0% found this document useful (0 votes)
117 views57 pages

ATS 5 EM Tech

The document provides information on the ATS 5 Empowerment Technologies learning module at Immaculate Heart of Mary Academy for the 2021-2022 school year. It outlines the course description, goals, values and 15 topics to be covered including introduction to ICT, online safety, productivity tools, multimedia tools, and using ICT for social change. The module is designed to provide students with 21st century skills and competencies through 80 hours of classes aligned with Department of Education standards. Assessment will be based 40% on written works and 60% on performance tasks for academic tracks, and 30%/70% for technical/vocational tracks.

Uploaded by

kienna 17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views57 pages

ATS 5 EM Tech

The document provides information on the ATS 5 Empowerment Technologies learning module at Immaculate Heart of Mary Academy for the 2021-2022 school year. It outlines the course description, goals, values and 15 topics to be covered including introduction to ICT, online safety, productivity tools, multimedia tools, and using ICT for social change. The module is designed to provide students with 21st century skills and competencies through 80 hours of classes aligned with Department of Education standards. Assessment will be based 40% on written works and 60% on performance tasks for academic tracks, and 30%/70% for technical/vocational tracks.

Uploaded by

kienna 17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 57

LEARNING MODULE IN ATS 5 S.Y.

2021-2022
EMPOWERMENT TECHNOLOGIES

AVCPS PHILOSOPHY of EDUCATION

Every man and woman are endowed with the dignity of a person, thus, he or
she has inalienable right to education. The Church has an obligation to provide an
education for her children by which their whole lives may be inspired by the spirit of
Christ. A Catholic school is not just an environment for providing a series of lessons; it
operates out of an educational philosophy, which aims to meet the needs of the young
people of today in light of the Church’s faith in Jesus Christ.

It is the religious dimension that makes the Catholic school distinctive. This
religious dimension can be found in (a) the context in which education is delivered, (b)
the means by which the personal development of each student is achieved, (c) the
relationship established between culture and the faith of the Church in the message of
Christ, (d) the fact that all knowledge is informed by and derives its ultimate meaning
from the faith within whose context it is pursued.

It is very important to realize that the Catholic identity of our schools is not
exclusively related to religious instruction and the integration of academic studies into
a unified whole. The Catholic school has a single Christian vision, an integrated
concept of what makes a fully authentic and mature human being. The educational
process is not confined to the curriculum nor to the academic, technical, artistic and
sporting achievements of the school.

The Catholic school should be seen as offering the possibility not only of
exploring the mystery which God is, but also of demonstrating the Gospel in action. It
must be consistent throughout and in every aspect reflect the Christian faith, which is
its soul, its inspiration, and its justification.

VISION 1
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

A Marian educational institution committed to a holistic educational


experience enabling and inspiring students to lead lives of choice, purpose, and
service.

MISSION
To create and maintain a student-centered learning environment where
teaching and learning are purpose-driven and students are assisted towards the
development of personal and social responsibility.

GOALS
1. Ensure that every student is valued for their individuality and
diversity.
2. Provide set of spiritual and moral values as honesty, integrity and good
judgment.
3. Deliver and enquiring and discriminating mind desiring for knowledge
and wisdom.
4. Develop student’s full potential in a stimulating and caring
environment for learning.
5. Advance the moral and spiritual well-being of the students based on
Marian values.

CORE VALUES
D’ Discipline
M Magnanimity
A Attentiveness
R Responsiveness
I Integrity
A Altruism
N Nationalism

Course Title: EMPOWERMENT TECHNOLOGIES


2
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Course Code: ATS 5

Course Description:
Empowerment Technologies is a specialized module designed to provide
students with the foundation of knowledge and skill needed to succeed in
environments that require the use of computer and the Internet. It covers topics for
building essential 21st century skills in working and creating contents online.

This discipline will aid in teaching competencies that are essential in the
Information Age, such as the state of the ICT technologies; online safety, security,
ethics and etiquette; productivity tools with advanced application techniques;
imaging and designing for online environment, multimedia tools; and powerful
tools to create a social change, which are aligned to the standards set by the
Department of Education for the senior high school level.

Course Outline:
I Introduction to Information and Communication Technologies
II Rules of Netiquette
III Advanced Word Processing Skills
IV Advanced Spreadsheet Skills
V Advanced Presentation Skills
VI Imaging and Design for Online Environment
VII Online Platforms for ICT Content Development
VIII Basic Web Page Creation
IX Collaborative ICT Development
X Interactive Multimedia
XI ICT as Platform for Change
XII ICT Project for Social Change
XIII ICT Project Publication and Statistics
XIV ICT Project Maintenance
XV The Disadvantages of ICT

Total Number of Meetings: 80 hours / semester

WEIGHT DISTRIBUTION OF THE SUMMATIVE ASSEEMENT


COMPONENTS FOR SENIOR HIGH SCHOOL
3
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Technical/ Vocational and


Academic Track Livelihood (TVL)/ Sports/
Assessment Core Arts and Design Tracks
All Work Immersion / All Work Immersion /
Components Subjects Other Research/ Business Other Research/ Exhibit/
Subjects Enterprise Simulation/ Subject Performance
Exhibit/ Performance s
Written Works 40% 40% 50% 30%
Performance
Taskss
60% 60% 50% 70%

In the name of the Father, and of the Son,


and of the Holy Spirit, Amen

Lord, true source and giver of light and wisdom,


Grant me discernment, understanding,
And wisdom in learning.
Shine also in my mind, the light of the grace of the Holy Spirit
Give me a keen sense of understanding,
A retentive memory, A capacity to grasp things correctly,
And a skill to express myself with thoroughness and clarity,
Be with me at the start of my work.
Guide its progress and bring it to completion
Grant this through Christ, our Lord, Amen.

In the name of the Father, and of the Son,


and of the Holy Spirit, Amen

LESSON ICT: The Current State of ICT


1
4
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Content Standard: Performance Standard:

The learner will demonstrate The learners should be able to


understanding of ICT in the context of independently compose an insightful
global communication for specific reflection paper on the nature of ICT in
professional track. the context of their lives, society and
professional tracks.

Formation Standard:

The learner will use and know more about ICT and use it anchored with Marian
values.

Most Essential Learning Competency:


 Compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational
challenges

Time frame: 1 week

Learning Targets:
1. Improve their knowledge on how ICT affects their everyday lives and the
state of our nation;
2. Compare and contrast the differences between online platforms, sites,
and content;
3. Understand the features of Web 2.0;
4. Understand the future of the World Wide Web through Web 3.0; and
5. Learn the different trends in ICT and use them to their advantage.

LET’S BEGIN!!!

