POINTERS TO REVIEW.pdf
Document Details
Uploaded by VisionaryCanyon
University of Perpetual Help System DALTA
Full Transcript
W22222 POINTERS TO REVIEW IN EMPOWERMENT TECHNOLOGIES (G11) 1st Semester A.Y. 2024 – 2025 LESSON 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY Evolution of the Web Sir Timothy John Berners-Lee aka Tim Berners-Lee is...
W22222 POINTERS TO REVIEW IN EMPOWERMENT TECHNOLOGIES (G11) 1st Semester A.Y. 2024 – 2025 LESSON 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY Evolution of the Web Sir Timothy John Berners-Lee aka Tim Berners-Lee is an English computer scientist best known as the inventor of the World Wide Web, the HTML markup language, the URL system, and HTTP. XML (Extensible Markup Language) is used to describe data. The XML standard is a flexible way to create information formats and electronically share structured data via the public internet, as well as via corporate networks. RSS is a web feed that allows users and applications to access updates to websites in a standardized, computer-readable format. LESSON 2: ONLINE SYSTEMS, FUNCTIONS AND PLATFORMS LESSON 3: ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE Website safety checklist: How to understand if a website is dangerous Here are a few hints that can help you understand if a website is safe and trustable or not. 1. Check SSL certificate Simply said, check to see if the URL begins with HTTP or HTTPS. If a website is not SSL certified or HTTPS (Hypertext Transfer Protocol Secure), do not enter your personal information or conduct any transactions on it. (However, some rogue websites may use HTTPS to pass the validity test.) 2. Check for correct spelling Make sure you are not browsing yah00.com instead of Yahoo or Twltter.com instead of Twitter. These tricky spelling errors are a common way to gain trust. 3. Use a website safety checker tool There are multiple tools you can use to check if a website is safe to browse. These tools usually scan for malware or unsafe content. Google Safe Browsing site status is one. 4. Use browser safety tools Depending on your browser, whether it is Safari, Chrome, Firefox, or any other verified browser, there are plugins, extensions, and anti-virus software that you can use for a safer browsing experience. 5. Never click on a link embedded in an email Always type the URL into your browser, regardless of who sent it to you. INTERNET RISKS Cyberbullying It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. Identity Theft It is a crime of stealing personal information for the purpose of assuming the person’s name or identity to make any form of transactions. Cyber Stalking A criminal practice where electronic communication is used to stalk or harass individual or group. Sexting The act of sending sexually explicit text messages, images, and videos. INTERNET THREATS Malware- also known as Malicious Software. Virus – a malicious program that replicate itself by copying itself to another program. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your computer. Worm – malicious program that copy’s itself and spreads to other computers. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them. Keylogger – A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device. Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware. Rootkit – A software tools used by hackers to gain control over a computer on a network without being exposed. Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus. Spam- Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware. Phishing- A cyberattack method using deceptive emails and websites to acquiring sensitive personal information. Cybercrime- A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others. LESSON 4: CONTEXTUALIZED SEARCH AND ONLINE RESEARCH SKILLS HOW TO EVALUATE INFORMATION 1. Accuracy-content is grammatically correct, verifiable and cited when necessary. 2. Source Credibility-Defines who are created the content. 3. Currency-Information is current and updated frequently 4. Fairness- content is balance, presenting all side of an issue and multiple points of view. 5. Relevance- content is relevant to your topic or research. Copyright is a protection given to the owner of the rights in an original work IP- intellectual property which is protected under Republic Act 8293 known as the “Intellectual Property Code of the Philippines”. Copyright infringement - this happens when the copyrighted work is use by other person without permission of the author or copyright holder. Fair Use- it is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright. EXAMPLES OF SEARCH ENGINE 1. Google Purpose: Google is the most widely used search engine globally. It empowers users by providing quick access to billions of web pages, images, news articles, and more. Google supports educational growth, research, and digital literacy. Its tools like Google Scholar are beneficial for academic work, while Google Maps and Google Translate help in real-world applications of technology. 