0% found this document useful (0 votes)
500 views68 pages

Empowerment Technology

Uploaded by

Abigail Gegante
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
500 views68 pages

Empowerment Technology

Uploaded by

Abigail Gegante
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

PY

2nd
technology empowerment in a connected, digital world Edition

O
Authors

LY C
Melissa P. Juanillo, MIT Emelita Jane M. Tan, MAET

Series Editor

N N Jaime D.L. Caro, Ph.D.


O IO T
A

e
rat
LU
cu

textuali
con
AT

ze R
CO
LLABO
A

CRE
A
TE
EV
PY
O
LY C
N N
technology empowerment in a connected, digital world
O IO
2nd Edition
T
Authors
A

Melissa P. Juanillo, MIT


LU

Emelita Jane M. Tan, MAET, LPT


A

Series Editor
Jaime D.L. Caro, Ph.D.
EV
Philippine Copyright 2020 by TechFactors Inc.

PY
All rights reserved. No part of this courseware may be reproduced or copied in any form,
in whole or in part, without written consent of the copyright owner.

O
First printing of the second edition, 2020
ISBN 978-621-425-060-8

LY C
Published by TechFactors Inc.
Printed in the Philippines

N N
Authors Melissa P. Juanillo, MIT and Emelita Jane M. Tan, MAET, LPT
Series Editor Jaime D.L. Caro, Ph.D.
O IO
Content and Editorial Alvin D. Ramirez, Cristina G. Saulo, Alexander P. Lim,
Micah Angelie C. Dizon, Divine Louise P. Anai, Syrahil J. Enriquez
and Angelica Mae M. Emata
Creatives Jiyas Suministrado-Morales, Gilbert Lavides, Christian Andrew Sabado,
T
Joseph Timothy S. Bago, Angelo Bulasa, and Justine Eliza Fontanilla
A

Systems Mark B. Abliter, Kenneth T. Salazar, Allan Nicole C. Celestino,


Robie Marc R. Peralta, Carlo M. Espinosa, Tyron Ed Tiongson,
Adrian Villafuerte and Kim Tyrone Plechas
LU

Cover Design Christian Andrew Sabado

Exclusively distributed by TechFactors Inc.


101 V. Luna Road Extension
A

Sikatuna Village, Quezon City


1101 Philippines
EV

Telephone number: (632) 929 6924


E-mail address: info@[Link]
Website: [Link]

ii Philippine Copyright 2020


PREFACE
TechFactors, Inc. (TFI) fills the need for quality educational materials that address the unique demands of
a Senior High School (SHS) program where students are given sufficient preparation for their preferred
college course and career path. The TFI Senior High School interactive courseware has been designed

PY
to be instrumental in the development of critical knowledge and skills that are vital for careers. Major
industries are now largely driven by information and communications technology (ICT), which allows
for innovative ways of doing things. TFI nurtures the necessary ICT competencies in learners through
enthusing and constructive questions and activities that lead to expected outcomes and further
contextual exploration.

O
The SHS titles focus on how learners can gain the know-how that they need for the situations and activities
in their respective courses. Because each lesson is designed to be outcomes-based, the interactive

LY C
activities that come with each courseware incorporate constructively-designed assessment measures.
They also follow a curriculum that aligns with and far exceeds DepEd expectations.

N N
But beyond all these, it’s the TFI spirit of making learning a great experience that sets our courseware
apart from all the rest.
O IO T
A

Dr. Jaime D.L. Caro


Chief Academic Officer
LU

TechFactors, Inc.
A
EV

Philippine Copyright 2020 iii


ABOUT THE AUTHOR
Melissa P. Juanillo, MIT earned her master’s degree in information technology at the Technological
University of the Philippines, Manila (TUP-Manila). She is currently finishing her doctorate in information
technology at the Technological Institute of the Philippines Quezon City (TIP-QC), where she works

PY
as a Licensed Professional Teacher and full-time assistant professor. Melissa is an Oracle 11g SQL
Fundamentals I Certified educator.

Emelita Jane M. Tan, MAET, LPT, is a Higher Education Unit faculty of Miriam College who handles
undergraduate and graduate programs. Ms. Tan is a U.P. GURO Mathematics and Science Teaching

O
Society volunteer, where she conducts various training programs for daycare workers, elementary
teachers, and parents. From time to time, she conducts IT short course trainings for professionals at MFI
Foundation Inc. Teacher Ejane, as she’s popularly known to her students, also handles computer tutorials

LY C
for middle school international students.

Ejane graduated from Maryknoll (now Miriam) College, with a Bachelor of Arts in Communication Arts. A
couple more feathers in her cap are her degree in BS Secondary Education and her Master in Education

N N
Major in Educational Technology (with high distinction) at Roosevelt College, Cainta, Rizal. At present,
Ms. EJane continues to share her knowledge through her expertise as an Educational Technology,
E-Learning, Strategies of Teaching, Digital Information, and Media Literacy resource speaker to ICT
O IO
teachers and professionals.

ABOUT THE SERIES EDITOR


T
A

Dr. Jaime Caro is Professor of Computer Science at the University of the Philippines Diliman and heads
its Service Science and Software Engineering Laboratory. He received the following degrees from the
LU

University of the Philippines Diliman: Bachelor of Science major in Mathematics (cum laude) in 1986,
Master of Science in Mathematics in 1994, and Doctor of Philosophy in Mathematics in 1996. He spent
a year as a postdoc research fellow at the University of Oxford in the United Kingdom.

Dr. Caro was Assistant Vice President for Development of the University of the Philippines for 14 years.
A

He led the creation of the UP Information Technology Development Center. His past positions include
President of the Computing Society of the Philippines (CSP), President of the Philippine Society of
Information Technology Educators (PSITE), Vice President of the Game Developers Association of the
EV

Philippines (GDAP), President of the UP System Information Technology Foundation (UPSITF), Vice
President of the Mathematical Society of the Philippines (MSP), and Chairman of the CHED Technical
Panel on Information Technology Education. Dr. Caro is also Chief Academic Officer of TechFactors Inc.

iv Philippine Copyright 2020


ABOUT THE BOOK
The E-Tech courseware enables students to adopt a more critical framework in consuming and creating
media products. It emphasizes self-directed and outcomes-based learning in which students can initiate
and manage their own learning through activities that equip them with professional and real-world

PY
skills, helping them become active and responsible members of society. For senior high school students
reading this book, media become more than just sources of information; they become spaces for
expression and transformation.

LESSON SECTIONS

O
The TFI Senior High School Series features a Unified Lesson Section System.

LY C
LESSON TITLE
The lesson title presents a question that not only captures what the lesson is about, but also presents

N N
the student with the practical reason for learning the lesson.

TARGET
O IO
This section contains at least three learning objectives that state what the children will learn at the end
of the lesson.
T
EXPLORE In this section, students will be given
a pre-work activity that will enable CHECK
A

them to assess what they already know In this section, students will be given a
about the topic. Guide questions and combination of objective and essay-type
graphic organizers will be used to touch activities that will assess how much they
LU

on essential concepts which will be have learned from the lesson.


discussed in detail in the latter parts of
the lesson.

EXAMINE EQUIP
A

A special feature of this section is the


sample material containing marginal This section will give students links to
questions which the student must additional resources that they can use for
answer on their own. These questions further study as well as supplementary
EV

will be answered in the discussion materials that can help them prepare for
which constitutes the second part of the their portfolio project.
section and tackles concepts and skills
using self-directed learning principles.

INTEGRATE BUILD
To help the students engage with the Containing an evaluation task that
lesson in a more critical manner, this connects the lesson to the whole
section will present them with questions module, this section helps the student
that connect the lesson to relevant or work on their portfolio project little by
current issues and trends. little. Activities in this section can be
done either individually or by group.

Philippine Copyright 2020 v


TABLE OF CONTENTS
MODULE 1 HOW DOES E-TECH EMPOWER PEOPLE
AND AFFECT SOCIAL CHANGE? 1

PY
LESSON 1: What is empowerment technology? 7
Empowerment Technology: A Definition 9
Empowerment Through ICT 9

O
ICT and Society 11
A Peek in the Past 13

LY C
Latest Technology Trends 15

LESSON 2: How can I use the Internet as a tool for effective


N N
research?
Contextualized Search and Research
23
24
O IO
ICT Tools Useful in Research 28
ICT Safety, Security, and Netiquette 30
T
LESSON 3: How do I use advanced word tools to develop content? 37
A

References: Citations and Bibliography 38


Checking Spelling and Grammar 39
LU

Finalizing and Protecting Documents 43


Tracking Changes 45
Comments 49
Comparing Documents 50
A

Mail Merge 51
EV

LESSON 4: How do I use advanced Excel tools to process and


present data? 59
Formulas and Functions 60
Functions 62
The Function Library 64
Sorting 66
Filtering 69
Charts 74

vi Philippine Copyright 2020


LESSON 5: What are advanced PowerPoint tips and tools for
effective slide presentations? 81
Top Ten Slide Tips 82
SmartArt 84

PY
MODULE 2 HOW DO I CREATE OR INNOVATE
PRODUCTS AND PROCESSES USING
ICT TOOLS? 97

O
LESSON 6: What are ways we can use to create and manipulate
images to convey information? 99

LY C
The Elements of Design 100
The Principles of Design 104
Image File Formats 105

N N
Image Authoring and Editing Tools
Image Manipulation Using GIMP
106
107
O IO
LESSON 7: How do we use infographics to present the data
we have? 115
T
Graphic Design Versus Information Design 116
What Is an Infographic? 117
A

