Вы находитесь на странице: 1из 17

EMPOWERMENT TECHNOLOGY  allows users to interact with the page: instead

FIRST QUARTER REVIEWER of just reading a page, the user may be able to
Lesson 1 – Introduction to ICT comment or create a user account
 also allows users to use web browsers instead
ICT in Our Everyday Lives of just using their operating system
 Online platforms, Sites, and Content  Browsers can now be used for their user
 Web 2.0 and Web 3.0 interface, application software (or web
 The World Wide Web applications), and even for file storage.
 Trends in ICT  Most websites that we visit today are Web 2.0.
 Online platforms, Sites, and Content
 Web 2.0 and Web 3.0 Features of Web 2.0:
 The World Wide Web 1. Folksonomy
 Trends in ICT  allows users to categorize and
classify/arrange information using freely
Information and Communication Technologies (ICT) chosen keywords (e.g., tagging)
 use of different communication technologies  Popular social networking sites such as
such as mobile phones, telephone, Internet, etc. Twitter, Instagram, Facebook, etc. use tags
to locate, save, send and edit information. that start with the pound sign (#). This is
also referred to as hashtag.
ICT in the Philippines (Info from book only) 2. Rich User Experience
 Several international companies dub the  Content is dynamic and is responsive to
Philippines as the “ICT Hub of Asia” user’s input
 There is a huge growth of ICT-related jobs  An example would be a website that shows
around the country, one of which is the call local content
center or BPO (Business Process Outsourcing)  In the case of social networking sites, when
centers logged on, your account is used to modify
 2013 edition of Measuring the Information what you see in their website
Society by the International Telecommunication 3. Long Tail.
Union: There are 106.8 cellphones per 100  Services are offered on demand rather than
Filipinos in the year 2012. on a one-time purchase
 For every 100 Filipinos you meet, there is a high  In certain cases, time-based pricing is better
than file-size-based pricing or vice versa
change that they have a cellphone and
 This is synonymous to subscribing to a data
approximately for the seven of them, they have
plan that charges you for the amount of
two
time you spent in the Internet, or a data
 Annual Survey of Philippine Business and plan that charges you for the amount of
Industries, NSO, in 2010: the ICT industry shares bandwidth you used.
19.3% of the total employment population here 4. User Participation.
in the Philippines  The owner of the website is not the only
 Time Magazine’s “The Selfiest Cities around the one who is able to put content.
World” of 2013 places two cities from the  Others are able to place a content of their
Philippines in the top 1 and top 10 spots. The own by means of comment, reviews, and
study was conducted using Instagram, a popular evaluation.
photo sharing application.  Some websites allow readers to comment
on an article, participate in a poll, or review
a specific product (e.g., Amazon.com, online
Web 1.0 stores).
 When the World Wide Web was invented, most 5. Software as a Service.
web pages were static  Users will subscribe to a software only
 Static (also known as flat page or stationary when needed rather than purchasing them.
page) in the sense that the page is “as is” and  This is a cheaper option if you do not always
cannot be manipulated by the user. need to use a software. For instance,
 The content is also the same for all users. This is Google Docs is a free web-based application
referred to as Web 1.0. that allows the user to create and edit word
processing and spreadsheet documents
Web 2.0: Dynamic Web Pages online. When you need a software, like a
 evolution of Web 1.0 by adding dynamic web Word Processor, you can purchase it for a
pages—the user is able to see a website one-time huge amount and install it in your
differently than others. computer and it is yours forever.
 Examples of Web 2.0 include social networking  Software as a service allows you to “rent” a
sites, blogs, wikis, video sharing sites, hosted software for a minimal fee.
services, and web applications. 6. Mass Participation.
 It is a diverse information sharing through e. Microblogging – These are sites that focus
universal web access. on short updates from the user.
 Since most users can use the Internet, Web f. Blogs and Forums – These websites allow
2.0’s content is based on people from users to post their content.
various cultures. 3. Mobile Technologies
 The popularity of smartphones and tablets has
Web 3.0 and the Semantic Web taken a major rise over the years. This is largely
Semantic Web because of the devices’ capability to do tasks
 a movement led by the World Wide Web that were originally found in personal
Consortium (W3C). computers.
 The W3C standard encourages web developers  Kinds of Operating Systems:
to include semantic content in their web pages. a. iOS – used in Apple devices such as the
 According to the W3C, “The Semantic Web iPhone and iPad
provides a common framework that allows data b. Android – an open source operating system
to be shared and reused across application, developed by Google. Being open source
enterprise, and community boundaries.” means several mobile phone companies use
 The aim of Web 3.0 is to have machines (or this OS for free.
servers) understand the user’s preferences to c. Blackberry OS – used in Blackberry devices
be able to deliver web content specifically d. Windows Phone OS – a closed source and
targeting the user. proprietary operating system developed by
Microsoft
Several problems of Web 3.0: e. Symbian – the original smartphone OS;
1. Compatibility used by Nokia devices
 HTML files and current web browsers could not f. WebOS – originally used by smartphones;
support Web 3.0. now used for smart TVs
2. Security g. Windows Mobile – developed by Microsoft
