0% found this document useful (0 votes)
6 views

ITEC finals notes

Uploaded by

keidarling03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

ITEC finals notes

Uploaded by

keidarling03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Lesson 4.

1: The Basics: How go to the very last row of a blank worksheet,


Spreadsheets Work press the ‘End’ key on the keyboard
followed by the down arrow key. To go to
SPREADSHEET - Traditionally, it was simply a the very last column, press ‘End’ then the
grid of rows and columns, printed on special right arrow key. Pressing the ‘Home’ key will
light-green paper, that was used to produce go to the first column of the worksheet.
financial projections and reports.
DANIEL BRICKLIN (1978) – created the first
electronic spreadsheet (VisiCalc), now called CELLS: WHERE COLUMNS & ROWS MEET
simply a spreadsheet. The spreadsheet Each worksheet has more than 17 million
allows users to create tables and financial cells.
schedules by entering data and formulas
into rows and columns arranged as a grid on • CELLS & CELL ADDRESSES: A cell is the
a display screen place where a row and a column intersect;
its position is called a cell address. For
example, “A1” is the cell address for the top
HOW A SPREADSHEET IS ORGANIZED left cell, where column A and row 1
intersect.
A spreadsheet’s arrangement of columns,
rows, and labels is called a worksheet. • RANGES: A range is a group of adjacent
cells–for example, A1 to A5.
• COLUMN HEADINGS: In the worksheet’s
frame area (work area), lettered column • VALUES: A number or date entered in a
headings appear across the top (“A” is the cell is called a value. The values are the
name of the first column, “B” the second, actual numbers used in the spreadsheet –
and so on). pesos, percentages, grade points,
temperatures, or whatever. Headings,
• ROW HEADINGS: Numbered row headings labels, and formulas also go into cells. To
appear down the left side (“1” is the name have number values treated as text instead,
of the first row, “2” the second, and so the number must be preceded by an
forth). apostrophe (‘).
• LABELS: Labels are any descriptive text • CELL POINTER: A cell pointer, or
that identifies categories, such as APRIL, spreadsheet cursor, indicates where data is
RENT, or GROSS SALES. to be entered. The cell pointer can be
You use your computer’s keyboard to type moved around like a cursor in a word
in the various headings and labels. Each MS processing program.
Office worksheet has 16,384 columns and • MERGE CELLS: Multiple adjacent cells can
1,048,576 rows, and each spreadsheet file be merged to have one cell span multiple
can technically hold up to 650 related rows, or multiple columns. The contents of
worksheets–but the computer’s memory only one cell (the upper-left cell) appear in
will not likely hold more than about 200. To the merged cell. The contents of the other
cells that you merge are deleted. After work required to manually rework paper
merging cells, you can split a merged cell spreadsheets has become a thing of the
into separate cells again. past
• WHAT-IF ANALYSIS: allows the user to see
how changing one or more numbers
LESSON 4.2: FORMULAS, FUNCTIONS, AND
changes the outcome of the calculation.
CREATING CHARTS
That is, you can create a worksheet, putting
• FORMULAS: Formulas are instructions for in formulas and numbers, and then ask,
calculations; they define how one cell “What would happen if we change that
relates to other cells. For example, a detail?”–and immediately see the effect on
formula might be = A5+A15), meaning “add the bottom line.
the numbers in the cells with cell addresses
A5 and A15.”
WORKSHEET TEMPLATES – Worksheet
• FUNCTIONS: Functions are built-in
templates are forms containing formats and
formulas that perform common
formulas custom-designed for particular
calculations. For instance, a function might
kinds of work. Examples are templates for
average a range of numbers or round off a
calculating loan payments, tracking travel
number to two decimal places.
expenses, monitoring personal budgets, and
• CELL REFERENCING: Cell addresses can keeping track of time worked on projects.
also be typed in the formula bar. The Templates are also available for a variety of
application will consider the value business needs – providing sales quotations,
contained within the particular cell address. invoicing customers, creating purchase
There are two types of cell referencing: orders, and writing a business plan.

