users to post their
only one who is able to put content. Others can place a
own news items or links to other news sources. The
content of their own by means of comments, reviews and
users can also comment on the post and comments may
evaluation e.g., Lazada, Amazon.
also be rank.
Long Tail– services that are offered on demand rather
than on a one-time purchase. This is synonymous to
subscribing to a data plan that charges you for time you Ex. Reddit and Digg
spent on the internet.

Software as a service- users will be subscribe to a d) Media Sharing – sites that allow you to upload
software only when needed rather than purchasing them
and share media content like images, music and video.
e.g. Google docs used to create and edit word processing
and spread sheet.

Mass Participation– diverse information sharing Ex. Flickr, YouTube, and Instagram
through universal web access. Web 2.0’s content is based
on people from various cultures.
e) Microblogging – focus on short updates from the
user. Those that subscribed to the user will be able to
receive these updates.
TRENDS IN ICT
Ex. Twitter and Pluck
1.Convergence– is the synergy of technological
advancements to work on a similar goal or task. For
example, besides using your personal computer to create
word documents, you can now use your smartphone.
f) Blogs and Forums – allow user to post their content.
2. Social Media– is a website, application, or online
Other users are able to comment on the said topic.
channel that enables web users web users to create , co-
create, discuss modify, and exchange user generated Ex. Blogger, WordPress, and Tumblr
content.

Mobile Technologies– The popularity of


Six types of social media: smartphones and tablets has taken a major rise over the
years. This is largely because of the devices capability to
do the tasks that were originally found in PCs. Several of
Advertisements these devices can use a high-speed internet. Today the
latest model devices use 4G Networking (LTE), which is
a) Social Networks – These are sites that allows you to currently the fastest.
connect with other people with the same interests or
background. Once the user creates his/her account, MOBILE OS
he/she can set up a profile, add people, share content,
etc.
iOS – use in apple devices such as iPhone and iPad
Example: Facebook and Google+
Android – an open source OS developed by Google.
Being open source means mobile phone companies use
b) Bookmarking Sites – Sites that allow you to store this OS for free.
and manage links to various website and resources. Most
Blackberry OS – use in blackberry devices
of the sites allow you to create a tag to others.
Windows phone OS – A closed source and proprietary PRIVATE CLOUD allows systems and services to be
operating system developed by Microsoft. accessible within an organization. It offers increased
security because of its private nature.
Symbian – the original smartphone OS. Used by Nokia
devices.
WebOS- originally used in smartphone, now in smart COMMUNITY CLOUD allows systems and services to
TVs. be accessible by group of organizations.
Windows Mobile – developed by Microsoft for
smartphones and pocket PCs.
HYBRID CLOUD is a mixture of public and private
Assistive Media– is a non- profit service designed to cloud. However, the critical activities are performed
help people who have visual and reading impairments. A using private cloud while the non-critical activities are
database of audio recordings is used to read to the user. performed using public cloud.
g. Yahoo!, Gmail, HotmailCloud computing-distributed
computing on internet or delivery of computing service
LESSON 2: ONLINE SAFETY, SECURITY AND
over the internet.
RULES OF NETIQUETTE

-Instead of running an e-mail program on your computer,


INTERNET SAFETY- it refers to the online security or
you log in to a Web.
safety of people and their information when using
e-mail account remotely. The software and storage for internet.
your account doesn’t exist on your computer – it’s on the
NETIQUETTE- is network etiquette, the do’s and don’ts
service’s computer cloud.
of online communication.

It has three components

TEN RULES OF NETIQUETTE


Client computers – clients are the device that the end
user interact with cloud.
Rule No. 1: Remember the human
Distributed Servers – Often servers are in geographically
different places, but server acts as if they are working
next to each other.
You need to remember that you are talking to a real
Datacenters – It is collection of servers where person when you are online.
application is placed and is accessed via Internet.
The internet brings people together who would
otherwise never meet.
TYPES OF CLOUDS Remember this saying when sending an email:
Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you
PUBLIC CLOUD allows systems and services to be follow in real life.
easily accessible to the general public. Public cloud may
be less secured because of its openness, e.g. e-mail
You need to behave the same way online that you do
in real life.
You need to remember that you can get caught doing
things you should not be doing online just like you
Do not read other people’s mail without their
can in real life.
permission.
You are still talking to a real person with feelings
Going through other people’s things could cost
even though you can’t see them.
you, your job or you could even go to jail.
Rule no. 3: Know where you are in cyberspace.
Not respecting other people’s privacy is a bad
netiquette.
Always take a look around when you enter a new Rule no. 9: Don’t abuse your power.
domain when surfing the web.
Get a sense of what the discussion group is about
Do not take advantage of other people just because
before you join it.
you have more knowledge or power than them.
Rule no. 4: Respect other people’s time and bandwidth.
Treat others as you would want them to treat you if
the roles were reversed.
Remember people have other things to do besides Rule no. 10: Be forgiving of other people’s mistake.
read your email. You are not the center of their world.
Keep your post and emails to minimum by saying
Do not point out mistakes to people online.
what you want to say.
Remember that you were once the new kid on the
Remember everyone won’t answer your questions.
block.
Rule no. 5: Make yourself look good online.
You still need to have a good manners even though
you are online and cannot see the person face to
face.
Be polite and pleasant to everyone.
Internet security
Always check your spelling and grammar before
posting.
· Know what you are talking about and make sense Security Requirement Triad
saying it.
Rule no. 6: Share expert knowledge

ConfidentIality
Ask questions online
Data confidentiality
Share what you know online.
Privacy
Post the answers to your questions online because
someone may have the same question you do.
Integrity
Rule no. 7: Help keep flame wars under control
Data integerity
System integrity
Netiquette does not forgive flaming.
Availability
Netiquette does however forbid people who are
Threat Consequence Threat Action ( Attack)
flaming to hurt discussion groups by putting the group
down. Unauthorized Disclosure
Rule no. 8: Respect other people’s privacy.
A circumstance or event whereby an entity gains access
to data for which the entity is not authorized.
Repudiation: An entity deceives another by falsely
denying responsibility for an act.
Exposure: Sensitive data are directly released to an
unauthorized entity.
Usurpation
Interception: An unauthorized entity directly accesses
A circumstances or event that results in control of
sensitive data traveling between authorized sources and
system services or functions by an unauthorized entity.
destinations.

Misappropriation: An entity assumes


Inference: A threat action whereby an unauthorized
entity indirectly accesses sensitive data by reasoning unauthorized logical or physical control of a
from characteristics or byproducts of communications.
system resource.
Misuse: Causes a system component to perform a
Intrusion: an unauthorized entity gains access to function or service that is detrimental to system security.
sensitive data by circumventing a system’s security
protections.
Types of System Intruders

Disruption
A circumstances or even that interrupts or prevents the Masquerader
correct operation of system services and functions. Hackers
Clandestine user
Deception

A circumstance or event that may result in an authorized Parts of Virus


entity receiving false data and believing it to be true.