 The user’s security is also in question since the for smartphones and pocket PCs
machine is saving his or her preferences.
3. Vastness 4. Assistive Media
 The World Wide Web already contains billions Assistive media is a nonprofit service designed to help
of web pages. people who have visual and reading impairments. A
4. Vagueness database of audio recordings is used to read to the user.
 Certain words are imprecise. The words “old”
and “small” would depend on the user. Current State of ICT in the Philippines
5. Logic Electronic Government (e-Government)
 Since machines use logic, there are certain  The use of information and communication
limitations for a computer to be able to predict technology and other web-based technology to
what the user is referring to at a given time. enhance access of information and improve
delivery, efficiency and effectiveness of services
Trends in ICT: to the public.
1. Convergence
 Technological convergence is the synergy of ICT Projects in the Philippines:
technological advancements to work on a
similar goal or task. Nationwide Operational Assessment of Hazards (NOAH)
2. Social Media  DOST’s mobile version of Project NOAH enables
 Social media is a website, application, or online Filipinos to access real time information
channels that enable web users to create, co- relevant to weather conditions and disaster
create, discuss, modify, and exchange user- preparedness in the palm of their hands (mobile
generated content. phone) and new ways of using mobile devices,
thereby saving lives and potential economic
 Six types of social media:
loss.
a. Social Networks – These are sites that allow
you to connect with other people with the
Mobile Operational System for Emergency Services
same interests or background.
(MOSES)
b. Bookmarking Sites – These are sites that
allow you to store and manage links to  Aims to support the current operations of
various websites and resources. project NOAH. - Design to help Local Disaster
c. Social News – These are sites that allow Risk Reduction Management Council in making
users to post their own news items or links decisions concerning the impending disaster,
to other news sources. whether to declare suspension of works or
d. Media Sharing – These are sites that allow classes in schools or to take evacuation actions
you to upload and share media content like in their areas of concern.
images, music, and video.  It can receive real-time weather and flood
information from PAGASA and Project NOAH.
Additionally, it allows users to access weather
data such as: temperature, moisture, and other iPinay Program
vital information directly accessible from  The continuing commitment to address the
Doppler radar, water level sensor, and water gender ICT gap, by empowering more women
gauges. with ICTs. We are also engaging with more local
and international partners to provide
Integrated Government Philippines opportunities for our CeCs in various areas:
 is a joint project of DOST-ICTO and DOST-ASTI,  Health information services & telemedicine
the project aims to set-up a government-  Employment and Livelihood Opportunities
shared network that will facilitate, deployment  Linking with Libraries
and integration of mission-critical ICT projects  Global connection and Exchange with high
especially those that deliver common school
government services.  Tech Age Girls
 Initially, the following development systems  Micro-entrepreneurship & Business skills
will be targeted for integration: e-Serbisyo as mentoring Community Based on line content
the single sign-on portal, Unified-Purpose ID development.
(UMID), the Philippines Key Infrastructure (PKI),
eBayad and the Philippines Government Ramos Administration: Policies
Electronic Procurement System (PhilGEPS).  1994: National Information Technology Plan
2000 (NITP2000)
Electronic Governance in Local Government Unit  1994 & 1998: Executive Order 190 s. 1994
Projects (E-LGU Projects) (amended by EO 469 in 1998) established the
 is intended to revolutionized local governance National Information Technology Council (NITC)
by making the LGUs electronically enabled  Directly policy body in ICT matters in the
thereby improving the delivery of public country
services, promoting transparency in  Mandated the designation of Information
government transactions and increasing public System Planners in each government
access to government information services, agency to take charge.
among others. Some projects are:  1997: Government-approved IT21 was
 Electronic Real Property Tax System (eRPTS) formulated
 Electronic Business Permit and Licensing  Countries action agenda for year 2000 and
System (eBPLS) beyond
 Electronic Treasury Operations  Promoted best practices in ICT governance
Management System (eTOMS)  Encouraged outsourcing of government ICT
projects to promote ICT growth
Contact Center ng Bayan (CCB)  1997: Administrative Order 3332: Directives for
 is a joint initiative to improve service delivery Government Agencies’ Internet Connectivity
and reduce red tape in government frontline  Aims to connect for greater efficiency in
services. Through a single number, a citizen can communication and data interchange.
gain access to government services and  Government
information, report complaints and ask  Academe
assistance through various communication  Industry business sector
channels.  Stimulate the growth of the Philippines web
– thereby strengthening the role of
Philippines Community eCenter (CeC) telecommunications systems, network and
 is a program that seeks to establish new CeCs in communications systems, content
municipalities where there are no shared management and applications to provide
internet access facilities, transform existing better services
school computer laboratories and internet  Meant to develop the Philippines
cages, where feasible, to become CeCs and Information Infrastructure (PII) framework
enhance and strengthen existing CeCs.