Elements of an Effective Infographic 117


Create Infographics Using Piktochart 118
LU

Types of Infographics 120


Making a Timeline Infographic 120

LESSON 8: How do we upload and share our files online? 125


A

File Management 126


Online File Management and Storage Services 127
EV

Image Hosting Platforms 129


Video Hosting Platforms 130

LESSON 9: How do we use videos as media to convey information? 133


Video Production 134
Storyboarding 136
Things to Consider in Making a Video 138
Video Editing Applications 139

Philippine Copyright 2020 vii


MODULE 3 HOW DO WE USE ICT TO COLLABORATE
IN PROJECT DEVELOPMENT? 147
LESSON 10: Which online content platforms should I use? 151
Rich Web Content and Platforms for Content Development 152

PY
Social Networking Sites 152
Blogging Sites vs. Content Management Systems 154
WordPress – Content Management System 156

O
LESSON 11: What tools can I use to collaborate online? 167
Tools for Online Collaboration 168

LY C
Online Collaboration Tools 171
Trello and Kanban 171

N N
LESSON 12: How do we use web design to effectively
communicate our cause? 181
O IO
What Is Web Design? 182
What Makes a Good Web Design? 182
T
LESSON 13: How do we publish our website to reach our
audience? 191
A

Web Hosting and Domain Name System 192


LU

Web Page Design Using Templates and Online WYSIWYG Platforms 194
A
EV

viii Philippine Copyright 2020


MODULE 4 HOW DO WE IMPLEMENT WHAT WE
HAVE DEVELOPED? 199

LESSON 14: How do we create a website to publish our work? 203

PY
What Is WiX? 204
Step-by-Step Process of WiX 205
Some Tips for Making a Web Page 208
How to Publish Your Website 209

O
LESSON 15: How do we create online and Web presence? 213

LY C
Do You Have an Online or Internet (Web) Presence? 214
Your Web of Influence 216
Love the Traffic 217

N N
LESSON 16: How do we implement what we have developed? 225
O IO
Carrying & Delivering the Presentation 226
Presenting the [Link] Domain and Its Social Issue 229
T
Giving Feedback on a Project and Its Impact 230
A
LU
A
EV

Philippine Copyright 2020 ix


MODULE 1
How does e-tech empower people and
affect social change?

PY
Learning Outcomes
• Discover how empowerment technologies empower people.

O
• Identify recent social issues that have something to do with
empowerment technologies.

LY C
• Use advanced productivity tools collaboratively in developing and
proofreading a project.

Portfolio Output
N N Project Pitch – a five- to ten-page paper documenting the details of your
O IO
social change project. The following are the elements of your project that
must appear in the project pitch document:

Title of the Project


T
This refers to the social issue you have identified and you want to tackle
during the semester. Your aim is to address this issue by increasing
A

people’s awareness about it. Your title should be in question format.

Objectives of the Project


LU

This refers to the outcomes that your group wants to produce after the
project has been completed.

Related Literatures and Resources


A

Try to prove your point by presenting articles, research, or statistics.


Present at least 10 articles here.
EV

1 Philippine Copyright 2020


Excellent Very Good Needs Practice
Criteria
5 PTS 3 PTS 1 PT

The chosen title somehow The chosen title somehow


Title of the project The chosen title fits the
fits the proposed issue but does not fit the proposed
(Question Form) proposed issue
needs improvement issue

PY
The project’s objectives are Some of the project’s All the project’s objectives
Objectives of the project
all SMART objectives are not SMART do not follow SMART

O
Some articles, research,
Relevancy of related Articles, research, and Lack of relevant articles,
and statistics presented are

LY C
literatures and resources statistics presented are all research, and statistics are
not relevant and not cited
gathered relevant and cited properly presented
properly

N N Statistical data are all Statistical data are all Statistical data are not
O IO
Present statistical data graphically pleasing and graphically pleasing but graphically pleasing and
organized some are not organized organized
T
A
LU
A
EV

Philippine Copyright 2020 2


Lesson 1: What is empowerment technology?
• Empowerment Technology: A Definition

• Empowerment Through ICT

• ICT and Society

PY
• A Peek in the Past

• Latest Technology Trends

Portfolio Task 1 - Your main output for this course is a social change project related to the

O
track or strand you are pursuing for Senior High School. To help you prepare for this, brainstorm
for initial ideas.

LY C
Lesson 2: How can I use the Internet as a tool for effective
research?

N N
• Contextualized Search and Research
O IO
○ What Is Research?
○ Why Is It Important?
○ What Are the Research Skills I Need to Develop?
T
• ICT Tools Useful in Research
○ Google Search
A

○ Google Scholar
○ Online Journals
LU

○ Academic Websites
• ICT Safety, Security, and Netiquette
○ Verification of Online Source Materials
○ Computer Ethics and Netiquette
A

○ Intellectual Property Rights (IPR)


○ Avoiding Plagiarism
EV

Portfolio Task 2 - After learning the essential techniques and standards in data gathering
through the Internet, you should now be able to gather data relevant to your project. Look for at
least five articles or discussions that will support the claims of your project. Follow the criteria
for choosing a reference website and use proper citation.

3 Philippine Copyright 2020


Lesson 3: How do I use advanced Word tools to develop
content?
• References: Citations and Bibliography
• Checking Spelling and Grammar

PY
○ How to Run the Spelling & Grammar Tool
○ Ignoring “Errors”
○ For Spelling “Errors”
○ For Grammar “Errors”

O
○ Automatic Spelling and Grammar Checking
• Finalizing and Protecting Documents

LY C
○ Document Inspector
○ Protecting Your Document
• Tracking Changes

N N
• Comments
• Comparing Documents
O IO
• Mail Merge
○ How to Use Mail Merge
○ How to Insert Recipient Data
T
Portfolio Task 3 - Prepare the project pitch document that includes the identified problem and
gathered articles in a document format. Use proper citations and review tools in MS Word.
A

Lesson 4: How do I use advanced Excel tools to process


LU

and present data?


• Formulas and Functions
○ Formulas
A

○ To Create a Formula
○ Modifying Value from a Cell Reference
EV

• Functions
○ Parts of a Function
○ Using a Function

Philippine Copyright 2020 4


• The Function Library
○ Insert Function Command
• Sorting
○ Types of Sorting
○ How to Sort an MS Excel Sheet

PY
• Filtering
○ Advanced Filter
• Charts
○ Types of Charts

O
○ Inserting a Chart
○ Changing Chart Types

LY C
○ Moving a Chart

Portfolio Task 4 - Conduct a survey regarding your chosen project. You are free to use Word
to prepare printed survey forms or use free online survey tools. Using MS Excel, tabulate the

N N
data gathered.

Lesson 5: What are advanced PowerPoint tips and tools for


O IO
effective slide presentations?
T
• Top Ten Slide Tips
• SmartArt
A

○ Inserting a SmartArt Graphic


○ Adding Text to a SmartArt Graphic
LU

○ Converting Existing Text to SmartArt


○ Modifying a SmartArt Graphic

Portfolio Task 5 - Prepare a slide presentation discussing your project concept. Your project
A

pitch document may serve as a reference for the contents of your presentation. Present it in class.
EV

5 Philippine Copyright 2020


PY
O
LY C
N N
O IO T
A
LU
A
EV

Philippine Copyright 2020 6


LESSON 1 WHAT IS EMPOWERMENT
Target TECHNOLOGY?
By the end of this lesson,
you should be able to EXPLORE

PY
• Define “empowerment The 21st century is described as the Digital Age because of the emergence
technology.” and development of different technologies that have helped people
• Explain how Information accomplish tasks in a more effective and efficient way. A common
and Communications example is the use of smartphones for communication via text messaging,
Technology (ICT) has voice call, or video call. You can even use smartphones to send an email
been used for people or post on a website.

O
empowerment.
• Describe the current To begin understanding the concept of empowerment technology, think
state of ICT of several applications you use every day, whether on a personal

LY C
technologies, online computer (PC) or a mobile device. Describe how each application helps
systems, functions, and
you accomplish everyday tasks at home or in school. Afterwards,
platforms.
form a small group and interview each member. Complete the chart
• Compare and contrast
the nuances of varied
shown below.

N N
online platforms,
sites, and content to
best achieve specific
Applications I
Personally Use
How It Helps Me
How Other People
Use It
O IO
class objectives
or address situational Facebook I use Facebook to My groupmates use it
challenges. send or post pictures to easily collaborate for
to my relatives living projects. They create
abroad. group chats and send
T
files via Facebook
Messenger.
A
LU
A
EV

What did you learn about your group members and their use of
technology? Did you notice some similarities or differences? Did you
learn something new?

In the next section, you will read an excerpt of a research paper from
Stanford Junior University entitled “Obama and the power of social
media and technology.” Examine the role of technology during Obama’s
presidential campaign in 2007. Use the marginal questions as your
guides in examining the article.

7 Philippine Copyright 2020


EXAMINE

PY
How did US President
Barack Obama use

O
social media during his
presidential campaign?

What made his online

LY C
campaign effective?

N N
O IO T
A

“A major success factor for Obama’s victory was how Obama’s campaign used
social media and technology as an integral part of its strategy, to raise money,
and, more importantly, to develop a groundswell of empowered volunteers who
LU

felt they could make a difference.” – The European Business Review, “Obama
and the power of social media and technology”, 2010, p. 1. Obama’s presidential
campaign focused on
Have you ever thought social networks as online platforms could be such the messages revolving
influential tools? This article reveals to us the fact that technology has around change, respect,
become an essential tool for empowerment in the Digital Age. What does and inclusion. Why do
A

empowerment mean and why is it important for a student like you to you think the people felt
understand this concept through the use of technology? empowered by simply
supporting him in his
EV

online advocacies?