 RELATIVE REFERENCING – adjusts MULTIDIMENSIONAL SPREADSHEETS. Most


the cell addresses as you are spreadsheet applications are
dragging the auto-fill handle while multidimensional, meaning that you can link
filling in certain cells. one spreadsheet to another. a three-
 ABSOLUTE REFERENCING – locks on dimensional spreadsheet, for example, is
to the particular cell address as you like a stack of spreadsheets all connected by
are filling in the cells. This is done by formulas. A change made in one
inserting the dollar sign ($) in the spreadsheet automatically affects the other
cell address, as in, $A$1, $B$25, and spreadsheets.
$F$4.
WORKING WITH FORMULAS AND
• RECALCULATION: Recalculation is the FUNCTIONS
process of recomputing values, either as an
Formulas and functions help with speeding
ongoing process as data is entered or
up calculations especially if there is so much
afterward, with the press of a key. With this
numerical data. Cell referencing is usually
simple feature, the hours of mind-numbing
utilized along with formulas and functions
so that any recalculations are reflected
instantly. The auto-fill handle is also used to
fill adjacent cells automatically with a
formula or function. If cell referencing was
used, the cell addresses will also be
adjusted.
FORMULAS – begin with the equal (=) sign.
It can be used when computing with actual
numbers, as in Figure 1. However, its
efficiency is displayed when it’s being used
together with cell referencing. In Figure 2,
relative referencing is used. Just use the cell
addresses in the computation in place of the
actual numbers. When there is a lot of the
same computation to be done in contiguous
When filling cells, there will be occasions
cells, the auto-fill handle can be dragged.
when you do not want a cell reference to
This method automatically adjusts the cell
alter. Unlike relative references, when
addresses similarly based on the
copied or filled in, absolute references do
relationship between the cell addresses of
not change. To hold a row/column constant,
the first highlighted cells
place a dollar sign preceding the row or
column that you want to stay the same, as
in $A$2, A$2, or $A2.

FUNCTIONS – Electronic spreadsheets come


with a set of functions that needs
parameters in order for it to perform the
computation. For example, instead of using
a formula to computer for the sum of
multiple numbers, one can simply use the
sum function which produces the same
result. In Figure 3, the SUM function needs
numbers separated by a comma in order to
calculate the sum of these numbers.
Different functions require different sets of
parameters. For example, the IF function
requires three parameters separated by a
comma. The first one is a logical expression
that will be evaluated. When the logical
expression is true, the second parameter
will be shown on the cell. But when the BASIC EXCEL FUNCTIONS
expression is false, the third parameter will
Use ~ for subtraction, use / for division
be reflected. Cell referencing can also be
used together with functions which makes it SUM () - used to get the sum for a given
all the more powerful. range of cells

examples:

=sum(B1,B2,B7) or =B1+B2+B7

PRODUCT() - used to get the product for a


given range of cells

=product (C4, C9, C13) or =C4*C9*C13

AVERAGE()

→ used to get the average for a given range


ANALYTICAL GRAPHICS: CREATING CHARTS of cells
Analytical graphics, or business graphics, are =average (B2, B5, B7)
graphical forms that make numeric data
easier to analyze than it is when organized COUNT()
as rows and columns of numbers. → used to count the numeric entries for a
Examples of ANALYTICAL GRAPHICS ARE given range of cells
COLUMN CHARTS, BAR CHARTS, LINE
=count (B2, B5, B7)
GRAPHS, PIE CHARTS, AND SCATTER
CHARTS. If you have a color printer, these MAX()
charts can appear in color. In addition, they
→ used to get the largest number in a given
can be displayed or printed out so that they
look three dimensional. Spreadsheets can range of
even be linked to more exciting graphics, cells
such as digitized maps.
=max(B2, B5, B7)

MIN()

→ used to get the lowest value in a given


range of cells

=min(B2, B5, 87)


IF() =VLOOKUP(AP14,transmute!
$A$1:$B10$1,2))
checks whether a condition is met and
returns a value if the condition is TRUE and
another value if the condition is FALSE LESSON 5.1: SLIDE DESIGN AND ELEMENTS,
→format: AND ANIMATION AND MEDIA