E-Government Philippines Health Insurance Corporation


(PhilHealth)
 Personally Controlled Health Records (PCHR) - Estrada Administration: Policies
The plan for PhilHealth to release specifications  2000: The Electronic Commerce Act
for PCHR to enable a transformation on health  Defines the government’s policies on e-
data management is expected to recreate a commerce and electronic transactions
patient-centric care as well as stimulating a new  Recognize electronic evidence as admissible
business sector on health data stewardship. The in court
PCHR will be owned by the patients and co-  2000: Government Information Systems Plan
managed with their health providers such as (GSIP) 2000 framework (Executive Order 265 s.
hospitals and clinics 2000)
 Computerize key frontline and common 10 best rules of netiquette:
government services and operation 1. The Golden Rule
 Created Information Technology and 2. No Flaming
eCommerce Council (ITECC) 3. Don’t type in all caps
 Partnership between public and private 4. Don’t spam
sectors for IT and eCommerce matters 5. Don’t talk with people you do not know
 ISP.COM strategy 6. Obey Copyright Laws
7. Use proper grammar and spelling
Arroyo Administration: Policies 8. Be honest/Be yourself
 Placed ICT as a priority in its agenda 9. Follow the TOS (Term of Service)
 General Appropriations Act of 2004 – 2010 10. Shop secure sites
establishes an e-Government fund as
source of funding for mission-critical, high- Online security, safety, and ethics
impact, and cross-agency government ICT  the internet is a powerful tool, but it also has
projects “another side of the coin”
 Strengthened Information Technology and  dangerous place if you do not know what you are
eCommerce Council (ITECC) which was created doing
by President Estrada  Internet Safety – online security or safety of
 2004: Commission on ICT (CICT), a de facto DICT people and their information when using the
 CICT formulated Philippines IT Roadmap internet
 Fell short compared to Malaysia’s  HTTPS – “Hyper-Text Transfer Protocol Secure”
Wawasan 2020 and Singapore’s iN2015  Types of Information:
 (shortly after roadmap was formulated,  First Name – hackers can know plenty of stuff
National Broadband Network (NBN) scandal just from your first name
erupted, consumed greater part of public  Last Name – sharing both first and last names is
attention riskier; prone identity theft
 Middle Name – not the riskiest; entire full name
Aquino Administration: Policies would be most risky
 Abolished CICT, instead moved IT directives  Current and previous schools (s) – can be used
under DOST-ICTO (Information and for verification purposes
Communication Technology Office)  Your Cellphone Number – same as posting your
 Minimized red-tapes for starting a business, tax number on a billboard
holidays for business operating in PEZA  Who your Mother and Father are – full names
 May 23, 2016: Signed into law bill creating the are risky, especially the mother’s maiden name
Department of Information and as it could be an answer to a secret question for
Communications Technology or DICT a lost password
 The department will promote ICT  Who your siblings are – strangers can use their
development, institutionalize e-government identity to dupe you
and manage the country’s ICT environment  Your address – criminals can find you
 The department shall be the primary policy,  Your home phone number – scams use this to
planning, coordinating, implementing, and deceive and a stranger can pretend to know
administrative entity of the Executive your parents or can pretend to be you
Branch of the government that will plan,  Your birthday – prone to identity theft
develop and promote national ICT
development agenda.  The Internet is defined as the Information
superhighway = anyone has access to this highway,
Duterte Administration: Policies can place information, and can grab that
 Open PH to foreign telos (or telcos idk) to speed information
up internet connections
 Develop national broadband plan for the Tips to Stay Safe Online:
Philippines 1. Be mindful of what you share online and what
 Creation of NIPC or National ICT Confederation site you share it to
of the Philippines 2. Read before accepting terms and conditions
 Commit to create one million direct jobs 3. Check out the privacy policy page of a website
and three million indirect jobs in the 4. Know the security features of the social
countryside by 2020 networking site you use
5. Do not share your password with anyone
Lesson 2 – Rules of Netiquette 6. Avoid logging in to public networks/Wi-Fi.
“Incognito browsing” won’t protect you from
Netiquette hackers
7. Don’t talk to strangers whether online or face-
 network etiquette, the do’s and don’ts of online
to-face
communication
8. Never post anything about a future vacation
9. Add friends you know in real life
10. Avoid visiting untrusted websites  Keyloggers – used to record the
11. Install and update an antivirus software on your keystroke done by the user. This is done
computer to steal their password or any other
12. Make your Wi-Fi at home a private network by sensitive information. It can also record
adding a password email, messages or any information you
13. Avoid downloading anything from untrusted type using your keyboard
websites (torrents = most vulnerable, not  Adware
monitored by site owner)  program designed to send your
14. Buy the software, don’t use pirated ones advertisement, mostly as pop-ups
15. Do not reply or click links from suspicious emails
2. Spam – transmission of unsolicited messages from
Internet threats various origins using electric messaging systems;
1. Malware unwanted email mostly from bots or advertisers
 malicious software 3. Phishing
 set of instructions that run on your computer  software or a program used by an attacker to
and make your system do something that an obtain personal information
attacker wants it to do  targets the passwords to hack and take control
 good for stealing personal information, deleting of a user account
files, clicking fraud, stealing software serial  goal is to acquire sensitive personal information
numbers and using your computer as relay like passwords and credit card details
 kinds of malware:
 Virus  Pharming
 malicious program designed to replicate  more complicated way of phishing where it
itself and transfer from one computer exploits the DNS (Domain Name Service)
to another either through the internet system
and local networks or data storage like
flash drives and CDs How to avoid these threats?
 a computer virus is a piece of malicious  A very effective way of avoiding these threats is
computer code that attaches itself to a verifying the authenticity and credibility of the
software program, email or computer WEB source.
file without your permission
 can transfer through the internet and Government Provisions for Online Courtesy and
local networks or data storage like flash Etiquette
drives and CD’s  Republic Act 10627 or Anti-Bullying Act of 2013
 Worm  Republic Act 10175 or Cybercrime Prevention
 A malicious program that transfers from Act of 2012
one computer to another by any type of
means Think Before You Click
 uses computer network to spread itself 1. Before you post something on the web, ask
 Example: ILOVEYOU worm, Love Bug these questions to yourself: Would you want
Worm created by Filipino your parents or grandparents to see it? Would
 Trojan you want your future boss to see it? Once you
 A malicious program that is disguised as post something on the web, you have no
a useful program but once downloaded control of who sees your posts.
or installed, leaves your PC unprotected 2. Your friends depend on you to protect their
and allows hackers to get your reputation online. Talk to your friends about
information this serious responsibility.
 Rogue security software – tricks the 3. Set your post to “private.” In this way, search
user into posting that it is a security engines will not be able to scan that post.
software. It asks the user to pay to 4. Avoid using names. Names are easy for search
improve his/her security but in reality engines to scan.
they are not protected at all 5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it
Both Trojan and Worm spread to other down or report it as inappropriate.
computers.
Copyright (Copyright Infringement)
 Spyware  intellectual property = If you create
 program that runs in the background something—an idea, an invention, a form of
without you knowing it literary work, or a research, you have the right
 has the ability to monitor what you are of how it should be used by others
currently doing and typing through  Some tips to avoid copyright infringement:
keylogging  Understand – Copyright protects literary
works, etc. but it generally does not protect
underlying ideas and facts; you can express
something using your own words but you
should give credit to the source
 Be responsible – Be responsible enough to
know if something has copyright
 Be creative – Ask yourself whether what
you are making is something that came
from you or something made from
somebody else’s creativity
 Know the law – in the Philippines,
copyrights only last a lifetime (of the
author) plus 50 years; there are also
provisions for “fair use” where intellectual  By default, all searches are AND searches
property may be used without consent as  You must capitalize the NOT and OR functions
long as it is used in commentaries,  Stop words (commonly occurring words and
criticisms, search engines, parodies, news numbers that are omitted to speed a full-text
reports, research, library archiving, teaching search) and all punctuating marks, except for
and education; fan-fiction is copyright the symbols noted in this topic, are ignored
infringement and some copyright holders unless they are surrounded by quotation marks
ignore them but they can opt to use their or preceded by the + symbol
rights  Only the first ten terms are used to get search
results
Effective Searching  Similar to the MDAS, term grouping and
Search Engines: Google, YouTube, SlideShare, Scribd Boolean functions are supported in the
following order: parentheses, quotation marks,
What happens when you Google? NOT +-, AND &, OR|