Philippine Copyright 2020 8


Empowerment Technology: A Definition
Empowerment refers to the process of giving yourself, or other
people, the capacity to achieve a specific end-goal. For example,
if you want to learn how to cook a dish, you start by studying the steps
detailed in cookbooks or by watching tutorial videos on YouTube. By
doing so, you are empowering yourself with the necessary knowledge,

PY
tools, and skills you need to be able to achieve the end-goal: learn how to
cook a dish.

Likewise, empowerment technology refers to computer technology that


we use almost every day, which enables us to do tasks that, in the past,
require professional help. Consider the following examples. How does

O
technology empower each individual? Other than the target outcome,
what other results are achieved through the use of technology?

LY C
• A fifteen-year-old owner of a bakeshop wanted to sell her cookies online.
Knowing that web development is a complex subject, she checked online
for a free website creation tool. She found WiX and she was able to put up
her own website in just an hour.

N N
INTEGRATE
• The student council wanted to create a video for their upcoming
fundraising project. When they asked for help from videographers, they
O IO
were surprised at the cost given to them. So, the council decided to find a
During President
Duterte’s campaign,
video creation tool online. They tried Powtoon and was able to produce a
his advocacy was for multimedia video in a day.
change to happen. How • A businessman is running late for a meeting. To find the fastest route from
T
did his supporters use his office to his home, he uses Waze and he is able to tell his estimated
social media to build his time of arrival to the people waiting for him at the office.
image?
A

Nowadays, there are applications that can be accessed and used for free.
In the examples given, each individual is able to solve his or her problem
with less cost, less time, and less effort.
LU

Empowerment through ICT


In the research article you examined, the tools used for Obama’s
A

campaign are social media platforms such as Facebook and Twitter.


These were used to disseminate information and build Obama’s image.
Messages like “change,” “hope,” and “making a difference” were the
EV

topics in his campaign posts. As stated in the article, Obama’s social


media campaign is now considered “the legacy of one of the most effective
Internet marketing plans in history, where social media and technology
enabled the individual to activate and participate in a movement.”

Empowerment is a strategy that aims to give individuals the


tools and resources necessary to take initiative, as well as
gather and analyze information or situations, thus making
informed decisions to solve problems and improve services
or performance. In the context of Information and Communications
Technology (ICT), empowerment requires being information literate and
technology literate.

9 Philippine Copyright 2020


In 2000, the Information Literacy Competency Standards for Higher
Education enumerated the competencies for information literacy:

Determines the nature and extent of


information needed

PY
O
Accesses the needed information
effectively and efficiently

LY C
N N
Uses information effectively to
accomplish a specific purpose
O IO T
Understands many of the economic, legal,
and social issues surrounding the use
of information, and accesses and uses
A

information ethically and legally


LU

Evaluates information and its sources


critically and incorporates selected
information into his or her knowledge
base and value system
A
EV

In 2002, the International ICT Literacy Panel defined technology


literacy as “the ability to use digital technology, communication tools,
and/or networks to define an information need, access, manage, integrate
and evaluate information, create new information or knowledge and be
able to communicate this information to others.”

Why do you think these two literacies must be linked? In the following
discussions, you will analyze the current state of ICT and evaluate
how information and technology literacy work together for an
empowered individual.

Philippine Copyright 2020 10


ICT and Society
Several studies conducted in different countries of the world have
pointed out the importance of ICT for sustainable development.
Significant changes have been observed in four major aspects of life:
communication, economics, education, and travel.

PY
Study the list shown. What other examples can you add for each aspect?

• Source of learning, teaching, and

O
research materials
• Online learning communities

LY C
• Recording and computation of grades
• Managing records and other
administrative purposes

N N
O IO
• Online marketing
• Convenient business transactions
• Online payment gateways
T
A

• Social networking sites


LU

• Instant messaging and video calls


• Forums and webinars (web seminars)
A
EV

• Online booking and reservation


• Online tracking of reservations

11 Philippine Copyright 2020


With all these changes, the demands in the workplace have also changed
dramatically. According to Harvard Business Review (2012), the top three
requirements for applicants today are (1) ICT skills, (2) communication
skills, and (3) analytical skills. A competitive applicant for a job today
must have all of these qualifications.

Reflect on your own skills. Review this checklist from UNESCO.


Mark the ones you think you are capable of. How important do you think

PY
these skills are when you graduate?

ICT Literacy Checklist for Students

O
Students should be familiar with basic concepts of ICT.

LY C
Students should feel confident about using computers.

Students should be able to use graphics appropriately.

N N
Students should be familiar with using computers to
communicate.
O IO
Students should be aware of how ICT changes jobs.

Students can build and use robots to perform experiments.


T
Students should be able to use computers in art.
A

Students should be able to use computers in dance and


music.
LU

Students should be able to use computers for modelling


and simulation.
Students should be able to use a simple statistical package.

Students should be able to use suitable graphics tools.


A

Students should be able to create and play music using


EV

hardware and software.

Philippine Copyright 2020 12


A Peek in the Past
The checklist has exposed the demand that every student must have the
capability to use technology for a variety of purposes and for a wide range
of domains. The focus of technological advancement today is actually
on (1) integration of technology knowledge and skills in the 4Cs or 21st
century skills and (2) students’ college readiness.

PY
Do you think that these two were also the goals for technology innovation
and development in the past? Study the organizer shown and review the
factors that have influenced changes in ICT.

O
Digital Age Hardware 2.0 Smart + Portable Multifunctual Devices

LY C
(1979) (1979) (1985) (1982) (1991) (1993) (1995) (1997) (2001) (2002) (2003) (2004) (2013) 3D (2013) (2015) (2016)
Apple II Walkman NES Video Digital Super Intel Play Video & Apple Laptop Blu Ray GPS Printer Microsoft Gear VR Samsung
Game Console Storage Nintendo Pentium Station Data Storage iPod Surface Pro Galaxy S7
Edge
The Age of Processing World Wide Web Connectivity Personalization

(1983) (1985) (1995) (1995) (1993) (1991) (2003) (2004) (2006) (2007) (2011) (2011) (2010) (2015)
Microsoft Windows 1.0 ebay Yahoo Windows Linkedin Facebook Quora Windows 10

N N
MSN Twitter Dropbox Google+ Snapchat
Word Hotmail 98

Tech as a Peripheral Tool Tech begins to Supplement Tech Supplements Instruction Tech as an Integrated Tool
O IO (1981)
The
(1983)
SunGard
(1989)
Math
(1997)
Blackboard
(1997)
Florida
(2003)
Haiku LMS
(2004)
Innosight
(2007)
Knewton
(2010)
Lumosity
(2010)
Udemy
(2013)
Moodle
(2013)
Edmodo
Oregon Trail Data Blaster Virtual School Institute
for Apple II Systems Inc.

1980s
REALIZATION OF AN
1990s TIME OF CHOICE
2000s
HOW DO WE MEASURE PROGRESS
TODAY
FOCUS ON 21st CENTURY SKILLS
EDUCATIONAL CRISIS AND INNOVATION AND INCREASE ACCOUNTABILITY? AND COLLEGE READINESS
T

Evolution of the Web


A

Based on the timeline, the Internet has provided a lot of services


that users have enjoyed since its creation, one of which is the World
LU

Wide Web (WWW). But did you know that it also has evolved into
something which provides users a wide range of services? Look at how
the Web has evolved.
A

?
EV

ARPANET WORLD-WIDE-WEB

ETHERNET

1969 1973 1976 1982 1990 1994 1995 1998 1999 2003 2004 2005 2007 2009 2010 2012 2014 2016

?
FTP & TCP/IP INTERNET

13 Philippine Copyright 2020


In 1989, Tim Berners-Lee, a British scientist, invented the World Wide
Web. Simply known as the Web, it is an open-source information space
where documents (formatted and annotated using HTML and other
web resources) are identified by Uniform Resource Locators (URLs)
interlinked using hypertext links and accessed via the Internet. It is
considered as central to the development of the Information Age and
used as a primary tool of people to interact with the Internet.

PY
A big leap came with version 2 of the Web, or Web 2.0 in 2004, as defined
by tech moguls Tim O’Reilly and Dale Dougherty, though the term was
originally coined by Darcy DiNucci in 1999. Web 2.0 had no update on
technical specifications, but rather on the cumulative changes in the
way web pages were made and used. Web 2.0 was the Read-write Web,

O
Web of Interaction, or Participative Web. A Web 2.0 site allowed users to
interact and collaborate with each other through social media dialogue
where they could create user-generated content in a virtual community.

LY C
These included social networking sites, blogs, folksonomies, wikis, video
sharing sites, hosted services, web applications, and mashups.

Web 3.0 is historically known as the Semantic Web or Web of Data as


Tim Berners-Lee coined it. The Semantic Web is an extension of Web 2.0

N N
by virtue of the standards of the World Wide Web Consortium (W3C). As
stated by the W3C, “The Semantic Web provides a common framework
that allows data to be shared and reused across application, enterprise,
O IO
and community boundaries.”

To some Internet experts, Web 3.0 worked as a personal assistant. When


you type “tourist spot destination under PHP 10,000” on a Web 3.0
T
search engine, the results might include a list of fun activities or great
restaurants along with the results themselves. A Web 3.0 search engine
A

could find not only sites based on the keywords in your search entry, but
also interpret the context of your search.
LU

The more you browse the web, the more information about you is stored.
Your search results may include your preferences based on your browsing
history, the songs you like to hear, the food you like to eat, and the places
you want to see, among others.

