100% found this document useful (2 votes)
1K views9 pages

Empowerment Technologies ACTIVITIES 1 and 2 3 4

The document contains an exercise about empowerment technologies and ICT professional track. It includes multiple choice questions about topics like social media, web technologies, cybersecurity and mail merge. It tests the understanding of these concepts through different question formats like true or false, matching and multiple choice.

Uploaded by

Rutchel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
1K views9 pages

Empowerment Technologies ACTIVITIES 1 and 2 3 4

The document contains an exercise about empowerment technologies and ICT professional track. It includes multiple choice questions about topics like social media, web technologies, cybersecurity and mail merge. It tests the understanding of these concepts through different question formats like true or false, matching and multiple choice.

Uploaded by

Rutchel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Empowerment Technologies (E-TECH) ICT

Professional Track

Name:__________________________ Date:_______________
Year and Section:_________________ Score:___________

Exercises 1
I.Multiple Choice: Cirlcle the letter that corresponds to the correct answer.

1. A web page that allows interaction from the user.


a. Static b. Dynamic c. Social d. Comment

2. This refers to the feature where users are able to categorize and locate information through tagging.
a. Hash Tags b. Taxonomy c. Folksonomy d. Rich user experience
3. A feature of a dynamic website that allow users to put thier own content.
a. Rich User Experience b. User Participation c. Long Tail d. Mass Participation
4. It provides a common framework to allow data to be shared and reused across platform, enterprise, and
community boundaries.
a. W3C b. Semantic Web c. Web 1.0 d. Web 2.0
5. According to this magazine, two Philippine cities are part of the top 10 in their research about "The Selfies Cities
around the World".
a. People b. Time c. Reader's Digest d. Candy
6. This is the Operating System for Blackberry Phones.
a. Blackberry OS b. Windows Mobile c.Symbian d.iOS
7. Pinterest is a social media website that can be classified as
a. Bookmarking sites b. Media Sharing c. Micro Blogging d. Blogs and Forums
8. Currently this is the farthest mobile network.
a. 2G b. 3G c. 4G d. 5G
9. This media is designed to help people who have visual and reading impairments.
a. Assitive b.Social c.Bookmark d.Accesibility
10. This type of social media website focuses on short short updates posted by the user.
a. Blogging b. Micro Blogging c. Social Media d. Hash Tagging

II. True or False: Write T for True; otherwise F on the blank before earch item.

_____1. Tim Berners-Lee created the World Wide Web.


_____2. People Magazine conducted the reasearch on the "The Selfies Cities in the World".
_____3. Web 2.0 introduced static web pages that allow users to interact with the web page
_____4. Folksonomy allows the users to categorize and locate information.
_____5. Technological convergence is the synergy of technological advancement to on a similar
_____6. Accoding to Nielsen, usrs who use the internet spend more ti,e in social media sites than in any other type of site.
_____7. Blogging sites are sites that focus on short updates from the user.
_____8. Adroid is an operating system for mobile device like Apple.
_____9. Assitive media is a profit service designed to help people who have visual and reading impairments.
_____10. Information and communication technology (ICT) deals with the use of different communcation technology to
locate, save, and edit information.

III. Write SO for Social Media as social network, BS for bookmarking site, SN for social news, MS for media sharing, MI
for micro blogging, and BF for blogs and forum.

____1. Facebook
____2. Plurk
____3. Twitter
____4. Tumbler
____5. Reddit
____6. Google+
____7. Instagram
____8. Pinterest
____9. Blogger
____10. StumbleUpon
Exercises 2
I. True or False: Write T for True; otherwise F on the blank before earch item.

_____1.My computer has an antivirus so it is okay to open most email attachments like e-cards
video files.

_____2.Your friend told you that this college application was rejected due to the fact that you
posted a video of him doing crazy stuffat a party.You posted the video several years ago but later took it down to
protect your friend’s reputation. Can your friend be right thnat the college found the video.

_____3. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in –game money. She promises to keep your password a secret . Is
it okay to give away your password?