2. Bing Purpose: Developed by Microsoft, Bing is another popular search engine. It offers various search services including web, image, and video searches. Bing's integration with Microsoft services (like Office, OneDrive) aids productivity and enhances collaboration, especially in educational and workplace environments. 3. DuckDuckGo Purpose: DuckDuckGo is a privacy-focused search engine that doesn't track user data or store personal information. DuckDuckGo empowers users to control their digital privacy, making it a tool for people who are concerned about online surveillance and data protection. 4. Yahoo Search Purpose: Yahoo Search is one of the oldest search engines, offering a wide range of web services including news, shopping, and email integration. Search integrates with Yahoo’s other services, providing a broad platform for accessing information and services, supporting users in both personal and professional endeavors. Yahoo Finance - through its news, analysis, and data, Yahoo Finance serves as an educational platform for individuals looking to improve their financial literacy. 5. Yandex Purpose: Yandex is the most widely used search engine in Russia, offering various tools such as maps, email, and cloud services. Yandex supports digital literacy and access to information, particularly for Russian-speaking users, enhancing technological inclusion. 6. Ask.com Purpose: Simplified Searching: For users who are not familiar with advanced search techniques, Ask.com makes it easy to phrase searches in a question format and receive relevant answers, thus increasing digital literacy. Ease of Use for Non-Experts: People who are not tech-savvy can easily find answers to everyday questions without having to sift through complex data. 7. WolframAlpha Mathematical Computations: WolframAlpha can solve complex math problems, generate graphs, and perform symbolic computation. LESSON 5: APPLIED PRODUCTIVITY APPS, TOOLS, and METHODS MS WORD- Used to create and edit professional-looking documents such as resume, books, admission forms, letters, paper, reports and booklets, cover pages, notes, assignments, brochures, and even web pages. MAIL MERGE o This feature of Microsoft Word allows you to create documents and combine them with another document or data file. o It is commonly used when sending out advertising materials to various recipients. Steps for Mail Merge in Microsoft Word (for letters or emails): 1. Prepare Your Data Source (Excel Spreadsheet) Open Microsoft Excel and create a spreadsheet with the information you want to use in the mail merge (e.g., names, addresses, phone numbers). Ensure each column has a clear header (like "First Name," "Last Name," "Email Address"). Save the file. 2. Create Your Main Document (Word Template) Open Microsoft Word and start a new document. Type the content of your letter or email. This will serve as your template. Leave spaces where you want the personalized information (like name or address) to appear. 3. Start the Mail Merge Process Go to the Mailings tab on the Word ribbon. Click Start Mail Merge and choose the type of document you’re creating (e.g., Letters, Email Messages, Labels). 4. Select Recipients (Connect to Your Data Source) Click Select Recipients in the Mailings tab. Choose Use an Existing List and browse to select the Excel file that contains your data source. Select the correct worksheet if your Excel file has multiple sheets, then click OK. 5. Insert Merge Fields Place your cursor where you want to insert personalized information (like name or address) in the Word document. Click Insert Merge Field in the Mailings tab and choose the field names (e.g., "First Name," "Last Name") corresponding to your Excel columns. Continue this process for each piece of personalized data. 6. Preview the Mail Merge Click Preview Results in the Mailings tab to see how the merged information will look. Use the arrows in the Mailings tab to navigate through the records and ensure the data is correctly inserted. 7. Complete the Mail Merge Once you’re satisfied with the preview, click Finish & Merge in the Mailings tab. Choose to either: Print Documents (for letters or labels). Send Email Messages (for email merges; you'll need to specify the email field from your Excel data). Edit Individual Documents to make any last-minute changes before printing or sending. 8. Save Your Merged Document Save your Word document for future use. If you've edited individual letters or emails, you can also save the merged version. MS EXCEL- Electronic spreadsheet programs were originally based on paper spreadsheets used for accounting. o Related data is stored in tables — which are a collection of small rectangular boxes or cells organized into rows and columns. o Formula – is an equation that performs an operation on worksheet data. A formula in Microsoft Excel always begins with an equal sign (=). To calculate the mean (average) in Microsoft Excel, follow these simple steps: 1. Input Your Data Open Excel and enter your data in a column or row. For example, place the numbers you want to average in cells A1 to A10. 