Web 1.0/2.0/3.0 Summary


A

Crawl Walk Run


EV

Web 1.0 Web 2.0 Web 3.0

Read-Only Read-Write Portable & Personal

Company Focus Community Focus Individual Focus

Home Pages Blogs/Wikis Lifestreams/Waves

Owning Content Sharing Content Consolidating


Content
Web Forms Web Applications Smart Applications

Directories Tagging User Behavior

Page Views Cost Per Click User Engagement

Philippine Copyright 2020 14


Crawl Walk Run

Web 1.0 Web 2.0 Web 3.0

Banner Advertising Interactive Behavioral


Advertising Advertising

Britannica Online Wikipedia The Semantic Web

PY
HTML/Portals XML/RSS RDF/RDFS/OWL

INTEGRATE Latest Technology Trends

O
In which way do you Gartner, Inc., a leading information technology research and advisory
think Intelligent apps will company, highlighted the Top 10 Strategic Technology Trends of 2017 at

LY C
help you in your daily their Gartner Symposium held in 2016 in Orlando, Florida. What follows
tasks? is an infographic summarizing the 2017 trends they identified based on
three themes, namely intelligent, digital, and mesh.

N N AI and Advanced Machine Learning – These are composed of many


technologies and techniques (deep learning, neural networks, and
natural-language processing) that make smart things “intelligent.”
O IO
Applied AI & Advance Intelligent App Intelligent Things
Machine Learning Intelligent Apps – virtual personal assistants, like Siri and Google
Home, that perform some human assistance functions, making
T
tasks easier.
A

Applied AI & Advance Intelligent App Intelligent Things


Machine Learning Intelligent Things – This refers to the physical things that
are imbued with machine learning capabilities through rigid
LU

programming. Examples are autonomous cars, like Google Car,


Applied AI & Advance drones, Intelligent
Internet App of Things (IoT) smart
Intelligent Things appliances, and many more.
Machine Learning Gartner sees a future when these devices will have a collaborative
Virtual & Augmented “intelligent things” model rather
Digital Twins Blockchainsthan
and a standalone one.
Intelligent App Learning
Intelligent Things Distributed Ledgers

Virtual and Augmented Reality – These refer to the immersive


A

technologies that are now dominating the market. Basic virtual


reality is now accessible to consumers through different wearables,
like VR boxes that are cheap, and smartphones capable of running
EV

Virtual & Augmented Digital Twins Blockchains and


Applied AI & Advance Intelligent App Intelligent Things
Learning
Machine Learning
VR appsDistributed
downloaded
Ledgers through app stores. Though these are more
focused right now on gaming, VR and AR technology advancements
will soon show how these would be useful in other aspects of
Virtual & Augmented society, Digital
likeTwins
business and research.
Blockchains and
Learning Distributed Ledgers
Conversational
Systems and
Digital
Digital
Technology
TwinService
– This
Mesh App and
refers Adaptive
Architecture
to the dynamic software model of a
Security
Digital Twins Blockchains
Distributed Ledgers machine
Platforms or a thing or system that uses data from various sensors
Architecture
to do autonomous actions such us comprehension, reaction,
and improvement of operations. This includes a combination of
metadata and analytics.
Conversational Digital Mesh App and Adaptive
VirtualSystems
& Augmented TechnologyDigital Twins
Service Architecture Blockchains
Security and
Learning Platforms Distributed Ledgers
Architecture

Conversational Digital Mesh App and Adaptive


15 Philippine
Systems Copyright 2020
Technology Service Architecture Security
Architecture
Platforms
Applied AI & Advance Intelligent App Intelligent Things
Machine Learning

Applied AI & Advance Intelligent A


Machine Learning
Blockchain and Distributed Ledgers – According to Gartner, Inc., a
blockchain is “a type of distributed ledger in which value exchange
transactions (in bitcoin or other tokens) are sequentially grouped into
blocks. Each block is chained to the previous block and recorded across
a peer-to-peer network, using cryptographic trust and assurance
mechanisms. Blockchain and distributed ledger concepts areApplied gaining
AI & Advance Intelligent App
traction because they hold the promise to transform industry operating Machine Learning
models. While the current hype is around the financial services industry,

PY
Virtual & Augmented Digital Twins Blockchains and
there are many possible applications,Learning including music distribution, Distributed Ledgers
identity verification, title registry and supply chain.” Virtual & Augmented Digital Twi
Learning
“Distributed ledgers are potentially transformative but
Applied AI & most
Advance initiatives
Intelligent App Intelligent Things
are still in the early alpha or beta testing stage,” said
MachineDavid
Learning Cearley of

O
Gartner, Inc.

Conversational System – We have Siri on our Apple devices and Cortana

LY C
for Windows devices helping us as virtual personal [Link] Through
& Augmented Digital Twins
evolution of technologies such as Google Home, these conversational
Applied AI & Advance Intelligent App
Learning
Intelligent Things
D

devices will not be limited to a singleMachine


device, but instead
Learning
Conversational Digital be connected Mesh App and Adaptive
to a network of multiple Internet of Things devices like
Systems house lights,
Technology air
Service Architecture Security
Architecture
Platforms
conditioning units, and many more.

N N
Conversational Digital
Systems Technology S
Platforms
Mesh App and Service Architecture (MASA) – According to Gartner, Virtual & Augmented Digital Twins Blockchains and
Learning Distributed Ledgers
Inc., MASA “enables users to have an optimized solution for targeted
O IO
endpoints in the digital mesh (e.g., desktop, smartphone, automobile)
as well as a continuous experience as they shift across these
different channels.”
Conversational Digital Mesh App and
T
Systems Technology Service Architecture
Digital Technology Platforms – TheseVirtual &are the platforms that enable
Augmented Digital Twins Blockchains
Platforms and
a digital business. The following platformsLearning
are identified by Gartner: Distributed Ledgers
A

information systems, customer experience, analytics and intelligence,


the IoT, and business ecosystems.
Conversational Digital Mesh App and Adaptive
LU

Adaptive Security Architecture – Constant processing Systemsof information


Technology Service Architecture Security
requires better, ultra-efficient architectures to handle the demand. Platforms Architecture

Field programmable gate arrays, or FPGAs fuel the advanced system


architecture which allows systems to run at ultra-fast speeds and almost
mimicking the human brain. These FPGAs will allow smart systems and
advanced machine learning to be applied to almost all smart devices like
A

Conversational Digital Mesh App and Adaptive


smart cars, smartphones, and even smartwatches.
Systems Technology Service Architecture Security
Platforms Architecture
EV

Philippine Copyright 2020 16


CHECK

A. Definition of Terms. Write the definition of the terms in the graphic organizer using your own
words.
Empowerment

PY
O
Information Literacy Technology Literacyy

LY C
N N
O IO
Empowerment Technology
T
A
LU

B. Situation Analysis. Read the following news items online. Identify the following: (a) the
challenge or problem, (b) the technology used to address the challenge, and (c) how the technology
empowered the individuals involved.
A

1. US News (Health)
“How Technology Helps Patients and Other Visitors Navigate Hospitals” by Ruben Castaneda
EV

a b c

[Link]
navigate-hospitals

17 Philippine Copyright 2020


2. [Link]
“Google Maps Can Now Help You Park And Other Small Business Tech News
This Week” by Gene Marks

a b c

PY
O
[Link]

LY C
small-business-tech-news-this-week/#1c649511151c

3. Times of Israel

a
N N
“Israel tech helps US speed up passport procedures” by Shoshanna Solomon

b c
O IO T
A
LU

[Link]

4. [Link]
A

“Carpooling app helps Manila commuters create transport fixes” by Katerina Francisco

a b c
EV

[Link]

Philippine Copyright 2020 18


5. [Link]
“Facebook brings Digital Halo-Halo Hackathon to the Philippines” by Karl Angelica Ocampo

a b c

PY
O
[Link]

LY C
C. Compare and Contrast. Research online to find out the key features, advantages, and
disadvantages of the technologies shown in the chart.

N N
Social Media
Key Features Advantages Disadvantages Purpose
O IO
Facebook

Twitter
T
A

Tumblr
LU

Discussion and Information Platforms


A

Key Features Advantages Disadvantages Purpose

Blog
EV

Vlog

Podcast

19 Philippine Copyright 2020


File Sharing Platforms

Key Features Advantages Disadvantages Purpose

Google Drive

PY
Dropbox

Podcast

O
LY C
Video Sharing Platforms

Key Features Advantages Disadvantages Purpose

YouTube

N N
O IO
Vimeo

Dailymotion
T
A

BUILD
LU

EQUIP
Your main output for this course is a social change project related to the To get an idea for a
track or strand you are pursuing for Senior High School. To help you good social change
prepare for this, brainstorm for initial ideas. project, you may visit the
A

following websites and


On the chart, list down some issues or challenges that you can observe read through the ideas
in your community or locality and take note of the individuals or groups already implemented
EV

affected by each. Reflect and write on why you want to address each issue around the globe:
or challenge you have noted.
[Link]
socialchangeprojects.
[Link]/

[Link]
tm/articles/2013/09/18/
tln_bohstedt.html

[Link]
category/management-
leadership/project-
management/

Philippine Copyright 2020 20


Social Issue Who are affected by the Why do I want to address this
issues? issue?

PY
O
LY C
2

N N
O IO T
A
LU

3
A
EV

21 Philippine Copyright 2020


PY
O
LY C
N N
O IO T
A
LU
A
EV

Philippine Copyright 2020 22


LESSON 2 HOW CAN I USE THE INTERNET
Target
AS A TOOL FOR EFFECTIVE
By the end of this lesson, RESEARCH?
you will be able to
EXPLORE

PY
• Use the Internet as a tool
for credible research and You learned about the meaning and importance of empowerment
information gathering. technologies in the previous lesson. By working on a project, your group
• Gain awareness of identified issues to be resolved. Now you will learn about research. What
cybercrimes. is the proper way to do research?
• Practice computer ethics,

O
online safety, and Where do you often get information for your projects? Fill out the
security. graphic organizer below.