Infection mechanism
Incapacitation: prevents or interrupts system operation
by disabling a system component. Trigger

Corruption: Undesirably alters system operation by PayloaD


adversely modifying system functions or data.
Virus stages

Obstruction: A threat action that interrupts delivery of


Dormant phase
system services by hindering system operation.
Virus is idle.
Propagation phase
Masquerade: An unauthorized entity gains access to a Virus places an identical copy of itself into other
system or performs a malicious act by posing as an programs or into certain system areas on t the disk.
authorized entity.
Triggering phase
Virus is activated to perform the function for which it

Falsification: False data deceive an authorized entity.


was intended. Caused by a Pharming- a more complicated way of phishing where it
variety of system events exploits the DNS system.
Execution phase
Function is performed
Copyright- a part of law, wherein you have the rights to
Key Terms work, anyone who uses it w/o your consent is punishable
by law.

Cyber crime- a crime committed or assisted through the


use of the Internet. Fair Use- means that an intellectual property may be
used w/o consent as long as it is used in commentaries,
criticism, parodies, research and etc.
Privacy Policy/Terms of Services (ToS) – tells the user
how the website will handle its data.
Keyloggers- used to record the keystrokes done by user.
This is done to steal passwords or any other sensitive
Malware- stands for malicious software. information.

Virus- a malicious program designed to transfer from Rogue security softwares– is a form of malicious
one computer to another in any means possible. software and internet fraud that misleads users into
believing there is a virus on their computer, and
manipulates them into paying money for a fake malware
Worms– a malicious program designed to replicate itself removal tool.
and transfer from one file folder to another and also
transfer to other computers.
Four search strategies

Trojan-a malicious program designed that is disguised as


a useful program but once downloaded or installed, Keyword searching
leaves your PC unprotected and allows hacker to get
Enter terms to search
your information.

Use quotation marks to search as a phrase and keep the


Spyware– a program that runs in the background without
words linked together
you knowing it. It has the ability to monitor what you are
currently doing and typing through key logging.
Common words are ignored (That, to, which, a, the …)
Adware- a program designed to send you advertisement,
mostly pop-ups.
+ and – can be used to include or exclude a word

Spam– unwanted email mostly from bots or advertisers.


Boolean
AND – enter words connect with AND- it will include
Phishing- acquires sensitive personal information like sites where both words and found
passwords and credits card details.
Uses: joining different topics (i.e. global warming
AND California)
One of the important reasons in using computers
per se is its ability to do recurring tasks automatically.
But this ability has to be honed by learning the
OR – requires at least one of the terms is found.
characteristics and features of the software you use with
your computer. After all, no matter how good or advance
your computer and software may be, it can only be as
Uses: join similar or synonymous topics (i.e. global good as the person using it.
warming OR greenhouse effect)

In this particular part of our lesson, we will learn


NOT – searches for the first term and excludes sites that one of the most powerful and commonly used features of
have the second term. Microsoft Word called Mail Merge. As the name
suggests, this feature allows you to create documents
and combine or merge them with another document or
(i.e. Washington NOT school) data file. It is commonly used when sending out
advertising materials to various recipients.

Question
The simplest solution for the scenario above is to
a question may be entered in the search field of search
create a document and just copy and paste it several
engine
times then just replace the details depending on whom
you send it to. But what if you have hundreds or
thousands of recipients? Would not that take too many
Advanced hours? What if you have a small database of information
Features are offered on many engines by going to an where you can automatically generate those letters?
“Advanced search” page and making selections.
Effective in narrowing search returns to a specific topic
or phrase.
mail-merge
LESSON 3: Advanced Word Processing Skills
Lesson Discussion
Two Components of Mail Merge

In the professional world, sending out information to


1. Form Document
convey important information is vital. Because of ICT,
things are now sent much faster than the traditional
newsletters or postal mail. You can now send much
faster than the traditional newsletters or postal mail. You The first component of our mail merged document
can now use the Internet to send out information you is the form document. It is generally the document that
need to share. What if we could still do things much contains the main body of the message we want to
faster – an automated way of creating and sending convey or send. The main body of the message is the
uniform letters with different recipients? Would that not part of the form document that remains the same no
be more convenient? matter whom you send it to from among your list.

I. Mail Merge and Label Generation Also included in the form document is what we
call place holders, also referred to as data fields or merge
fields. This marks the position on your form document
where individual data or information will be inserted.
A. Mail Merge
From our sample document, the place holders are
denoted or marked by the text with double-headed
arrows (<< >>) on each side and with a gray individual addresses. So even in generating labels, the
background. On a printed standard form, this will be the two essential components of creating a merged
underlined spaces that you will see and use as a guide to document are present: the form document and the data
where you need to write the information that you need to file. Only in this case, you did not have to type or create
fill out. In its simplest form, a form document is literally the form document yourself because it was already
a “form” that you fill out with individual information. A created and pre-formatted in Microsoft Word. All you
common example of a form document is your regular tax need to do is select the correct or appropriate size for the
form or application form. label or envelope and select the data file that contains the
addresses (data) to be printed. You can also preview your
merged labels before printing if you want to.
form-document

Image result for Label Generation microsoft word 2010


2. List or Data File mail merge

The second component of our mail merged II. Integrating Images and External Materials
document is the list or data file. This is where the
individual information or data that needs to be plugged
in (merged) to the form document is placed and Integrating or inserting pictures in your document
maintained. One of the best things about the mail merge is fun and it improves the impression of your document.
feature is that it allows data file to be created fro within A common use of inserting a picture on a document is
the Microsoft Word application itself, or it gets data from when you are creating your resume. Though seemingly
a file created in Microsoft Excel or other data formats. In simple to do, your knowledge on the different kinds of
this way, fields that needed to be filled up on the form materials that you can insert or integrate in a Word
document can easily be maintained without accidentally document and its characteristics can help you create a
altering the form or main document. You can also easily more efficient, richer document not only in content but
add, remove, modify, or extract your data more also in physical form. A better understanding of the
efficiently by using other data management applications physical form of your document as well as the different
like Excel or Access and import them in Word during the materials you would integrate in it would allow you to
mail merge process. be more efficient and versatile in using Microsoft Word.