How many time have you checked your phone this morning?
How many status update have you posted in Facebook or Twitter5 today
Did you use the internet for an hour after you woke up this morning?
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Do you follow a celebrity via
Madrid Blvd., Pinamalayan, Oriental Mindoro his/her Social Media Account?
Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

If you happen to be “guilty at charge” in most of these questions, chances


are, you are a DIGITAL NATIVE. And chances are, from the moment you were
born, you were surrounded by technology. You are surrounded by ICT.

LECTURE 1

6
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

UNDERSTANDING INFORMATION AND COMMUNICATIONS


TECHNOLOGY

Information and Communication Technology (ICT) deals with the


use of different communication technologies such as mobile phones,
telephone, Internet, etc. to locate, save, send and edit information.

When we make a video call, we use the Internet. When we send a


text or make a call, we use cellular networks. When we run out of load or
battery, we use payphones which use a telephone network. Having a
unified way to communicate is one of the goals of ICT. In terms of
economics, ICT has saved companies a lot of resources (time and money)
with the kind of technology they use, nowadays. In a similar way, we spend
less because of ICT. As it normally costs us a peso to send a text message or
SMS, with the Internet, we can send multiple messages and only be charged
by a fraction.

Do You Know That:


Several international companies dubbed Philippines as the “ICT Hub of Asia.”
It is no secret that there is a huge growth of ICT-related jobs around the country, one
of which is the call center or BPO ( Business Process Outsourcing) Centers.

According to 2013 edition of Measuring the Information Society by the


International Telecommunication Union, there are 106.8 cellular phones per 100
Filipinos in the year 2012. That would mean that for every 100 Filipinos you meet,
there is a high chance that they have a cellular phone and approximately for the seven
(7) of them, they have two.

According to Time Magazine, “The Selfiest Cities around the World” of 2013
places two cities from the Philippines in the top 1 and top 10.

LECTURE 2
7
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Tim Berners-Lee created


WEB 1.0, 2.0 and 3.0
the Internet
WEB 1.0 (Static Web)

When the World Wide Web was invented, most web pages were static.
Static (also known as flat page or stationary page) in the sense that the page is “as
is” and cannot be manipulated by the user. The content is also the same for all
users. This is referred to as Web 1.0.

WEB 2.0 (Dynamic Web)

Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the
user is able to see a website differently than others. Examples of Web 2.0 include
social networking sites, blogs, wikis, video sharing sites, hosted services, and web
applications.

Web 2.0 allows users to interact with the page: instead of just reading a
page, the user may be able to comment or create a user account. Web 2.0 also
allows users to use web browsers instead of just using their operating system.
Browsers can now be used for their user interface, application software (or web
applications), and even for file storage.

LECTURE 3

FEATURES OF WEB 2.0

1. Folksonomy. It allows users to categorize and classify/arrange


information using freely chosen keywords (e.g., tagging). Popular social
networking sites such as Twitter, Instagram, Facebook, etc. use tags that
start with the pound sign (#). This is also referred to as hashtag.

2. Rich User Experience. Content is dynamic and is responsive to user’s


input. An example would be a website that shows local content. In the case
8
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

of social networking sites, when logged on, your account is used to modify
what you see in their website.

3. Long Tail. Services are offered on demand rather than on a one-time


purchase. In certain cases, time-based pricing is better than file-size-based
pricing or vice versa. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spent in the Internet, or a data plan
that charges you for the amount of bandwidth you used.

4. User Participation. The owner of the website is not the only one who is
able to put content. Others are able to place a content of their own by
means of comment, reviews, and evaluation. Some websites allow readers
to comment on an article, participate in a poll, or review a specific product
(e.g., Amazon.com, online stores).

5. Software as a Service. Users will subscribe to a software only when


needed rather than purchasing them. This is a cheaper option if you do not
always need to use a software. For instance, Google Docs is a free web-
based application that allows the user to create and edit word processing
and spreadsheet documents online. When you need a software, like a Word
Processor, you can purchase it for a one-time huge amount and install it in
your computer and it is yours forever. Software as a service allows you to
“rent” a software for a minimal fee.

6. Mass Participation. It is a diverse information sharing through universal


web access. Since most users can use the Internet, Web 2.0’s content is
based on people from various cultures.

LECTURE 4

Web 3.0 and the Semantic Web


9
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

The Semantic Web is a movement led by the World Wide Web Consortium
(W3C).
The W3C standard encourages web developers to include semantic content
in their web pages.

According to the W3C, “The Semantic Web provides a common framework


that allows data to be shared and reused across application, enterprise, and
community boundaries.”

The aim of Web 3.0 is to have machines (or servers) understand the user’s
preferences to be able to deliver web content specifically targeting the user. For
example, if you search the Internet for “Where is the best place to go shopping?”
WEB 3.0 will aim to give you results depending on how you have made choices in
the past. If you have purchased several shoes online, the Internet will give you
results on the best place with the highest rated shoes around your vicinity.

Several problems of Web 3.0

1. Compatibility
HTML files and current web browsers could not support Web 3.0.

2. Security
The user’s security is also in question since the machine is saving his
or her preferences.

3. Vastness
The World Wide Web already contains billions of web pages.

4. Vagueness
Certain words are imprecise. The words “old” and “small” would
depend on the user.

5. Logic
Since machines use logic, there are certain limitations for a
computer to be able to predict what the user is referring to at a given
time
10
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

LECTURE 5

TRENDS IN ICT

1. CONVERGENCE
Technological convergence is the synergy of technological advancements to
work on a similar goal or task.

2. SOCIAL MEDIA
Social media is a website, application, or online channels that enable web
users to create, co-create, discuss, modify, and exchange user-generated
content.

SIX TYPES OF SOCIAL MEDIA:

a. Social Networks. These are sites that allow you to connect with other
people with the same interests or background. Example: Facebook and
Google+

b. Bookmarking Sites. These are sites that allow you to store and manage
links to various websites and resources. Example: StumbleUpon and
Pinterest

c. Social News. These are sites that allow users to post their own news
items or links to other news sources. Example: Reddit and Digg

d. Media Sharing. These are sites that allow you to upload and share
media content like images, music, and video. Example: Flicker, Youtube
and Instagram

e. Microblogging. These are sites that focus on short updates from the
user. Example: Twitter & Plurk

11
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

f. Blogs and Forums. These websites allow users to post their content.
Example: Blogger, WordPress and Tumblr

3. MOBILE TECHNOLOGIES
The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices’ capability to do tasks that were
originally found in personal computers.

KINDS OF OPERATING SYSTEMS:

a. iOS d. Windows Phone OS


b. Android e. WebOS
c. Blackberry OS f. Windows Mobile

4. ASSISTIVE MEDIA
Assistive media is a nonprofit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to
read to the user.