LY C
N N Research
O IO
Topic
T
A
LU

Printed Reference Online Reference


A
EV

23 Philippine Copyright 2020


EXAMINE

You have an assignment in an Italian Art Appreciation subject in which


you are tasked to look for artworks. The only clue given to you by your
professor is the word “Madonna,” which is a word in medieval Italian
Often, people search
that refers to a noble or important woman. Google with the limited
How would you search for it?

PY
information they have,
but it is enough if they
want to find specific
A. information. Search
engines require context
B. for it to give you the

O
most relevant results.
C.

LY C
Be honest with your answer and do not try to Google it. Most of the time,
we simply enter the word Madonna without considering what might
appear. If you answered C, something similar to the following example

N N
will appear in the search results.
O IO T
A
LU
A
EV

What if you answered A? Try Googling it and you might get lost in your
search results.

Contextualized Online Search and


Research Skills
Contextualized search can be defined as a skilled or optimized way
of searching the Internet based on the “context” provided, therefore
narrowing down the results given back to you by the search engine
(Feldman, 2012). This increases the chances of you receiving the most
appropriate reply to your query.

Philippine Copyright 2020 24


What Is Research?
In our world of expanding access to the Internet, research has become a
Primary sources refer to common term that is used when “looking for something” online. Whether
the first-hand acquisition you search for a definition of a word you don’t know, look for car sales
of information from
online, or look for a recipe for food you like, it is now considered research.

PY
experiments, events,
Committing errors when searching for information such as these does
phenomena, and
observations.
not matter much because it generally does not affect other people.
According to the authors of the book, Research Skills for Students, this
kind of “research” is called personal research. The research we do at
schools, on the other hand, is called professional research (Allison, et

O
al., 2016).

Although personal research is also important in daily tasks, this lesson


shall focus on professional research, as it is exceedingly important in the

LY C
academic world, and it is the type of research you will be doing in this
courseware.

By definition, research is a systematic inquiry that attempts to provide

N N solutions to existing problems and questions using facts and data. This is
usually presented in a form where all methods and procedures conducted
are recorded so that they can be viewed and accessed by others.
O IO
Why Is It Important?
T
Although there are several forms of research, such as original research
(primary source), scientific research (providing explanations about the
A

world), humanities research (as in historical and sociological research),


and artistic research (practice-based research), they all have the same
purposes: to discover new information, to interpret existing facts, to
LU

revise accepted knowledge in light of newly discovered facts, or to apply


theories and laws into practice. ([Link], 2017)

Thomas Edison is widely known as the inventor of the light bulb, but he
was not the inventor of the first electric light. 78 years before Edison’s
light bulb became popular, Humphry Davy developed the arc-lamp,
A

which was the first electric light device. Like other inventions, though,
it was not without flaws. The arc-lamp did not stay lit for very long and
was too bright. The British physicist, Joseph Swan, discovered that
EV

carbonized paper is a better filament material for light bulbs, but he


could not make his design more efficient and last longer than it did.

With the help of Thomas Edison and after rigorous experimentation,


Thomas Edison holding Swan found better materials to use, and their companies merged to sell
his invention the improved light bulb. Edison, though, was the only one remembered
in history books (Skillicorn, 2016).

25 Philippine Copyright 2020


Professional researchers (inventors included) produce results based on
the works of their predecessors. Successful inventions, most of the time,
are products of reworking previously made inventions, or were made
based on the results of earlier inventions. Most research is conducted
while considering the work of others as references.

Research on healthcare is especially important. Without further research


or verification, a claim may mislead people or even endanger lives.

PY
Even in this day and age, there are still gaps in the body of knowledge
that humankind has produced, especially in medical science. For every
cure, treatment, or medicine, intensive research and clinical trials are
performed before they are approved to ensure the safety of the people
who are to avail of the benefits.

O
What Are the Research Skills I Need to Develop?

LY C
Searching for answers to questions you have for your project requires
more than just a simple Google search. You need to have proper skills
that will enable you to gather useful and credible information online.

N N
According to Scholastic, the following are the online research skills
students need (Hudson, 2017). EQUIP
O IO
Check Your Sources You can learn more
about Google search
Evaluate the information you gather from your sources, whether engine conventions here:
they are from books, online articles, news sites, or websites. Consider
the benchmarks for evaluating a website: currency (is it up to date?),
T
[Link]
security (does it ask for too much private information from you?), scope [Link]/GoogleTips
(is the content in-depth or too shallow?), and authority (who wrote the
A

content? Is he an expert?).

Ask Good Questions


LU

Be specific when entering queries into search engines. It gives the search
engine proper context regarding what you are looking for, therefore
enabling the engine to give you better search results. You can also use
the special keys to use when searching. See the infographic that follows.
A
EV

Philippine Copyright 2020 26


How To Google It
site: “ ” -

PY
Searches for the exact
Only searches the Searches for the exact phrase Excludes this term
phrase and each of the
pages of that site and each of he words separately from the search
form
words separately

O
site:[Link] ~college ”test scores” -SATs 2008..2010

LY C
~ -
Will also search related words, such Excludes this term

N N
O IO as ‘higher education’ and ‘university’. form
from the search

How To Google It
T

filetype: intitle:
A

Searches only results of the file


file type
type you
you Only shows results with that word in
designate. Can the title (in this case, ‘velocity’)
designate. Can beuse forfor
used pdf, doc,
pdf, jpg,
doc, [Link].
jpg,
LU

filetype:pdf air speed intitle:velocity of *swallow


A

*
EV

Replaces itself with common terms in your search (in this case, Red Rumped swallow
and lesser Striped swallow will be both be searched, along with many others).

Go Beyond the Surface

Be persistent in looking for more information regarding your topic.


One common lapse of student researchers is that they only look for
information in the first search result they find on search engines. There
are times when information in the 10th result is more useful than the
information in the first one you see. Try looking for other sources rather
than sticking to one.

27 Philippine Copyright 2020


Be Patient

There are times when the Internet does not provide the information you
are looking for. You may not find the exact answer to your query, but
bits of data are scattered all over the Internet. You just need to think
critically and synthesize the data you have gathered until you yourself
can formulate your own conclusion.

PY
Respect Ownership

Remember that everything on the Internet, be it text, images, ideas,


audio, or any other form of information, has its own respective owner.
Illegal acquisition, distribution, or reuse of any of these may result in

O
copyright infringement. These will be discussed in further detail in the
succeeding topics.

Use Your Networks

LY C
Social media and other information tools like Wikipedia and online
forums are useful when doing research. Social media can provide various
and nuanced perspectives on the information you need. Sources like

N N
Wikipedia, however, should be evaluated before you use the information
from it. The sources cited on Wikipedia, however, are a practical starting
point in gathering credible information. We will discuss other good
O IO
sources of information in the succeeding topics.

ICT Tools Useful in Research


T
As stated earlier, it is strongly advised not to limit yourself to the top-
EQUIP
A

level results provided to you by your search engine. The following are
websites, webtools, and online documents that may provide you with
better access to the information you are looking for. You can learn more
LU

about Google Scholar


here:

Google Search [Link]


com/intl/en/scholar/
By far, Google Search is one of the most popular search engines in the [Link]
A

21st century. Owned by the multinational technology company Google,


this search engine has evolved from its infancy as a simple search engine
into a smart one, capable of searching the web through voice input and
EV

filtering the results according to your behavioral data.

Google Scholar
Google Scholar, another product from Google, gives users, especially
researchers, a simpler way to search for scholarly literature on the
Internet. Using Google Scholar, you can search for research papers,
articles, books, court rulings, and other sources of scholarly information.
This is a great tool when looking for contents for the Related Literature
section of your research papers.

Philippine Copyright 2020 28


EQUIP
In the age of smart
devices, search queries

PY
are no longer confined
to keywords. You can
now search online using
apps and devices that
listen in and use audio,

O
specifically spoken
voice. Some apps use
images to look for things
on the Internet. Here

LY C
are examples of such
services that expand the
possibilities in doing
research:

N N
The Musicmatch app
recognizes the melody a
O IO
person is singing.

The Pinterest app lets


users search using their
cameras or images in
Online Journals
T
their devices.
A journal is a periodical publication that contains scholarly articles
Automated personal
A

relating to a particular discipline or field of study. These are often


assistants such as Siri,
Cortana, and Google
published by academic or scientific institutions (including universities),
now listen to the user and the contributors are researchers, professors, doctors, and other
LU

speak and help them professionals in their respective fields. Articles in journals are different
search for things online, from newspapers. Newspapers are intended for general readers while
among other things. journal articles are intended for academics and people who are engaged
in specialized fields of study. These kinds of articles, most of the time,
are the most useful as primary information sources for research.
A

Online journals, in turn, are scholarly publications released in a format


accessible via the Internet. In other words, the journals that are kept
in your school libraries and other libraries in the world are kept in
EV

the Cloud, or Internet, in digital format. Oxford University Press is an


example of an online journal repository.

29 Philippine Copyright 2020


Academic Websites
Wikipedia is a common starting point when conducting research.
However, the content that you are going to use when writing your paper
must be taken from the cited references for the Wikipedia article and not
the article itself. The primary source is not only a more reliable source,
it may also contain information that you can use to support your claims.

PY
There are many academic websites and libraries that provide electronic
copies of papers, journals, books, videos, and audio recordings that may
aid you in the research process. The following are some of the most
notable.

O
Internet Archive

The Internet Archive is a non-profit electronic library that has a free-

LY C
to-access collection of digitized materials ranging from websites,
multimedia files, and academic materials. A large number of books,
including modern ones, can also be borrowed from the Open Library,
also run by the Internet Archive.

