Professional Documents
Culture Documents
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such agency
or office may, among other things, impose as a condition the payment of royalty.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort
has been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and writers do not represent nor claim ownership over them.
I. CONCEPT NOTES
ICT or Information and Communications Technology refers to technologies that
allow access to information through telecommunications. Telecommunications allow people
to communicate with each other and exchange information real-time even if they are far
from one another. It includes products that saves, processes, transmits, and stores
electronic data. Examples are the internet, wireless networks, computer, and cellular
phones.
• Learning - ICT has influenced and changed the ways in which we teach and learn.
Learners can now learn online.
• Communication – Communication can be made in real-time through email, chat rooms
and social media.
• Telehealth – Access to health care services, such as making appointments with a
doctor, is possible with the use of computer and smartphones.
• Entertainment – By using ICT, people can easily be entertained through social games,
video games, alternate reality games, music, social television and films.
• Job searching – Online recruitment sites allow jobseekers to efficiently find potential
employers and employers can now easily advertise job openings of their companies.
• E-commerce – ICT helps companies or small businesses market their product globally.
It makes buying and selling faster and more efficient.
II. EXERCISES
Give an example of a device or technology that can be used for the following:
1. Learning : _______________________
2. Job Searching : _______________________
3. Communication : _______________________
4. Entertainment : _______________________
5. E-commerce : _______________________
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
LAS TITLE Advantages and Disadvantages of ICT LAS NO. 2 SCORE
LEARNING
COMPETENCY
Give examples from daily life of the advantages and disadvantages of the 21st century in terms of ICT.
I. CONCEPT NOTES
Information and Communication Technology or ICT refers to all technological tools,
devices, and resources used to communicate, and to create, publish, save, and manage data.
This includes the computer, internet, cellular phones, and other devices for communication.
Here are some advantages and disadvantages in using ICT.
Education – With only a few clicks, teachers Education– ICT equipment can be
and students can easily access a wide range expensive.
of information and opportunities to learn with
only a few clicks. Job loss –Those who are working in
Creation of new jobs - Mobile app manual operations lose their jobs
developers, virtual programmers, systems because machines and equipment are
analysts, web designers, and other workers now automated.
in the communications industry all owe their
jobs to ICT. Privacy – The advancement of ICT
threaten people’s personal privacy
Communication - It has become quicker and because of hacking and impersonation
more efficient. on social media.
Business – Business owners can now cater Reduce physical activities – ICT
to international buyers and clients. affects our way of living and we become
inactive.
Banking - The use of ATMs, Internet
banking, and mobile banking have made
banking more convenient to customers. Reliability of information – Because
anybody can write and upload content,
Healthcare - ICT improves the quality of some information in the internet are not
services made by health workers and trustworthy.
institutions to their patients.
II. EXERCISES
Direction: Identify if the following sentences are an advantage or disadvantage of using
ICT.
I. CONCEPT NOTES
II. EXERCISES
Direction: Give an example of a technology used in the 20th and 21st Century.
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
LAS TITLE Computer and Its Characteristics LAS NO. 4 SCORE
LEARNING
COMPETENCY
Describe the computer and its characteristics.
I. CONCEPT NOTES
A computer is an electronic device that stores, processes, and manipulates data.
Through its various programs, we use a computer to perform different kinds of tasks such
as typing documents, sending electronic mails, playing games, and browsing the internet.
Characteristics
Diligent of Computers Storage capable
II. EXERCISES
Direction: Put a check mark on the sentence that states the characteristics of a
computer.
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
LAS TITLE Microcomputer and Its Uses LAS NO. 5 SCORE
LEARNING
COMPETENCY
Different types of microcomputer and its use in everyday life.
I. CONCEPT NOTES
There are many types of Microcomputers and these are some of them:
Types of Microcomputer
1. Desktop computer 2. Smartphones – a
– a computer with a device that performs
keyboard, mouse, many functions and can
CPU, and monitor “Desktop Computer”
work as a computer. It is “SAMSUNG Galaxy Note10” by
嘉傑 Licensed Under
and is placed on a Licensed under Public Domain primarily used for calling CC BY-SA 3.0
networking features.
II. EXERCISES
Direction: Identify the Microcomputer that is best used for the following everyday tasks.
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
LAS TITLE Parts of the Computer and Its Function LAS NO. 6 SCORE
LEARNING
COMPETENCY
Identify the parts of a desktop computer; Explain the functions of each of parts of a desktop computer.
I. CONCEPT NOTES
Parts of Computer and its Function:
1. Computer Case- it holds the main components of the computer that includes the
motherboard, central processing unit (CPU) and power supply.
2. Keyboard – it is an input device which allows you to enter letters, numbers, and
characters and make some commands in the computer.
3. Mouse – it is a handheld device that lets you point, click, and move objects on the screen.
4. Monitor - it functions with a video card found inside the computer case to show images
and texts on the screen.
5. Speaker – it lets you hear the sound or audio coming from the computer.
II. EXERCISES
1.
3.
5.
2.
4.
1. _____________________________________________________________
2. _____________________________________________________________
3. _____________________________________________________________
4. _____________________________________________________________
5. _____________________________________________________________
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
LAS TITLE Differences of Computer Hardware and Software LAS NO. 7 SCORE
LEARNING
COMPETENCY
Explain the difference between computer hardware and software.
I. CONCEPT NOTES
Hardware - It refers to the physical parts of the computer. These are parts that we can see
and touch such as the monitor, mouse, and the keyboard. The hardware is important because
it is what we use for the input and output of data in the computer. For example, we cannot hear
the sound of a song playing in the computer if we don’t have a speaker.
.
The monitor and keyboard are examples of hardware. Microsoft Office applications such as MS Word are
examples of software.
Software – It refers to the programs and applications, such as word processors and
spreadsheets, that control the computer and its hardware to perform a task. Without a
software, computers become useless. For example, you cannot surf the internet and visit
websites if you don’t have an internet browser such as Google Chrome or Mozilla Firefox.
II. EXERCISES
Indicate whether the statement is TRUE or FALSE. Write your answer in the space provided.
LAS TITLE Types of Computer Hardware and Its Functions LAS NO. 8 SCORE
LEARNING
COMPETENCY
Identify different types of computer hardware accessories and their respective functions.
I. CONCEPT NOTES
Types of Computer Hardware and Its Functions:
Speaker Printer
Keyboard Mouse
II. EXERCISES
LAS TITLE Types of Computer Software and Its Uses LAS NO. 9 SCORE
LEARNING
COMPETENCY
Identify different types of computer software and the tasks they are used for.
I. CONCEPT NOTES
Kinds: Kinds:
• Operating System (OS) - serves as the • Word processing- creates and edits
interface of the programs and hardware. documents.
• Database management systems –facilitates • Spreadsheets- organizes, stores and
the storage, maintenance, and utilization of analyzes numerical data.
data in a database that is shared by many • Presentation –creates, views and
users. presents slideshows.
• Networking software - ensures that your • Graphics and Media - edits photos,
network connection is working. videos, and audio files.
• Translator - translates other programs into • Communication applications-
machine language instruction codes that the sends and receives messages and
computer can execute. files through the internet
• Software Utilities – help analyze, optimize and • Security applications- protects the
maintain the computer. computer against malwares and
viruses.
II. EXERCISES
LAS TITLE Summative Test on Computer Hardware and Software LAS NO. 10 SCORE
LEARNING
COMPETENCY
Column A Column B
____1. Speakers a. It refers to the physical parts of a computer.
____2. Software b. These are programs that are responsible in controlling
____3. Motherboard operations of the computer.
____4. Graphics c. It is a storage device which holds data and instructions.
____5. Security d. These are applications that are used to edit photos.
____6. Memory e. These are programs that control the computer and its
hardware to enable it to perform a task.
____7. Hardware f. It provides audio and sounds coming from the computer.
____8. Presentation g. It is used to control the movement of the cursor.
____9. Translator h. It is the main circuit board of the computer.
____10. Mouse i. These are programs that translate other programs into
machine language instruction codes.
j. It protects your computer against malware and virus.
k. It is an application used to create, view and present
slideshows.
B. By using the words inside the box, complete the concept map about the computer hardware
and software.
COMPUTER
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
I. CONCEPT NOTES
There are many things that we can do with a computer. For a computer to work, we need to
learn some basic computer operations such as turning it on and off, as well as restarting it
when needed.
Turn On a Computer
1. Click the Windows menu button. 2. Click the small arrow next to the right of the
Shut Down button. Then, click Restart.
II. EXERCISES
True or False.
__________1. The Shut Down button will turn the computer off.
__________2. The Shut Down button can be found in the Windows Menu.
__________3. For a desktop computer, you will need a power supply to turn it on.
__________4. The Restart button is in the CPU.
__________5. You can restart a computer anytime.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
I. CONCEPT NOTES
Peripherals - are additional devices that is added to a computer in order to expand its abilities.
These devices are connected through buses.
• Buses - uses set of connectors which are usually found in the back of the CPU to
physically plug devices, cards or cables together.
