Professional Documents
Culture Documents
It is usually spread
Lesson 1: DANGERS IN THE INTERNET through email and running of attachments
1. Email Spam from suspicious sources. It spreads by
AKA Junk mail exploiting weaknesses in operating
Usually unsolicited commercial email sent systems (but BLESS OS updates!)
from an unknown source with identical 7. Trojan Horse
message sent to multiple recipients. A malware fronting to perform a good
Usually not dangerous but can be time and task, but covertly performs undesirable
space consuming. Dangerous ones can function with the intention of entering the
carry viruses and other malicious software computer without the user’s consent. It
(Malware) can disable the computer’s defences,
2. Email Spoofing opening it to unauthorized entry. It can
It is a deceitful email practice in which the erase data, can corrupt files, allow access
sender address is changed, so that it would to computer, and
appear to have come from a different
source which is usually someone you 8. Computer Virus
know. Email spoofing is usually used by It is a program that duplicates itself and
spammers to hide the origin of the spam. then infects the computer. It spreads like a
3. Phishing biological virus. It can be transferred by
It is a deceitful practice of trying to get the use of removable storage media
confidential information such as devices. Damages may be mild to severe.
passwords and usernames, and credit card 9. Hacker
details by making it appear as if it comes This is a person who is able to enter and
from a trustworthy source. It is usually control other people’s computer without
done through emails or using popular authorization. Usually vandalizes the
entity such as Microsoft, Yahoo, Google, victims’ website, steals personal
Amazon, and financial institutions. information, obtains intellectual property,
4. Pharming and performs credit card fraud. Firewalls
This is a dangerous hacker attack on a are able to prevent entry by hackers.
website which directs all traffic to that Lesson 2: TEN (10) COMMANDMENTS OF COMPUTER
website to another fictitious website. The ETHICS
main objective is to obtain username and 1. Thou shalt not use a computer to harm other
passwords, as well as credit cards ad people.
financial information, and use these to 2. Thou shalt not interfere with other people’s
steal their money electronically or use the computer work.
credit cards of the victims. It is a major 3. Thou shalt not snoop around in other people’s
concern of many online banking and files.
electronic commerce transactions. 4. Thou shalt not use a computer to steal.
5. Spyware 5. Thou shalt not use a computer to bear false
A computer program that is installed witness.
covertly on a personal computer to collect 6. Thou shalt not use or copy software which you
information or even take control over the have not paid (ouch..)
computer without the knowledge of the 7. Thou shalt not use other people’s computer
user. It can monitor and collect resources without authorization.
information about the user’s internet 8. Thou shalt not appropriate other people’s
habits and practices. It can also affect the intellectual output.
performance and setting of the computer. 9. Thou shalt think about social consequences of
6. Computer Worm the program you write.
It is a dangerous computer program that 10. Thou shalt use a computer in many ways that
replicates itself through a network. Some show consideration
worms delete files, others disrupt the
2. Left-click the file and hold.
3. DRAG the photo into the word file.
4. RELEASE left-click.
MICROSOFT OFFICE 5. Edit the photo.
It is an integrated suite of business software
applications for Windows and Macintosh B. Taking advantage of the Mail Merge Function
computers. How to use MAIL MERGE
Office includes programs that provide 1. Click the MAILINGS tab.
functionality which is commonly used to run a 2. Click the START MAIL MERGE Command.
business office. 3. Choose the document type.
Microsoft Office Applications 4. Click the SELECT RECIPIENTS COMMAND.
Access – Database Management System 5. Choose your LIST PREFERENCE (Create or
Excel – Spreadsheet for calculation, use an Existing File).
graphic tools, tables, etc.
OneNote – Free-form information C. Generating Labels on Envelops
gathering and multi-user collaboration. How to Generate Labels
Outlook – email application, calendar, 1. Click LABELS.
contact manager, journal, etc. 2. Click OPTIONS.
PowerPoint – Presentation Program 3. Choose the desired Label Vendors.
Project – Project Management Software 4. Click 30 per Page.
for project development plan, assigning
resources to tasks, tracking progress,
5. Click OK.
managing budget, etc.
Publisher – same with WORD but 6. Enter text of the Label on the text box.
emphasizes on page layout and design. 7. Click NEW DOCUMUNENT to finalize the
Visio – diagramming and vector graphics. labels.
Word – Word processing.
ii. ADVANCED FUNCTIONS IN MICROSOFT OFFICE
i. ADVANCE FEATURES OF MS WORD POWERPOINT PRESENTATION (PPT)
A. Inserting Pictures in the Document A. Custom Animation
There are three ways of How to Add Transitions to Slides
embedding/inserting images in the 1. Create slides.
document. 2. Click on the transition tab.
3. Choose one transition animation. Click one to
preview the animation.
4. Customize time and speed.
i. Use the INSERT TAB. a. Customize the effect.
1. Click the INSERT tab. b. Add sounds.
2. Click the PICTURES Command. c. Change duration.
3. Browse for your picture. d. Change transition execution preference.
4. Click the INSERT Button. How to Animate Texts & Objects
ii. Use the COPY & PASTE Commands. 1. Create Texts
1. Locate the photo. 2. Select Text Boxes. (CTRL + A; SHIFT / CTRL + Left
2. Right-click the file and click COPY. (Press Click)
CTRL + C on the keyboard.) 3. Click the ANIMATION TAB. *Click the
3. Right-click on the Word document and ANIMATION PANE (Advisable).
click PASTE. (Press CTRL + V on the 4. Choose one or two animations.
keyboard.) TYPES OF ANIMATION PRESETS
4. Edit the photo. 1. Entrance
iii. Use the DRAG & DROP Functions. 2. Emphasis
1. Locate the photo. 3. Exit
4. Motion Paths ii. Commonly used Functions
FUNCTION PURPOSE
B. VLOOKUP/HLOOKUP Function
viii.
ix. d
x.