You are on page 1of 11

ACTIVITY SHEET IN EMPOWERMENT TECHNOLOGIES

Name: Art Dyron A. Demayo Grade and Section: Grade 11-ABM


MODULE 1

WHAT I KNOW

1. A
2. D
3. C
4. B
5. B

WHAT’S IN

1. Twitter
2. Social Networks
3. Micro blogging
4. Technology
5. Social
6. Website
7. Webpage
8. Convergence
9. Android
10. Social Media

WHAT’S NEW

1. How many times have you checked your phone this morning?

 I use my phone more often.

2. How many status updates have you posted in Facebook or Twitter today?

 I’m a kind of person that is not highly active in social media like Facebook and any kind of media
platforms.

3. Did you use the Internet for an hour after you woke up this morning?

 Yes, before I eat or do housework.

4. Do you follow a celebrity via his/her social media account?

 No.
WHAT’S MORE

Activity 1: Matching Type

1. A
2. F
3. G
4. I
5. K
6. J
7. H
8. E
9. L
10. M

WHAT I CAN DO

Web. 01 Web. 02 Web. 03

It is an old internet that only It is a platform that give users It is more connected, open,
allows people to read from the the possibility to control their and intelligent, with semantic
internet. data and everyone can be Web technologies, distributed
content producer. databases, natural language
processing, machine learning,
machine reasoning, and
autonomous agents.

Compare and contrast the implications of varied online platforms, sites and content. Write down your
insight below.

Online platform is a specially developed platform using Internet technology. Online platforms have


revolutionized access to any information. In our daily life today, we used Internet in doing such things and in
our learning purposes. 
Online site and content are groups of World Wide Web pages usually containing hyperlinks to each
other and made available online by an individual, company, educational institution, government, or
organization.
These two have similarities. Information and Communication Technologies use as a tool for curating,
contextualizing, collaborating, and creating content and experiences for learning in the professional tracks.
These tools can then be used to attract visitors to their website and can connect website to the platforms.

ASSESSMENT

True or False.

1. T
2. F
3. F
4. T
5. F
IDENTIFICATION

 OS
 BF
 MI
 NS
 BF
 OS
 MS
 BS
 MS
 MS

ADDITIONAL ACTIVITIES

1. Why do you think micro blogging platforms have become popular when regular blogging platforms
already exists?

- Micro blogging sites are popular because they're serving content in formats that today's users find
palatable. Users can exchange small content elements such as short phrases, individual pictures or
video links.

2. What do you think of Web 3.0? Do you think it will be realized someday in the future?

- Web 3.0 is useful to us. It makes our lives easier. But sometimes, it is scary because too much
innovation can make us lazy and rely on technologies too much. It will surely be improved and later on, we
would be leaving everything to all these machines including serious decision-makings.
ACTIVITY SHEET IN EMPOWERMENT TECHNOLOGIES

Name: Art Dyron A. Demayo Grade and Section: Grade 11-ABM


MODULE 2

WHAT I KNOW

1. D
2. D
3. C
4. A
5. C

WHAT’S NEW

1. First name
2. Middle name
3. Last name
4. Birthday
5. Address

WHAT’S MORE

QUESTION: Brian complains that his virus protection doesn’t work. What do you think has gone
wrong?
- Brian’s virus protection doesn’t work because it hasn’t been set to recognize particular files as
threats. Viruses normally hide themselves in zip or exe files, so maybe in setting an automatic virus,
check whenever you download something on your browser.

ACTIVITY 2:

Choose at least three of the mentioned online safety tips and explain.
- Know the security features of the social networking site you use. Social networking sites have
certain privacy policies that help protect people online. Always check these just in case.
- Add friends you know in real life. Adding random people on Facebook will make it easy for them to
contact you and track your daily activities, especially if you put your contact information in your bio
or if you post about your whereabouts throughout the day.
- Do not just accept terms and conditions; read it. Before downloading anything, make sure there’s
no adware or spyware associated with it and read the user agreement statement. There are
websites online that, sort of, help you out with this and can offer great reviews and advice on the
program and company that you’re downloading from.

WHAT I HAVE LEARNED

1. How does a virus affect a computer?


- Computer viruses usually spread in one of three ways: from removable media; from downloads off
the Internet; and from e-mail attachments.

2. How do computer worms spread?


- A computer worm is a standalone malware computer program that replicates itself in order
to spread to other computers. It often uses a computer network to spread itself, relying on security
failures on the target computer to access it. It will use this machine as a host to scan and infect
other computers.

3. How do fraudsters use social media to steal information?

-Fraudsters use social media to steal information by using information from people who post their
daily lives publicly in the said platform. They grab whatever they can and use it for their own benefit.
It is best to only post necessary information about yourself, and to close friends only in order to
prevent it.
4. What do fraudsters who practice phishing usually steal?
- Phishing campaign tries to get the victim to do one of two things: Hand over sensitive information.
These messages aim to trick the user into revealing important data — often a username and
password that the attacker can use to breach a system or account.

5. When does copyright infringement occur?


- Copyright infringement occur s when you make a copy of someone else’s creative works without their
permission, and your usage does not qualify as Fair Use.

WHAT I CAN DO

Share an experience that you have always tend to do but later did you discover that it is not a standard
of ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE.
- Entering websites which require questionable permission access. Sensitive information may be
acquired through permission access, such as location. It is much better to check all the permissions
that the website requires to keep your information to yourself.

ASSESSMENT

1. VIRUS
2. RANSOMWARE
3. TROJAN
4. SPAM
5. WORM
6. PHISHING
7. KEYLOGGER
8. SPAM
9. PHISHING
10. SPYWARE

ADDITIONAL ACTIVITIES

1. COPYRIGHT INFRINGEMENT
2. SPYWARE
3. TROJAN
4. VIRUS
5. SPAM
6. PHISHING
7. WORM
8. MALWARE
9. RANSOMWARE
10. ADWARE
ACTIVITY SHEET IN EMPOWERMENT TECHNOLOGIES
Name: Art Dyron A. Demayo Grade and Section: Grade 11-ABM
MODULE 3

WHAT I KNOW

1. C
2. A
3. D
4. A
5. B

WHAT’S NEW

Question: When do you say that an information contained in web pages is credible or not?

Search engine used: Google


Keywords: information credibility, web pages
Number of search results: 10
Sites used to answer the question:
1. https://wit-ie.libguides.com/c.php?g=648995&p=4551538’
2. https://www.whoishostingthis.com/resources/credible-sources/
3. https://www.library.georgetown.edu/tutorials/research-guides/evaluating-internet-content
Answer to the question: There are many things that I have to consider when browsing on the internet to
make sure that a website is reliable and trustworthy. Information is up-to-date, website cover the topic
thoroughly and it is comprehensive, and author is credible and reliable source of information in the field, are
some of the content of a credible information in web pages.

WHAT’S MORE

WHAT I HAVE LEARNED


1. What is the significance of using keywords when searching for information on the web?
- Keywords are words or phrases that we type on the search box when we do research about a certain
question or topic. It is defined as the words used as reference point for finding other words or information. They
are important because they are the linchpin between what we are searching for and the content we are
providing to fill that need.

2. How do the tips in conducting online research help you find the correct query results?
- Research can be tough and we must have tips to help us. The tips in conducting online research help us find
the correct query results by being a guide and base f the result of your question is accurate. Look for a reliable
website, look at the reviews and see what other people think, and also be careful around shady websites,
because they might have virus.

3. What is the role of the website's domain in evaluating website credibility?


- The domain of a website gives important clues to its credibility. You can find the domain name, sometimes
called the domain suffix, in the URL of the website – it’s the .com in amazon.com, and the .edu in
seminolestate.edu. Domain names follow patterns established by domain name registering agencies, and you
can use those patterns to discern clues about the purpose and geographic origin of a website.

WHAT I CAN DO

The given website is not credible because of its domain type which is .com. This kind of domain
focuses more on advertisements, not in the content. Also, the website’s publication is not stated and not
updated. The author of the article is stated, however his credentials to write a news was not listed so we are
not certain to his news writing skills.

ASSESSMENT

1.Atlantis
2.Waterbury
3.Waterbury –Connecticut –CT
4.Waterbury
5.“San Diego State University”
6. Mama ** not to * my life
7. “Bill 602P”
8. “We know he has weapons of mass destruction”
9. “demonstrating genuine relationship”
10. “Jenny kissed me when we met”
ADDITIONAL ACTIVITIES

(LINK 1) (LINK 2)

What is the domain type? NETWORK (.net) COMMERCIAL (.com)

Does the page list the author? Yes (Lyle Zapato) Not

Does it provide accurate information? Yes Yes

Does the page list the publisher? Yes Yes

Does it offer limited advertising? Yes No

Does it present information objectively? Yes Yes

Is the page current? Yes Yes

Is it updated? Yes Yes

Are the links up-to-date? Yes Yes

Does it contain dead links? Yes Yes


FINAL EVALUATION: Is the webpage No Yes
valuable and credible?

ACTIVITY SHEET IN EMPOWERMENT TECHNOLOGIES

Name: Art Dyron A. Demayo Grade and Section: Grade 11-ABM


MODULE 4

WHAT I KNOW

1. A
2. C
3. C
4. B
5. A

WHAT’S NEW

Scenario 1: You were tasked to create and send out formal invitations for a promo campaign that a
company is running. You were also initially given a list of ten names of loyal customers to send out to.

1. From the scenario above, describe briefly how you would most likely complete the task of
sending ten invitations with individual names of recipients using Microsoft Word.
- I will create a document and just copy and paste it several times then just replace the details
depending on whom I send it to.

2. Give examples of documents that you can personalize and send or distribute.
- I will create and print personalized letters with mail merge, menu with letter selected.

Scenario 2: You are making a report on the positive effects of using solar energy to the environment.
To make your report more appealing, you thought of putting a picture of a solar panel into your report.
You also considered presenting graphical data on the trends of worldwide initiatives on the use of
solar energy.

1. Describe briefly how you can insert pictures or images in a Word document.
- I will place the insertion point where I want the image to appear, select the insert tab, file, then click
insert to add it to the documents and lastly, insert an image file.
2. What other kinds of images or materials can be inserted in a Word document?
- JPEG (Joint Photographic Experts Group) for photos
- PNG (Portable Network Graphics) for screenshots
- EMF for drawn pictures
- WMF for simple drawn pictures

WHAT’S MORE

Discuss the steps on how to insert these three types of illustrations in your Microsoft Word Document.
- Open the Word Document where you would like to insert the clipart. Click the [insert] tab from the
“illustrations” group. Click [clipart] then click the shapes then insert a smart art graphic and add text
to it.

Discuss the steps on how to format the same illustration to achieve the illustration below.
- Insert a shape and add the clip art in the illustration group then go to design and click the page
border.

WHAT I CAN DO

1. What are some ways you can use to acquire images that can be inserted in a Word document?
- Place your insertion point where you want the image to appear, select the Tab, click the picture command in
the illustration group, and insert picture dialog box appears.

2. Describe the steps on how you are able to transfer your pictures to your computer.
- First, you must get charger cord/connector or USB then connect it to your phone to your PC for transferring.

3. Identify at least two other opportunities to create and distribute or send a merged documents or
labels and make samples of each.
- First, user must create and edit the template. Once the template is created, user can create the merge
document.

ASSESSMENT

1. A
2. B
3. C
4. B
5. C
6. C
7. A
8. C
9. A
10. D
11. A
12. C
13. B
14. B
15. D

ADDITIONAL ACTIVITIES

1. How important is the mail merge feature of Microsoft Word in different organizations?
- Before the invention of email, the mail merge feature of Microsoft Word was very useful when you wanted to
send the same document to many people by printing it out and sending it through regular mail. Now that you
can simply add the document to an email message and send it over the internet to a group using a distribution
list, mail merge is likely less used than it was. However, government organizations are still using the paper-
based method, so for them, mail merge will still be very useful. The reason they still have to use printed
documents is because not everyone has their own computer and printer at home, and a letter with a
government address on it is still more secure than an email claiming to be from “the government”.

2. Give an instance where it would be better to use the feature of Microsoft Word in sending out letters.
- A Thesaurus is a software tool included with some word processors that provides synonyms for selected
words on command. Users using Microsoft Word can open a Thesaurus by highlighting the word they want to
look up and pressing the shortcut key Shift+.

3. When do images or graphics in Microsoft Word hurt the document rather than help?
- When the pictures, images and graphics takes up for more spaces on the page than necessary, they hurt the
document rather than help. Pictures and graphics in documents should be there to clarify the text or texts and
not overtake the significance of written words.

You might also like