Empowerment Technology
Empowerment Technology
2nd
technology empowerment in a connected, digital world Edition
O
Authors
LY C
Melissa P. Juanillo, MIT Emelita Jane M. Tan, MAET
Series Editor
e
rat
LU
cu
textuali
con
AT
ze R
CO
LLABO
A
CRE
A
TE
EV
PY
O
LY C
N N
technology empowerment in a connected, digital world
O IO
2nd Edition
T
Authors
A
Series Editor
Jaime D.L. Caro, Ph.D.
EV
Philippine Copyright 2020 by TechFactors Inc.
PY
All rights reserved. No part of this courseware may be reproduced or copied in any form,
in whole or in part, without written consent of the copyright owner.
O
First printing of the second edition, 2020
ISBN 978-621-425-060-8
LY C
Published by TechFactors Inc.
Printed in the Philippines
N N
Authors Melissa P. Juanillo, MIT and Emelita Jane M. Tan, MAET, LPT
Series Editor Jaime D.L. Caro, Ph.D.
O IO
Content and Editorial Alvin D. Ramirez, Cristina G. Saulo, Alexander P. Lim,
Micah Angelie C. Dizon, Divine Louise P. Anai, Syrahil J. Enriquez
and Angelica Mae M. Emata
Creatives Jiyas Suministrado-Morales, Gilbert Lavides, Christian Andrew Sabado,
T
Joseph Timothy S. Bago, Angelo Bulasa, and Justine Eliza Fontanilla
A
PY
to be instrumental in the development of critical knowledge and skills that are vital for careers. Major
industries are now largely driven by information and communications technology (ICT), which allows
for innovative ways of doing things. TFI nurtures the necessary ICT competencies in learners through
enthusing and constructive questions and activities that lead to expected outcomes and further
contextual exploration.
O
The SHS titles focus on how learners can gain the know-how that they need for the situations and activities
in their respective courses. Because each lesson is designed to be outcomes-based, the interactive
LY C
activities that come with each courseware incorporate constructively-designed assessment measures.
They also follow a curriculum that aligns with and far exceeds DepEd expectations.
N N
But beyond all these, it’s the TFI spirit of making learning a great experience that sets our courseware
apart from all the rest.
O IO T
A
TechFactors, Inc.
A
EV
PY
as a Licensed Professional Teacher and full-time assistant professor. Melissa is an Oracle 11g SQL
Fundamentals I Certified educator.
Emelita Jane M. Tan, MAET, LPT, is a Higher Education Unit faculty of Miriam College who handles
undergraduate and graduate programs. Ms. Tan is a U.P. GURO Mathematics and Science Teaching
O
Society volunteer, where she conducts various training programs for daycare workers, elementary
teachers, and parents. From time to time, she conducts IT short course trainings for professionals at MFI
Foundation Inc. Teacher Ejane, as she’s popularly known to her students, also handles computer tutorials
LY C
for middle school international students.
Ejane graduated from Maryknoll (now Miriam) College, with a Bachelor of Arts in Communication Arts. A
couple more feathers in her cap are her degree in BS Secondary Education and her Master in Education
N N
Major in Educational Technology (with high distinction) at Roosevelt College, Cainta, Rizal. At present,
Ms. EJane continues to share her knowledge through her expertise as an Educational Technology,
E-Learning, Strategies of Teaching, Digital Information, and Media Literacy resource speaker to ICT
O IO
teachers and professionals.
Dr. Jaime Caro is Professor of Computer Science at the University of the Philippines Diliman and heads
its Service Science and Software Engineering Laboratory. He received the following degrees from the
LU
University of the Philippines Diliman: Bachelor of Science major in Mathematics (cum laude) in 1986,
Master of Science in Mathematics in 1994, and Doctor of Philosophy in Mathematics in 1996. He spent
a year as a postdoc research fellow at the University of Oxford in the United Kingdom.
Dr. Caro was Assistant Vice President for Development of the University of the Philippines for 14 years.
A
He led the creation of the UP Information Technology Development Center. His past positions include
President of the Computing Society of the Philippines (CSP), President of the Philippine Society of
Information Technology Educators (PSITE), Vice President of the Game Developers Association of the
EV
Philippines (GDAP), President of the UP System Information Technology Foundation (UPSITF), Vice
President of the Mathematical Society of the Philippines (MSP), and Chairman of the CHED Technical
Panel on Information Technology Education. Dr. Caro is also Chief Academic Officer of TechFactors Inc.
PY
skills, helping them become active and responsible members of society. For senior high school students
reading this book, media become more than just sources of information; they become spaces for
expression and transformation.
LESSON SECTIONS
O
The TFI Senior High School Series features a Unified Lesson Section System.
LY C
LESSON TITLE
The lesson title presents a question that not only captures what the lesson is about, but also presents
N N
the student with the practical reason for learning the lesson.
TARGET
O IO
This section contains at least three learning objectives that state what the children will learn at the end
of the lesson.
T
EXPLORE In this section, students will be given
a pre-work activity that will enable CHECK
A
them to assess what they already know In this section, students will be given a
about the topic. Guide questions and combination of objective and essay-type
graphic organizers will be used to touch activities that will assess how much they
LU
EXAMINE EQUIP
A
will be answered in the discussion materials that can help them prepare for
which constitutes the second part of the their portfolio project.
section and tackles concepts and skills
using self-directed learning principles.
INTEGRATE BUILD
To help the students engage with the Containing an evaluation task that
lesson in a more critical manner, this connects the lesson to the whole
section will present them with questions module, this section helps the student
that connect the lesson to relevant or work on their portfolio project little by
current issues and trends. little. Activities in this section can be
done either individually or by group.