=IF(condition, VALUE IF FALSE) You may already be accustomed to seeing


presentation graphics because many college
→ example: instructors now use such software to
accompany their lectures. Well-known
=IF(A7>=75, "PASSED", "FAILED")
presentation graphics packages include
COUNTIF() Microsoft PowerPoint, Corel Presentations,
OpenOffice Impress, Apple Keynote, Google
→counts the number of cells that satisfies
Slides, Prezi, and SlideShare.
the given condition
Presentation graphics packages often come
→ format: with slide sorters, which group together a
=COUNTIF(RANGE OF CELLS, CONDITION) dozen or so slides in miniature (Figure 1).
The person making the presentation can use
=COUNTIF(A1:A7, "PASSED") a mouse or a keyboard to bring the slides up
for viewing or even start a self-running
ROUND()
electronic slide show. You can also use a
→ rounds a number to a specified number projection system from the computer itself.
of digits →
TABS with command groups
format: OUTLINE VIEW helps you organize the
=ROUND(CELL ADDRESS, NUMBER OF content of your material in standard outline
DECIMALS) form.

=ROUND(A7, 2) SLIDE VIEW shows you what a single slide


looks like
VLOOKUP()
SLIDE SORTER VIEW displays all the slides as
searches for a value in the leftmost column miniatures.
in a table and returns a value in the same
NOTES PAGE VIEW shows a small version of
row from the column specified in the table
the slide plus the notes you will be using as
→ format: speaker notes.
=VLOOKUP(LOOK_UP_VALUE, TABLE ARRAY,
COLUMN_INDEX_NUMBER,
RANGE_LOOKUP)
PowerPoint provides three types of networks and media sharing. The common
movements: Entrance, emphasis, and exit of theme of all these is human interaction.
elements on a slide itself are controlled by
what PowerPoint CALLS CUSTOM
ANIMATIONS. TRANSITIONS are FACEBOOK, MYSPACE, & OTHER SOCIAL-
movements between slides. NETWORKING WEBSITES
Just as word processing programs offer A SOCIAL-NETWORKING WEBSITE is an
templates for faxes, business letters, and online community that allows members to
the like, presentation graphics programs keep track of their friends and share photos,
offer templates to help you organize your videos, music, stories, and ideas with other
presentation, whether it’s for a roomful of registered members. Social-networking
people or over the internet. Templates are websites are led by Facebook and MySpace
of two types: design and content. but also include business-contact site
LinkedIn.
• DESIGN TEMPLATES: These offer formats,
layouts, background patterns, and color YouTube, Instagram, & Other Media-Sharing
schemes that can apply to general forms of Websites
content material.
A MEDIA-SHARING WEBSITE is a type of
• CONTENT TEMPLATES: These offer online social network in which members
formats for specific subjects. For instance, share media such as photos, videos, and
PowerPoint offers templates for “Selling music. The most popular example is
Your Ideas,” “Facilitating a Meeting,” and YouTube, but others are Flickr, Instagram,
“Motivating a Team.” and Pinterest.
Twitter & Tumblr Social Networking &
Microblogging Services
DRESSING UP YOUR PRESENTATION
As you and your friends track each other’s
every moment, you can also use services
LESSON 6.1: WEB 2.0 & THE SOCIAL WEB, such as Twitter and Tumblr to do
SOCIAL MEDIA ETHICS “THOUGHTCASTING” OR
“MICROBLOGGING” – send a text message
We come to what is known as Web 2.0,
from your mobile phone, which your friends
which can be defined as the move toward a
will receive on the web/IM or on their
more social, collaborative, interactive, and
phones. (The phenomenon is called
responsive web. As websites have become
microblogging, because messages have to
easier to use, they allow users to better
be short, 140 characters or less, owing to
harness the collective power of people,
length restrictions on text messaging.)
which has led to a “social web” or “social
Tumblr lets you express yourself using
media,” involving not only blogs and wikis
multiple media, but in a way that’s easier
(for sharing information) but also social
than using traditional blog software.
INSTANT MESSAGING PLATFORMS phone; after a while people will wonder
why you’re unavailable. Buddy lists or other
Instant messages are like a cross between
contact lists can also become very in-
email and phone, allowing communication
groupish. When that happens, people are
that is far speedier than conventional email.
distracted from their work as they worry
With instant messaging (IM), any user on a
about staying current with their circle (or
given platform can send a message and
being shut out of one).
have it pop up instantly on the screen of
anyone else logged onto that platform. As
soon as you use your computer or portable
SOCIAL MEDIA ETHICS AND ETIQUETTE
device to connect to the internet and log on
to your IM account, you see a buddy list (or In social media, the right ethics equals the
contacts list), a list you have created that right viewpoint and the right thinking on
consists of other IM users you want to how to better exploit social media and how
communicate with. If all parties agree, they to involve individuals in the right way. The
can initiate online typed conversations in right etiquette in social media is equivalent
real time (in a “chat room”). The messages to acting the right way. There’s certainly the
appear on the display screen so that users best way to use the social media. The three
can exchange messages almost core social media ethics and etiquette
instantaneously while operating other concepts are:
programs.
1. AUTHENTICITY – it means that when you
are honest, people react positively.