_____4. You received an email stating that your mother’s bank account is going to be forfeited if
you do not respond to the email.Is it safe to reply?
_____5. You forgot that your essay for English class is due tomorrow.While doing your research
, you found a website offering free essay. Is it okay to use the essays from this free essay website

_____6.A virus is a malware that multipliesb and infects other computers through flash drives.

_____7.Keyloggers are software that shows pop-up ads even if you are not using your browser.

_____8. Search engines can scan websites for search results even if you have set your post to
“private”.

_____9. Here is a danger in posting information about a future vacation.

_____10. Letting people know your birthday is probably a must if you want to get as many gifts
as possible. But having it in your profile makes you vulnerable to identity theft.
II. Matching Type: Match column A with column B. Write the letter of the correct answer on the space before each
number.

A B

____1. Virus a. designed to send your advertisements


____2. Rogue b. sends an official-looking email and is designed to
steal sensitive personal information
____3. Keylogger c. a provision that allow you to use copyrighted
work without consent with certain limitations
____4. Adware d. a browser feature that is synonymous to “private”
Browsing
____5. Spam e. replicates and can transfer from one computer to
another
____6. Phishing f. exploits the DNS system
____7.Fair use g. states that anyone who uses your work without
your work without your consent is punishable by law.
____8.Spyware h. runs in the backgrounds and monitors what you
are Doing
____9. Private i. unwanted email mostly from bots
____10. Malware j. disguised as a useful program but is not
____11. Incognito k. the information superhighway
____12. Internet l. tricks the user into posing that it is security software
____13. Trojan m. malicious software
____14.Copyright n. an option to hide a post so that search engines could Scan it.
____15.Pharming o. used to record the keystrokes done by the user.

EXERCISES 3
I.Multiple choices : Circle the letter that corresponds to the correct answer.

1.What feature of the Microsoft World allows you to efficiently create documents that
gave the same general content but may different recipients or purposes?
a.Mail merge c. send merge
b.Print merge d. view merge
2.Which of the following is not component of the mail merge
a.Address c. form document
b. File name d. data file
3.What are the steps in creating a simple mail merge?
a.Create form document; preview; insert place holders;print
b.Preview;insert place holders;create form documents; print
c. Create a main documents; create date source; insert place holder,preview
d. Create data source; insert place holders;preview.print
4.Where can you find the Start Mail Merge Button
a.File tab c.reference tab
b. Mailings tab d. home tab
5.What tells Microsoft Word exactly where to place the information coming from the data
a.Data source c.place holder
b.Insertion lines d. insertion tag
6.What types of document can you create using mail merge?
a.Envelopes c.poster
b.Letters d. labels
7.What button allows you to see the result of your mail merge even before you print or send it out.
a. Preview results c.address block
b. Insert merge field d. greeting line
8. What file contains the information you need to merge with your main document?
a. Address block c. data file
b. Contact list d. directory
9.What essential component of mail merge is required from users when generating
Labels?

a.Data file c.place holder


b.Form document d. merge field
10.Whaat image compression/filee type is capable of displaying simple animation?
a. bmp c.jpg
b. gift d. png
11.Among the text wrap options, which one allows you to place an image or external material in line with the
text, treating the image just like how a text is treated?
a. In line wiith text c.through
b.Square d.tight
12.Which image compression type allows you to display images in full color just like in digital pictures?
a.bmp c.jpg
b.gif d. tiff
13.Under what ribbon group does “insert Smart art” fall?
a. apps c.media
b .Illustrations d. pages
14.When inserting charts on your documents what Microsoft Office application pops-up to allow you to enter
and manage the parameters of your chart?
a. Access c.note
b.Excel d.word
15.What external material allows you to insert organizational or structural templates like
Organizational charts and flow charts on your document
a.Chart c.screenshot
b.Pictures d.smart art

Essay. Answer the following questions.

