You are on page 1of 6

ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE network function.

It is usually spread
Lesson 1: DANGERS IN THE INTERNET through email and running of attachments
1. Email Spam from suspicious sources. It spreads by
 AKA Junk mail exploiting weaknesses in operating
 Usually unsolicited commercial email sent systems (but BLESS OS updates!)
from an unknown source with identical 7. Trojan Horse
message sent to multiple recipients.  A malware fronting to perform a good
Usually not dangerous but can be time and task, but covertly performs undesirable
space consuming. Dangerous ones can function with the intention of entering the
carry viruses and other malicious software computer without the user’s consent. It
(Malware) can disable the computer’s defences,
2. Email Spoofing opening it to unauthorized entry. It can
 It is a deceitful email practice in which the erase data, can corrupt files, allow access
sender address is changed, so that it would to computer, and
appear to have come from a different
source which is usually someone you 8. Computer Virus
know. Email spoofing is usually used by  It is a program that duplicates itself and
spammers to hide the origin of the spam. then infects the computer. It spreads like a
3. Phishing biological virus. It can be transferred by
 It is a deceitful practice of trying to get the use of removable storage media
confidential information such as devices. Damages may be mild to severe.
passwords and usernames, and credit card 9. Hacker
details by making it appear as if it comes  This is a person who is able to enter and
from a trustworthy source. It is usually control other people’s computer without
done through emails or using popular authorization. Usually vandalizes the
entity such as Microsoft, Yahoo, Google, victims’ website, steals personal
Amazon, and financial institutions. information, obtains intellectual property,
4. Pharming and performs credit card fraud. Firewalls
 This is a dangerous hacker attack on a are able to prevent entry by hackers.
website which directs all traffic to that Lesson 2: TEN (10) COMMANDMENTS OF COMPUTER
website to another fictitious website. The ETHICS
main objective is to obtain username and 1. Thou shalt not use a computer to harm other
passwords, as well as credit cards ad people.
financial information, and use these to 2. Thou shalt not interfere with other people’s
steal their money electronically or use the computer work.
credit cards of the victims. It is a major 3. Thou shalt not snoop around in other people’s
concern of many online banking and files.
electronic commerce transactions. 4. Thou shalt not use a computer to steal.
5. Spyware 5. Thou shalt not use a computer to bear false
 A computer program that is installed witness.
covertly on a personal computer to collect 6. Thou shalt not use or copy software which you
information or even take control over the have not paid (ouch..)
computer without the knowledge of the 7. Thou shalt not use other people’s computer
user. It can monitor and collect resources without authorization.
information about the user’s internet 8. Thou shalt not appropriate other people’s
habits and practices. It can also affect the intellectual output.
performance and setting of the computer. 9. Thou shalt think about social consequences of
6. Computer Worm the program you write.
 It is a dangerous computer program that 10. Thou shalt use a computer in many ways that
replicates itself through a network. Some show consideration
worms delete files, others disrupt the
2. Left-click the file and hold.
3. DRAG the photo into the word file.
4. RELEASE left-click.
MICROSOFT OFFICE 5. Edit the photo.
 It is an integrated suite of business software
applications for Windows and Macintosh B. Taking advantage of the Mail Merge Function
computers. How to use MAIL MERGE
 Office includes programs that provide 1. Click the MAILINGS tab.
functionality which is commonly used to run a 2. Click the START MAIL MERGE Command.
business office. 3. Choose the document type.
 Microsoft Office Applications 4. Click the SELECT RECIPIENTS COMMAND.
 Access – Database Management System 5. Choose your LIST PREFERENCE (Create or
 Excel – Spreadsheet for calculation, use an Existing File).
graphic tools, tables, etc.
 OneNote – Free-form information C. Generating Labels on Envelops
gathering and multi-user collaboration. How to Generate Labels
 Outlook – email application, calendar, 1. Click LABELS.
contact manager, journal, etc. 2. Click OPTIONS.
 PowerPoint – Presentation Program 3. Choose the desired Label Vendors.
 Project – Project Management Software 4. Click 30 per Page.
for project development plan, assigning
resources to tasks, tracking progress,
5. Click OK.
managing budget, etc.
 Publisher – same with WORD but 6. Enter text of the Label on the text box.
emphasizes on page layout and design. 7. Click NEW DOCUMUNENT to finalize the
 Visio – diagramming and vector graphics. labels.
 Word – Word processing.
ii. ADVANCED FUNCTIONS IN MICROSOFT OFFICE
i. ADVANCE FEATURES OF MS WORD POWERPOINT PRESENTATION (PPT)
A. Inserting Pictures in the Document A. Custom Animation
There are three ways of How to Add Transitions to Slides
embedding/inserting images in the 1. Create slides.
document. 2. Click on the transition tab.
3. Choose one transition animation. Click one to
preview the animation.
4. Customize time and speed.
i. Use the INSERT TAB. a. Customize the effect.
1. Click the INSERT tab. b. Add sounds.
2. Click the PICTURES Command. c. Change duration.
3. Browse for your picture. d. Change transition execution preference.
4. Click the INSERT Button. How to Animate Texts & Objects
ii. Use the COPY & PASTE Commands. 1. Create Texts
1. Locate the photo. 2. Select Text Boxes. (CTRL + A; SHIFT / CTRL + Left
2. Right-click the file and click COPY. (Press Click)
CTRL + C on the keyboard.) 3. Click the ANIMATION TAB. *Click the
3. Right-click on the Word document and ANIMATION PANE (Advisable).
click PASTE. (Press CTRL + V on the 4. Choose one or two animations.
keyboard.) TYPES OF ANIMATION PRESETS
4. Edit the photo. 1. Entrance
iii. Use the DRAG & DROP Functions. 2. Emphasis
1. Locate the photo. 3. Exit
4. Motion Paths ii. Commonly used Functions
FUNCTION PURPOSE