GETTING INSTANT-MESSAGING CAPABILITY 2. TRANSPARENCY – hidden motives are
only going to count against you.
Examples of present instant-message
systems are Facebook Messenger, 3. COMMUNICATION – getting to know
WhatsApp, WeChat, Line, Snapchat, and individuals as individuals and making them
Telegram. To get instant messaging, which is know you.
often free, you download software and
register with the service, providing it with a
username and password. When your GET ALONG IN SOCIAL MEDIA
computer or portable device is connected to
Intense dislike is not proper. Its intensity
the internet, the software checks in with a
denotes something that is more than
central server, which verifies your identity
normal. In general, it is an opinion not
and looks to see if any of your “buddies” are
based on experience or perhaps, limited
also online. You can then start a
experience. It follows that it must be based
conversation by sending a message to any
on something else if it’s a first time. It is not
buddy currently online.
worth letting it stop us in most cases and
You can turn off your instant messages, but can be hard to identify.
that is like turning off the ringer on your
Prejudice is unreasonable because it is not incorrect grammar, as in real life that we fix
based on actual experience. Stereotypes are things when they are wrong.
in fact popular in social media, funny for the
Wrong information that is entirely
most part and not intended as hate. Don’t
misinformation should be deleted. Fake
get offended. In any event, be nice. Accept
news is a real problem. False stories are
others for who they are and avoid harm.
spread on purpose. We can set ourselves
Don’t let someone hurt us by being nice.
apart. Be above it by acknowledging our
Alternatively, don’t cause pain by being
faults. We may delete our false content and
mean. Refrain from hateful activity online.
post the correct one afterwards. We may
also edit it and show updated information
regarding the post.
SOCIAL MEDIA DISINFORMATION
SOCIAL MEDIA ACCEPTANCE
Accuracy describes something that is
correct. It is a state of being. Information Our courteous manner in social media
that is accurate is correct. Social media has reflects positively on us. Alternatively, a
information that is not accurate. False negative association doesn’t say anything
information in social media is called a hoax good about us. It works both ways. ‘Hello’
because the content is generated from and ‘thank you’ show manners, respect, and
contacts. responsibility in social media. We may not
actively engage all of our friends but in
SOCIAL MEDIA CURSING
order to get engagement, we have to give it
Curse words are not appropriate online. On at first.
the other hand, reasonable complaints are
A particular point of regard for the feelings
appropriate. People often use the internet
is required. We take what others think and
to complain. In any event, a swear word is
feel into account before we engage. It is a
really just a word not sanctioned by religion,
quality of online friendship.
so it could apply to a lot of words which is
why some are not explicitly banned from SOCIAL NETWORK IMAGES
social media. But we should know better.
Images are easy for users to understand. We
Swearing is unacceptable in social media. It
get a good feeling from a happy picture.
is of an offensive nature. Swearing is
Text, on the other hand, takes some time to
something that trouble makers, trolls, do.
enjoy but pics are quick fun to look at.
They are disruptive and insulting.
A picture is worth a thousand words. A
SOCIAL MEDIA CORRECTIONS
thousand words equals to a lot of
To err is human. Spelling can be wrong for a comments. Post photos because they
lot of reasons; it is expected and acceptable encourage engagement through comments
but undesirable. Quick changes make by popular convention. Images tend to
content more attractive. Correct posts with receive more comments than text status
updates.
LESSON 6.2: DATA PRIVACY MANAGEMENT Key Roles in the Data Privacy Act Data
DATA PRIVACY Subject refers to an individual whose,
sensitive personal, or privileged information
DATA PRIVACY OR ALSO KNOWN AS “DATA
is processed.
SECURITY” relates to how, depending on its
relative value, a piece of information or data Personal Information Controller (PIC)
should be treated controls the processing of personal data, or
instructs another person or organization to
process personal data on its behalf.
CLASSIFICATIONS OF PERSONAL DATA
Personal Information Processor (PIP) refers
Personal information refers to any to the organization or individual whom a
information whether recorded in a material personal information controller may
form or not, outsource or instruct the processing of
personal data pertaining to a data subject.
Sensitive personal information refers to
sensitive data of an individual. This includes Data Protection Officer (DPO) is responsible
race, ethnic origin, marital status, and age. for the overall management of compliance
It also includes information provided to a to the Data Privacy Act.
person by some government agencies that
National Privacy Commission is an
includes, but is not limited to social security
independent body mandated to administer
numbers, previous or current health
and implement the Data Privacy Act of
records, license or its denials, suspension or
2012, and to monitor and ensure
revocation, and tax returns. It also includes
compliance of the country with
information specifically established by an
international standards set for personal data
executive order or an act of Congress to be
protection.
kept classified.

