ATS 5 EM Tech
ATS 5 EM Tech
2021-2022
EMPOWERMENT TECHNOLOGIES
Every man and woman are endowed with the dignity of a person, thus, he or
she has inalienable right to education. The Church has an obligation to provide an
education for her children by which their whole lives may be inspired by the spirit of
Christ. A Catholic school is not just an environment for providing a series of lessons; it
operates out of an educational philosophy, which aims to meet the needs of the young
people of today in light of the Church’s faith in Jesus Christ.
It is the religious dimension that makes the Catholic school distinctive. This
religious dimension can be found in (a) the context in which education is delivered, (b)
the means by which the personal development of each student is achieved, (c) the
relationship established between culture and the faith of the Church in the message of
Christ, (d) the fact that all knowledge is informed by and derives its ultimate meaning
from the faith within whose context it is pursued.
It is very important to realize that the Catholic identity of our schools is not
exclusively related to religious instruction and the integration of academic studies into
a unified whole. The Catholic school has a single Christian vision, an integrated
concept of what makes a fully authentic and mature human being. The educational
process is not confined to the curriculum nor to the academic, technical, artistic and
sporting achievements of the school.
The Catholic school should be seen as offering the possibility not only of
exploring the mystery which God is, but also of demonstrating the Gospel in action. It
must be consistent throughout and in every aspect reflect the Christian faith, which is
its soul, its inspiration, and its justification.
VISION 1
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
MISSION
To create and maintain a student-centered learning environment where
teaching and learning are purpose-driven and students are assisted towards the
development of personal and social responsibility.
GOALS
1. Ensure that every student is valued for their individuality and
diversity.
2. Provide set of spiritual and moral values as honesty, integrity and good
judgment.
3. Deliver and enquiring and discriminating mind desiring for knowledge
and wisdom.
4. Develop student’s full potential in a stimulating and caring
environment for learning.
5. Advance the moral and spiritual well-being of the students based on
Marian values.
CORE VALUES
D’ Discipline
M Magnanimity
A Attentiveness
R Responsiveness
I Integrity
A Altruism
N Nationalism
Course Description:
Empowerment Technologies is a specialized module designed to provide
students with the foundation of knowledge and skill needed to succeed in
environments that require the use of computer and the Internet. It covers topics for
building essential 21st century skills in working and creating contents online.
This discipline will aid in teaching competencies that are essential in the
Information Age, such as the state of the ICT technologies; online safety, security,
ethics and etiquette; productivity tools with advanced application techniques;
imaging and designing for online environment, multimedia tools; and powerful
tools to create a social change, which are aligned to the standards set by the
Department of Education for the senior high school level.
Course Outline:
I Introduction to Information and Communication Technologies
II Rules of Netiquette
III Advanced Word Processing Skills
IV Advanced Spreadsheet Skills
V Advanced Presentation Skills
VI Imaging and Design for Online Environment
VII Online Platforms for ICT Content Development
VIII Basic Web Page Creation
IX Collaborative ICT Development
X Interactive Multimedia
XI ICT as Platform for Change
XII ICT Project for Social Change
XIII ICT Project Publication and Statistics
XIV ICT Project Maintenance
XV The Disadvantages of ICT
Formation Standard:
The learner will use and know more about ICT and use it anchored with Marian
values.
Learning Targets:
1. Improve their knowledge on how ICT affects their everyday lives and the
state of our nation;
2. Compare and contrast the differences between online platforms, sites,
and content;
3. Understand the features of Web 2.0;
4. Understand the future of the World Wide Web through Web 3.0; and
5. Learn the different trends in ICT and use them to their advantage.
LET’S BEGIN!!!
How many time have you checked your phone this morning?
How many status update have you posted in Facebook or Twitter5 today
Did you use the internet for an hour after you woke up this morning?
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Do you follow a celebrity via
Madrid Blvd., Pinamalayan, Oriental Mindoro his/her Social Media Account?
Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
LECTURE 1
6
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
According to Time Magazine, “The Selfiest Cities around the World” of 2013
places two cities from the Philippines in the top 1 and top 10.
