You are on page 1of 27

Immaculada Concepcion College

Of Soldier’s Hills Caloocan City, Inc.


Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Name: _________________________________________ Strand and Section: _________________________________


Teacher: _______________________________________ Period cover: ____________________________
WEEK# 1

LESSON 1: INTRODUCTION TO ICT


WEB 1.0, WEB 2.0, WEB 3.0

I. INTRODUCTION/FOCUS QUESTIONS

The use of computers is now a daily fact of life. Students should be computer literate and be prepared
for the fast-changing world of information technology.
The curriculum of Computer Literacy in our junior forms ensures that students attain a general awareness
of the ranges of tasks that computers can do, how computers are used to solve daily-life problems, and to
what extent computers affect individuals and society.
The senior ICT curriculum provides students with knowledge, practical skills and an understanding of the
processes involved in problem-solving using technology. It encompasses problem identification, solution and
design, and the applications of ICT knowledge and skills in these processes.
The study of an ICT course contributes significantly to the education of students by providing pathways
into the workforce or preparing them for further studies. It also provides opportunities for the development of key
generic skills such as critical thinking, communication, creativity and problem-solving, in contexts that derive
naturally from the learning objectives, outcomes and experiences.
(Source: http://tsk.edu.hk/website/article/article_detail?channel_id=2541&article_id=1180)

II. OBJECTIVES
At the end of this lesson, you are expected to:
a. identify the different online platforms;
b. compare and contrast the differences between online platforms, sites, and content; and
c. give importance to information and communication technologies.

LESSON CONTENT

INFORMATION AND COMMUNICATION TECHNOLOGIES


Information and Communication Technology (ICT) deals with the use of different communication technologies
such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information.

WEB 1.0:
When the World Wide Web was invented, most web pages were static. Static (also known as flat page or
stationary page) in the sense that the page is “as is” and cannot be manipulated by the user. The content is also
the same for all users. This is referred to as Web 1.0.

WEB 2.0: DYNAMIC WEB PAGES


➢ Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website
differently than others. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing
sites, hosted services, and web applications.
➢ Web 2.0 allows users to interact with the page: instead of just reading a page, the user may be able to
comment or create a user account. Web 2.0 also allows users to use web browsers instead of just using

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 1 OF 27


Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

their operating system. Browsers can now be used for their user interface, application software (or web
applications), and even for file storage.

Most websites that we visit today are Web 2.0.


1. Folksonomy. It allows users to categorize and classify/arrange information using freely chosen keywords
(e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that
start with the pound sign (#). This is also referred to as hashtag.
2. Rich User Experience. Content is dynamic and is responsive to user’s input. An example would be a
website that shows local content. In the case of social networking sites, when logged on, your account is
used to modify what you see in their website.
3. Long Tail. Services are offered on demand rather than on a one-time purchase. In certain cases,
timebased pricing is better than file-size-based pricing or vice versa. This is synonymous to subscribing to
a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges
you for the amount of bandwidth you used.
4. User Participation. The owner of the website is not the only one who is able to put content. Others are
able to place a content of their own by means of comment, reviews, and evaluation. Some websites
allow readers to comment on an article, participate in a poll, or review a specific product (e.g.,
Amazon.com, online stores).
5. Software as a Service. Users will subscribe to a software only when needed rather than purchasing them.
This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free
web-based application that allows the user to create and edit word processing and spreadsheet
documents online. When you need a software, like a Word Processor, you can purchase it for a one-time
huge amount and install it in your computer and it is yours forever. Software as a service allows you to
“rent” a software for a minimal fee.
6. Mass Participation. It is a diverse information sharing through universal web access. Since most users can
use the Internet, Web 2.0’s content is based on people from various cultures.

WEB 3.0 AND THE SEMANTIC WEB


➢ According to the W3C, “The Semantic Web provides a common framework that allows data to be shared
and reused across application, enterprise, and community boundaries.”
➢ The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences to be able to deliver
web content specifically targeting the user.

Several problems of Web 3.0


1. Compatibility - HTML files and current web browsers could not support Web 3.0.
2. Security - The user’s security is also in question since the machine is saving his or her preferences.
3. Vastness - The World Wide Web already contains billions of web pages.
4. Vagueness - Certain words are imprecise. The words “old” and “small” would depend on the user.
5. Logic - Since machines use logic, there are certain limitations for a computer to be able to predict what
the user is referring to at a given time.

TRENDS IN ICT
1. Convergence - Technological convergence is the synergy of technological advancements to work on a
similar goal or task.
2. Social Media - Social media is a website, application, or online channels that enable web users to create,
co-create, discuss, modify, and exchange user-generated content. ➢ Six Types of Social Media:

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 2 OF 27


Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

a. Social Networks. These are sites that allow you to connect with other people with the same
interests or background.
b. Bookmarking Sites. These are sites that allow you to store and manage links to various websites
and resources.
c. Social News. These are sites that allow users to post their own news items or links to other news
sources.
d. Media Sharing. These are sites that allow you to upload and share media content like images,
music, and video.
e. Micro blogging. These are sites that focus on short updates from the user.
f. Blogs and Forums. These websites allow users to post their content.
3. Mobile Technologies - The popularity of smartphones and tablets has taken a major rise over the years.
This is largely because of the devices’ capability to do tasks that were originally found in personal
computers.
➢ Kinds of Operating Systems:
a. IOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile

4. Assistive Media - Assistive media is a nonprofit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 3 OF 27


Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Name: _________________________________________ Strand and Section: _________________________________


Teacher: _______________________________________ Period cover: ____________________________ Week
WEEK# 2 -3

LESSON 2: ONLINE SAFETY, SECURITY, AND RULES OF NETIQUETTE

I. INTRODUCTION/FOCUS QUESTIONS
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay
in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always
“another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what
you are doing.