EBSCOhost

N N
O IO
EBSCOhost is another digital library that offers premium fee-based
access to mainly academic materials that are normally not available for
public use. It runs a service that provides an online research database
with full-text digital copies of books, medical references, and historical
archives.
T
JSTOR
A

JSTOR is another digital library that is


primarily licensed to academic, scientific,
LU

and other research and educational


institutions. Like EBSCOhost, it
provides full-text searches of books,
primary sources, and other reference
and scholarly materials. JSTOR is a part
of ITHAKA, a non-profit organization
A

that promotes sustainable research


and teaching in the academe via digital
technologies.
EV

ICT Safety, Security, and Netiquette


The Internet is a vast network of computers where many users, content,
tools, and resources are made accessible. You do homework and research
papers with the help of the Internet. You communicate with your peers
through the Internet. You do all of this maybe at home, in computer labs,
or in computer shops. They make it convenient for you to finish your
work easily. But at what cost?

Philippine Copyright 2020 30


Verification of Online Source Materials
Cramming is one of the many problems of students, especially when
doing homework. Days pass, and at midnight before the deadline, you
realize you have homework to do. You fire up your computer and search
for the answers to your assignment. But are the websites where you get
your answers reliable? What if they are spoof sites? Or what if they are
THE TEN

PY
just opinions of the authors and they are not factual? This might get you
COMMANDMENTS OF into trouble, especially if you are doing a research paper.
COMPUTER ETHICS
It is best to do your research far ahead of the deadline to allow yourself
1. Thou shalt not use
some time to evaluate and verify the sources of your homework. Follow
a computer to harm
the criteria below when evaluating your source material.

O
other people in any
way.
2. Thou shalt not • Currency – Is the information up-to-date?
interfere with other • Security – Does the site ask too much personal information?

LY C
people’s computer • Scope – Is the information in-depth?
work. • Authority – Does the information come from a trusted expert?
3. Thou shalt not sneak
around in other

N N
people’s computer
files. Computer Ethics and Netiquette
4. Thou shalt not use a
O IO
computer to steal. Computer Ethics is a new branch of ethics that is concerned with
5. Thou shalt not use standards of conduct in the use of computers. It deals with how
a computer to bear computing professionals should make decisions regarding professional
false witness. and social conduct.
6. Thou shalt not copy
T
or use proprietary Following the 1987 memo on ethics of the Internet Advisory Board, the
software for which Computer Ethics Institute created the Ten Commandments of Computer
A

you have not paid. Ethics in 1992 which were introduced by Ramon C. Barquin in his paper
7. Thou shalt not use entitled “In Pursuit of a ‘Ten Commandments’ for Computer Ethics.”
other people’s It is a means to create “a set of standards to guide and instruct people
computer resources
LU

on the ethical use of computers.” It copies the archaic style of the Ten
without authorization Commandments from the King James Bible.
or proper
compensation.
There are several activities that you can do using online services:
8. Thou shalt not
appropriate other
search topic, read articles, log in to your online accounts, e-bank, write
comments, post pictures, chat with a friend via social networking sites
A

people’s intellectual
output. (SNS), and others. But the more information you put or use online,
9. Thou shalt think the higher the risk placed on your online safety. You can be a victim of
identity theft, phishing, malware infections, etc. It is your responsibility
EV

about the social


consequences of to secure your information online as well as maintain good etiquette
the program you are when using these services.
writing or the system
you are designing. Internet ethics, or netiquette, is a set of rules that determines how to
10. Thou shalt always properly communicate and browse the web.
use a computer in
ways that ensure The following are some of the good practices when using the Internet:
consideration and
respect for your 1. Always keep your software or application updated and uninstall the ones
fellow humans.
that you do not use.
(Computer Ethics 2. Do not divulge sensitive information online, especially on unsafe websites.
Institute, n.d.)

31 Philippine Copyright 2020


3. Be careful when dealing with emails from unknown sources or spam.
4. Run your antivirus software before going online.
5. Think before you click. What you post on the Internet may stay online
forever.

Intellectual Property Rights (IPR)

PY
The biggest issue surrounding ICT concerns the violation of intellectual
property rights (IPR), which is the act of stealing other people’s works
and ideas, whether knowingly or unknowingly. For example, when you
buy a book, the author or publisher earns money, but if you borrow a
book and photocopy it, you technically do not pay for it—the author or

O
publisher of the book does not get anything in return for the use of the
book. The latter is one form of IPR infringement, no matter how subtle.

LY C
Another common form of IPR infringement is when you use other
people’s work, such as images, movies, or music, and alter them or
combine them into a different work, such as those used in YouTube fan-
created videos and image modifications. There may be no intention to

N N
profit from such work, but it is still considered as IPR infringement.

Intellectual property laws (IPL) protect the rights of people to maintain


O IO
legal ownership of their works and ideas. It covers their right to control
how their work can be consumed by the general public, including
whether their work can be acquired or used at a cost. Someone who
takes the work or idea of another person and claims it as his own may be
T
accused of theft. But IPR is not a given right: they have to be applied for
and granted to the applicant by the proper authorities. Otherwise, the
contents of a book that you have written or the blueprint for an invention
A

you have made may be claimed freely or used by others for profit without
your knowledge or permission. There would be no legal basis for you to
claim ownership of the material.
LU

Granting ownership of an idea to a person is not an easy thing to do.


There are instances when an idea must be elaborated and organized
properly before the petitioner can be granted exclusive rights to it.
On the other hand, a copyright can also be automatically claimed by
A

the originator of an idea without the need to apply for rights if there’s
already a record of what has been produced by the person.
EV

Artworks, novels, short stories, poems, music, and movies are only
some of the copyrighted things that are available on the Internet.
Unfortunately, this can be copied without a single centavo given to the
authors of the works. That’s piracy, and the Internet is only one of many
platforms where they are distributed. Other instruments used for piracy
include digital video cameras, MP3 recorders, and optical disc burners
for CDs and DVDs. In order to minimize the USB drives, incidence
of illegal copying of intellectual material, manufacturers have been
cautioned about making and designing products that allow easy and
multiple duplication of media files.

Philippine Copyright 2020 32


Avoiding Plagiarism
In your project and in other research papers, you will always be asked
to add information about your paper by citing information taken from
other research materials. This is very risky especially if you might fall
into the plagiarism trap. To avoid that, try to follow WriteCheck’s 6 Ways
to Avoid Plagiarism in Research Papers (WriteCheck, 2017).

PY
Six Ways to Avoid Plagiarism

1. Paraphrase - Read the material you wish to use and rephrase it in your own
words. Using two copied words consecutively must be avoided. However,
in a situation wherein it cannot be avoided, quotation marks must be used.

O
2. Cite - Proper citation must be observed when referencing existing material.
Several guidelines are observed when writing research papers and reports

LY C
depending on the industry standard. Examples are the guidelines established
by the Modern Language Association (MLA), the American Psychological
Association (APA), the Associated Press (AP), and the Chicago Manual of

N N
Style. Citation often requires the name of the author of the material you
intend to reference and the publication date.
O IO
3. Quoting – Directly quoting the source material is recommended in order
to avoid misquotation or misinterpretation. However, many institutions
generally discourage the use of “block quotes.” Block quotes are direct
quotations that are 40 or more words long and are usually separated from
T
the main text. It is still best to paraphrase your source materials and avoid
quoting directly as much as possible.
A

4. Citing Quotes - The methods of citing quotes and citing the paraphrased
material generally differ. The former often includes the page number
LU

written after the name of the author if the source material is a book, a
magazine, or a newspaper, among several other sources.

5. Citing Your Own Material - Although the reference you may want to use is
your own work, it is still necessary to cite yourself as you would the work of
A

another person. Failure to provide citations for your own material is known
as “self-plagiarism.”
EV

6. Referencing - Apart from citing direct quotes and paraphrased text, it is


also important to provide a page for references and other materials used
at the end of your work. Information such as the title of the work (as well
as the title of the publication or website, in certain cases), the name of the
author(s), the publication date and place, and the universal resource locator
of the source (for websites) are among the details that must be provided.
The format for your references will depend also on the standard required
by the institution or industry you will present your work to.

33 Philippine Copyright 2020


CHECK

Test I. Explicit Contextualized Search. Write the correct query for


the following statement using the search engine operators.

Search Requirements Query

PY
1. A Website mentioning your
exact name.

2. Websites with the keywords and


any other word after it, such

O
as office productivity tools, office
productivity software, etc.

LY C
3. PDF papers on societal change.

4. Statistics of social media users

N N
from year 2007 to 2016.

5. PowerPoint presentations
O IO
regarding social change projects.
T
Test II. Enumeration. List down 6 skills in research you need to have
and explain what it is.
A

Skill Description
LU
A
EV

Philippine Copyright 2020 34


Test III. Essay. How does social networking help you in your daily life?

PY
O
LY C
N N
O IO T
A
LU
A

BUILD
EV

After learning the essential techniques and standards in data gathering


via the Internet, you should now be able to gather data relevant to your
project. Look for at least five articles or discussions that will support
the claims your project attempts to establish. Follow the criteria for
choosing a reference website and use proper citation. Use the table that
follows as your guide to getting the information you need for your study.
(Use a separate sheet of paper.)