1.How important is the mail merge feature of Microsoft word in different organizations?
2.Give an instance where it would be better to use the feature of Microsoft Word in labeling envelopes
3.When do images or graphics Microsoft Word hurt the document rather than help?

4. 4. On a piece of paper, create a simple flow chart that summarizes the step in creating a merged document
5.Describe on how or in what ways you can manage the recipients list.
6.In your own words describe or enumerate the steps in generating labels..
7. What are some ways you can use to acquire images that can be inserted in a word
Document?
8.Describe the steps on how you are able to transfer your pictures to your computer.

Exercise 4
I.Multiple choices: Write the letter of the correct answer on the space before each number.

____1.A program designed to create spreadsheets which can later be used to analyze
Statistical data.
a. Microsoft Excel c. Microsoft Publisher
b. Microsoft Word d. Microsoft OneNote
____2.A number format that puts a dollar symbol before each value by default
a. Percent c. comma
b. Accounting d. date/time
____3.A function that adds a range of cells
a. ADD c. SUM
b. PLUS d.TOTAL
____4. This is the tab in the Format Cells dialog box where you can change the orientation of a text.
a. Alignment c. file
b. Orientation d. view
____5.A function that gets the average of a range of cells
a. AVERAGE c. MEAN
b. SUM d. MEDIAN
____6. Which among the following is not part of the syntax for AVERAGEIF?
a. Average range c. logical test
b. Range d. criteria
____7.A function used to count the number of cells that contains something in them if the criteria are met
a. COUNT c. COUNTING
b. COUNTNOW d. COUNTIF
____8.A function used to add a certain range of cells if a condition is met
a. SUMIF c. COUNTING
b. ADDIF d. PLUSIF
____9.The shortcut key for the Format Cells dialog box
a. Ctrl + F c. Ctrl + 1
b. Shift + F d. alt + 1
____10.A syntax in the AVERAGEIF function that includes the value or label that determines if the cell is part
of the range to be averaged
a. Range c. average range
b. criteria d. logical test

II.Answer the following

Using the formulas you have learned, accomplish the following by analyzing your data. Use
the data you have gathered.
1. Determined other instances where you can use the COUNTIF, SUMIF, and AVERAGEIF functions.
2. How many of the certain group (e.g., teacher/student) are willing to pay more?
3. How many of the certain group (e.g., teacher/student) like the presentation of the
Product/service

III.Essay/Enumeration:

1. Determine other instances where you can use the COUNTIF, SUMIF, and AVERAGEIF
Functions.
2.How does Excel help analyze statistical data?
3. List down other functions you were able to realize that are not part of this lesson then brieftly describe each
of them.
EMPOWERMENT TECHNOLOGY
Lesson 1- Information and Communication Technology

ICT- plays an important part in our lives and in all aspects in our society. Main method of communication, information
and education.
Telecommunications- computer in homes, schools, private and governments offices, hospitals. Computers are also used
in mobile phones communication.
Commerce- Shops and supermarkets use software to calculates bills and efficiently processes both cash and credit
transactions.
Sports and Recreation- Athletes can practice their skills online.
Arts, Design, and Music- Video, Animation, Music Recording, Drawing
Media and Visual Arts- Architecture, Interior design and andscaping.
Health Services- Computers and used in the hospitals to store medical data. MRI machine, Doctors, Researchers.
Science and Research- Computers used by chemists to invent materials. Medicine, and products to improve life.
Travel and Hotel Bookings- Airline fares tickets are paid online, hotel and housing are also reserved using the internet.
Computers are also use by traffic controllers.
Business and Accounting- Computers in groceries are used by cashiers to store prices of goods, determine inventory
goods. And locate goods in the store.
Manufacturing Industries- Automobiles and other vehicles are manufactured using computers- aided machineries and
robots.it includes Manufacturing machines, fabrication machines, ATM machines.
Banking- Almost our financial transactions are done by computer software.
Mathematics- Computerized calculations in the creation of buildings, machines, bridges, airplane, radio communication.
Engineering and Architecture- Architects design houses, buildings and bridges using computer Aided Design(CAD) which
is a lot faster and presentable.
Agriculture- Research, monitoring to improve agriculture.
Writing and Publishing- Books, magazines, news papers.
Government services- Computer services are use by the BIR to compute taxes or real property such as homes and
houses.
The Current State of ICT
Web 1.0- is a term coined to differentiate the first stage of the world wide web in comparison with the present stage of
the internet technology.
Web 2.0- was first use around the year 2004.
Web 3.0- is named and referred to by web experts as semantic web or data driven web content and response.
Technological Convergence- is an evolution of technological developments tat merge into a new system bringing
together different types of applications and media.