list-or-data-file A. Kinds of Materials

B. Label Generation There are various kinds of materials Microsoft


Word is capable of integrating to make the documents
richer, more impressive, and more informative.
Included in the mail merge feature on Microsoft
Word is the Label Generator. It just makes sense that
after you print out your form letters, you will need to 1. Pictures
send it to individual recipients in an envelope with the
matching address printed directly on the envelope or on
a mailing label to stick on. By using virtually the same Generally, these are electronic or digital pictures
process as a standard mail merge, Microsoft Word will or photographs you have saved in any local storage
print individual addresses to a standard form that it has device. There are three commonly used types of picture
already pre-formatted. Simply put, it creates a blank files. You can identify them by the extension on their file
form document that simulates either a blank label or names.
envelope of pre-defined size and will use the data file
that you selected to print the information, typically
Image result for picture icon in microsoft word 2010 This is pronounced as “ping“. It stands for
office Portable Network Graphics. It was built around the
capabilities of .GIF. Its development was basically for
the purpose of transporting images on the Internet at
a. .JPG/JPEG faster rates. It is also good with transparencies but unlike
.GIFs, it does not support animation but it can display up
to 16 million colors, so image quality for this image file
This is pronounced as “jay-peg“ and is the short type is also remarkably improved. .PNG allows the
form of .jpeg or Joint Photographic Experts Group. Like control of the transparency level or opacity of images.
all the rest of the image file extensions, it identifies the
kind of data compression process that it uses to make it
more compatible and portable through the Internet. This Image result for png picture
type of image file can support 16.7 million colors that is
why it is suitable for use when working with full color
photographic images. Unfortunately, it does not support Example of .png format picture.
transparency and therefore, images of this file type can
be difficult to integrate in terms of blending with other
materials or elements in your document. But if you are 2. Clip Art
looking for the best quality image to integrate with your
document then this is the image file type for you. .JPG
does not work well on lettering, line drawings, or simple This is generally a .GIF type; line art drawings or
graphics. .JPG images are relatively small in file size. images used as generic representation for ideas and
objects that you might want to integrate in your
document. Microsoft Word has a library of clip arts that
b. .GIF is built in or can be downloaded and used freely. There
are still other clip arts that you can either purchase or
freely download and use that come from third-party
This stands for Graphics Interchange Format. This providers.
type of image file is capable of displaying
transparencies. Therefore, it is good for blending with
other materials or elements in your document. It is also Image result for clipart icon in microsoft office
capable of displaying simple animation. Apparently, this
may not be too useful on a printed document but if you
are sending documents electronically or through email, Clip Art Icon in Microsoft Office 2010.
or even post documents into a website, then this could be
quite impressive. The downside is that it can only
support up to 256 colors so it is good mostly on logos
3. Shapes
and art decors with very limited, and generally solid
colors. .GIF is much better for logos, drawings, small
text, black and white images, or low-resolution files.
These are printable objects or materials that you
can integrate in your document to enhance its
appearance or allow you to have some tools to use for
Image result for gif picture
composing and representing ideas or messages. If you
are designing the layout for a poster or other graphic
material for advertising, you might find this useful.
Example of a .gif format picture.

Image result for shapes icon in microsoft word 2010


c. .PNG office
Shapes Icon under the Insert ribbon tab. only the part that you exactly like to capture on your
screen.

4. Smart Art
croop

Generally, these are predefined sets of different


shapes grouped together to form ideas that are III. Image Placement
organizational or structural in nature. If you want to
graphically represent an organization, process,
relationships, or flow for infographic documents, then Image result for text wrapping options in microsoft
you will find this easy and handy to use. word 2010

Image result for smart art icon in microsoft word 2010 Layout of text wrapping options.
office

A. In Line with Text


Smart Art

This is the default setting for images that are inserted or


5. Chart integrated in your document. It treats your image like a
text font with the bottom side totally aligned with the
text line. This setting is usually used when you need to
Another type of material that you can integrate in your place your image at the beginning of a paragraph. When
Word document that allows you to represent data placed between texts in a paragraph or a sentence, it
characteristics and trends. This is quite useful when you distorts the overall appearance and arrangement of the
are preparing reports that correlate and present data in a texts in the paragraph because it will take up the space it
graphical manner. You can create charts that can be needs vertically, pushing whole lines of texts upward.
integrate in your document either directly in Microsoft
Word or imported from external files like Microsoft
Excel. B. Square

Image result for charts icon in microsoft word 2010 This setting allows the image you inserted to be placed
office anywhere with the paragraph with the text going around
the image in a square pattern like frame.

Chart – Used to illustrate and compare data.