PY
LESSON 1: What is empowerment technology? 7
Empowerment Technology: A Definition 9
Empowerment Through ICT 9
O
ICT and Society 11
A Peek in the Past 13
LY C
Latest Technology Trends 15
N N
research?
Contextualized Search and Research
23
24
O IO
ICT Tools Useful in Research 28
ICT Safety, Security, and Netiquette 30
T
LESSON 3: How do I use advanced word tools to develop content? 37
A
Mail Merge 51
EV
PY
MODULE 2 HOW DO I CREATE OR INNOVATE
PRODUCTS AND PROCESSES USING
ICT TOOLS? 97
O
LESSON 6: What are ways we can use to create and manipulate
images to convey information? 99
LY C
The Elements of Design 100
The Principles of Design 104
Image File Formats 105
N N
Image Authoring and Editing Tools
Image Manipulation Using GIMP
106
107
O IO
LESSON 7: How do we use infographics to present the data
we have? 115
T
Graphic Design Versus Information Design 116
What Is an Infographic? 117
A
PY
Social Networking Sites 152
Blogging Sites vs. Content Management Systems 154
WordPress – Content Management System 156
O
LESSON 11: What tools can I use to collaborate online? 167
Tools for Online Collaboration 168
LY C
Online Collaboration Tools 171
Trello and Kanban 171
N N
LESSON 12: How do we use web design to effectively
communicate our cause? 181
O IO
What Is Web Design? 182
What Makes a Good Web Design? 182
T
LESSON 13: How do we publish our website to reach our
audience? 191
A
Web Page Design Using Templates and Online WYSIWYG Platforms 194
A
EV
PY
What Is WiX? 204
Step-by-Step Process of WiX 205
Some Tips for Making a Web Page 208
How to Publish Your Website 209
O
LESSON 15: How do we create online and Web presence? 213
LY C
Do You Have an Online or Internet (Web) Presence? 214
Your Web of Influence 216
Love the Traffic 217
N N
LESSON 16: How do we implement what we have developed? 225
O IO
Carrying & Delivering the Presentation 226
Presenting the [Link] Domain and Its Social Issue 229
T
Giving Feedback on a Project and Its Impact 230
A
LU
A
EV
PY
Learning Outcomes
• Discover how empowerment technologies empower people.
O
• Identify recent social issues that have something to do with
empowerment technologies.
LY C
• Use advanced productivity tools collaboratively in developing and
proofreading a project.
Portfolio Output
N N Project Pitch – a five- to ten-page paper documenting the details of your
O IO
social change project. The following are the elements of your project that
must appear in the project pitch document:
This refers to the outcomes that your group wants to produce after the
project has been completed.
PY
The project’s objectives are Some of the project’s All the project’s objectives
Objectives of the project
all SMART objectives are not SMART do not follow SMART
O
Some articles, research,
Relevancy of related Articles, research, and Lack of relevant articles,
and statistics presented are
LY C
literatures and resources statistics presented are all research, and statistics are
not relevant and not cited
gathered relevant and cited properly presented
properly
N N Statistical data are all Statistical data are all Statistical data are not
O IO
Present statistical data graphically pleasing and graphically pleasing but graphically pleasing and
organized some are not organized organized
T
A
LU
A
EV
PY
• A Peek in the Past
Portfolio Task 1 - Your main output for this course is a social change project related to the
O
track or strand you are pursuing for Senior High School. To help you prepare for this, brainstorm
for initial ideas.
LY C
Lesson 2: How can I use the Internet as a tool for effective
research?
N N
• Contextualized Search and Research
O IO
○ What Is Research?
○ Why Is It Important?
○ What Are the Research Skills I Need to Develop?
T
• ICT Tools Useful in Research
○ Google Search
A
○ Google Scholar
○ Online Journals
LU
○ Academic Websites
• ICT Safety, Security, and Netiquette
○ Verification of Online Source Materials
○ Computer Ethics and Netiquette
A
Portfolio Task 2 - After learning the essential techniques and standards in data gathering
through the Internet, you should now be able to gather data relevant to your project. Look for at
least five articles or discussions that will support the claims of your project. Follow the criteria
for choosing a reference website and use proper citation.
PY
○ How to Run the Spelling & Grammar Tool
○ Ignoring “Errors”
○ For Spelling “Errors”
○ For Grammar “Errors”
O
○ Automatic Spelling and Grammar Checking
• Finalizing and Protecting Documents
LY C
○ Document Inspector
○ Protecting Your Document
• Tracking Changes
N N
• Comments
• Comparing Documents
O IO
• Mail Merge
○ How to Use Mail Merge
○ How to Insert Recipient Data
T
Portfolio Task 3 - Prepare the project pitch document that includes the identified problem and
gathered articles in a document format. Use proper citations and review tools in MS Word.
A
○ To Create a Formula
○ Modifying Value from a Cell Reference
EV
• Functions
○ Parts of a Function
○ Using a Function
PY
• Filtering
○ Advanced Filter
• Charts
○ Types of Charts
O
○ Inserting a Chart
○ Changing Chart Types
LY C
○ Moving a Chart
Portfolio Task 4 - Conduct a survey regarding your chosen project. You are free to use Word
to prepare printed survey forms or use free online survey tools. Using MS Excel, tabulate the
N N
data gathered.
Portfolio Task 5 - Prepare a slide presentation discussing your project concept. Your project
A
pitch document may serve as a reference for the contents of your presentation. Present it in class.