Lesson 2- Safety, Security, and Ethics


Dangers on the Internet
 Email spam- known as junk email, usually unsolicited commercial email.
 Email spoofing- refers to deceitful email practice in which the sender address is changed, so that it appear fto
have come from other sources.
 Phishing- this is a deceitful practice of trying to get confidential information such as passwords and usernames,
credit card details.
 Pharming- this is a dangerous hacker attack on a web site which directs all traffic to that web site to another
fictitious website.
 Spyware- a computer program that is installed covertly on a personal computer to collect information or
takeover the computer without the knowledge of the owner.
 Computer worm- a dangerous computer program that replicates itself through a network. Some worms delete
files, disrupt the network function and still, others sent junk mail from infected computer.
 Trojan Horse- a form of malicious software fronting to perform a good task, but covertly performs undesirable
function.
 Computer virus- a program that duplicates itself and then infects the computer. It spreads like a biological virus.
 Hacker- this is a person who is able to enter and control other peoples computer without authorization.

Different kinds of accounts


 Computer administrator, Limited account, Guest
 Security Center- Is the place where you can set additional protection from threat to your computer, especially
when using internet.
1. Firewall – helps in protecting your computer from unauthorized entries, viruses, or worms from internet or
network.
2. Automatic updates- is another feature of windows which when turned on will automatically download
updates from Microsoft windows website.
3. Virus Protection- is usually about the current antivirus software installed in your computer; this option is
recommended to be turned on always.
Online Ethics and Etiquette
The Commandments for Computer ethics
1. Thou shalt not use a computer to harm other people. 9. Thou shalt not think about the social consequences
of the
2. Thou shalt not interfere with other people’s computer work. Program you write.
3. Thou shalt not snoop around in other people’s files.10. Thou shalt not use a computer in ways that show
consideration
4. Thou shalt not use a computer to steal and respect.
5. Thou shalt not use computer to bear false witness.
6. Thou shalt not copy or use software for which you have not paid
7. Thou shalt not use other people’s computer resources without authorization.
8. Thou shalt not appropriate other people’s intellectual output.
Online Ethics and Etiquette
The Commandments for Computer ethics
1. Thou shalt not use a computer to harm other people. 9. Thou shalt not think about the social consequences
of the
2. Thou shalt not interfere with other people’s computer work. Program you write.
3. Thou shalt not snoop around in other people’s files.10. Thou shalt not use a computer in ways that show
consideration
4. Thou shalt not use a computer to steal and respect.
5. Thou shalt not use computer to bear false witness.
6. Thou shalt not copy or use software for which you have not paid
7. Thou shalt not use other people’s computer resources without authorization.
8. Thou shalt not appropriate other people’s intellectual output.
Lesson 3- Online Research
Contextualized Online Search and Research skill- development of contextualized research is important so that the
generations ahead would be able to take advantage of the wealth of information on the internet.
Contextual Search- is different from the traditional way of getting information which returns a list of papers or
documents relevant to the request of the user.
Steps to make a contextualized online research
1. Identify or choose a topic-
2. Topic or task definition
3. Identify methods of search
4. Identify resources of your research
5. Make your research strategies
6. Compiling the research results
7. Evaluate the results of your research
8. Create a list of your references for citation
Improving research skills
1. Critical thinking- very important skill to develop in research since the internet is full of valuable data.
2. Analytical skill- requires the ability to look, verbalize, conceptualize and gather data attuned to the context of
subject.
3. Problem solving capability- the ability to present solutions or solve problems by presenting a decision based on
the given information.
4. Organized data mining- is a well-planned design of the database of all the research materials either inside the
computers or hard copy.
5. Research presentation- the ability to present the ideas and draw conclusions from research, be able to explain in
writing the purpose, steps, goals and objective of the research.
6. Creativity and developed imagination- is the ability to look for alternative solutions to the problems needed to
solve in the research.
7. Computer literacy- knowledge of the various computer applications and tools when working with large amount
of data helps the researcher manage these information.
Lesson 4- Applied Productivity Tools
Mail merge and Label Generation- you can send your application, such as advertisement, newsletter, or brochure that
you have created in MS publisher.
Steps in creating a Mail Merge
1. Creating Recipient List – select the data source you want to use to create your recipient list.