Categories of Peripherals
Input- accepts data or commands Output- displays the Storage- reads and stores
for the computer to perform processed information data
(example: keyboard) (example: printer) (example: flash disk)
I. CONCEPT NOTES
Folders - it is where files can be stored and organized.
Files - are collection of data that is stored in one unit and is identified with a file name.
Types of Files:
▪ Documents
▪ Pictures
▪ Audio Files
▪ Video Files
Creating/Opening Folders:
Method 1: Using Keyboard Method 2: Using the Method 3: Using the Home
Shortcuts mouse tab
1. Go to the 1. On the current window 1. Go to the Home tab of the
location where where you are planning to current location where
you want to create a folder, right-click you are planning to create
create a folder. the mouse. a folder.
(Ex. Desktop/ 2. A menu will appear. Click 2. On the New group, click
Documents) New, then click Folder. New Folder button and a
new folder will be created.
II. EXERCISES
Write TRUE if the statement if correct and FALSE if not.
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
Managing Personal Files(Renaming and Moving Files
LAS TITLE LAS NO. 14 SCORE
and Folders)
LEARNING
COMPETENCY
Demonstrate how to manage personal files in a computer.
I. CONCEPT NOTES
Renaming a File or Folder
II. EXERCISES
Write TRUE if the statement if correct and FALSE if not.
___________1. There are two ways to rename a file or folder.
___________2. The keyboard shortcut to copy a file or folder is to press F2.
___________3. We can right-click the mouse to rename a file.
___________4. There is a keyboard shortcut to move or copy files and folders.
___________5. There is a rename button in the Home ribbon.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
Managing Personal Files ( Searching for File/Folder &
LAS TITLE LAS NO. 15 SCORE
Deleting File/Folder)
LEARNING
COMPETENCY
Demonstrate how to manage personal files in a computer.
I. CONCEPT NOTES
Searching for a File or Folder
Method 1: Using the Search bar on the Method 2: Using the Search bar on the
Taskbar Ribbon
1. Click the Search web and Windows 1. Go to the window or drive where you think
located beside the Start button. your file or folder is located.
2. Type all or part of the filename. All 2. On the search bar at the upper-right side of
similar files or folders that matches the window, type the file or folder’s name.
your search will appear. 3. Windows will show all the files and folders
3. Just click the file or folder that you with the same name. Click the file or folder
need. that you need.
II. EXERCISES
Write TRUE if the statement if correct and FALSE if not.
I. CONCEPT NOTES
Photo editing, computer gaming, and video streaming are some of the things that we
can do with a computer through the use of different kinds of software.
II. EXERCISES
Answer the questions by numbering the box in correct order.
To install a software
_____a. A dialog box will appear.
_____b. The software will be installed.
_____c. Locate the .exe file
_____d. Follow the instructions to install the software.
_____e. Double-click the .exe file in the installer folder.
_____f. Use CD-ROM or Download from the Web
To open a software
_____a. Click on the icon.
_____b. Wait for the software to open.
_____c. Click on the Start Menu.
_____d. Look for the software in the menu list.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
When using a computer, you might encounter some problems. Identifying where to start
fixing your desktop computer can save you lots of time and money. The table below shows
how to recognize the common problems of a desktop computer:
Problem Software Hardware
Computer is slow It can be caused by a malware. The hard drive is starting to fail or
there is not enough memory.
Computer keeps It can be Operating System It can be due to a dysfunctional
restarting update problems or presence of graphics card or motherboard.
a virus.
Keyboard, mouse, The driver is not properly There are issues in the computer port
printer aren’t installed. or peripheral component.
working properly
App command is The application might not be If happening to more than one app,
not working compatible with the computer. there might be a hardware problem.
Internet is slow The application is consuming The hard disk is failing.
the bandwidth.
Computer freezes The windows cannot It can be your hard drive, an
understand what the overheating CPU, bad memory or a
application may attempt to failing power supply.
perform.
PC Blue screen of It can be caused by issues with It can be caused by malfunctioning
death software or driver running in the hardware, such as power supply.
Windows kernel.
Corrupt files or long It can be caused by viruses and There are bad sectors (tiny cluster
delays accessing malware. of storage space that appears to be
files defective) on your hard drive.
Sudden shut off There is an issue with operating A hardware component is failing.
system or malware.
Unusual noises BIOS beep codes The CPU/Case fan that is attached
to the computer is damaged.
II.EXERCISES
Fill in the blanks. (2 points each)
Write the possible problem that can be caused by the following issues.
I. CONCEPT NOTES
In using a desktop computer on a regular basis, there are many common problems that
might occur. Don’t panic! Figuring out how to identify and troubleshoot it will spare time and
expenses. The following are the most common problems of a desktop computer:
▪ It won’t turn on – Check the computer if it’s plugged properly in the power source. You
may also use another device that is working to test the power source.
▪ Blank screen – Make sure that you plugged the monitor into the power source and the
connection between the monitor and computer hard drive is secured.
▪ Abnormally functioning software – If the operating system or the software is
unresponsive, then try restarting your computer and run a virus scan.
▪ Windows won’t boot – Reinstall the Windows recovery disk.
▪ Frozen screen – Press and hold the power button to turn off the computer, then try to
clean up the system.
▪ Slow computer – Clean the disk drive of unwanted files to fix the problem. Installing a
firewall, anti-virus, and anti-spyware tool will help block the virus that causes the
computer to go slow. Lastly, try to scan the registry regularly.
▪ Excess noise – Try to check if it is the fan in the computer that is creating the noise. If
not, replacing a hardware can solve the problem. If there is excess noise coming from
the computer, it is most likely a sign of hardware malfunction.
▪ Overheating – Just let the computer rest for a while to keep it from burning out. Check
if there is enough air flow that comes in and out. A computer must be in an area with
good ventilation to avoid overheating.
▪ Internet is slow – Cookies and temporary files in the internet should be cleared to
increase the performance of the web browser.
II. EXERCISES
Match the common problems of a desktop computer in Column A with the
troubleshooting done in Column B. Write the letter on the space provide.
Column A Column B
___1. Overheating a. fixing desktop computer problem
___2. Strange noise b. check that the computer is plugged
___3. Computer is slow c. reinstall Windows recovery disk
___4. Screen is frozen d. run a virus scan
___5. Windows won’t boot e. check if the monitor is plugged
___6. Unresponsive software f. press and hold the power button to reboot
___7. Blank screen g. install anti-virus
___8. Won’t turn on h. replace malfunctioned hardware
___9. Slow internet i. check the fan to make sure it’s working
___10. Troubleshoot j. clear Internet temporary files
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
II. EXERCISES
Provide what is ask about word processing application. Write your answer in the box.
I. CONCEPT NOTES
Opening a word processing application such as Microsoft Word is the same as in
opening a software program.
1. Click on the Start Button found in the lower left part of the screen;
**You can also open MS Word by simply double-clicking the icon on the Desktop.
**You can also close the MS Word by clicking the close button (X) on the upper-right
part of the screen.
II. EXERCISES
Sequence the steps in opening and closing Microsoft Word numbering the blanks.
To open:
_____Double-click the icon.
_____Look for the icon of the software.
_____Click the Start button.
To close:
_____Click Close.
_____Click the File tab.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
To enter a TEXT into a document, there are two ways to do it.
To enter SYMBOLS:
3. Click More Symbols option if the symbol you want is not in the list.
5. Click Insert.
II. EXERCISES
Write TRUE if the statement is correct and FALSE if it is not.
I. CONCEPT NOTES
Selecting a text is an important skill in editing a word document. By selecting a text,
the user can perform various operations such as deleting, copying, moving, applying
formatting, and changing capitalization of texts. Below are methods in selecting a text in a
document.
To select a Paragraph;
Place your cursor at the start of the paragraph. Press Ctrl + Shift + down arrow.
II. EXERCISES
Choose the letter of the correct steps in selecting a text in a document. Write the
answer on the space provided before each number.
I. CONCEPT NOTES
Copying text in Microsoft word or any other word processing program lets you
duplicate a piece of text without having to type it each time. This makes it fast and time-
saving.
To Copy a text from a document, you may use either of these methods:
II. EXERCISES
Choose any of the methods discussed in copying text in Microsoft Word. Write the
steps below.
1.
2.
3.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Content Editing is improving content by changing texts, removing characters, and
rearranging letters, words and sentences. The commands used to edit in Word, Excel and
PowerPoint work almost exactly the same way in another Microsoft office program.
When editing content, you must take note of two things: Insertion point and I-Beam.
Position the insertion point or cursor where you want to insert the new text and then type it.
To remove text:
You can use any of these methods:
a. Backspace it. Position the I-beam and then press the Backspace key to delete
text to the left of the insertion point.
b. Delete it. Highlight the text and then press the Delete key or;
position the insertion point and press the Delete key to delete text to the right of
the insertion point.
c. Type over it. Highlight the text and then type a new text to replace it. Whatever
was highlighted is deleted.
II. EXERCISES
Write TRUE if the statement is correct and FALSE if it is not.