EV
PY
• Define “empowerment The 21st century is described as the Digital Age because of the emergence
technology.” and development of different technologies that have helped people
• Explain how Information accomplish tasks in a more effective and efficient way. A common
and Communications example is the use of smartphones for communication via text messaging,
Technology (ICT) has voice call, or video call. You can even use smartphones to send an email
been used for people or post on a website.
O
empowerment.
• Describe the current To begin understanding the concept of empowerment technology, think
state of ICT of several applications you use every day, whether on a personal
LY C
technologies, online computer (PC) or a mobile device. Describe how each application helps
systems, functions, and
you accomplish everyday tasks at home or in school. Afterwards,
platforms.
form a small group and interview each member. Complete the chart
• Compare and contrast
the nuances of varied
shown below.
N N
online platforms,
sites, and content to
best achieve specific
Applications I
Personally Use
How It Helps Me
How Other People
Use It
O IO
class objectives
or address situational Facebook I use Facebook to My groupmates use it
challenges. send or post pictures to easily collaborate for
to my relatives living projects. They create
abroad. group chats and send
T
files via Facebook
Messenger.
A
LU
A
EV
What did you learn about your group members and their use of
technology? Did you notice some similarities or differences? Did you
learn something new?
In the next section, you will read an excerpt of a research paper from
Stanford Junior University entitled “Obama and the power of social
media and technology.” Examine the role of technology during Obama’s
presidential campaign in 2007. Use the marginal questions as your
guides in examining the article.
PY
How did US President
Barack Obama use
O
social media during his
presidential campaign?
LY C
campaign effective?
N N
O IO T
A
“A major success factor for Obama’s victory was how Obama’s campaign used
social media and technology as an integral part of its strategy, to raise money,
and, more importantly, to develop a groundswell of empowered volunteers who
LU
felt they could make a difference.” – The European Business Review, “Obama
and the power of social media and technology”, 2010, p. 1. Obama’s presidential
campaign focused on
Have you ever thought social networks as online platforms could be such the messages revolving
influential tools? This article reveals to us the fact that technology has around change, respect,
become an essential tool for empowerment in the Digital Age. What does and inclusion. Why do
A
empowerment mean and why is it important for a student like you to you think the people felt
understand this concept through the use of technology? empowered by simply
supporting him in his
EV
online advocacies?
PY
tools, and skills you need to be able to achieve the end-goal: learn how to
cook a dish.
O
technology empower each individual? Other than the target outcome,
what other results are achieved through the use of technology?
LY C
• A fifteen-year-old owner of a bakeshop wanted to sell her cookies online.
Knowing that web development is a complex subject, she checked online
for a free website creation tool. She found WiX and she was able to put up
her own website in just an hour.
N N
INTEGRATE
• The student council wanted to create a video for their upcoming
fundraising project. When they asked for help from videographers, they
O IO
were surprised at the cost given to them. So, the council decided to find a
During President
Duterte’s campaign,
video creation tool online. They tried Powtoon and was able to produce a
his advocacy was for multimedia video in a day.
change to happen. How • A businessman is running late for a meeting. To find the fastest route from
T
did his supporters use his office to his home, he uses Waze and he is able to tell his estimated
social media to build his time of arrival to the people waiting for him at the office.
image?
A
Nowadays, there are applications that can be accessed and used for free.
In the examples given, each individual is able to solve his or her problem
with less cost, less time, and less effort.
LU
PY
O
Accesses the needed information
effectively and efficiently
LY C
N N
Uses information effectively to
accomplish a specific purpose
O IO T
Understands many of the economic, legal,
and social issues surrounding the use
of information, and accesses and uses
A
Why do you think these two literacies must be linked? In the following
discussions, you will analyze the current state of ICT and evaluate
how information and technology literacy work together for an
empowered individual.
PY
Study the list shown. What other examples can you add for each aspect?
O
research materials
• Online learning communities
LY C
• Recording and computation of grades
• Managing records and other
administrative purposes
N N
O IO
• Online marketing
• Convenient business transactions
• Online payment gateways
T
A
PY
these skills are when you graduate?
O
Students should be familiar with basic concepts of ICT.
LY C
Students should feel confident about using computers.
N N
Students should be familiar with using computers to
communicate.
O IO
Students should be aware of how ICT changes jobs.
PY
Do you think that these two were also the goals for technology innovation
and development in the past? Study the organizer shown and review the
factors that have influenced changes in ICT.
O
Digital Age Hardware 2.0 Smart + Portable Multifunctual Devices
LY C
(1979) (1979) (1985) (1982) (1991) (1993) (1995) (1997) (2001) (2002) (2003) (2004) (2013) 3D (2013) (2015) (2016)
Apple II Walkman NES Video Digital Super Intel Play Video & Apple Laptop Blu Ray GPS Printer Microsoft Gear VR Samsung
Game Console Storage Nintendo Pentium Station Data Storage iPod Surface Pro Galaxy S7
Edge
The Age of Processing World Wide Web Connectivity Personalization
(1983) (1985) (1995) (1995) (1993) (1991) (2003) (2004) (2006) (2007) (2011) (2011) (2010) (2015)
Microsoft Windows 1.0 ebay Yahoo Windows Linkedin Facebook Quora Windows 10
N N
MSN Twitter Dropbox Google+ Snapchat
Word Hotmail 98
Tech as a Peripheral Tool Tech begins to Supplement Tech Supplements Instruction Tech as an Integrated Tool
O IO (1981)
The
(1983)
SunGard
(1989)
Math
(1997)
Blackboard
(1997)
Florida
(2003)
Haiku LMS
(2004)
Innosight
(2007)
Knewton
(2010)
Lumosity
(2010)
Udemy
(2013)
Moodle
(2013)
Edmodo
Oregon Trail Data Blaster Virtual School Institute
for Apple II Systems Inc.