2. Prepare your publication- after creating your publication, insert any additional text that you want to appear in
every version of your publication.
3. Create merge publication- print, merge to a new publication or add to existing publication.
Hyperlinking in Presentations- allows you to go to other slides in the same or another presentation in a web page, and
even to email addresses.
Lesson 5- Imaging, Web Designing, and Online Platforms
Sources of Photos and Graphics
1. Personal and Professional Photos- Photos taken by amateur professional photographers using a digital camera.
2. Scanned Images- are those that you transfer from printed photos and graphics using scanning devices.
3. Stock Photo library- are several photographs and created images that are available for sale.
4. Online Stock Photos- are found in the world wide web.
Online Digital File Formats for Images and Text
 Proprietary formats- are owned and controlled by individuals or corporations and the file formats specifications
are not available to the public
 Open formats- are means and ways for storing digital information that are free, can be use by public and are not
encumbered by copyrights or patents.
 File Format- uses suffixes that are added to the end of a file name, called filename extensions.
.bmp- Bitmap Image file is an image file format developed and used on Microsoft windows environment.
.gif- Graphical interchange format- file format that is very popular on the world wide web because of its portability.
.jpg- JPEG Image File- standardized by the Joint photographic Experts group.
.png- Portable Network graphic- is a free, open source bitmap image format made to improve on GIF which has small file
but can handle more colors since it supports 24-bit pixel color.
.psd- Photoshop Document PSD is a native file format for adobe photoshop, and since many are using this program to
create image it is very popular.
Basic principles of Graphics and Layout
Layout- is the process of planning and arranging graphics or text in a page or book.
 Symmetrical- a layout maybe symmetrical where there are equal weight of elements on both sides of the page.
 Asymmetrical- a layout maybe asymmetrical when there is an artistic and different intensity on one side of the
page.
 Text- a text type should be eligible, appropriate font face, and arranged either left justified, right or center.
 Image- the image should be proportionate, with sharp color and high resolution.
 Proximity and harmony- the elements should be close together and not scattered.
 Consistency- there should be uniformity of theme on each page.
 Emphasis- there should be one point of interest in a oage. The elements to be emphasize should have different
colors ect.
Lesson 6- Online platform Tools for ICT Content Development
To be able to create a good online presentation, webpage, and content, you should know the principles and techniques
of designing using online platform.
Online Platforms and applications that you can use.
 Presentation tools- Prezi,Zoho Show, MS powerPoint
 Newsletter- Dropbox, tumblr, Wix
 Photo editing tools- Picasa, Adobe photoshop, MS paint
 Photo uploading and hosting tools- Dropbox, Flickr
 Online collaborative tools- Google drive, Viber, Facebook
 Cloud computing- Dropbox, Google Drive, Microsoft one drive
 Blog tools- Blogger, Wordpress,Live Journal
 Mapping tools- Google maps, Wikimapia
 Music production- Sbelius
 Survey and forms- Google Forms
 ICR project contents publishing and uploading form- Wordpress
 Content management system platform- Drupal, Joomla
 File management platform- Zamzar, Word2pdf
 Curating tools- Pinterest, Storify, Trapit
 Web design platforms- Wix, Weebly, Adobe Dreamweaver
 Web management platforms- Drupal, Wordpress, Joomla
Examples of Presentation Tools are:
1. Zoho Show
2. LinkedIn Slideshare
3. Google Slides
4. SlideRocket
5. MS Powerpoint
6. Prezi
Examples of Cloud Computing Tools
1. Evernote- is a multi- platform application which is designed for systematizing, storing and taking notes.
2. Dropbox- is a private cloud storage amenity which renders features like cloud storage and fire exchange and
synchronization.
3. Google Drive- is a free file storage and synchronization service where you can store and exchange documents,
photos, music, videos etc.
4. Amazon Cloud Drive- is a date storage and file exchange service used to back up, protect and share photos.
5. Microsoft OneDrive- is a date and file exchange service to save your files and photos from anywhere.
Examples of File Management
1. Zamzar- online file conversion, covering a wide range of different images.
2. Word2Pdf- a free online tools that converts word document to pdf
3. Dropbox- allows you to upload and store files thru a client software.
4. Sky Drive- is a part Microsoft Live family which provides client apps that sync to and from folders on a client
machine.
5. Google Drive- allows you to create a folder into which you can place files that are automatically synced to the
cloud to other devices running the client.
Lesson 7- Collaborative Development
How to develop ICT project Contents
1. Planning and conceptualizing the content
2. Resources
3. Research for content
4. Audience profiling
5. Copywriting for ICT project
6. Designing the Layout
7. Developing and Constructing the ICT projects
8. Curating content
Online Collaborative Tools
1. Voicemail
2. VoIP/ Video call
3. E-mail
4. Instant Messaging

Social Chat
1. Google chat
2. Google hangouts
3. Skype
4. Viber
5. Kakao talk
6. WeChat
7. Line
Social Media
1. Facebook
2. Blog
3. Microblog
Cloud-based collaborative tools
1. Zoho
2. Google Drive
3. Prezi
4. Microsoft Office Online
5. Adobe Creative Cloud
Project management for ICT Content
1. Wordpress
2. Drupal
3. Joomla

Tips to stay Online


1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of website to learn how the website handles the information you share.
4. Know the security features of the social networking site you use. by keeping your pfofilr private, search engines
will note be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/wifi. Browsing in “incognito or private mode” a feature of the
browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face to face.
8. Never post anything about a future vacation. It s similar to posting, “ Rob my house at this time.
9. Add friends you know in real life
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one antivirus software to avoid
conflicts.
12. If you have a wi-fi at home, make it private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer to peer
downloads(torrents) as the download is most likely not monitored by the website owner.
14. Buy the software; do not use pirated ones.
15. Do not reply of click links from suspicious emails.
Internet Treats
1. Malware-
a. Virus- a malicious program designed to replicate itself and transfer from one computer to another
either through the internet and local networks or data storage like flas drives and CDs.
b. Worm- a malicious program that transfers from one another by any type of means. Often, it uses a
computer network to spread itself. For example, the ILOVEYOU worm ( love Bug Worm) created by a
Filipino.
c. Trojan- a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hacker to get your information.
 Rogue security Software- tricks the user into posing that it is a security software. It asks the user to pay to
improve his/her security but in reality, they are not protected at all.
d. Spyware- a program that runs in the background without you knowing it(thus called spy). It has the
ability to monitor what you are currently doing and typing through keylogging.
 Keyloggers- used to record the keystroke done by the users. This is done to steal their password or any other
sensitive information. It can record email, messages, or any information you type using your keyboard.
e. A program designed to send you advertisements, mostly as pop-ups
2. Spam- unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing- its goal is to acquire sensitive personal information like passwords and credit card details. This
is done by sending you an email that will direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information.
 Pharming- a more complicated way of phishing where it exploits the DNS ( Domain Name Service)System.

You might also like