Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Empowerment Technologies Module Week 1-4, Exercises of Computer science

Modular Learning for Grade 11 Students

Typology: Exercises

2019/2020
On special offer
30 Points
Discount

Limited-time offer


Uploaded on 09/19/2020

RalphJohn
RalphJohn 🇵🇭

5

(2)

1 document

Partial preview of the text

Download Empowerment Technologies Module Week 1-4 and more Exercises Computer science in PDF only on Docsity! 1 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 CONTENT STANDARD The learners demonstrate an understanding of Information Communication Technology (ICT) in the context of global communication for the Academic Track. PERFORMANCE STANDARD At the end of the two-week period, the learners should be able to independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and the academic track. CONTENT 1. The current state of ICT technologies (i.e., Web 2.0, 3.0, convergent technologies, social, mobile, and assistive media) 2. Online systems, functions, and platforms LEARNING COMPETENCIES Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges. WHAT TO KNOW? ICT– Information and Communication- • It deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save, send and edit information • Is a study of computers as data processing tools. It introduces students to the fundamental of using computer systems in an internet environment. ICT in the Philippines • Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT- related jobs, one of which is BPO, Business Process Outsourcing, or call centers. • ICT Department in the Philippines is responsible for the planning, development and promotion of the country’s information and communications technology (ICT) agenda in support of national development. Computer– an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. Internet– is the global system of interconnected computer networks that use the internet protocol suite (TCIP/IP) to link billions of devices worldwide. LESSON 1 What is Information and Communications Technology? 2 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 • Means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. • Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a network of networks in which the users at any one computer can get information from any other computer. World Wide Web • An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. • Is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. • Invented by Tim-Berners Lee Web Pages • Web page is a hypertext document connected to the World Wide Web. It is a document that is suitable for the World Wide Web. The different online platforms of World Wide Web: 1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web pages connected by hyperlinks. 2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website differently than others. – Allows users to interact with the page; instead of just reading the page, the user may be able to comment or create user account. 3. Web 3.0 – this platform is all about semantic web. – Aims to have machines (or servers) understand the user’s preferences to be able to deliver web content. Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be manipulated by the user. The content is also the same for all users that is referred to as Web 1.0 Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see website differently than others e.g. social networking sites, wikis, video sharing sites. FEATURES OF WEB 2.0 1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag. 2. Rich User Experience – content is dynamic and is responsive to user’s input 3. User Participation- The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon. 5 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 -Instead of running an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account doesn’t exist on your computer – it’s on the service’s computer cloud. It has three components 1. Client computers – clients are the device that the end user interact with cloud. 2. Distributed Servers – Often servers are in geographically different places, but server acts as if they are working next to each other. 3. Datacenters – It is collection of servers where application is placed and is accessed via Internet. TYPES OF CLOUDS PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public cloud may be less secured because of its openness, e.g. e-mail PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers increased security because of its private nature. COMMUNITY CLOUD allows systems and services to be accessible by group of organizations. HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud. WHAT TO PROCESS? Static vs. Dynamic Look for 5 websites and classify them as static or dynamic. What makes each websites static or dynamic? Use the table below. Website URL Static Dynamic Reason 6 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 What to Transfer? True of False: Write T if the sentence is correct; otherwise, write F on the blank before each item. _____1. Tim Berners-Lee created the World Wide Web. _____2. People Magazine conducted the research on “The Selfiest Cities in the World.” _____3. ICT deals with the use of different communications technology to locate, save, send, and edit information. _____4. Android is a mobile operating system for Apple devices _____5. Blogging sites are sites that focus on short updates from the user. CONTENT Online safety, security, ethics, and etiquette LEARNING COMPETENCIES Apply Internet online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks. WHAT TO KNOW? INTERNET SAFETY- it refers to the online security or safety of people and their information when using internet. NETIQUETTE- is network etiquette, the do’s and don’ts of online communication. TEN RULES OF NETIQUETTE Rule No. 1: Remember the human • You need to remember that you are talking to a real person when you are online. • The internet brings people together who