4. Look for a credible source


5. Give credit

Tips in effective searching


 Use unique, specific terms – use unique terms that
are specific to the subject you are researching
 Use quotation marks for exact phrases
 Don’t use common words and punctuation
(punctuation; “a” and “the” = stop words; they are
ignored; Raven and The Raven return entirely
different results)
 Capitalization – most search engines do not
Google Search Results:
distinguish between uppercase and lowercase, even
within quotation marks
 Drop the suffixes – enter the base word so that you
don’t exclude relevant pages
 Maximize AutoComplete
 Use browser history
 Set a time limit, then change tactics – try something
else if you can never find what you are looking for

YouTube Searching
1. Use quotes for exact matches
2. Limit your searches to a time frame
3. Using in title to force words to appear in the
Tips in conducting online research title
1. Have a question in mind 4. Take advantage of filters to narrow down
2. Narrow it down results
3. Advanced search (Google) 5. Use “+” or “-” to include or omit keywords
 Bing certain keywords and symbols for 6. Let YouTube fill in the blanks
advanced search:
Remember:
 The Internet is the great equalizer for those
who know how to use it efficiently.
 Anyone can now easily find facts using a search 2. Clip Art – a .GIF type; line art drawings or images
engine instead used as generic representation for ideas and objects
 Never underestimate the power of a skilled 3. Shapes – printable objects or materials that you can
search expert. integrate in your document to enhance its
appearance or to allow you to have some tools to
Other key terms: use for composing and representing ideas or
 Cybercrime – crime committed or assisted messages
through the use of the Internet 4. Smart Art – predefined sets of different shapes
 Privacy Policy – tells user how the website will grouped together to form ideas that are
handle its data organizational or structural in nature
 Virus – malicious program designed to replicate 5. Chart – allows you to represent data characteristics
itself and transfer from one computer to and trends
another 6. Screenshot – Sometimes, creating reports or
manuals for training or procedure will require the
Lesson 3 – Advanced Word Processing Skills integration of a more realistic image of what you
are discussing on your report or manual
Mail merge and label generation
 Mail Merge = allows you to create documents Word Processor
and combine or merge them with another  is an electronic device or computer software
document or data file application that performs the task of
2 Components of Mail Merge: composing, editing, formatting, and printing of
1. Form Document documents
 document that contains the main body of the  Examples: OpenOffice Writer, LibreOffice
message we want to convey or send Writer, Polaris Office, Kingsoft Writer,
 also included here is what we call place holders, Wordperfect, Wordpad, Microsoft Word
also referred to as data fields or merge fields
 this marks the position on your form document Microsoft Word
where individual data or information will be  is a word processor developed by Microsoft
inserted  It was first released on October 25, 1983
2. List or Data File  It is also known as MS Word.
 where the individual information or data that  Press “Windows Logo” + R then type “winword”
needs to be plugged in (merged) to our form then enter.
document is placed and maintained  Features of MS Word:
 AutoCorrect – corrects common spelling errors
as well as capitalization mistakes
 AutoFormat – applies formatting to text, e.g.
Label Generation number listing, bullet, hyperlinks
 creates a blank form document that simulates  Grammar Checker – proofreads documents for
either a blank label or envelope of pre-defined grammar, writing style, sentence structure
size and will use the data file that you selected errors and reading statistics
to print the information, typically, individual  Template – a document that contains the
addresses. formatting necessary for a specific document
type
Integrating images and external materials  Thesaurus – provides synonyms for a word in a
document
Kinds of Materials:  Tables – organize information into rows and
1. Pictures – electronic or digital pictures or columns
photographs you have saved in any local storage  Mail Merge – a feature that allows you to
device create a document and merge them with
 .JPG – short term for .jpeg or Joint Photographic another document or data file
Experts Group; identifies data compression for  Text Wrap – adjusts how the image behaves
the internet; 16.7 million colors; isn’t around other objects or text
transparent; best quality; doesn’t work well on
lettering, line drawings or simple graphics; small  Keyboard Shortcuts in Word Processing Software:
file size  Ctrl + A – Select All
 .GIF – Graphics Interchange Format; displays  Ctrl + B – Bold Text
