Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
54 views16 pages

ICT Empowerment for Grade 11 Students

for reporting

Uploaded by

palicprinces63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views16 pages

ICT Empowerment for Grade 11 Students

for reporting

Uploaded by

palicprinces63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

1st Quarter

Grade Level : 11 WEEK : 1- 2 Subject : Empowerment Technology


Topic : Introduction to Information Communication Technology

Objectives: at the end of this module, students will be able to:


1. compare and contrast the nuances of varied online platforms, sites, and content to best achieve
specific class objectives or address situational challenges; CS_ICT11/12-ICTPT-Ia-b-1 2. apply online safety,
security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific
professional tracks; CS_ICT11/12-ICTPT-Ia-b-2
3. use the Internet as a tool for credible research and information gathering to best achieve specific class
objectives or address situational. CS_ICT11/12-ICTPT-Ia-b-3
INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY EMPOWERMENT THROUGH ICT

ICT AND SOCIETY


➢ Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, internet, etc. to
locate, send, save, and edit information.
Nowadays, there are applications that can be accessed and used for free which an
individual is able to solve his or her problem with less cost, less time, and less effort.
⮚ According to Harvard Business Review (2021), the top three requirements for
applicant are (1) ICT skills, (2) Communication skills, and (3) Analytical skills. A competitive applicant for
a job today must have all of these qualifications.

ICT IN THE
PHILIPPINES
• PHILIPPINES is dubbed as the “ICT Hub of Asia” because
of huge growth of ICT
related jobs, one of which is BPO, Business Process Outsourcing, or call centers. In 2010,
the ICT industry shares 19.3% of the total employment population. Internet is the global
system of interconnected computer networks that uses the Internet protocol suite
(TCP/IP) to communicate between networks and devices.

The current state of ICT technologies


The World Wide Web is an information system on the Internet that allows documents to be connected to
other documents by hypertext links, enabling the user to search for information by moving from one
document to another. It was invented by Tim-Berners Lee.
Example: such as Microsoft's Internet Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google
Chrome, let users navigate from one web page to another via the hyperlinks embedded in the
documents

❖ TYPES OF WEB PAGES


1. Web 1.0 - The first generation of World Wide Web where web pages are static or not interactive. It also
referred to as the read-only web. Example is a personal Web page that gives information about the site’s
owner.

2. Web 2.0 - It is a dynamic web page where user can interact with page like creating a user account,
posting comments, uploading files and images, and others. Example: Blog sites, Facebook, Twitter,
Instagram, YouTube
FEATURES OF WEB 2.0
a. Folksonomy– users can classify and arrange information by adding tag or label. Pound sign (#) is used
in Facebook, Twitter, Instagram and other social networking sites. Example in tagging on Facebook:
#TeamKawayan, #Single
b. Rich User Experience– user can have high interaction with the content of the page and can achieve
level of expertise.
c. User Participation– user can put content on their own in web page like comment, evaluation, etc.
d. Long Tail – A site that offers services and brings individual and businesses into selling different goods
and commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others. e. Software as a
service– users can subscribe to a software when they need it instead of purchasing them.
f. Mass Participation – sharing of diverse information through universal web access.

3. Web 3.0 - The Semantic Web - a new paradigm in web interaction extension of led by World Wide Web
Consortium (W3C) where it provides framework that allows data to be shared and reuse. Examples:
Wolfram Alpha and Apple Siri
TRENDS IN ICT
Below are one of the current trends in information and communication technology
1. Convergence – is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now use your
smartphone; Using smartphone as camera in taking pictures instead of DSLR camera.
2. Social Media –is a website, application, or online channel that enables web users web users to create, co
create, discuss modify, and exchange user generated content. Examples are social media platforms:
Facebook, twitter, Instagram, Reddit
3. Mobile Technologies – a technology used in cellular and other devices such netbook, laptop, tablet,
smartphones and etc.
4. Assistive Media - A platform that assist people with disability. It will guide the individual like a blind person
by using an audio recording.