II. OBJECTIVES
At the end of this lesson, you are expected to:
a. examine one’s and others’ safety when sharing information using the Internet;
b. examine one’s and others’ reputation when using the Internet;
c. determine the dangers of the Internet; and
d. give importance to responsible use of social networking sites; and

LESSON CONTENT

WHY IS IT IMPORTANT TO STAY SAFE ONLINE?


Most of us are ‘connected’ via our laptops, mobile phones, tablets or personal computer. The potential
for the internet to be a valuable and a fun resource for entertainment, making friends, keeping in touch and
learning is huge. But if you use the internet, you could be at risk of illegal activity or abuse - be it bullying, fraud or
something more serious.
Unlike seeing someone face to face, on the net, people aren't always what they first seem. In the same
way you learn about safety when you leave the house, it is important to learn how to stay safe online. These are
skills that will stay with you for life.

SOME GOLDEN RULES


Don't give out personal information such as your address or phone number.
Don’t send pictures of yourself to anyone, especially indecent pictures.
Don't open emails or attachments from people you don't know.
Don't become online ‘friends’ with people you don't know.
Never arrange to meet someone in person who you've met online.
If anything you see or read online worries you, tell someone about it.

SOCIAL NETWORKING
Social networking websites and apps, such as Facebook, MySpace, Instagram, Viber, Tumblr, SnapChat, Ask.fm
and Twitter have become incredibly popular in recent years. Most users are genuine, but because it is so easy to
hide your real identity, it is possible to come into contact with people you would normally avoid.
THE RISKS (PRIVACY)
The internet offers you a lot of freedom and this can lead some people to behave in ways they would not behave
in public.
ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 4 OF 27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

They might: say things on a status update / post / tweet they would never say face to
face
give out personal information about themselves or others (including photos) that they would normally
keep private
A common example
A young person tries to let their friends know about their birthday party by posting the information about when
and where on their social networking site. This means hundreds of people end up knowing about the party and
turn up uninvited. The party could turn into chaos with people getting angry and even refusing to leave. The
police would have to get involved to turn people away.

CYBER BULLYING
Cyber bullying can work in the same way as bullying in the playground; the victim feels frightened and alone,
while the bully tries to hide from being caught.
Comments, images and videos about a person can be posted online causing the victim to feel
frightened and upset.
It is even possible for cyber bullies to hack into the victim's personal accounts and harass them from
within their own user profile.
Often cyber bullies feel braver because they can't be seen, but it can be the most traceable form of
bullying because there's evidence that it's happened.
But because bullies think they can cover up their identity online sometimes people who wouldn't
normally bully might do so online.
CYBER STALKING
Harassment on the internet can be just as frightening as other forms of stalking.
Women and girls are usually the victims of this kind of behavior.
They might be harassed by an ex-boyfriend or girlfriend who is upset about the end of their relationship,
for example.
It can also begin when a purely online friendship turns sour.
It can even begin entirely at random, by one online stranger towards another.
IDENTITY THEFT
The more information you make available online, the greater the risk of identity theft. It can be very
tempting to reply to an email or open an attachment or post information about yourself on social networking
sites, but you should never do it.
Personal information includes your:
email address any banking information
phone number photos of yourself postal address
The consequences of fraud can be huge, so you should be aware of the very serious risks. If someone steals
you or your parent's identity they can: steal a lot of money commit crimes that could put you or your parents
in danger commit crimes that you or your parents could get into trouble for
OTHER TYPES OF INTERNET USE E-mails, Spam &, Phishing and Viruses SPAM
Spam is usually considered to be electronic junk mail or junk newsgroup postings. Some people define
spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and
sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally
email advertising for some product sent to a mailing list or newsgroup.
Why Spam is a Problem
In addition to wasting people's time with unwanted email, spam also eats up a lot of network bandwidth.
Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight
spam with a variety of techniques. But because the Internet is public, there is really little that can be done to
ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 5 OF 27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies
to prevent spammers from spamming their subscribers.
PHISHING
The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an
attempt to scam the user into surrendering private information that will be used for identity theft. Phishing email
will typically direct the user to visit a website where they are asked to update personal information, such as a
password, credit card, social security, or bank account numbers, that the legitimate organization already has.
The website, however, is bogus and will capture and steal any information the user enters on the page.
Why is Phishing Successful for Scammers?
Phishing emails are blindly sent to thousands, if not millions of recipients. By spamming large groups of
people, the "phisher" counts on the email being read by a percentage of people who actually have an account
with the legitimate company being spoofed in the email and corresponding webpage.
Viruses/Adware/Malware
A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are
manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even
such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing
security systems. Since 1987, when a virus infected ARPANET, a large network used by the Defense Department
and many universities, many antivirus programs have become available. These programs periodically check your
computer system for the best-known types of viruses.
Some people distinguish between general viruses and worms. A worm is a special type of virus that can
replicate itself and use memory, but cannot attach itself to other programs.
ADWARE
Adware is the common name used to describe software that is given to the user with advertisements
embedded in the application. Adware is considered a legitimate alternative offered to consumers who do not
wish to pay for software. There are many adsupported programs, games or utilities that are distributed as adware
(or freeware). Today we have a growing number of software developers who offer their goods as "sponsored"
freeware (adware) until you pay to register. If you're using legitimate adware, when you stop running the
software, the ads should disappear, and you always have the option of disabling the ads by purchasing a
registration key.
Another use of the phrase adware is to describe a form of spyware that collects information about the
user in order to display advertisements in the Web browser. Unfortunately, some applications that contain adware
track your Internet surfing habits in order to serve ads related to you. When the adware becomes intrusive like
this, then we move it into the spyware category and it then becomes something you should avoid for privacy
and security reasons.
MALWARE
Short for malicious software, malware refers to software designed specifically to damage or disrupt a system,
such as a virus or a Trojan horse. Types of Malware
As the phrase malware includes any type of malicious code, there are many different types of malware, Spyware
Key loggers
Computer viruses or worms.
Financial malware - which is designed to scan a computer system for information related to financial
transactions, are more common than other types.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 6 OF 27


Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Protection Against Malware


The standard protection from malware is anti-malware — software tools and programs designed to identify,
remove and prevent malicious software from infecting computer systems or electronic devices. If you have an
e-address, at some point you might receive a message from someone you don't know. They could be:
selling something (this is called a ‘spam’ sending you an attachment (in most cases
email) contain a virus, adware or malware)
sending you a virus sending abusive or explicit content
The golden rule is, if the email is from someone you don't know, delete it.
If it is spam, you might get ripped off. to see. You will have to pay to remove it from
If it is a virus, your computer might get your computer
damaged. If it is abusive or explicit, it might upset you
If it is an attachment, it might contain a or even get you into trouble.
virus, or it might be something you don't want
You can avoid unwanted emails by getting the right software. This is something for an adult to sort out, but you
might know more about it than them already, so help them out.
ETHICS IN GENERAL
A guideline is needed to stop the current technology products from being exploited for example
replicating original CDs and selling them as pirated software, this unethical behavior can be controlled by the
code of conducts.
Unethical refers to any code of conducts that are not conforming to approved standards of social or
professional behavior. Computer ethics is a system of moral standards or values used as a guideline for computer
users.
LAW IN GENERAL
Law is a legal system comprising of rules and principles that govern the affairs of a community and
controlled by a political authority. Law differs from one country to another.
In the era of technology, computer law is needed to clarify goods or actions that fall under the computer
law. Computer law refers to all areas in law that requires an understanding of computer technology such as
hardware, software and Internet.
WHY DO WE NEED ETHICS AND LAW IN COMPUTING?
➢ RESPECTING OWNERSHIP - We must respect ownership by not stealing other people’s work either by
duplicating or distributing it. Duplicating and distributing copies of audio tapes, video tapes and
computer programs without permission and authorization from the individual or company that
created the program are immoral and illegal.
➢ RESPECTING PRIVACY AND CONFIDENTIALITY - We should respect other people's privacy and
confidentiality by refraining ourselves from reading their mails or files without their permission. If we do
so, it is considered as violating an individual’s rights to privacy and confidentiality.
➢ RESPECTING PROPERTY - Property here means ownership. Since an individual data and information are
considered as property, therefore, an act of tampering and changing electronic information is
considered as vandalism and disrespect for other people’s property.
UNETHICAL COMPUTER CODE OF CONDUCTS
With the advancement of ICT, it is easy for anyone to retrieve your information from the Internet. You may
not realize that when you fill a form on the Internet, your information may be exposed and stolen. Examples of
unethical computer code of conducts include:
• modifying certain information on the Internet, affecting the accuracy of the information
• selling information to other parties without the owner’s permission
• using information without authorization
• involvement in stealing software
ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 7 OF 27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

• invasion of privacy
Intellectual property refers to any product of human intellect that is unique and has value in the market place.
This covers ideas, inventions, unique name, computer program codes and many more.
ETHICAL COMPUTER CODE OF CONDUCTS
Examples of ethical computer code of conducts include:
• sending warning about viruses to other computer users
• asking permission before sending any business advertisements to others
• using information with authorization

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 8 OF 27


Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Name: _________________________________________ Strand and Section: _________________________________


Teacher: _______________________________________ Period cover: ____________________________ Week
# 4-5

LESSON 3: ADVANCED WORD PROCESSING SKILLS


ADVANCED PRESENTATION SKILLS

I. INTRODUCTION/FOCUS QUESTIONS
MS Word is the most popular word processing software used today. A word processor is essentially a
computerized version of the standard typewriter. However, the computer adds features typewriters never
dreamed of having like spell check, the ability to save and store documents, copy and paste functions, the
ability to add images and shapes to documents, and many more. When attached to an email, electronic
documents, created by MS Word can be delivered in seconds. Another benefit is that it helps the user to type
faster and more accurate.
On the other hand, PowerPoint (PPT) is a powerful, easy-to-use presentation graphics software program
which allows you to create professional-looking electronic slideshows. PPT is used to present information in an
organized manner to an individual or group. Using clip art, sound clips, movie clips, graphs, organization charts,
imported Web screens, and many other features, you can easily create a presentation that will impress your
audience and convey your message clearly and professionally.
What are the things that we have to keep in mind in order for us to develop our word processing and
presentation skills through said software? Let’s find out!