1980s
REALIZATION OF AN
1990s TIME OF CHOICE
2000s
HOW DO WE MEASURE PROGRESS
TODAY
FOCUS ON 21st CENTURY SKILLS
EDUCATIONAL CRISIS AND INNOVATION AND INCREASE ACCOUNTABILITY? AND COLLEGE READINESS
T
Wide Web (WWW). But did you know that it also has evolved into
something which provides users a wide range of services? Look at how
the Web has evolved.
A
?
EV
ARPANET WORLD-WIDE-WEB
ETHERNET
1969 1973 1976 1982 1990 1994 1995 1998 1999 2003 2004 2005 2007 2009 2010 2012 2014 2016
?
FTP & TCP/IP INTERNET
PY
A big leap came with version 2 of the Web, or Web 2.0 in 2004, as defined
by tech moguls Tim O’Reilly and Dale Dougherty, though the term was
originally coined by Darcy DiNucci in 1999. Web 2.0 had no update on
technical specifications, but rather on the cumulative changes in the
way web pages were made and used. Web 2.0 was the Read-write Web,
O
Web of Interaction, or Participative Web. A Web 2.0 site allowed users to
interact and collaborate with each other through social media dialogue
where they could create user-generated content in a virtual community.
LY C
These included social networking sites, blogs, folksonomies, wikis, video
sharing sites, hosted services, web applications, and mashups.
N N
by virtue of the standards of the World Wide Web Consortium (W3C). As
stated by the W3C, “The Semantic Web provides a common framework
that allows data to be shared and reused across application, enterprise,
O IO
and community boundaries.”
could find not only sites based on the keywords in your search entry, but
also interpret the context of your search.
LU
The more you browse the web, the more information about you is stored.
Your search results may include your preferences based on your browsing
history, the songs you like to hear, the food you like to eat, and the places
you want to see, among others.
PY
HTML/Portals XML/RSS RDF/RDFS/OWL
O
In which way do you Gartner, Inc., a leading information technology research and advisory
think Intelligent apps will company, highlighted the Top 10 Strategic Technology Trends of 2017 at
LY C
help you in your daily their Gartner Symposium held in 2016 in Orlando, Florida. What follows
tasks? is an infographic summarizing the 2017 trends they identified based on
three themes, namely intelligent, digital, and mesh.
PY
Virtual & Augmented Digital Twins Blockchains and
there are many possible applications,Learning including music distribution, Distributed Ledgers
identity verification, title registry and supply chain.” Virtual & Augmented Digital Twi
Learning
“Distributed ledgers are potentially transformative but
Applied AI & most
Advance initiatives
Intelligent App Intelligent Things
are still in the early alpha or beta testing stage,” said
MachineDavid
Learning Cearley of
O
Gartner, Inc.
LY C
for Windows devices helping us as virtual personal [Link] Through
& Augmented Digital Twins
evolution of technologies such as Google Home, these conversational
Applied AI & Advance Intelligent App
Learning
Intelligent Things
D
N N
Conversational Digital
Systems Technology S
Platforms
Mesh App and Service Architecture (MASA) – According to Gartner, Virtual & Augmented Digital Twins Blockchains and
Learning Distributed Ledgers
Inc., MASA “enables users to have an optimized solution for targeted
O IO
endpoints in the digital mesh (e.g., desktop, smartphone, automobile)
as well as a continuous experience as they shift across these
different channels.”
Conversational Digital Mesh App and
T
Systems Technology Service Architecture
Digital Technology Platforms – TheseVirtual &are the platforms that enable
Augmented Digital Twins Blockchains
Platforms and
a digital business. The following platformsLearning
are identified by Gartner: Distributed Ledgers
A
A. Definition of Terms. Write the definition of the terms in the graphic organizer using your own
words.
Empowerment
PY
O
Information Literacy Technology Literacyy
LY C
N N
O IO
Empowerment Technology
T
A
LU
B. Situation Analysis. Read the following news items online. Identify the following: (a) the
challenge or problem, (b) the technology used to address the challenge, and (c) how the technology
empowered the individuals involved.
A
1. US News (Health)
“How Technology Helps Patients and Other Visitors Navigate Hospitals” by Ruben Castaneda
EV
a b c
[Link]
navigate-hospitals
a b c
PY
O
[Link]
LY C
small-business-tech-news-this-week/#1c649511151c
3. Times of Israel
a
N N
“Israel tech helps US speed up passport procedures” by Shoshanna Solomon
b c
O IO T
A
LU
[Link]
4. [Link]
A
“Carpooling app helps Manila commuters create transport fixes” by Katerina Francisco
a b c
EV
[Link]
a b c
PY
O
[Link]
LY C
C. Compare and Contrast. Research online to find out the key features, advantages, and
disadvantages of the technologies shown in the chart.
N N
Social Media
Key Features Advantages Disadvantages Purpose
O IO
Facebook
Twitter
T
A
Tumblr
LU
Blog
EV
Vlog
Podcast
Google Drive
PY
Dropbox
Podcast
O
LY C
Video Sharing Platforms
YouTube
N N
O IO
Vimeo
Dailymotion
T
A
BUILD
LU
EQUIP
Your main output for this course is a social change project related to the To get an idea for a
track or strand you are pursuing for Senior High School. To help you good social change
prepare for this, brainstorm for initial ideas. project, you may visit the
A
affected by each. Reflect and write on why you want to address each issue around the globe:
or challenge you have noted.