transparencies; 256 colors; simple animation;  Ctrl + C – Copy Text
logos, drawings, small text, black and white  Ctrl + D – Show Font Dialog Box
images, or low-resolution files  Ctrl + E – Align Text to Center
 .PNG – “ping”; Portable Network Graphics;  Ctrl + F – Display Find Dialog Box
transparencies; 16 million colors; doesn’t  Ctrl + G – Display Go To Dialog Box
support animation; allows control of
 Ctrl + H – Display Replace Dialog Box
transparency level or opacity
 Ctrl + I - Italicize Text
 Ctrl + J – Justify Text  provides an automated way of displaying any
 Ctrl + K – Create a hyperlink statistical data
 Ctrl + L – Align Text to Left  It can be used to automatically compute for
 Ctrl + M – Tab several factors that are not easy to notice
 Ctrl + N – Create a new document especially when faced by a large data
 Ctrl + O – Open a document  Microsoft Excel includes several arithmetic and
 Ctrl + P – Display Print dialog box basic functions that help you compute faster.
 Ctrl + R – Align Text to Right
 Ctrl + S – Save a document Basic Excel Formulas:
 Ctrl + U – Underline Text Addition (+)
 Ctrl + V – Paste a copied text Subtraction (-)
 Ctrl + X – Cut a selected Text Multiplication (*)
Division (/)
 Ctrl + Y – Redo the last undone action
 Ctrl + Z – Undo the last action
*type <=> before the formula, thus: =a1+a2 <then, hit
the ENTER key>
 Customizing a Word Document
• Average – a function used to compute for the average
 Home Tab – allows you to change document of the number of a range.
settings, such as the font properties, adding
bullets or a numbered list, adjusting styles, and • COUNTIF – a function used to count the cells with a
other common features (Text Alignment: Left, specified content within a range; =COUNTIF(range,
Right, Center, Justified) criteria)
 Insert Tab – is used to insert different features
such as tables, pictures, clip art, shapes, charts, • SUMIF – a function used to compute for the
page numbers, word art, headers, and footers summation of a range if a certain condition is met
into a document.
 Page Layout Tab – refers to the arrangement of • AVERAGEIF – a function used to compute for the
text, images, and other objects on a page average of a range if a certain condition is met;
 Page Sizes: Short (Letter) – 8.5” by 11”, =AVERAGEIF(range, criteria, average range)
Long (Folio) – 8.5” by 13”, A4 - 8.27” by
11.69"
 Page Orientation: Portrait, Landscape Excel Formulas and Functions
 Image Placement:
 In Line with Text – default setting for You can use formulas to:
images that are inserted or integrated  Solve mathematical problems
in a document.  Complete statistical and financial functions
 Square – allows the image you inserted  Return numerical and text values based on
to be placed anywhere within the other cells
paragraph with the text going around  Add and format text in cells
the image in a square pattern like a
frame. Formula
 Tight – almost the same as the square  Mathematical Equation
setting, but here the text “hugs” to the  All formulas begin with an equal (=) sign
general shape of the image.  Data that is stored in the worksheet and that
 Through – allows the text on your needs to be used in a formula is referenced
document to flow even tighter, taking using the cell’s address
the contour and shape of the image  =A1+A2/(A3-A4)
 Top and Bottom – pushes the text away
vertically to the top and/or the bottom
of the image so that the image occupies
a whole text line on its own.
 Behind Text – allows your image to be
dragged and placed anywhere on your
document but with all text floating in
front of it.
 In Front of Text – allows your image to
be placed right on top of the text as if
your image was dropped right on it. Functions
 A predefined formula
Lesson 4 – Advanced Spreadsheet Skills  Formula: =A1+A2+A3+A4+A5
 Function: =SUM(A1:A5)
Microsoft Excel
More complex formula: Error Messages (Cell Reference)
 ######### – Column not wide enough
 #VALUE! – Wrong Argument or Reference
 #DIV/0! – Dividing by zero
 #Name? – Excel doesn’t recognize text in
formula
 #N/A! – Missing data or wrong value for lookup
function
 #REF – Cell reference not valid (Deleted cell,
pasted over)
 #NUM! – Invalid numeric value
 #NULL! – Specified cells do not intersect
What makes a formula?
 =(3*$A$2*SUM(A3:A9))^1/3
How to Copy Formulas?
 Begin with =
 AutoFill is a command you can use when you
 Constants want to copy the same formula across a range
 Cell References of adjacent cells.
 Operators  AutoFill will automatically change cell addresses
 Functions depending on where the new formula is being
copied
Constants
 Values entered directly into a formula
 Simple
 Accurate
 Inflexible
 2, 3, 12, 14.32

References
 Relative (Column Row)
A1, C18, ZZ65536]

 Absolute ($Column$Row)
$A$1, $C$18,$ZZ$6553

 Mixed (Fixed Column or Row)


$A1, C$18

 Named Ranges:
Int_Rate, Grade_Scale

Operators
 Arithmetic
- (negative) % ^ (Exponent) * / +
 Comparison
= < > <= >= <>