would otherwise never meet. • Remember this saying when sending an email: Would I say this to the person’s face. Rule No. 2: Adhere to the same standards online that you follow in real life. • You need to behave the same way online that you do in real life. • You need to remember that you can get caught doing things you should not be doing online just like you can in real life. • You are still talking to a real person with feelings even though you can’t see them. Rule no. 3: Know where you are in cyberspace. LESSON 2 ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE 7 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 • Always take a look around when you enter a new domain when surfing the web. • Get a sense of what the discussion group is about before you join it. Rule no. 4: Respect other people’s time and bandwidth. • Remember people have other things to do besides read your email. You are not the center of their world. • Keep your post and emails to minimum by saying what you want to say. • Remember everyone won’t answer your questions. Rule no. 5: Make yourself look good online. • Be polite and pleasant to everyone. • Always check your spelling and grammar before posting. • · Know what you are talking about and make sense saying it. Rule no. 6: Share expert knowledge • Ask questions online • Share what you know online. • Post the answers to your questions online because someone may have the same question you do. Rule no. 7: Help keep flame wars under control • Netiquette does not forgive flaming. • Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down. Rule no. 8: Respect other people’s privacy. • Do not read other people’s mail without their permission. • Going through other people’s things could cost you, your job or you could even go to jail. • Not respecting other people’s privacy is a bad netiquette. Rule no. 9: Don’t abuse your power. • Do not take advantage of other people just because you have more knowledge or power than them. • Treat others as you would want them to treat you if the roles were reversed. Rule no. 10: Be forgiving of other people’s mistake. • Do not point out mistakes to people online. • Remember that you were once the new kid on the block. • You still need to have a good manners even though you are online and cannot see the person face to face. Internet security Security Requirement Triad ConfidentIality Data confidentiality Privacy • Integrity Data integrity System integrity • Availability Threat Consequence Threat Action ( Attack) Unauthorized Disclosure Exposure: Sensitive data are directly released to an unauthorized entity. 10 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 3. How do you feel if someone posted something embarrassing about you? What would you do? What to transfer? Matching Type: Match Column A to Column B. Write the letter of the correct answer on the space before each number. A B 1. Virus A Designed to send you ads. 2. rogue B Sends an official looking email and is designed to steal sensitive personal information 3. key logger C A provision that allows you to use copyrighted work without consent with certain limitations 4. adware D A browser feature that is synonymous to “private” browsing 5. spam E Replicates and can transfer from one computer to another 6. phishing F Exploits the DNS system 7. fair use G States that anyone who uses your network without your consent is punishable by law 8. spyware H Runs in the background and monitors what you are doing. 9. private I Unwanted email mostly from bots 10. malware J Disguise as useful program but is not 11. incognito K The information superhighway 12. internet L Trick the user into posing that it is a security software 13. trojan M A malicious software 14. copyright N An option to hide a post so that search engines could not scan it 15. pharming O Used to record the keystrokes done by the user CONTENT STANDARD The learners demonstrate an understanding of: the use of advanced tools and techniques found in common productivity and software applications in developing ICT content for the academic track. PERFORMANCE STANDARD At the end of the two-week period, learners should be able to independently apply advanced productivity tools to create or develop ICT content for use in the academic track. These may be in the form of, but not limited to designing letterheads and business cards. Write your answer here Write your answer here 11 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 Lesson 4 Developing ICT Content for Specific Purposes WHAT TO KNOW? Lesson Discussion In the professional world, sending out information to convey important information is vital. Because of ICT, things are now sent much faster than the traditional newsletters or postal mail. You can now send much faster than the traditional newsletters or postal mail. You can now use the Internet to send out information you need to share. What if we could still do things much faster – an automated way of creating and sending uniform letters with different recipients? Would that not be more convenient? I. Mail Merge and Label Generation A. Mail Merge One of the important reasons in using computers per se is its ability to do recurring tasks automatically. But this ability has to be honed by learning the characteristics and features of the software you use with your computer. After all, no matter how good or advance your computer and software may be, it can only be as good as the person using it. In this particular part of our lesson, we will learn one of the most powerful and commonly used features of Microsoft Word called Mail Merge. As the name suggests, this feature allows you to create documents and combine or merge them with another document or data file. It is commonly used when sending out advertising materials to various recipients. The simplest solution for the scenario above is to create a document and just copy and paste it several times then just