LECTURE 2
7
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
When the World Wide Web was invented, most web pages were static.
Static (also known as flat page or stationary page) in the sense that the page is “as
is” and cannot be manipulated by the user. The content is also the same for all
users. This is referred to as Web 1.0.
Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the
user is able to see a website differently than others. Examples of Web 2.0 include
social networking sites, blogs, wikis, video sharing sites, hosted services, and web
applications.
Web 2.0 allows users to interact with the page: instead of just reading a
page, the user may be able to comment or create a user account. Web 2.0 also
allows users to use web browsers instead of just using their operating system.
Browsers can now be used for their user interface, application software (or web
applications), and even for file storage.
LECTURE 3
of social networking sites, when logged on, your account is used to modify
what you see in their website.
4. User Participation. The owner of the website is not the only one who is
able to put content. Others are able to place a content of their own by
means of comment, reviews, and evaluation. Some websites allow readers
to comment on an article, participate in a poll, or review a specific product
(e.g., Amazon.com, online stores).
LECTURE 4
The Semantic Web is a movement led by the World Wide Web Consortium
(W3C).
The W3C standard encourages web developers to include semantic content
in their web pages.
The aim of Web 3.0 is to have machines (or servers) understand the user’s
preferences to be able to deliver web content specifically targeting the user. For
example, if you search the Internet for “Where is the best place to go shopping?”
WEB 3.0 will aim to give you results depending on how you have made choices in
the past. If you have purchased several shoes online, the Internet will give you
results on the best place with the highest rated shoes around your vicinity.
1. Compatibility
HTML files and current web browsers could not support Web 3.0.
2. Security
The user’s security is also in question since the machine is saving his
or her preferences.
3. Vastness
The World Wide Web already contains billions of web pages.
4. Vagueness
Certain words are imprecise. The words “old” and “small” would
depend on the user.
5. Logic
Since machines use logic, there are certain limitations for a
computer to be able to predict what the user is referring to at a given
time
10
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
LECTURE 5
TRENDS IN ICT
1. CONVERGENCE
Technological convergence is the synergy of technological advancements to
work on a similar goal or task.
2. SOCIAL MEDIA
Social media is a website, application, or online channels that enable web
users to create, co-create, discuss, modify, and exchange user-generated
content.
a. Social Networks. These are sites that allow you to connect with other
people with the same interests or background. Example: Facebook and
Google+
b. Bookmarking Sites. These are sites that allow you to store and manage
links to various websites and resources. Example: StumbleUpon and
Pinterest
c. Social News. These are sites that allow users to post their own news
items or links to other news sources. Example: Reddit and Digg
d. Media Sharing. These are sites that allow you to upload and share
media content like images, music, and video. Example: Flicker, Youtube
and Instagram
e. Microblogging. These are sites that focus on short updates from the
user. Example: Twitter & Plurk
11
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
f. Blogs and Forums. These websites allow users to post their content.
Example: Blogger, WordPress and Tumblr
3. MOBILE TECHNOLOGIES
The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices’ capability to do tasks that were
originally found in personal computers.
4. ASSISTIVE MEDIA
Assistive media is a nonprofit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to
read to the user.
5. CLOUD COMPUTING
This is distributed computing on internet or delivery of computing service
over the internet. Instead of running an e-mail program on your computer,
you log in to a Web or e-mail account remotely. The software and storage
for your account doesn’t exist on your computer – it’s on the service’s
computer cloud.
TYPES OF CLOUDS
Formation Standard
The learner will be able to use social networking sites responsibly.
Learning Targets:
1. Consider one’s and others’ safety when sharing information using the
Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper referencing.
LET’S BEGIN!!!
How many checks did you have shared? Try using a search engine
like Google then type your first and last name. Did you get links to your
profile page? Did your pictures appear?
So how did this happen? How can search engines locate me? Is there
any danger of being found by search engines?
LECTURE 1
“another side of the coin.” The Internet is one of the most dangerous places,
especially if you do not know what you are doing with it.
Let’s go back to the “How Safe Are You?” test. Let us visit each item and
see how risky it is to share them.