 Text Add values


&  Within a certain range:
 Reference =SUM(C2:C13)
: (Colon) _ (Space) , (Comma)  For an entire range:
=SUM(C:C) Note: Insert this function in another
Operator Order column.
 Formulas are read from Left to Right
1. ( ) Count Values
2. Negation  Count values in a range and it the entire range:
3. % =COUNT(C2:C13)
4. ^ =COUNT(C:C)
5. or /  Conditional Counting:
6. + or – =COUNTIF(A2:A13, “Jones”) or
7. & =COUNTIF(A2:A13, “=Jones”) – equal
8. = < > <= >= <> =COUNTIF(A2:A13, “<> Jones”) – not equal
 Count the Number of Sales Greater than a  Most information should still come from the
Target Value: reporter
=COUNTIF(C2:C13, “>”&D1) 2. Clarity
Note: the concatenation operator (&) is used to  avoid being fancy by using a font style that is
join the greater than symbol (>) with the cell easy to read
reference.  make sure that it is also big enough to be read
 Count the Number of Sales Greater than the by the audience
Sales Average:  once you start making your presentation,
=COUNTIF(C2:C13, “>”&AVERAGE(C2:C13)) consider how big the screen is during your
report
Conditional Summing  A font size of 72 is about an inch (depends on
 Formula that adds all the sales in January: the screen size). A one-inch letter is readable 10
=SUMIF(B2:B13, “=Jan”, C2:C13) feet away; a two-inch letter is readable 20 feet
 Add up sales made by other sales away
representative: 3. Simplicity
=SUMIF(A2:A13, “<> Rogers”, C2:C13)  use bullets or short sentences
 Add up the sales greater than a certain value:  summarize the information on the screen to
=SUMIF(C2:C13, “>500”,C2:C13) have your audience focus on what the speaker
is saying than on reading the slide
 limit the content to six lines and seven words
per line
 this is known as the 6 x 7 rule
Using the IF Function 4. Visuals
 Display a value that depends on criteria you set  use graphics to help in your presentation but
 Returns a value if one condition is true and not too many to distract the audience
returns another value if the condition is false  instead of using a table of data, use charts and
graphs
=IF(logical_test,value_if_true,value_if_false) 5. Consistency
 make your design uniform
PMT Function  avoid having different font styles and
 Function used to calculate a loan payment backgrounds
amount using principal, interest rate and 6. Contrast
number of payment periods.  use light font on dark background or vice versa
=PMT(rate, nper,pv)  this is done so that it is easier to read
=PMT( .09/12,4*12,24000)  in most instances, it is easier to read on screen
if the background is dark; this is due to the
Calculating time period brightness of the screen
 Each day, month, and year is given a particular
numerical value or serial number by your Hyperlinks
computer.
 Your computer will work from 1900 date system Using Hyperlinks in Microsoft Powerpoint:
or 1904 date system 1. Select an object or highlight a text.
 1900 date system: Jan 1, 1900 –Dec 31, 9999 2. Go to Insert > Hyperlinks (under links category)
 1904 date system: Jan 2, 1904 – Dec31, 9999 or use the shortcut key Ctrl + K. The insert
 To check go to Tools – Options – Calculation Hyperlink dialog box would appear.

Other Key Terms: Link to Options:


 Accounting Number Format – number that is a. Existing File or Web Page – creates a
used for accounting hyperlink to website or a local file saved in your
 Orientation – angle at which a text is diplayed hard drive. Just browse your file in the dialog
box or type the web address.
Lesson 5 – Advanced Presentation Skills
b. Place in This Document – creates a hyperlink
Creating an Effective Presentation that allows you to jump to a specific slide in
 here are some quick tips in creating an effective your presentation.
presentation:
1. Minimize c. Create a New Document – creates a hyperlink
 keep slide counts to a minimum to maintain a that once clicked, creates a new document on
clear message and to keep the audience your specified location.
attentive
 Remember that the presentation is just a visual d. E-mail Address – creates a hyperlink that
aid opens Microsoft Outlook that automatically
adds your specified recipient on a new email.
 Information graphics or infographics are used to
3. When done, click OK to apply your hyperlink. represent information, statistical data, or
knowledge in a graphical manner usually done
in a creative way to attract the viewer’s
Embedding files and data attention.
 Creating Infographics using Piktochart:
Embedding Objects in Microsoft Powerpoint 1. Create a piktochart account by going to
 Embedding objects is easy using PowerPoint www.piktochart.com and click sign up on
Presentation. With this option, you can insert the upper right corner of the page.
an Excel file that would look like a table to a 2. Fill up the information on the Sign Up page;
PowerPoint Presentation. alternatively, you can connect with Google+
or Facebook
Embedding an Excel File to your Powerpoint 3. Once you have created an account and
Presentation logged in, select a template for your
1. Go to the Insert tab. infographic. Since your data relates to
2. On the Text group, click on Object. marketing or sales, simply hover over the
3. The Insert Object dialog box would appear: Presenta Board theme under Free Themes
then select Create
4. The Piktochart editor will open (may take a
while to load depending on your Internet
connection). The Presenta Board theme
consists of three blocks (parts). Select the
blocks and input the information as you see
fit.
5. While editing a block, you can use the
various tools on the left side of the page:
A. Graphics – allows you to insert lines,
shapes, icons and even photos
B. Uploads – allows you to upload images
for your infographic
C. Background – changes the background
Options: of a selected block
a. Create New – creates a new file from scratch. D. Text – allows you to insert text to your
You can select on a wide variety of files listed. infographic with the option to add text
b. Create from File – creates a file from an frames
existing file saved on your hard drive; simply E. Styles – allows you to modify the color
browse the file to use it. Putting a check on the scheme of your infographic
“link” option will allow you to modify the Excel F. Tools – allows you to create charts
file inside your PowerPoint Presentation. (similar to the ones in PowerPoint),
maps (for demographics), and videos
4. Once you are done, click OK.
Editing tips:
Lesson 6 – Imaging and Design for Online Environment  Double-click a text to edit the content
 When working with objects, the toolbox
Basic Principles of Graphics and Layout: on top of the topmost block will allow
1. Balance – The visual weight of objects, texture, you to manipulate it. This is similar to
colors, and space is evenly distributed on the working with objects in PowerPoint
screen. where you can arrange an object to be
2. Emphasis – An area in the design that may on top or bottom of another
appear different in size, texture, shape or color  When working with charts, double-click
to attract the viewer’s attention. the chart to open the datasheet editor
3. Movement – Visual elements guide the viewer’s  You may rename the title of your
eyes around the screen. infographic on the top toolbar.
4. Pattern, Repetition, and Rhythm – These are 6. To save your work, click on Save on the top
the repeating visual element on an image or right of the page. To save it in your
layout to create unity in the layout or image. computer, click on Download. In the
Rhythm is achieved when visual elements Download options, select the medium-sized
create a sense of organized movement. and the PNG file type.
5. Proportion – Visual elements create a sense of
unity where they relate well with one another.
6. Variety – This uses several design elements to Online Image File Formats
draw a viewer’s attention.

Infographics
2. Choose the folder where the image you want to
manipulate is located using the file explorer on
the upper left
3. Once you have selected the folder, you will see
a preview of all the images found on that folder
at the bottom of the file explorer
4. From the preview, select the image you want to
use. The image will now be shown on a much
bigger preview inside your work area similar to
 *When inserting text to a web page, you can simply what is shown below
copy a text to your html editor, or you can upload it 5. Notice the properties of the image like the file
on a website as a PDF file. Most browsers support name, the image size (in pixels), and the file size
“add-ons” so that you can open PDF files without found on the bottom of the preview
leaving the browser. 6. Manipulate the image using the tools on the
bottom
Principles and Basic Techniques of Image Manipulation a. Home tab – this is where you can add a
 Tips to help you edit images for your website: frame, resize, sharpen, and add filters and
1. Choose the right file format – Try to make a effects to your image
real-life photograph into GIF to see the b. Objects tab – this is where you can place a
difference between PNG, GIF, and JPEG. wide variety of images like texts, shapes,
Knowing the purpose is the key to finding out and symbols
the best file format. c. Crop – this is where various tools can be
2. Choose the right image size – A camera with 12 found in order to properly crop an image to
megapixels constitutes to a bigger image size. a desirable size
Monitors have a resolution limit, so even if you d. Tools – includes other tools like red eye
have a million megapixels, it will not display correction, mole removal, mosaic effect and
everything. brush tools. For more information about a
3. Caption it – Remember to put a caption on tool, simply click it and a tip will be
images whenever possible. If it is not related to displayed describing how to use it.
the web page, then remove it. 7. Click Save located on the lower right of the
program. The Save As dialog box will appear.
Creating and Manipulating Images Using Photoscape Save it in your activities folder with the file
1. Viewer – picture viewer with features the same name editorexer.jpg. Check the file size and see
with most image viewers like changing image how much space you need.
orientation
2. Editor – alters the appearance of a single image Batch Edit
3. Batch Editor – alters the appearance of multiple  one of the most useful tools when trying to easily
images manipulate all images at the same time
4. Page – arranges several photos to create a 1. Select the folder where your photos are
single one; similar to a mosaic located, then on the Preview window, drag the
5. Combine – links several images together to photos you want to be part of the batch edit to
form a bigger image the work area (center)
6. Animated GIF – allows you to create an 2. Use the tools on the right to edit your photo.
animated GIF from several pictures This is similar to the options in edit except the
7. Print – readies pictures for printing Crop and Tools tab which are replaced by the
8. Splitter – divides a single photo into multiple Filters tab. The Filters tab is used to add a
parts certain filter that will apply to all your photos.
9. Screen Capture – captures the screen and saves 3. Resize the pictures so that they do not exceed
it 800 pixels in width. Add filters if you want.
10. Color Picker – grabs a pixel from your screen to 4. Click on Convert All button found on the upper
be used in editing right
11. Raw Converter – converts RAW images 5. The Save dialog box will appear that will allow
(uncompressed images usually from digital you to change the location, the name of the
camera) to JPEG images, and the file type.
12. Rename – allows you to rename a batch of
photos Sharing Photos with Photobucket
13. Paper Print – useful tool for printing your own  There are plenty of free image hosting sites out
calendars, sheets, lined paper, graph paper, etc. there, and Photobucket is one of the oldest.
Here’s how to access it:
Editor and Batch Edit 1. First, sign up for a Photobucket account on
photobucket.com. Just like Piktochart, you may
Editor Edit use your Google+ or Facebook account to
1. Open PhotoScape then choose editor automatically sign up.
2. Once your account is set up and you are already D – allows you to download your image
logged in, click the Start Uploading button. E – shares your image to social media sites with
the option to add a custom message.
7. You may choose to share your photo to your
friends on Facebook. If you are done sharing,
you may now log off and close the browser.

Lesson 7 – Online Platforms for ICT Content


Development
3. A new page will load allowing you to drag and
Social Media Platforms
drop your photos or to choose them manually
 Websites like Facebook allow you to create not
or to choose an entire folder to upload. Select a
only personal accounts but also pages and
folder, add a password (optional), then feel free
groups where you can share content.
to upload any photos you have right then.
 Twitter, LinkedIn (focus is on business and
professional networking), YouTube, Instagram

Blogging Platforms
 It typically looks like a newsletter where you are
given options to change the design to your
liking. Though you can manipulate the design,
social media platform’s popularity is still
unrivaled.
 WordPress, Tumblr, Blogger, Wix, Joomla

4. Once selected, a progress bar will appear Content Management System


indicating that the image is uploading. This may  A Content Management System (CMS) is a
take a moment and will depend on your computer application (sometimes online or
Internet connection. Once you are done, you browser-based) that allows you to publish, edit
will see an indicator similar to the one shown in and manipulate, organize and delete web
the image below. content. CMS is used in blogs, news websites,
and shopping.