5. CLOUD COMPUTING
This is distributed computing on internet or delivery of computing service
over the internet. Instead of running an e-mail program on your computer,
you log in to a Web or e-mail account remotely. The software and storage
for your account doesn’t exist on your computer – it’s on the service’s
computer cloud.

TYPES OF CLOUDS

1. PUBLIC CLOUD allows systems and services to be easily accessible to


the general public. Public cloud may be less secured because of its
openness, e.g. e-mail
12
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

2. PRIVATE CLOUD allows systems and services to be accessible within


an organization. It offers increased security because of its private
nature.
3. COMMUNITY CLOUD allows systems and services to be accessible by
group of organizations.
4. HYBRID CLOUD is a mixture of public and private cloud. However,
the critical activities are performed using private cloud while the non-
critical activities are performed using public cloud.

LESSON ONLINE SAFETY, SECURITY AND RULES OF


2 NETIQUETTE

Formation Standard
The learner will be able to use social networking sites responsibly.

Most Essential Learning Competencies:


 Apply online safety, security, ethics, and etiquette standards and practice in
the use of ICT as it would relate to their specific professional tracks
 Uses the internet as a tool for credible research and information gathering
the best achieve specific class objectives and address situational

Time frame: 1 week

Learning Targets:
1. Consider one’s and others’ safety when sharing information using the
Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper referencing.
LET’S BEGIN!!!

Most of us use the Internet everyday. Sometimes,


attention on how much information we share onl
questionnaire about how much information you h
far. Put check (/) under SHARED or NOT 13 SHARE
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

HOW SAFE ARE YOU?

Type of information Shared Not Shared


1. First Name
2. Last Name
3. Middle Name
4. Current and Previous School
5. Your Cellphone Number
6. The Name of your Mother
and Father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday

How many checks did you have shared? Try using a search engine
like Google then type your first and last name. Did you get links to your
profile page? Did your pictures appear?
So how did this happen? How can search engines locate me? Is there
any danger of being found by search engines?
LECTURE 1

ONLINE SAFETY AND SECURITY

The Internet, truly, is a powerful tool. It can be used to promote your


business, gain new friends, and stay in touch with the old ones. It is also a
source of entertainment. But like most things in this world, there is always
14
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

“another side of the coin.” The Internet is one of the most dangerous places,
especially if you do not know what you are doing with it.

Let’s go back to the “How Safe Are You?” test. Let us visit each item and
see how risky it is to share them.

Types of Risks
Information
First Name There is a risk in sharing your first name. Chances are
hacker may already know plenty of stuff about you even if
you only give out your first name.
Last Name If sharing your FIRST name is a small risk, having both of
your first and last is more risky, You will be vulnerable to
being search for using search engines, which include image
search. Matching a name with face is a modus to several
cybercrimes like identity theft
Middle Name Sharing your MIDDLE name alone is probably not the most
risky of these shared information, bur sharing your full
name would be.
Current and Most People who steal identities study their subject. They
previous can use this information for verification purposes.
School(s)
Your cellphone Your cellphone number should not be posted over the
number internet. The Internet is a public place. It is the same as
posting your number on the billboard. You would not want
random strangers to text or call you, or worse, pretend that
they are someone else
The name of your Risky, yet not risky as posting their full names, especially
mother and your mother’s maiden name. In fact, you may have already
father encountered many websites that require your mother’s
maiden name as an answer to a secret question whenever
you lose your password
The name of your Disclosing this is huge risk. Strangers may pretend or use
siblings their identity to dupe you.
Your Address Hopefully, you answered “NO” to this one. Giving the
internet your number is one thing; giving them your
15
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

address is a whole other level. It would be much easier for


criminals to find you.
Your Phone This shared information is more risky than sharing your
Number personal phone. Scams usually use this information to
deceive you, one of which is when a stranger pretends to
know your parents or pretends to be you.
Your Birthday Letting people know your birthday is probably a must if
you want to get as many gifts as possible. But having it in
your profile makes you vulnerable to identity theft.

The internet is defined as the INFORMATION SUPERHIGHWAY.


This means that anyone has access to this highway, can place information,
and can grab that information. Any information, even things that have set
privately, can be accessed one way or another.

DO You know that:


INTERNET SAFETY- refers to the online security or safety of
people and their information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online
communication.

LECTURE 2

10 RULES of NETIQUETTE

Rule No. 1: Remember the human


 You need to remember that you are talking to a real person when you
are online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the
person’s face.
16
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Rule No. 2: Adhere to the same standards online that you follow in real life.
 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you
should not be doing online just like you can in real life.
 You are still talking to a real person with feelings even though you
can’t see them.

Rule no. 3: Know where you are in cyberspace.


 Always take a look around when you enter a new domain when
surfing the web.
 Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.


 Remember people have other things to do besides read your email.
You are not the center of their world.
 Keep your post and emails to minimum by saying what you want to
say.
 Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.


 Be polite and pleasant to everyone.
 Always check your spelling and grammar before posting.
 Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge


 Ask questions online
 Share what you know online.
 Post the answers to your questions online because someone may have
the same question you do.

Rule no. 7: Help keep flame wars under control


 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are flaming to hurt
discussion groups by putting the group down.
Rule no. 8: Respect other people’s privacy.
17
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

 Do not read other people’s mail without their permission.


 Going through other people’s things could cost you, your job or you
could even go to jail.
 Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.


 Do not take advantage of other people just because you have more
knowledge or power than them.
 Treat others as you would want them to treat you if the roles were
reversed.

Rule no. 10: Be forgiving of other people’s mistake.


 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and
cannot see the person face to face.

LECTURE 3
INTERNET SECURITY
SECURITY REQUIREMENT TRIAD

Confidentiality
Integrity
Availability
18
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

ᴥ Data Confidentiality ᴥ Date Integrity


ᴥ Privacy ᴥ System Integrity

INTERNET THREAT

There is no doubt that you need to be vigilant online. As the World Wide
Web has evolved over the years, many internet nasties have been playing on
vulnerabilities to attack computers and retrieve sensitive data from individuals.
Half the time, we aren’t even aware it is happening until it is too late. While the
internet is a fantastic place for communication and information, there are many
malicious threats you need to dodge along the way.

Spam
The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’
folder insinuates that spam emails are a huge issue, with more than 50% of emails
being syphoned into these folders. Aside from being an annoyance, spam emails
are not a direct threat. However, many can contain malware.

Adware
Adware is a type of malware software that displays unwanted ads when a
user is surfing the internet. The ads often redirect your searches to advertising
websites and collect marketing-type data about you, behind your back, which is
considered malicious.
Adware is often included in many shareware or freeware downloads as a
legitimate way of generating advertising revenues that help fund development.
However, some websites are infected with malicious adware that is automatically
downloaded to your computer.  When this has been completed, Trojans can be
used.

