0% found this document useful (0 votes)
23 views34 pages

Table of Contents

Ahoho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views34 pages

Table of Contents

Ahoho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

TABLE OF CONTENTS

1st Quarter

Introduction to ICT………………………………………………………………….4-8

 World wide web (WWW)……………………………………………...…….5


 Web 1.0 & Web 2.0…………………………………………………………..6
 Technology…………………………………………………………………...7
 ICT in the philippines………………………………………………………...8

Trends in ICT…………………………………………………………………….…9-12

 Convergence………………………………………………………………….10
 Social media……………………………………………………………….....11
 Mobile technologies………………………………...………………………..12

Rules of netiquette…………………………………………………………………13-15

 Tips to stay safe online………………….………………………………...…14


 Internet threats……………………………………………………………….15

2nd Quarter

Parts of the computer……………………………………………………………….16-19

 Basic components…………………………………………………………....17
 Internal components…………………………………………………………18
 Hardware and software………………………………………………………19

Word processor……………………………………………………………………..20-26

 Parts and fuction of word processor……………………...………………….21


 Advance word processing skill………………………………………………22

_______________________________________________ii____________________________________________________
 Simple steps in creating a simple mail merge…………………………..23-26
Microsoft excel………………………………………………………………….27-31
 Parts and function of microsoft excel…………………………………...28-31
Creating an effective presentation………………………………………………32-33
 Tips in creating an effective presentation………………………………...33

___________________________________________________iii_________________________________________________
WORLD WIDE WEB
The World Wide Web (WWW) is a network of online content that is formatted in HTML and
accessed via HTTP. The term refers to all the interlinked HTML pages that can be accessed over
the Internet. The World Wide Web was originally designed in 1991 by Tim Berners-Lee while
he was a contractor at CERN.

Sir Tim Berners-Lee is a British computer scientist. He was born in London, and his parents
were early computer scientists, working on one of the earliest computers.

Tim’s original proposal

 WWW is an information system on the internet


 It contains website and webpages

Techopedia explains World Wide Web (WWW) The World Wide Web is what most people think of
as the Internet. It is all the Web pages, pictures, videos and other online content that can be accessed
via a Web browser. The Internet, in contrast, is the underlying network connection that allows us to
send email and access the World Wide Web.

The World Wide Web is another way to describe the Internet, which is a network of computers which
are connected and that share information and allow communication around the world.

_________________________________________________5____________________________________________________
WEB 1.0
Web 1.0 refers to the first stage in the World Wide Web, which was entirely made up of web pages
connected by hyperlinks. Although the exact definition of Web 1.0 is a source of debate, it is generally
believed to refer to the web when it was a set of static websites that were not yet providing interactive
content. In Web 1.0, applications were also generally proprietary. Exactly where Web 1.0 ends and
Web 2.0 begins cannot be determined as this a change that happened gradually over time as the
internet became more interactive. On web 1.0 webpages were static.

Web 1.0

WEB 2.0
Web 2.0 is the name used to the describe the second generation of the world wide web, where it
moved static HTML pages to a more interactive and dynamic web experience. Web 2.0 is focused on
the ability for people to collaborate and share information online via social media, blogging and Web-
based communities. Web 2.0 was first used around 2004

Web 2.0

___________________________________________________6__________________________________________________
TECHNOLOGY
 The current state of ICT
 ICT means information and communication technology. It is an extended term of
information technology (IT)

ICT refers to technologies that provide access to information through telecommunications. It is


similar to Information Technology (IT), but focuses primarily on communication technologies.
This includes the Internet, wireless networks, cell phones, and other communication mediums.

There are 6 components to an ICT system


Data: raw facts and figures.
Hardware: physical components.
Software: the name given to computer programs.
Information: data that is converted to give it a meaning.
Procedures: a series of actions conducted in a certain order to make sure the system runs
smoothly.
People: data is entered by humans, for example a keyboard.

Components of ICT

__________________________________________________7___________________________________________________
ICT in the Philippines
 ICT hub of asia
 According by the international telecommunication union, 106.8 cellphones per 100 filipinos in
the year 2012
 According to time magazine “the selfiest cities around the world” of 2013 places two cities
from the philippines in the top 1 and 10 spots.
Trends for the Philippines’ Information and Communications Technology (ICT) for 2019 and
Beyond

Workspace 360 - By 2019, the rise of digital natives and the influence of digital-native mindset
on enterprises will push novel workspace trends. It is a result of increased mobile access to the
internet, which results in increased demand for work not limited by location and with openness to
collaborations. As an example, Yondu’s office space, which was given a new look last September
2017, follows this rising trend to better show the digital-native mindset it has.