C. Tight

6. Screenshot
This is almost the same as the Square setting, but here
the text “hug” or conforms to the general shape of the
Sometimes, creating reports or manuals for training or image. This allows you to get a more creative effect on
procedures will require the integration of a more realistic your document. This setting can mostly be achieved if
image of what you are discussing on your report or you are using an image that supports transparency like
manual. Nothing can get you a more realistic image than a .GIF or .PNG file.
a screenshot. Microsoft Word even provides a snipping
tool for your screen shots so you can select and display
D. Through .JPG – file extension for the Joint Photographic Experts
Group picture file.
.PNG – file extension for Portable Network Graphics
This setting allows the text on your document to flow
image file.
even tighter taking the contours and shape of the image.
Again, this can be best used with .GIF or .PNG type of .GIF – file extension for the Graphics Interchange
image. Format image file.
Clipart – line art drawings or images used as a generic
representation for ideas and objects.
E. Top and Bottom
Smart Art – predefined sets of different shapes grouped
together to form ideas that are organizational or
This setting pushes the texts away vertically to the top structural in nature.
and/or the bottom of the image so that the image
Text Wrap – adjusts how the image behaves around other
occupies a whole text line on its own.
objects or text.
LESSON 4: Advanced Spreadsheet Skills
F. Behind Text
What is a Spreadsheet Software? • allows users to
organize data in rows an columns and perform
calculations on the data • These rows and columns
This allows your image to be dragged and placed collectively are called worksheet.
anywhere on your document but with all the texts
floating in front of it. It effectively makes your image 3. Examples of Spreadsheet Software: • LibreOffice Calc
look like a background. • OpenOffice.org Calc • Google Sheets • Apple iWork
Numbers • Kingsoft Office Spreadsheets • StarOffice
Calc • Microsoft Excel
G. In Front of Text 4. MICROSOFT EXCEL
5. To open Microsoft Excel, Press “Windows Logo” + R
As it suggests, this setting allows your image to be then type “excel” then enter.
placed right on top of the text as if your image was 6. Key Terms in MS Excel: • Row – horizontal line of
dropped right on it. That means whatever part of the text entries in a table • Column – vertical line of entries in a
you placed the image on, it will be covered by the table • Cell – the place where info. is held in a
image. spreadsheet
7. Key Terms in MS Excel: • Active Cell – the selected
IV. Key Terms cell • Column Heading – the box at the top of each
column containing a letter • Row Heading – the row
number
Mail Merge – a feature that allows you to create 8. Key Terms in MS Excel: • Cell Reference – the cell
documents and combine or merge them with another address of the cell usually combine letter and number
document or data file. (ex. A1, B4, C2) • Merge – combining or joining two or
more cells • Formula – is an expression which calculates
Form Document – the document that contains the main
the value of a cell.
body of the message we want to convey or send.
9. Key Terms in MS Excel: • Functions – are predefined
Data File – includes the individual information or data or
formulas and are already available in Excel • Formula
the recipient’s information.
Bar – the bar that displays the contents of a cell
Merge Field/Place Holder – marks the position on your
10. FUNCTIONS
form document where individual data or information
will be inserted.
11. BASIC MATH OPERATIONS: • =SUM(x,y) or 21. OTHER FUNCTIONS: • =TODAY() – returns the
=SUM(range) – returns the sum of x and y or (all the current date • =NOW() – returns the current date and
numbers within the range) • =PRODUCT(x,y) – returns time
the product of x and y • =QUOTIENT(x,y) – returns the
22. EXERCISES
quotient of x divided by y • =x-y – returns the difference
of x subtracted by y 23. Consider this data: NAME MATH GRADE
SCIENCE GRADE FILIPINO GRADE ENGLISH
12. BASIC MATH OPERATIONS: • =x+y – returns the
GRADE A.P GRADE MARK 75 70 78 81 78 PETE 84
sum of x and y • =x*y – returns the product of x and y •
87 86 88 85 ANA 91 92 95 90 90 REA 73 75 74 75 70
=x/y – returns the quotient of x divided by y • =x-y –
returns the difference of x subtracted by y 24. Give the formulas to get : • Mark’s , Pete’s, Ana’s
and Rea’s averages • The highest grade that Ana got •
13. OTHER FUNCTIONS: • =ABS(x) – returns the
The lowest grade that Mark got? • Sum of all Math
absolute value of x • =AVERAGE(x,y) – returns the
Grade? Science? A.P.? • Sum of all Rea’s Grades • The
average of x and y • =CONCATENATE(x,y) – joins x
Lowest Number among all grades • The remarks (Passed
and y
or Failed)
14. OTHER FUNCTIONS: • =IF(Condition, x, y) –
25. Now, consider this data: FIRST NAME MIDDLE
returns x if the condition is true, else it returns y •
NAME LAST NAME MARK CURTIS WILLIAMS
=ISEVEN(x) – returns true if x is an even number •
PETE MCCLOEY HARRISON ANA MONROE FRITZ
=ISODD(x) – returns true if x is an odd number
REA TAN COLLINS
15. OTHER FUNCTIONS: • =COUNT(range) – counts
26. Give the formulas to get : • Mark’s Full Name •
the number of cell containing a number within a range •
Ana’s Full Name in Proper Case • Count the number of
=COUNTIF(range, criteria) – count the number of cell
letters that Pete’s Last Name has • “COLL” from Rea’s
that fits with the criteria within the range
Last Name • “LOEY” from Pete’s Middle Name •
16. OTHER FUNCTIONS: • =ISNUMBER(x) – returns Combining “WILL” and “LINS” from Mark and Rea’s
true if x is a number • =ISTEXT(x) – returns true if x is Last Names respectively
a text • =LEN(x) – returns the length of characters in x •
LESSON 5: Advanced Presentation Skills
=PROPER(x) – returns the proper casing of x
Powerpoint is a highly innovative and versatile program
17. OTHER FUNCTIONS: • =LEFT(x,y) – returns the
that can ensure a successful communication whether
characters of x specified by y (from the left) •
you’re presenting in front of potential investors, a lecture
=RIGHT(x,y) – returns the characters of x specified by y
theatre or simply in front of your colleagues. The
(from the right) • =PI() – returns the value of pi
following are the five features you should be using-if
18. OTHER FUNCTIONS: • =MIN(x,y) – returns the youy aren’t already. Learn everything about these tips:
smallest number between x and y • =MAX(x,y) – returns they will improve your presentation skills and allow you
the largest number between x and y • =MIN(range) – to communicate your message successfully. The five
returns the smallest number within the range • features of powerpoint was
=MAX(range) – returns the largest number within the
range
1)adding smart art
19. OTHER FUNCTIONS: • =POWER(x,y) – returns
the value of x raised to the power of y • =ROUND(x,y) –
rounds x to a specified number of digits (y)
=COLUMN(x) – returns the column number of x • 2)Inserting Shapes
=ROW(x) – returns the row number of x
20. OTHER FUNCTIONS: • =SQRT(x) – returns the 3)Inserting and Image
square root of x • =TRIM(x) – removes extra spaces in x
• =UPPER(x) – returns x in all capital form •
=LOWER(x) – returns x in non- capital form
4)Slide Transitions
5)Adding Animations
Graphic software programs
Creating an Effective Presentation
1. Minimize: Keep slides counts to a minimum to Which can be broadly grouped into vector graphics
maintain a clear message and to keep the audience editors, raster graphics editors, and 3D modelers are the
attentive. Remember that the presentation is just a visual primary tools with which a user may manipulate,
aid. Most information should still come from the enhance, and transform images. Many image editing
reporter. programs are also used to render or create computer art
from scratch.
2.Clarity: Avoid being to fancy by using font style that is
easy to read. Make sure that it is also big enough to be BASIC OF IMAGE EDITING
read by the audience. Once you start making your
presentation, consider how big the screen is during your
report. RASTER IMAGESare stored in a computer in the form
of a grid of picture elements or pixels.
3.Simplicity: Use bullets or short sentences. Summarize
the information on the screen to have your audience VECTOR IMAGESsuch as Adobe Illustrator, Inkscape
focus on what the speaker is saying than on reading the and etc. are used to create and modify vector images,
slide. Limit the content to six lines and seven words per which are stored as descriptions of lines, Bezier curves
line. This is known as the 6 x 7 rule. and text instead of pixels.
4. Visual: Use graphics to help in your presentation but DIFFERENCE BETWEEN RASTER AND VECTOR
not too many to distract the audience. In addition, IMAGES
instead of using table of data, use charts and graphs.
5. Consistency: Make your design uniform. Avoid
having different font styles and backgrounds.
6. Contrast: Use a light font on dark background or vice RASTER IMAGESuse many colored pixels or
versa. This is done so that it is easier to read. In most individual building blocks to form a complete image
instances, it is easier to read on screen if the background JPEGs, GIFs and PNGs are common raster image types.
is dark. This is due to the brightness of the screen. Almost all of the photos found on the web and in print
catalogs are raster images.
LESSON 6: Imaging and Design for Online
Environment
VECTOR IMAGES alternatively, allow for more
flexibility. Constructed using mathematical formulas
rather than individual colored blocks, vector file types
such as EPS, AI and PDF are excellent for creating
PHOTO EDITING
graphics that frequently require resizing.
3. 3D MODELING (OR MODELLING) is the process
Photo editing encompasses the processes of altering of developing a mathematical representation of any three
images, whether they are digital photographs, traditional dimensional surface of an object via specialized
photo chemical photographs, or illustrations. Traditional software. The product is called a 3D model. It can be
analog image editing is known as photo retouching, displayed as a two-dimensional image through a process
using tools such as an airbrush to modify photographs, called 3D rendering or used in a computer simulation or
or editing illustrations with any traditional art medium. physical phenomena. The model can also be physically
created using 3D printing devices.
Ø MARQUEE TOOL for selecting rectangular or other
regular polygon-shaped regions
IMAGE FORMATS