replace the details depending on whom you send it to. But what if you have hundreds or thousands of recipients? Would not that take too many hours? What if you have a small database of information where you can automatically generate those letters? Two Components of Mail Merge 1. Form Document The first component of our mail merged document is the form document. It is generally the document that contains the main body of the message we want to convey or send. The main body of the message is the part of the form document that remains the same no matter whom you send it to from among your list. Also included in the form document is what we call place holders, also referred to as data fields or merge fields. This marks the position on your form document where individual data or information will be inserted. From our sample document, the place holders are denoted or marked by the text with double-headed arrows (<< >>) on each side and with a gray background. On a printed standard form, this will be the underlined spaces that you will see and use as a guide to where you need to write the information that you need to fill out. In its simplest form, a form 12 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 document is literally a “form” that you fill out with individual information. A common example of a form document is your regular tax form or application form. 2. List or Data File The second component of our mail merged document is the list or data file. This is where the individual information or data that needs to be plugged in (merged) to the form document is placed and maintained. One of the best things about the mail merge feature is that it allows data file to be created fro within the Microsoft Word application itself, or it gets data from a file created in Microsoft Excel or other data formats. In this way, fields that needed to be filled up on the form document can easily be maintained without accidentally altering the form or main document. You can also easily add, remove, modify, or extract your data more efficiently by using other data management applications like Excel or Access and import them in Word during the mail merge process. B. Label Generation Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes sense that after you print out your form letters, you will need to send it to individual recipients in an envelope with the matching address printed directly on the envelope or on a mailing label to stick on. By using virtually the same process as a standard mail merge, Microsoft Word will print individual addresses to a standard form that it has already pre-formatted. Simply put, it creates a blank form document that simulates either a blank label or envelope of pre-defined size and will use the data file that you selected to print the information, typically individual addresses. So even in generating labels, the two essential components of creating a merged document are present: the form document and the data file. Only in this case, you did not have to type or create the form document yourself because it was already created and pre-formatted in Microsoft Word. All you need to do is select the correct or appropriate size for the label or envelope and select the data file that contains the addresses (data) to be printed. You can also preview your merged labels before printing if you want to. II. Integrating Images and External Materials Integrating or inserting pictures in your document is fun and it improves the impression of your document. A common use of inserting a picture on a document is when you are creating your resume. Though seemingly simple to do, your knowledge on the different kinds of materials that you can insert or integrate in a Word document and its characteristics can help you create a more efficient, richer document not only in content but also in physical form. A better understanding of the physical form of your document as well as the different materials you would integrate in it would allow you to be more efficient and versatile in using Microsoft Word. A. Kinds of Materials There are various kinds of materials Microsoft Word is capable of integrating to make the documents richer, more impressive, and more informative. 1. Pictures Generally, these are electronic or digital pictures or photographs you have saved in any local storage device. There are three commonly used types of picture files. You can identify them by the extension on their file names. a. .JPG/JPEG This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic Experts Group. Like all the rest of the image file extensions, it identifies the kind of data compression 15 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 This setting allows the text on your document to flow even tighter taking the contours and shape of the image. Again, this can be best used with .GIF or .PNG type of image. E. Top and Bottom This setting pushes the texts away vertically to the top and/or the bottom of the image so that the image occupies a whole text line on its own. F. Behind Text This allows your image to be dragged and placed anywhere on your document but with all the texts floating in front of it. It effectively makes your image look like a background. G. In Front of Text As it suggests, this setting allows your image to be placed right on top of the text as if your image was dropped right on it. That means whatever part of the text you placed the image on, it will be covered by the image. IV. Key Terms Mail Merge – a feature that allows you to create documents and combine or merge them with another document or data file. Form Document – the document that contains the main body of the message we want to convey or send. Data File – includes the individual information or data or the recipient’s information. Merge Field/Place Holder – marks the position on your form document where individual data or information will be inserted. .JPG – file