Types of Risks
Information
First Name There is a risk in sharing your first name. Chances are
hacker may already know plenty of stuff about you even if
you only give out your first name.
Last Name If sharing your FIRST name is a small risk, having both of
your first and last is more risky, You will be vulnerable to
being search for using search engines, which include image
search. Matching a name with face is a modus to several
cybercrimes like identity theft
Middle Name Sharing your MIDDLE name alone is probably not the most
risky of these shared information, bur sharing your full
name would be.
Current and Most People who steal identities study their subject. They
previous can use this information for verification purposes.
School(s)
Your cellphone Your cellphone number should not be posted over the
number internet. The Internet is a public place. It is the same as
posting your number on the billboard. You would not want
random strangers to text or call you, or worse, pretend that
they are someone else
The name of your Risky, yet not risky as posting their full names, especially
mother and your mother’s maiden name. In fact, you may have already
father encountered many websites that require your mother’s
maiden name as an answer to a secret question whenever
you lose your password
The name of your Disclosing this is huge risk. Strangers may pretend or use
siblings their identity to dupe you.
Your Address Hopefully, you answered “NO” to this one. Giving the
internet your number is one thing; giving them your
15
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
LECTURE 2
10 RULES of NETIQUETTE
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you
should not be doing online just like you can in real life.
You are still talking to a real person with feelings even though you
can’t see them.
LECTURE 3
INTERNET SECURITY
SECURITY REQUIREMENT TRIAD
Confidentiality
Integrity
Availability
18
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
INTERNET THREAT
There is no doubt that you need to be vigilant online. As the World Wide
Web has evolved over the years, many internet nasties have been playing on
vulnerabilities to attack computers and retrieve sensitive data from individuals.
Half the time, we aren’t even aware it is happening until it is too late. While the
internet is a fantastic place for communication and information, there are many
malicious threats you need to dodge along the way.
Spam
The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’
folder insinuates that spam emails are a huge issue, with more than 50% of emails
being syphoned into these folders. Aside from being an annoyance, spam emails
are not a direct threat. However, many can contain malware.
Adware
Adware is a type of malware software that displays unwanted ads when a
user is surfing the internet. The ads often redirect your searches to advertising
websites and collect marketing-type data about you, behind your back, which is
considered malicious.
Adware is often included in many shareware or freeware downloads as a
legitimate way of generating advertising revenues that help fund development.
However, some websites are infected with malicious adware that is automatically
downloaded to your computer. When this has been completed, Trojans can be
used.
Trojan
Trojans leave your computer completely unprotected, which can mean that
hackers can steal any data from your system. Trojans often present themselves as
harmless computer programmes so that hackers can penetrate your computer
without being detected.
19
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Virus
One of the most talked about internet threats is a virus. Viruses usually
attach themselves covertly to downloads as they are designed to spread at an
alarming rate. Viruses are often attached to files for download, shared via CDs,
DVDs, and USB sticks, or loaded on to computers by opening infected email
attachments.
Worms
Worms usually make their way on to a computer via a malicious email
attachment or USB stick. Once your computer has been infected by a worm, it will
likely send itself to every email address logged in your system. To the receiver,
your email will appear harmless, until they open it and are infected by the same
worm.
Phishing
In its simplest terms, phishing is a form of fraudulent activity. More often
than not, official-looking e-mails are sent impersonating a well-known provider,
such as a bank. These e-mails are sent to acquire people’s passwords and credit
card details.
Spyware
Another form of malware is spyware. Spyware is an all-encompassing
internet nasty and is usually attached to pop-ups of downloadable files. Once
installed on your computer, spyware can monitor your keystrokes, read and delete
your files, reformat your hard drive, and access your applications. Whoever is
controlling the spyware has access to your personal details without you even
knowing.
Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard actions.
Most keyloggers will be looking for distinguishable key entries, such as bank card
details and passwords. Keylogging is often linked to identity and intellectual
property theft.
Pharming
Pharming is a more complex version of phishing that exploits the DNS
system. Pharmers often create web pages mimicking that of a trustworthy
20
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
business, such as an online banking log-in page. Users will then enter their details,
thinking they are logging in to their usual service, and their details will be stolen
by the pharmer.