35 Philippine Copyright 2020


Research Journal Specification Table

Topic 1 Topic 2 Topic 3

Title of the
Research /

PY
Article

O
Authors/
Copyright/
Source or
Reference

LY C
Abstract

N N
O IO T
Objective and
scope
of the
A

study
LU

Significance
A
EV

Methods

Results
and
Conclusion

Philippine Copyright 2020 36


LESSON 3 HOW DO I USE ADVANCED WORD
Target TOOLS TO DEVELOP CONTENT?
By the end of this lesson,
you will be able to
EXPLORE

PY
• Create original or
derivative content while In the previous lesson, you have learned how to gather reliable
carefully citing sources information such as articles and other resources for your project. In
using advanced this lesson, you will learn how to use proper citations for derivative
MS Word tools in the content intended for your project pitch. You will also learn the purpose
Citation & Bibliography of using Track Changes and other advanced Microsoft Word tools in

O
group. publishing papers.
• Proofread existing
content using advanced Term, research, and thesis papers usually come around at the end of the

LY C
MS Word tools. semester. Unlike essays, these papers require extensive research, citation
• Send customized letters of sources, and seemingly endless revisions. You print and submit the
to a large group of first draft to your professor or teacher, he/she evaluates it, and later,
people using the
returns it to you with editing and proofreading marks only to find out
Mail-Merge feature of

N N
that almost 90 percent of your work need to be revised. You update your
MS Word.
work and print again, but the teacher still finds writing mistakes in the
paper. The cycle is painstaking, but, you need not do that because there’s
O IO
MS Word to the rescue and it already has a proofreading tool along with
other useful editing tools that you may or may not be aware of.

To make an assessment of Word tools and know which you have been
using before, check all that you are aware of in the table below.
T
A

Checking
Text Basic Headers Spelling and
Grammar
LU

Picture and Text Track Changes


Formatting Text
Wrapping and Comments

Finalizing and
Formatting
Page Layout Protecting
A

Pictures
Documents

Printing
Shapes SmartArt
EV

Documents

Line and
Textboxes and
Paragraph Mail Merge
WordArt
Spacing

List Tables Styles

Hyperlinks Chart Reference

37 Philippine Copyright 2020


EXAMINE

What can you notice in


the document?

How did the editor

PY
proofread the
document?

Did you know that


you can proofread
Microsoft Word is a word processing application developed by the documents

O
Microsoft Corporation. It lets you create documents for your assignments, electronically?
term paper or research work, letters, and certificates or
just edit any text document. It provides several features

LY C
that make your work, like copying and pasting text from
different sources, inserting objects, laying out content,
and editing and proofreading documents, much easier.

N N
In the example above, proofreading marks are written on
the printed document where the writer will refer to when
revising his work on the computer. But what if your editor
O IO
is from elsewhere and sending a printed copy is not practical? What if
you wanted to save on printing costs because of price hikes in paper and
ink products? MS Word offers a feature that allows you to proofread
any document, check the spelling and grammar, track the changes made,
and add comments. It simplifies not only the checking part but also the
T
revision of the document.
A

The next section discusses some of the features of MS Word that you can
use to make you more productive and assist you in the creation of your
project documentation. These features are:
INTEGRATE
LU

1. References: Citations and Bibliography


Donald Trump’s
2. Review: Spelling and Grammar
conservative
3. Review: Tracking Changes commentator, Monica
4. Mail Merge Crowley, came close
A

to serving in the US
National Security

References: Citations and Bibliography


Council, but withdrew
EV

due to reports she


committed plagiarism
In writing a research paper, you will most in her Ph.D. dissertation
likely get information from the Internet. This (CNN KFile, 2017). If
gives you easy access to needed ideas and you were asked by Ms.
information but puts you at risk of committing Crowley to help her fix
plagiarism. To prevent committing that her dissertation, how
offense, you need to learn how to paraphrase would you help her write
text and add citations. You can do this her paper and cite her
manually, but if you must regularly update sources properly?
your list or use a different style, you will have
to redo everything. The solution is available in
Word. All you have to do is to input the sources of information and Word
will create and update your bibliography or references automatically.

Philippine Copyright 2020 38


Follow the steps in creating your bibliography:

1. Choose your reference style. Different


academic disciplines use their own style guides.
Better ask your teacher what is the required
style guide for your document. Style guides

PY
to choose from are APA, MLA, and Chicago.
To do this, click the References tab, then
select the desired style in the Citations &
Bibliography group.

O
2. Add Citations and Sources. You need
to cite the authors in your documents for
the information you got from them. To do

LY C
this, click the Insert Citation command in
the References tab, and select Add New
Source. A dialog box will appear. Just enter
the requested information, like the author’s

N N name, title, and publication details. Then,


click OK.
O IO
3. Insert the bibliography. You can easily create the bibliography or
references at the end of your document once you encode the list of sources
in step 2. In the References tab, select the Bibliography command, then
T
choose the desired style. (GCF Learn for Free, 2016)
A
LU
A
EV

Checking Spelling and Grammar


In Word, you don’t have to worry about your spelling and grammar. One
of the features of Word serves to automatically correct your spelling and
grammar to help you produce a more professional document.

39 Philippine Copyright 2020


How to Run Spelling and Grammar Tool
1. Click the Spelling & Grammar command from the Review tab.

PY
2. The Spelling and Grammar pane will appear. Word will try to give one

O
or more suggestions for each error in your document. You can select a
suggestion and click Change to correct the error.

LY C
3. Word will move through each error until you have reviewed them all. After
reviewing all the errors, a dialog box will appear confirming that the spelling
and grammar check is complete. Click OK.

N N
O IO T
4. If no suggestions are given, you can manually type the correct spelling in
your document.
A

Ignoring “errors”
LU

The spelling and grammar check is not always correct. There are
many grammatical errors Word would not notice. There are also times
when the spelling and grammar check will say there’s an error in a word
A

or phrase when there’s none. Usually, this happens with people’s names
and words not in the dictionary.
EV

If Word identifies is an error, you can choose to ignore. Depending


on whether it’s a spelling or grammatical error, you can choose from
several options:

For spelling “errors”:

• Ignore: This will skip the word in question without changing it.
• Ignore All: This will skip the word in question and all other instances
of the word in the document without changing it.
• Add: This adds the word to the dictionary so it will never come up as
an error.

Philippine Copyright 2020 40


For grammar “errors”:

• Ignore: This will skip the word or phrase without changing it.

For grammar errors, Word provides an explanation for why it thinks


something is incorrect. This can help you determine whether you want to
change or ignore it.

PY
Automatic spelling and grammar checking
Word automatically checks your document for
spelling and grammar errors, so you are informed
that there is an error without running a separate

O
check. These errors are indicated by colored,
wavy lines.

LY C
• The red line indicates that the word is misspelled.
• The blue line indicates that there is a grammatical
error, including misused words.

N N
O IO
Spelling Error Grammar Error
T
To correct spelling errors:

1. Right-click the underlined word.


A

2. Select the correct spelling from the list of suggestions.


LU

3. The error will be replaced by the correct word.

To correct grammar errors:

1. Right-click the underlined word or phrase.


A

2. Select the correct spelling or phrase from the list of suggestions.


EV

3. The error will be replaced by the corrected phrase.

To hide spelling and grammar errors in a document:

If you want to share a softcopy of a document, like a resume, with


someone, you might not want that person to see the red and blue lines.
Fortunately, Word has a feature that can hide spelling and grammar
errors so the lines will not show up on any computer.

41 Philippine Copyright 2020


1. Click the File tab to go to Backstage view, then click Options.

PY
O
LY C
2. A dialog box will appear. Select Proofing on the left side of the
dialog box.

N N
O IO T
A
LU
A

3. Check the box for Hide spelling errors in this document only and
Hide grammar errors in this document only, then click OK.
EV

4. The lines in the document will be hidden.

If you have more than one document, click


the drop-down box next to Exceptions
for: and select the desired document.

Philippine Copyright 2020 42


Finalizing and Protecting Documents
Do you want to secure any information you want to keep it private and
discourage others from editing your file?

Fortunately, Word includes several tools to help finalize and protect


your document.

PY
Document Inspector
Whenever you create or edit a document, certain personal information
may be added to the file automatically. You can use the Document
Inspector to remove this type of information before sharing a document

O
with others.

How to use Document Inspector

LY C
1. Click the File tab to go to Backstage view.

2. From the Info pane, click Check for Issues, then select Inspect Document

N N from the drop-down menu.


O IO T
A
LU

3. The Document Inspector will appear. Check or


uncheck the boxes, depending on the content you want
to review, then click Inspect. In our example, we’ll
leave everything selected.
A

4. The results will show an exclamation mark for


EV

any category found to have potentially sensitive data,


and it will also have a Remove All button for each of
these categories. Click Remove All to remove
the data.

43 Philippine Copyright 2020


5. When you are done removing, click close.

PY
O
LY C
N N
O IO T
A
LU

Protecting your document


By default, anyone with access to your document
will be able to open, copy, and edit its content
unless you protect it. Word has several ways to
protect a document; it all depends on your needs.
A

How to protect your document


EV

1. Click the File tab to go to Backstage view.

2. From the Info pane, click the Protect Document


command.

3. In the drop-down menu, choose the option that best


suits your needs. Marking your document as final
will prevent others from editing the file while they
can still view it. Other options allow for even more
control if needed.

4. A dialog box will appear, prompting you to save. Just click OK.

Philippine Copyright 2020 44


5. Another dialog box will appear. Just click OK.

PY
O
LY C
6. The document will now be marked as final.

N N
O IO T
A

Tracking Changes
LU

When someone asks you to proofread a hardcopy


document, the first thing that you might do is to get
a red pen to cross out sentences, mark misspellings,
and add comments in the margins. Fortunately, Word
allows you to do all of these things electronically
using these two features—Track Changes and
A

Comments.

Every change you make to the document will appear


EV

as a colored markup when you turn on Track


Changes. If you are going to remove or delete text,
it will not disappear; instead, the text will just be
crossed out by a markup, and when you add text, it
will be underlined by another markup. This is how
Word allows you to see edits before saving the
changes permanently.

45 Philippine Copyright 2020


The good thing here is, if there are multiple reviewers, each person
will be assigned a different markup color so you can determine which
changes are from whom.