ONLINE PLATFORMS AND SITES


▪ is a specially developed platform using
Internet technology. Online platforms have revolutionized access to any information. Online
platforms currently include, but are not limited to:
1. Presentation or Visualization Platform allows you to present and share presentations,
infographics and videos with other people. It is used to communicate information clearly
and efficiently.
2. Cloud Computing Platform is also called as “The cloud”. It is the practice of using a
network of remote servers hosted on the internet. Instead of using your computer’s hard
drive, you store and access your data and programs over the Internet.
3. File Management Platform is used for the storing, naming, sorting, and handling of
computer files. Allows you to convert and manage files without download in the software tool.
4. Mapping Platform is a transformation taking the points of one space into the points of the same or another
space. Uses GPS to detect location and used for navigation.
5. Social Media Platform is a computer-mediated tools that allow large group of people to create, share or
exchange information, interest and the information shared can be in the form of ideas, pictures, videos or
anything that you want to create and share to virtual communities. It can be in the following platforms:

A. Social Network – A website where people with the same come together to share
information. Examples: Twitter, Instagram, Facebook
B. Social News –A website where user can post stories and are ranked based on the
popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark
C. Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images and others. Examples: Pinterest,
StumbleUpon, Dribble
D. Media Sharing – A website that allows you to share and store multimedia files such
as video, photos and music. Examples: Instagram, YouTube, Flickr
E. Microblogging – a website that allows you to broadcast short message. Examples:
Twitter, Tumblr, Meetme
F. Blogs and Forums – a discussion website that allows user to ask questions and comments on a journal posted
by an individual or group. Examples: WordPress, Blogger

ONLINE SAFETY, SECURITY, AND NETIQUETTE


ONLINE SAFETY refers to the practices and precautions that should be observed when
using the internet to ensure that the users as well as their computers and personal
information are safe from crimes associated with using the internet. There are numerous
delinquencies that can be committed on the internet such as stalking, identity theft,
privacy violations, and harassment.

NETIQUETTE is network etiquette, the do’s and don’ts of online communication. It is a set
of rules for behaving properly online. Below are the 10 rules of netiquette:
TEN RULES OF NETIQUETTE

1: Remember the human


6: Share expert knowledge
2: Adhere to the same standards online that you follow in real life
7: Help keep flame wars under control
3: Know where you are in cyberspace
8: Respect other people’s privacy
4: Respect other people’s time and bandwidth
9: Don’t abuse your power
5: Make yourself look good online
10: Be forgiving of other people’s mistake

KINDS OF ONLINE THREATS


❖ Online threat is deemed as any malicious act that attempts to gain access to a computer network without
authorization or permission from the owners.
❖ Web threats pose a broad range of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation, and erosion of
consumer confidence in e-commerce and online banking.

THE FOLLOWING ARE THE TOP KINDS OF ONLINE THREATS THAT YOU SHOULD BE AWARE OF:

1. CYBERBULLYING It happens as:


• Posting comments, images or videos about the victim whose contents may
cause the victim to feel upset and frightened.
• Hacking into the victim’s personal accounts and harassing them from within their
own user profile, pictures/videos, ‘underwear shots’, or any sexual texts, images or
videos.
2. IDENTITY THEFT
• The act of obtaining
information illegally about
someone else. Thieves try to find such information as full
name, maiden name, and address, date of birth,
social security number,
passwords, phone number, e-mail, and credit card
numbers. Steal money Commit
crimes that points to you as the suspect
3. CYBERCRIME
∙ A crime in which computer is used as object and tool in committing a crime
such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.
❖ Cybercrime Prevention act of Philippines. The Philippine Congress enacted
Republic Act No. 10175 or “Cybercrime Prevention Act of 2012” which addresses
crimes committed against and through computer systems on 12 September 2012.
It includes penal substantive rules, procedural rules and also rules on
international
cooperation The Fundamentals of the Act Cybercrime also called computer
crime is the use of a computer as an instrument to further illegal ends such as
committing
fraud trafficking child pornography, intellectual property violations, stealing
identities or violation of privacy.
❖ The difference between traditional criminal offences from cybercrime is the use of the computer in
committing such offences. Majorly cybercrime is an attack on the
information of Individuals, governments or corporations. To combat and
prevent cybercrime, the government of the Philippines introduced the
Republic Act No.10175 or Cyber Prevention Act of 2012. This Act was
signed by the President of the Philippines Mr. Benigno Aquino on
September 12th of 2012. The original goal of this Act was to penalize acts
like cybersex, child pornography, identity theft etc.