LECTURE 4
21
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
In the past, doing something embarrassing was not much that big deal. It
happened. It happened, people would laugh at it, and they would move on.
Nowadays, embarrassing moments are captured using any device you could
imagine. What is worse is that people can easily upload it on the Internet where it
can be stored forever. This could impact not only your reputation but also the
people around you. What is worse is that people tend to ignore this fact, and suffer
it later in their life.
Once you post something in the Internet, search engines keep them in their
archives for search results. This makes anything you post to last forever even if
you delete it in your page. Something you and your friends find funny today may
be something that could harm someone’s reputation later.
22
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
2. Your friends depend on you to protect their reputation online. Talk to you
friends about this serious responsibility
4. Avoid using
names.
Names are
easy for search engines to scan.
LECTURE 5
Keyword searching
Enter terms to search.
23
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Use quotation marks to search as a phrase and keep the words linked
together.
Common words are ignored (That, to, which, a, the …) + and – can be
used to include or exclude a word
Boolean
AND – enter words connect with AND- it will include sites where both
words and found.
Uses: joining different topics (i.e. global warming AND
California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR
greenhouse effect)
NOT – searches for the first term and excludes sites that have the
second term. (i.e. Washington NOT school)
Question
A question may be entered in the search field of search engine
Advanced
Features are offered on many engines by going to an “Advanced search”
page and making selections. Effective in narrowing search returns to a
specific topic or phrase.
The learner will utilize the use of advance word processing skills in an effective way.
24
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Learning Targets:
1. Use some advanced capabilities of Microsoft Word commonly used to
increase productivity and efficiency;
2. Effectively use these features to help improve the productivity of an
organization through maximizing the potential of MS Word
3. Create form letters or documents for distribution to various recipients;
4. Create media-rich documents for printing and publishing;
LET’S BEGIN!!!
Scenario: You were tasked to create and send for
for a promo campaign of our school. You were also
10 names of our supporters to send these invitation
From the scenario above, describe briefly how you
would most likely complete the task of sending
ten invitations with individual names of
recipients using Microsoft Word 2013.
LECTURE 1
In the professional world, sending information to
convey important messages is vital. Because of ICT,
things are now sent much faster than the traditional
newsletter or postal mail. You can now use the Internet to
send information you need to share. What if we could still
do things much faster – an automated way of creating and
sending uniform letters with different recipients? Would
that not be more convenient? 25
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Mail Merge
In this lesson, you will learn one of the most powerful and commonly used
features of Microsoft Word called “mail merge.” As the name suggests, this feature
allows you to create documents and combine or merge them with another
document or data file. It is commonly used when sending out advertising materials
to various recipients.
The simplest solution for the scenario before is create a document and just
copy and paste it several times then just replace the details depending to whom
you will send it. But what if you have hundreds and thousands of recipients?
Surely, it would take many hours to do so. What if you have a small database of
information where you can automatically generate those letters?
26
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
1. Form Document
The first component of our mail merged document is the form
document. It is generally the document that contains the main body of the
message we want to convey or send. The main body of the message is the
part of the form document that remains the same no matter whom you send
it to from among your list.
28
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Label Generation
Included in the mail merge feature on Microsoft Word is the Label
Generator. It just makes sense that after you print out your form letters, you will
need to send it to individual recipients in an envelope with the matching address
printed directly on the envelope or on a mailing label to stick on. By using virtually
the same process as a standard mail merge, Microsoft Word will print individual
addresses to a standard form that it has already pre-formatted. Simply put, it
creates a blank form document that simulates either a blank label or envelope of
pre-defined size and will use the data file that you selected to print the
information, typically individual addresses. So even in generating labels, the two
essential components of creating a merged documents are present: the form
29
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
document and the data file. Only in this case, you did not have to type or create the
form document yourself because it was already created and pre-formatted in
Microsoft Word. All you need to do is select the correct or appropriate size for the
label or envelope and select the data file that contains the addresses (data) to be
printed. You can also preview your merged labels before printing if you want to.
30
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Now that we have learned the components needed to accomplish a successful mail
merge, let us put theory into practice. Take a look at the steps in creating a simple
mail merge document.
Following our scenario, do the following steps to create and merge a simple
cover letter with a list of names tasked to send the letters to. To prepare for this
activity, let us build a list of at least ten names of people with their corresponding
title, company name, and address. You may use the following fields: title, name,
company address line 1, address line 2, and address line 3.
31
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
6. On the Mailings tab, go to Star Mail Merge group and choose Select
Recipients > Type a New List
7. Click the Customize Column button on the dialogue box to customize
the address list. This will allow you to modify the fields in the address
list that MS Word has pre-determined.
8. Select the field that you do not need then click the Delete button. A
confirmation dialog box appears.
9. Click Yes in the confirmation dialog box. The dialog box closes, and the
unnecessary fields disappears.
10. Repeat steps 8 and 9 for each field you do not need. After removing the
excess fields, the next step is to add the fields you need.
11. To add a field that you need in your document, click the Add button.
12. Type the field name on the prompt inside a small Add Field dialog box
and click the OK button.
13. Repeat steps 11 and 12 for each new field you need in your main
document.
14. Click the OK button on the Customize Address list dialog box to
confirm your changes.
15. The New Address List dialog box will appear again, ready for you to
type in your data.
16. Type the individual data from your list corresponding to Name,
Company, Address Line 1, Address Line 2, Address Line 3, and Title
17. Press the Tab key each time to enter the next field.
18. To add a new record, press Tab key after inputting the last field. When
you press the Tab key on the last field in a record, a new record is
automatically created and added on the next line.
19. Repeat steps 16 through 18 until you enter all the records you want.
Once you are done typing your data, click the OK button on the Add
New List dialog box to save your data. A special Save Address List
dialog box pops up, allowing you to save the recipient list.
20. Type a name for the address list. Name it “Client List.”
21. Click the Save button. You should be back on your main document
after.
32
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
24. Choose the proper field to insert into your text. For example, if you are
replacing the text “NAME” in your form document with the NAME
field, choose the Name field from the Insert Merge Field menu. This
field will be inserted into your document and replaces the ALL CAPS
text.
25. Continue adding fields until the document is complete. Repeat steps 22
to 24 as necessary to stick all fields into your document.
26. Save the form document.
27. Choose Finish & Merge > Send Email Messages to edit, print, or send
your merged documents through email.
28. Or you may want to choose Preview Results to check your work before
you send it.
29. You will get a merged document.
If you decide to print the document, choose the Finish & Merge > Print
Documents. The Merge to Printer dialog box will appear from which you can
choose records to print. Choose All to print your entire documents. Alternatively,
you can specify which records to print. Click OK. The traditional Print dialog box
appears. Click the OK button again to print your documents.
LECTURE 2
in a Word document and its characteristics can help you create a more efficient,
richer document not only in content but also in physical form. A better
understanding of the physical form of your document as well as the different
materials you would integrate in it would allow you to be more efficient and
versatile in using Microsoft Word.
KINDS OF MATERIALS
1.
Pictures
Generally, these are electronic or digital pictures or photographs you have
saved in any local storage device. There are three commonly used types of picture
files. You can identify them by the extension on their file names.
a. .JPG/JPEG
This is pronounced as “jay-
peg” and is the short form of .jpeg or
Joint Photographic Experts Group.
Like all the rest of the image file
extensions, it identifies the kind of
data compression process that it uses
to make it more compatible and
portable through the Internet. This
type of image file can support 16.7
million colors that is why it is suitable
for use when working with full color
photographic images. Unfortunately,
it does not support transparency and
therefore, images of this file type can be difficult to integrate in terms of blending
with other materials or elements in your document. But if you are looking for the
best quality image to integrate with your document then this is the image file type
34
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
for you. .JPG does not work well on lettering, line drawings, or simple graphics.
.JPG images are relatively small in file size.
b. .GIF
This stands for Graphics Interchange Format. This type of image file is
capable of displaying transparencies. Therefore, it is good for blending with
other materials or elements in your document. It is also capable of displaying
simple animation. Apparently, this may not be too useful on a printed
document but if you are sending documents electronically or through email,
or even post documents into a
website, then this could be
quite impressive. The downside
is that it can only support up to
256 colors so it is good mostly
on logos and art decors with
very limited, and generally
solid colors. .GIF is much better
for logos, drawings, small text,
black and white images, or low-
resolution files. Example of a .gif format picture.
c. .PNG
This is pronounced as “ping“. It stands for Portable Network Graphics.
It was built around the capabilities
of .GIF. Its development was basically
for the purpose of transporting
images on the Internet at faster rates.
It is also good with transparencies but
unlike .GIFs, it does not support
animation but it can display up to 16
million colors, so image quality for
this image file type is also remarkably
35
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
3. Shapes
These are printable objects or materials that you can integrate in your
document to enhance its appearance or allow you to have some tools to use for
composing and representing ideas or messages. If you are designing the layout for
a poster or other
graphic material for
advertising, you
might find this
useful.
36
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
4. Smart Art
Generally, these are predefined sets of different shapes grouped together to
form ideas that are organizational or structural in nature. If you want to
graphically represent an organization,
process, relationships, or flow for
infographic documents, then you will
find this easy and handy to use.
SmartArt Sample
5. Chart
Another type of material that you can integrate in your Word document
that allows you to represent data characteristics and trends. This is quite useful
when you are preparing reports that correlate and present data in a graphical
manner. You can create charts that can be
integrate in your document either directly in
Microsoft Word or imported from external
files like Microsoft Excel.
37
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Chart Sample
6. Screenshot
Sometimes, creating reports or manuals for training or
procedures will require the integration of a more realistic
image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot.
Microsoft Word even provides a snipping tool for your screen
shots so you can select and display only the part that you
exactly like to capture on your screen.
IMAGE PLACEMENT
38
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
2. Square
This setting allows the image you inserted to be placed anywhere within
the paragraph with the text going around the image in a square pattern like a
frame.
3. Tight
This is the almost the same as the Square setting, but here the text “hugs”
or conforms to the general shape of the image. This allows you to get a more
creative effect on your document. This setting can mostly be achieved if you are
using an image that supports transparency like a .GIF or .PNG file.
4. Through
This setting allows the text on your document to flow even tighter, taking
the contours and shape of the image. Again, this can be best used with a .GIF or
.PNG type of image.
6. Behind Text
39
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
7. In Front of Text
As it suggests, this
setting allows your image
to be placed right on top of
the text as if your image
was dropped right on it.
That means whatever part
of the text you placed the
image on, it will be covered
by the image.
LECTURE 3
MICROSOFT EXCEL
FUNCTIONS
BASIC MATH OPERATIONS:
• =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the
numbers within the range)
• =PRODUCT(x,y) – returns the product of x and y
• =QUOTIENT(x,y) – returns the quotient of x divided by y
• =x-y – returns the difference of x subtracted by y
• =x+y – returns the sum of x and y
• =x*y – returns the product of x and y
• =x/y – returns the quotient of x divided by y
• =x-y – returns the difference of x subtracted by y
OTHER FUNCTIONS:
• =ABS(x) – returns the absolute value of x
• =AVERAGE(x,y) – returns the average of x and y
• =CONCATENATE(x,y) – joins x and y
• =IF(Condition, x, y) – returns x if the condition is true, else it returns y
41
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
LECTURE 4
about these tips: they will improve your presentation skills and allow you to
communicate your message successfully.
2)Inserting Shapes
4)Slide Transitions
5)Adding Animations
1. Minimize:
Keep slides counts to a minimum to maintain a clear message and to keep
the audience attentive. Remember that the presentation is just a visual aid.
Most information should still come from the reporter.
2. Clarity:
Avoid being to fancy by using font style that is easy to read. Make sure that
it is also big enough to be read by the audience. Once you start making
your presentation, consider how big the screen is during your report.
3. Simplicity:
Use bullets or short sentences. Summarize the information on the screen to
have your audience focus on what the speaker is saying than on reading the
slide. Limit the content to six lines and seven words per line. This is known
as the 6 x 7 rule.
4. Visual:
Use graphics to help in your presentation but not too many to distract the
audience. In addition, instead of using table of data, use charts and graphs.
5. Consistency:
43
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Make your design uniform. Avoid having different font styles and
backgrounds.
6. Contrast:
Use a light font on dark background or vice versa. This is done so that it is
easier to read. In most instances, it is easier to read on screen if the
background is dark. This is due to the brightness of the screen.
Learning Targets:
1. Enumerate the basic principles of graphics and layout.
2. Create a simple infographic using web tool tools
3. Utilize several file formats used on the web
4. Easily manipulate images using a simple image editor, and
5. Upload and share images using any social media
platform.
LET’S BEGIN!!!
44
IMMACULATE HEART OF MARY ACADEMY, INC.
For you, “What is the most vis
MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro website in the world?”
Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
LECTURE 1
Creating a web page is like creating a work of art. There are certain things
that you need to consider in order to get your message across.
Movement
Proportion
46
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
LECTURE 2
PHOTO EDITING
Photo editing encompasses the processes of
altering images, whether they are digital
photographs, traditional photo chemical
photographs, or illustrations. Traditional analog
image editing is known as photo retouching,
using tools such as an airbrush to modify
photographs, or editing illustrations with any
traditional art medium.
2. VECTOR IMAGES such as Adobe Illustrator, Inkscape and etc. are used to
create and modify vector images, which are stored as descriptions of lines,
Bezier curves and text instead of pixels.
IMAGE FORMATS
GIF a lossless format for image files that supports both animated and static
images.
.3ds is one of the file formats used by the Autodesk 3Ds Max 3D Modelling,
animation and rendering software.
50
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
51
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
colors appear more “pure.’’ As saturation decreases, colors appear more ‘’ washed-
out.’’
Adjusting contrast means adjusting brightness because they work together to make
a better image.
PHOTO MANIPULATION
Photo manipulation involves
transforming or altering a
photograph using various methods
and techniques to achieve desired
results. Some photo manipulations
are considered skillful artwork
while others are frowned upon as
unethical practices, especially when
used to deceive the public, such as
hat used for political propaganda ,
or to make a product or person look
better.
52
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
LECTURE 3
Infographics are important because they change the way people find
and experience stories. Infographics are being used to augment
editorial content on the web, it create a new way of seeing the world of
data, and they help communicate complex ideas in a clear and beautiful
way.
TYPES OF INFOGRAPHICS
1. Statistical
2. Process Flow
3. Geographic
1. Research
a) Know what is needed
b) Take a reference
c) Know the audience
d) Decide the type of infographics
2. Brainstorm
a)Gather ideas
b)Build thought process
3. Design
Choose your tool and start designing
53
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
4. Review
Cross check the data to deliver flawless output
5. Launch
Make it viral
Share on social network
1. Maintain a structure
2. Don’t use more than 3 color
palletes
3. Typography matters a lot
4. Include source and references
54
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Multimedia Presentation Rubric
NEEDS
EXCELLENT - SATISFACTORY
GOOD - 3 IMPROVEMENT
4 - 2
- 1
Subject knowledge is Subject knowledge is Some subject Subject knowledge is
evident throughout evident in much of knowledge is evident. not evident.
Subject the project. All the project. Most Some Information is Information is
Knowledge information is clear, information is clear, confusing, incorrect, confusing, incorrect, or
appropriate, and appropriate, and or flawed. flawed.
correct. correct.
Citing All sources are Most sources are Few sources are No sources are
Sources properly cited. properly cited. properly cited. properly cited.
55
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Reference:
56
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer
LEARNING MODULE IN ATS 5 S.Y. 2021-2022
EMPOWERMENT TECHNOLOGIES
Thank You!
57
IMMACULATE HEART OF MARY ACADEMY, INC. MR. JERSON L. GARCIA, LPT
Madrid Blvd., Pinamalayan, Oriental Mindoro Designer