Professional Documents
Culture Documents
I. INTRODUCTION/FOCUS QUESTIONS
The use of computers is now a daily fact of life. Students should be computer literate and be prepared
for the fast-changing world of information technology.
The curriculum of Computer Literacy in our junior forms ensures that students attain a general awareness
of the ranges of tasks that computers can do, how computers are used to solve daily-life problems, and to
what extent computers affect individuals and society.
The senior ICT curriculum provides students with knowledge, practical skills and an understanding of the
processes involved in problem-solving using technology. It encompasses problem identification, solution and
design, and the applications of ICT knowledge and skills in these processes.
The study of an ICT course contributes significantly to the education of students by providing pathways
into the workforce or preparing them for further studies. It also provides opportunities for the development of key
generic skills such as critical thinking, communication, creativity and problem-solving, in contexts that derive
naturally from the learning objectives, outcomes and experiences.
(Source: http://tsk.edu.hk/website/article/article_detail?channel_id=2541&article_id=1180)
II. OBJECTIVES
At the end of this lesson, you are expected to:
a. identify the different online platforms;
b. compare and contrast the differences between online platforms, sites, and content; and
c. give importance to information and communication technologies.
LESSON CONTENT
WEB 1.0:
When the World Wide Web was invented, most web pages were static. Static (also known as flat page or
stationary page) in the sense that the page is “as is” and cannot be manipulated by the user. The content is also
the same for all users. This is referred to as Web 1.0.
their operating system. Browsers can now be used for their user interface, application software (or web
applications), and even for file storage.
TRENDS IN ICT
1. Convergence - Technological convergence is the synergy of technological advancements to work on a
similar goal or task.
2. Social Media - Social media is a website, application, or online channels that enable web users to create,
co-create, discuss, modify, and exchange user-generated content. ➢ Six Types of Social Media:
a. Social Networks. These are sites that allow you to connect with other people with the same
interests or background.
b. Bookmarking Sites. These are sites that allow you to store and manage links to various websites
and resources.
c. Social News. These are sites that allow users to post their own news items or links to other news
sources.
d. Media Sharing. These are sites that allow you to upload and share media content like images,
music, and video.
e. Micro blogging. These are sites that focus on short updates from the user.
f. Blogs and Forums. These websites allow users to post their content.
3. Mobile Technologies - The popularity of smartphones and tablets has taken a major rise over the years.
This is largely because of the devices’ capability to do tasks that were originally found in personal
computers.
➢ Kinds of Operating Systems:
a. IOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile
4. Assistive Media - Assistive media is a nonprofit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.
I. INTRODUCTION/FOCUS QUESTIONS
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay
in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always
“another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what
you are doing.
II. OBJECTIVES
At the end of this lesson, you are expected to:
a. examine one’s and others’ safety when sharing information using the Internet;
b. examine one’s and others’ reputation when using the Internet;
c. determine the dangers of the Internet; and
d. give importance to responsible use of social networking sites; and
LESSON CONTENT
SOCIAL NETWORKING
Social networking websites and apps, such as Facebook, MySpace, Instagram, Viber, Tumblr, SnapChat, Ask.fm
and Twitter have become incredibly popular in recent years. Most users are genuine, but because it is so easy to
hide your real identity, it is possible to come into contact with people you would normally avoid.
THE RISKS (PRIVACY)
The internet offers you a lot of freedom and this can lead some people to behave in ways they would not behave
in public.
ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 4 OF 27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City
They might: say things on a status update / post / tweet they would never say face to
face
give out personal information about themselves or others (including photos) that they would normally
keep private
A common example
A young person tries to let their friends know about their birthday party by posting the information about when
and where on their social networking site. This means hundreds of people end up knowing about the party and
turn up uninvited. The party could turn into chaos with people getting angry and even refusing to leave. The
police would have to get involved to turn people away.
CYBER BULLYING
Cyber bullying can work in the same way as bullying in the playground; the victim feels frightened and alone,
while the bully tries to hide from being caught.
Comments, images and videos about a person can be posted online causing the victim to feel
frightened and upset.
It is even possible for cyber bullies to hack into the victim's personal accounts and harass them from
within their own user profile.
Often cyber bullies feel braver because they can't be seen, but it can be the most traceable form of
bullying because there's evidence that it's happened.
But because bullies think they can cover up their identity online sometimes people who wouldn't
normally bully might do so online.
CYBER STALKING
Harassment on the internet can be just as frightening as other forms of stalking.
Women and girls are usually the victims of this kind of behavior.
They might be harassed by an ex-boyfriend or girlfriend who is upset about the end of their relationship,
for example.
It can also begin when a purely online friendship turns sour.
It can even begin entirely at random, by one online stranger towards another.
IDENTITY THEFT
The more information you make available online, the greater the risk of identity theft. It can be very
tempting to reply to an email or open an attachment or post information about yourself on social networking
sites, but you should never do it.
Personal information includes your:
email address any banking information
phone number photos of yourself postal address
The consequences of fraud can be huge, so you should be aware of the very serious risks. If someone steals
you or your parent's identity they can: steal a lot of money commit crimes that could put you or your parents
in danger commit crimes that you or your parents could get into trouble for
OTHER TYPES OF INTERNET USE E-mails, Spam &, Phishing and Viruses SPAM
Spam is usually considered to be electronic junk mail or junk newsgroup postings. Some people define
spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and
sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally
email advertising for some product sent to a mailing list or newsgroup.
Why Spam is a Problem
In addition to wasting people's time with unwanted email, spam also eats up a lot of network bandwidth.
Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight
spam with a variety of techniques. But because the Internet is public, there is really little that can be done to
ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 5 OF 27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City
prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies
to prevent spammers from spamming their subscribers.
PHISHING
The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an
attempt to scam the user into surrendering private information that will be used for identity theft. Phishing email
will typically direct the user to visit a website where they are asked to update personal information, such as a
password, credit card, social security, or bank account numbers, that the legitimate organization already has.
The website, however, is bogus and will capture and steal any information the user enters on the page.
Why is Phishing Successful for Scammers?
Phishing emails are blindly sent to thousands, if not millions of recipients. By spamming large groups of
people, the "phisher" counts on the email being read by a percentage of people who actually have an account
with the legitimate company being spoofed in the email and corresponding webpage.
Viruses/Adware/Malware
A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are
manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even
such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing
security systems. Since 1987, when a virus infected ARPANET, a large network used by the Defense Department
and many universities, many antivirus programs have become available. These programs periodically check your
computer system for the best-known types of viruses.
Some people distinguish between general viruses and worms. A worm is a special type of virus that can
replicate itself and use memory, but cannot attach itself to other programs.
ADWARE
Adware is the common name used to describe software that is given to the user with advertisements
embedded in the application. Adware is considered a legitimate alternative offered to consumers who do not
wish to pay for software. There are many adsupported programs, games or utilities that are distributed as adware
(or freeware). Today we have a growing number of software developers who offer their goods as "sponsored"
freeware (adware) until you pay to register. If you're using legitimate adware, when you stop running the
software, the ads should disappear, and you always have the option of disabling the ads by purchasing a
registration key.
Another use of the phrase adware is to describe a form of spyware that collects information about the
user in order to display advertisements in the Web browser. Unfortunately, some applications that contain adware
track your Internet surfing habits in order to serve ads related to you. When the adware becomes intrusive like
this, then we move it into the spyware category and it then becomes something you should avoid for privacy
and security reasons.
MALWARE
Short for malicious software, malware refers to software designed specifically to damage or disrupt a system,
such as a virus or a Trojan horse. Types of Malware
As the phrase malware includes any type of malicious code, there are many different types of malware, Spyware
Key loggers
Computer viruses or worms.
Financial malware - which is designed to scan a computer system for information related to financial
transactions, are more common than other types.
• invasion of privacy
Intellectual property refers to any product of human intellect that is unique and has value in the market place.
This covers ideas, inventions, unique name, computer program codes and many more.
ETHICAL COMPUTER CODE OF CONDUCTS
Examples of ethical computer code of conducts include:
• sending warning about viruses to other computer users
• asking permission before sending any business advertisements to others
• using information with authorization
I. INTRODUCTION/FOCUS QUESTIONS
MS Word is the most popular word processing software used today. A word processor is essentially a
computerized version of the standard typewriter. However, the computer adds features typewriters never
dreamed of having like spell check, the ability to save and store documents, copy and paste functions, the
ability to add images and shapes to documents, and many more. When attached to an email, electronic
documents, created by MS Word can be delivered in seconds. Another benefit is that it helps the user to type
faster and more accurate.
On the other hand, PowerPoint (PPT) is a powerful, easy-to-use presentation graphics software program
which allows you to create professional-looking electronic slideshows. PPT is used to present information in an
organized manner to an individual or group. Using clip art, sound clips, movie clips, graphs, organization charts,
imported Web screens, and many other features, you can easily create a presentation that will impress your
audience and convey your message clearly and professionally.
What are the things that we have to keep in mind in order for us to develop our word processing and
presentation skills through said software? Let’s find out!
II. OBJECTIVES
At the end of this lesson, you are expected to:
a. identify different MS word and MS PowerPoint features;
b. create a simple MS word and PowerPoint file; and
c. uses common productivity tools effectively by maximizing advanced application techniques.
LESSON CONTENT
TWO COMPONENTS OF MAIL MERGE:
1. Form Document - The document that contains the main body of the message we want to convey or
send.
2. List or Data File - This is where the individual information or data that needs to be plugged in (merged)
to our form document is placed and maintained.
Label Generation
It creates a blank form document that simulates either a blank label or envelope of pre-defined size and will
use the data file that you selected to print the information, typically, individual addresses.
1. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in any local
storage device.
2. Clip Art. This is generally a .GIF type; line art drawings or images used as generic representation for ideas
and objects that you might want to integrate in your document.
3. Shapes. These are printable objects or materials that you can integrate in your document to enhance its
appearance or to allow you to have some tools to use for composing and representing ideas or
messages.
4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form ideas that
are organizational or structural in nature.
5. Chart. Another type of material that you can integrate in your Word document that allows you to
represent data characteristics and trends.
6. Screenshot. Sometimes, creating reports or manuals for training or procedure will require the integration
of a more realistic image of what you are discussing on your report or manual.
Parts of Microsoftword
1. Quick Access Toolbar – Collection of buttons that provide one click access to commonly used
commands such as Save, Undo or Redo. You can also customize this according to your preference.
2. Title Bar – A bar the display the name of active document.
3. Ribbon – The main set of commands and controls organized task in Tabs and groups, you can also
customize the ribbon according to your preference
4. Vertical Scroll Bar – Scroll bar to use when you want to scroll vertically through the document window
5. Horizontal Scroll Bar – Scroll bar to use when you want to scroll horizontally through the document window.
6. Zoom Control – Used for magnifying and shrinking of the active document.
7. View Shortcut – Buttons used to change how the worksheet content is displayed. Print Layout, Full Screen
Reading, Web Layout, Outline or Draft.
8. Status Bar – It displays information about your document, such as what page you are currently viewing
and how many words are in your document, etc.
9. Ruler – It used to set the alignment and margins of the elements in the documents.
10. Document Window – The white space where you can type or attached all the data you need in the
document.
11. Insertion Point – It is the blinking vertical line in your document. It indicates where you can enter text on
the page. You can use the insertion point in a variety of ways: Blank document: When a new blank
document opens, the insertion point is located in the top-left corner of the page
Mail Merge
One of the important reasons in using computers per se is its ability to do recurring tasks automatically. But
this ability has to be honed by learning the characteristics and features of the software you use with your
computer. After all, no matter how good or advance your computer and software may be, it can only be as
good as the person using it.
In this particular part of our lesson, we will learn one of the most powerful and commonly used features of
Microsoft Word called Mail Merge. As the name suggests, this feature allows you to create documents and
combine or merge them with another document or data file. It is commonly used when sending out advertising
materials to various recipients.
The simplest solution for the scenario above is to create a document and just copy and paste it several
times then just replace the details depending on whom you send it to. But what if you have hundreds or
thousands of recipients? Would not that take too many hours? What if you have a small database of
information where you can automatically generate those letters?
1. Form Document
The first component of our mail merged document is the form document. It is generally the document
that contains the main body of the message we want to convey or send. The main body of the message is the
part of the form document that remains the same no matter whom you send it to from among your list.
Also included in the form document is what we call place holders, also referred to as data fields or
merge fields. This marks the position on your form document where individual data or information will be
inserted. From our sample document, the place holders are denoted or marked by the text with double-
headed arrows (<< >>) on each side and with a gray background. On a printed standard form, this will be the
underlined spaces that you will see and use as a guide to where you need to write the information that you
need to fill out. In its simplest form, a form document is literally a “form” that you fill out with individual
information. A common example of a form document is your regular tax form or application form.
B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes sense that
after you print out your form letters, you will need to send it to individual recipients in an envelope with the
matching address printed directly on the envelope or on a mailing label to stick on. By using virtually the same
process as a standard mail merge, Microsoft Word will print individual addresses to a standard form that it has
already pre-formatted. Simply put, it creates a blank form document that simulates either a blank label or
envelope of pre-defined size and will use the data file that you selected to print the information, typically
individual addresses. So even in generating labels, the two essential components of creating a merged
document are present: the form document and the data file. Only in this case, you did not have to type or
create the form document yourself because it was already created and pre-formatted in Microsoft Word. All
you need to do is select the correct or appropriate size for the label or envelope and select the data file that
contains the addresses (data) to be printed. You can also preview your merged labels before printing if you
want to.
4. Presentation View or Slide pane – the page where we can add the text
5. Status Bar – To view how many slides you make
6. Zoom Control or Zoom – To magnify in or magnify out the text document
7. Ribbon – Toolbar that we use to add the effects of the text or slides etc.
8. Command Tabs – it is a parts of Microsoft word that we can see the insert, home, view, format, etc.
9. Office Menu – Option for saving file or open new documents
Documents View – To View all the slides
2. Go to Insert > Hyperlinks (under links category) or use the shortcut key Ctrl + K. The insert Hyperlink dialog
box would appear.
Link to Options:
a. Existing File or Web Page – creates a hyperlink to website or a local file saved in your hard drive. Just
browse your file in the dialog box or type the web address.
b. Place in This Document – creates a hyperlink that allows you to jump to a specific slide in your
presentation.
c. Create a New Document – creates a hyperlink that once clicked, creates a new document on your
specified location.
d. E-mail Address – creates a hyperlink that opens Microsoft Outlook that automatically adds your specified
recipient on a new email.
3. When done, click OK to apply your hyperlink.
Options:
a. Create New – creates a new file from scratch. You can select on a wide variety of files listed.
b. Create from File – creates a file from an existing file saved on your hard drive; simply browse the file to
use it. Putting a check on the “link” option will allow you to modify the Excel file inside your PowerPoint
Presentation.
Spread Sheet
1. What is a Spreadsheet Software? • allows users to organize data in rows an columns and perform
calculations on the data • These rows and columns collectively are called worksheet.
2. Examples of Spreadsheet Software:
• LibreOffice Calc
• OpenOffice.org Calc
• Google Sheets • Apple iWork Numbers
• Kingsoft Office Spreadsheets
• StarOffice Calc
• Microsoft Excel
MICROSOFT EXCEL
To open Microsoft Excel, Press “Windows Logo” + R then type “excel” then enter.
FUNCTIONS
BASIC MATH OPERATIONS:
• =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the numbers within the range)
• =PRODUCT(x,y) – returns the product of x and y
• =QUOTIENT(x,y) – returns the quotient of x divided by y
• =x-y – returns the difference of x subtracted by y
I. INTRODUCTION/FOCUS QUESTIONS
Imaging and Design for Online Environment is an online graphics and layouts that may teach you many
effective things in order for you to use image design and its advantages. In this lesson, you will learn the basic
principles of graphics and layouts. It has balance, emphasis, movement, pattern, repetition and rhythm,
proportions, and variety.
This lesson will teach you many effective things in order for you to use image design and its advantage.
You will understand that the basic principles of graphics and layout are so simple and it is easy to use. It may
help you also on how to create a creative Infographic. Information graphics or infographics are graphic visual
representations of information, data or knowledge intended to present information quickly and clearly. They
can improve cognition by utilizing graphics to enhance the human visual system’s ability to see patterns and
trends. I can now understand and use several file formats used on the web namely jpeg, GIF, Png etc. It may
also teach you on how to easily manipulate images.
II. OBJECTIVES
At the end of this lesson, you are expected to:
a. identify the basic principles of graphics and layout;
b. use image editing techniques on existing image to change or enhance their current state; and
c. give importance to imaging and design for online environment.
LESSON CONTENT
BASIC PRINCIPLES OF GRAPHICS AND LAYOUT
1. Balance. The visual weight of objects, texture, colors, and space is evenly distributed on the screen.
2. Emphasis. An area in the design that may appear different in size, texture, shape or color to attract the
viewer’s attention.
3. Movement. Visual elements guide the viewer’s eyes around the screen.
4. Pattern, Repetition, and Rhythm. These are the repeating visual element on an image or layout to create
unity in the layout or image. Rhythm is achieved when visual elements create a sense of organized
movement.
5. Proportion. Visual elements create a sense of unity where they relate well with one another.
6. Variety. This uses several design elements to draw a viewer’s attention.
INFOGRAPHICS
Information graphics or infographics are used to represent information, statistical data, or knowledge in
a graphical manner usually done in a creative way to attract the viewer’s attention.
*When inserting text to a web page, you can simply copy a text to your html editor, or you can upload it on a
website as a PDF file. Most browsers support “add-ons” so that you can open PDF files without leaving the
browser.
Photo manipulation is for artistic and aesthetic expression, not deception. With that in mind, this is how to put
whales in the sky, airplanes in the ocean, and far-off planets in the sky above Earth.
In commercial work, you might want to get rid of elements in the frame that distract from the subject.
“Photo manipulation has always been used,” says Antonio. “Maybe there’s a trash can in the background or a
line on the floor. My clients want the focus to be on their product, rather than on a random thing lying around.”
By getting rid of unimportant visual elements, subtle photo manipulation can pull a viewer’s attention to where
it belongs.
If you’re creating digital art, think about what you’re combining and what themes you’ll be using in your
work. Know what you’re going to do before you start in on your work. Have a clear idea and an outline for your
final product before you fire up Adobe Photoshop. “It’s good to write down ideas when you have them,” says
photographer Ronald Ong. “When ideas come up, I sketch them.”
Creating new images out of existing photos is difficult, but rewarding. The best way to get good at it is
to do it. “Work on it. Try different things. It’s not going to look amazing at first, but it’s all about practice,” says
ValdesHevia. “You’ll build an eye for realism, perspective, lighting, and colors as you go along. Don’t get
discouraged.”
As you practice, learn your tools. “I learn the most just messing around in Photoshop,” says Valdes-Hevia.
“I think to myself, ‘I’ve never clicked on this. What does it do?’” Be curious, investigate, and learn the software.
“Know the name of each tool and what they’re used for,” says Antonio.
Grow your budding skills by studying photo manipulation tutorials. Find examples of photo manipulation
and try to work backward to find out what the artist did. Play around with stock photos. Keep making your own
work and putting it out there. As you do, your own worlds will emerge and your own vision will take shape.
I. INTRODUCTION/FOCUS QUESTIONS
Online platform is a specially developed platform using Internet technology. Online platforms have
revolutionized access to any information. In our daily life today, we used Internet in doing such things and in our
learning purposes.
II. OBJECTIVES
At the end of this lesson, you are expected to:
a. identify the usual online platforms;
b. give some examples of online platforms; and
c. cite importance of being familiarized to online platforms.
LESSON CONTENT
Online Platform’s
1.Facebook
1. Marketplace – allows members to post, read and respond to classified ads.
2. Groups – allows members who have common interests to find each other and interact.
3. Events – allows members to publicize an event, invite guests and track who plans to attend.
4. Pages – allows members to create and promote a public page built around a specific topic.
5. Presence technology – allows members to see which contacts are online and chat.
Within each member’s personal profile, there are several key networking components. The most popular is
arguably the Wall, which is essentially a virtual bulletin board. Messages left on a member’s Wall can be text,
video or photos. Another popular component is the virtual Photo Album. Photos can be uploaded from the
desktop or directly from a smartphone camera. There is no limitation on quantity, but Facebook staff will remove
inappropriate or copyrighted images. An interactive album feature allows the member’s contacts (who are
called generically called “friends”) to comment on each other’s photos and identify (tag) people in the photos.
Another popular profile component is status updates, a microblogging feature that allows members to
broadcast short Twitter-like announcements to their friends. All interactions are published in a news feed, which
is distributed in real-time to the member’s friends.
Facebook offers a range of privacy options to its members. A member can make all his communications visible
to everyone, he can block specific connections or he can keep all his communications private. Members can
choose whether or not to be searchable, decide which parts of their profile are public, decide what not to put
in their news feed and determine exactly who can see their posts. For those members who wish to use Facebook
to communicate privately, there is a message feature, which closely resembles email.
2. Instagram
Instagram is an online mobile photo-sharing site that allows its users to share pictures and videos either publicly
or privately on the app, as well as through a variety of other social networking platforms, such
as Facebook, Twitter, Tumblr, and Flickr. Originally, a distinctive feature was that it confined photos to a square
shape, similar to Kodak Instamatic and Polaroid SX-70 images, in contrast to the 4:3 aspect ratio typically used
by mobile device cameras. In August 2015, version 7.5 was released, allowing users to upload media captured
in any aspect ratio. Users can also apply digital filters to their images. Videos on Instagram debuted in June 2013,
allowing prerecorded square standard definition resolution clips of up to 15 seconds to be shared; later
improvements added support for widescreen resolutions of up to 1080p and longer recording times for either
prerecorded (up to one minute) or disappearing live (up to one hour) videos.
Instagram was created by Kevin Systrom and Mike Krieger, and launched in October 2010 as a free mobile app.
The service rapidly gained popularity, with over 100 million active users as of April 2012[10][11] and over 300 million
as of December 2014.[12] Instagram is distributed through the Apple App Store and Google Play.[13]Support for
ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 25 OF
27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City
the app is available for iPhone, iPad, iPod Touch, Windows 10 devices and Android handsets, while third-party
Instagram apps are available for BlackBerry 10 and Nokia-Symbian Devices.
3. Twitter
Twitter is an online news and social networking service where users post and interact with messages, “tweets,”
restricted to 140 characters. Registered users can post tweets, but those who are unregistered can only read
them. Users access Twitter through its website interface, SMS or a mobile device app.[10] Twitter Inc. is based
in San Francisco, California, United States, and has more than 25 offices around the world.
Twitter is about learning and adding value
It is also about adding value to others by giving or sharing something valuable to them so that they are able to
learn something. That is why I usually tweet about stuff that I read, learned or have good value. I have learned
so much from the others that is why I love twitter. It is also about helping others, I disagree with many‘experts’ that
say you should only follow ‘influential’ users because I don’t judge someone that way, and because I believe the
people at Twitter don’t believe in them either. I also disagree that you should only share your own stuff otherwise
you will dilute your brand. Sure it makes sense but 24/7 sharing your own blog post and following influential
people?
BLOGGING SITES
Weebly
Weebly is one of the easiest website builders in the market. They allow you to drag and drop content into a
website, so it’s very intuitive to use (click here to see our opinion on Weebly).
By using Weebly’s website building elements, you can literally drag them into your website and have a website
built relatively quickly, and painlessly. The beauty of this system is that you can pretty much drag the elements
to wherever you want – so it’s not very restrictive on where and how you place your website content.
Weebly’s elements include pictures, paragraphs, videos, buttons, maps, contact forms – basically all the basics
for website building.
4. Tumblr
Tumblr is a popular microblogging platform designed for creative self-expression. It is considered a mindful
alternative to Facebook and other social media websites where users blog on a myriad of topics.
You can link your Tumblr account to other social networks you use and you can feed your traditional blog or
other RSS feed to your Tumblelog. You can also create static pages such as your own Questions page that
people are automatically taken to when they ask you a question. If you want to make your Tumblelog look more
lie a traditional website, you can do it by adding pages. You can make your Tumblelog private or just make
specific posts private as needed, and you can schedule posts to publish in the future.
Tumblr is perfect for people who don’t need a full blog to publish lengthy posts. It’s also great for people who
prefer to publish quick multimedia posts, particularly from their mobile devices. Tumblr is also a great choice for
people who want to join a larger community. If a blog is too much or too big for you, but Twitter is too small or
too little for you and Instagram isn’t versatile enough for you, then Tumblr might be just right for you.
It’s also easy to invite other people to contribute to your Tumblelog.
If you want to track your stats, you can add any analytics tracking code to your Tumblelog. Some users will even
burn a feed with Feed burner, create custom themes, and use their own domain names