Trojan
Trojans leave your computer completely unprotected, which can mean that
hackers can steal any data from your system. Trojans often present themselves as
harmless computer programmes so that hackers can penetrate your computer
without being detected.

19
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Virus
One of the most talked about internet threats is a virus. Viruses usually
attach themselves covertly to downloads as they are designed to spread at an
alarming rate. Viruses are often attached to files for download, shared via CDs,
DVDs, and USB sticks, or loaded on to computers by opening infected email
attachments.

Worms
Worms usually make their way on to a computer via a malicious email
attachment or USB stick. Once your computer has been infected by a worm, it will
likely send itself to every email address logged in your system. To the receiver,
your email will appear harmless, until they open it and are infected by the same
worm.

Phishing
In its simplest terms, phishing is a form of fraudulent activity. More often
than not, official-looking e-mails are sent impersonating a well-known provider,
such as a bank. These e-mails are sent to acquire people’s passwords and credit
card details.

Spyware
Another form of malware is spyware. Spyware is an all-encompassing
internet nasty and is usually attached to pop-ups of downloadable files. Once
installed on your computer, spyware can monitor your keystrokes, read and delete
your files, reformat your hard drive, and access your applications. Whoever is
controlling the spyware has access to your personal details without you even
knowing.

Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard actions.
Most keyloggers will be looking for distinguishable key entries, such as bank card
details and passwords. Keylogging is often linked to identity and intellectual
property theft.

Pharming
Pharming is a more complex version of phishing that exploits the DNS
system. Pharmers often create web pages mimicking that of a trustworthy
20
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

business, such as an online banking log-in page. Users will then enter their details,
thinking they are logging in to their usual service, and their details will be stolen
by the pharmer.

Rogue Security Software


If you are ever downloading antivirus or antispyware programmes, make
sure you have purchased it from a legitimate source. Rogue security software will
often ask you to pay for extra protection, which is a huge con. The security
software is completely useless and criminals have robbed you of your money.

DO You know that:

DATA PRIVACY ACT (R.A. 10173)


-protects individuals form unauthorized processing of information t
private and identifiable , when the identity of the individual is app
either through direct attribution or put together with other ava
information.

- punishable up to 6 years in prison and up to 5 million pesos, depend


on the nature of violation

LECTURE 4

PROTECTING REPUTATIONS ONLINE

21
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

In the past, doing something embarrassing was not much that big deal. It
happened. It happened, people would laugh at it, and they would move on.
Nowadays, embarrassing moments are captured using any device you could
imagine. What is worse is that people can easily upload it on the Internet where it
can be stored forever. This could impact not only your reputation but also the
people around you. What is worse is that people tend to ignore this fact, and suffer
it later in their life.

Once you post something in the Internet, search engines keep them in their
archives for search results. This makes anything you post to last forever even if
you delete it in your page. Something you and your friends find funny today may
be something that could harm someone’s reputation later.

DO You know that:


Before hiring, companies do a background check on their applicant
the easiest way to check your background is to visit pages that are re
to you. Thus, if they find disreputable information about you, it may
your reputation even if this information has been discarded.

THINK BEFORE YOU CLICK

Here are some things you might want to


consider before posting something on the
Internet:

1. Before you post something on the web,


ask these questions to yourself: Would
you want tour parents or grandparents
to see it? Once you post something on
the web, you have no control of who can
see your posts.

22
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

2. Your friends depend on you to protect their reputation online. Talk to you
friends about this serious responsibility

3. Set your post


“private”. In
this way,
search
engines will
not be able to
scan that
post.

4. Avoid using
names.
Names are
easy for search engines to scan.

5. If you feel that a post can affect you or other’s


reputation, ask the one who posted it to take
it down or report it as inappropriate.

LECTURE 5

FOUR SEARCH STRATEGIES

 Keyword searching
Enter terms to search.
23
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Use quotation marks to search as a phrase and keep the words linked
together.
Common words are ignored (That, to, which, a, the …) + and – can be
used to include or exclude a word

 Boolean
AND – enter words connect with AND- it will include sites where both
words and found.
   Uses: joining different topics (i.e. global warming AND
California)
OR   –  requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR
greenhouse effect)
NOT – searches for the first term and excludes sites that have the
second term. (i.e. Washington NOT school)

 Question                                                                                                                          
 A question may be entered in the search field of search engine    

 Advanced                                                                                                                 
       Features are offered on many engines by going to an “Advanced search”
page and making selections. Effective in narrowing search returns to a
specific topic or phrase.

LESSON APPLIED PRODUCTIVITY TOOLS WITH


3 ADVANCED APPLICATION TECHNIQUES
Advanced Word Processing Skills
Formation Standard:

The learner will utilize the use of advance word processing skills in an effective way.

24
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Most Essential Learning Competencies:


 Uses common productivity tools effectively by maximizing advanced
application techniques
 Creates an original or directive ICT content to effectively communicate or
present data or information related to specific professional tracks

Time frame: 1 week

Learning Targets:
1. Use some advanced capabilities of Microsoft Word commonly used to
increase productivity and efficiency;
2. Effectively use these features to help improve the productivity of an
organization through maximizing the potential of MS Word
3. Create form letters or documents for distribution to various recipients;
4. Create media-rich documents for printing and publishing;

LET’S BEGIN!!!
Scenario: You were tasked to create and send for
for a promo campaign of our school. You were also
10 names of our supporters to send these invitation
From the scenario above, describe briefly how you
would most likely complete the task of sending
ten invitations with individual names of
recipients using Microsoft Word 2013.

LECTURE 1
In the professional world, sending information to
convey important messages is vital. Because of ICT,
things are now sent much faster than the traditional
newsletter or postal mail. You can now use the Internet to
send information you need to share. What if we could still
do things much faster – an automated way of creating and
sending uniform letters with different recipients? Would
that not be more convenient? 25
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

MAIL MERGE and LABEL GENERATION

Mail Merge

One of the important reasons in using computer per se is its ability to do


recurring tasks automatically. But this ability has to be honed by learning th
characteristics and features of the software you use with your computer. After all,
no matter how good or advanced your computer or software may be, it can only be
as good as the person using it.

In this lesson, you will learn one of the most powerful and commonly used
features of Microsoft Word called “mail merge.” As the name suggests, this feature
allows you to create documents and combine or merge them with another
document or data file. It is commonly used when sending out advertising materials
to various recipients.

The simplest solution for the scenario before is create a document and just
copy and paste it several times then just replace the details depending to whom
you will send it. But what if you have hundreds and thousands of recipients?
Surely, it would take many hours to do so. What if you have a small database of
information where you can automatically generate those letters?