EXAMPLES OF A CYBERCRIME ARE THE FOLLOWING:


1. Phishing - The act of sending an email to a user falsely claiming to be an established legitimate enterprise
in an attempt to scam the user into surrendering private information that will be used for identity theft 2.
Spam – usually considered to be electronic junk mail or junk newsgroup postings, or unsolicited emails.
Considered to be a problem because it takes up a lot of bandwidth.
3. Computer virus – a program or piece of code that is loaded into the computer without your knowledge
and does activities without your approval.
4. Malware or malicious software - is any program or file that is harmful to a computer user.

THE MOST COMMON OFFENDERS IN THE ROGUES’ GALLERY OF MALWARE:


a. Adware (advertising supported software) is unwanted software designed to throw advertisements up
on your screen. Example, pop-up ads and banner ads.
b. Spyware is malware that secretly observes the computer user’s activities without permission and
reports it to the software’s author. Example is a keylogger.
c. Virus and Worms are malwares that attach to another program and, when executed unintentionally
by the user—replicates itself by modifying other computer programs and infecting them with its own
bits of code.
d. Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as
something useful in order to trick you.
e. Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then
forces you to pay a ransom to get them back.
Contextualized Online Search and Research Skills
Contextualized Online Search
Contextualized search on the internet is different from the traditional way of getting information that
returns a list of papers or documents relevant to the request of the user. Contextualized is an attempt to be
more precise in providing the list of documents according to the words used by the user to search the
internet. The search engines scan the contents of the available information on the internet based on the
texts or words that the user provided and searched for that are truly useful and relevant to them. A good
contextual search engine would request for more information to narrow down the results of the search.

The information that we need is more likely already on the internet. It is just a matter of how to look for it
and how to use information from the most credible source. Here are some tips in conducting an online
research.

1. Have a question in mind. Focus on a question you want to be answered. If it is a series of questions, start
with one. Never search everything on one go. Do it one at a time.
2. Narrow it down. Be specific, Search engines like Google, Bing, or Yahoo use several filters to determine
the most appropriate result for you. These search engines use your previous search history and your
geographical location and send you the result which is more related to you. Try to search “weather”
and most search engines would return the weather conditions of where you are. But if all these filters fail,
you should remember to narrow down or to be specific of what you are searching for. For instance, if
you were to look for dynamite as an explosive using Google, you would better use the keywords
“dynamite explosive” rather than just “dynamite” or else you might end up getting results pertaining to
“Dynamite” which is a song by the famous South Korean boy band, BTS. Another example is if you were
to look for science research experiments, it would be better to include what branch of science it is or
what type of study it is.
3. Advanced Search. The best way to filter information you get from search engines is by using the
advanced search. This will allow you to filter out information you do not need. In Google, simply search
a word like you would normally do, and then click the Advanced Search option on the options button
located at the upper right corner of the page.
4. Look for a credible source. Some wikis, though filled with updated information are not credible sources.
This is because anyone can edit its content. When using wikis, check out the link of the cited text (indicated
by superscript number) to be navigated to the footnote where the list of sources is located. This is also
labeled as References. Click the source of the information to see if it is credible or not.
5. Give Credit. If you are going to use the information from a source for educational purposes, give credit
to the original author of the page or information. To properly cite a reference, you may use the format
below:

COPYRIGHT INFRINGEMENT

If you create something – an idea, an invention, a form of literary work, or a research, you have the right
as to how it should be used by others. This is called intellectual property. The copyright law includes your
rights over your work, and anyone who uses it without your consent is punishable by law.

As a responsible user of the internet, you must consider that not everything out there is free for you to
use. Just like your own, contents that you see from websites have their own respective copyrights. There are
several instances where employees or business owners face copyright infringement and are sentenced to a
huge fine due to reckless copying of materials.

Copyright infringement – is a violation of the copyright law, is the use of works protected by copyright law
without permission for a usage where such permission is required, thereby infringing certain exclusive rights
granted to the copyright holder.

