You are on page 1of 16

1st DAY REVIEWER  ACTIVE RECREATIONAL

ACTIVITIES- requires one to


expand energy while performing.
Engage for a purpose of relaxation
HEALTH OPTIMIZING P.E 4 (HOPE4)
or enjoyment rather than formal
competition.
NATURE AND BACKGROUND OF
Example: Swimming, rafting,
OUTDOOR RECREATION
mountain climbing, cycling, etc.
OUTDOOR RECREATION- organized
OUTDOOR- natural or semi-environment
activities done during one’s free time for
and resources outside an enclosed area.
individual reasons, needs, or interest
where a certain interaction takes place
BENEFITS OF OUTDOOR RECREATION
between man and an element of nature.
LAND WATER AIR
Most people answer on when and why  Mountaineerin  Swimming  Parasailing
do people engage in outdoor g  Snorkeling  Skydiving
 Trekking  Diving  Paragliding
recreation.
 Hiking  Surfing
 Done during vacation or school
 Camping  Canoeing
break.
 Backpacking  Kayaking
 Wants to have fun.
 Picnic  Whitewater
 To be done outdoor with nature.
 Bird watching Rafting
 Mountain  Sailing
Reasons why people engage in ORAs Biking  Fishing
1. Some do it for personal satisfaction  Orienteering  Bamboo
and enjoyment  Canyoneering Rafting
2. A time away from day-to-day  Rock Climbing
routine.
3. To attain certain fitness level. 1. PHYSICAL HEALTH BENEFITS
4. To be in touch with nature. -Being outdoors prevents a
5. For personal pursuit such as person from having a sedentary
photography, collecting seashells, life. This is a great distraction from
reaching the top of a mountain or gadgets. It allows people to move,
conquer the rapids of a river. whether by walking, running,
swimming, biking, paddling, etc.
2. PSYCHO-EMOTIONAL
RECREATION- derived from the Latin BENEFITS
word recreare which means to be -Being outdoors also improves
refreshed. It is the activities done during our self-esteem, confidence, and
free time for enjoyment, fulfillment, and creativity.
relaxation which are freely chosen which 3. SOCIAL BENEFITS
have socially redeeming values. -Outdoor recreation also
promotes stewardship. This is the
TWO TYPES OF RECREATION: way for families to become closer.
 PASSIVE RECREATIONAL 4. ECONOMIC BENEFITS
ACTIVITIES- done during leisure - People who have a relaxed
but a sedentary position. It body and mind tend to be more
refreshes/restore one’s strength. productive at work. This translates
Example: Camping, picnic, nature into efficiency at the workplace.
sight seeing, photography, etc. 5. SPIRITUAL BENEFITS
- Being one with nature weeks or months and
brings certain calmness within a lifestyle as a student such
person. as:
- Were you able to carry out your
day-to- day task with alertness and
vigor?
- Have you been too spending too
much with your gadgets?
- Has your body been getting
enough rest and sleep?
- Have you been dependent on fast
foods, chips, and sodas?
- Have you been heavily stressed
with schoolwork?
- Are you eating on time?

THE LEAVE NO TRACE SEVEN


PRINCIPLES:

PRINCIPLE 1: PLAN AHEAD AND


PREPARE
 Check the place. Check if your
planned activity is permitted. Make
sure to know the rules, guidelines,
and safety procedures they have
1. No Parking set.
2. No Left Turn  Prepare the equipment needed.
3. Flammable Make sure you have the needed
4. No Smoking equipment for your activity and the
5. Pedestrian Crossing not Allowed skills needed to undertake the
6. Road Slippery when Wet activity.
7. Traffic Light Ahead  Know how to address to
8. 60 Speed Limit emergencies. Plan how to cope in
9. No Entry (One way Traffic) case emergency arises.
10. No Overtaking  Check the weather. Check the
11. Truck Prohibited weather forecast and be prepared
12. Rock falling for changing weather conditions.
 Keep your group small. To
PREPAREDNESS OF THE PHYSICAL minimize environmental impact
BODY and for safety reasons.
 Outdoor recreation involves a lot of  Use map. Avoid markings and
physical activities, but it does not leaving marks on rocks and the
require one to have athletic level line.
skills to be able to participate.
 The ff. might be considered in PRINCIPLE 2: TRAVEL AND CAMP ON
preparing one’s body to do outdoor DURABLE SURFACES
recreation:  Walk, run bike and or camp
 Take Health-Related durable surfaces. Like
Physical Fitness Test. established tracks, rocks, gavel,
 Reflect back on the and dry grasses.
activities for the past
 Avoid walking on soft surfaces. PRINCIPLE 6: RESPECT WILDLIFE
You might be trampling on a young  Observe wild animals from a
tree or pasture and this will cause distance. They should be avoided
vegetation damage. during sensitive times such as
 Use existing trail or campsites. mating, nesting, or raising the
No need to build a new campsite young.
that will alter the environment.  Do not feed wild animals. The
 Walk in a single file. To avoid food might damage their health or
erosion. alter their natural behaviors and
 Keep the campsite small and even expose them to predators.
discreet.  Protect wildlife and protect your
food as well. By restoring and
PRINCIPLE 3: DISPOSE OF WASTE securing the trash well.
PROPERLY  Do not bring your pets with you.
 “Pack it in, pack it out.” It means
that everything you brought should PRINCIPLE 7: BE CONSIDERATE OF
be brought back with you including OTHER VISITORS
left-over food or fruit peel. Nothing  Respect people who lived and
should be left. work in the countryside.
 For human waste, covered it  Let others have a momentous
with soil or with leaves. experience as well.
 Use biodegradable soap when  Allow the sound of nature to
washing dishes. Dishes should prevail. Not your noise or your
be washed 200 feet away from audio.
lakes or rivers.  Be courteous. Yield to others on
a trail.
PRINCIPLE 4: LEAVE WHAT YOU FIND  Camp away from trails and other
 Do not touch nor leave marks on visitors.
any archeological structure, old
walls and the like. SAFETY PRECAUTIONS IN
 Leave nature as you find them. MOUNTAINEERING
Do not take any plant, rocks,
plants, or marine animal with you. TIPS FOR FIRST TIME MOUNTAIN
 Avoid non-native plants and CLIMBERS
animals. - The Philippines is blessed with many
 Do not build structures, mountains situated in different provinces.
furniture, or dig trenches.  Opt for mountains suited to your
fitness level.
PRINCIPLE 5: MINIMIZE CAMPFIRE  Train before the hike.
IMPACTS  Check the weather.
 Use lightweight stove for  Prepare your essentials.
cooking. Campfires can cause  Secure a guide.
lasting impacts.  Enjoy the hike.
 Keep fires small. Use only sticks
from the ground that can be broken TRAIL SIGNS AND LABELS
by hand. - Clearly mark trails with these easy-
 Do not burn plastics or other to-read recreation signs.
materials that emits toxic fumes. - These signs are best used in areas
 Make sure fired are completely where hiking and other recreational
out. Scatter the cool ash. trail activities are permitted.
MOUNTAINEERING ACTIVITIES

MOUNTAINEERING
- Defined as a sport in attaining or
attempting to attain high points in
mountainous regions, mainly for
the pleasure of the climb.
- Enthusiasts see this as a sport, a
profession or recreation as it
challenges one’s determination,
capacity, and skills.

How did Mountaineering Begin as an


Activity?
 Horace- Benedict de Saussre
saw Mont Blance in the Alps of
Europe. He was challenged by its
height and that brought his
determination that one day he will
reach the peak.
 Michael Gabriel Paccard and
Jaques Balmart claimed the
Saussre’s prize money in 1786.
 Year 1850 a groups of British,
Swish, Italian climbers scaled the
high peaks of Switzerland.
 Mountaineering was then being
distinguished as a sport as more
and more climbers were
conquering peaks throughout
Europe.

 In the Philippines, first attempt to


climb Mt. Apo (highest peak in
the Ph) was recorded in 1852 by
Jpse Oyanguren and in 1870 by
Señor Real. However, both failed
to reach the peak.
 It was October 10, 1880 that a
successful expedition lead by Don
Joaquin Rajal was recorded.
BUSINESS ETHICS AND SOCIAL
RESPONSIBILITY

BUSINESS- is part and parcel of human


society, is an entity in which economic
resources or inputs, such as materials and
labor, are put together and processed to
provide goods or services or outputs to
customers.

Why engage in business? Of course to THE CORE PRINCIPLES OF GOOD


earn PROFIT! CORPORATE GOVERNANCE
 FAIRNESS
THREE TYPES OF BUSINESS  Just and reasonable
ORGANIZATIONS treatment of the
 Service Businesses provide stakeholders
services rather than products to  Free from discrimination
customers. and according to the rules
 Merchandising Businesses sell and principles of the
products they purchase from other corporation.
businesses to customers.  ACCOUNTABILITY
 Manufacturing Businesses  Assume complete
change basic inputs into products responsibility.
that are sold to customers.  Answerable for his/her
decisions, actions, and
FORMS OF BUSINESS ORGANIZATION behaviors.
1. Sole Proprietorship- a business  TRANSPARENCY
owned by one person.  Openness and willingness
2. Partnership- an association of two by the company to provide
or more people as partners; it clear, factual, and timely
refers to an arrangement in which information on the financial
the individuals share the profits situation, performance,
and liabilities of a business ownership, and corporate
venture. governance of the
3. Corporation- an entity created by company.
law that is separate and distinct
from its owners and its continued COMMON PRACTICES IN BUSINESS
existence is dependent upon the ORGANIZATIONS
corporate statues of the state in 1. Employee Conduct
which it is incorporated. (Accountability)
2. Equal Opportunity (Fairness)
3. Attendance and Time Off
(Accountability, Fairness)
4. Computer Use (Transparency,
Accountability)
5. Noncompetition (Fairness)
6. Finance and Accounting
(Transparency)
Examples of morally unacceptable CLASSICAL ETHICAL
policies and practices PHILOSOPHIES AND
PHILOSOPHERS
1. Bribery
2. Conflict of interest and loyalty ETHICS
3. Harassment  These are the principles of
4. Forced overtime conduct governing an individual
or group.
Examples: personal ethics
CODES OF ETHICS FOR BUSINESS (rules by which an individual lives
his or her personal life),
accounting ethics (codes that
guide the professional conduct of
accountants)
 It is the study of morality.

PHILOSOPHY
 It is the “study of the fundamental
nature of knowledge, reality, and
existence.”
 It helps us better understand who
we are, why we are here, and
where we are going.

ETHICAL THEORIES
 VIRTUE ETHICS- Virtuous, or
moral character.
 DEONTOLOGICAL ETHICS- Duty
ethics adhering to ethical
principles.
 CONSEQUENTIALISM- The
morality of an action upon the
consequences of the outcome.
dealings are witnessed by Allah.
Adherence to the moral code and
ethical behavior is part of the Six
Pillars of Iman.
1. Practice freedom of
enterprise
2. Be honest and truthful
3. Trade through mutual
consent
4. Treat workers fairly
5. Keep one’s word
6. Be humble
7. Seek halal earnings

IMPACT OF BUDDHISM IN
BUSINESS PRACTICES:
Buddhism’s main tenet is to do
no harm. An analysis will show that
Buddhism can affect business
practices positively.
1. Foster minimalistic world
view and free oneself
from worldly
attachments.
2. Strike a balance between
toiling and overworking.
IMPACT OF BELIEF SYSTEM IN 3. The Eightfold path states
BUSINESS to say the truth, practice
non-harm in words and
actions, and commit no
IMPACT OF CHRISTIANITY IN wrong.
BUSINESS PRACTICES: 4. Must free oneself from
Christians glorify God in many temptations, cravings,
ways through worship, evangelism, and distractions.
giving alms, having faith and doing 5. No exploitation.
actions in imitation of God. They
apply their beliefs to align with IMPACT OF JUDAISM IN
business practices are BUSINESS PRACTICES
demonstrated in examples below: There are 613 mitzvot
1. In producing goods (commandments) that are equal in
2. In employing people and importance to the “Ten Commandments”.
being employed 1. Business in good faith.
3. In buying and selling 2. Treatment of workers.
4. In earning profit 3. Trading

IMPACT OF ISLAM TO
BUSINESS PRACTICES: THE SIX PILLARS OF FAITH (IMAN) IN
The Islamic Code of Ethics is ISLAM
governed strictly so that Muslims 1. Belief in the existence and unicity
are required to behave in of Allah.
accordance to it because all 2. Belief in the existence of Angels.
3. Belief in the books of Allah.
4. Belief in Allah’s messengers and
that Muhammad is the last of them.
5. Belief in the Day of Judgement.
6. Belief in the Qadhaa’ & Qadr
(Doom & Divine Decree)

THE NOBLE EIGHTFOLD PATH

1. Right understanding
(Samma ditthi)- to understand
wholesome deeds and
comprehend the law of Karma.

2. Right thought (Samma


sankappa)- the intention of
non-greed, non-hatred, and
non-delusion.

3. Right speech (Samma vaca)-


abstaining from false,
malicious, harsh speech and
idle chatter. 

4. Right action (Samma EMPOWERMENT TECHNOLOGIES


kammanta)- abstaining from
killing, stealing, and sexual INTRODUCTION TO COMPUTER AND
misconduction. INFORMATION & COMMUNICATIONS
TECHNOLOGY
5. Right livelihood (Samma
ajiva)- abstaining from wrong
ICT- stands for INFORMATION AND
and corrupt means of
livelihood.  COMMUNICATIONS TECHNOLOGY that
deals with the use of different
6. Right effort (Samma communications technologies such as
vayama)- awakening zeal for mobile phones, telephone, internet, etc., to
abandoning unwholesome locate, save, send, and edit information.
states; arising and sustaining
wholesome states. COMPUTER- an electronic device that
manipulates and is capable of accepting,
7. Right mindfulness (Samma processing, displaying and restoring data.
sati)- constant contemplation
on body, feelings, mind, and CHARACTERISTICS OF COMPUTER
Buddhist teachings.  High Speed
 Accuracy
8. Right concentration (Samma
samadhi)- abandoning lust ill-  Storage Capability
will, sloth-torpor, worry,  Diligence
agitation, and doubt through  Versatility
meditation.

TYPES OF COMPUTER:
 SUPERCOMPUTERS- used to email, designing graphics and
process very large amounts of even playing games.
information including processing Examples:
information to predict hurricanes,  Word Processing
satellite images and navigation, Software
and process military war scenarios.  Spreadsheet Software
 MAINFRAMES- used by  Database Software
government and businesses to  Presentation Graphic
process very large amounts of Software
information.  Graphics Software
 PERSONAL COMPUTERS (PC)-  Multimedia Software
smaller and less powerful than the
others. They are used in homes, PARTS OF A COMPUTER
schools, and small businesses.
 SYSTEM UNIT- this houses the
ELEMENTS OF A COMPUTER SYSTEM Motherboard, Microprocessor,
Memory Chips, Buses, Ports,
 A. PEOPLEWARE- refers to the Expansion Slots, and Cards.
role people play in usage,  MOTHERBOARD/ MAINBOARD/
maintenance, and development of SYSTEM BOARD- The main
hardware and software. circuit board of a computer. It
 B. HARDWARE- refers to the set contains all the circuits and
of electronic program instructions components that run the computer.
or data a computer processor  CENTRAL PROCESSING UNIT
reads in order to perform a task or (CPU)- The processor is the main
operation. “brain” or “heart” of a computer
 C. SOFTWARE- if a computer is to system. It performs all of the
function, software is not functional. instructions and calculations that
Everything that a computer does, are needed and manages the flow
from the time you turn the power of information through a computer.
switch on until you shut the system  PRIMARY STORAGE- Is the
down, is under the control of computer’s working storage space
software. that holds data, instructions for
2 general categories of software: processing and processed data
 System Software- includes the (information) waiting to be sent to
programs that are dedicated to secondary storage.
managing the computer’s TYPES OF PRIMARY STORAGE
hardware and software resources  Read Only Memory (ROM)- Is
in order for the computer to work non-volatile, meaning it holds data
efficiently. even when the power is ON or
Examples: OFF.
 Operating System (OS)  Random Access Memory (RAM)-
 Software Utilities Is volatile, meaning it holds data
 Disk Operating System only when the power is ON.
(DOS)
 SECONDARY STORAGE
 Application Software- productivity DEVICES- Device use for storing
programs or end-user programs or safekeeping of files.
that enables users to complete Examples:
task such as creating documents,  Floppy Disk Drive (Diskette)
doing online research, sending  Optical Drives
 CD- Compact Disc  Philippines is one of the largest
 VCD- Video Compact Disc countries which houses BPO
 DVD- Digital Versatile Disc centers.
 Hard Disk Drive (HDD)  There are 106.8 cellphones for
 Flash Disk Drive (FDD) every 100 Filipinos.
 Solid State Drive (SSD)
Tim Berners-Lee created the World Wide
 INPUT DEVICES- Device used to Web.
enter data or give instructions to
the computer. Web 1.0 (Static Page) – it is the
Examples: “readable” phrase of the World
 Keyboards Wide Web with flat data. A static
 Mouse pages’ meaning users cannot
 Microphone interact with the page and the page
 Camera is in read-only format.
 Stylus Pen Examples:
 Touch Screen  Shopping carts
 Bar Code Reader  Mp3.com
 Scanners
Web 2.0 (Dynamic Page)- it is the
 OUTPUT DEVICES- Device that “writable” phrase of the World
are used to display or produce the Wide Web with interactive data. It
outputs of the computer. allows users to interact more freely
Examples: with each other. It also encourages
 Monitor participation, collaboration, and
 Speakers information sharing.
 Printers Examples:
 Projectors  YouTube
 Flickr
 Facebook
INTRODUCTION TO
INFORMATION Web 2.0- Dynamic Webpage
COMMUNICATION  The term used to describe the
TECHNOLOGY collection of web applications used
for interaction and collaboration.
Digital Natives- a person born or  It was coined by Darcy DiNucci in
brought up during the age of digital 1999. It does not refer to a new
technology. version of the web, just a refocus
of its use.
ICT IN OUR COUNTRY  It is more than the retrieval of
 In Philippines, dubbed by most as information. It is the participation
the ICT Hub in Asia due to the in a website.
growth of BPO Industries.
 Time Magazine’s “The Selfiest Features of Web 2.0
Cities Around the World for 2014” 1. Folksonomy. It allows users to
placed two cities from the categorize and classify/arrange
Philippines in the top 1 and 9 information freely chosen
spots. keywords (tagging). This is also
Makati City- Ranked 1st referred to as hashtag.
Cebu City- Ranked 9th 2. Rich User Experience. Content is
dynamic and is responsive to
user’s input. An example would be 3. Vastness. The World Wide Web
a website that shows local content. already contains billions of web
3. Long Tail. Services are offered on pages.
demand rather than on a one-time 4. Vagueness. Certain words are
purchase. In certain cases, time- imprecise. The words "old" and
based pricing is better than file- "small" would depend on the user.
size-based pricing or vice versa. 5. Logic. Since machines use logic,
4. User Participation. The owner of there are certain limitations for a
the website is not the only one who computer to be able to predict what
is able to put content. the user is referring to at a given
(Amazon.com, Online stores) time.
5. Software as a Service. Users will
subscribe to a software only when Trends in ICT
needed rather than purchasing 1. Convergence- is the synergy of
item. (Google Docs, Word technological advancements to
Processor) work on similar goal or task. For
6. Mass Participation. It is a diverse example, besides using your
information sharing through personal computer to create word
universal web access. It is based documents, you can now use your
on people from various cultures. smartphone.
2. Social Media- a website,
application, or online channel that
enables web users to create, co-
create, discuss, modify, and
Web 3.0 and the Semantic Web exchange user generated content.
 Semantic Web- is a movement led Six types of Social Media:
by the Word Wide Web A. Social Networks. Sites that allow
Consortium (W3C). It provides a you to connect with other people
framework that allows data to be with the same interests or
shared and reused to deliver web background.
content specifically targeting the Examples:
user.  Facebook
 Web 3.0- It is the “executable”  Google+
phrase of Word Wide Web with
dynamic applications, interactive B. Bookmarking Sites. Sites that
services, and “machine-to- allow you to store and manage
machine” interaction. One links to various websites and
example of Web 3.0 is Tivo, a resources.
digital video recorder. Its recording Examples:
program can search the web and  StumbleUpon
read what it finds to you based on  Pinterest
your preferences.
C. Social News. Sites that allow
Several Problems of Web 3.0 users to post their own news items
1. Compatibility. HTML files and or links to other news sources.
current web browsers could not Examples:
support Web 3.0.  Reddit
2. Security. The user's security is  Digg
also in question since the machine
is saving his or her preferences. D. Media Sharing. Sites that allow
you to upload and share media
content like images, music, and
video. 4. Assistive Media- is a non-profit
Examples: service designed to help people
 Flicker who have visual and reading
 YouTube impairments. A database of audio
 Instagram recordings is used to read to the
user.
E. Microblogging. Sites that focus
on short updates from the user.
Examples: RULES OF NETIQUETTE
 Twitter Internet- defined as the
 Plurk information superhighway.
Online Safety and Security-
F. Blogs and Forums. Websites common threats faced by the
allow users to post their content. netizens everyday include other
Examples: netizens with malicious intent
 Blogger (scamming, phishing, and other
 WordPress cybercrimes), unsecured
 Tumblr programmed web applications, and
malwares (virus, worm, trojan
horse, etc.)
3. Mobile Technologies- The
popularities of smartphones and
tablet has taken a major rise over
the years. This is largely because
of the devices capability to do the
tasks that were originally found in
PCs.

Mobile OS:
A. iOS - used in Apple devices such
as the iPhone and iPad.
B. Android- an open source
operating system developed by
Google. Being open source means
several mobile phone companies
use this OS for free.
C. Blackberry OS - used in TIPS TO STAY SAFE ONLINE
Blackberry devices. Here are some tips to help you stay safe
D. Windows Phone OS- a closed when using the Internet.
source and proprietary operating 1. Be mindful of what you share
system developed by Microsoft. online and what site you share it
E. Symbian- the original smartphone to.
OS; used by Nokia devices. 2. Do not just accept terms and
F. Webos- originally used for conditions; read it.
smartphones; now used for smart
TVs.
G. Windows Mobile- developed by
Microsoft® for smartphones and
pocket PCs.
3. Check out the privacy policy page transfer from one computer to
of a website to learn how the another either through the Internet
website handles the information and local networks of data storage
you share.
4. Know the security features of the
social networking site you use. By
keeping your profile private, search
engines will not be able to scan
your profile.
5. Do not share your password with
anyone.
6. Avoid logging in to public
networks/Wi-Fi. Browsing in
"incognito (or private) mode," a Like flash drives and CDs.
feature of the browser, will not b. Worm - a malicious program that
protect you from hackers. transfers from one computer to
7. Do not talk to strangers whether another by any type of means
online or face-to-face. Often, it uses a computer network
8. Never post anything about a future to spread itself. For example, the
vacation. It is similar to posting, ILOVEYOU worm (Love Bug
"Rob my house at this date." Worm) created by a Filipino,
9. Add friends you know in real life. c. Trojan - a malicious program that
10. Avoid visiting untrusted websites. is disguised as a useful program
11. Install and update an antivirus but once downloaded or installed,
software on your computer. Use leaves your PC unprotected and
only one anti-virus software to allows hackers to get your
avoid conflicts. Information.
12. If you have a Wi-Fi at home, make *Rogue security software -
it a private network by adding a tricks the user into posing that it is
password. a security software. It asks the
13. Avoid downloading anything from user to pay to improve his/her
untrusted websites. You are most security but in reality, they are not
vulnerable in peer-to-peer protected at all.
downloads (torrents) as the d. Spyware - a program that runs in
download is most likely not the background without you
monitored by the site owner. knowing it (thus called "spy”). It
14. Buy the software; do not use has the ability to monitor what you
pirated ones. are currently doing and typing
15. Do not reply or click links from through keylogging.
suspicious emails. *Keyloggers- used to record
the keystroke done by the users.
This is done to steal their
password or any other sensitive
information. It can record email,
Internet Threats messages, or any information you
Here are some of the threats you should type using your keyboard.
be aware of when using the Internet: e. Adware - a program designed to
1. Malware - stands for malicious send you advertisements, mostly
software. as pop ups.
a. Virus - a malicious program
designed to replicate itself and
2. Spam - unwanted email mostly 2. Your friends depend on you to
from bots or advertisers. It can be protect their reputation online.
used to send malware. Talk to your friends about this
3. Phishing- Its goal is to acquire serious responsibility.
sensitive personal information like 3. Set your post to "private" In this
passwords and credit card details. way, search engines will not be
This is done by sending you an able to scan that post.
email that will direct the user to 4. Avoid using names. Names are
visit a website and be asked to easy for search engines to scan.
update his/her username, 5. If you feel that a post can affect
password, credit card, or personal you or other's reputation, ask
information. the one who posted it to pull it
*Pharming - a more down or report it as
complicated way of phishing where inappropriate.
it exploits the DNS (Domain Name
Service) system. Copyright Infringement
Intellectual Property- an idea, an
4. Scamming- an act of the attacker invention, a form of literary work, or
that seeks to gain the victim’s trust a research, you have the right as
takes advantage of the victim to to how it should be used by others.
perform further attacks. Copyright Law- includes your
5. Hacking- Obtaining unauthorized rights over your work, anyone who
access to data from a certain uses it without your consent is
computer network. punishable with law.
Copyright Page- you will find
Protecting Reputations Online disclaimer with the words: “No part
 In the past, doing something of this book may be copied,
embarrassing was not much a big reproduced…”
deal.
 Nowadays, embarrassing
moments are captured using any
device you could imagine.
 This could impact not your Tips that could help you avoid
reputation but also the people copyright infringement:
around you. 1. Understand. Copyright protect
literary works, photographs,
Think Before You Click paintings, drawings, films, music
T- Is it True? (and lyrics), choreography, and
H- Is it Helpful? sculptures.
I- Is it Inspiring? 2. Be Responsible. Even if a
N- Is it Necessary? material does not say that it is
K- Is it Kind? copyrighted, it is not a valid
defense against copyright.
1. Before you post something on 3. Be Creative. Ask yourself whether
the web, ask these questions to what you are making is something
yourself: that came from you or something
 Would you want your made from somebody else’s
parents or grandparents creativity.
to see it? 4. Know the Law. There are some
 Would you want your limitations to copyright laws. It is
future boss to see it? also provision of “fair use” which
mean that intellectual property may correspondence from a simple
be used without a consent as long office memo to mail-merged from
as it is used in commentaries, letters with hundreds of addresses.
criticisms, search engines,  ENVELOPES- Can be created or
parodies, news reports, etc. Word can read a letter you have
typed in the program, collect the
Online Research address information and
1. Have a question in mind. Focus automatically create a matching
on a question you want answered. envelope.
2. Narrow it down. Search engines
like Google, Bing, or Yahoo use FORMAT USING MS WORD:
several filters to determine the  Header & Footer
most appropriate result for you.  Headings, Subtitles
3. Advanced Search. The best way  Cover Page
to filter information you get from  Picture (format, arrange)
search engines is by using the  Drop Cap
advanced search. It is also a set of  Table of Contents
digital tool that aid user in  References
performing research.  Page Border, Color & Watermark
4. Look for credible source. Some
wikis, filled with updated
information, are not a credible MICROSOFT EXCEL- Electronic
source. When using wikis, check spread sheet programs were
out the link of the cited text. originally based on paper spread
5. Give credit. Give credit to the sheets used for accounting. The
original author of the page or horizontal rows are identified by
information. To properly site a numbers and the vertical
reference, you may use the format columns by letters of the
below. alphabet.
Name of the person or organization (the author of
the information). Title of the homepage in italics
MICROSOFT POWERPOINT-
(title shown in the title bar but is sometimes
APPLIED PRODUCTIVITY TOOL WITH Used to create professional looking
missing or unrelated). URL. Date last seen.
ADVANCED APPLICATION slide shows that can be displayed
on projectors or big screen TVs.
MICROSOFT WORD- the most FEATURES:
important word-processing office  Slide Master
application used by students,  Design
teachers, IT professionals and  Transition
companies, etc. around the world.  Animation (Entrance, Emphasis,
FEATURES: Exit, Motion Path)
 Template  Animation Pane
 Clipboard
 Font (Color, Size, Style) CREATING A PRESENTAION
 Paragraph  24 is the default font size
 Styles  Dark background = light text
 Editing  Light Background = dark text
 View  Color Scheme
 Animation & Transition should be
 LETTERS- Microsoft enables you on point
to create a range of
A text or object that contains a link to
CREATING AN EFFECTIVE another life, web page, a place in a
PRESENTATION document, a link to a new document, or an
 Minimize- keep slides to a email address.
minimum to maintain a clear
message and to keep the audience LINK TO OPTIONS:
attentive. a) Existing file or web page- creates
 Clarity- avoid being fancy by using a hyperlink to website or a local file
a font style that is easy to read. saved in your hard drive.
Make sure that it is also easy to b) Place in this document- creates a
read. hyperlink that allows you to jump to
 Simplicity- summarize the a specific slide in your
information on the screen. Limit presentation.
that content to six lines and seven c) Create a new document- creates
words per line also known as 6x7 a hyperlink that clicked, creates a
rule. new document on your specific
 Visuals- use graphics to help you location.
in the presentation but not too d) E-mail address- creates a
many to distract the audience. hyperlink that opens Microsoft
 Consistency- make your design outlook that automatically adds
uniform. Avoid having different font your specified recipient on a new
styles and backgrounds. mail.
 Contrast- use light font on dark
background or vice versa. In most
instances, it is easier to read on
the screen if the background is
dark.

EMBEDDING
The act of placing objects within the
presentation.
1. Go to Insert tab.
2. On the Text group, click on
Object.
3. The insert Object dialog box would
appear:

OPTIONS
a) Creates New- creates a new file
from scratch. You can select on a
wide variety of files listed.
b) Create from file- creates a file
from an existing file save in your
drive.

HYPERLINK

You might also like