DX in the BPO Industry - By 2019, as digital transformation shakes up the BPO market
dynamics, BPO providers that align their DX plans with the changes in the industry will gain
competitive edge in the market. Because the outsourcing industry is now being threatened by the
rise of artificial intelligence, which may take over 40k to 50k “low-skilled” or process-driven jobs,
it should now move to higher-level skills and higher value-added services such as big data
analytics, app development, and related fields.

Future of Payments - By 2019, the country will continue to witness creative and Philippine-
centric payment and remittance innovations, driven by the country’s unbanked sector and the
ongoing rise of remittances from overseas Filipino workers (OFWs).

Digital Economy Tipping Point - In the next 12-36 months, enterprises are headed to a
different higher level of maturity when it comes to DX adoption. In the same manner, clearer digital
vision for the country should be seen, as the government barrels up its ICT initiatives. The
country’s ICT development has been showing significant progress from both the public and private
sector domains. The combined efforts of these two stakeholders will usher a period of rapid and
robust technology adoption

_________________________________________________8____________________________________________________
Lesson 1.1:

INTRODUCTION TO ICT
Lesson 1.2:

TRENDS IN ICT
CONVERGENCE - What is Convergence? Convergence refers to the fusing or
coming together to gradually form something similar. “Convergence is a process by which
telecommunications, information technology and the media, sectors that originally operated
largely independent of one another, are growing together.” (Papadakis, 2007). Since the 1980s,
there have been numerous innovative convergences of heterogeneous technologies to create new
products and services, and even new technologies. (Lee, Olsen and Trimi 2010). There are various
types of convergence taking place in the ITC world. Synergies amalgamations and harmonising of
the various types and varieties of convergence is cause change to world we know.

 TECHNOLOGICAL CONVERGENCE – is a synergy of technological


advancement to work on a similar goal or task.
 CONVERGENCE – is using several technologies to accomplish a task conviniently.

5 ELEMENTS OF TECHNOLOGICAL CONVERGENCE

 Technology
 Media and content
 Software and services
 Robot and machines
 Virtual reality

The Impact Of Technology Convergence

_________________________________________________10___________________________________________________
SOCIAL MEDIA – It is a website, application or online channels enables web users to
create, co-create, discuss, modify, and exchange user-generated content. According to Nielsen, a
global information and measurement company, internet users spend more time in social media
sites than any other tipe of site.

6 TYPES OF SOCIAL MEDIA

 SOCIAL NETWORK – This are sites that allows you to connect


with other people with same interest or background

 BOOKMARKING SITES – Sites that allows you to store and


manage links to the various website and resources.

 SOCIAL NEWS – Sites that allow users to post their own news
items or links to other news sources.

 MEDIA SHARING – Sites that allow you to upload share media


content like image, music and videos.

 MICRO BLOGGING – Sites that focus on short update


from the user.

 BLOGS AND FORUMS – Website that allows user to post


their content other users are able to comment to said topic.

___________________________________________________11_________________________________________________
MOBILE TECHNOLOGIES - Mobile technology is a form of technology that
is mostly used in cellular communication and other related aspects. It uses a form of platform
where by many transmitters have the ability to send data at the same time on a single channel.

 IOS – Usedon apple devices such as the iphone and ipad.

 ANDROID – An open source operating system developed by google.

 BLACK BERRY OS – Used in blackberry devices.

 WINDOWS PHONE OS – A closed source and proprietary


operating system developed by microsoft.

 SYMBIAN – The original smartphones os; used by nokia


devices.

 WEBOS – Originally used for smartphones; now used


for smart TV’s.

__________________________________________________12__________________________________________________
LESSON 1.3:

RULES OF NETIQUETTE
WHAT IS NETIQUETTE - Netiquette is short for "Internet etiquette." Just like
etiquette is a code of polite behavior in society, netiquette is a code of good behavior on the Internet.
This includes several aspects of the Internet, such as email, social media, online chat, web forums,
website comments, multiplayer gaming, and other types of online communication.

ONLINE SAFETY AND SECURITY


 First name  Your address
 Last name  Current and Previous School(s)
 Middle name  Your cellphone number
 The name of your mother and father  Your home phone number
 The name of your siblings  Your birthday

TIPS TO STAY SAFE ONLINE


1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and condition; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/WI-FI.
7. Never post anything about a future vacation.
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer.
11. If you have a WI-FI at home, make it private network by adding password.
12. Avoid downloading anything from untrusted websites.
13. Buy the software; do not use pirate ones.
14. Do not reply or click links from suspicious emails.

__________________________________________________14__________________________________________________
INTERNET THREATS - Cyber threats have existed since 1975 when Steve Jobs and
Steve Wozniak invented the first personal computer, the Apple I. With the advent of personal
computers came problems with hackers, people who want to gain unauthorized access to your personal
information either for profit or to perform mischievous acts. A cyber threat is deemed any malicious
act that attempts to gain access to a computer network without authorization or permission from the
owners.

DIFFERENT TYPES OF THREATS


1. Malware – stands for malicious software.

a. Virus – a malicious program designed to replicate itself and transfer from one computer to
antother.

b. Worm – a malicious program that transfer from one computer to another by any type of mean.
Often, it uses a computer network to spread itself.

c. Trojan – a malicious program that is disguised as a useful program but once downloaded or
installed.

* Rogue Security Software – tricks the user into posting that it is a security software.

d. Spyware – a program that runs in background without you knowing it. It has the ability to
monitor what are the currently doing and typing through keylogging.

2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.

3. Phishing – it’s goal is to acquire sensitive personal information like passwords and credit cards
details.

* Pharming – a more complicated way of phishing where its exploits the DNS.

_________________________________________________15___________________________________________________
LESSON 2.1

PARTS OF COMPUTER
BASIC COMPONENTS - A typical computer system consists of a computer case, a
power supply unit, a motherboard, a central processing unit (CPU), main memory, and a hard disk
drive. Input devices include a keyboard, mouse, microphone, video camera, and image scanner.
Output devices include a monitor, speakers, and a printer.

1. CASE OR TOWER – it is a plastic box that contains the


computer. Housed in the case, you will find the floppy drive, CD
ROM drive, and the main components of the computer

2. MONITOR OR SCREEN – this is the TV type screen on which


you see the work you’re doing.

3. MOUSE – it allows you to move, select and click on


objects.

4. SPEAKERS – sometimes speakers are connected to the computer so


that you can hear music and sound.

5. MICROPHONE - a microphone can provide a way to talk


through or to the computer.

6. PRINTER – a device that makes a printed copy of your work on a


sheet of paper.

__________________________________________________17__________________________________________________
INTERNAL COMPONENTS - Internal is a term used to describe a device that
is installed in the computer. For example, a video card is an internal device and a printer is an
external device. In the picture is an example of computer memory and an example of internal
hardware. Below are additional examples of internal hardware in a computer.

1. CPU (CENTRAL PROCESSING UNIT) – it is the brain of the computer.

2. MEMORY

- RAM (RAMDON ACCESS MEMORY) - stores programs and data as it is used. The
information in RAM is lost when the power is turned off.
-ROM (READ ONLY MEMORY) – stores start up and basic operating information.

3. DISK

-FLOPPY DISK – information can be written to and read from floppy disk.
-HARD DISK – hard disks are not removable like floppy disk, but hold more information.
–CD ROM’s (COMPACT DISK READ ONLY MEMORY) – they are useful for storing large
amounts of data.

INPUT AND OUTPUT DEVICES


10 EXAMPLES OF INPUT 10 EXAMPLES OF OUTPUT
1. Keyboard 1. Monitor (LED, LCD, CRT etc)
2. Mouse 2. Printers (all types)
3. Light pen 3. Plotters
4. Optical/Magnetic scanner 4. Projector
5. Touchscreen 5. LCD Projection Panels
6. Microphone 6. Computer Output Microfilm (COM)
7. Speaker(s) 7. Trackball
8. Head Phone 8. Joystick
9. Visual Display Unit 9. Camera
10. Film Recorder 10. Web Cam

_________________________________________________18________________
__________________________________________________
HARDWARE AND SOFTWARE – Computer hardware is any physical
device used in or with your machine, whereas software is a collection of code installed onto your
computer's hard drive. For example, the computer monitor you are using to read this text and the
mouse you are using to navigate this web page are computer hardware.

HARDWARE
-Hardware is any part of a computer system you can see or touch
PERIPHERAL
 A peripheral is any piece of hardware attached to a computer.

SOFTWARE
-Software is a set of electronic instructions that tell a computer what to do. You cannot see or
touch software, but you can see and touch the packaging the software comes in.

2 TYPES OF SOFTWARE
 Application software - Application software is a term which is used for software created
for a specific purpose. It is generally a program or collection of programs used by end users. It
can be called an application or simply an app. In fact all the software other than system software
and programming software are application software.

 Operating system software - Operating systems use device drivers written by hardware
creators to communicate with their devices. Operating systems also include a lot of software—
things like common system services, libraries, and application programming interfaces (APIs)
that developers can use to write programs that run on the operating system.

_________________________________________________19___________________________________________________
LESSON 2.2

WORD PROCESSOR
PARTS AND FUNCTION OF WORD PROCESSOR

QUICK ACCESS TOOL BAR – is a customizable toolbar that contains a set of


commands that are independent of the tab on the ribbon that is currently displayed.
TITLE BAR – a horizontal bar at the top of a window, bearing the name of the program and
typically the name of the currentlyactive document.
FILE MENU – in an application is used to open, save and close a document or image. Also
used to print the contents of the current open document or image, as well as to exit the
program.
DOCUMENT WINDOW – is a section of the screen used to display the contents of a
document file on a GUI (graphical user interface) operating system.
INSERTION POINT – is the blinking vertical lime in your document. It indicates where
you can enter text on the page.
RULER – is a measurement tool found with some software programs that allow the program’s
user to align graphics, text, tables, or other elements on a page.
STATUS BAR – is the area at the buttom of the word window that indicates information
about the current document. It displays information about what page you are on, as well as
your line number on the page and character number on the line.
RIBBON – is a graphical control element in the form of a set of toolbars placed on several
tabs.
VERTICAL & HORIZONTAL SCROLL BAR – commonly located on the far right
or buttom of the window that allows you to move the window viewing area up, down, left, or
right.
ZOOM CONTROL – is a slider that helps you to zoom in and out the timeline so that you
can focus on areas of particular interest.

__________________________________________________21__________________________________________________
ADVANCED WORD PROCESSING SKILLS
SCENARIO – you were tasked to create and send out the formal invitations for a promo
campaign that a company is running. You were also initially given a list of ten names of loyal
customers to send out to.
MAIL MERGE – this feature allows you to create documents and combine or merge them
with another document or data file.

TWO COMPONENTS OF MAIL MERGE


FORM DOCUMENT – it is the generally the document that contains the main body of the
message we want to convey or send.

Example of form document

LIST OR DATA FILE – this is where the individual information or data that needs to be
plugged in (merged) to the form document is placed and maintained.

Example of list or data file

_________________________________________________22___________________________________________________
SIMPLE STEPS IN CREATING A SIMPLE MAIL
MERGE
1. Select “MAILINGS” tab.

- under mailings tab, Select “START MAIL MERGE”.

2. Select “ STEP BY STEP MAIL MERGE WIZARD”.

3. Select “ DOCUMENT TYPE”.

- choose LETTERS, and Click “ STARTING DOCUMENTS”.

__________________________________________________23__________________________________________________
4.Choose “ USE THE CURRENT DOCUMENTS” ,

and click “ SELECT RECIPIENTS”.

5. Select “TYPE A NEW LIST”.

- Click “ CREATE”

________________________________________________________24_____________________________________________________
6. Type recipient information in the table. To add more entries, click New Entry. Then click
“OK”.

7. Click “WRITES YOUR LETTER”.

8. Select “ADDRESS BLOCK”.

9. Select “GREETING LINE”

________________________________________________25____________________________________________________
10. Click “ PREVIEW YOUR LETTER”

11. Click “COMPLETE YOUR LETTER”

_________________________________________________26___________________________________________________
LESSON 2.3

MICROSOFT EXCEL
MICROSOFT EXCEL - Microsoft Excel is the spreadsheet component of the
Microsoft Office Suite. It is used primarily to enter, edit, format, sort, perform mathematical
computations, save, retrieve and print numeric data.