Ø LASSO TOOL for freehand selection of a region


Ø JPEG is a commonly used method of lossy
compression for digital images, particularly for those
images produced by a digital photography.
Ø MAGIC WAND TOOL selects objects or regions in
the image defined by proximity of color or luminance
Ø PNG (PORTABLE NETWORK GRAPHICS) is a
raster graphics file format that supports lossless data
compression.
LAYERS which are analogous to sheets of transparent
acetate, stacked on top of each other, each capable of
Ø GIF a lossless format for image files that supports being individually positioned, altered and blended with
both animated and static images. the layers below, w/o affecting any of the elements on
the other layers.

Ø BMP is a raster graphics image used to store bitmap


digital images

Ø EPS used in vector-based images in Adobe Illustrator.


IMAGE SIZE resize images in a process often called
image scaling, making them larger, or smaller. High
Ø SVG is an XML-based vector image format for two-
image resolution cameras can produce large images
dimensional graphics w/ support for interactivity and
which are often reduced in size for Internet use.
animation

CROPPING creates a new image by selecting a desired


Ø .3ds is one of the file formats used by the Autodesk
rectangular portion from the image being cropped. The
3Ds Max 3D Modelling, animation and rendering
unwanted part of the image is discarded. Image cropping
software.
does not reduce the resolution of the area cropped.

Ø .fbx is an exchange format, in particular for


interoperability between Autodesk products and other
digital content creation software

FEATURES OF IMAGE EDITORS


CLONING uses the current brush to copy from an image
or pattern. It has many uses: one of the most important is
to repair problem areas in digital photos.
SELECTION One of the prerequisites for many of the
app mentioned below is a method of selecting part(s) of
an image, thus applying a change selectively without IMAGE ORIENTATION – Image editors are capable of
affecting the entire picture altering an image to be rotated in any direction and to
any degree. Mirror images can be created and images
can be horizontally flipped or vertically flopped. Rotated Brightening lightens the image so the photo brightens
image usually require cropping afterwards, in order to up. Brightness is a relative expression of the intensity of
remove the resulting gaps at the image edges. the energy output of a visible light source.

Adjusting contrast means adjusting brightness because


they work together to make a better image.

PERSPECTIVE – is the art of drawing solid objects on a


two- dimensional surface so as to give the right PHOTO MANIPULATION
impression of their height, width, depth and position in
relation to each other when viewed from a particular
point. Photo manipulation involves transforming or altering a
photograph using various methods and techniques to
achieve desired results. Some photo manipulations are
considered skillful artwork while others are frowned
upon as unethical practices, especially when used to
deceive the public, such as hat used for political
SHARPENING AND SOFTENING– Sharpening makes propaganda , or to make a product or person look better.
images clearer. Too much sharpening causes grains on
the surface of the image. Softening makes images softer
that removes some of the highly visible flaws. Too much
causes the image to blur.

DIFFERENCES
PHOTO EDITING – signifies the regular process used
to enhance photos and to create them ‘’Actual editing
simple process’’. Also includes some of the regular
programs used for editing and expose how to use them.
SATURATION- is an expression for the relative
PHOTO MANIPULATION – includes all simple editing
bandwidth of the visible output from a light source. As
techniques and have some manipulation techniques like
saturation increase, colors appear more “pure.’’ As
erasing, adding objects , adding some graphical effects,
saturation decreases, colors appear more ‘’ washed-out.’’
background correction, creating incredible effect, change
elements in an image, adding styles , eliminating
blemishes from a person’s face and changing the
features of a person’s body.

CONTRAST AND BRIGHTENING

b.) Infographics
Contrast of images and brighten or darken the image.
Underexposed images can be often be improved by
using this feature. also known as data visualization, information design,
and communication design
It is any graphic that display and explains information, b)Don’t use more than 3 color palletes
whether that be data or words. When we use the term
c)Typography matters a lot
‘’infographics’’, we’re using it as a general term used to
describe data presented in a visual way. d)Include source and references
Infographics are important because they change the way
people find and experience stories. Infographics are
being used to augment editorial content on the web, it
create a new way of seeing the world of data, and they LESSON 7: Online Platforms for ICT Content
help communicate complex ideas in a clear and beautiful Development
way.
1.Facebook
TYPES OF INFOGRAPHICS
Posted on February 13, 2017
Marketplace – allows members to post, read and respond
Statistical to classified ads.
Process Flow Groups – allows members who have common interests
Geographic to find each other and interact.

PROCESS OF MAKING INFOGRAPHICS Events – allows members to publicize an event, invite


guests and track who plans to attend.
Pages – allows members to create and promote a public
Research page built around a specific topic.
a)Know what is needed Presence technology – allows members to see which
contacts are online and chat.
b)Take a reference
Within each member’s personal profile, there are several
c)Know the audience
key networking components. The most popular is
d)Decide the type of infographics arguably the Wall, which is essentially a virtual bulletin
board. Messages left on a member’s Wall can be text,
Brainstorm
video or photos. Another popular component is the
a)Gather ideas virtual Photo Album. Photos can be uploaded from the
desktop or directly from a smartphone camera. There is
b)Build thought process no limitation on quantity, but Facebook staff will remove
Design inappropriate or copyrighted images. An interactive
album feature allows the member’s contacts (who are
a) Choose your tool and start designing called generically called “friends”) to comment on each
other’s photos and identify (tag) people in the photos.
Review
Another popular profile component is status updates, a
a) Cross check the data to deliver flawless output microbloggingfeature that allows members to broadcast
short Twitter-like announcements to their friends. All
Launch interactions are published in a news feed, which is
a) Make it viral distributed in real-time to the member’s friends.

b) Share on social network


BEST PRACTICES WHEN CREATING Facebook offers a range of privacy options to its
INFOGRAPHICS members. A member can make all his communications
visible to everyone, he can block specific connections or
he can keep all his communications private. Members
can choose whether or not to be searchable, decide
a)Maintain a structure
which parts of their profile are public, decide what not to
put in their news feed and determine exactly who can see
their posts. For those members who wish to use SMS or a mobile device app.[10] Twitter Inc. is based in
Facebook to communicate privately, there is a message San Francisco, California, United States, and has more
feature, which closely resembles email. than 25 offices around the world.