I. CONCEPT NOTES
Simple Search/Replace is a replacement for the Windows "containing text" option found
in the search window. It helps users to find words or format in a document and replace it
with other words or set of words.
II. EXERCISES
Sequence the process in finding and replacing word or phrase in a document. Write
the number inside each box before the picture.
Click “ok” Type the word or phrase.
Press Ctrl + H
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Saving a document is very important so you can open and change it later. There is also a
need to save every now and then to prevent the document from being lost. Lastly, it is very
important to remember the location of the document to find it easily when it is needed.
2. Click Save As on the menu list if it’s your first time to save the document and select
a location where to save a file.
1 2
• For the succeeding saving of the document, you can either click Save from the
File tab or press Ctrl and S on your keyboard.
3. Give it a file name and click the Save button. The document will be saved.
• To save documents to a variety of file types, click the Save as type drop-down
menu and choose the appropriate file type (PDF, Rich Text Format, Web Page).
Click Save afterwards.
II. EXERCISES
Sequence the order of saving a document by writing 1-5.
I. CONCEPT NOTES
Switching between two or more documents is very helpful if you’re multitasking and or using
a reference to one document.
B. Press and hold the ALT key and tap the TAB key on the keyboard. This will show the
icons of the open documents.
C. Switch windows by clicking on the View Tab, then on Switch Widows and choose the
needed document from the list.
D. In the task bar, you’ll see a stack icon with a number of open items. A thumbnail of the
open documents will appear once the stack will be clicked.
STACK ICON
II. EXERCISES
Fill in the blanks. Write the correct word to complete the command in switching between
open documents.
I. CONCEPT NOTES
Microsoft Word has several built-in toolbars, including the two default toolbars that are
visible when you start Microsoft Word. These are the Standard toolbar and
the Formatting toolbar.
The Standard toolbar includes frequently used commands which can easily be
accessed, such as Save, Open, Copy, Paste, Draw table and Quick Print. It is located at
top-left portion of the screen.
The Formatting toolbar provides quick access to commands, such
Bold, Italic, Underline, Numbering, and Bullets, that will edit and format texts.
MS Word 2019
Like many programs, the toolbars can be customized. To customize your standard
toolbar, just click the drop-down arrow and select the command you like to add to the toolbar.
You can also remove the command from the toolbar by clicking the check mark.s
If you want to add commands not displayed in the drop-down menu, click More
Commands. A dialog box with list of all available commands will appear. Select a command
you want, then click the Add button. When you are done click OK.
II. EXERCISES
In the space provided, write TRUE if the statement is correct and FALSE if not.
_______1. Standard toolbar and Formatting toolbar are the two default toolbars in MS Word.
_______2. The toolbars are fixed and cannot be customized.
_______3. Standard toolbar enable users to quickly access frequently used commands.
_______4. Toolbars has icons that doesn’t allow the user to open and save documents.
_______5. Clicking More Commands in the drop-down menu enable the user to add
commands in the toolbar for easy access.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
A command is a specific instruction from a user to a computer program to perform a
certain task or function. Commands come in different forms. They can be (1) specific words
(keywords) that a program understands, (2) function keys/ choices in a menu, and (3) buttons
or other graphical objects on your screen.
EXAMPLE of Commands
Delete text- it erases or removes a text. This can be done in 4 ways:
• Place the cursor next to the text. Press Backspace key.
• Place the cursor to the left of the text. Press Delete key.
• Highlight the text and press the Backspace or Delete key.
• Highlight the text and type over it the new text.
Undo command- it erases the last change done to the document, reverting it to an older state.
This can be done in 2 days:
• Press Ctrl and Z on the keyboard at the same time.
• Click the Undo command button on the Quick Access Toolbar. The Undo command
button sports a drop-down menu that helps you review the past several things you’ve
done.
Redo command- it restores any actions that have been previously undone using an undo
command. This can be done in 2 ways:
• Press Ctrl and Y on the keyboard at the same time.
• Click Redo command button on the Quick Access Toolbar.
II. EXERCISES
Encircle the letter of the correct answer.
1. It is used to erase or remove a text.
a. Redo b. Delete c. Print d. Copy
2. It is used to restore any actions that has been previously undone.
a. Undo b. Redo c. Save d. Open
3. It is used to review or erase the last change done to the document.
a. Undo b. Redo c. Save d. Open
4. It is the keyboard shortcut for Undo.
a. Ctrl + X b. Ctrl + Y c. Ctrl + Z d. Ctrl + V
5. It is the keyboard shortcut for Redo.
a. Ctrl + X b. Ctrl + Y c. Ctrl + Z d. Ctrl + V
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Formatting texts in Microsoft Word involves tasks like bolding the text, italicizing it,
and changing the font and size. The commands to perform all of these formatting tasks are
found on the Home tab. You can edit the font, format your paragraphs, and change the styles
of your texts.
To format the font of your texts, there are several ways to do it. Among of these are the
following:
Add Effects
II. EXERCISES
Encircle the letter of the correct answer.
1. This is used to change the color of the text.
a. Font letter b. Font style c. Font color d. Font size
2. This is used to make the text bigger or smaller.
a. Font letter b. Font style c. Font color d. Font size
3. Arabic typesetting, Arch, Times New Roman and Arial are examples of ___________.
a. Font effects b. Font c. Font color d. Font size
4. Bold, Italic, Underline, Italic Bold and Regular are examples of ___________.
a. Font letter b. Font style c. Font color d. Font size
5. Examples of this are Superscript and Subscript.
a. Effects b. Font letter c. Font color d. Font size
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Formatting marks were also named as “nonprinting characters.”
These characters occupy space and have formatting functions but they
are not seen on the printed page. Examples are spaces, paragraph
marks, manual line, break marks and tab characters. While most people
choose not to see them on the monitor while working on a document, it is
still very helpful to learn how to display and hide them and know their
importance. Basic Formatting Marks
Img source: www.thedoctools.com
1 2
4 5
3
II. EXERCISES
In the space provided, write TRUE if the statement is correct and FALSE if not.
_____1. To switch on the Formatting marks, the user may simply click the pilcrow.
_____2. Formatting Marks were previously known as “printing marks”.
_____3. Ctrl+Shift+8 is the keyboard shortcut to display Formatting marks.
_____4. Formatting marks are characters that take up formatting function but do not appear
on the printed page.
_____5. In the “Always show these formatting marks on the screen” section, you can check
the boxes if you want to show the formatting marks in your document at all times.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Tables organize text into rows and columns, which can make the text easy to input,
change, edit, and format while spacing it properly in your document. It arranges data into cells,
the intersection of a row (horizontal) and a column (vertical). Before creating a table, you must
first place the mouse cursor on the part of the document where you want to put the table. Then,
follow these steps:
1. Click Insert tab.
2. Click Table icon.
3. Hover your mouse on the boxes until you have
the desired number of columns and rows. (ex.
6x4 Table).
Layout:
- Add and delete rows and columns - Merge cells
- Split cells - Adjust height and weight of cells
- Add cell margins - Distribute rows and columns
II. EXERCISES
Create a table in a short bond paper.
DESIGN LAYOUT
1. The table must have 5 columns. 4. Cell height is “0.19".
2. The table must have 10 rows. 5. Cell width is “1.62”.
3. Fill the first row with a color or shading.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
ACTIVITY SHEET FOR LEARNING STRAND 6: DIGITAL CITIZENSHIP
NAME DATE
SCHOOL/CLC DISTRICT
LEVEL Basic Literacy Lower Elementary Advanced Elementary Junior High School Senior High School
LAS TITLE Using Page Layout and Print Commands LAS NO. 33 SCORE
LEARNING
COMPETENCY
Finalize a document using page setup, headers/footers, spell checking, and printing commands.
I. CONCEPT NOTES
Page Layout refers to the arrangement
of text, images, and other objects on a page
when it is printed. It includes elements which
you can use to customize the page
orientation, paper size, paper margins, and
number of columns depending on how you
want your document to appear.
II. EXERCISES
Encircle the correct answer.
1. This refers to the arrangement of text, images, and other objects on a page.
a. Page Layout b. Margins c. Orientation d. Columns
2. If you click this tab, the following will appear: Margins, Orientations, Columns
a. Page Layout b. File c. Home d. Review
3. This is where the Print button can be found.
a. Scrollbar b. Preview c. Printing Options d. Copies
4. This is where the Headers and Footers can be found.
a. Paper size b. Margins c. Orientation d. Insert tab
5. This is where the Spelling and Grammar can be found.
a. Insert tab b. Review tab c. File tab d. Print tab
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Mail merge is a feature in word processing applications such as Microsoft Word that
enables users to send a similar document to multiple recipients. It connects a single document
template to a data source that contains information about the recipient’s name, address and
other predefined and supported data. It is usually used to send personalized letters and pre-
addressed envelopes for mass mailing, which makes communication faster and more efficient.
2 3 4
II. EXERCISES
I. CONCEPT NOTES
II. EXERCISES
In the illustration at the
side, you can see that
the Address block and
the Greeting Line have
been inserted. Now,
continue writing your
letter of invitation to
your birthday party.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Mail Merge – Previewing and Finalizing
After setting up the Address and the Greeting Line, you can now write the letter.
After writing the letter, we can preview and check if the Address Block and the Greeting Line
works. Click Preview Results from the Mailings tab.
As you can see in the illustration above, the Address Block shows a recipient from the list that
we have created in the previous LAS. It is the same with the Greeting Line.
Now that it works, we can now finish and merge. We can either edit the individual letter, print
it, or send it to the recipients’ emails.
Once it is merged, all the recipients we typed in our list will each have a copy of the letter
automatically with their names and other information written in the Address block and the
Greeting Line. We don’t have to create and edit the letter one by one.
II. EXERCISES
Print a copy of the letter that you created in the previous LAS for 3 different recipients.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
HELP is an available option or menu in most software programs, such as Word
Processing Applications, that allow users to search and find answers to questions that may
occur while using the program.
There are two ways to access the HELP feature. The easiest way to access HELP menu
is through tapping the F1 function on the keyboard. Another way is by clicking the help button
located at the top portion on your word document screen.
The pictures below show how to access the HELP function.
1. Collaborate – share a document, insert or delete comments, track changes in word, etc.
2. Insert Text – add and format a text, create a bullet list, apply themes, etc.
3. Pages and layouts – change margins, add borders, etc.
4. Pictures – insert table, insert pictures, add watermark, etc.
5. Templates & Forms – save a document, edit a PDF, etc.
6. Mail – letters, labels, envelopes, etc.
II. EXERCISES
Write the letter of the correct answer on the space provided before each number.
____1. It is a menu in most software programs that allow users to search and find answers to
questions that may occur about the program.
a. F1 b. HELP c. functions d. all of the above
____2. The user wants to put pictures and tables on the document. What specific HELP
function should he/she use?
a. Pages and layouts b. Insert text c. Pictures d. Mail merge
____3. The easiest way to access HELP menu is through __________________.
a. Clicking the help button c. Tapping the F1 key on the keyboard
b. typing HELP in the search engine d. All of the above
____4. You are done with the document and had printed it out. Upon checking on the
printout, you forgot to insert page number. What HELP function should you use to solve this
issue?
a. Pages and layouts c. Insert text
b. Templates & Forms d. Collaborate
____5. You are done typing a project in English Communication Skills and you want to apply
styles and themes to make it more attractive. What HELP function will you use?
a. Pages and layouts c. Collaborate
b. Templates & Forms d. Insert text
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Creating, editing, saving and printing documents
This word processing activity involves earlier content knowledge, process skills, and
work habits that will help improve your skill in using Microsoft Word.
After creating your document, edit it, check proper margins, orientation, and paper size
using Page Layout.
Print it in multiple copies using Mail Merge. Click the Mailings Tab; click Start Mail
Merge, and Select Recipients.
I. CONCEPT NOTES
Network is a connection of multiple computers. It can be in the form of LAN (Local Area
Network), WAN (Wide Area Network) or MAN (Metropolitan Area Network).
An example of WAN is the internet.
The internet is a Wide Area Network, which means that computers around the world
can continually share data throughout the network.
The Idea of having an internet was first envisioned by J.C.R Licklider in the year 1960.
During the time of the cold war, the US Military funded a project in which enables them to
communicate even after a nuclear attack. This was called the ARPANET (Advanced Research
Projects Agency Network).
Years after the cold war, ARPANET developed a standard network communication tool
to convert messages into a standard form and send the messages to exact destinations around
the world. This was called TCP/IP (Transmission Control Protocol/Internet Protocol). All
computers connected in the same network have a unique IP address. The ARPANET grew
into a gigantic network of networks and now, it is commonly called as the ‘Internet’.
Look at the timeline below to know the history of the internet:
1
II. EXERCISES
Based on the timeline above, answer the following questions.
1. Who envisioned the idea of the internet? _______________
2. Who developed the first internet search engine? _______________
3. When was the first computer virus created? _______________
4. How many internet users were there during the Summer of 2014? _______________
5. How many web pages Google had in 1998? _______________
6. Who published the code for the world wide web? _______________
7. On what year did the first website go live? _______________
8. What was the previous name of the internet? _______________
9. What company produced the first cellphone with a web browser? _______________
10. What country became the first to use internet voting? _______________
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
II. EXERCISES
I. CONCEPT NOTES
I. CONCEPT NOTES
The World Wide Web (www) contains a lot of websites that provide information and
resources. To access the World Wide Web, we need an (1) internet service and a (2) Web
Browser.
Internet Services
After we are connected to the internet, we can now search for information and look for
resources in the World Wide Web using a Web Browser such as Google Chrome and Mozilla
Firefox. URL box
(
Type the Web address in the URL box.
Example : www.als.com
(
Open a Web Browser such as
You can also type the information you are
Mozilla Firefox.
searching for.
Example : Where is ALS Region X
(
II. EXERCISES
Based on the illustrations above, identify what is being described in the sentences.
_______________1. The internet service that requires a telephone line to provide internet.
_______________2. It is a wireless network for computers that access the internet through a
router.
_______________3. It requires cables and delivers internet usually in local area networks (a
set of computers interconnected to each other).
_______________4. It has an antenna that uses radio frequencies to connect to the internet.
_______________5. This is used to access the World Wide Web after connecting to the
internet.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Search Engine is a computer program that can help you find information over the internet by
just typing some keywords on the search box.
1. Open a Web Browser. 3. You can filter the type of data that
you want such as videos or images.
II. EXERCISES
Using different search engines, search the “how to pass ALS A&E test” and put how
many search results are found in each search engine.
Search Engine Number of Search Results
1 AOL
2 Yahoo
3 Google
4 MSN Search
5 Bing
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
The World Wide Web is full of information and resources about anything. With the web, we
can communicate with others and learn new things easily. There are many tools and resources
that we can use for communication and education.
Communication Education
E-mail Blog Online Test/Quiz
Chat Wiki Online Survey
Discussion Forums Podcast E-books/online books
Group sites/e-groups Audio/video CDs Video on demand
Social networking sites Digital encyclopedia Electronic Gradebook
Digital games Interactive maps
II. EXERCISES
By using a dictionary or browsing the internet, give 1 example for each tool and resources.
Examples are provided.
Communication Example
E-mail Yahoomail.com
Chat
Discussion Forums
Group sites/e-groups
Social networking sites
Education
Wiki Wikipedia.com
Blog
Online Test/Quiz
Online Survey
Podcast
E-books/online books
Audio/video CDs
Video on demand
Digital encyclopedia
Electronic Gradebook
Digital games
Interactive maps
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Downloading means receiving data or a file from the Internet on
your computer.
Uploading means sending data or a file from your computer to
somewhere on the Internet.
II. EXERCISES
Direction: Demonstrate the process of downloading and uploading by doing the following:
How to download a file from a website: How to upload a file to a website:
1. On your computer, open a web browser 1. If a website allows uploading of files, it
(ex. Google Chrome). will have an upload utility to help perform
2. Go to the website where you want to the file transfer.
download a file. Many sites have an upload button that
3. Click the download link or icon of the file opens a dialog box. For example, Facebook
and your browser should prompt you to Groups allow us to upload a file up to
select one of two methods for downloading 100MB and has a camera icon that begins
the file: the upload process.
• Open with will download the file and load 2. A dialog box will appear prompting you
it immediately in the specified program. to select a file. Browse the location
• Save File will download it and save it to where your file is stored, select it, and
your hard drive. then click the Open button.
4. After you click OK, the download begins.
Your browser will indicate the progress
and time remaining on the download.
5. Once the download is complete, either the 3. Afterward, a progress bar tracking the
file will be saved to your computer or it will upload process will appear on the
opened in the program you selected. website.
I. CONCEPT NOTES
Bookmarking is a great way to save and organize specific websites so you can revisit
them again and again. A bookmark is a feature in a web browser, such as Google Chrome,
that is used to save the Uniform Resource Locator (URL) of a website or a webpage, to
easily access it later on. This is convenient and time-saving especially for pages that have
very long URLs.
The Bookmark bar is usually found below the URL box of the web browser.
2. Click the star in the Omnibox to save the current page as a bookmark. You can also
press Ctrl and D on your keyboard at the same time.
3. A dialog box will appear. You can change the name of the webpage.
4. Click Done.
II. EXERCISES
Sequence the steps in bookmarking a website by writing 1-5.
I. CONCEPT NOTES
II. EXERCISES
In the space provided, write ADV if the statement is a Mobile Device advantage
and DA if not.
I. CONCEPT NOTES
Characteristics of Mobile Devices
Physical Components
A mobile device is small enough to hold and operate by hand. Mobile devices have an LCD
or a flat screen interface with digital buttons and touchscreen keyboard.
Below are some of a Mobile Device's physical features:
• A wireless service
• Wifi or cellular data connection
• A battery that enables the device to function for many of hours of usage
• A full keyboard or on-screen keypad to enter information
• Almost all mobile devices has a touch-screen interface
Unique Features
There as so many unique features of a mobile device. One of the examples is the e-Ink display
for e-readers such as Kindle which is extremely frugal with their power consumption, as power
is only drawn when you turn a page and display new content.
Some mobile devices features swivel camera and can be used as a back and front camera. It
can actually take panoramic photos completely automatically. Android devices also provides
a virtual assistant (Google Assistant) that helps you become more productive.
II. EXERCISES
In the space provided, write C if the statement is a characteristic of a mobile
device and N if not.
_____ 1. It has a battery that powers the device for longer hours.
_____ 2. It has the ability to download data like apps and books from the internet.
_____ 3. The operation of this device is wireless.
_____ 4. The size and weight of a mobile device is impossible to be carried.
______5.It has no built-in WI-FI or cellular access to the internet.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Types of Mobile Devices
Smartphone
This device is handheld and can fit in a pocket. You can watch movies, play games and
view photos on your mobile screen.
Tablet Computer
Like a smartphone, tablet shares many of the same benefits but in a larger form. A tablet
is appropriate when performing tasks that would need larger display and with more battery
life.
Laptop Computer
A desktop computer is designed for a regular use at a single location due to its size
and power requirement. A laptop computer, on the other hand, is a device that gives us
the functionality of a desktop computer, but we can take it anywhere because it’s wireless
and has handy features.
Smartwatch
Smartwatch is a wearable computer in a form of a wristwatch. It can provide us with the
ability to get notifications and necessary information on our wrist, such as GPS navigation
and calendar, without having to pick up another device. Through its Bluetooth, we can
even take and receive phone calls just like our smartphones can.
E-reader
It shares some commonalities with a tablet, but its primary purpose is for reading. It is a
handheld device that can where we can download and read electronic versions of
magazines, newspapers, etc.
II. EXERCISES
In the space provided, write TRUE if the statement is correct and FALSE if not.
I. CONCEPT NOTES
Smartphone
iOS It is the mobile operating system for Apple-manufactured devices such as
the iPhone, iPad, iPod Touch and Apple TV.
Android It is a mobile operating system that supports a large number of applications in
Smartphones and is commercially-supported by Google.
Windows It is an operating system developed by Microsoft.
Laptop Computer
Ultrabook Ultrabook is a sleek, high-end, and often convertible laptop (meaning you can
do away with the keyboard when necessary) device.
Netbook Netbooks are the smallest laptops — typically they weigh less than a kilogram
(or less than two pounds). They also have a screen size of less than 11
inches.
Notebook Compared to other laptops, notebooks have largest screen size.
Smartwatch
Simple This device’s main feature is the display of time and date, but there are also
smartwatch basic functions available such as stopwatch, timer and alarm clock.
Moreover, this can also be paired with smartphone via Bluetooth.
Smart Aside from counting steps and assesses your sleep, smart sport watch also
Sportwatch provides data on the pulse rate and helps you exercise perfectly. It comprises
a GPS transmitter that enables you to record distances travelled.
Classic Classic smartwatch is used as a supplement to smartphones. It
smartwatch communicates incoming messages, calendar entries and phone calls on the
smartphone, all connected via Bluetooth. Texts can be orally communicated
via voice recognition.
II. EXERCISES
In the space provided, write SP if the statement is a Smarphone, LC if it is a Laptop
Computer and SW if is a Smartwatch.
I. CONCEPT NOTES
Mobile devices are used for various purposes such as communicating with loved ones,
entertaining ourselves through games, and organizing our activities through different
applications. However, there are also risks in using these devices. As such, we have to follow
safe practices in using mobile devices to protect our lives and preserve our health.
Aside from following safe practices, we also need to follow ethics related to mobile use so
that we cannot hurt, disturb, and hurt others.
I. CONCEPT NOTES
Digital Identity embodies the identity of an individual based on their social media
presence, their multimedia images, audio, and video. It consists of information about yourself
in digital form that when put together, this information will point to you. This is called “data
attributes”. This information includes something evident such as username and less obvious
such as your online comments and search activities.
Social media is a term for the online platforms that people use to connect with each
other around the world, share content, and form social networks. Some of the most popular
platforms include Facebook, Twitter, Instagram, Skype, YouTube, Viber, and Snapchat. In
these platforms, you might be sharing some personal data such as full name and birthday and
because of this, you are at risk of an identity thief who would use these information to pretend
to be you. Other risks of exposing our personal information includes cyberbullying and
pornography.
Everyone should be responsible in posting their content online because whatever you’ve
done online, it will stay online. We must think before we click.
________1. We should add people we don’t know so we can have a lot of friends online.
________2. We ask a question whether a website is safe to open or not.
________3. We combine letters, numbers, and symbols for the passwords in our online
accounts.
________4. We share the names of our family members to all our contacts.
________5. We always log-out our online accounts after using it.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
II. EXERCISES
Direction: Identify whether each of the following statements describes a Digital native or a
Digital migrant.
I.CONCEPT NOTES
Digital Ethics refers to how users and groups online interact with each other and how
they use technologies and platforms. It includes our choices and how we represent ourselves
online.
Some Things to Remember Related to Digital Ethics
1. We should understand how to take care of devices, especially those owned by others,
by visiting trusted websites and downloading reliable materials only.
2. Obey the rules regulating material usage and content sharing, and not just to copy and
paste without realizing the copyright implications.
3. Assist in putting a stop to cyber bullying.
4. We should understand that other people, such as potential employers, look up to our
social media profiles and see how we portray ourselves in the public eye.
5. Etiquette includes laws regulating the Online Community. Some examples of poor
netiquette are terrible writing in online forums, being interrupted with devices while in a
conversation and sending out unnecessary emails.
6. All should learn how to list sources and use online references to uphold copyright laws
and prevent plagiarism.
7. If we publish something online, we should think about how it would be perceived by
others.
II. EXERCISES
I. CONCEPT NOTES
Safe and Responsible Use of Digital Technology
1. Cyber Ethics refers to the responsible behavior on the internet.
2. Cyber Wellness refers to the positive well-being of the internet users.
3. Cyber Safety refers to safe practices when using the Internet to protect self from personal
attacks or criminal activity.
4. Cyber Security refers to the body of technologies, processes, and practices designed to
protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Cyber Ethics
Copyright Cyberbullying
This is a right guaranteed to anyone Cyberbullying is an act of abuse and inappropriate
who produces an original work such behaviors in the online world such as sending out
as a piece of literature, music, film, or threatening messages and spreading false news
software. about a person.
Cyber Safety
Identity theft Password
It is an act of stealing a person’s It is a single word or sequence of letters, numbers
online identity. For instance, trying to and punctuations that the user only knows, which
create a social media account using then is used to sign in to computers, other networks
somebody's personal information. and internet services online.
Cyber Wellness
Internet Addiction Parental controls/filters
It is described as too much usage of It is a component of the computer or programs
the internet that leads to negative which enable parents to assess what content or
influences in normal living. material their children can view and how long do
their kids usually spend time online.
Cyber Security
Firewall Antivirus software
It is a program that prohibits It is a program or application that you download on
unlicensed access to a device over a your device to make it protected from viruses,
network, like the Internet. malware or malicious contents.
II. EXERCISES
In the space provided, write the correct terminologies being ask in each number.
_____________1. It is when a person uses the internet so much that it interferes with work
and relationships with others.
_____________2. It is stealing someone’s identity online.
_____________3. It refers to a series of letters, numbers and punctuation which you use to
log on to computers.
_____________4. This prevents unauthorized access to a computer over a network.
_____________5. This is program you install on your mobile device to keep it safe from viruses.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Digital rights are basically human rights on the internet allowing any individual to utilize,
produce and publish digital media in an acceptable and appropriate manner. Although
everyone has these rights, we are required to do things responsibly in the digital world to avoid
cases of cybercrimes.
• Right to freedom of expression – it is a right to voice out opinions and ideas on the internet
such as criticisms against the government, expressing one’s thoughts about a certain
issue, etc.
• Right to privacy – it is a right to protect one’s personal information such as credit card
number, social security number, PIN code, home address, etc. and prevent this
information from spreading publicly.
• Right to credit for personal works – it is a right to protect one’s own works and inventions
from those who will use these works without giving proper credit or citation. Examples of
the violations are pirated CDs and plagiarism.
• Right to digital access - the individual's ability to fully participate in the digital world and
have fair access to technology such as the internet, computers, tablets and others.
• Right to protect our identity - the individual's right to protect his or her personal data from
being published on the internet and be free from the risk of identity theft.
II. EXERCISES
Read each question and encircle the letter of the correct answer.
1. Kirby purchased an item from a merchant online using his credit card. Two weeks later
he found fraudulent transactions on his credit card account. What digital right was
violated in this situation?
a. right to freedom of expression c. right to credit for personal works
b. right to privacy d. right to digital access
2. Britney’s stalker created a new Facebook account and used all of her personal data
without her knowledge. What digital right was violated in this situation?
a. right to freedom of expression c. right to credit for personal works
b. right to protect our identity d. right to digital access
3. Rex bought two pirated DVDs at Cogon market at a low price. What digital right was
violated in this situation?
a. right to freedom of expression c. right to credit for personal works
b. right to privacy d. right to digital access
4. Troy posted his opinion on Twitter about extra judicial killings that have been going on in
their barangay. Days later he was sued by their barangay captain. What digital right was
violated in this situation?
a. right to freedom of expression c. right to credit for personal works
b. right to privacy d. right to digital access
5. Nona applied for an internet connection from a prestigious internet service provider but it
was denied because the barangay captain did not allow it. What digital right was violated
in this situation?
a. right to freedom of expression c. right to credit for personal works
b. right to privacy d. right to digital access
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I.CONCEPT NOTES
Digital communication is the transfer or exchange of information in a digital form.
Internet and digital devices such as mobile phones, computers and telephones are some
examples of digital communication tools that we use every day. Communicating through
technology, especially through SMS, is critical because the receiver of the message cannot
see your facial expression and hear your voice intonation. You message might be interpreted
differently. Therefore, it is important to be careful with the words you are using. The table below
are some of the Do’s and Don’ts on digital communication:
Do’s Don’ts
✓ Introduce yourself properly • During phone or video calls, do not
✓ Use these greetings as part of your interrupt if someone is still talking.
introduction - “How are you?”, • Do not ignore the message.
“Good morning” • Do not give false or misleading
✓ Say “Please” if you are asking for a information.
favor. • Avoid calling late at night or very early in
✓ Say “Excuse Me” or “I’m sorry” if the morning if it’s not that important.
you made a mistake. • Do not ask someone to reply to your
✓ Say “Thank You” if necessary message immediately if the person is at
✓ Use proper punctuations. the meeting or busy.
✓ Mind your spelling. • Avoid “beating around the bush” or not
✓ Reply to the message as soon as talking straight about the main topic.
possible.
II. EXERCISES
Read each question and encircle the letter of the correct answer.
1. Maria received a birthday invitation from her classmate through Facebook messenger.
What should be Maria’s best response to the message?
a. “No thanks” c. “Thank you for inviting me”
b. “Oh! Really?” d. Ignore the message.
2. Milbert worked as a call center agent and he got a call from an angry customer saying
that the product was not delivered. How should Milbert respond to the customer?
a. “Don’t call us anymore!” c. “Whatever!”
b. “I’m sorry for the inconvenience.” d. “It’s not my fault sir.”
3. Jim wants to call his teacher on the phone to follow up on his final grade in English.
How should Jim greet his teacher on the phone?
a. “Good morning, Ma’am!” c. “Is this Mrs. Punzalan?”
b. “Hey! Ma’am” d. “What’s my final grade in English?”
4. Ruby wants to send a text message to her boss saying that she can’t report to work
today. How should Ruby start her message?
a. “This is Ruby, I can’t go to work today” c. “Sir, I can’t go to work today”
b. “Good day, Sir Lim.” d. “I will be absent today sir”
5. You received an email from an employer saying that you passed the job interview. How
should you response to the email?
a. “Wow!” c. “Thank you very much Ma’am for notifying me.”
b. “You got to be kidding me!” d. Send a “thumbs up” emoji.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Digital Security refers to the various ways in protecting our identity, assets, and
technology online. In the digital world, we are vulnerable to risks such as identity theft and
hacking every day. There are those who find ways to steal our information for their own benefit.
Anybody can be a victim of cyber-attacks. Institutions such as banks and businesses are also
at risk.
As a person who uses the internet, we should be very careful about what we share
online, be extra cautious when receiving information which we suspect might be fake or
fraudulent, and be aware of what we download from the internet.
How do we detect if we are being attacked in the cyber space? Here are some of them.
1. Mysterious emails - Email phishing is a method wherein some persons get sensitive
information by pretending to be a reliable company or website. It is best to ignore
these emails or call the company and verify if the email truly came from them.
2. Unusual password activity - Some hackers will try to gain control your online
accounts by attempting to change your password. Create a strong password or
change your password from time to time to avoid being hacked.
3. Suspicious pop-ups – Sometimes, when you are browsing, there are pop-ups that
would come out from nowhere. This might contain a malware, virus, or spyware. It is
best to ignore these pop-ups.
4. Slower-than-usual network – If you feel that your internet speed has been reduced
very far from the usual, there might be a hacking attempt or a malware outbreak.
II. EXERCISES
Read each question and encircle the letter of the correct answer.
1. Identity theft means stealing someone’s ___________.
a. Appliances c. Personal information
b. Shoes d. Jewelry
2. It is a method where information is taken by pretending to be a reliable company.
a. Unusual password c. Pop-ups
b. Email phishing d. Slow network
3. Which of the following is NOT an example of cyber-attack?
a. Email phishing c. Suspicious pop-ups
b. Use of anti-virus d. slow network
4. It refers to the various ways of protecting our information online.
a. Digital Security c. Digital Theft
b. Digital Secure d. Digital Identity
5. Why is digital security important?
a. It protects our accounts from online risks.
b. It prevents computer viruses and malware.
c. It protects our identity.
d. All of the above
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
II. EXERCISES
TRUE/FALSE Directions: Read each statement below carefully. Write T on the line if
you think the statement is TRUE. Write F on the line if you think the statement is FALSE.
_______1. John met someone in his age in a chat room. It is OK to give his address or phone
number to his new chat mate.
_______2. I have a picture of myself and someone from Facebook messenger wants to see
it. It is just right to send it to that person.
_______3. I'm visiting a website of an online game. They want my name and phone number
so I can enter a contest. I should not give them my personal information.
_______4. My parents and I have established rules as to what I can do on the Internet when
I'm at home, but I'm at my friend's house. I should not follow the rules this time.
_______5. I got an email from my Internet service provider asking for my password. They said
they need it to fix my account. I should I give it to them right away.
_______6. I just met someone in a chat room and he invited me for an eyeball. I should trust
this person.
_______7. I’m a creating a new Facebook account. It is safe to use my birthday as my
password so I can easily remember it.
_______8. It is always a good idea to post pictures of your activities on your Facebook account.
_______9. I purchase items online from a trusted merchant or seller.
_______10. My dad gave me a laptop computer as my birthday present. I don’t need an
antivirus software since it is brand new.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Negative Online Behavior are also called inappropriate online behavior. Inappropriate
behavior in the internet includes cyberbullying and breaking copyright laws. Because of our
exposure in Social Media, we are at risk of these negative online behaviors.
1. Be empathetic. Listen to feedbacks, especially the negative ones, and ask for
more details so you can do something about it. Express on
how you care about them and make sure that you know what
they felt.
2. Face the problem. When receiving a negative response, it is appropriate to allow
other people to express their concern and accept that their
expectations were not met.
3. Offer a solution. Brainstorm and highlight possible solutions to a problem.
People will become calm if a possible solution is being
presented.
4. Make them feel that Most users who message us with a problem just wanted to be
you listen to them and heard, therefore make them feel heard by quickly answering.
that they are heard.
5. Be quick, calm and Ensure that a certain complaint is legitimate and not an
useful. aimless provocation. Do not respond back with an angry
response.
II. EXERCISES
In the space provided, write TRUE if the statement is correct and write FALSE if it is not.
I. CONCEPT NOTES
Digital higher order thinking is about evaluating, sharing, utilizing and creating digital
content in meaningful and responsible ways. It requires thinking skills and technical abilities.
We must learn how to evaluate the information we find in the internet so we can protect
ourselves and be safe.
II. EXERCISES
MULTIPLE CHOICE. Encircle the letter of the correct answer.
1. Kirby read online that a strong earthquake will hit their city. What does he need to do
first before sharing the information?
a. Check the author of the website. c. Check the validity of the news.
b. Check if the webpage is legit. d. All of these
2. You found the answer to your research assignment on a particular website. The right
thing to do is:
a. Copy and paste everything. c. Acknowledge the author of the website.
b. Rewrite the idea in your own words. d. b & c
3. Which of the following should not be posted on your social media account?
a. Fake news c. Favorite quotes
b. A picture of your pet d. A beautiful scenery
4. Why is it important to limit the information you share on social media?
a. To become famous c. To get more likes and shares
b. To practice online safety d. All of these
5. What does it mean to have a digital higher order thinking skills?
a. Being careless on your posts c. Being a responsible online user
b. Being the fastest to share information online d. Being famous on social media
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
I. CONCEPT NOTES
Digital Emotional Intelligence is the ability to understand and respond appropriately
on our own and other people's emotional state through digital media. Some of us are in control
of our emotions and others make quick decisions depending on the situation around us. For
instance, updating your Facebook status or posting your personal opinion on Twitter can
trigger an emotional response from other people. If we are aware of our own emotions, as well
as those of others, we will be able to react in an appropriate manner.
These are some ways on how we can improve our Digital Emotional Intelligence:
1. Practice ➢ Manage your emotions and align your behavior with your values. Avoid
self- posting and writing comments and ideas online when in bad mood.
regulation ➢ Be careful with what you write or say about others.
➢ Avoid the use of language that might hurt others.
2. Show ➢ Understand what the other person is feeling before replying or
empathy to commenting.
others ➢ Show genuine interest in other people’s feelings by listening.
➢ Be supportive.
3. Build ➢ Respect each other’s differences and opinions.
positive ➢ Learn to give and take constructive feedback.
relationship ➢ Treat people as you would like to be treated.
II. EXERCISES
Encircle the letter of the correct answer.
1. Two of your friends are fighting on a Facebook comment section. What should you do?
a. Make them calm and help them understand each other’s opinions.
b. Backbite them to your other set of friends.
c. Just let them fight.
2. Your best friend called you on Skype to let you know that her cat died. How would you
respond?
a. Show your empathy to your best friend.
b. Convince her to buy another pet.
c. Tell her she deserved it.
3. You received an email from the company where you applied stating that you failed the
interview. What should be your response?
a. Tell them that it’s unfair. c. Thank them for notifying you about the result.
b. Curse the company.
4. You work as a chat support in a call center and you received a chat message from a
customer saying that her product was not delivered on time. You will…
a. Tell the customer that it’s not your fault.
b. Tell the customer to return the product.
c. Apologize for the inconvenience.
5. Your classmate just posted a picture of him and his friends on Facebook having a
gathering even if it’s prohibited. What should you do?
a. Click the “angry” emoji
b. Report them to the police
c. Send him a private message and tell him that gatherings are prohibited.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
MULTIPLE CHOICE. In the space provided, write the letter of the correct answer.
________1. It is defined as human rights on the internet allowing any individual to utilize,
produce and publish digital media in an acceptable and appropriate manner.
a. Digital Security b. Digital Safety c. Digital Rights d. Digital Communication
________2. It includes various ways of protecting our information online.
a. Digital Security b. Digital Safety c. Digital Rights d. Digital Communication
________3. The use of Internet and digital devices such as mobile phones, computers and
telephones is an example of _____________.
a. Digital Security b. Digital Safety c. Digital Rights d. Digital Communication
________4. It is the act of being safe on the internet by protecting your private information
online.
a. Digital Security b. Digital Safety c. Digital Rights d. Digital Communication
________5. Which of the following is not an example of an antivirus software?
a. Avast b. Mozilla Firefox c. Norton d. McAfee
________6. In creating a strong password, you should:
a. Use your birthdate c. Use the name of your crush
b. Use your complete name d. Use a combination of letters and numbers
________7. Which of the following statement is an example of showing empathy to others
online?
a. “Yes ma’am, I know that!”
b. “I’m sorry to hear about your situation, Mrs. Dy. I understand how you feel.
c. “Just contact us as soon as you’re ready to talk to us sir.”
d. “Don’t worry John, just buy another pet.”
________8. If you are a victim of an identity theft, which of the following is stolen from you?
a. Cellular phone b. Personal Information c. Appliances d. Jewelry
________9. It is important to check the validity of the news online before posting because:
a. People are vulnerable to false information c. Fake news is prevalent
b. Spreading fake news is a crime d. All of these
________10. Why is it important to acknowledge the works of others before using it?
a. To become a responsible online user c. A & B
b. To avoid plagiarism d. None of the two
Learning Strand 6
Digital Citizenship
ALS K to 12 Basic Education Curriculum
KEY TO CORRECTION
LAS TITLE Technology in the 20th and 21st Centuries LAS NO. 3
20th Century 21st Century
Education Books Computer/ Smartphone
Communication Radio/ Telephone/ TV/ Phone Smartphones
Transportation Jeepneys/ Bus/ auto/ train/ airplanes Self-driving cars/ bullet trains
Healthcare MRI Novali’s TX
Business telephone computer
NOTE: Answers may vary. Any acceptable/valid answers are correct.
LAS TITLE Parts of the Computer and Its Function LAS NO. 6
1. Computer Case/CPU – holds the main components of the computer that includes the motherboard,
CPU and power supply.
2. Mouse – a handheld device that lets you point, click and move objects on the screen.
3. Monitor – functions with a video card found inside the computer case to show images and texts on
the screen.
4. Keyboard- an input device which allows you to enter letters, numbers, and characters and make
some commands in the computer.
5. Speakers - lets you hear the sound or audio coming from the computer.
LAS TITLE Types of Computer Hardware and Its Functions LAS NO. 8
Monitor__ 1. It displays texts, videos, and graphics you input in your computer.
__Hard disk__2. It stores data and information.
____CPU___ 3. It is the considered the brain of the computer that controls other parts.
___Mouse___4. It is used to point something on the screen.
_Video Card_ 5. It is found inside the CPU that improves the quality of images.
Mother Board 6. It is a part of the CPU where all electric components are attached.
Web Camera 7. It allows you to be seen by others.
__Speakers_ 8. It allows you to hear the audio coming from your computer.
_Keyboard__ 9. It is used to enter texts, numbers, and other symbols.
___Printer__10. It produces a printout of words, numbers, and graphics that was input in the computer.
LAS TITLE Types of Computer Software and Its Uses LAS NO. 9
7. Database Management - Used to facilitate the storage, maintenance, and utilization of data in a
System database that is shared by many users.
8. Security - Used to protect the computer against malwares and viruses.
9. Software Utilities - Used to help analyze, optimize and maintain the computer.
10. Communication - Used to send and receive messages and files through the internet
LAS TITLE Summative Test on Computer Hardware and Software LAS NO. 10
A.
Column A Column B
__f__1. Speakers a. It refers to the physical parts of a computer.
__e_ 2. Software b. These are programs that are responsible in controlling
__h_ 3. Motherboard operations of the computer.
__d_ 4. Graphics c. It is a storage device which holds data and instructions.
__j__5. Security d. These are applications that are used to edit photos.
__c_ 6. Memory e. These are programs that control the computer and its
hardware to enable it to perform a task.
__a_7. Hardware f. It provides audio and sounds coming from the computer.
__k_8. Presentation g. It is used to control the movement of the cursor.
__i_ 9. Translator h. It is the main circuit board of the computer.
__g_10. Mouse i. These are programs that translate other programs into
machine language instruction codes.
j. It protects your computer against malware and virus.
k. It is an application used to create, view and present slideshows.
B.
COMPUTER
Hardware Software
CPU
___True___1. The Shut Down button will turn the computer off.
___True___2. The Shut Down button can be found in the Windows Menu.
___True___3. For a desktop computer, you will need a power supply to turn it on.
___False__ 4. The Restart button is in the CPU.
___True___5. You can restart a computer anytime.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
A.
_____3_____ Open an audio file from your computer.
_____2_____ Connect the USB cable of the speaker to the computer.
_____1_____ Plug-in the speaker’s power cable and turn it on.
_____4_____ Adjust the volume.
B.
Input Output Storage
keyboard speakers CD
mouse printer Flash disk
NOTE: Answers may vary for B only.
LAS TITLE Managing Personal Files (Types of Files & Creating/Opening Folders) LAS NO. 13
LAS TITLE Managing Personal Files (Renaming and Moving Files and Folders) LAS NO. 14
___ False___ 1. There are two ways to rename a file or folder.
___ False___ 2. The keyboard shortcut to copy a file or folder is to press F2.
____True___ 3. We can right-click the mouse to rename a file.
____True___ 4. There is a keyboard shortcut to move or copy files and folders.
____True___ 5. There is a rename button in the Home ribbon.
LAS TITLE Managing Personal Files (Searching for File/Folder & Deleting File/Folder) LAS NO. 15
____True ___1. There are three ways to delete a file or folder.
____True ___2. To delete a file or folder, we can press Ctrl + D.
___ False___ 3. There are three ways to search a file or folder in the computer.
____True ___4. There is an available search bar for every window that you will open.
____True ___5. The files that will be deleted will go to the Recycle Bin.
To open a software
__3__a. Click on the icon.
__4__b. Wait for the software to open.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
LAS TITLE Opening and Closing a Word Processing Application LAS NO. 20
To open:
__3__Double-click the icon.
__2__Look for the icon of the software.
__1__Click the Start button.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
To close:
__2__Click Close.
__1__Click the File tab.
LAS TITLE Entering Text and Symbols into a Document LAS NO. 21
_____True______1. The Text box can be found in the Insert tab.
_____False_____ 2. There is one way to enter a text in a document.
_____True______3. Click Insert after selecting the symbol from the menu.
_____True______4. You can draw a text box in a document.
_____False_____ 5. There are only 20 symbols available in Microsoft Word.
LAS TITLE Using simple search and replace commands LAS NO. 25
4 2
1 Press Ctrl + H 3
LAS TITLE Saving Documents on Different Location and File Types LAS NO. 26
___1___ Click the File tab.
___4___ Type a file name.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
LAS TITLE Displaying and Hiding Nonprinting Formatting Marks LAS NO. 31
_True_1. To switch on the Formatting marks, the user may simply click the pilcrow.
_False 2. Formatting Marks were previously known as “printing marks”.
_True_3. Ctrl+Shift+8 is the keyboard shortcut to display Formatting marks.
_True_4. Formatting marks are characters that take up formatting function but do not appear on the
printed page.
_True_5. In the “Always show these formatting marks on the screen” section, you can check the boxes
if you want to show the formatting marks in your document at all times.
LAS TITLE Using Page Layout and Print Commands LAS NO. 33
1. This refers to the arrangement of text, images, and other objects on a page.
a. Page Layout b. Margins c. Orientation d. Columns
2. If you click this tab, the following will appear: Margins, Orientations, Columns
a. Page Layout b. File c. Home d. Review
3. This is where the Print button can be found.
a. Scrollbar b. Preview c. Printing Options d. Copies
4. This is where the Headers and Footers can be found.
a. Paper size b. Margins c. Orientation d. Insert tab
5. This is where the Spelling and Grammar can be found.
a. Insert tab b. Review tab c. File tab d. Print tab
LAS TITLE Processing Mail Merge (Start, Adding List of Recipients) LAS NO. 34
NOTE: Answers may vary. Any acceptable/valid answer is correct.
LAS TITLE Processing Mail Merge (Previewing and Finalizing) LAS NO. 36
NOTE: Answers may vary. Any acceptable/valid answer is correct.
LAS TITLE Using HELP functions For Word Processing Applications LAS NO. 37
_b__1. It is a menu in most software programs that allow users to search and find answers to questions
that may occur about the program.
a. F1 b. HELP c. functions d. all of the above
_c__2. The user wants to put pictures and tables on the document. What specific HELP function should
he/she use?
a. Pages and layouts b. Insert text c. Pictures d. Mail merge
_c__3. The easiest way to access HELP menu is through __________________.
a. Clicking the help button c. Tapping the F1 key on the keyboard
b. typing HELP in the search engine d. All of the above
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
_a__4. You are done with the document and had printed it out. Upon checking on the printout, you
forgot to insert page number. What HELP function should you use to solve this issue?
a. Pages and layouts c. Insert text
b. Templates & Forms d. Collaborate
_d__5. You are done typing a project in English Communication Skills and you want to apply styles and
themes to make it more attractive. What HELP function will you use?
a. Pages and layouts c. Collaborate
b. Templates & Forms d. Insert text
LAS TITLE Word Processing Performance Task (Summative Test) LAS NO. 38
satellite Using this service, you can access internet anytime, anywhere.
cellular A mobile phone is needed to connect to the internet.
DSL It uses a telephone line to deliver internet connection but is faster than Dial-up.
Dial-up It provides the slowest internet connection.
cable It uses TV connections for users to access the internet.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
LAS TITLE Browsing the World Wide Web Using Different Types of Internet Connections LAS NO. 42
_____DSL________ 1. The internet service that requires a telephone line to provide internet.
_____Wifi ________ 2. It is a wireless network for computers that access the internet through a router.
____Ethernet_____ 3. It requires cables and delivers internet usually in local area networks (a set of
computers interconnected to each other).
Wireless Broadband 4. It has an antenna that uses radio frequencies to connect to the internet.
__Web Browser___ 5. This is used to access the World Wide Web after connecting to the internet.
LAS TITLE Communication Tools and Educational Resources in the Internet LAS NO. 44
Communication Example
E-mail Yahoomail.com
Chat Messenger
Discussion Forums Reddit
Group sites/e-groups Yahoo groups
Social networking sites Facebook
Education
Wiki Wikipedia.com
Blog Mashable
Online Test/Quiz Quizziz
Online Survey Survey Monkey
Podcast Stuff You Should Know
E-books/online books Amazon
Audio/video CDs Youtube
Video on demand Netflix
Digital encyclopedia Encyclopedia Britannica Online
Electronic Gradebook Edmodo
Digital games Minecraft
Interactive maps Google Maps
NOTE:_Answers may vary. Any acceptable/valid answers are correct.You might need to verify
learner’s answers.
LAS TITLE Downloading and Uploading Files Using Websites LAS NO. 45
___C_ 1. It has a battery that powers the device for longer hours.
___C_ 2. It has the ability to download data like apps and books from the internet.
___C_ 3. The operation of this device is wireless.
___N_ 4. The size and weight of a mobile device is impossible to be carried.
___N__5.It has no built-in WI-FI or cellular access to the internet.
LAS TITLE Different Kinds of Mobile Devices According to Its Uses LAS NO. 50
LAS TITLE Practicing Safe and Ethical Use of Mobile Devices LAS NO. 51
__E___ 1. If you are in a public place talking using your mobile device, do not discuss private
matters.
__E___2. When you are in the presence of many people, do not make your voice louder while on a
phone call.
__S___3. When you do not use your mobile device, turn off your cellular data and Wi-Fi.
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
________1. We should add people we don’t know so we can have a lot of friends online.
________2. We ask a question whether a website is safe to open or not.
________3. We combine letters, numbers, and symbols for the passwords in our online accounts.
________4. We share the names of our family members to all our contacts.
________5. We always log-out our online accounts after using it.
LAS TITLE Differences of Digital Natives and Digital Migrants LAS NO. 53
__Migrant_1. They do not like using email accounts.
__Native _2.This group is always active in social media.
__Migrant_3. They accept technology as one of their challenges and try to adapt with it.
__Native _4. They can stay all day long in the internet watching movies and playing games.
__Migrant_5. They may have a cell phone but they use it mostly for phone calls.
LAS TITLE Terminologies in Safe and Responsible Use of Digital Technology LAS NO. 55
Internet addiction 1. It is when a person uses the internet so much that it interferes with work and
relationships with others.
__Identity theft__ 2. It is stealing someone’s identity online.
___Password___ 3. It refers to a series of letters, numbers and punctuation which you use to log on to
computers.
____Firewall____ 4. This prevents unauthorized access to a computer over a network.
Antivirus Software 5. This is program you install on your mobile device to keep it safe from viruses.
3. Rex bought two pirated DVDs at Cogon market at a low price. What digital right was violated in this
situation?
a. right to freedom of expression c. right to credit for personal works
b. right to privacy d. right to digital access
4. Troy posted his opinion on Twitter about extra judicial killings that have been going on in their barangay.
Days later he was sued by their barangay captain. What digital right was violated in this situation?
a. right to freedom of expression c. right to credit for personal works
b. right to privacy d. right to digital access
5. Nona applied for an internet connection from a prestigious internet service provider but it was denied
because the barangay captain did not allow it. What digital right was violated in this situation?
a. right to freedom of expression c. right to credit for personal works
b. right to privacy d. right to digital access
1. Two of your friends are fighting on a Facebook comment section. What should you do?
a. Make them calm and help them understand each other’s opinions.
b. Backbite them to your other set of friends.
c. Just let them fight.
2. Your best friend called you on Skype to let you know that her cat died. How would you respond?
a. Show your empathy to your best friend.
b. Convince her to buy another pet.
c. Tell her she deserved it.
3. You received an email from the company where you applied stating that you failed the interview.
What should be your response?
a. Tell them that it’s unfair. c. Thank them for notifying you about the result.
b. Curse the company.
4. You work as a chat support in a call center and you received a chat message from a customer saying
that her product was not delivered on time. You will…
a. Tell the customer that it’s not your fault.
b. Tell the customer to return the product.
c. Apologize for the inconvenience.
5. Your classmate just posted a picture of him and his friends on Facebook having a gathering even if
it’s prohibited. What should you do?
a. Click the “angry” emoji
b. Report them to the police
c. Send him a private message and tell him that gatherings are prohibited.
________1. It is defined as human rights on the internet allowing any individual to utilize, produce and publish
digital media in an acceptable and appropriate manner.
a. Digital Security b. Digital Safety c. Digital Rights d. Digital Communication
________2. It includes various ways of protecting our information online.
a. Digital Security b. Digital Safety c. Digital Rights d. Digital Communication
________3. The use of Internet and digital devices such as mobile phones, computers and telephones is an
example of _____________.
a. Digital Security b. Digital Safety c. Digital Rights d. Digital Communication
________4. It is the act of being safe on the internet by protecting your private information online.
a. Digital Security b. Digital Safety c. Digital Rights d. Digital Communication
________5. Which of the following is not an example of an antivirus software?
a. Avast b. Mozilla Firefox c. Norton d. McAfee
________6. In creating a strong password, you should:
a. Use your birthdate c. Use the name of your crush
b. Use your complete name d. Use a combination of letters and numbers
________7. Which of the following statement is an example of showing empathy to others online?
a. “Yes ma’am, I know that!”
ALTERNATIVE LEARNING SYSTEM
REGION X- NORTHERN MINDANAO
b. “I’m sorry to hear about your situation, Mrs. Dy. I understand how you feel.
c. “Just contact us as soon as you’re ready to talk to us sir.”
d. “Don’t worry John, just buy another pet.”
________8. If you are a victim of an identity theft, which of the following is stolen from you?
a. Cellular phone b. Personal Information c. Appliances d. Jewelry
________9. It is important to check the validity of the news online before posting because:
a. People are vulnerable to false information c. Fake news is prevalent
b. Spreading fake news is a crime d. All of these
________10. Why is it important to acknowledge the works of others before using it?
a. To become a responsible online user c. A&B
b. To avoid plagiarism d. None of the two