TITLE BAR - It displays the names of the open program (in this case Microsoft Excel) and the
name of the current file. This file has not yet been saved so its name is Book2. Files created in
Microsoft Excel are often referred to as spreadsheets or workbooks and have the file extension
.xls or .xlsx

MINIMIZE, MIXIMIZE/RESTORE AND CLOSE AND CLOSE – buttons for the program
window.

MINIMIZE BUTTON - When you click the minimize button the program becomes a button on
the Windows taskbar located at the bottom of the screen.

You can restore the document to its original shape and size by either: Clicking on the button on
the task bar one time to restore it to active mode

If you have multiple files from the same program open you will need to select the one you want
to restore to active mode.

MINIMIZE/MAXIMIZE BUTTON - When you click the maximize / restore button the
program assumes the same shape and size it was before you minimized it. Or The program
window will fill the screen.

_________________________________________________28___________________________________________________
CLOSE BUTTON - When you click the close button the program will ask you if you want to
save the changes if you have made any changes. Once you have responded to this question the
program will close.

QUICK ACCESS TOOLBAR - It contains the most commonly used commands in Microsoft
Excel:

1. Save 2. Undo 3. Repeat

RIBBON - Microsoft Office 2007 & 2010 use what is referred to as the “Ribbon” interface. The
ribbons we are going to go over today are the default ribbons.

TABS - Each Tab has several Groups attached to it.

FILE TAB - The File Tab menu contains the commands most commonly associated with the
file.

_________________________________________________29___________________________________________________
HOME TAB - The Home Tab Groups contain the commands most commonly associated with
the formatting and editing of cells and their contents.

Clipboard, Font, Alignment, Number, Styles, Cells, Editing.

INSERT TAB - The Insert Tab Groups contain the commands most commonly associated with
adding something to the document.

Tables, Illustration, Charts, Sparklines, Filter, Links, Text, Symbols

PAGE LAYOUT - The Page Layout Groups contain the commands most commonly associated
with settings that would affect the entire page or worksheet.

Themes, Page setup, Page background, Paragraph, Arrange.

FORMULA - The Formulas Groups contain the commands most commonly associated with
Excel’s formulas and functions.

Function library, Defined names, Formula auditing, Calculation.

__________________________________________________30__________________________________________________
DATA TAB - The Data Tab groups contain the commands most commonly associated with data
from external sources, and evaluating or arranging data.

Get external data, Connection, Sort & filter, Data tools, Outline.

REVIEW TAB - The Review Tabs groups contain the commands most commonly associated
with the text portions of a spreadsheet and sharing changes.

Proofing, Language, Comments, Changes.

VIEW TAB - The View Tab groups contain the commands most commonly associated with the
variety of ways you can “look at” a worksheet or workbook.

Workbook views, Show, Zoom, Window, Macros

__________________________________________________31__________________________________________________
LESSON 2.4

CREATING AN EFFECTIVE
PRESENTATION
WHAT IS A POWERPOINT PRESENTATION? - is a
presentation created using by Microsoft PowerPoint software. The presentation is a collection
of individual slides that contains information on a topic.

WHAT IS THE USE OF MICROSOFT POWERPOINT? -


PowerPoint is a computer program that allows you to create and show slides to support a
presentation.

TIPS IN CREATING AN EFFECTIVE PRESENTATION


MINIMIZE - Keep slide counts to a minimum to maintain a clear message and to keep the
audience attentive.

CLARITY - Avoid being fancy by using font style that is easy to read. TIPs : A font size of 72
is about an inch ( depends on the screen size ). One – inch letter is readable 10 feet away; two
– inch letter is readable 20 feet away.

SIMPLICITY - Use bullets or short sentences. Summarize the information on the screen. Limit
the content to six lines and seven words per line. This is known as the 6 x 7 rule.

VISUALS - Use graphics to help in your presentation but not too many to distract the audience.

CONSISTENCY - Make your design uniform. Avoid having different font styles and
backgrounds.

CONTRAST - Use light font on dark background or vice versa.

__________________________________________________33__________________________________________________
EMPOWERMENT
TECHNOLOGIES
PORTFOLIO

NAME: Mia Antonette Dagdagan

Jowillyne Cayetano

11-WALKER

You might also like