26
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Two Components of Mail Merge


27
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

1. Form Document
The first component of our mail merged document is the form
document. It is generally the document that contains the main body of the
message we want to convey or send. The main body of the message is the
part of the form document that remains the same no matter whom you send
it to from among your list.

Also included in the form document is what we call placeholders,


also referred to as data fields or merge fields. This marks the position on
your form document where individual data or information will be inserted.
From our sample document, the place holders are denoted or marked by the
text with double-headed arrows (<< >>) on each side and with a gray
background. On a printed standard form, this will be the underlined spaces
that you will see and use as a guide to where you need to write the
information that you need to fill out. In its simplest form, a form document
is literally a “form” that you fill out with individual information. A common
example of a form document is your regular tax form or application form.

Sample Form Document


2. List or Data
File

28
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

The second component of our mail merged document is the list or


data file. This is where the individual information or data that needs to be
plugged in (merged) to the form document is placed and maintained. One
of the best things about the mail merge feature is that it allows data file to
be created for within the Microsoft Word application itself, or it gets data
from a file created in Microsoft Excel or other data formats. In this way,
fields that needed to be filled up on the form document can easily be
maintained without accidentally altering the form or main document. You
can also easily add, remove, modify, or extract your data more efficiently
by using other data management applications like Excel or Access and
import them in Word during the mail merge process.

Sample data file

Label Generation
            Included in the mail merge feature on Microsoft Word is the Label
Generator. It just makes sense that after you print out your form letters, you will
need to send it to individual recipients in an envelope with the matching address
printed directly on the envelope or on a mailing label to stick on. By using virtually
the same process as a standard mail merge, Microsoft Word will print individual
addresses to a standard form that it has already pre-formatted. Simply put, it
creates a blank form document that simulates either a blank label or envelope of
pre-defined size and will use the data file that you selected to print the
information, typically individual addresses. So even in generating labels, the two
essential components of creating a merged documents are present: the form
29
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

document and the data file. Only in this case, you did not have to type or create the
form document yourself because it was already created and pre-formatted in
Microsoft Word. All you need to do is select the correct or appropriate size for the
label or envelope and select the data file that contains the addresses (data) to be
printed. You can also preview your merged labels before printing if you want to.

Sample Label Generator

ACTIVITY 1 LET’S EXPLORE

30
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Now that we have learned the components needed to accomplish a successful mail
merge, let us put theory into practice. Take a look at the steps in creating a simple
mail merge document.

Following our scenario, do the following steps to create and merge a simple
cover letter with a list of names tasked to send the letters to. To prepare for this
activity, let us build a list of at least ten names of people with their corresponding
title, company name, and address. You may use the following fields: title, name,
company address line 1, address line 2, and address line 3.

Title Name Company Address Line Address Line Address Line


1 2 3
Sir Arnold Reyes ABC Inc. 23 Sierra St. Alabang Muntinlupa
City
Madam Maria Santos XYZ Corp. 45 Oro Drive San Juan Metro Manila

STEPS IN CREATING A SIMPLE MAIL MERGE:

Creating the form document


1. Open MS Word and start a new blank document. You can use the
keyboard shortcut Ctrl+N after MS Word has been loaded or opened.
2. On the Mailing tab, from the Start Mail Merge group, choose Start
Mail Merge > Letters, then create a simple letter of invitation.
3. Save your letter and name it “Sample Letter.”
4. Insert the fields you need in the letter ( Name, Company, Address Line 1,
Address Line 2, Address Line 3, and Title). You may want to make special
markings on these fields as you type. The most common marking you
can do is by typing in capital letters so you can easily identify the later.
5. Save the form document once more. You can use Ctri+S to quickly do
this step.

Creating the List/Data File

31
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

6. On the Mailings tab, go to Star Mail Merge group and choose Select
Recipients > Type a New List
7. Click the Customize Column button on the dialogue box to customize
the address list. This will allow you to modify the fields in the address
list that MS Word has pre-determined.
8. Select the field that you do not need then click the Delete button. A
confirmation dialog box appears.
9. Click Yes in the confirmation dialog box. The dialog box closes, and the
unnecessary fields disappears.
10. Repeat steps 8 and 9 for each field you do not need. After removing the
excess fields, the next step is to add the fields you need.
11. To add a field that you need in your document, click the Add button.
12. Type the field name on the prompt inside a small Add Field dialog box
and click the OK button.
13. Repeat steps 11 and 12 for each new field you need in your main
document.
14. Click the OK button on the Customize Address list dialog box to
confirm your changes.
15. The New Address List dialog box will appear again, ready for you to
type in your data.
16. Type the individual data from your list corresponding to Name,
Company, Address Line 1, Address Line 2, Address Line 3, and Title
17. Press the Tab key each time to enter the next field.
18. To add a new record, press Tab key after inputting the last field. When
you press the Tab key on the last field in a record, a new record is
automatically created and added on the next line.
19. Repeat steps 16 through 18 until you enter all the records you want.
Once you are done typing your data, click the OK button on the Add
New List dialog box to save your data. A special Save Address List
dialog box pops up, allowing you to save the recipient list.
20. Type a name for the address list. Name it “Client List.”
21. Click the Save button. You should be back on your main document
after.
32
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

22. Select or highlight a placeholder (ALL CAPS) in the main document.


23. Click the Insert Merge Field command button.

24. Choose the proper field to insert into your text. For example, if you are
replacing the text “NAME” in your form document with the NAME
field, choose the Name field from the Insert Merge Field menu. This
field will be inserted into your document and replaces the ALL CAPS
text.
25. Continue adding fields until the document is complete. Repeat steps 22
to 24 as necessary to stick all fields into your document.
26. Save the form document.
27. Choose Finish & Merge > Send Email Messages to edit, print, or send
your merged documents through email.
28. Or you may want to choose Preview Results to check your work before
you send it.
29. You will get a merged document.
If you decide to print the document, choose the Finish & Merge > Print
Documents. The Merge to Printer dialog box will appear from which you can
choose records to print. Choose All to print your entire documents. Alternatively,
you can specify which records to print. Click OK. The traditional Print dialog box
appears. Click the OK button again to print your documents.

30. Save and close your document.

LECTURE 2

INTEGRATING IMAGES AND EXTERNAL MATERIALS

Integrating or inserting pictures in your document is fun and it improves


the impression of your document. A common use of inserting a picture on a
document is when you are creating your resume. Though seemingly simple to do,
your knowledge on the different kinds of materials that you can insert or integrate
33
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

in a Word document and its characteristics can help you create a more efficient,
richer document not only in content but also in physical form. A better
understanding of the physical form of your document as well as the different
materials you would integrate in it would allow you to be more efficient and
versatile in using Microsoft Word.
KINDS OF MATERIALS

           There are various kinds of materials Microsoft Word is capable of


integrating to make the documents richer, more impressive, and more informative.