2. Instagram Twitter is about learning and adding value


instagram It is also about adding value to others by giving or
sharing something valuable to them so that they are able
to learn something. That is why I usually tweet about
Instagram is an online mobile photo-sharing site that stuff that I read, learned or have good value. I have
allows its users to share pictures and videos either learned so much from the others that is why I love
publicly or privately on the app, as well as through a twitter. It is also about helping others, I disagree with
variety of other social networking platforms, such as many‘experts’ that say you should only follow
Facebook, Twitter, Tumblr, and Flickr. Originally, a ‘influential’ users because I don’t judge someone that
distinctive feature was that it confined photos to a square way, and because I believe the people at Twitter don’t
shape, similar to Kodak Instamatic and Polaroid SX-70 believe in them either. I also disagree that you should
images, in contrast to the 4:3 aspect ratio typically used only share your own stuff otherwise you will dilute your
by mobile device cameras. In August 2015, version 7.5 brand. Sure it makes sense but 24/7 sharing your own
was released, allowing users to upload media captured in blog post and following influential people?
any aspect ratio. Users can also apply digital filters to
their images. Videos on Instagram debuted in June 2013,
allowing prerecorded square standard definition BLOGGING SITES
resolution clips of up to 15 seconds to be shared; later
Weebly
improvements added support for widescreenresolutions
of up to 1080p and longer recording times for either weebly_logo_copy
prerecorded (up to one minute) or disappearing live (up
to one hour) videos.

Instagram was created by Kevin Systrom and Mike


Krieger, and launched in October 2010 as a free mobile Weebly is one of the easiest website builders in the
app. The service rapidly gained popularity, with over market. They allow you to drag and drop content into a
100 million active users as of April 2012[10][11] and website, so it’s very intuitive to use (click here to see our
over 300 million as of December 2014.[12] Instagram is opinion on Weebly).
distributed through the Apple App Store and Google
Play.[13]Support for the app is available for iPhone,
iPad, iPod Touch, Windows 10 devices and Android
By using Weebly’s website building elements, you can
handsets, while third-party Instagram apps are available
literally drag them into your website and have a website
for BlackBerry 10 and Nokia-Symbian Devices.
built relatively quickly, and painlessly. The beauty of
this system is that you can pretty much drag the elements
to wherever you want – so it’s not very restrictive on
3. Twitter where and how you place your website content.
logo_twitter_withbird_1000_allblue

Weebly’s elements include pictures, paragraphs, videos,


Twitter is an online news and social networking service buttons, maps, contact forms – basically all the basics
where users post and interact with messages, “tweets,” for website building.
restricted to 140 characters. Registered users can post
tweets, but those who are unregistered can only read
them. Users access Twitter through its website interface, 2. Tumblr
Tumblr_Logo.svg.png It” button, with pinboards typically organized by a
central topic or theme. Users can personalize their
experience by pinning items, creating boards, and
Tumblr is a popular microblogging platform designed interacting with other members. The end result is that the
for creative self-expression. It is considered a mindful “pin feed” of each user displays unique, personalized
alternative to Facebook and other social media websites results.
where users blog on a myriad of topics.

Content can also be found outside of Pinterest and


You can link your Tumblr account to other social similarly uploaded to a board via the “Pin It” button,
networks you use and you can feed your traditional blog which can be downloaded to the bookmark bar on a web
or other RSS feed to your Tumblelog. You can also browser, or be implemented by a webmaster directly on
create static pages such as your own Questions page that the website. They also have the option of sending a pin
people are automatically taken to when they ask you a to other Pinterest users and email accounts through the
question. If you want to make your Tumblelog look “Send” button. Some websites include red and white
more lie a traditional website, you can do it by adding “pin it” buttons on items, which allow Pinterest users to
pages. You can make your Tumblelog private or just pin them directly.
make specific posts private as needed, and you can
schedule posts to publish in the future.
Initially, there were several ways to register a new
Pinterest account. Potential users could either receive an
Tumblr is perfect for people who don’t need a full blog invitation from an already registered friend, or they
to publish lengthy posts. It’s also great for people who could request an invitation directly from the Pinterest
prefer to publish quick multimedia posts, particularly website that could take some time to receive. An account
from their mobile devices. Tumblr is also a great choice can also be created and accessed by linking Pinterest to a
for people who want to join a larger community. If a Facebook or Twitter profile. When a user re-posts or re-
blog is too much or too big for you, but Twitter is too pins an image to their own board, they have the option of
small or too little for you and Instagram isn’t versatile notifying their Facebook and Twitter followers. This
enough for you, then Tumblr might be just right for you. feature can be managed on the settings page.

It’s also easy to invite other people to contribute to your


Tumblelog.
On the main Pinterest page, a “pin feed” appears,
displaying the chronological activity from the Pinterest
boards that a user follows.
If you want to track your stats, you can add any analytics
tracking code to your Tumblelog. Some users will even
burn a feed with Feedburner, create custom themes, and
A “board” is where the user’s pins are located. Users can
use their own domain names
have several boards for various items such as quotes,
travel or, most popularly, weddings. A “pin” is an image
that has either been uploaded or linked from a website.
3. Pinterest Once users create boards and add pins, other users can
images.png now repin, meaning they can pin one user’s image to
their board as well. Once the user has set up their
account and boards, they can browse, comment, and like
other pins. Users might be discouraged by repeated
Pinterest is a free website that requires registration to
images and difficult-to-follow direct linking features.
use.Users can upload, save, sort, and manage images—
Pinterest has also added the option of making boards
known as pins—and other media content (e.g., videos)
“secret” so that the user can pin to and view boards that
through collections known as pinboards. Pinterest acts as
only the user can see when logged into their own
a personalized media platform. Users can browse the
account.
content of others in their feed. Users can then save
individual pins to one of their own boards using the “Pin
Pinterest does not generate its own content; rather, it – Weebly Web Builder ( https://www.weebly.com/ )
draws from many resources around the web and
compiles them in one convenient location for users.
– Wix Web Builder ( https://www.wix.com/ )

– Siteground Builder ( https://www.siteground.com/)

LESSON 8: Basic Web Page Creation


LESSON 9: Collaborative ICT Development
1.) What are the advantages and disadvantages of a
WYSIWYG editor? Web portal
a website that contains information from different
sources and places them in one location in a uniform
ADVANTAGE :
way
Yahoo!
-You don’t need any scripting/coding experience.
example of a web portal
yahoo.com
– It’s simple and easy for beginners.
offers a web portal where news, email, weather, etc. are
found in one place
– Everything moves fluently, and you can easily preview Facebook groups ; WordPress ; Google Drive ; Microsoft
what you want. Office Online ; Microsoft’s
Yammer ; Trello
DISADVANTAGE : examples of online collaborative tools
Facebook groups
-A lot of HTML code churned out by the editors is used to create a group page that will allow people in
superfluous which makes the web pages bulky in file your group to communicate your ideas
size
WordPress
allows you to multiple contributors for a single blog
-WYSIWYG editors let you ignore certain aspects that
Google Drive and Microsoft Office Online
are important.
allow multiple people to work on different office files
and even have their own group’s cloud storage
-WYSIWYG editors simply do not provide enough
Microsoft’s Yammer
support and help in optimizing your web site for search
engines. offers companies to have their own social network that
allows sharing and managing content
Trello
offer an online to-do checklist for your entire team
LESSON 10: Interactive Multimedia
2.) List Down (3) more WYSIWYG web hosting
services and their URL. World Wide Web
world-wide-wait

WWW LESSON 11: ICT as Platform for Change


CNN The Role of ICT in Recent History
now hosts videos placed on their home page, which was
unthinkable in the past because of slow internet speed
Throughout recent history, the Philippines have been
on-demand one of a few nations that demonstrate unity for a call to
action or social change. These campaigns for social
Videos way back then were never on the home page and
change would have not been successful if it were not for
can be viewed “____________” or only when a user
ICT.
clicks on it.
videos (youtube)
EDSA (PEOPLE POWER REVOLUTION). The people
power revolution lasted from 1083 to 1986. During a
sound, music, or audio (soundcloud) radio broadcast of Radio Veritas, Cardinal Sin
encouraged the Filipinos to help end the regime of then
President Ferdinand Marcos. A major protest took place
online games (farmville) along the EDSA from February 22 to 25, 1986 involving
two million Filipinos from different sectors. These
included civilians, political parties, the military and
religious groups.
online tests (iq and personality test)
EDSA DOS.This is also known as the 2001 EDSA
Revolution, happened during January 17 to 21, 2001. It
courseware (e-learning courses) was fueled after 11 prosecutors of the President Joseph
Estrada walked out of the impeachment trial. As a result,
the crowd in EDSA grew over the course of a few days
podcasts (ted talks, ear biscuits, the starters, stuff you through text brigades.
should know) Million People March.This is a series pf protest that
mainly took place in Luneta Park from august 22 to 26,
2013. There were also several demonstrations that
vodcasts (video game high school and gmm) happened around key cities in the Philippines and some
location overseas. The organizers and promoters of the
Million People March used Facebook and Change.org as
multimedia contents (7) their, mediums.

online tests Yolanda People Finder.Recent storms in Philippines


history gave birth to the People finder database powered
online survey forms and tests that automatically display by Google. During typhoon Yolanda, the people finder
the results when finished was a vital tool for people across the globe to track the
courseware situation of their relatives. This proved to be successful
and is now adapted by more organizations to help people
online courses that stimulate the classroom online track relatives during calamities.
podcasts Change.org
an episodic series of audio or text files streamed online
embed Change.org is dubbed as the “world’s platform for
to place an object from one site to another change” where anyone from the online community can
create a petition and ask others to sign in it. During the
past times petitions are only done through signing a 3.Description-includes all the necessary information
paper, usually done by a group asking for signatures via about the project. In ICT, it involves the sites you are
travel. Change.org gives access to more people by going to produce and the purpose of each and how they
allowing the online community to affix their digital work in unison.
signatures on petition.

4.Support-contains the budget needed for the project.


Signing an Online Petition Some concept papers do not specify any amount
requested from the sponsor.

VisitChange.org
5.Contact information-includes information on how the
Change.org works this way. If this is your first time to
group be contacted.
use Change.org, click Sign up or log in with Facebook.
Otherwise, just input your log in details.
You can then start your own petition, but for now click Simplified ICT Project Process Overview
on any petition you want under tending petitions.
Read the petitions description to see if this petition
1.Planning-Involves the following task (but not limited
matters to you. If it is, sign the petition by filling up the
to):
information on the right side of the screen.
Share the petition on Facebook to promote it.
Conceptualizing your project project
Alternatively, you can check out petitions of your
friends on Facebook, and then click on those petitions to Researching on available data about your topic
read about it and sign it.
Setting deadlines and meetings
Assigning people to various tasks
LESSON 12: ICT Project for Social Change
Finding a web or blog host
Creating a site map for tour website
Before starting your project, your group should be able
to do the necessary paperwork. This allows experts to Listing down all applications, that you need including
see if your project is doable over the time frame that was web apps
given and if it is significant enough to be made into Funding (If applicable)
reality.
2.Development-involves the actual creation of the
website(s), involves the production of images,
infographics, etc.

Five elements of a concept paper


3.Release and Promotion-involves the actual release of
the website for public view and promoting it. Promotion
1.Introduction-includes tour group’s mission and vision typically starts before the actual release.
and a brief introduction of your project.

4.Maintenance-involves responding to feedback of your


2.Purpose-includes the reasons why this project is worth site visitors and continuing to improve your website.
your group and your sponsor’s time, effort and money.

LESSON 13: ICT Project Publication and Statistics


Monitoring Site Statistics on Different Platforms People– contains statistics about your audience’s
demographics (age, location, gender, language, and
country). It is also includes demographics about the
WordPress people you have reached and engaged with.

Once you log in to your WordPress account, you are on Demographics refers to the statistics characterizing
the Reader tab by default. Simply click on My Sites and human population usually divided by age, gender,
from there you will see the statistics for your blog. income, location, and language.

Facebook LESSON 14: ICT Project Maintenance

In your Facebook page, a summary of the statistics will Creating online surveys feedbacks forms.
appear on the right side of your cover photo: Hovering
The Internet will give you a lot of options in gathering
your mouse pointer over “Post Reach” will give you
your audience’s feedback. The only difference that you
more insights on which recent post reached the most
and your group may notice is how these services are
people: Clicking on the Insights tab will give more in-
presented. Some of them, because they are free to use,
depth statistics:
may have too many ads or some features are lacking. In
any case, it’s your group’s choice which of these services
is t cumbersome to reach your objective.
Overview– contains the summary of statistics about your
page Google offers one of the easiest ways to gather user’s
feedback. Google forms allow your audience to answer a
Definition of terms on your Facebook statistics: set of questions you have set. These can be used for
surveys, feedback, online registrations, and customer
care support.
Reach: Organic – your posts seen through the page’s
wall, shares by users, and the news feed
4. You will be taken to Google Form’s interface:

Reach: Paid – your posts seen through paid ads Next is !


