ICT Reviewer PDF - Online Safety, Cyberbullying, and Excel Skills

Summary

This PDF document serves as a comprehensive ICT reviewer, covering fundamental topics such as the World Wide Web, online safety protocols, and the various forms of cyberbullying. It also delves into essential spreadsheet skills, particularly focusing on Microsoft Excel features, including data handling and presentation techniques.

Full Transcript

ICT LESSON 1 World Wide Web WIX - WEBSITE CREATION TOOL POWTOON - MULTIMEDIA CREATION TOOL WAZE - MAP THE WORLD WIDE WEB ​ aka as www, introduced by Tim Berners-Lee in 1989 ​ docs and other resources located from diff terminals and web pages with their unique URL through internet ​ WW...

ICT LESSON 1 World Wide Web WIX - WEBSITE CREATION TOOL POWTOON - MULTIMEDIA CREATION TOOL WAZE - MAP THE WORLD WIDE WEB ​ aka as www, introduced by Tim Berners-Lee in 1989 ​ docs and other resources located from diff terminals and web pages with their unique URL through internet ​ WWW Consortium: org dedicated in promoting www standards, pioneered the standardization of the protocols applied to the websites that are linked to the www Uniform Resource Locator (URL) ​ a specific address of a certain website ​ www.friendsbook.com Link/Hyperlink ​ clickable icons in embedding URL (shapes, text, pictures) EVOLUTION OF THE WEB WEB 1.0 ​ web pages are static, does not allow interactivity with the user ​ web contents and layouts are inseparable ​ websites uses HTML Tags ​ do not embed guestbook in the current page ​ website forms are usually sent by email ​ one way communication ​ WWW project by CERN (1990s) ​ Space Jam Website (1996) WEB 2.0 ​ coined by Darcy DiNucci in 1999 ​ allowed interactivity ​ has user-generated contents ​ has emphasis on user experience ​ has improved interoperability WEB 3.0 ​ semantic web ​ adheres to minimalist design ​ semantic web framework ​ an ever-present web ​ applies and uses artificial intelligence TRENDS IN ICT CONVERGENT TECHNOLOGIES ​ Technological Convergence is a theoretical perspective where different technologies are unified in one technology ​ Computer set – Mobile phone MOBILE TECHNOLOGIES ​ smartphones are the most readily known convergent tech by nontechnical ppl. ​ uses operating system (OS) to manage the memory processes and the software within the device ASSISTIVE MEDIA ​ particularly assistive tech ​ devices that are adaptive, assistive, rehabilitative to elderly and ppl with special needs ​ Text-to-speech, mounted wheelchair, hearing aid, magnifier SOCIAL MEDIA PLATFORMS ​ process of connecting ppl and bring relevant and pertinent info to ppl across the globe, soc med platforms are forefront 1.​ Social Network ​ allow the creation of personal accs that will be used to connect with ppl for diff purposes ​ created for social interaction but later advanced to professional and other related interactions ​ facebook, instagram, messenger 2.​ Bookmarking Sites a.​ important to use a platform to search, manage, organize and store web pages that a person want to revisit or share with others b.​ pinterest 3.​ Social News a.​ permit the users to submit news articles, stories, videos, and photographs that are worth sharing to their expected subscribers b.​ sites have their pool of editors to decide which news is worth publishing 4.​ Media Sharing a.​ allows the users to share and upload multimedia contents like graphics, text, videos, audios b.​ allows user to comment, download, liking or disliking a content c.​ youtube, facebook, ig 5.​ Microblogging a.​ online broadcast mediums that allow their users to post and exchange short contents that may include text, graphic, audios, videos b.​ twitter, plurk 6.​ Blogs and Forums ​ allow one to post his or her content ​ forums contain q-and-a discussion boards, bring ppl of similar interests together to discuss topics ​ Blogs: author-generated content ​ Forums: user-generated ​ discord, blogger, wordpress ONLINE SYSTEMS, FUNCTIONS, PLATFORMS LESSON 2: ETHICS ON THE INTERNET ONLINE SAFETY ​ e-safety or cyber safety ​ knowledge and awareness of safety protocols while using the internet ONLINE SECURITY ​ rules that are followed and the actions that are taken to make sure that online users and data privacy are safe ONLINE CRIMES ​ violations that harms ppl by other internet users ​ Forms: ○​ Cyberbullying ○​ Identify Theft ○​ Phishing ○​ Plagiarism CYBERBULLYING (RA 10627 or The Anti-Bullying Act of 2013) ​ written, verbal, electronic expression, or a physical act or gesture ​ belittle another individual or group or gender-based bullying Forms of Cyberbullying: 1.