Calculates the SUM of the values of a range of


=SUM
5. Customize the animation presets. cells.
a. Effects options =AVERAG Calculates the ARITHMETIC MEAN of a range of
b. Timing E cells or values.
c. Adding 2 or more animation per object.
Gives the MAXIMUM value in a range of cells or
- Click ADD ANIMATION. =MAX
values.
- Choose your desired animation preset.
- Check the animation pane. Gives the MINIMUM values in a range of cells or
=MIN
- Customize speed and timing. values.
B. Hyperlinking =COUNT Counts the number of cells in a range of cells or values.
How to Create Hyperlink
1. Select the object, picture, or text you want to give Shows a series of calculations using the same formula,
=IF but a different value for each calculation to determine
an hyperlink.
whether the formula is true or false.
2. Click the INSERT TAB and Click LINK (Right-click and
click LINK).
3. Browse for the file you want to link to. iii. Other Specialized Functions
4. Click OK.
C. EmbeddingFINANCIAL
Pictures FUNCTIONS LOGICAL FUNCTIONS
How to Embed Pictures
1. Click Computes the payment required to amortize a Applies a logical test that results in a True or
PMT the INSERT TAB. IF
2. Select theloan over aCommand.
OBJECT specified number of periods. False.
3. Click CREATE FROMthe
Computes FILE.
interest portion of an individual Nested IF Creates a hierarchy of tests.
4. IPMT
Click BROWSE and locate the filea you
loan payment, assuming wantpayment
constant to and
embed. interest rate. Returns FALSE if any of its arguments are
5. Click LINK. AND false, and returns TRUE only if all of its
Computes the number of periods required to
6. NPER
Click OK. arguments are true.
amortize a loan, given a specified payment.
iii. MICROSOFT EXCEL
It features
SLN calculation,
Calculates graphingdepreciation
a straight-line tools, pivotfor
tables,
an asset.
and a macro programming language. It can compute TEXT FUNCTIONS
costs incurred in the creation of projects, or create CLEAN Removes all nonprintable characters.
tables for findings in the researchers, and then create
reports for business or research that you are doing. It is CONCATENAT Combines text from multiple fields
also a collaboration tool for financial analysis or E into one cell.
modelling.
Compares two text strings to see if
i. The Anatomy of a Formula EXACT
they are the same.
A formula is an expression which calculates the
value of a cell. Functions are predefined formulas Returns the first number characters in
LEFT
and are already available in Excel. a text string.
Converts text into all-uppercase
UPPER
characters (SHIFT + F3).

DATE & TIME FUNCTIONS


TODAY() Inserts the current date
NOW() Inserts both the current date and time.
WEEKDA Returns the day of the week for a specific
Y date. : Range of consecutive cells
Calculates the number of days between () [} Enclosure of cells
DAYS
two dates.
*-/x Basic Operations

LOOKUP AND REFERENCE FUNCTIONS v. BASIC FUNCTIONS


Searches the first column of a table_array FUNCTION FORMULA
VLOOKUP and returns a value from the same row in
the column indicated by col_index_num. Sum =SUM( )

Searches the first row of table_array and Average =AVERAGE( )


HLOOKUP returns a value from the same column, in Max =MAX( )
the row indicated by row_index_num.
Min =MIN( )
Returns the number of rows in the
ROWS Count =COUNT( )
specified range.
CountA =COUNTA( )
Concatenate =CONCAT( )
Round =ROUND( )
MATH & TRIG FUNCTIONS
Combines the IF and SUM functions to add
SUMIF specific values in a range according to the
criterion you supply.
Similar to SUMIF, but count cells in the
COUNTIF specified range that match your specified
criterion.
PRODUC
Multiplies all of its arguments.
T
Rounds a number by using this function for
ROUND
a specific number of digits.

iv. How to Create Formulas


= FUNCTION (Cells)
vi. How to Use the Basic Functions
Function Formula EASY WAY
1. Create the table with rows & columns of
Sum =SUM( )
data.
Average =AVERAGE( ) 2. Select all the desired cells.
3. Go to the HOME/FORMULA tab, find the
Today() =TODAY() AUTOSUM Command.
Concatenate =CONCAT( ) 4. Click the dropdown arrow and select the
desired function.
LESS EASY WAY
Cell Formula 1. Create the table with rows & columns of
data.
, Separated cells
2. Select the desired cell where you want the
result would be.
3. Type the FUNCTION FORMULA in the
desired cell or on the FORMULA BAR.
4. Press ENTER on the keyboard.

vii. ADVANCED FUNCTIONS


A. IF Function
1. Create the table with rows & columns of
data.
2. Determine the IF Criteria or Conditions.
3. Select the desired cell to put the results in.
4. Go to the HOME/FORMULA tab, find the
AUTOSUM Command.
5. Click the MORE FUNCTIONS.
6. Search IF in the dialogue box and select
the IF Function.
7. Click OK.
8. In the LOGICAL_TEST box, type the desired
criterion (Cell>=Numerical Value). For
example is A1>=75.
9. Enter returned value in the IF_TRUE and
IF_FALSE text boxes (Passed, Failed).

B. VLOOKUP/HLOOKUP Function

How to Use the VLOOKUP Function


1. Create the table with rows & columns of data.
2. Create the LookUp Table (your criteria). Values
must be in ASCENDING ORDER.
3. Select the desired cell to put the results in.
4. Go to the HOME/FORMULA tab, find the
AUTOSUM Command.
5. Click the MORE FUNCTIONS.
6. Search VLOOKUP in the dialogue box and select
the function.
7. Click OK.
8. In the LOOKUP_VALUE box, type or select the
reference cell.
9. In the TABLE_ARRAY, select the entire LOOKUP
TABLE. Make it ABSOLUTE (Press F4).
10. In the COL_INDEX_NUM, type 2.
11. In the RANGE_LOOKUP, type TRUE (closest
match) or FALSE (exact match).

viii.
ix. d
x.

You might also like