1.

Pictures
          Generally, these are electronic or digital pictures or photographs you have
saved in any local storage device. There are three commonly used types of picture
files. You can identify them by the extension on their file names.

a. .JPG/JPEG
This is pronounced as “jay-
peg” and is the short form of .jpeg or
Joint Photographic Experts Group.
Like all the rest of the image file
extensions, it identifies the kind of
data compression process that it uses
to make it more compatible and
portable through the Internet. This
type of image file can support 16.7
million colors that is why it is suitable
for use when working with full color
photographic images. Unfortunately,
it does not support transparency and
therefore, images of this file type can be difficult to integrate in terms of blending
with other materials or elements in your document. But if you are looking for the
best quality image to integrate with your document then this is the image file type
34
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

for you. .JPG does not work well on lettering, line drawings, or simple graphics.
.JPG images are relatively small in file size.

b. .GIF
          This stands for Graphics Interchange Format. This type of image file is
capable of displaying transparencies. Therefore, it is good for blending with
other materials or elements in your document. It is also capable of displaying
simple animation. Apparently, this may not be too useful on a printed
document but if you are sending documents electronically or through email,
or even post documents into a
website, then this could be
quite impressive. The downside
is that it can only support up to
256 colors so it is good mostly
on logos and art decors with
very limited, and generally
solid colors. .GIF is much better
for logos, drawings, small text,
black and white images, or low-
resolution files. Example of a .gif format picture.

c. .PNG 
           This is pronounced as “ping“. It stands for Portable Network Graphics.
It was built around the capabilities
of .GIF. Its development was basically
for the purpose of transporting
images on the Internet at faster rates.
It is also good with transparencies but
unlike .GIFs, it does not support
animation but it can display up to 16
million colors, so image quality for
this image file type is also remarkably

35
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

improved. .PNG allows the control of the transparency level or opacity of


images.

Example of .png format picture.

2.  Clip Art


          This is generally a .GIF type; line art drawings or images used as generic
representation for ideas and objects that you might want to integrate in your
document. Microsoft Word has a library of clip arts that is built in or can be
downloaded and used freely. There are still other clip arts that you can either
purchase or freely download and use that come from third-party providers.

Example of ClipArt picture.

3.  Shapes
          These are printable objects or materials that you can integrate in your
document to enhance its appearance or allow you to have some tools to use for
composing and representing ideas or messages. If you are designing the layout for
a poster or other
graphic material for
advertising, you
might find this
useful.

36
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Shapes Icon under the Insert ribbon tab.

4. Smart Art
          Generally, these are predefined sets of different shapes grouped together to
form ideas that are organizational or structural in nature. If you want to
graphically represent an organization,
process, relationships, or flow for
infographic documents, then you will
find this easy and handy to use.

SmartArt Sample

5.  Chart
Another type of material that you can integrate in your Word document
that allows you to represent data characteristics and trends. This is quite useful
when you are preparing reports that correlate and present data in a graphical
manner. You can create charts that can be
integrate in your document either directly in
Microsoft Word or imported from external
files like Microsoft Excel.

37
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Chart Sample

6. Screenshot
Sometimes, creating reports or manuals for training or
procedures will require the integration of a more realistic
image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot.
Microsoft Word even provides a snipping tool for your screen
shots so you can select and display only the part that you
exactly like to capture on your screen.

IMAGE PLACEMENT

In practice, inserting an image or any other material in your document is


quite easy especially if the material already exists in your local storage device. It is
just a matter of opening the image file through the Microsoft Word dialog box or
wizard. Sometime, if the image you would like to insert is on the web page
currently displayed on your screen, it could be copied and pasted. The real
challenge is where to put the image you inserted or where to position it.

38
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

1. In Line With Text


This is the default setting for images that are inserted or integrated in your
document. It treats your image like a text font with the bottom side totally aligned
with the text line. This setting is usually used when you need to place your image
at the beginning of the paragraph. When you place between texts in a paragraph or
sentence, it distorts the overall appearance and arrangement of the text in the
paragraph because it will take up the space it needs vertically, pushing whole line
of texts upward.

2. Square
This setting allows the image you inserted to be placed anywhere within
the paragraph with the text going around the image in a square pattern like a
frame.

3. Tight
This is the almost the same as the Square setting, but here the text “hugs”
or conforms to the general shape of the image. This allows you to get a more
creative effect on your document. This setting can mostly be achieved if you are
using an image that supports transparency like a .GIF or .PNG file.

4. Through
This setting allows the text on your document to flow even tighter, taking
the contours and shape of the image. Again, this can be best used with a .GIF or
.PNG type of image.

5. Top and Bottom


This setting pushes the texts away vertically to the top and/ bottom of the
image so that the image occupies a whole text line on its own.

6. Behind Text
39
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

This allows your image to be dragged and placed anywhere on your


document but with all the text floating in front of it. It effectively makes your
image look like a background.

7. In Front of Text
As it suggests, this
setting allows your image
to be placed right on top of
the text as if your image
was dropped right on it.
That means whatever part
of the text you placed the
image on, it will be covered
by the image.

LECTURE 3

ADVANCED SPREADSHEET SKILLS

What is a Spreadsheet Software?

• allows users to organize data in rows and columns and perform


calculations on the data
• These rows and columns collectively are called worksheet.

Examples of Spreadsheet Software:


40
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

• LibreOffice Calc • OpenOffice.org Calc • Google Sheets • Apple iWork


Numbers • Kingsoft Office Spreadsheets • StarOffice Calc • Microsoft Excel

MICROSOFT EXCEL

Key Terms in MS Excel:


• Row – horizontal line of entries in a table
• Column – vertical line of entries in a table
• Cell – the place where info. is held in a spreadsheet
• Active Cell – the selected cell
• Column Heading – the box at the top of each column containing a letter
• Row Heading – the row number
• Cell Reference – the cell address of the cell usually combine letter and
number (ex. A1, B4, C2)
• Merge – combining or joining two or more cells
• Formula – is an expression which calculates the value of a cell.
• Functions – are predefined formulas and are already available in Excel
• Formula Bar – the bar that displays the contents of a cell

FUNCTIONS
BASIC MATH OPERATIONS:
• =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the
numbers within the range)
• =PRODUCT(x,y) – returns the product of x and y
• =QUOTIENT(x,y) – returns the quotient of x divided by y
• =x-y – returns the difference of x subtracted by y
• =x+y – returns the sum of x and y
• =x*y – returns the product of x and y
• =x/y – returns the quotient of x divided by y
• =x-y – returns the difference of x subtracted by y

