ICT Empowerment Technologies Review
14 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should you do when you receive an unexpected email with an attachment from a friend?

  • Reply to the email
  • Ignore and don't open the attachment (correct)
  • Open the attachment
  • Forward the email to someone else
  • What are the components of a mail merge?

    Address, form document, data file

    What is the purpose of Text Wrapping in a document?

    To move a picture freely around a document

    How can you prevent someone from editing a shared Word document?

    <p>Use Protect Document</p> Signup and view all the answers

    What is MS Excel designed for?

    <p>Creating spreadsheets and analyzing statistical data</p> Signup and view all the answers

    What formula would you use to calculate the sum of values 4 and 3?

    <p>=B1+C1</p> Signup and view all the answers

    What is the correct function to compute the average of values from B2 to B4?

    <p>=AVERAGE(B2:B4)</p> Signup and view all the answers

    What formula do you use to compute total sales in a figure?

    <p>=SUM(D4:D13)</p> Signup and view all the answers

    How do you count the number of items in the Food category?

    <p>=COUNTIF(C4:C13, 'food')</p> Signup and view all the answers

    PowerPoint is best described as presentation software.

    <p>True</p> Signup and view all the answers

    What is Adware?

    <p>Programs that automatically send pop-up advertisements</p> Signup and view all the answers

    What type of updates does Microblogging focus on?

    <p>Short updates limited to 280 characters</p> Signup and view all the answers

    You should never give your passwords to anyone except your parents.

    <p>True</p> Signup and view all the answers

    What should you do before answering questions that require personal information online?

    <p>Get your parents' approval</p> Signup and view all the answers

    Study Notes

    Email and Online Communication

    • Ignore unexpected emails with attachments to avoid potential security risks.
    • Netiquette promotes proper manners and etiquette in online communication; verify unknown senders before opening messages.
    • Unfamiliar texts or emails should be left unread until the source is identified.

    Mail Merge

    • Mail Merge personalizes emails to multiple recipients using components like Address, Form Document, and Data File.
    • Steps to create a simple Mail Merge:
      • Create the main document.
      • Create the data source.

    Word Processing Features

    • Text Wrapping enables free movement of images within documents.
    • Protect Document feature prevents unauthorized editing of shared Word documents.

    Microsoft Excel Basics

    • MS Excel is designed for creating spreadsheets to analyze statistical data.
    • Basic formulas:
      • Addition: =A1+A2
      • Subtraction: =A1-A2
      • Multiplication: =A1*A2
      • Division: =A1/A2
    • To compute the sum of values, use =SUM(D4:D13).
    • To count items in a specific category (e.g., Food): =COUNTIF(C4:C13, "food").
    • Average function for specific data range: =AVERAGE(B2:B4).

    Presentation Design

    • Slide layouts are best designed using templates available in the Slide Design task pane.
    • Custom animation effects can make text appear letter by letter by selecting entrance effects in the Effect Options dialog box.
    • Deleting a slide can be done through the Delete Slide command; avoid using multiple color schemes on one slide.

    Intellectual Property

    • Registered Design grants a monopoly right over the appearance of a product, including colors, shapes, and materials.
    • R.A. 8293 is the Intellectual Property Code of the Philippines.

    Online Advertising and Social Media

    • Adware is software that automatically displays pop-up advertisements.
    • Microblogging focuses on short user updates, limited to 280 characters.
    • Dynamic websites encourage user participation, allowing users to submit their own content.

    Online Safety and Privacy

    • Never share passwords, except with trusted relatives.
    • Use appropriate usernames that reflect true identity when creating online accounts.
    • Personal information should not be shared online; consult parents before answering personal questions or filling online forms.
    • Inform parents before meeting friends from online interactions and choose public places for safety.
    • Ignore unsolicited emails or messages from unknown senders.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your understanding of ICT empowerment technologies and best practices in digital communication. This quiz covers topics like email etiquette, netiquette, and useful tools like Mail Merge. Enhance your knowledge and skills in using technology responsibly.

    More Like This

    Use Quizgecko on...
    Browser
    Browser