II. OBJECTIVES
At the end of this lesson, you are expected to:
a. identify different MS word and MS PowerPoint features;
b. create a simple MS word and PowerPoint file; and
c. uses common productivity tools effectively by maximizing advanced application techniques.

LESSON CONTENT
TWO COMPONENTS OF MAIL MERGE:
1. Form Document - The document that contains the main body of the message we want to convey or
send.
2. List or Data File - This is where the individual information or data that needs to be plugged in (merged)
to our form document is placed and maintained.

Label Generation
It creates a blank form document that simulates either a blank label or envelope of pre-defined size and will
use the data file that you selected to print the information, typically, individual addresses.

INTEGRATING IMAGES AND EXTERNAL MATERIALS


Kinds of Materials:

1. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in any local
storage device.
2. Clip Art. This is generally a .GIF type; line art drawings or images used as generic representation for ideas
and objects that you might want to integrate in your document.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 9 OF 27


Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

3. Shapes. These are printable objects or materials that you can integrate in your document to enhance its
appearance or to allow you to have some tools to use for composing and representing ideas or
messages.
4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form ideas that
are organizational or structural in nature.
5. Chart. Another type of material that you can integrate in your Word document that allows you to
represent data characteristics and trends.
6. Screenshot. Sometimes, creating reports or manuals for training or procedure will require the integration
of a more realistic image of what you are discussing on your report or manual.

Parts of Microsoftword
1. Quick Access Toolbar – Collection of buttons that provide one click access to commonly used
commands such as Save, Undo or Redo. You can also customize this according to your preference.
2. Title Bar – A bar the display the name of active document.
3. Ribbon – The main set of commands and controls organized task in Tabs and groups, you can also
customize the ribbon according to your preference
4. Vertical Scroll Bar – Scroll bar to use when you want to scroll vertically through the document window
5. Horizontal Scroll Bar – Scroll bar to use when you want to scroll horizontally through the document window.
6. Zoom Control – Used for magnifying and shrinking of the active document.
7. View Shortcut – Buttons used to change how the worksheet content is displayed. Print Layout, Full Screen
Reading, Web Layout, Outline or Draft.
8. Status Bar – It displays information about your document, such as what page you are currently viewing
and how many words are in your document, etc.
9. Ruler – It used to set the alignment and margins of the elements in the documents.
10. Document Window – The white space where you can type or attached all the data you need in the
document.
11. Insertion Point – It is the blinking vertical line in your document. It indicates where you can enter text on
the page. You can use the insertion point in a variety of ways: Blank document: When a new blank
document opens, the insertion point is located in the top-left corner of the page
Mail Merge

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 10 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

One of the important reasons in using computers per se is its ability to do recurring tasks automatically. But
this ability has to be honed by learning the characteristics and features of the software you use with your
computer. After all, no matter how good or advance your computer and software may be, it can only be as
good as the person using it.

In this particular part of our lesson, we will learn one of the most powerful and commonly used features of
Microsoft Word called Mail Merge. As the name suggests, this feature allows you to create documents and
combine or merge them with another document or data file. It is commonly used when sending out advertising
materials to various recipients.

The simplest solution for the scenario above is to create a document and just copy and paste it several
times then just replace the details depending on whom you send it to. But what if you have hundreds or
thousands of recipients? Would not that take too many hours? What if you have a small database of
information where you can automatically generate those letters?

Two Components of Mail Merge


ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 11 OF
27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

1. Form Document
The first component of our mail merged document is the form document. It is generally the document
that contains the main body of the message we want to convey or send. The main body of the message is the
part of the form document that remains the same no matter whom you send it to from among your list.

Also included in the form document is what we call place holders, also referred to as data fields or
merge fields. This marks the position on your form document where individual data or information will be
inserted. From our sample document, the place holders are denoted or marked by the text with double-
headed arrows (<< >>) on each side and with a gray background. On a printed standard form, this will be the
underlined spaces that you will see and use as a guide to where you need to write the information that you
need to fill out. In its simplest form, a form document is literally a “form” that you fill out with individual
information. A common example of a form document is your regular tax form or application form.