2. Use the AVERAGE Function Click on an empty cell where you want the mean to appear (e.g., cell A12). Type the following formula: =AVERAGE(A1:A10) Press Enter. 3. Result The mean (average) of the numbers in the range A1 to A10 will be displayed in the selected cell. Additional Notes: You can adjust the range (e.g., A1:A20 or B1:B10) depending on where your data is located. If your data is in a row, you can also use =AVERAGE(A1:J1) for row data. That's it! Excel will calculate and display the mean for the selected data range. o Avoiding Division by Zero Error (#DIV/0!) Problem: When dividing a number by zero, Excel returns the error #DIV/0!. Solution: Use the IF function to check if the divisor is zero before performing the division. MS POWERPOINT- is an example of a presentation software that you can use to create a slide show for your presentation. It is used to create professional-looking slideshows that can be displayed on projectors or big-screen TVs. o The 7x7 rule in Microsoft PowerPoint is a commonly suggested guideline for creating clear and effective slides. It helps prevent overcrowding of information on slides and promotes readability. The rule suggests: 7 words per line (or fewer). 7 lines per slide (or fewer). o Purpose of the 7x7 Rule: Clarity: Ensures that the content on each slide is concise, making it easier for the audience to grasp the key points quickly. Focus: Helps you focus on the most important information, reducing distractions for your audience. Engagement: Encourages you to use your slides as visual aids, with the main content coming from your verbal presentation. o How to Apply the 7x7 Rule: Limit Text: Avoid cramming too much text on a single slide. Break down the content into smaller, digestible points. Use Bullet Points: Organize information using bullet points, each containing no more than 7 words. Simplify Information: Focus on summarizing the key message instead of including full sentences or paragraphs. Visual Aids: Where possible, replace text with images, charts, or diagrams that convey the message more effectively. 1. Animations Definition: Animations are effects applied to individual elements on a slide (like text, images, charts, etc.) to control how they appear, move, or disappear during the slide presentation. Purpose: Animations help emphasize specific points, reveal content step by step, or make the presentation more engaging. Types of Animation Effects: Entrance: Controls how an object enters the slide (e.g., Fade In, Fly In). Emphasis: Highlights or draws attention to an object while it’s already visible (e.g., Spin, Grow/Shrink). Exit: Determines how an object leaves the slide (e.g., Fade Out, Fly Out). Motion Paths: Moves an object along a predefined path (e.g., Line, Arc). Where It’s Applied: Animations are applied to elements within a slide, such as text, images, or shapes. Customization: You can control the timing, order, and triggers for animations (e.g., make an object appear when you click). 2. Transitions Definition: Transitions are effects applied to entire slides to control how one slide moves to the next during a presentation. Purpose: Transitions make the shift between slides smoother or more visually appealing, giving the presentation a more polished look. Types of Transition Effects: Subtle: Simple, minimal transitions (e.g., Fade, Push). Exciting: More dramatic effects (e.g., Curtain, Vortex). Dynamic Content: Focuses on changing only the content, keeping background elements fixed (e.g., Pan, Conveyor). Where It’s Applied: Transitions are applied to the entire slide and affect how the current slide leaves and the next one enters. Customization: You can adjust the duration of the transition, add sounds, or control how the transition is triggered (e.g., automatically or on click). LESSON 6: IMAGING AND DESIGN PRINCIPLES FOR ONLINE ENVIRONMENT Basic Principles of Graphics and Layout Alignment: Proper alignment creates a visual connection between elements, making the design appear Organized and structured. It helps guide the viewer’s eye and improves readability. Contrast: Using contrasting colors, sizes, and shapes can help emphasize important elements and make the design more visually interesting. Contrast can also improve legibility. Repetition: Repeating elements (like colors, shapes, and fonts) throughout a design creates consistency and reinforces a cohesive look. This helps the audience recognize the brand or theme. Proximity: Placing related items close to each other establishes a relationship between them. This can help reduce clutter and improve the overall organization of the layout.