[Link]
socialchangeprojects.
[Link]/
[Link]
tm/articles/2013/09/18/
tln_bohstedt.html
[Link]
category/management-
leadership/project-
management/
PY
O
LY C
2
N N
O IO T
A
LU
3
A
EV
PY
• Use the Internet as a tool
for credible research and You learned about the meaning and importance of empowerment
information gathering. technologies in the previous lesson. By working on a project, your group
• Gain awareness of identified issues to be resolved. Now you will learn about research. What
cybercrimes. is the proper way to do research?
• Practice computer ethics,
O
online safety, and Where do you often get information for your projects? Fill out the
security. graphic organizer below.
LY C
N N Research
O IO
Topic
T
A
LU
PY
information they have,
but it is enough if they
want to find specific
A. information. Search
engines require context
B. for it to give you the
O
most relevant results.
C.
LY C
Be honest with your answer and do not try to Google it. Most of the time,
we simply enter the word Madonna without considering what might
appear. If you answered C, something similar to the following example
N N
will appear in the search results.
O IO T
A
LU
A
EV
What if you answered A? Try Googling it and you might get lost in your
search results.
PY
experiments, events,
Committing errors when searching for information such as these does
phenomena, and
observations.
not matter much because it generally does not affect other people.
According to the authors of the book, Research Skills for Students, this
kind of “research” is called personal research. The research we do at
schools, on the other hand, is called professional research (Allison, et
O
al., 2016).
LY C
academic world, and it is the type of research you will be doing in this
courseware.
N N solutions to existing problems and questions using facts and data. This is
usually presented in a form where all methods and procedures conducted
are recorded so that they can be viewed and accessed by others.
O IO
Why Is It Important?
T
Although there are several forms of research, such as original research
(primary source), scientific research (providing explanations about the
A
Thomas Edison is widely known as the inventor of the light bulb, but he
was not the inventor of the first electric light. 78 years before Edison’s
light bulb became popular, Humphry Davy developed the arc-lamp,
A
which was the first electric light device. Like other inventions, though,
it was not without flaws. The arc-lamp did not stay lit for very long and
was too bright. The British physicist, Joseph Swan, discovered that
EV
PY
Even in this day and age, there are still gaps in the body of knowledge
that humankind has produced, especially in medical science. For every
cure, treatment, or medicine, intensive research and clinical trials are
performed before they are approved to ensure the safety of the people
who are to avail of the benefits.
O
What Are the Research Skills I Need to Develop?
LY C
Searching for answers to questions you have for your project requires
more than just a simple Google search. You need to have proper skills
that will enable you to gather useful and credible information online.
N N
According to Scholastic, the following are the online research skills
students need (Hudson, 2017). EQUIP
O IO
Check Your Sources You can learn more
about Google search
Evaluate the information you gather from your sources, whether engine conventions here:
they are from books, online articles, news sites, or websites. Consider
the benchmarks for evaluating a website: currency (is it up to date?),
T
[Link]
security (does it ask for too much private information from you?), scope [Link]/GoogleTips
(is the content in-depth or too shallow?), and authority (who wrote the
A
content? Is he an expert?).
Be specific when entering queries into search engines. It gives the search
engine proper context regarding what you are looking for, therefore
enabling the engine to give you better search results. You can also use
the special keys to use when searching. See the infographic that follows.
A
EV
PY
Searches for the exact
Only searches the Searches for the exact phrase Excludes this term
phrase and each of the
pages of that site and each of he words separately from the search
form
words separately
O
site:[Link] ~college ”test scores” -SATs 2008..2010
LY C
~ -
Will also search related words, such Excludes this term
N N
O IO as ‘higher education’ and ‘university’. form
from the search
How To Google It
T
filetype: intitle:
A
*
EV
Replaces itself with common terms in your search (in this case, Red Rumped swallow
and lesser Striped swallow will be both be searched, along with many others).
There are times when the Internet does not provide the information you
are looking for. You may not find the exact answer to your query, but
bits of data are scattered all over the Internet. You just need to think
critically and synthesize the data you have gathered until you yourself
can formulate your own conclusion.
PY
Respect Ownership
O
copyright infringement. These will be discussed in further detail in the
succeeding topics.
LY C
Social media and other information tools like Wikipedia and online
forums are useful when doing research. Social media can provide various
and nuanced perspectives on the information you need. Sources like
N N
Wikipedia, however, should be evaluated before you use the information
from it. The sources cited on Wikipedia, however, are a practical starting
point in gathering credible information. We will discuss other good
O IO
sources of information in the succeeding topics.
level results provided to you by your search engine. The following are
websites, webtools, and online documents that may provide you with
better access to the information you are looking for. You can learn more
LU
Google Scholar
Google Scholar, another product from Google, gives users, especially
researchers, a simpler way to search for scholarly literature on the
Internet. Using Google Scholar, you can search for research papers,
articles, books, court rulings, and other sources of scholarly information.
This is a great tool when looking for contents for the Related Literature
section of your research papers.
PY
are no longer confined
to keywords. You can
now search online using
apps and devices that
listen in and use audio,
O
specifically spoken
voice. Some apps use
images to look for things
on the Internet. Here
LY C
are examples of such
services that expand the
possibilities in doing
research:
N N
The Musicmatch app
recognizes the melody a
O IO
person is singing.
speak and help them professionals in their respective fields. Articles in journals are different
search for things online, from newspapers. Newspapers are intended for general readers while
among other things. journal articles are intended for academics and people who are engaged
in specialized fields of study. These kinds of articles, most of the time,
are the most useful as primary information sources for research.
A
PY
There are many academic websites and libraries that provide electronic
copies of papers, journals, books, videos, and audio recordings that may
aid you in the research process. The following are some of the most
notable.
O
Internet Archive
LY C
to-access collection of digitized materials ranging from websites,
multimedia files, and academic materials. A large number of books,
including modern ones, can also be borrowed from the Open Library,
also run by the Internet Archive.
EBSCOhost
N N
O IO
EBSCOhost is another digital library that offers premium fee-based
access to mainly academic materials that are normally not available for
public use. It runs a service that provides an online research database
with full-text digital copies of books, medical references, and historical
archives.
T
JSTOR
A
PY
just opinions of the authors and they are not factual? This might get you
COMMANDMENTS OF into trouble, especially if you are doing a research paper.
COMPUTER ETHICS
It is best to do your research far ahead of the deadline to allow yourself
1. Thou shalt not use
some time to evaluate and verify the sources of your homework. Follow
a computer to harm
the criteria below when evaluating your source material.
O
other people in any
way.
2. Thou shalt not • Currency – Is the information up-to-date?
interfere with other • Security – Does the site ask too much personal information?
LY C
people’s computer • Scope – Is the information in-depth?
work. • Authority – Does the information come from a trusted expert?
3. Thou shalt not sneak
around in other
N N
people’s computer
files. Computer Ethics and Netiquette
4. Thou shalt not use a
O IO
computer to steal. Computer Ethics is a new branch of ethics that is concerned with
5. Thou shalt not use standards of conduct in the use of computers. It deals with how
a computer to bear computing professionals should make decisions regarding professional
false witness. and social conduct.
6. Thou shalt not copy
T
or use proprietary Following the 1987 memo on ethics of the Internet Advisory Board, the
software for which Computer Ethics Institute created the Ten Commandments of Computer
A
you have not paid. Ethics in 1992 which were introduced by Ramon C. Barquin in his paper
7. Thou shalt not use entitled “In Pursuit of a ‘Ten Commandments’ for Computer Ethics.”
other people’s It is a means to create “a set of standards to guide and instruct people
computer resources
LU
on the ethical use of computers.” It copies the archaic style of the Ten
without authorization Commandments from the King James Bible.
or proper
compensation.
There are several activities that you can do using online services:
8. Thou shalt not
appropriate other
search topic, read articles, log in to your online accounts, e-bank, write
comments, post pictures, chat with a friend via social networking sites
A
people’s intellectual
output. (SNS), and others. But the more information you put or use online,
9. Thou shalt think the higher the risk placed on your online safety. You can be a victim of
identity theft, phishing, malware infections, etc. It is your responsibility
EV
PY
The biggest issue surrounding ICT concerns the violation of intellectual
property rights (IPR), which is the act of stealing other people’s works
and ideas, whether knowingly or unknowingly. For example, when you
buy a book, the author or publisher earns money, but if you borrow a
book and photocopy it, you technically do not pay for it—the author or
O
publisher of the book does not get anything in return for the use of the
book. The latter is one form of IPR infringement, no matter how subtle.
LY C
Another common form of IPR infringement is when you use other
people’s work, such as images, movies, or music, and alter them or
combine them into a different work, such as those used in YouTube fan-
created videos and image modifications. There may be no intention to
N N
profit from such work, but it is still considered as IPR infringement.
you have made may be claimed freely or used by others for profit without
your knowledge or permission. There would be no legal basis for you to
claim ownership of the material.
LU
the originator of an idea without the need to apply for rights if there’s
already a record of what has been produced by the person.
EV
Artworks, novels, short stories, poems, music, and movies are only
some of the copyrighted things that are available on the Internet.
Unfortunately, this can be copied without a single centavo given to the
authors of the works. That’s piracy, and the Internet is only one of many
platforms where they are distributed. Other instruments used for piracy
include digital video cameras, MP3 recorders, and optical disc burners
for CDs and DVDs. In order to minimize the USB drives, incidence
of illegal copying of intellectual material, manufacturers have been
cautioned about making and designing products that allow easy and
multiple duplication of media files.
PY
Six Ways to Avoid Plagiarism
1. Paraphrase - Read the material you wish to use and rephrase it in your own
words. Using two copied words consecutively must be avoided. However,
in a situation wherein it cannot be avoided, quotation marks must be used.
O
2. Cite - Proper citation must be observed when referencing existing material.
Several guidelines are observed when writing research papers and reports
LY C
depending on the industry standard. Examples are the guidelines established
by the Modern Language Association (MLA), the American Psychological
Association (APA), the Associated Press (AP), and the Chicago Manual of
N N
Style. Citation often requires the name of the author of the material you
intend to reference and the publication date.
O IO
3. Quoting – Directly quoting the source material is recommended in order
to avoid misquotation or misinterpretation. However, many institutions
generally discourage the use of “block quotes.” Block quotes are direct
quotations that are 40 or more words long and are usually separated from
T
the main text. It is still best to paraphrase your source materials and avoid
quoting directly as much as possible.
A
4. Citing Quotes - The methods of citing quotes and citing the paraphrased
material generally differ. The former often includes the page number
LU
written after the name of the author if the source material is a book, a
magazine, or a newspaper, among several other sources.
5. Citing Your Own Material - Although the reference you may want to use is
your own work, it is still necessary to cite yourself as you would the work of
A
another person. Failure to provide citations for your own material is known
as “self-plagiarism.”
EV
PY
1. A Website mentioning your
exact name.
O
as office productivity tools, office
productivity software, etc.
LY C
3. PDF papers on societal change.
N N
from year 2007 to 2016.
5. PowerPoint presentations
O IO
regarding social change projects.
T
Test II. Enumeration. List down 6 skills in research you need to have
and explain what it is.
A
Skill Description
LU
A
EV
PY
O
LY C
N N
O IO T
A
LU
A
BUILD
EV
Title of the
Research /
PY
Article
O
Authors/
Copyright/
Source or
Reference
LY C
Abstract
N N
O IO T
Objective and
scope
of the
A
study
LU
Significance
A
EV
Methods
Results
and
Conclusion
PY
• Create original or
derivative content while In the previous lesson, you have learned how to gather reliable
carefully citing sources information such as articles and other resources for your project. In
using advanced this lesson, you will learn how to use proper citations for derivative
MS Word tools in the content intended for your project pitch. You will also learn the purpose
Citation & Bibliography of using Track Changes and other advanced Microsoft Word tools in
O
group. publishing papers.
• Proofread existing
content using advanced Term, research, and thesis papers usually come around at the end of the
LY C
MS Word tools. semester. Unlike essays, these papers require extensive research, citation
• Send customized letters of sources, and seemingly endless revisions. You print and submit the
to a large group of first draft to your professor or teacher, he/she evaluates it, and later,
people using the
returns it to you with editing and proofreading marks only to find out
Mail-Merge feature of
N N
that almost 90 percent of your work need to be revised. You update your
MS Word.
work and print again, but the teacher still finds writing mistakes in the
paper. The cycle is painstaking, but, you need not do that because there’s
O IO
MS Word to the rescue and it already has a proofreading tool along with
other useful editing tools that you may or may not be aware of.
To make an assessment of Word tools and know which you have been
using before, check all that you are aware of in the table below.
T
A
Checking
Text Basic Headers Spelling and
Grammar
LU
Finalizing and
Formatting
Page Layout Protecting
A
Pictures
Documents
Printing
Shapes SmartArt
EV
Documents
Line and
Textboxes and
Paragraph Mail Merge
WordArt
Spacing
PY
proofread the
document?
O
Microsoft Corporation. It lets you create documents for your assignments, electronically?
term paper or research work, letters, and certificates or
just edit any text document. It provides several features
LY C
that make your work, like copying and pasting text from
different sources, inserting objects, laying out content,
and editing and proofreading documents, much easier.
N N
In the example above, proofreading marks are written on
the printed document where the writer will refer to when
revising his work on the computer. But what if your editor
O IO
is from elsewhere and sending a printed copy is not practical? What if
you wanted to save on printing costs because of price hikes in paper and
ink products? MS Word offers a feature that allows you to proofread
any document, check the spelling and grammar, track the changes made,
and add comments. It simplifies not only the checking part but also the
T
revision of the document.
A
The next section discusses some of the features of MS Word that you can
use to make you more productive and assist you in the creation of your
project documentation. These features are:
INTEGRATE
LU
to serving in the US
National Security
PY
to choose from are APA, MLA, and Chicago.
To do this, click the References tab, then
select the desired style in the Citations &
Bibliography group.
O
2. Add Citations and Sources. You need
to cite the authors in your documents for
the information you got from them. To do
LY C
this, click the Insert Citation command in
the References tab, and select Add New
Source. A dialog box will appear. Just enter
the requested information, like the author’s
PY
2. The Spelling and Grammar pane will appear. Word will try to give one
O
or more suggestions for each error in your document. You can select a
suggestion and click Change to correct the error.
LY C
3. Word will move through each error until you have reviewed them all. After
reviewing all the errors, a dialog box will appear confirming that the spelling
and grammar check is complete. Click OK.
N N
O IO T
4. If no suggestions are given, you can manually type the correct spelling in
your document.
A
Ignoring “errors”
LU
The spelling and grammar check is not always correct. There are
many grammatical errors Word would not notice. There are also times
when the spelling and grammar check will say there’s an error in a word
A
or phrase when there’s none. Usually, this happens with people’s names
and words not in the dictionary.
EV
• Ignore: This will skip the word in question without changing it.
• Ignore All: This will skip the word in question and all other instances
of the word in the document without changing it.
• Add: This adds the word to the dictionary so it will never come up as
an error.
• Ignore: This will skip the word or phrase without changing it.
PY
Automatic spelling and grammar checking
Word automatically checks your document for
spelling and grammar errors, so you are informed
that there is an error without running a separate
O
check. These errors are indicated by colored,
wavy lines.
LY C
• The red line indicates that the word is misspelled.
• The blue line indicates that there is a grammatical
error, including misused words.
N N
O IO
Spelling Error Grammar Error
T
To correct spelling errors:
PY
O
LY C
2. A dialog box will appear. Select Proofing on the left side of the
dialog box.
N N
O IO T
A
LU
A
3. Check the box for Hide spelling errors in this document only and
Hide grammar errors in this document only, then click OK.
EV
PY
Document Inspector
Whenever you create or edit a document, certain personal information
may be added to the file automatically. You can use the Document
Inspector to remove this type of information before sharing a document
O
with others.
LY C
1. Click the File tab to go to Backstage view.
2. From the Info pane, click Check for Issues, then select Inspect Document
PY
O
LY C
N N
O IO T
A
LU
4. A dialog box will appear, prompting you to save. Just click OK.
PY
O
LY C
6. The document will now be marked as final.
N N
O IO T
A
Tracking Changes
LU
Comments.