Here are some tips that could help you avoid the copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings, drawings, films, music and lyrics,
choreography, and sculptures, but generally does not protect underlying ideas and facts. This means that
you can express something using your own words, but you should give credit to the source.
2. Be responsible. Even if the material does not say that it is copyrighted, it is not a valid defense against
copyright. Be responsible enough to know if something has a copyright.
3. Be Creative. Ask yourself whether what you are making is something that came from you or something
made from somebody else’s creativity. It is important to add your creative genius in everything that will
be credited to you.
4. Know the Law. There are some limitations to copyright laws. In the Philippines, copyrights only last a
lifetime (of the authority) plus 50 years. Another limitation is the Fair Use.

Fair Use – means that an intellectual property may be used without consent if it used in commentaries,
criticisms search engines, parodies, news reports, research, library archiving, teaching and in education.
Grade Level: 11 WEEK 3 Subject: Empowerment Technology
Topic: APPLIED PRODUCTIVITY TOOLS: Advanced Word Processing Skills (HYPERLINK AND MAIL MERGE)

OBJECTIVES: at the end of the lesson, the students will be able to:
1. uses common productivity tools effectively by maximizing advanced application techniques. CS_ICT11/12-
ICTPT-Ic-d-4
2. creates an original or derivative ICT content to effectively communicate or present data or information
related to specific professional tracks. CS_ICT11/12-ICTPT-Ic-d-5

LESSON PROPER:

MICROSOFT WORD
⮚ One of the software of the Microsoft Office 2013 suite. It offers a set of tools
that is advanced compared to its previous versions. Along with its new features are
the advanced techniques including hyperlinks, Macros, and mail merge.

ADVANCED TECHNIQUES USING MICROSOFT WORD: HYPERLINKS AND MAIL MERGE

HYPERLINK - is a link that will direct you to another page or part of the same document. Can be a word, a
phrase, a symbol or image, a different element in the document, another hypertext document, a file, or a
script. It is activated by clicking on the linked element usually underlined and of a different color.
EXAMPLE: https://www.microsoft.com

CREATING A HYPERLINK TO AN EXISTING DOCUMENT

1. Click your mouse on the location in the document


where you want to insert the hyperlink.

2. On the insert tab, click the hyperlink


button on the links group.

3.On the insert hyperlink dialog box, click Existing file or


Web page and then select the file name where the
source file is located and then hyperlink will be
created on your document.

4. Press Ctrl + click on the hyperlink to open the


linked file.
MAIL MERGE - is a useful tool that allows you to quickly produce and send information, newsletter, resumes, or
brochures to many people
Two Components of Mail Merge:
1. Form Document. The document that contains the main body of the message we want to convey or send.
2. List or Data File. This is where the individual information or data that needs to be plugged in (merged) to
our form document is placed and maintained.

CREATING MAIL MERGE

1. Open the word document that you want to Mail


Merge.

2. On the Ribbon, click the mailings tab, go to


the start mail merge group and click Start Mail
Merge and Select Step by Step Mail Merge
Wizard.

3. The Task Pane will show


the Mail Merge Steps 1 to 6.
STEP 1: Select document type.
Choose from the options such as
Letters, E-mail messages, Envelope,
Labels or Directory. Click Next.

STEP 2: Select starting document.


Choose from the options such as use the current
document, Start from a template, or Start from existing
document. Click Next.

STEP 3: Select recipients


If you have now created yet a recipient
list, choose the Type a new list and click
Create, and the New Address List dialog
box will appear where you can type in
the names and data of your recipients.

STEP 3: Select recipient


a. Click New Entry to add additional names
and after typing, click cancel to close the
dialog box.
b. After you have entered your list, the Save
Address List dialog box will open.
c. Type your file name and click Save.

STEP 4: Write your letter


a. Click the Address block to
specify the Address
elements.
b. Click the Greeting line to
set the greeting line
format.
c. Click Next.

STEP 5: Preview your letters


a. The name, address, and greeting line will
show in the document
b. You can click the Forward and Back
arrows to view other recipients in the list.
c. You can also edit recipient list.
STEP 6: Complete the merge
a. To print directly, select Print.
b. If you want to make adjustments on
individual recipients select Edit
individual letters.
GRADE LEVEL: 11 WEEK 4 SUBJECT: Empowerment Technology
TOPIC: APPLIED PRODUCTIVITY TOOLS: Advanced Presentation Skills

OBJECTIVES: At the end of this lesson, the students should be able to:
1. uses common productivity tools effectively by maximizing advanced application techniques. CS_ICT11/12-
ICTPT-Ic-d-4
2. creates an original or derivative ICT content to effectively communicate or present data or
information related to specific professional tracks. CS_ICT11/12-ICTPT-Ic-d-5

LESSON PROPER:
MICROSOFT POWERPOINT
⮚ Allows you to create slide show presentation wherein you can format the texts and
images, adding also animations and other multimedia components interactively.

ADVANCED TECHNIQUES USING MICROSOFT POWERPOINT: HYPERLINKS

A. SLIDE ANIMATION
• Is a moving computer graphic effect that can be added to the text, object or the entire slide itself.

ADDING A SLIDE ANIMATION


1. Click the Animations tab and go to the Advanced Animation group.
2. Select the animation from the list of options grouped as Entrance, Emphasis and Exit. 3. You can
add animation to any element in the slide – you could select a title, bullet list, or graphic. Click
the Add Animation drop- down button to review the effects.
4. As you click one effect, a menu appears with a list of effect categories.
 Entrance effects animate the element as it enters the slide.
 Emphasis effects make the element do something after it enters the slide.
 Exit effects animate the element as it leaves the slide.
 Motion paths allow you to specify specific paths on how the element will be animated in the slide. 5.
The Animation Pane will show the details about the effect.
6. Use the Start field to select an event which will trigger the animation.

B. SLIDE TRANSITION
-Control how your presentation moves from slide
to slide.
* ADDING SLIDE TRANSITION
1. Use the Transitions tab to select the slide transition
you want to apply in your slides.
2. You can preview the animation by selecting one
transition. It will be automatically applied to the
slide. Select Apply To All to apply the same
transition to all your slides in the presentation.
3. Slide transition can be customized by editing the
Duration option. You can enter the speed you
prefer the transition to play.
C. HYPERLINKS - Allows you to go to other slides in the same
presentation or in another presentation or in a web page
and
even to email addresses.
Using Hyperlinks in Microsoft PowerPoint:
1. Select an object or highlight a text.
2. Go to Insert > Hyperlinks (under links category) or use
the
shortcut key Ctrl+K. The insert Hyperlink dialog box
would
appear.
Link to Options:
a. Existing File or Web Page – creates a hyperlink to website or a local file saved in your hard drive. Just
browse your file in the dialog box or type the web address.
b. Place in This Document – creates a hyperlink that allows you to jump to a specific slide in your
presentation.
c. Create a New Document – creates
a hyperlink
that once clicked, creates a new
document on
your specified location.
d. E-mail Address – creates a hyperlink
that opens
Microsoft Outlook that
automatically adds your
specified recipient on a new email.

3. When done, click OK to apply your hyperlink.

EMBEDDING OBJECTS IN MICROSOFT POWERPOINT


⮚ Embedding objects is easy using PowerPoint Presentation. With this option, you can insert an Excel file
that would look like a table to a PowerPoint Presentation.

EMBEDDING AN EXCEL FILE TO YOUR POWERPOINT PRESENTATION


1. Go to the Insert tab.
2. On the Text group, click on Object.
3. The Insert Object dialog box would appear:
Options:
a. Create New – creates a new file from scratch. You select on a wide variety of files listed. b. Create
from File – creates a file from an existing file saved on your hard drive; simply browse the file to use it.
Putting a check on the “link” option will allow you to modify the Excel file inside your PowerPoint
Presentation. Once you are done, click OK
GRADE LEVEL: 11 WEEK: 5 SUBJECT: Empowerment Technology
TOPIC: APPLIED PRODUCTIVITY TOOLS: Advanced Spreadsheet Skills

OBJECTIVES: At the end of this lesson, the students should be able to:
1. uses common productivity tools effectively by maximizing advanced application techniques. CS_ICT11/12-
ICTPT-Ic-d-4
2. creates an original or derivative ICT content to effectively communicate or present
data or information related to specific professional tracks. CS_ICT11/12-ICTPT-Ic-d-5

LESSON PROPER:
MICROSOFT EXCEL
⮚ One of the applications created by Microsoft, used to simulate a paper worksheet. It is
composed of cells that are represented in rows and column designated to perform
basic arithmetic operations. It is widely used in accounting and financial, as well as
statistics and engineering calculations.
⮚ Uses Formulas to calculate values.
⮚ The equal sign typed in the cell signifies that a formula is created or the Auto Sum function is used to
build a formula.
⮚ An Excel formula always begins with an equal (=) sign

KEY TERMS IN MS EXCEL


∙ CELL REFER
combines

∙ MERGE - co

∙ FORMULA -
a cell.

∙ FUNCTIONS
available

∙ FORMULA B

∙ ACT

∙ COL

∙ ROW

FORMULAS AND FUNCTIONS

1. ADDITION + (plus sign) Ex. =A2+B2 4. DIVISION / Ex. =A2/B2


(forward slash)

2. SUBTRACTION – Ex. =A2-B2 (changes 5. MULTIPLICATION Ex. =A2*B2


(minus sign) the sign of the value * (asterisk)
in A2)

3. EXPONENTIATION Ex. =A2^3 (raises the 6. PERCENTAGE % PERCENTAGE %


^ (caret) number in A2 to the (percent sign) (percent sign)
power of 3)

REFERENCE OPERATORS
1. COLON (:) Ex. Range A1:A100 2. COMMA (,) Ex. =IF(A1>0, “good”,
It is a RANGE operator includes 100 cells from Used to separate “bad”) read as: if A1 is
that allows you to A1 through A100. To arguments in excel greater than zero,
make one reference find an AVERAGE of spreadsheet formulas. return “good”,
for those 100 cells, otherwise “bad”
multiple cells located =AVERAGE(A1:A100)
between 2 cells that
you specify.

3. SPACE( ) Ex. =B3:D3 C2:C4


It is an intersection operator that lets you get the
cell(s) common to the two references that you
specify.

COMMON EXCEL FUNCTIONS

=SUM Calculates the sum of the values of a range of cells

=AVERAGE Calculates the arithmetic mean of a range of cells

=MAX Gives the maximum value in a range of cells

=MIN Gives the minimum value in a range of cells


=COUNT Counts the number of cells in a range of cells

Grade Level: 11 WEEK : 6 Subject: Empowerment Technology


Topic: Imaging and Design for Online Environment

OBJECTIVES: At the end of this lesson, the students should be able to:
1. evaluate existing websites and online resources based on the principles of layout, graphic, and visual
message design; CS_ICT11/12-ICTPT-Ie-f-6
2. use image manipulation techniques on existing images to change or enhance their current state to
communicate a message for a specific purpose; CS_ICT11/12-ICTPT-Ie-f-7
3. create an original or derivative ICT content to effectively communicate a visual message in an online
environment related to specific professional tracks. CS_ICT11/12-ICTPT-Ie-f-8

LESSON PROPER
BASIC PRINCIPLES OF GRAPHICS AND LAYOUT
1. Balance. The 2. Pattern, Repetition, and Rhythm. These are
visual weight of the repeating visual element on
objects, texture, an image or layout to create
colors, and space unity in the layout or image.
is evenly Rhythm is achieved when
distributed on the visual elements create a
screen. sense of organized
movement.

3. Movement. 4. Emphasis. An area in the design that may


Visual elements appear different in size,
guide the texture, shape or
viewer’s eyes color to attract the
around the viewer’s attention.
screen.

5. Proportion. Visual elements create a sense 6. Variety. This uses several design elements to draw
of unity where a viewer’s
they relate attention.
well with one
another.

INFOGRAPHICS

⮚ Information graphics or
infographics are used to
represent information, statistical
data, or knowledge in a
graphical manner usually done in
a creative way to attract the
viewer’s attention
COMMON FILE FORMATS
JPEG JOINT PHOTOGRAPHIC EXPERTS GROUP

GIF GRAPHICS INTERCHANGE FORMAT

BMP BITMAP IMAGE FILE

TIFF TAGGED IMAGE FILE FORMAT

PNG PORTABLE NETWORK GRAPHIC

*When inserting text to a web page, you can simply copy a


text
to your html editor, or you can upload it on a website as a PDF
file. Most browsers support “add-ons” so that you can open
PDF
files without leaving the browser.
PRINCIPLES AND BASIC TECHNIQUES OF IMAGE MANIPULATION
1. CROPPING- a process 2. COLOR BALANCE- this command will allow you
of removing unwanted to make changes in the mixture of colors in an
parts of the image image.
focusing only on the
subject. Remember the
Rule of Thirds to organize
image composition.

3. ADJUSTING THE BRIGHTNESS AND 4. COMPRESSION AND RESIZING- important aspect of


CONTRAST this is the most basic technique image manipulation. Images to be uploaded on the
when adjusting the image tone (highlights, web must be of the standard resolution of 72 dpi (dots
shadow, and midtones. per inch) to maintain file size of 30-50kb.

5. COLOR BLENDING- use the different effects 7. COMBINING MULTIPLE IMAGE. Compositions must be
buttons available in the different image planned and
editing software. You can combine color to conceptualized
give you more dynamic image result. first so that you will
be able to render
the best image
and message
possible.

GRADE: 11 WEEK 7 SUBJECT: Empowerment Technology


TOPIC: Online Platforms for ICT Content Development

OBJECTIVES: At the end of this lesson, the students should be able to:
1. evaluate existing online creation tools, platforms and applications in developing ICT content for specific
professional tracks; CS_ICT11/12-ICTPT-Ig-h-9
2. apply web design principles and elements using online creation tools, platforms, and applications to
communicate a message for a specific purpose in specific professional tracks; CS_ICT11/12-ICTPT-Ig-h-10 3.
create an original or derivative ICT content using online creation tools, platforms, and applications to
effectively communicate messages related to specific professional tracks. CS_ICT11/12-ICTPT-Ig-h-11

LESSON PROPER:

ONLINE PLATFORM
A group of technologies that are used as a base upon which other
applications, processes or technologies are developed and it is a set of
standards that enables software developers to develop a software
application for the platform. An online market place that place in one party in
touch in another, such as buyer and sellers. These technologies help us to
produce and share more meaningful information through online platforms.

NATURE AND PURPOSES OF ONLINE PLATFORM AND APPLICATION


✔ to be able create a good online presentation, webpage and content, you
should know the principle and techniques of design using online creation tool,
platform and application to develop ICT content.

EXAMPLES OF ONLINE PLATFORM AND APPLICATIONS


1. PRESENTATION 2. FILE MANAGEMENT
TOOL SYSTEM
- Graphic program that allow - It is a computer
you to create slide show program that provide a
presenting the topic, lecture, user interface to
demonstrate to enlighten, manage file and folder.
educate, communicate, or
persuade the audience.

3. SOCIAL MEDIA 4. MAPPING


- A website and application - Is the creation of maps, a
that enable user to create and graphic symbolic representation
share content or participate in of the significant features of
social networking. part of the surface of the Earth.

5. CLOUD COMPUTING - It means 6. WEB PAGE (CREATION)


storing and accessing data and - It is document that is suitable for the
program over the internet World Wide Web and the Web
instead of your computer’s hard browser. It is also written in HTML, or
drive. comparable mark-up language.

BASIC WEB DESIGN PRINCIPLE AND ELEMENTS

WEB DESIGN- It is a concept of planning, creating, updating, and maintaining the website. A good web design
allows the user to understand the message, contents, and ideas in most convenient way.

WEB DESIGN ELEMENTS

1. TEXT FONT- family and type must be chosen well, clear and in
readable size.
2. GRAPHIC/ILLUSTRATION- must be good quality and well
arrange with text and another element.
Info graphics will be used.
3. SHAPES- it can be used to denoted an enclosed
boundary in all over design.
4. BACKGROUND- it can help provide your website with a
feeling of a surface underneath. It must be used to
bring
out the content given on website to make it look
appealing.
5. COLOR- must blend well and complement the elements
on the page. Use vibrant and bold colors that will attract
but not too distracting.
6. VIDEO/AUDIO- help viewer to easily understand what
you are teaching or selling.
7. LINKS - Allow user to connect another page or site that related on the content of your page.

HERE ARE SOME PRINCIPLES TO FOLLOW IN EFFECTIVELY DESIGNING YOUR WEB PAGE OR SITE.

1. VISUAL HIERARCHY- It should be ranked according to


its
importance and your objectives. It can be shown
through
the use of varying sizes and amount of content.

2. PROPORTION- using Golden Ratio, a magical number


approximately equal to 1.618 that makes all things
proportioned so as to make a design aesthetically
pleasing.

3. HICK’S LAW- This law can be considered as a


guideline for
decision making in a viewer’s perspective.
Hick’s law states that “with every additional choice, the time
required to make a decision increases.”

4. FITTS LAW- According to this law, the time needed to move to a target is dependent upon the size of
the target as well as the distance to the target.

5. ACCESSIBILITY- must be able to access each bit of information in the easiest manner.

6. VISIBLE LANGUAGE- A web page design


should
communicate with the users clearly and in
an
engaging manner. The following are for a
successful visual language: Organize,
Economize,
and Communicate

7. WHITE SPACE AND SIMPLE DESIGN- White


space
helps divide the webpage into several distinct
parts or areas that make it simpler for the users to
process information.

8. REGULAR TESTING- Test Early and Test Often, or TETO, is another web design principle that all designers and
website owners must consider. Websites need upgrades and updates to maintain the visitor customer’s
interests and trends.
WYSIWYG is the acronym for What You See Is What You Get.
This means that whatever you type, insert, draw, place, rearrange, and everything you do on a page is what
the audience will see.

Creating a Website using Microsoft Word


1. Open Microsoft Word.
2. Type anything on the page like
“Welcome to my Website.”
3. Click on File > Save As > Browse.
4. On the Save As dialog box, locate your
activities folder and create a new
folder
named “Sample Webpage.”
5. Specify the filename “Sample Webpage.”
6. On the Save As type, select “Web Page
(*.htm; *.html).”

7. Click the Change Title button.

8. Input the title as seen below, then click OK then Save.

9. Check the files on your Sample Webpage folder. You will see a new folder generated including your
htm/html file.

10. Open the Sample WebPage.htm file and you will see that you just created a webpage using MS Word.

GRADE: 11 WEEK 8 SUBJECT: Empowerment Technology


TOPIC: Collaborative Development in ICT

OBJECTIVES: At the end of this lesson, the students should be able to:
1. evaluate the quality, value, and appropriateness of peer’s existing or previously developed ICT content in
relation to the theme or intended audience/ viewer of an ICT project; CS_ICT11/12-ICTPT-Ii-j-12 2. share and
showcase existing or previously developed material in the form of a collaboratively designed newsletter or
blog site intended for a specific audience or viewer; CS_ICT11/12-ICTPT-Ii-j-13.

LESSON PROPER:
ONLINE COLLABORATIVE TOOLS

⮚Collaboration came from the Latin word collaboratus, meaning “to labor together”.

⮚ Working together does not necessarily mean you have to be physically together. These tools can help
your group “go the distance” and work as if you already have your own office.

COMMON ONLINE COLLABORATIVE TOOLS


1. TRELLO
- Customizable to do list on a single interface, which you can share with others in
real time.
2. PODIO
- Is an enterprise social network
that aims to add
the functionality of a
project management
system.
Each user has his/ her own
profile, which is associated
with other people such as a manager, project
manager, and lead developer.
3. ASANA
- A project or workflow management tool that lets users customize their interface to
whatever configuration
makes them most
productive.
4. GOOGLE APPS
- google provides, via Gmail, Hangouts,
Calendars, Docs, Sheets, Slides, and
more, many of the features project management and collaboration
software offer.
5. YAMMER- is a great tool for communication and
collaboration among employees and offers many features for free. Easy to use
compared to Facebook. Making it a great way to enter to collaboration software
arena.

5 ESSENTIAL FEATURES OF AN ONLINE COLLABORATIVE TOOL

1. EASY AND CLEAN INTERFACE


- Applications are simple and intuitive to use, so you and your team would not have to waste time in
tutorials.

2. PERMISSIONS CONTROL
- Users need to be able to easily add people to work spaces to do in each workspace or document.

3. FILE STORAGE WITH DOCUMENT VERSIONING


- Not only do you want to be able to upload all documents related to a project onto your online
collaboration tool, but you also need to be sure that all document versions are saved on the tool. This will
make it easy to track the progress of a document, and if any past versions need to be referenced, it is easy
to do so.

4. WHITEBOARD
- Useful tool as they let team members communicate in a more informal way. It is also possible to host a
virtual brainstorming session using a whiteboard.

5. DOCUMENT LOCKING
- This feature ensures that only one person is working on a document at a time. This way, no two
people can change the same document at the same time, keeping documents completely organized,
and preventing confusion.

You might also like