OTHER FUNCTIONS:
• =ABS(x) – returns the absolute value of x
• =AVERAGE(x,y) – returns the average of x and y
• =CONCATENATE(x,y) – joins x and y
• =IF(Condition, x, y) – returns x if the condition is true, else it returns y
41
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

• =ISEVEN(x) – returns true if x is an even number


• =ISODD(x) – returns true if x is an odd number
• =COUNT(range) – counts the number of cell containing a number within a
range
• =COUNTIF(range, criteria) – count the number of cell that fits with the
criteria within the range
• =ISNUMBER(x) – returns true if x is a number
• =ISTEXT(x) – returns true if x is a text
• =LEN(x) – returns the length of characters in x
• =PROPER(x) – returns the proper casing of x
• =LEFT(x,y) – returns the characters of x specified by y (from the left)
• =RIGHT(x,y) – returns the characters of x specified by y (from the right)
• =PI() – returns the value of pi
• =MIN(x,y) – returns the smallest number between x and y
• =MAX(x,y) – returns the largest number between x and y
• =MIN(range) – returns the smallest number within the range
• =MAX(range) – returns the largest number within the range
• =POWER(x,y) – returns the value of x raised to the power of y
• =ROUND(x,y) – rounds x to a specified number of digits (y)
 =COLUMN(x) – returns the column number of x
 =ROW(x) – returns the row number of x
• =SQRT(x) – returns the square root of x
• =TRIM(x) – removes extra spaces in x
• =UPPER(x) – returns x in all capital form
• =LOWER(x) – returns x in non- capital form
• =TODAY() – returns the current date
• =NOW() – returns the current date and time

LECTURE 4

ADVANCED PRESENTATION SKILLS

Powerpoint is a highly innovative and versatile program that can ensure a


successful communication whether you’re presenting in front of potential
investors, a lecture theatre or simply in front of your colleagues. The following are
the five features you should be using-if youy aren’t already. Learn everything
42
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

about these tips: they will improve your presentation skills and allow you to
communicate your message successfully.

The five features of powerpoint was

1)adding smart art

2)Inserting Shapes

3)Inserting and Image

4)Slide Transitions

5)Adding Animations

Creating an Effective Presentation

1. Minimize:
Keep slides counts to a minimum to maintain a clear message and to keep
the audience attentive. Remember that the presentation is just a visual aid.
Most information should still come from the reporter.

2. Clarity:
Avoid being to fancy by using font style that is easy to read. Make sure that
it is also big enough to be read by the audience. Once you start making
your presentation, consider how big the screen is during your report.

3. Simplicity:
Use bullets or short sentences. Summarize the information on the screen to
have your audience focus on what the speaker is saying than on reading the
slide. Limit the content to six lines and seven words per line. This is known
as the 6 x 7 rule.

4. Visual:
Use graphics to help in your presentation but not too many to distract the
audience. In addition, instead of using table of data, use charts and graphs.
5. Consistency:
43
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Make your design uniform. Avoid having different font styles and
backgrounds.

6. Contrast:
Use a light font on dark background or vice versa. This is done so that it is
easier to read. In most instances, it is easier to read on screen if the
background is dark. This is due to the brightness of the screen.

LESSON IMAGING AND DESIGN FOR


4 ONLINE ENVIRONMENT

Most Essential Learning Competencies:


 Evaluate existing websites and online resources based on the principles of
layout, graphic, and visual message design.
 Use image manipulation techniques on existing images to change or
enhance their current state to communicate a message for a specific
purpose.
 create an original or derivative ICT content to effectively communicate a
visual image in an online environment related to a specific professional
track.

Time frame: 2 weeks

Learning Targets:
1. Enumerate the basic principles of graphics and layout.
2. Create a simple infographic using web tool tools
3. Utilize several file formats used on the web
4. Easily manipulate images using a simple image editor, and
5. Upload and share images using any social media
platform.

LET’S BEGIN!!!
44
IMMACULATE HEART OF MARY ACADEMY, INC.
For you, “What is the most vis
MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro website in the world?”
Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

LECTURE 1

Basic Principles of Graphics and Layout

          Creating a web page is like creating a work of art. There are certain things
that you need to consider in order to get your message across.

1. Balance. The visual weight of objects,


texture, colors, and space is evenly
distributed on the screen.

2. Emphasis. An area in the design that


may appear different in size, texture,
shape or color to attract the viewer's
attention.
An example page of balance
and emphasis

3. Movement. Visual elements guide the viewer's


eyes around the screen.
45
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Movement

4. Pattern, Repetition, and


Rhythm. These are the repeating
visual element on an image or
layout to create unity in the
layout or image. Rhythm is
achieved when visual elements
create a sense of organized
movement.

Pattern, Repetition, and Rhythm

5. Proportion. Visual elements create a sense


of unity where they relate well with one
another.

Proportion

46
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

6. Variety. This uses several


design elements to draw
viewer's attention.

LECTURE 2

PHOTO EDITING
 Photo editing encompasses the processes of
altering images, whether they are digital
photographs, traditional photo chemical
photographs, or illustrations. Traditional analog
image editing is known as photo retouching,
using tools such as an airbrush to modify
photographs, or editing illustrations with any
traditional art medium.

Graphic software programs


 Which can be broadly grouped into
vector graphics editors, raster
graphics editors, and 3D modelers are
the primary tools with which a user
may manipulate, enhance, and
transform images. Many image
editing programs are also used to
render or create computer art from
scratch.

BASIC OF IMAGE EDITING


47
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

1. RASTER IMAGES are stored in a computer in the form of a grid of picture


elements or pixels.

2. VECTOR IMAGES such as Adobe Illustrator, Inkscape and etc. are used to
create and modify vector images, which are stored as descriptions of lines,
Bezier curves and text instead of pixels.

DIFFERENCE BETWEEN RASTER AND VECTOR IMAGES

  RASTER IMAGES use many colored pixels or individual building


blocks to form a complete image JPEGs, GIFs and PNGs are common raster
image types. Almost all of the photos found on the web and in print
catalogs are raster images.

 VECTOR IMAGES alternatively, allow for more flexibility. Constructed


using mathematical formulas rather than individual colored blocks, vector
file types such as EPS, AI and PDF are excellent for creating graphics that
frequently require resizing.

3. 3D MODELING (OR MODELLING)


is the process of developing a
mathematical representation of any three
dimensional surface of an object via
specialized software. The product is
called a 3D model. It can be displayed as
a two-dimensional image through a
process called 3D rendering or used in a 48
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

computer simulation or physical phenomena. The model can also be physically


created using 3D printing devices.