PY
2. Track Changes will now be turned on. Changes you make
to the document will have colored markups from this point.
O
Reviewing Changes:
LY C
The tracked changes are just suggested changes. For these to become
permanent, they must be accepted. The original author may agree or
disagree with the editor if these changes are to remain or be rejected.
N N
1. First, select the change you want to either accept or reject.
O IO T
A
PY
4. When you are done, click the Track Changes command to turn off the
tracking of changes.
O
LY C
N N
O IO T
A
If you want to accept all changes, click the drop-down arrow for Accept,
LU
then click Accept All. If you don’t want to track your changes anymore,
you can select Accept All Changes and Stop Tracking.
A
EV
PY
To hide Tracked Changes:
O
command to the right of the Track Changes
command.
2. You can see four options from the drop-down
LY C
menu.
3. Choose the desired option from the drop-down
menu. Here, we will select No Markup to
view the final version of the document before
N N
we accept the changes.
Comments
There are times when you want to add a comment to provide feedback
PY
instead of changing a document.
To add comments
O
LY C
1. You highlight some text, or place the insertion point
N N
2.
where you want the comment to be displayed.
In the Review tab, click the New Comment
command as shown.
O IO
3. Write your comment. When you are done, close
the comment box by pressing the Esc key or by clicking
anywhere outside the comment box.
T
A
To delete comments
1. Select the comment you want
to delete.
2. In the Review tab, click the Delete command.
LY C
N N
If you want to delete all the comments, click the Delete tools folder
drop-down arrow and click Delete All Comments in Document.
O IO T
A
LU
Comparing Documents
If you did some changes in a document without
A
PY
4. Word will then compare the two files to determine the changes and then
create a new document. The changes will appear as colored markups. You
can then use the Accept and Reject commands to finalize the document.
O
LY C
N N
O IO T
A
LU
Mail Merge
A
PY
5. On the Mail Merge task pane, select Use an
existing list, then click Browse.
O
LY C
N N
O IO
7. If you are using an Excel workbook, select the worksheet that contains
the list and press OK.
T
A
LU
A
8. In the Mail Merge Recipients dialog box, you can control the recipients
EV
included in the merge by checking or unchecking each box. The default has
all the recipients selected. Click OK when you’re done.
9. Click Next: Write your letter from the Mail Merge task pane to move
to the next step.
10. You can now write your letter. When it’s printed, the recipient data will
be different for each copy, but the content of the letter would be the same.
You’ll need to add placeholders for the recipient data so Mail Merge
knows exactly where to add the data.
1. Put the insertion point where you want the information to appear in
the document.
PY
2. Select one of the four placeholder options: Address block, Greeting
O
line, Electronic postage, or More items.
LY C
placeholder you would choose. Select the desired options then click OK.
N N
O IO T
A
LU
5. Repeat the steps each time you want to enter information from your
record.
7. Make sure that the information from the recipient list appears correctly
in the letter. You can use the left and right scroll arrows to view
each document.
O
10. A dialog box will appear. Select All, then click OK.
LY C
N N
O IO
11. The Print dialog box will appear. If needed, adjust the print settings, then
click OK. The letters will be printed
T
A
LU
A
EV
Test I. Multiple Choice. Read the questions carefully then write the
letter of the best answer on the space provided.
____1. Using the keyboard only, which buttons would you press to
select the entire document?
PY
a. Ctrl + A
b. Ctrl + C
c. Ctrl + F
d. Ctrl + V
O
____2. What would you click if you want to reverse a recent action?
LY C
a.
b.
c.
d.
____4. What command would you use if you need to change a word in
your document to another word?
LU
a. Ctrl + C
b. Ctrl + X
c. F7
d. Shift + F7
A
____5. You can modify alignment, line spacing, and paragraph spacing
in the:
EV
a. Format tab
b. Layout menu
c. Paragraph dialog box
d. Styles tab
____6. What will you see if you spell check the phrase “You can check a
website and write a document simultanously”?
PY
____8. Mon designed an invitation for their annual thanksgiving and
then emailed it to his supervisor. His supervisor added some
editing suggestions and he agreed to it. How can he finalize
the document?
O
a. Delete the revisions and retype the document.
b. In Backstage view, select Proofing, then press OK.
c. Under the Review tab, click the Accept drop-down arrow, then
LY C
select Accept All Changes.
d. Under the References tab, turn off Spelling and Grammar, then
save the document.
N N
____9. The Mail Merge feature can be used to address the same letter
to ___________.
O IO
a. one person
b. several different people
c. sender
T
d. receiver
____10. Which tab should you use to select the format for your
A
bibliography list?
a. Review Tab
LU
PY
EQUIP
O
You can access various
references on these
websites:
LY C
[Link]
[Link]/pop-
culture/2012/11/the-10-
N N
most-common-internet-
crimes
O IO
[Link]
com/blog/netiquette-
rules-safety/
[Link]
T
A
LU
A
EV
Using all the data that your group gathered for your project, you will
now prepare your project pitch document. Use the tools and techniques
you have learned from this lesson and be extra careful in writing your
PY
content. Refer to the details below.
O
Title of the Project
LY C
This refers to the social issue you identified and want to tackle in the
semester. Your aim is to address this issue by increasing people’s
awareness about the issue at hand. This should be in question format.
N N
Objectives of the Project
This refers to the outcomes your group wants to have after the project
O IO
is completed.