2. List or Data File


The second component of our mail merged document is the list or data file. This is where the individual
information or data that needs to be plugged in (merged) to the form document is placed and maintained.
One of the best things about the mail merge feature is that it allows data file to be created fro within the
Microsoft Word application itself, or it gets data from a file created in Microsoft Excel or other data formats. In
this way, fields that needed to be filled up on the form document can easily be maintained without
accidentally altering the form or main document. You can also easily add, remove, modify, or extract your
data more efficiently by using other data management applications like Excel or Access and import them in
Word during the mail merge process.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 12 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes sense that
after you print out your form letters, you will need to send it to individual recipients in an envelope with the
matching address printed directly on the envelope or on a mailing label to stick on. By using virtually the same
process as a standard mail merge, Microsoft Word will print individual addresses to a standard form that it has
already pre-formatted. Simply put, it creates a blank form document that simulates either a blank label or
envelope of pre-defined size and will use the data file that you selected to print the information, typically
individual addresses. So even in generating labels, the two essential components of creating a merged
document are present: the form document and the data file. Only in this case, you did not have to type or
create the form document yourself because it was already created and pre-formatted in Microsoft Word. All
you need to do is select the correct or appropriate size for the label or envelope and select the data file that

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 13 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

contains the addresses (data) to be printed. You can also preview your merged labels before printing if you
want to.

Parts of Microsoft PowerPoint


1. Quick Access Toolbar – Use to quickly save files and for redo and undo
2. Title Bar – We can know if what Microsoft we use and the file name of the documents
3. Outline plane – We can see all the slides that we make

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 14 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

4. Presentation View or Slide pane – the page where we can add the text
5. Status Bar – To view how many slides you make
6. Zoom Control or Zoom – To magnify in or magnify out the text document
7. Ribbon – Toolbar that we use to add the effects of the text or slides etc.
8. Command Tabs – it is a parts of Microsoft word that we can see the insert, home, view, format, etc.
9. Office Menu – Option for saving file or open new documents
Documents View – To View all the slides

USING HYPERLINKS IN MICROSOFT POWERPOINT:


1. Select an object or highlight a text.

2. Go to Insert > Hyperlinks (under links category) or use the shortcut key Ctrl + K. The insert Hyperlink dialog
box would appear.

Link to Options:
a. Existing File or Web Page – creates a hyperlink to website or a local file saved in your hard drive. Just
browse your file in the dialog box or type the web address.
b. Place in This Document – creates a hyperlink that allows you to jump to a specific slide in your
presentation.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 15 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

c. Create a New Document – creates a hyperlink that once clicked, creates a new document on your
specified location.
d. E-mail Address – creates a hyperlink that opens Microsoft Outlook that automatically adds your specified
recipient on a new email.
3. When done, click OK to apply your hyperlink.

Embedding Objects in Microsoft PowerPoint


Embedding objects is easy using PowerPoint Presentation. With this option, you can insert an Excel file
that would look like a table to a PowerPoint Presentation.
Embedding an Excel File to your PowerPoint Presentation
1. Go to the Insert tab.
2. On the Text group, click on Object.
3. The Insert Object dialog box would appear:
4. Once you are done Click OK

Options:

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 16 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

a. Create New – creates a new file from scratch. You can select on a wide variety of files listed.
b. Create from File – creates a file from an existing file saved on your hard drive; simply browse the file to
use it. Putting a check on the “link” option will allow you to modify the Excel file inside your PowerPoint
Presentation.

Spread Sheet

1. What is a Spreadsheet Software? • allows users to organize data in rows an columns and perform
calculations on the data • These rows and columns collectively are called worksheet.
2. Examples of Spreadsheet Software:
• LibreOffice Calc
• OpenOffice.org Calc
• Google Sheets • Apple iWork Numbers
• Kingsoft Office Spreadsheets
• StarOffice Calc
• Microsoft Excel

MICROSOFT EXCEL
To open Microsoft Excel, Press “Windows Logo” + R then type “excel” then enter.

Key Terms in MS Excel:


• Row – horizontal line of entries in a table
• Column – vertical line of entries in a table
• Cell – the place where info. is held in a spreadsheet
Key Terms in MS Excel:
• Active Cell – the selected cell
• Column Heading – the box at the top of each column containing a letter
• Row Heading – the row number
• Cell Reference – the cell address of the cell usually combine letter and number (ex. A1, B4, C2)
• Merge – combining or joining two or more cells
• Formula – is an expression which calculates the value of a cell.
• Functions – are predefined formulas and are already available in Excel
• Formula Bar – the bar that displays the contents of a cell

FUNCTIONS
BASIC MATH OPERATIONS:
• =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the numbers within the range)
• =PRODUCT(x,y) – returns the product of x and y
• =QUOTIENT(x,y) – returns the quotient of x divided by y
• =x-y – returns the difference of x subtracted by y

BASIC MATH OPERATIONS:


• =x+y – returns the sum of x and y
• =x*y – returns the product of x and y
• =x/y – returns the quotient of x divided by y
• =x-y – returns the difference of x subtracted by y
OTHER FUNCTIONS:
• =ABS(x) – returns the absolute value of x
ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 17 OF
27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

• =AVERAGE(x,y) – returns the average of x and y


• =CONCATENATE(x,y) – joins x and y
• =IF(Condition, x, y) – returns x if the condition is true, else it returns y
• =ISEVEN(x) – returns true if x is an even number
• =ISODD(x) – returns true if x is an odd number
• =COUNT(range) – counts the number of cell containing a number within a range
• =COUNTIF(range, criteria) – count the number of cell that fits with the criteria within the range
• =ISNUMBER(x) – returns true if x is a number
• =ISTEXT(x) – returns true if x is a text • =LEN(x) – returns the length of characters in x
• =PROPER(x) – returns the proper casing of x

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 18 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Name: _________________________________________ Strand and Section: _________________________________


Teacher: _______________________________________ Period cover: ____________________________ Week
#6

LESSON 4: IMAGING AND DESIGN FOR ONLINE ENVIRONMENT (PHOTO EDITING)

I. INTRODUCTION/FOCUS QUESTIONS
Imaging and Design for Online Environment is an online graphics and layouts that may teach you many
effective things in order for you to use image design and its advantages. In this lesson, you will learn the basic
principles of graphics and layouts. It has balance, emphasis, movement, pattern, repetition and rhythm,
proportions, and variety.
This lesson will teach you many effective things in order for you to use image design and its advantage.
You will understand that the basic principles of graphics and layout are so simple and it is easy to use. It may
help you also on how to create a creative Infographic. Information graphics or infographics are graphic visual
representations of information, data or knowledge intended to present information quickly and clearly. They
can improve cognition by utilizing graphics to enhance the human visual system’s ability to see patterns and
trends. I can now understand and use several file formats used on the web namely jpeg, GIF, Png etc. It may
also teach you on how to easily manipulate images.

II. OBJECTIVES
At the end of this lesson, you are expected to:
a. identify the basic principles of graphics and layout;
b. use image editing techniques on existing image to change or enhance their current state; and
c. give importance to imaging and design for online environment.

LESSON CONTENT
BASIC PRINCIPLES OF GRAPHICS AND LAYOUT
1. Balance. The visual weight of objects, texture, colors, and space is evenly distributed on the screen.
2. Emphasis. An area in the design that may appear different in size, texture, shape or color to attract the
viewer’s attention.
3. Movement. Visual elements guide the viewer’s eyes around the screen.
4. Pattern, Repetition, and Rhythm. These are the repeating visual element on an image or layout to create
unity in the layout or image. Rhythm is achieved when visual elements create a sense of organized
movement.
5. Proportion. Visual elements create a sense of unity where they relate well with one another.
6. Variety. This uses several design elements to draw a viewer’s attention.

INFOGRAPHICS
Information graphics or infographics are used to represent information, statistical data, or knowledge in
a graphical manner usually done in a creative way to attract the viewer’s attention.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 19 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

ONLINE IMAGE FILE FORMATS

*When inserting text to a web page, you can simply copy a text to your html editor, or you can upload it on a
website as a PDF file. Most browsers support “add-ons” so that you can open PDF files without leaving the
browser.

PHOTO MANIPULATION AND ETHICS


It’s important to understand photo manipulation’s checkered history. A famous Civil War battlefield
image of Ulysses S. Grant on a horse is actually the combination of multiple images. Stalinist Russia made ample
use of doctored photos for propaganda purposes. In 1982, National Geographic courted controversy by
altering the pyramids of Giza to fit on their cover.
If you’re a photojournalist and you’re attempting to represent subjects accurately, you should not
combine or distort photos in certain ways. The National Press Photographers Association (NPPA) is very clear
about this in their code of ethics, which states:
Editing should maintain the integrity of the photographic images’ content and context. Do not
manipulate images or add or alter sound in any way that can mislead viewers or misrepresent subjects.

Photo manipulation is for artistic and aesthetic expression, not deception. With that in mind, this is how to put
whales in the sky, airplanes in the ocean, and far-off planets in the sky above Earth.

Know your goals and plan ahead.


Before combining any images or manipulating photos, understand what you’re trying to accomplish.
“You need to have a very clear idea of what you want,” says Edwin Antonio, an artist who combines modern
fashion with historical fine art. “That way, you don’t get distracted. Just focus on your goal.”

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 20 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

In commercial work, you might want to get rid of elements in the frame that distract from the subject.
“Photo manipulation has always been used,” says Antonio. “Maybe there’s a trash can in the background or a
line on the floor. My clients want the focus to be on their product, rather than on a random thing lying around.”
By getting rid of unimportant visual elements, subtle photo manipulation can pull a viewer’s attention to where
it belongs.
If you’re creating digital art, think about what you’re combining and what themes you’ll be using in your
work. Know what you’re going to do before you start in on your work. Have a clear idea and an outline for your
final product before you fire up Adobe Photoshop. “It’s good to write down ideas when you have them,” says
photographer Ronald Ong. “When ideas come up, I sketch them.”

Digital art, surreal scenes, and realism.


Photographic art can break all laws of physics and reality, but it still has to obey the rules of photography.
“The picture you’re creating should be as realistic as possible,” says Ong. Realism here doesn’t mean creating
scenes that can be found in real life. Photomontage and digital art can still feature sci-fi and fantasy elements.
However, the minotaurs, mermaids, and surreal scenes you create still need to have realistic perspective,
lightings, shadows, and color.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 21 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Use images that work together well.


Achieving that realism starts with combining complementary photos. The images you’re working with
should have something to do with each other when it comes to factors like color and light. “You can be amazing
and know what you’re doing,” says Valdes-Hevia, “but if you are using two pictures that are radically different,
that have very different perspectives or lighting, you’re going to have to heavily edit it.” The more you have to
edit your photos, the harder your job is.

Get perspective right.


Perspective is the first thing you’ll want to line up when combining photos. While it’s possible to alter
lighting and colors in Photoshop, altering perspective is much more difficult. Get tips on how to introduce new
objects to an image or subtract existing ones.

Match lighting and color.


After that, match lighting, going from darkest to lightest elements in your composition. “When you’re
trying to match lighting, you want to match the darkest color of your subject to match the darkest color of your
background,” says Valdes-Hevia. “Same with the highlights.”
Making sure colors match is your next step to bring images together. Matching shadows, and their range
of colors, is important. An ordinary viewer might not be able to articulate why shadows look wrong, but they will
notice it. “I always adjust the hue and saturation settings,” says Ong. “Make sure shadows blend into the
background. Brightness, contrast, shadows, highlights — try to make it blend.”

Control subjects and elements in camera.


Finding stock images or other existing photos with complementary elements is possible, but sometimes
the best photos are the ones you take yourself in a controlled photoshoot. “It often looks better if you take your
own pictures because you can plan ahead and match all the lighting and perspective beforehand.” says
Valdes-Hevia. Getting shadows and perspective to line up and work together is much easier if you’re the one
who created those shadows and perspectives in the first place.
As you edit, make sure that you can go back and change things or restart your workflow. “One of the
first things I had to learn was how to edit non-destructively,” says Valdes-Hevia. “Make sure you can go back
later and change things you’ve done in the beginning. Masks are your friends.”

Practicing the art of image manipulation.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 22 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Creating new images out of existing photos is difficult, but rewarding. The best way to get good at it is
to do it. “Work on it. Try different things. It’s not going to look amazing at first, but it’s all about practice,” says
ValdesHevia. “You’ll build an eye for realism, perspective, lighting, and colors as you go along. Don’t get
discouraged.”

Make composite photos


Make two photos into one image. Discover the photo manipulation techniques to create dramatic
composite images.

Get the details of double exposure effects.


Double exposure is one of the oldest photo effects. Learn how to do it more easily with modern
technology.

As you practice, learn your tools. “I learn the most just messing around in Photoshop,” says Valdes-Hevia.
“I think to myself, ‘I’ve never clicked on this. What does it do?’” Be curious, investigate, and learn the software.
“Know the name of each tool and what they’re used for,” says Antonio.
Grow your budding skills by studying photo manipulation tutorials. Find examples of photo manipulation
and try to work backward to find out what the artist did. Play around with stock photos. Keep making your own
work and putting it out there. As you do, your own worlds will emerge and your own vision will take shape.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 23 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Name: _________________________________________ Strand and Section: _________________________________


Teacher: _______________________________________ Period cover: __________________
Week 7

LESSON 5: ONLINE PLATFORMS FOR ICT CONTENT DEVELOPMENT

I. INTRODUCTION/FOCUS QUESTIONS
Online platform is a specially developed platform using Internet technology. Online platforms have
revolutionized access to any information. In our daily life today, we used Internet in doing such things and in our
learning purposes.

II. OBJECTIVES
At the end of this lesson, you are expected to:
a. identify the usual online platforms;
b. give some examples of online platforms; and
c. cite importance of being familiarized to online platforms.

LESSON CONTENT

WHAT IS ONLINE PLATFORM?


• An online platform is a base of technologies designed to run within an online
environment and provides interactive online services.
• Online platforms currently include, but are not limited to: o Presentation or
Visualization
▪ Allows you to present and share presentations, infographics and videos with other people.
▪ Use to communicate information clearly and efficiently.
o Cloud Computing
▪ Simply called as “The cloud” ▪ Access anytime, anywhere.
▪ The practice of using a network of remote servers hosted on the internet.
▪ Instead of using your computer’s hard drive, you store and access your data and
programs over the Internet.
o Social Media
▪ Computer-mediated tools that allow large group of people to create, share or exchange
information, interest; and
▪ The information shared can in the form of ideas, pictures, videos or anything that you want
to create and share to virtual communities.
o File Management
▪ The storing, naming, sorting and handling of computer files
▪ Allows you to convert and manage files without downloading the software tool.
o Mapping
▪ A transformation taking the points of one space into the points of the same or another
space.
▪ Uses GPS to detect location and used for navigation.

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 24 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

o Web Page Creation


▪ Encompasses a number of important elements including color, layout, and overall
graphical appearance.
▪ The platform does not require any web programming skill they provide a drag and drop
interface and free hosting as well.

Online Platform’s

1.Facebook
1. Marketplace – allows members to post, read and respond to classified ads.
2. Groups – allows members who have common interests to find each other and interact.
3. Events – allows members to publicize an event, invite guests and track who plans to attend.
4. Pages – allows members to create and promote a public page built around a specific topic.
5. Presence technology – allows members to see which contacts are online and chat.
Within each member’s personal profile, there are several key networking components. The most popular is
arguably the Wall, which is essentially a virtual bulletin board. Messages left on a member’s Wall can be text,
video or photos. Another popular component is the virtual Photo Album. Photos can be uploaded from the
desktop or directly from a smartphone camera. There is no limitation on quantity, but Facebook staff will remove
inappropriate or copyrighted images. An interactive album feature allows the member’s contacts (who are
called generically called “friends”) to comment on each other’s photos and identify (tag) people in the photos.
Another popular profile component is status updates, a microblogging feature that allows members to
broadcast short Twitter-like announcements to their friends. All interactions are published in a news feed, which
is distributed in real-time to the member’s friends.
Facebook offers a range of privacy options to its members. A member can make all his communications visible
to everyone, he can block specific connections or he can keep all his communications private. Members can
choose whether or not to be searchable, decide which parts of their profile are public, decide what not to put
in their news feed and determine exactly who can see their posts. For those members who wish to use Facebook
to communicate privately, there is a message feature, which closely resembles email.

2. Instagram

Instagram is an online mobile photo-sharing site that allows its users to share pictures and videos either publicly
or privately on the app, as well as through a variety of other social networking platforms, such
as Facebook, Twitter, Tumblr, and Flickr. Originally, a distinctive feature was that it confined photos to a square
shape, similar to Kodak Instamatic and Polaroid SX-70 images, in contrast to the 4:3 aspect ratio typically used
by mobile device cameras. In August 2015, version 7.5 was released, allowing users to upload media captured
in any aspect ratio. Users can also apply digital filters to their images. Videos on Instagram debuted in June 2013,
allowing prerecorded square standard definition resolution clips of up to 15 seconds to be shared; later
improvements added support for widescreen resolutions of up to 1080p and longer recording times for either
prerecorded (up to one minute) or disappearing live (up to one hour) videos.
Instagram was created by Kevin Systrom and Mike Krieger, and launched in October 2010 as a free mobile app.
The service rapidly gained popularity, with over 100 million active users as of April 2012[10][11] and over 300 million
as of December 2014.[12] Instagram is distributed through the Apple App Store and Google Play.[13]Support for
ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 25 OF
27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

the app is available for iPhone, iPad, iPod Touch, Windows 10 devices and Android handsets, while third-party
Instagram apps are available for BlackBerry 10 and Nokia-Symbian Devices.

3. Twitter

Twitter is an online news and social networking service where users post and interact with messages, “tweets,”
restricted to 140 characters. Registered users can post tweets, but those who are unregistered can only read
them. Users access Twitter through its website interface, SMS or a mobile device app.[10] Twitter Inc. is based
in San Francisco, California, United States, and has more than 25 offices around the world.
Twitter is about learning and adding value
It is also about adding value to others by giving or sharing something valuable to them so that they are able to
learn something. That is why I usually tweet about stuff that I read, learned or have good value. I have learned
so much from the others that is why I love twitter. It is also about helping others, I disagree with many‘experts’ that
say you should only follow ‘influential’ users because I don’t judge someone that way, and because I believe the
people at Twitter don’t believe in them either. I also disagree that you should only share your own stuff otherwise
you will dilute your brand. Sure it makes sense but 24/7 sharing your own blog post and following influential
people?
BLOGGING SITES
Weebly

Weebly is one of the easiest website builders in the market. They allow you to drag and drop content into a
website, so it’s very intuitive to use (click here to see our opinion on Weebly).
By using Weebly’s website building elements, you can literally drag them into your website and have a website
built relatively quickly, and painlessly. The beauty of this system is that you can pretty much drag the elements
to wherever you want – so it’s not very restrictive on where and how you place your website content.

Weebly’s elements include pictures, paragraphs, videos, buttons, maps, contact forms – basically all the basics
for website building.

4. Tumblr

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 26 OF


27
Immaculada Concepcion College
Of Soldier’s Hills Caloocan City, Inc.
Soldier’s Hills III Subd. Brgy. 180, Tala, North Caloocan City

Tumblr is a popular microblogging platform designed for creative self-expression. It is considered a mindful
alternative to Facebook and other social media websites where users blog on a myriad of topics.

You can link your Tumblr account to other social networks you use and you can feed your traditional blog or
other RSS feed to your Tumblelog. You can also create static pages such as your own Questions page that
people are automatically taken to when they ask you a question. If you want to make your Tumblelog look more
lie a traditional website, you can do it by adding pages. You can make your Tumblelog private or just make
specific posts private as needed, and you can schedule posts to publish in the future.
Tumblr is perfect for people who don’t need a full blog to publish lengthy posts. It’s also great for people who
prefer to publish quick multimedia posts, particularly from their mobile devices. Tumblr is also a great choice for
people who want to join a larger community. If a blog is too much or too big for you, but Twitter is too small or
too little for you and Instagram isn’t versatile enough for you, then Tumblr might be just right for you.
It’s also easy to invite other people to contribute to your Tumblelog.

If you want to track your stats, you can add any analytics tracking code to your Tumblelog. Some users will even
burn a feed with Feed burner, create custom themes, and use their own domain names

ALL RIGHTS RESERVED: IMMACULADA CONCEPCION COLLEGE EMPOWERMENT TECHNOLOGIES PAGE 27 OF


27

You might also like