​ Flaming- online fight (comment section) 2.​ Harassment- repeatedly sending nastyz mean, insulting messages 3.​ Impersonation- pretending to be someone else 4.​ Outing- sharing someone's secrets online 5.​ Trickery- talking to someone to let him reveal his secrets and share sensitive info online 6.​ Denigration- sending or posting gossips 7.​ Exclusion- intentionally excluded from online group (kick group) 8.​ Cyberstalking- repeated intense harassment and denigration (threats, blackmail) IDENTITY THEFT ​ aka identity fraud ​ someone wrongfully obtains and uses another person's personal data that involves fraud or deception Happen in this situation: 1.​ Using of online communication in public places 2.​ Receive pre-approved credit cards but discard the improperly 3.​ Respond to spam/unsolicited mails that requires to input personal info Tips: 1.​ Use good password: SURP Test (Strong, Unique, Recent, Practical) 2.​ Report identity theft PHISHING ​ fraudulent practice of sending emails pretending to be reputable companies in order to reveal info of the user (nanalo ka ng 10 million, ibigay mo ang personal info mo para makuha) PLAGIARISM AND COPYRIGHT INFRINGEMENT PLAGIARISM ​ presenting someone's work as your own with or without consent, by including ut to your work without full acknowledgement COPYRIGHT INFRINGEMENT ​ occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed without the permission of the copyright owner PLAGIARISM VIOLATIONS 1.​ verbal quotation without clear acknowledgement 2.​ cutting and pasting ideas from the internet without proper citation 3.​ paraphrasing without due acknowledgement of the source 4.​ collusion 5.​ failure to attribute assistance made 6.​ auto plagiarism or resubmission of works submitted COMMON INTERNET SECURITY THREATS 1.​ MALWARE ​ shortened form of malicious software (computer viruses, worms, dishonest spyware) 2.​ COMPUTER WORMS ​ programs that can replicate themselves from one computer from another in great volume and can spread themselves rapidly without human intervention 3.​ SPAM ​ junk mails that content links that put you at risk 4.​ PHISHING ​ intend to ask private info from victims INTERNET SECURITY STRATEGIES ​ Browser selection ​ Multi Factor authentication (MFA) ​ Email security ​ Firewalls ETHICS ​ deals with what is good and bad ​ set of moral principles that can be taken as a guiding philosophy in life ONLINE ETIQUETTE ​ considered internet ethics as guiding principles in using the internet LESSON 3: ADVANCED PRESENTATION APPLICATION PPT ​ supported by visual aids ​ offers different features and functions (MS PPT) MS POWERPOINT ​ software package designed to e-presentations consisting of slides/pages HISTORY OF MS PPT ​ created by Robert Gaskins and Dennis Austins at a software company named Forethought, Inc. ​ idea of ppt came up in 1984 ​ development started under the name “presenter” ​ 1987, first version of ppt for Macintosh was released ​ first windows release in 1990 GUIDELINES FOR MAKING AN EFFECTIVE PRESENTATION 1.​ MINIMALISM ​ do not put too many slides in a ppt ​ do not put everything in the ppt 2.​ CLARITY ​ slides in ppt must be clear ​ fonts should be big, readable ​ fonts should be appropriate for the topic 3.​ SIMPLICITY ​ do not put entire paragraph in the slide ​ use key phrases, and important info ​ follow the 6x7 rule (no more than 6 lines per slide and 7 words per line) 4.​ VISUAL-ORIENTEDNESS ​ use relevant graphics to make the ppt more interesting 5.​ CONSISTENCY ​ slides should be uniform 6.​ CONTRAST ​ ppt should be readable ​ contrasting colors must be used for text and background ANIMATIONS ​ useful tools in making ppt inteŕesting ​ do not put too many because it will be a distraction ○​ Entrance- how an object will appear ○​ Emphasis- used to focus or point attention tona certains element ○​ Exit- how an object will disappear ○​ Motion paths- how an element will move from one point to another ​ TIMING ○​ used to automatically set when a particular animations will take place ​ On click- element will start animating AFTER you click the mouse ​ With previous- element will appear WITH THE PREVIOUS element ​ After previous- element will appear AFTER THE PREVIOUS element TRANSITIONS ​ set effects when transitioning to other slides HYPERLINKS ​ element can jump from on slide to another or jump to another word document or any document in the web ​ hindi built-in, depende sayo yung element na gaqamitin mo How to insert a hyperlink? 1.​ Click an object or text 2.​ Go to insert tab and click link 3.​ An insert hyperlink dialog box will appear where you can choose the object or text to be linked Link options in MS PPT: 1.​ Existing file or webpage: links the object or text to website a.​ Link to an existing file in your hard drive: browse the folder and click ok b.​ Link to webpage: type the complete web address to the address box 2.​ Place in this Document: Links the object or text to a specific slide in a presentation ACTION BUTTONS ​ clickable object that will automatically direct the presentation to another slide ​ built-in ○​ Go back to previous ○​ Go forward or next ○​ Go to beginning ○​ Go to the end ○​ Return LESSON 4: ADVANCED WORD PROCESSING APPLICATION WORD PROCESSOR ​ computer program or device that provides for input, editing, formatting, and output of text, often with some additional features ​ early word processors were stand-alone devices often on its function ​ current word processors are word processor programs running on general purpose computers MICROSOFT WORD ​ mas madalas ginagamit ​ developed by Microsoft HISTORY OF MS WORD ​ Charles Simonyi (developer) & Richard Brodie (software engineer) were the two creators of MS Word ​ initially named “Multi-Tool Word” but was renamed “MS Word” ​ introduced in 1983 ​ Word for Windows is available standalone or as a part of MS Office suite ​ MS Word for Mac was introduced by Microsoft as Word 1.0 in 1985 ​ Extension for any word file: “.doc” “.docx” INSERTING OF PICS 1.​ INSERT TAB 2.​ PICTURES (choose THIS DEVICE if nasa device mo na yung pic) 3.​ In the INSERT PICTURE dialog box na mag-aappear. Then browse the folder loc, then choose picture and click INSERT TEXT/IMAGE WRAP ​ IN LINE WITH TEXT ○​ default setting ○​ image is located IN THE LINE where the TEXT is LOCATED ○​ ​ SQUARE ○​ text surrounds the image ○​ ​ TIGHT ○​ text surrounds the image, but the MARGIN or SPACE between the IMAGE and TEXT is SMALLER ○​ ​ THROUGH ○​ allows the text to CROSS between SOME PART of the image ○​ if there are FILLABLE part within the image, text may FLOW through it ○​ ​ TOP AND BOTTOM ○​ text is located at the TOP and BOTTOM of the image ○​ ​ BEHIND TEXT ○​ image is located BEHIND the text ○​ ​ IN FRONT OF TEXT ○​ image is located in front of text ○​ it also hovers above the text within obscures it ○​ PAGE BACKGROUND: WATERMARK 1.​ DESIGN TAB in the menu bar 2.​ WATERMARK 3.​ CUSTOM WATERMARK (click REMOVE WATERMARK if you want & there are also BUILT-IN WATERMARKS) 4.​ PICTURE WATERMARK (browse the loc to use image as watermark (logo)) Choose TEXT WATERMARK to use a special text as watermark CHECKING AND SPELLING GRAMMAR How to proofread using Ms Word? 1.​ REVIEW TAB 2.​ PROOFING GROUP & click EDITOR COMMAND 3.​ Correct the wrong words by clicking the suggested words given by Ms Word INSERTING COMMENT 1.​ REVIEW TAB 2.​ NEW COMMENT MAIL MERGE COMMAND MAIL MERGE ​ effective tool that allows you to create multiple letters, labels, envelopes, name tags, and more using info stored in a list, database, or spreadsheet LESSON 5: ADVANCED SPREADSHEET SKILLS SPREADSHEET SOFTWARE ​ basic tools in organizing and analyzing data BRIEF HISTORY OF EXCEL ​ part of Microsoft Office suite ​ allows users to operate numerical data entered in spreadsheets ​ interface of this program: includes table with a large number of cells for data entry ​ excel file is usually called: WORKBOOK ​ pages in excel: WORKSHEETS DOUGLAS KUNDLER was the lead developer of MS Excel JABE BLUMENTHAL who was the program manager CHARLES SIMONYI a Microsoft Executive and BILL GATES himself HISTORY PA RIN NG EXCEL ​ 1985 ○​ microsoft created first version of MS Excel ○​ available only on the APPLE MACINTOSH ○​ first spreadsheet that had a visual interface and could be manipulated with a mouse ​ 1987 ○​ first excel version for windows was launched which allowed users to CHANGE FONTS and provided extended features for DRAWING GRAPHS MATHEMATICAL OPERATORS Excel uses standard operators for formulas. These are: ​ Plus sign (+) ADDITION ​ Minus sign (-) SUBTRACTION ​ Asterisk (*) MULTIPLICATION ​ Forward slash (/) DIVISION ​ Caret (^) EXPONENTS ​ Equal sign (=) used to start a formula A complex formula follows the PEMDAS order. P E M D A S order of operations: P- Parenthesis (ex. (1+2)) E - Exponential (ex. 2^3) M - Multiplication (ex. 2*4) D - Division (ex 6/2) A - Addition (ex. 7+3) S - Subtraction (ex. 10-5) CELL REFERENCE ​ the cell or set of cells involved in a formula ​ will make your formula more accurate ​ CELL ADDRESS- combination of a column letter (top of spreadsheet) and a row number (left of spreadsheet) TO CREATE A FORMULA: 1.​ Select CELL 2.​ Type EQUALS SIGN (it will appear in the cell & formula bar) 3.​ Click the actual cell or type the CELL ADDRESS of the cell that you want to reference first in the formula. The BLUE BORDER will enclose the referenced cell. 4.​ Type the MATHEMATICAL OPERATOR 5.​ Type the CELL ADDRESS ng cell na gusto mong ireference next in the formula. The RED ENCLOSURE will mark the referenced cell. 6.​ Press ENTER. The info will be CALCULATED and the VALUE will be displayed in the cell BASIC FUNCTION NAME USEFUL MICROSOFT EXCEL FUNCTIONS (BASIC) SUM() FUNCTION AVERAGE() FUNCTION COUNT() FUNCTION MAX() FUNCTION MIN() FUNCTION SUM() FUNCTION ​ allows to SUM numerical data in ANY number of columns or rows by SELECTING or TYPING STEPS: 1.​ Select a CELL. Type EQUALS SIGN 2.​ Enter the desired FUNCTION. Excel gives a list of suggested functions as you type. 3.​ Enter the CELL RANGE for the ARGUMENT inside the parenthesis. CELLS will be highlighted. 4.​ Press ENTER. Note: MULTIPLE ARGUMENTS must be SEPARATED by a COMMA. AVERAGE() FUNCTION ​ allows the user to get the average of all the numbers in the chosen cells. The basic formula is =AVERAGE(range to be averaged). COUNT() FUNCTION ​ used to count the number of chosen cells that have a number value in them. ​ useful in determining if there are missing data or values. The basic formula format for COUNT function is =COUNT(range to be counted). MAX() & MIN() FUNCTION ​ straightforward and can be easily understood. ​ MAX function is used to search for the highest value in an array ​ MIN function is used to search for the lowest value in an array. The basic format for this function is =MAX(range) and =MIN(range). USEFUL MICROSOFT EXCEL FORMULAS AND FUNCTIONS (ADVANCED) ​ SUMIF() FUNCTION ​ IF() FUNCTION ​ VLOOKUP() FUNCTION ​ CONCATENATE() FUNCTION SUMIF() FUNCTION ​ Used to summate the values of cells in a range that meet the criteria that have been specified. The basic format for the formula of SUMIF function is =SUMIF(Range,criteria,sum_range) SUMIF- total to be summed up are the values of the cells within a range which met the CRITERIA that have been specified. SUM- ONLY SUMMATE the values from all the cells within a range. IF() FUNCTION ​ allows users to achieve a particular value if the condition has been satisfied or TRUE, or if the condition has not been dissatisfied or FALSE. The basic format for this formula is =IF(CONDITION,RESULT IF TRUE,RESULT IF FALSE). VLOOKUP() FUNCTION ​ enables users to find something on the leftmost column of the chosen range and return a value related to it. The basic format for this function is =VLOOKUP(look_value, table_range, column index number, range look up). CONCATENATE() FUNCTION ​ combines two or more text strings. ​ combines the values from two or more cells into another cell. The basic format for this function is =CONCATENATE(text1,text2,text3). USEFUL MS EXCEL FEATURES CONDITIONAL FORMATTING ​ enables users to emphasize certain cells with the formatting they want. There are several conditional formatting options in Excel to choose from, but the procedures for most of them are almost the same. TEXT TO COLUMNS ​ may be considered as the opposite of concatenate function. ​ used to separate contents of one column to two or more columns. ​ useful in a case where there is a need to separate last names and first names into two columns. DATA VALIDATION ​ limits what particular value can be entered in a cell. ​ make sure that the value entered in a specific cell is reasonable. GRAPHS ​ used to give users visual representation of what is in the spreadsheet. Graphical representations make it easy for readers to visualize and understand data in the spreadsheet.