Starting a Blog in Five Steps:


1. Choose a blogging platform, domain name, and
a. View Uploads – views photos you just
hosting option.
uploaded which also grants you options to
2. Design your blog using a simple theme.
share and edit them individually
3. Modify your blog to get your desired look and
feel.
b. Share Album – shares everything you just
4. Select the best plugins for your blog.
uploaded plus the other contents of your
5. Write compelling content that adds value to
specified folder
readers.
c. Edit Photos – uses Photobucket’s photo
 You can change the layout, color, backgrounds,
editing tools to manipulate your image
fonts, and menu of your Blog.
5. Let us just assume you will share a photo
Cloud Computing
individually. To do this, click on View Uploads.
 A web-based online software
Once the page loads, click the photo you want
to share.
Advantages of Cloud Computing:
6. On the top of the image, you will see the
1. No need to install
following options:
2. Saves hard disk space
3. Easy access to your software
4. Saves you money from buying software licenses
5. No need to update because it updates
automatically
Disadvantages of Cloud Computing:
A – shares your photo directly to social media 1. Can be hampered down by slow internet speed;
and blogging platforms: Facebook, Twitter, no connection, no cloud computing
Google+, Tumblr, and Pinterest, respectively 2. May still require compatible software like a
B – gives you a variety of link codes for HTML, browser
Forums, Emails, Instant Messaging, and a direct 3. You do not own the software; you are simple
link renting it
C – shares your image via email
4. Security risk of doing things over the Internet as 8. Jimdo Editor; Hover the cursor to the element.
opposed to your personal computer alone Select the options
5. More prone to hacking 9. Click "Edit Menu" to add menu from the menu
bar
Lesson 8 – Basic Web Page Creation 10. New Page for the Menu that you created
 Web page creation using templates 11. Select the available layout for your page
 Web page design using an online WYSIWYG 12. Add/ Edit information
platform 13. Upload picture from your computer
14. Choose for the layout of the pictures
WYSIWYG
 WYSIWYG is the acronym for What You See Is Jimdo Editor Icons
What You Get. This means that whatever you
type, insert, draw, place, rearrange, and eve (Icon pics at the end of the reviewer)
rything you do on a page is what the audience
will see. 1. Editing Elements:
 Hovering over the text, image, or any elements
Creating a Website using Microsoft Word you see on the website will highlight the
1. Open Microsoft Word. element.
2. Type anything on the page like “Welcome to my  Move element up - used to move the
Website.” element up by one level
3. Click on File > Save As > Browse.  Move element down - used to move
4. On the Save As dialog box, locate your activities element one level down
folder and create a new folder named “Sample  Delete element - used to remove the
Webpage.” element
5. Specify the filename “Sample Webpage.”  Duplicate element - used to duplicate the
6. On the Save As type, select “Web Page (*.htm; element
*.html).”  Drag tool - click and drag the element to a
7. Click the Change Title button. valid part of the page
8. Input the title as seen below, then click OK then 2. Image Elements
Save.  Sizing tools - used to make image larger or
9. Check the files on your Sample WebPage folder. smaller or restore actual size of page
You will see a new folder generated including  Align tools - used for left, right, center
your htm/html file. alignment page
10. Open the Sample WebPage.htm file and you will  Rotate tools - used to rotate image clockwise or
see that you just created a webpage using MS counterclockwise page.
Word.  View tools - used to enable enlarge image, link
photo, and remove link.
Creating your Own Website using Jimdo  Other tools - caption and alternative text; allow
 Jimdo is a WYSIWYG web hosting service. It sharing to pinterest
offers free, professional, and business web 3. Paragraph Elements:
hosting services.  Heading - to insert heading type of text
 Jimdo has an iOS and Android App which you  Text - to insert a paragraph type of text
can use to manage your website whenever you  Photo - to insert a single photo
do not have access to a PC.
 Text with Photo - to insert a photo surrounded
with text
 Photo Gallery - to insert multiple photos on one
Steps:
area
1. Sign-Up (New Account) or Login (Existing
 Horizontal Line - to insert a horizontal line that
Account)
acts as a divider
2. Select a website that you want to create
 Spacing - to add a space with a specified size
(Website, Store, Blog)
3. Select an editor (Jimdo Dolphin and Jimdo  Columns - to insert columns that divide an area
Creator) vertically
4. What is your website all about? (Health &  Video - to insert a video from video hosting site
Wellness, Consulting & Coaching, Services, Art like YouTube
& Design, Photography & Portfolio, Store, Bar &  Form/Form Button - creates a Send an Email
Restaurant, Tourism, Home & Garden, Fashion, form for feedback (Radio button and Checkbox
Community & Clubs, Personal, Blog, Other, Not (?))
sure yet)  Store Item - adds a space for selling an item
5. Choose the available template (online shopping)
6. Select a plan for your website (Business, Pro,  Share Buttons - adds buttons for the site visitor
Free) to share your website
7. Type your domain name  Additional Elements - include other options like
Google Maps, file download, widgets, etc
 Web application – dynamic or static, online
Categories of Cloud Computing  Mobile application – installed on mobile
phone
Cloud Computing  System application – apps installed in
 Generally speaking, cloud computing can be computer
thought of as anything that involves delivering
hosted services over the Internet.

Service Models:
 Software/Application
 Platform
 Infrastructure

Software/
Application

Platform

Infrastructure-as-a-Service (IaaS)
Infrastructure  A service model that involves outsourcing the
basic infrastructure used to support operations-
-including storage, hardware, servers, and
Software-as-a-Service (SaaS) networking components.
 Also referred to as “software on demand,” this  The service provider owns the infrastructure
service model involves outsourcing the equipment and is responsible for housing,
infrastructure, platform, and running, and maintaining it. The customer
software/applications. typically pays on a per-use basis.
 Typically, these services are available to the  The customer uses their own platform
customer for a fee, pay-as-you-go, or a no (Windows, Unix), and applications
charge model.  Professional User
 The customer accesses the applications over  foundation, input and output, hardware or
the internet. software, networking
 end user  maintained by system administrator
 combination of SAAS and PAAS

Platform-as-a-Service (PaaS)
 A service model that involves outsourcing the
basic infrastructure and platform (Windows,
Unix)
 PaaS facilitates deploying applications without
the cost and complexity of buying and
managing the underlying hardware and
software where the applications are hosted.
 The customer uses their own applications
 Professional User

Вам также может понравиться