Turning on Track Changes:

1. From the Review tab, click the Track Changes icon.

PY
2. Track Changes will now be turned on. Changes you make
to the document will have colored markups from this point.

O
Reviewing Changes:

LY C
The tracked changes are just suggested changes. For these to become
permanent, they must be accepted. The original author may agree or
disagree with the editor if these changes are to remain or be rejected.

N N
1. First, select the change you want to either accept or reject.
O IO T
A

2. Click the Accept or Reject command from the Review tab.


LU
A
EV

Philippine Copyright 2020 46


3. The markup will then disappear. You may continue accepting or
rejecting each change until you have reviewed all of them.

PY
4. When you are done, click the Track Changes command to turn off the
tracking of changes.

O
LY C
N N
O IO T
A

If you want to accept all changes, click the drop-down arrow for Accept,
LU

then click Accept All. If you don’t want to track your changes anymore,
you can select Accept All Changes and Stop Tracking.
A
EV

47 Philippine Copyright 2020


Track Changes viewing options

It will be distracting if the changes will


increase rapidly, especially when you will try
to read through the document. Word provides
several ways to customize how tracked
changes should appear. You would have the
option to hide tracked changes.

PY
To hide Tracked Changes:

1. Click the Review tab, then click the Display


for Review command. You can find this

O
command to the right of the Track Changes
command.
2. You can see four options from the drop-down

LY C
menu.
3. Choose the desired option from the drop-down
menu. Here, we will select No Markup to
view the final version of the document before

N N
we accept the changes.

A simple clickable marker in the left margin is


O IO
also available for you to switch between
Simple Markup and All Markup.
T
A
LU

To show revisions in balloons:

Most of the revisions appear inline by default.


It means the text itself is marked. In Word, you
A

can choose to show the revisions in balloons in


which the revisions will be moved to the right
margin. The document will be easier to read
EV

if inline markups will be removed. Moreover,


balloons give you more detailed information
about some markups

1. In the Review tab, click Show Markup, then


Balloons, then Show Revisions in Balloons.

2. Most revisions will be displayed in the right margin.

Philippine Copyright 2020 48


If you want the markups to go back to inline, you can choose either Show
All Revisions Inline or Show Only Comments and Formatting
in Balloons.

Comments
There are times when you want to add a comment to provide feedback

PY
instead of changing a document.

To add comments

O
LY C
1. You highlight some text, or place the insertion point

N N
2.

where you want the comment to be displayed.
In the Review tab, click the New Comment
command as shown.
O IO
3. Write your comment. When you are done, close
the comment box by pressing the Esc key or by clicking
anywhere outside the comment box.
T
A

You may respond to an existing comment by clicking the Reply button


LU

and typing in your response.


A
EV

To delete comments
1. Select the comment you want
to delete.
2. In the Review tab, click the Delete command.

49 Philippine Copyright 2020


PY
O
3. The comment will then be deleted.

LY C
N N
If you want to delete all the comments, click the Delete tools folder
drop-down arrow and click Delete All Comments in Document.
O IO T
A
LU

Comparing Documents
If you did some changes in a document without
A

tracking them, you can still use reviewing


features such as Accept and Reject and
compare to versions of the document. You will
EV

only need are the original document and the


revised document.

To compare two documents:

1. In the Review tab, click the Compare


command, then from the drop-down menu,
select Compare.
2. A dialog box should appear. Choose your
Original document from the list displayed.
If the file is not on the list, click the Browse
button to locate it.

Philippine Copyright 2020 50


3. Select the Revised document, and then click OK.

PY
4. Word will then compare the two files to determine the changes and then
create a new document. The changes will appear as colored markups. You
can then use the Accept and Reject commands to finalize the document.

O
LY C
N N
O IO T
A
LU

The original and revised documents will appear in a


pane on the right side that you can use for reference.
Click Compare, then Show Source Documents,
then Show Both, if (and only if) you don’t see the pane.

Mail Merge
A

Mail Merge is an effective tool which allows you to


EV

create multiple letters, labels, envelopes, name tags,


and more using information stored in a list, database,
or spreadsheet. When dong a Mail Merge, you must
have a Word document and a recipient list, which is
usually an Excel workbook.

How to use Mail Merge

1. Create a new Word document or open an


existing one.
2. Under the Mailings tab, click on Start Mail Merge
and select Step-by-Step Mail Merge Wizard…

51 Philippine Copyright 2020


3. Choose the type of document you want to create. Then click Next:
Starting document.

4. Choose Use the current document, then click


Next: Select recipients.

PY
5. On the Mail Merge task pane, select Use an
existing list, then click Browse.

6. File and click Open.

O
LY C
N N
O IO
7. If you are using an Excel workbook, select the worksheet that contains
the list and press OK.
T
A
LU
A

8. In the Mail Merge Recipients dialog box, you can control the recipients
EV

included in the merge by checking or unchecking each box. The default has
all the recipients selected. Click OK when you’re done.

9. Click Next: Write your letter from the Mail Merge task pane to move
to the next step.

10. You can now write your letter. When it’s printed, the recipient data will
be different for each copy, but the content of the letter would be the same.
You’ll need to add placeholders for the recipient data so Mail Merge
knows exactly where to add the data.

Philippine Copyright 2020 52


How to insert recipient data

1. Put the insertion point where you want the information to appear in
the document.

PY
2. Select one of the four placeholder options: Address block, Greeting

O
line, Electronic postage, or More items.

3. A dialog box may appear with various options, depending on the

LY C
placeholder you would choose. Select the desired options then click OK.

N N
O IO T
A
LU

4. A placeholder will appear in your document.


A
EV

5. Repeat the steps each time you want to enter information from your
record.

6. Click Next: Preview your letters when you are done.

7. Make sure that the information from the recipient list appears correctly
in the letter. You can use the left and right scroll arrows to view
each document.

53 Philippine Copyright 2020


PY
8. Click Next: Complete the merge

9. To print the letters, click Print…

O
10. A dialog box will appear. Select All, then click OK.

LY C
N N
O IO
11. The Print dialog box will appear. If needed, adjust the print settings, then
click OK. The letters will be printed
T
A
LU
A
EV

Philippine Copyright 2020 54


CHECK

Test I. Multiple Choice. Read the questions carefully then write the
letter of the best answer on the space provided.

____1. Using the keyboard only, which buttons would you press to
select the entire document?

PY
a. Ctrl + A
b. Ctrl + C
c. Ctrl + F
d. Ctrl + V

O
____2. What would you click if you want to reverse a recent action?

LY C
a.
b.
c.
d.

N N ____3. To change the font on a Word document, you would need to


click which toolbar?
O IO
a. Edit
b. Formatting
c. View
T
d. Tools
A

____4. What command would you use if you need to change a word in
your document to another word?
LU

a. Ctrl + C
b. Ctrl + X
c. F7
d. Shift + F7
A

____5. You can modify alignment, line spacing, and paragraph spacing
in the:
EV

a. Format tab
b. Layout menu
c. Paragraph dialog box
d. Styles tab

____6. What will you see if you spell check the phrase “You can check a
website and write a document simultanously”?

a. A blue wavy line will appear in the word “simultanously” .


b. A green wavy line will appear in the word “simultanously” .
c. A red wavy line will appear in the word “simultanously” .
d. No errors

55 Philippine Copyright 2020


____7. To correct the error in question no. 6, you must
a. Select the misspelled word and then delete it.
b. Select from the list of spelling suggestion.
c. Retype misspelled word and then select the correct spelling
from the list of suggestion.
d. Right-click the misspelled word and then select the correct
spelling from the list of suggestions.

PY
____8. Mon designed an invitation for their annual thanksgiving and
then emailed it to his supervisor. His supervisor added some
editing suggestions and he agreed to it. How can he finalize
the document?

O
a. Delete the revisions and retype the document.
b. In Backstage view, select Proofing, then press OK.
c. Under the Review tab, click the Accept drop-down arrow, then

LY C
select Accept All Changes.
d. Under the References tab, turn off Spelling and Grammar, then
save the document.


N N
____9. The Mail Merge feature can be used to address the same letter
to ___________.
O IO
a. one person
b. several different people
c. sender
T
d. receiver

____10. Which tab should you use to select the format for your
A

bibliography list?

a. Review Tab
LU

b. Page Layout Tab


c. References Tab
d. Review Tab
A
EV

Philippine Copyright 2020 56


Test II. Challenge yourself. Write the sample letter in MS Word,
then find out and correct the errors by using the Spelling and Grammar
check of MS Word. Be sure to also track the changes and add comments
for any suggestion you like to include in the letter. You may ask the
teacher if he/she will accept all the revisions you have made before
finalizing your document.

PY
EQUIP

O
You can access various
references on these
websites:

LY C
[Link]
[Link]/pop-
culture/2012/11/the-10-

N N
most-common-internet-
crimes
O IO
[Link]
com/blog/netiquette-
rules-safety/

[Link]
T
A
LU
A
EV

57 Philippine Copyright 2020


BUILD

Curate References, Resources, and Solutions

Using all the data that your group gathered for your project, you will
now prepare your project pitch document. Use the tools and techniques
you have learned from this lesson and be extra careful in writing your

PY
content. Refer to the details below.

The Project Pitch document is a 5 to 10 page paper documenting the


details of your social change project. The following are the elements of
your project that must appear in the project pitch document.

O
Title of the Project

LY C
This refers to the social issue you identified and want to tackle in the
semester. Your aim is to address this issue by increasing people’s
awareness about the issue at hand. This should be in question format.

N N
Objectives of the Project

This refers to the outcomes your group wants to have after the project
O IO
is completed.

Related Literatures and Resources

Try to prove your point by presenting articles, researches or statistics.


T
Present at least 10 articles here.
A
LU
A
EV

Philippine Copyright 2020 58

You might also like