Lets move on to !

Post Clicks – number of clicks done to your posts 6. Once you are done editing the question, click Done.
7. To add a new question or item, click on Add Item,
clicking on the drop down arrow at the right side of the
Likes, Comments, and Shares – actual interaction done Add Item button will bring up other options for layout:
by your audience either through liking the post,
commenting on it, or sharing it on their walls. a. Section Header – adds a header for a specific a part of
your survey.
b. Page break- adds a page break which means that the
Likes– contains the statistics about the trend of page items at the button of the page will be added to the next
likes page: necessarily if your survey is too long.
Reach– contains information about the number of people c. Image- adds an image to your survey
who was reached by your post
d. Video- adds a video to your survey
Visits– contains data of the number of times your page
tabs (like the Timeline) are visited
Post– contains data showing when (day and time) you iii. Multiple Choice – can be answered by only one
site visitors visit your site answer in a set of options
Creating feedback forms using Google forms
Lesson objectives f. Add collaborators- Allows others to edit your form,
necessary when working on groups.
• Evaluate the effectiveness of their online campaign
through user feedback;
• Improve the online campaign using various tools; and 1. The easiest way to view the result is viewing a
summary of the responses. Click on Responses>
• Check the impact of their online campaign.
Summary of Responses.
2. You will be taken to a Summary of Responses page.
Steps ! This is particularly useful for viewing your results from
time to time.

1) Open your browser and go to drive.google.com


However, after a set amount of time, you may want to
2) Sign in or create an account. use this data in a spreadsheet and eventually create your
3) On the left hand hair of your My Drive page, own charts.

click New> More> Google Forms 3. To use the data collected through responses, click
View Responses button found on the upper part of the
page.
d. Advanced Settings: Contains more options for the
specified question type.
Analyzing your Google Forms Result
8. Edit the Confirmation Page option at the bottom as
you see fit. 4. Choose if you want to create a new Google Sheet as
the destination of your response results or if you want to
A. Show link to submit another response- allows the user put it on an existing Google Sheet.
to answer the same form again.
B. Publish and show a public link to form results- allows
users to see the summarized results for your survey.
C. Allow responders to edits responses after submitting-
allows users to back and edit their answers LESSON 15: Disadvantages of ICT
. Cybercrimes are illegal acts done through the use of the
internet. People all over the world use the Internet to
commit a host of crimes, some of which the public
9. Click the Send Form button. The Send Form dialog doesn’t even know are capable of being done
box will appear these options as you see fit. electronically.

a. Link to share- contains the URL that you can share on 1. Phishing and Spoofing
your website.
b. Embed- contains an embed code to attach to your
HTML. Spoofing attack is when a malicious party impersonates
another device or user on a network in order to launch
c. Short URL- generates a shorter URL necessary for attacks against network hosts, steal data, spread malware
limited spaces like sharing on twitter. or bypass access controls. There are several different
types of spoofing attacks that malicious parties can use
d. Share link via- allows you to share the link to
to accomplish this.
Google+, Facebook, and Twitter.
Phishing is the attempt to acquire sensitive information
e. Send form via email- allows you to share the form via
such as usernames, passwords, and credit card details
email.
(and sometimes, indirectly, money), often for malicious is actually no item at all. The item is subsequently never
reasons, by masquerading as a trustworthy entity in an delivered to the buyer after they purchase the item.
electronic communication.
6. Electronic/ Cyber Harassment
2. Blackmail/Extortion

Cyber harassment refers to online harassment. Cyber


Extortion (also called blackmail, shakedown, out harassment or bullying is the use of email, instant
wresting, and exaction) is a criminal offence of messaging, and derogatory websites to bully or
unlawfully obtaining money, property, or services from a otherwise harass an individual or group through personal
person, entity, or institution, through coercion. attacks. Cyber harassment can be in the form of flames,
Refraining from doing harm is sometimes comments made in chat rooms, sending of offensive or
euphemistically called protection. Using the Internet to cruel e-mail, or even harassing others by posting on
threaten to cause damage with the intent to extort from blogs or social networking sites. Cyber harassment is
any person any money or other thing of value. often difficult to track as the person responsible for the
acts of cyber harassment remains anonymous while
threatening others online. This usually applies to school-
3. Accessing Stored Communications age children.
7. Child Pornography

Accessing Stored Communications or hacking;


Intentionally accessing, without authorization, a facility
Using the Internet to transmit child pornography. Child
through which an electronic communication service is
pornography is distributed nowadays mainly through the
provided. The act of obtaining unauthorized access to
Internet. Child pornography are produced not only on a
data from computer network. This is typically done to
professional scale by commercial providers, but also
commercial and government sites to threaten its owner.
privately using victims from the producer’s own
In late 2015, a group of Anonymous Philippines hacked
environment, from the exploitation of children by clients
the Twitter account of actress Maine Mendoza, who
of child prostitutes. Child pornography is sold over
plays the famous character Yaya Dub of the popular
commercial websites and also exchanged in closed
AlDub tandem and posted links and messages on the
groups or via peer-to-peer networks. Criminal groups
account
also use the Internet to make big money selling child
pornography.
8. Prostitution

4. Sports Betting
Persuading, inducing, enticing, or coercing any
individual to travel in interstate commerce to engage in
Sports Beating is engaging in the business of betting or prostitution.The internet has become one of the preferred
wagering on any sporting event or contest over the methods of communication for prostitution, as clients
Internet. In some countries, gambling (including sports and prostitutes are less vulnerable to arrest or assault and
betting) is illegal even if you are doing it over the for its convenience
Internet.
5. Non-Delivery of Merchandise
9. Drug Trafficking

Devising any scheme to defraud, or for obtaining money


or property by means of false or fraudulent pretenses, or Delivering, distributing, or dispensing a controlled
promises, and using the Internet for the purpose of substance by means of the Internet. Darknet markets are
executing the scheme. The non-delivery scam occurs used to buy and sell recreational drugs online. Some
when the scammer places an item up for sale when there drug traffickers use encrypted messaging tools to
communicate with drug mules. The dark web site Silk
Road was a major online marketplace for drugs before it
was shut down by law enforcement (then reopened under
new management, and then shut down by law
enforcement again)

10. Criminal Copyright Infringement

Criminal Copyright Infringement, the act of piracy


mainly for financial gain. In late 2014, the number one
pirate website, The PirateBay, was raided for the second
time due to years of pirating movies, music, games,
books, and other software. These kinds of websites earn
money through advertsing.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy