[go: up one dir, main page]

0% found this document useful (0 votes)
307 views28 pages

Understanding Online Platforms in ICT

Uploaded by

John Brix Ubial
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
307 views28 pages

Understanding Online Platforms in ICT

Uploaded by

John Brix Ubial
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

QUARTER 1

ANTIQUE NATIONAL SCHOOL


QUARTER 1 WEEK 1

EMPOWERMENT TECHNOLOGY ACTIVITY SHEET

Learning Activity Sheets (LAS) No. 1


Compare and Contrast the Nuances of Varied Online Platforms, Sites, and Content

I. Learning Competency

Compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges. (CS_ICT11/12ICTPT-Ia-b-1)

II. Background Information for Learners Information and Communication Technology

Information and Communication Technology


It refers to technologies associated with the transmission and exchange of data in the form of
sound, text, visual images, signals or any other form or any combination of those forms using
digital technology. It encompasses such services as telecommunications, posts, multimedia,
electronic commerce, broadcasting, and information technology.

World Wide Web


It is also known as WWW or W3 introduced by Tim Berners-Lee. It consists of different pages
that are formatted in a markup language called HTML (Hypertext Markup Language) and linked to
each other that contain text, graphics, multimedia files, hyperlinks, etc.

Web 1.0
The first development of the World Wide Web where web pages are static. It is also known as
a flat or stationary page, and it cannot be manipulated by users.

Web 2.0
It is a dynamic web page where users can interact with the page like creating a user account,
posting comments, uploading files and images, and others.

Features of Web 2.0


1. Folksonomy – users can classify and arrange information by adding tags or labels. The
pound sign (#) is used in Facebook, Twitter, Instagram, and other social networking sites.
2. Rich User Experience – user can have high interaction with the content of the page and
can achieve the level of expertise.
3. User Participation – user can put content on their own on the web page like comment,
evaluation, etc.
4. Long Tail – A site that offers services and brings individual and businesses into selling
different goods and commodities such as shopping site like OLX, Lazada, Shopee, Zalora
and others.
5. Software as a service – users can subscribe to software when they need it instead of
purchasing them.
6. Mass Participation – sharing of diverse information through universal web access.

Web 3.0 The Semantic Web


A new paradigm in web interaction extension led by World Wide Web Consortium (W3C)
where it provides a framework that allows data to be shared and re-used.

Trends in ICT
1. Convergence – it refers to the fusing of technological advancement to work on a similar
task.
Example. Using a smartphone as a camera in taking pictures instead of DSLR camera.

1
2. Social Media – an application and website where user can communicate, create and
share content and participate in online communities.
Types of Social Media
A. Social Network – A website where people with the same come together to share
information. Examples: Twitter, Instagram, Facebook
B. Social News – A website where users can post stories and are ranked based on
popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark
C. Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images, and others. Examples: Pinterest,
StumbleUpon, Dribble
D. Media Sharing – A website that allows you to share and store multimedia files
such as video, photos, and music. Examples: Instagram, YouTube, Flickr
E. Microblogging – a website that allows you to broadcast short messages.
Examples: Twitter, Tumblr, Meetme
F. Blogs and Forums – a discussion website that allows users to ask questions
and comments on a journal posted by an individual or group. Examples:
WordPress, Blogger
3. Mobile Technologies – a technology used in cellular and other devices such netbook,
laptop, tablet, smartphones, etc.
4. Assistive Media - A platform that assists people with disabilities. It will guide an
individual like a blind person by using an audio recording

III. Accompanying DepEd Textbook and Educational Sites

De Lara, Maricel. (2016, Nov. 3). Empowerment Technology. Retrieved from


[Link]
Retrieved on May 19, 2020.

Quiambao, A. (2019, Sep 8). Online platforms for ICT Content Development. Retrieved from
[Link]
development-169954837. Retrieved on May 20, 2020.

IV. Activity Proper

Activity 1: Compare the different versions of web-based on the given criteria. Identify their
differences by filling out the table below. Use a separate sheet of paper for this activity and label it
properly. The first two are done for you.

2
Activity 2: Match the items in column A with the correct answer in column B. Write only the letter
of your answer on your answer sheet.

Column A Column B

1. The Local Government Unit (LGU) of Bacolod A. Folksonomy


City organized a successful unity run for a cost
called KapatiRUN. Everyone especially the B. Rich User Experience
official page of KapatiRUN had included C. User Participation
#KapatiRUN2020 on their social media posts.
They categorize the information on their page D. Mass Participation
using tags.
E. Software as a Service
2. Michael used her smartphone instead of using
F. Technological Convergence
her laptop in doing her research.
G. Assistive Media
3. Angelo created a website intended to help people
with visual and reading impairments. H. Social Networks
4. George is fond of pinning things he finds on the I. Bookmarking sites
web using Pinterest.
J. Media Sharing
5. Ana likes to post short updates on her Twitter
account. K. Microblogging

6. Lucy uploads her pictures on Instagram to update L. Blogs and Forums


the followers of her daily activities.

7. Alice uses Facebook to connect with her friends.

8. Most Internet users subscribe to Netflix for new


movies.

9. Justine posted an article on his blog and his


followers commented on his post.

[Link] from news article websites, journalists


post their news items on platforms like Reddit.

Activity 3: Identification. On your answer sheet, write SO if the social media website is a social
network, BS for bookmarking site, SN for social news, MS for media sharing, MI for microblogging,
and BF for blogs and forums.

Remember:

Empowering ICT is important for its innovative uses impacts our daily lives. It has affected
our ways of communicating, made our lives more convenient, and assisted countries
towards their modernization plans. Thus, there is a need to create a foundation of
understanding in the world of ICT

3
V. Reflection

On a separate sheet of paper, answer the following questions.

1. In what ways can this activity help you in enriching your awareness on the recent trend in
Information and Communication Technology (ICT)?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2. What part of the activity did you find easy/difficult?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

3. How will your Teacher / Learning Facilitator help in improving your task?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

4
QUARTER 1 WEEK 2

EMPOWERMENT TECHNOLOGY ACTIVITY SHEET

Learning Activity Sheets (LAS) No. 2


Online Safety, Security, Ethics and Etiquette

I. Learning Competency

Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs
as it would relate to their specific professional tracks. (CS_ICT11/12ICTPT-Ia-b-2)

II. Background Information for Learners Information and Communication Technology

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment through games, online
communities, and everything in between. But like most things in this world, there is always the “other
side of the coin”. The internet is one of the most dangerous places especially if you do not know
what you are doing with it. But there is no need to worry; it is never that late.

5
The Internet is defined as the information superhighway. This means that anyone has access
to this highway, can place information, and can grab that information. Therefore, social networking
sites like Facebook continue to improve their security features. The threat of cybercrime is very real.
Whatever information we share today could affect our future.

Tips to Stay Safe Online


The Internet is a public place, and it is up to you to protect yourself. Here are some tips to help
you stay safe when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read them.
3. Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT
protect you from hackers.
6. Do not talk to strangers whether online or face-to-face.
7. Never post anything about a future vacation. It is like posting, “Rob my house at this date.”
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update antivirus software on your computer. Use only one anti-virus software to
avoid conflicts.
11. If you have Wi-Fi at home, make it a private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. But the software does not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites

Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware – or malicious software, is any program or file that is harmful to a computer
user.
Types of Malware:
a. Virus - a malicious program designed to replicate itself and transfer from one computer
to another (internet, local networks, FDs, CDs, etc.)
b. Worm - a malicious program that transfers from one computer to another by any type of
means. Ex. ILOVEYOU Worm - The malware originated in the Pandacan neighborhood of
Manila in the Philippines on May 5, 2000.
c. Trojan - a malicious program that disguises as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hackers to get your information.
d. Spyware - a program that runs in the background without you knowing it (thus called
“spy”). It can monitor what you are currently doing and typing through keylogging. Ex.
Keylogger – used to record keystrokes done by the user. This is done to steal their
password or any other sensitive information. The key logger software typically uses a log
file to store its recording.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware - or ransom software is a type of malicious software from crypto virology
that threatens to publish the victim's data or perpetually block access to it unless a ransom
is paid.

2. Spam - An unwanted email mostly from bots or advertisers. It can be used to send malware.

3. Phishing - its goal is to acquire sensitive personal information like passwords and credit
card details. This is done by sending you an e-mail that will direct the user to visit a fake
website and be asked to update his/her username, password, credit card, or personal
information.

6
Protecting Reputations Online
Here are the things you might want to consider before posting something over the internet:
1. Before your post something on the web, ask yourself these questions: Would you want your
parents or grandparents to see it? Would you want your future boss to see it?
2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it
down or report it as inappropriate.

Copyright Infringement
It is the use of works protected by copyright law without permission for a usage where such
permission is required. Here are some tips that could help you avoid copyright infringement:
1. Always assume that the work is copyrighted.
2. Do not copy, share, or alter without seeking permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or information.

III. Accompanying DepEd Textbook and Educational Sites

Innovative Training Works, I. (2006). Empowerment Technologies. In I. Innovative Training Works,


Empowerment Technologies (p. 19). Rex Bookstore.

Shea, V. (1994). Core Rules of Netiquette. Retrieved from


http:/[Link]/obj/[Link]

IV. Activity Proper

Exercise 1: Case Study Read and understand the text and answer the question on the next page
using a separate sheet of paper.

CASE STUDY: WHAT THE? —Online scams and identity Theft


Transcript

“Well, I downloaded a lot of stuff to my computer—heaps of stuff actually: music, programs,


games. I guess in the back of my mind I have always been worried about security, but I did
not think I could do anything about it, or anything that bad could happen to me. I guess when
7 you are connected and doing frequent downloads you never know what is coming down
your phone line.

One day I downloaded this program, and after that my computer seemed to be a lot slower. It
was taking forever for pages to load and even normal things like writing an email or writing a
Word document would take a long time. I didn’t think too much of it ‘cos my computer was
getting pretty old and I had heaps of stuff on it. But then my homepage got changed to some
free download site and when I checked my internet settings, I found that they had all been
changed. But things kept on getting worse. Whenever I went online to the internet I got
bombarded with pop-ups and, like, my computer would just crash, and I would have to
manually reset it.

Then things got serious. I could not log-in to my email account and I discovered that someone
was using my internet banking. I had anti-virus software installed onto my computer, but it just
was not picking up anything.

What I did not realize at the time was that when I had downloaded this free program a couple
of months ago, a smaller program downloaded and installed itself onto my computer. But I
had no idea.

7
This spyware program monitored all my internet activity and the keylogger recorded all the
keystrokes I made on the computer such as my log-in, my passwords, and all the emails I
sent to my mates. It then sent all this information to the software developer. I ended up taking
my machine to a computer specialist who was able to find and remove all the spyware. I had
to contact my bank and my ISP to change my account details.

You know, even free stuff comes at a cost nowadays and I know it sounds corny, but if it is
too good to be true then it probably is. Before I download anything now, I make sure there is
no adware or spyware associated with it and I read the user agreement statement. There are
websites online that, sort of, help you out with this and can offer great reviews and advice on
the program and company that you are downloading from. If it is free, there is usually a catch.
I guess I learned the hard way.” – Brian

According to the text, give possible answers to the following questions:

1. Brian complains that his virus protection does not work. What do you think has gone wrong?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

2. What is the realization of Brian in downloading stuff from the internet?


___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

Exercise 2: Identify the Internet threat that is described in each number. Write your answer on a
separate sheet of paper.

1. Jonathan is having a problem because his files were corrupted. He discovered that most of his
folders were replicated.
2. Ken was asked to pay a certain amount of money for him to retrieve his files. Ken might be a
victim of ______.
3. Mari found a good application and she installed it on her computer. But after the installation, some
of her files were deleted.
4. Jack is receiving several irrelevant messages every day and his e-mail account has become
almost unusable.
5. The network servers of KNCHS stopped response and it was found out that much of the systems'
memory was consumed by the malicious software. What kind of malware is this?
6. Jewel is using a technique that tries to take information from the user. She commonly takes things
like credit cards, usernames, passwords, and home addresses using a fake website. What type
of threat is depicted in the scenario?
7. This program can record all you enter on your keyboard.
8. Eli received an unwanted email that contains advertisements. What type of internet threat is
depicted in the scenario?
9. A kind of internet threat where the attacker uses a fake website to get your sensitive information.
10. A program that runs in the background without you knowing it. It can monitor what you are
currently doing.

8
Exercise 3: Compare and contrast the scenario in the picture. Describe how Jimmy and Boggart
are the same and different and in using social media. Using a separate sheet of paper, plot your
answer in the Venn diagram.

9
Exercise 4:
Read and answer the following questions on a separate sheet of paper.

1. How does a virus infect a computer?


___________________________________________________________________
___________________________________________________________________

2. How do computer worms spread?


___________________________________________________________________
___________________________________________________________________

3. How do fraudsters use social media to steal information?


___________________________________________________________________
___________________________________________________________________

4. When does copyright infringement occur?


___________________________________________________________________
___________________________________________________________________

V. Reflection

On a separate sheet of paper, answer the following questions.

1. In what ways can this activity help you in enriching your awareness on online safety, security,
ethics, and etiquette standards and practice in the use of ICTs?
___________________________________________________________________
___________________________________________________________________

2. What part of the activity did you find easy/difficult?


___________________________________________________________________
___________________________________________________________________

3. How will your Teacher / Learning Facilitator help in improving your task?
___________________________________________________________________
___________________________________________________________________

10
QUARTER 1 WEEK 3

EMPOWERMENT TECHNOLOGY ACTIVITY SHEET

Learning Activity Sheets (LAS) No. 3


Contextualized Online Search and Research Skills

I. Learning Competency

Use the internet as a tool for reliable research and information gathering to best achieve
specific class objectives or address situational challenges. (CS_ICT11/12-ICTPT-Ia-b-3)

II. Background Information for Learners Information and Communication Technology

Internet Research is a research method in collecting and gathering information via the internet by
using a search engine such as Google. Search Engine is a program that allows users to search
for content on the internet.

Examples of Search Engine

Searching the Web


Getting the correct and reliable information is our goal in an internet research. We may rely on
the capability of a search engine but sometimes it may not give us the correct information because
of the keywords we entered a search engine. There are techniques in searching information that
can be applied in a search engine to get a better result. Some search engines allow a combination
of words and logic connectors of AND, OR, and NOT.

Tips for Effective Internet Research by George Mathews


1. Know what kind of research you want to do.
2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.

Online Research Skills by Hannah Trierweiler Hudson


1. Check Your Sources
2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient.
5. Respect Ownership
6. Use Your Networks

Evaluating Websites
To help you evaluate the website’s credibility, here are the questions that you need to answer:
1. What is the domain type of the website?

11
If it is a personal website, then you should further evaluate the website.
2. Who wrote the article?
Check if the author’s credentials or affiliations are listed so you can tell whether the author is
qualified to write the topic. Also, check the publisher of the article if it is a reliable publisher.
Make sure that the author provides an e-mail or a contact address/phone number.
3. What is the purpose of the document and why was it produced?
It is also important to check the document’s purpose and why it was produced. The document
should provide accurate information and must be objective in presenting it. Some websites
produce documents to motivate users to buy products. If this is the case, information might be
biased. However, bias is not necessarily bad, but you need to investigate the author or
connections.
4. When was the document published and updated?
The document should be regularly updated. As to the freshness of the date, it depends on the
information needed. For some topics, you want current information. For others, you want
information near the time it became known. The links should also be up to date. There should
be no dead links.

Copyright Issues
There are millions of information that we can get from the internet. Some of this information is
free but others are not. They are protected by copyright law.
Copyright is a protection given to the owner of the rights in an original work such as books,
musical works, films, paintings, and other works, and computer programs. This original work is called
intellectual property which is protected under Republic Act 8293 known as the “Intellectual Property
Code of the Philippines”

Copyright Infringement
This happens when the copyrighted work is used by another person without the permission of
the author or copyright holder. Any person who is infringing the right protected work would be liable
under the law. An example of this is the case of M.Y. Intercontinental Trading Corporation (MITC),
Tedwin T. Uy, Allianz Marketing and Publishing Corp. (Allianz), and Fujian New Technology Color
Making and Printing Company, LTD (Fujian) against St. Mary’s Publishing Corporation (SMPC).
Manila regional trial court ordered Fujian and its partners to pay P24.7 million for the damages and
cost of litigation for copyright infringement to SMPC. Fujian and its three local partners were guilty
of printing, copying, reproducing, importing, distributing, and selling original and revised textbooks
that they have illegally sold to the Department of Education in Zamboanga, Municipality of Cabuyao
in Laguna, and Municipality of Matnog in Sorsogon without the approval of SMPC, the copyright
owner of the textbooks.

Fair Use
Research is important to the students and other people. Most of them rely on the information
that they can get online. Although this information is protected by copyright law, we can still use this
information without permission in a limited way under certain conditions and purposes.

Fair use is the use of copyrighted material for comment, teaching, criticism, news reporting,
research, scholarship, and another similar purpose is not an infringement of copyright. An example
of this is when you post a quote from a person on your Facebook wall. Include the name of the
person who owns the quote in your post. Another example is when you copy an image from the
internet, give credit to the creator of the image. The copied image should be used for educational
purposes not for commercial use. In fair use, 5% of the content of reference can only be copied. If
20% or less of reference is copied, there must be a secondary use agreement and fee. And if 20%
or more of the reference is copied, it requires purchasing of creative work.

Guidelines for Fair Use


1. Majority of the contents created must be yours.
2. Give credit to the owner.
3. Do not make a profit from the copyrighted work.

12
III. Accompanying DepEd Textbook and Educational Sites

Tarun, I. M. (2016). Empowerment Technologies. Plaridel, Bulacan: St. Andres Publishing House.
Rey Panaligan, “Publisher awarded P24.7 M in damages for copyright infringement”,
Accessed January 30, 2020, [Link]
m-in-damagesforcopyright-infringement/

IV. Activity Proper

Activity 1: Explain thoroughly why the website below is not credible as a source of your data for
your research.

Activity 2: Using the Internet, evaluate the given two web pages by answering the questions on
the table. Write your answer on a separate sheet of paper.

[Link] [Link]
octopus/ [Link]/animals/invertebra
tes/facts/common-octopus
What is the domain type?
Does the page list the author?
Does it provide accurate
information?
Does the page list the publisher?
Does it offer limited advertising?
Does its present information
objectively?

13
Is the page current?
Is it updated?
Are the links up to date?
Does it contain dead links?
FINAL EVALUATION: Is the
webpage valuable and credible?

Activity 3: True or False Directions: Write “True” if the statement is true and write “False” if the
statement is false.

1. It is right to copy the works of other people without asking permission.


2. All Information from the internet is free.
3. Search engine is a tool used in an internet research.
4. All information from the internet is reliable.
5. Google is an example of a search engine.
6. Child pornography is a form of cybercrime.
7. Committing a crime on the internet is not punishable by law.
8. Do not share personal information with a suspicious website or user. 9. Share your password
with anyone. 10. Think before you click.

Remember:
Website evaluation is an important skill that everyone should practice and master through time. It
is always important to learn which information are relevant and reliable to be able to avoid
misinformation and be a victim of fake news.

V. Reflection

On a separate sheet of paper, answer the following questions.

1. Is research online reliable? Why or Why not?


___________________________________________________________________
___________________________________________________________________
2. How can you show respect for others' intellectual property?
___________________________________________________________________
___________________________________________________________________
3. What is the significance of using keywords when searching for information on the web?
___________________________________________________________________
___________________________________________________________________
4. In what ways can this activity help you in enriching your Online search and Research skill?
___________________________________________________________________
___________________________________________________________________
5. What part of the activity did you find easy/difficult?
___________________________________________________________________
___________________________________________________________________
6. How will your Teacher / Learning Facilitator help in improving your task?
___________________________________________________________________
___________________________________________________________________

14
QUARTER 1 WEEK 4

EMPOWERMENT TECHNOLOGY ACTIVITY SHEET

Learning Activity Sheets (LAS) No. 4


Developing ICT Content for Specific Purposes

I. Learning Competency

A. Uses common productivity tools effectively by maximizing advanced application


techniques (CS_ICT11/12-ICTPT-lc-d- 4)

II. Background Information for Learners Information and Communication Technology

Advanced Techniques using Microsoft Word


Word Processor
It is an application that allows users to create, edit, and print documents. One of the most widely
used word processors is Microsoft Word. It is developed by Microsoft and was released on October
25, 1983. With Microsoft Word, you can create random things like calendars, newsletters, invitations,
etc. Microsoft Word offers several elements that can be used in editing documents which are shown
in the figure below.

Microsoft Word is a complex program which people use to perform various functions such as
composing and editing, formatting, and saving, and printing. With these functions you were able to
correct spelling, grammar, format your text using boldface and italics, and save your documents
electronically to the computer's hard drive.

Mail Merge
The automatic addition of names and addresses from a database to letters and envelopes to
facilitate sending mail, especially advertising, to many addresses.
This feature of Microsoft Word allows you to create documents and combine them with another
document or data file. It is commonly used when sending out advertising materials to various recipients.
The simplest solution for the previous scenario is to create a document and just copy and paste it
several times then just replace the details depending on whom you send it to. But what if you have
hundreds or thousands of recipients? Would not that take too many hours? What if you have a small
database of information where you can automatically generate those letters?

Mail Merge 2 components


1. Main Document or Form Document
a. List or Data File/Source
b. Main Document or Form Document
2. The document contains the body of the message we want to convey or send.
Example: Letter
4. List or Data File

15
This is where the individual information or data that needs to be plugged in (merged) to our form
document is placed and maintained.

How to perform Mail Merge?


In Mail Merge you need to:
Create the main document.
Create List or Data File/Source
Merge data with document

To create a form letter, do the following:


1. Open an existing Word document or create a new one.
2. Click the Mailings tab.

3. Click the Start Mail Merge command.

4. Select Step by Step Mail Merge Wizard.

Mail Merge task pane appears on the right side of your screen.

16
5. Choose the type of document you want to create. If you want to
create a letter, select Letters. Six main steps in guiding you to
complete a merge will be displayed at the bottom.

To create a form letter, do the following:


6. Click Next: Starting document to move to Step 2.

7. Select Use the current document. Click Next: Select recipients to move to Step 3.

You will need an address list so Word can automatically place each address into the document. The list
can be in an existing file, such as an Excel workbook, or you can type a new address list from within
the Mail Merge Wizard.

8. From the Mail Merge task pane, select Type a new list, then click Create.

9. The dialog box of the New address list appears, displaying fields that Word assumes you need.
Select an entry that you don't need and click the Delete button. Use the TAB key to move from
cell to cell.

17
When you delete, a confirmation dialog box will appear.

To customize the address list, click Customize Columns button at the bottom of the window.

The dialog box of Customized Address List will appear. The resulting window lists the Field Names
provided. When you are done, click OK then customized fields appear as column headings in the New
Address List dialog box.

Fill in the recipient list by typing the record’s data. Type the information that is appropriate to each field,
then press Tab to enter the next field. After filling in the last field, and add another record just press the
Tab key after inputting the last field.

When you press the Tab key on the last field in a record, a new record is automatically created and
added on the next line.

18
[Link] OK after filling the recipient list. A special Save As dialog box pops up, allowing you to save
the recipient list. Type a name for the address list then click the Save button.

Return to your document. You are now ready to write your letter, each copy of the letter will mostly be
the same, except the recipient data (name and address). You must add placeholders for the recipient
data, so Mail Merge identifies correctly where to add the data. If you are using Mail Merge with an
existing letter, make sure the file is open.

[Link] Next: Write your letter. Click the Address Block button to insert an address block into
your letter.

12.A dialog box of Insert Address Block appears. Choose the desired format for the address block
and click OK. The placeholder of Address block will appear in the document.

Use the Match Fields button to match your field names with the required fields to correct problems. This
may be essential if you created the address list in another program, such as Excel.

19
[Link] Greeting Line from the Mail Merge task pane to insert a greeting line into your document.
Dialog box of Insert Greeting Line will appear.

[Link] a format for the greeting line and click OK.


The placeholder of Greeting lines will appear in the document.

[Link] view your merged data, click the Preview Results button on the Mail merge task pane or on
the ribbon to replace the merge fields with data from your recipient list.

Label Generation
It creates a blank form document that simulates either a blank label or envelope of pre-defined
size and will use the data file that you selected to print the information, typically, individual addresses.

Integrating Images and External Materials

Kinds of Materials:
1. Pictures. Generally, these are electronic or digital pictures or photographs you have saved
in any local storage device.
2. Clip Art. This is generally a. GIF type; line art drawings or images are used as a generic
representation for ideas and objects that you might want to integrate into your document.
3. Shapes. These are printable objects or materials that you can integrate into your document
to enhance its appearance or to allow you to have some tools to use for composing and
representing ideas or messages.
4. Smart Art. Generally, these are predefined sets of different shapes grouped to form ideas
that are organizational or structural.
5. Chart. Another type of material that you can integrate into your Word document that allows
you to represent data characteristics and trends.
6. Screenshot. Sometimes, creating reports or manuals for training or procedure will require
the integration of a more realistic image of what you are discussing on your report or
manual.

JPEG. Joint Photographic Expert Group


PNG. Portable Network Group
GIF. Graphics Interchange Format
URL. Uniform Resource Locator

20
Inserting Illustrations

An illustration in Microsoft Office is visualization or drawing that is in the form of pictures, Clip Art,
Shapes, SmartArt, charts, or screen clippings. You can insert illustrations easily using the Illustrations
group of the Insert tab.

To insert a picture from a file, do the following:


1. Click where you want to insert the picture in your document.
2. In the Illustrations group of the Insert tab, click Picture. Insert Picture dialog box will appear.
3. Locate the picture that you want to insert.
4. Double-click the picture that you want to insert. Format tab of the Picture Tools will appear on the
ribbon at the same time the picture is inserted.

III. Accompanying DepEd Textbook and Educational Sites

Maria, Jose. 2016. Advance Word Processing Skills. May 23. Accessed October 12, 2019.
[Link]

Sernicul, Emmanuela. 2013. Advance Word Processing Skills. August 3. Accessed May 02, 2019.
[Link]

IV. Activity Proper

Activity 1: Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. Which is NOT one of the basic characteristics of life? What feature of Microsoft Word allows
you to efficiently create documents that have the same general content but may have different
recipients or purposes?
a. Mail Merge c. Send Merge
b. Print Merge d. View Merge

2. Which of the following is not a component of the mail merge?


a. Address b. Filename c. Main document d. Data Source

3. What are the steps in creating a simple mail merge?


a. Create form document, preview, insert place holders, print
b. Preview, insert place holders, create form document, print
c. Create the main document, create a data source, insert place holders, preview
d. Create data source, insert place holders, preview, print

4. Where can you find the Start Mail Merge button?


a. File Tab b. Mailings Tab c. Reference Tab d. Home Tab

5. What tells Microsoft Word exactly where to place the information coming from the data file to
the main document?
a. Data Source b. Insertion Line c. Place Holder d. Insertion Tag

6. The following are types of document you can create using mail merge, except
a. Envelopes b. Letters c. Posters d. Labels

7. What button allows you to see the result of your mail merge even before you print or send it
out?
a. Preview results b. Insert merge fields c. Address block d. Greeting line

8. What file contains the information you need to merge with your main document?

21
a. Address block b. Contact list c. Data file d. Directory

9. What essential component of mail merge is required from users when generating?
a. Data file b. Form document c. Place holder d. Merge field

10. It is an application that allows users to create, edit, and print documents
a. Data file b. MS Word c. Word Processor d. Merge field

Activity 2: Read the given scenario below and answer the following questions concisely on a
separate sheet of paper.

Scenario 1: You were tasked to create and send out formal invitations for a promo campaign that
a company is running. You were also initially given a list of ten names of loyal customers to send
out to.

1. From the scenario above, describe briefly how you would most likely complete the task of
sending ten invitations with individual names of recipients using Microsoft Word.
2. Give examples of documents that you can personalize and send or distribute.

Activity 3 – Answer the following on a separate sheet of paper:


1. What are some ways you can use to acquire images that can be inserted in a Word
document?
2. Describe the steps on how you can transfer your pictures to your computer using the MS Word
application.
3. Identify at least two other opportunities to create and distribute or send merged documents or
labels and make samples of each.

V. Reflection

On a separate sheet of paper, answer the following questions.

1. In what ways can this activity help you in using common productivity tools effectively like Mail
Merge by maximizing advanced application techniques?
__________________________________________________________________
_________________________________________________________________
_________________________________________________________________

2. What part of the activity did you find easy/difficult?


_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

3. How will your Teacher / Learning Facilitator help in improving your task?
_________________________________________________________________
_________________________________________________________________
________________________________________________________________

22
QUARTER 1 WEEK 5

EMPOWERMENT TECHNOLOGY ACTIVITY SHEET

Learning Activity Sheets (LAS) No. 5


Developing ICT Content for Specific Purposes

I. Learning Competency

B. Creates an original or derivative ICT content to effectively communicate or present data


or information (CS_ICT11/12-ICTPT-lc-d- 5)

II. Background Information for Learners Information and Communication Technology

1. Advanced Techniques using Microsoft Excel


2. Advanced Techniques using Microsoft PowerPoint

Advanced Techniques using Microsoft Excel


Spreadsheet

Spreadsheet It is a software application that enables a user to save, sort and manage data in
an arranged form of rows and columns

Microsoft Excel provides an automated way of displaying any statistical data. It can be used
to automatically compute several factors that are not easy to notice especially when faced with
large data. Microsoft Excel includes several arithmetic and basic functions that help you
compute faster.

Beyond arithmetic operations, spreadsheets provide invaluable tools such as functions that are very
useful in calculating data. As a result, spreadsheets have become one of the widely used software
programs, and MS Excel is the most commonly used spreadsheet tool. Spreadsheets can be used to
determine statistical analysis, compute student’s grades, keep track of business accounts and
inventories, and manage databases. Spreadsheets are made up of the following:

• Columns – identified with alphabetic headings


• Rows - identified with numeric headings

23
Cells – are the intersection of rows and column
• Cell Reference – also known as cell address that identifies a cell on a worksheet.
• Active Cell – the currently selected cell in a spreadsheet and is indicated by a bold outline that
surrounds the cell
• Text or labels – It identifies the purpose of a cell, it can be a brief instruction, a title or caption.
• Number data or constant – a value that doesn’t change and is directly inserted into a cell.
• Formula (mathematical equations) – an expression that calculates the value of a cell.
• Functions – These are pre-defined formulas that are already available in MS Excel.
• Mathematical Operators – MS Excel uses standard operators for formulas.

Basic Excel Formulas:


Addition (+)
Subtraction (-)
Multiplication (*)
Division (/)
*type <=> before the formula, thus: =a1+a2

• Average – a function used to compute for the average of the number of a range.
• COUNTIF – a function used to count the cells with a specified content within a range.
• SUMIF – a function used to compute for the summation of a range if a certain condition is met
• AVERAGEIF – a function used to compute for the average of a range if a certain condition is met

Advanced Techniques using Microsoft PowerPoint


Presentations

A presentation is a collection of data and information that is to be delivered to a specific


audience.

A PowerPoint presentation is a collection of electronic slides that can have text, pictures,
graphics, tables, sound and video. This collection can run automatically or can be controlled
by a presenter.

• HYPERLINKS - In PowerPoint Hyperlinks are similar to links you might have seen on a website. They
allow you to jump back and forth between specific slides in your presentation, to movie files that don't
work on PowerPoint slides, to other files, or to a webpage (if you are connected to the internet).

Using Hyperlinks in Microsoft PowerPoint:


1. Select an object or highlight a text.

24
2. Go to Insert > Hyperlinks (under links category) or use the shortcut key Ctrl + K.
The insert Hyperlink dialog box would appear.

Link to Options:
a. Existing File or Web Page – creates a hyperlink to a website or a local file saved in your hard
drive. Just browse your file in the dialog box or type the web address.
b. Place in This Document – creates a hyperlink that allows you to jump to a specific slide in your
presentation.
c. Create a New Document – creates a hyperlink that once clicked, creates a new document on your
specified location.
d. E-mail Address – creates a hyperlink that opens Microsoft Outlook that automatically adds your
specified recipient to a new email.

3. When done, click OK to apply your hyperlink.

Embedding Objects in Microsoft PowerPoint


Embedding objects is easy using PowerPoint Presentation. With this option, you can insert an
Excel file that would look like a table to a PowerPoint Presentation.

Embedding an Excel File to your PowerPoint Presentation


1. Go to the Insert tab.
2. On the Text group, click on Object.
3. The Insert Object dialog box would appear:

Once you are done, click OK.

25
III. Accompanying DepEd Textbook and Educational Sites

Chan, Rodrigo. 2016. "Advance Techniques Using Microsoft Powerpoint." In Empowerment


Technology, by Rodrigo Chan, 5-10. Quezon CIty: Innovative Training Works Inc.

Parmar, Jahnavee. 2017. Empowerment Technology. February 28. Accessed July 12, 2019.
[Link]
72626911?qid=747c8785-147c-46ed-a98d-10ca601f71b4&v=&b=&from_search=10.

Santiago, Plaridel. 2016. "Advance Techniques using Microsoft Excel." In Empowerment


Technology, by Plaridel Santiago, 3-10. Quezon City: Innovative Training Works Inc.

IV. Activity Proper

Activity 1: – ARRANGE ME! Directions: Arrange the scrambled letters to form the correct word or
words. Write your answer on a separate sheet.

1. FTIONSNCU ___________________________
2. CLEL RFEENCERE ___________________________
3. CNSOTTAN ___________________________
4. ORWKSETSHE ___________________________
5. EETDAEPRSHS ___________________________
6. EGRAEVA ___________________________
7. AURFLOM ___________________________
8. WKBROKOO ___________________________
9. ELLC AGENR ___________________________
10. TVEICA LELC ___________________________

Activity 2 – Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. Luke wants to include videos in his presentation. He wants to play those videos without going
out from his current presentation. Which of the following could be his best option?
a. Use a hyperlink to navigate those videos.
b. Use another computer in playing the videos.
c. Open the presentation and the videos to be played and then use Alt + Tab.
d. Embed those videos as an object in your slides.

2. Which of the following statements is NOT true about a linked object?


a. Linked object is stored in the source file.
b. Information in the destination file doesn't change if you modify the source file.
c. Information in the destination file is updated whenever the source file is modified.
d. The data in the destination file changes whenever the source file is modified.

3. Jethro was tasked to report a topic in one of his subjects. He wants to apply one of the
hyperlink options where he could jump to a specific slide in his presentation. Which of the
following hyperlink options will he use?
a. Create a New Document
b. Existing File or Web Page
c. Place in This Document
d. E-mail Address

4. The following are benefits of planning a presentation, except


a. improves the quality of presentation
b. saves time and effort
c. makes presentation slightly effective

26
d. makes a presentation more enjoyable
5. PowerPoint is best described as _______________.
a. Presentation Software c. Publishing Software
b. Drawing Software d. Database Software
6. A spreadsheet program used to organize and perform calculations on data.
a. MS Excel b. MS PowerPoint c. MS Publisher d. MS Word

7. A function that adds a range cells.


a. ADD b. SUM c. PLUS d. TOTAL

8. A function that gets the average of a range cells.


a. MEAN b. MEDIAN c. SUM d. AVERAGE

9. Which among the following is not part of the syntax for AVERAGEIF?
a. Average Range b. Range c. Logical Test d. Criteria

10. A function used to add a certain range of cells if a condition is met.


a. SUMIF b. ADDIF c. TOTALIF d. PLUSIF

Activity 3 – Explain Briefly: Answer the following questions and write your answer on a separate
sheet ofpaper. (5pts. Each)

1. What is the importance of using Microsoft Excel?


2. How does Excel interpret data?
3. In your perspective as a student, how important is Microsoft PowerPoint?
4. What are the benefits of using PowerPoint as a tool in the classroom?

V. Reflection

1. In what ways can this activity help you in creating an original or derivative ICT content to
effectively communicate or present data or information?
2. What part of the activity did you find easy/difficult?
3. How will your Teacher / Learning Facilitator help in improving your task?

27

You might also like