IMAGE FORMATS

JPEG is a commonly used method of lossy compression for digital images,


particularly for those images produced by a digital photography.

PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics file format that


supports lossless data compression.

GIF a lossless format for image files that supports both animated and static
images.

BMP is a raster graphics image used to store bitmap digital images

EPS used in vector-based images in Adobe Illustrator.

SVG is an XML-based vector image format for two-dimensional graphics w/


support for interactivity and animation

 .3ds is one of the file formats used by the Autodesk 3Ds Max 3D Modelling,
animation and rendering software.

 .fbx is an exchange format, in particular for interoperability between Autodesk


products and other digital content creation software

FEATURES OF IMAGE EDITORS

SELECTION One of the prerequisites for many of the app mentioned below is a


method of selecting part(s) of an image, thus applying a change selectively without
affecting the entire picture

MARQUEE TOOL for selecting rectangular or other regular polygon-shaped


regions
49
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

LASSO TOOL for freehand selection of a region

MAGIC WAND TOOL selects objects or regions in the image defined by


proximity of color or luminance

LAYERS which are analogous to sheets of


transparent acetate, stacked on top of each
other, each capable of being individually
positioned, altered and blended with the
layers below, w/o affecting any of the
elements on the other layers.

IMAGE SIZE resize images in a process often


called image scaling, making them larger, or
smaller. High image resolution cameras can
produce large images which are often reduced
in size for Internet use.

CROPPING creates a new image by selecting a


desired rectangular portion from the image
being cropped. The unwanted part of the image
is discarded. Image cropping does not reduce
the resolution of the area cropped.
CLONING uses the current brush to copy from an image or pattern. It has many
uses: one of the most important is to repair problem areas in digital photos.

50
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

IMAGE ORIENTATION – Image editors are capable of altering an image


to be rotated in any direction and to any degree. Mirror images can be created and
images can be horizontally flipped or vertically flopped. Rotated image usually
requires cropping afterwards, in order to remove the resulting gaps at the image
edges.

PERSPECTIVE – is the


art of drawing solid
objects on a two-
dimensional surface so
as to give the right
impression of their
height, width, depth
and position in relation
to each other when
viewed from a
particular point.

SHARPENING AND SOFTENING


– Sharpening makes images clearer.
Too much sharpening causes grains
on the surface of the image.
Softening makes images softer that
removes some of the highly visible
flaws. Too much causes the image
to blur.

SATURATION - is an expression for the


relative bandwidth of the visible output
from a light source. As saturation increase,

51
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

colors appear more “pure.’’ As saturation decreases, colors appear more ‘’ washed-
out.’’

CONTRAST AND BRIGHTENING


Contrast of images and brighten or
darken the image. Underexposed
images can be often be improved by
using this feature.

Brightening lightens the image so the


photo brightens up. Brightness is a
relative expression of the intensity of
the energy output of a visible light
source.

Adjusting contrast means adjusting brightness because they work together to make
a better image.

PHOTO MANIPULATION
Photo manipulation involves
transforming or altering a
photograph using various methods
and techniques to achieve desired
results. Some photo manipulations
are considered skillful artwork
while others are frowned upon as
unethical practices, especially when
used to deceive the public, such as
hat used for political propaganda ,
or to make a product or person look
better.

52
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

LECTURE 3

Infographics also known as data visualization, information design, and communication


design
 It is any graphic that display and explains information, whether that be
data or words. When we use the term ‘’infographics’’, we’re using it as
a general term used to describe data presented in a visual way.

 Infographics are important because they change the way people find
and experience stories. Infographics are being used to augment
editorial content on the web, it create a new way of seeing the world of
data, and they help communicate complex ideas in a clear and beautiful
way.

TYPES OF INFOGRAPHICS
1. Statistical
2. Process Flow
3. Geographic

PROCESS OF MAKING INFOGRAPHICS

1. Research
a) Know what is needed
b) Take a reference
c) Know the audience
d) Decide the type of infographics
2. Brainstorm
a)Gather ideas
b)Build thought process
3. Design
Choose your tool and start designing
53
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

4. Review
Cross check the data to deliver flawless output
5. Launch
Make it viral
Share on social network

BEST PRACTICES WHEN CREATING INFOGRAPHICS

1. Maintain a structure
2. Don’t use more than 3 color
palletes
3. Typography matters a lot
4. Include source and references

54
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Multimedia Presentation Rubric                                 
NEEDS
EXCELLENT - SATISFACTORY
GOOD - 3 IMPROVEMENT
4 - 2
- 1
Subject knowledge is Subject knowledge is Some subject Subject knowledge is
evident throughout evident in much of knowledge is evident. not evident.
Subject the project. All the project. Most Some Information is Information is
Knowledge information is clear, information is clear, confusing, incorrect, confusing, incorrect, or
appropriate, and appropriate, and or flawed. flawed.
correct. correct.
Citing All sources are Most sources are Few sources are No sources are
Sources properly cited. properly cited. properly cited. properly cited.

The sequence of The sequence of The sequence of The sequence of


information is logical information is information is information is not
and intuitive. Menus logical. Menus and somewhat logical. logical. Menus and
Organization
and paths to all paths to most Menus and paths are paths to information
information are clear information are clear confusing and flawed. are not evident.
and direct. and direct.
The project shows The project shows The work is an The work is a minimal
significant evidence some evidence of extensive collection collection or rehash of
of originality and originality and and rehash of other other people's ideas,
inventiveness. The inventiveness. people's ideas, products, and images.
Originality majority of the products, and images. There is no evidence of
content and many of There is little evidence new thought.
the ideas are fresh, of new thought or
original, and inventiveness.
inventive.
Project runs perfectly Project runs Project runs Project does not run
with no technical adequately with minimally. There are satisfactorily. There
problems. For minor technical many technical are too many technical
Technical example, there are problems. problems when problems to view the
no error messages, viewing the project. project.
all sound, video, or
other files are found.

55
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

In the name of the Father, and of the Son,


and of the Holy Spirit, Amen

I thank You, Lord our God.


You have opened my eyes to the light of your wisdom.
You have gladdened my heart
With the knowledge of truth.

I entreat You, Lord.


Help me always to do your will.
Bless my soul and body, my words and deeds.
Enable me to grow in grace, virtue and good habits.
That Your name may be glorified,
Father, Son and the Holy Spirit.
Now and forever.
Amen

In the name of the Father, and of the Son,


and of the Holy Spirit, Amen

Reference:

Innovative Training Works, Inc. Empowerment Technologies - K to 12 1st


Edition. Manila, Philippines: REX Book Store

56
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES

Thank You!

57
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer

You might also like