extension for the Joint Photographic Experts Group picture file. .PNG – file extension for Portable Network Graphics image file. .GIF – file extension for the Graphics Interchange Format image file. Clipart – line art drawings or images used as a generic representation for ideas and objects. Smart Art – predefined sets of different shapes grouped together to form ideas that are organizational or structural in nature. Text Wrap – adjusts how the image behaves around other objects or text. WHAT TO PROCESS? Lesson 5. Imaging and Design for Online Environment GOAL At the end of the 2-week period, you will be able to independently apply the techniques of image manipulation and graphic design to create original or derivative ICT content from existing images, text and graphic elements for use in specific professional tracks. WHAT TO KNOW? What is an Image? - a representation of the external form of a person or thing in art. Images may be 2-dimensional, such as a photograph or screen display, or 3-dimensional, such as a statue or hologram. They may be captured by optical devices – such as cameras, mirrors, lenses, telescopes, microscopes, etc. and natural objects and phenomena, such as the human eye or water. 16 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 Graphics - are visual images or designs on some surface, such as a wall, canvas, screen, paper, or stone to inform, illustrate, or entertain. Examples of Graphics: -Photographs -Drawings -Line art -Graphs -Diagrams -Typography -Numbers -Symbols - Geometric designs -Maps -Computer Graphics -Engineering drawings, or other images. Layout - is part of graphic design that deals in the arrangement of visual elements on a page. Basic Principles of Graphics and Layout : 1. Balance. The visual weight of objects, texture, colors, and space is evenly distributed on the screen. 2. Emphasis. An area in the design that may appear different in size, texture, shape or color to attract the viewer’s attention. 3. Movement. Visual elements guide the viewer’s eyes around the screen. 4. Pattern, Repetition, and Rhythm. These are the repeating visual element on an image or layout to create unity in the layout or image. Rhythm is achieved when visual elements create a sense of organized movement. 5. Proportion. Visual elements create a sense of unity where they relate well with one another. 6. Variety. This uses several design elements to draw a viewer’s attention. INFOGRAPHICS - Information graphics or infographics are used to represent information, statistical data, or knowledge in a graphical manner usually done in a creative way to attract the viewer’s attention. 5 Principles in Making an Effective Infographic Design 1. Be Unique 2. Make It Simple 3. Be Creative and Bold 4. Less is More 5. The Importance of Getting it Across Online Image File Formats 1. Joint Photographic Experts Group (JPEG) – does not support transparency and animation (.jpeg or jpg) 2. Graphics Interchange Format (GIF) – supports transparency and animation (.gif) 3. Portable Networks Graphics (PNG) – supports transparency but not in animation (.png) Image Manipulation Principles 1. Choose the right file format. Try to make a real-life photograph into GIF to see the difference between PNG, GIF, and JPEG. Knowing the purpose is the key to finding out the best file format. 2. Choose the right image size. A camera with 12 megapixels constitutes to a bigger image size. Monitors have a resolution limit, so even if you have a million megapixels, it will not display everything. 3. Caption it. Remember to put a caption on images whenever possible. If it is not related to the web page, then remove it. IMAGE MANIPULATIONS TECHNIQUES 1. Cropping. Cutting parts away to remove distracting or irrelevant elements 2. Color Balance. The ambience and the tone of light of the picture (ex. Warm or cool light) 3. Brightness and Contrast. One of the most basic techniques in image editing, making the image darker or lighter 17 | E m p o w e r m e n t T e c h n o l o g i e s – W E E K 1 - 4 4. Compression and Resizing. The higher the quality and the larger the photo is, the bigger the file size of the picture is. 5. Filters. Making the image look sketched, grainy, classic black and white or even let it have neon colors. This gives your image a twist from its original look. 6. Cloning. Copying or duplicating a part of an image. 7. Changing the Background. Adding background to make your image stand out 8. Removing the Color. Removing certain colors in your image or desaturating the color of the image. 9. Combining Text, Graphics and Image. Adding multiple elements in your layout Image hosting and sharing - Google+ Photos - Flickr - Smugmug - Imgur - 500px - Photobucket - Amazon Prime Photos - DropBox - Chevereto - Imageshack WHAT TO TRANSFER? 1. Give three websites that you visit. What makes their site design work? 2. Research on Photobucket and to more free image hosting site and check out the limitations of the free account. What is the best hosting site for you and why? 3. What are the limitations of PhotoScape compared to other image editors? Multiple choice: Write the letter of the correct answer on the space before each number. ____1. Balance is to even distribution; emphasis is to a. Attracting b. Colors c. Design d. Weight ____2. Movement is to guiding the eye; rhythm is to create a. Attraction b. Organization c. Visuals d. Unity ____3. These are visual elements creating a sense of unity where they relate well with one another. a. Style b. Proportion c. Variety d. Emphasis ____4. It uses several design elements to draw a viewer’s attention. a. Style b. Proportion c. Variety d. Emphasis ____5. It makes complex data become more visually appealing to the average user. a. Tables b. Piktocharts c. Infographics d. Slideshows Write your answer here Write your answer here Write your answer here
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved