Empowerment Technology
Empowerment Technology
Activity#1
Name: John Hansel B. Pacatang
Date: February 5 2022
I. Instructions: Enumerate the items related to each category. White your answer to the
corresponding column. (80 points)
1930’s Inventors Hardware and software in Notable persons in the area
present time of network and information
technology
• Charles Babbage • the Processor • William Henry Gates III
• Herman Hollerith • Memory Devices • Mark Elliot Zuckerberg
• Lady Ada Augusta Byron • Monitor • Steve Jobs,
• John Napier • Printer
• William Oughtred • Keyboard
• Alan Turing • Mouse • Tim Berners-Lee
• John Von Neumann • Central Processing Unit • James Gosling
• John Atanasoff • Linus Torvalds
• Clifford Berry • Ms Word • Richard Stallman
• John W. Mauchly • Excel • Arthur C Clark
• J. Presper Eckert • Power • Ted Codd
• Howard Aiken • Point • Steve Shirley
• Douglas C. Engelbart • Google Chrome • Martha Lane Fox
• Blaise Pascal • Photoshop
• MySQL
• Fire Fox
• Zoom
II. Illustrate the data processing cycle. Explain each component or phrase. (100 points)
1) COLLECTION- The first step or phrase of the data processing cycle is all about the
collection of raw data. The type of raw data that is collected will have a
huge impact on the output that will be produced. So that the results are
legitimate and useable, raw data should be acquired from well-defined and
reliable sources. Financial information, data about a number of industries,
company's profit/loss accounts, website cookies, user activity, and etc., is
examples of raw data.
2) PREPARATION- For the second step of the data processing cycle it’s time to sort and filter
the data that will finally be used as input, this step is called this preparation.
In this stage you are required to sort and filter any of the extra or unusable
data that you have collected to make the processing faster and yield better
results. This will ensure that only the highest quality data is fed into the
processing unit.
3) INPUT- When you have collected and filtered out the data it’s time to input that data.
Input is essentially the TRUE first step of the data processing cycle along
next to it would be processing and then output. In this step, the raw data is
converted into a computer and fed into a processing unit. This can be in the
form of you typing the data with a keyboard, scanning the data or any other
input procedure. Remember to be careful on what you input because the
software follows the classical rule of “what come in, comes out”
4) PROCESSING- In this step the data that you input will be processed by an electronic data
processor or it will be processed by various data processing methods
using machine learning and artificial intelligence algorithms to generate a
desirable output. This step will vary depending on the type or how complex
the data that you inputted is. The step of preparation is done so that the
processing step of the cycle can be done faster. Raw data cannot be
understood what’s why it needs to be processed which is done in this step.
5) OUTPUT- Once the data is processed it will display to the user in forms of readable
content such as tables, vector files, graphs, videos, audio, documents, and
etc., After receiving the result or output, it might be further processed or
interpreted. This is done by the user or software to further the value of the
output. These outputs can be used directly in presentations and can be put in
records.
6) STORAGE- Storage is the last and final step of the data processing cycle. When you
received the output of the data you can now store/save the data on records or
archives for further/future use. This can enable quick access and retrieval of
information whenever it is needed, and it also allows it to be used as input in
the next data processing cycle.
Activity#2
Name: John Hansel B, Pacatang
Date: February 5 2022
I. Instructions: Identification: Write your answer on the space provided. (15 points)
Answer:
1. Internet Protocol
2. File Transfer Protocol
3. Transmission Control Protocol / Internet Protocol (TCP/IP)
4. Web Browser
5. Firewall
6. Webpage
7. Website
8. Group discussion
9. Bandwidth
10. Chat
11. World Wide Web (WWW)
12. Universal Resource Locator (URL)
13. Upload
14. Electronic Mail (E-Mail)
15. Upstream
Answer:
WAYS TO PREVENT COMPUTER VIRUS INFECTION:
With the advancement of technology and software there has also been a rise of computer
viruses attacking and affecting multiple user’s data, and software security. These victims have
experienced their data being breach, their files corrupted, damaged their programs, reformat or
erase their hard drives containing variable information which can results in a reduction of the
computers system performance and can even result in crashing your system entirely. But there
are many ways to prevent that from happening, there are many ways for you to save and protect
your computer or devices from computer viruses. Here are some ways to prevent your computer
from getting a virus infection.
One of first easy ways to protect your computer from viruses is to have strong
passwords. It’s very simple advice yet a very crucial one. People like to make passwords simple
and easy to remember but making your password simple would also make it easier for hackers to
guess your password and install viruses on your devices. So it’s very important to have a secure
and complex password with different capital letters, symbols and numbers. Keep your data safe
by creating unique combinations of complex passwords. The best passwords include a mix of
numbers, letters, and symbols and are at least 8 characters long. Another tip to keep in mind is to
avoid using the same username and password combination across multiple sites. If a hacker can
access just one site, Then you basically just gave that hacker full access of everything with a high
possibility of that person installing a virus on your computer.
The next advice to prevent computer viruses from accessing your computer is to install
and rely on Anti-Virus software. Antivirus software acts as a “vaccine” against virtual viruses.
It can identify and eliminate the threat before you were even aware of it. Microsoft Security
Essentials and Avast are both free antivirus programs you can install. Anti-virus is important and
will be very helpful in keeping you safe from viruses, but there is still a possibility for the virus
to slip through the cracks and get downloaded to your computer. It can sometimes wander
around in your network, and it’s very likely that you’re unaware of its presence. In order to make
sure viruses don’t get the opportunity to spread further through your network and to minimize
the damage, a weekly malware scan should be scheduled. Many of these programs are easy,
affordable and sometimes even free and they can be used in combination with a backup, so to
ensure no malicious files are backed up with your other files. You can also use a Firewall. Using
antivirus programs doesn’t automatically mean you have a firewall. Macs and PCs both come
with pre-installed firewall software. Make sure it’s enabled to provide an extra layer of
protection from viruses and malware.
Another way to prevent your computer from contacting a virus is to avoid suspicious
web sites. There are more than trillions of websites that can be found on the internet. We spend
a lot of time on the internet, doing google searches, research, shopping, playing, chatting, etc.,
and it all requires us to visit a huge variety of websites and some of these websites might just be
a little bit suspicious. While there are a number of guidelines that ensure you are at the very least
warned that you are about to access an unsecured and potentially harmful website, Hackers/
Cyber criminals have been a bit creative recently and developed methods to deceive those
guidelines and will try to appear as a legitimate website. It's not easy to tell if a website contains
dangerous data right away. It's all in the details. Here is some advice, Make a note of the
website's URL and double-check with the official source to see whether the website is legitimate
and make sure it appears what it appears to be. The lock icon next to a URL, while obvious, is
one of the first clues that you're on a potentially dangerous website. Also take note to not
simply connect to public Wi-Fi, the problem with public WI-FI is that it gives hackers the
ability to position themselves between you and the connection point. So instead of talking
directly with the hotspot or server, you're sending your information to the hacker. Hackers can
also use public/unsecured Wi-Fi connections to distribute viruses into your computer. If you
allow file-sharing across a network, the hacker can easily plant infected software on your
computer.
Overall, those are some ways to prevent a computer virus infection. Though, every day,
there are more cyber security threats that are released into the wild. While it’s impossible to have
a perfect virus protection strategy, the advice detailed above will help to minimize infection and
increase the quality of your operations. And as a final advice, make sure to keep updated on your
programs and real world cyber security news. Everyday technology advances, and everyday
people are trying to make the internet more secure but viruses and hackers are also advancing
every day to keep up with the times. They make new strategies to install malware and breach
data just as how companies are trying to make their websites and services more secure. Past
strategies for malware that can infect your computer might become out-dated but new ones will
come up. That is why it’s also very important to be aware of your surroundings and keep
yourself educated with the news. Remember that we live in the information age, an era with
continuous and rapid advancement.
Activity #3 (ADVANCE SPREADSHEET SKILLS)(50 points)
Name: John Hansel B. Pacatang
Date: February 5, 2022
I. Instructions: Create a grading system that will display a remark according to grade intervals.
Use IF Function for the remarks
Note: The file must be in the .xlsx format. Before uploading, double-check the file
*Base your remarks on the grades table below.
Answer: The file has been sent in .xlsx format together with this Word Document in google
classroom.
Answer:
Activity #5
I. Multiple Choice: Circle the letter that corresponds to the correct answer.
1) a.
2) a.
3) c.
4) b.
5) c.
6) b.
7) a.
8) c.
9) a.
10) b.
11) a.
12) c.
13) b.
14) d.
15) d.
3. When do images or graphics in Microsoft® Word hurt the document rather than help?
Answer:
It would hurt rather than help when the picture, images, or graphics are far bigger/larger and
takes more space than needed. Picture, images, and graphics in a document should always be
there to clarify the text or help support it by giving it a visual representation. It should not
outshine/overshadow the words that are written.