Principle of Transparency
DATA PRIVACY ACT OF 2012
A data subject must be aware of the nature,
The Data Privacy Act of 2012 is an act to
purpose, and extent of the processing of his
protect the fundamental human right of
or her personal data, including the risks and
privacy, of communication while ensuring
safeguards involved, the identity of personal
the free flow of information to promote
information controller, his or her rights as a
innovation and growth. The National
data subject, and how these can be
Privacy Commission (NPC) is a body that is
exercised. Any information and
mandated to administer and implement this
communication relating to the processing of
law. The functions of the NPC include: rule-
personal data should be easy to access and
making, advisory, public education,
understand, using clear and plain language.
compliance and monitoring, investigations
and complaints, and enforcement of the act.
Principle of Proportionality Turn off ‘Save Password’ Feature.
The processing of information shall be If you are using a public computer, do not
adequate, relevant, suitable, necessary, and save your password in the browser. The next
not excessive in relation to a declared and person who will use that computer may be
specified purpose. Personal data shall be able to log in using your account.
processed only if the purpose of the Purchasing or any financial transactions
processing could not reasonably be fulfilled must also be done carefully on a public
by other means. computer.
Disable any ‘Auto-Complete’ Settings.
IMPROVING SECURITY Some devices and applications have an
auto-complete feature which fills blank
Safeguard your passwords.
fields with appropriate information which
Do not use passwords, such as your name, you may have filled in or saved prior to a
address, phone number, or birthday, that transaction. This may be a problem since
relate to easily obtainable personal auto-complete may provide information
information, minimize using common without your consent.
words. At least eight alphanumeric
Keep devices under lock and key.
characters should be your passwords, mixed
with upper- and lowercase letters, numbers, Devices can now be locked which prevents
and symbols (“@”, “-“, “.”) and passwords unauthorized usage by other entities. This is
are case sensitive. especially convenient for portable devices
when not in use.
Protect online accounts.
Services or organizations that you provided
with your account information do not ask
for it again aside from during the account
registration process. Never give out your
account information to suspicious entities
otherwise, they may be able to use your
account for any malicious intent.
Don’t transact using public Wi-Fi.
These types of connections are usually free
and open (no password is needed to
connect). As such, a number of users may
be connected and are using the connection.
An identity thief, armed with special tools
and software might be monitoring your
actions on the same Wi-Fi network.

You might also like