Professional Documents
Culture Documents
Information and Communication Technologies (ICT) deals with the use of different communication
technologies such as mobile phones, telephones, internet, etc. to locate, save, send, and edit information.
Several international companies dub the Philippines as the “ICT Hub of Asia,” It is no secret that there is a
huge growth of ICT-related jobs around the country, one of which is the call center or BPO (Business Process
Outsourcing) centers.
According to the 2013 edition of Measuring the Information Society by the International Telecommunication
Union, there are 106.8 cell phones per 100 Filipinos in the year 2012. That would mean that for every 100 Filipinos
you meet, there is a high chance that they have a cell phone and approximately for the seven of them, they have
two.
In data gathered by the Annual Survey of Philippine Business and industries, NSO, in 2020, the ICT industry
shares 19.3% of the total employment population here in the Philippines.
To add to these statistics, Time Magazine’s “The Selfiest Cities around the World” of 2013 places two cities from
the Philippines in the top 1 and top 10 spots. The study was conducted using Instagram, a popular photo sharing
application.
Web 2.0 is a term coined by Darcy Di Nucci on January 1999. In her article titled “Fragmented Future” she wrote:
Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website
differently than others.
1. Folksonomy - allows users to categorize and classify arrange information user freely chosen keywords (e.g.
tagging). Uses tags that starts with pound sign (#). This is also referred to as hashtag.
4. Long Tail- services that are offered on demand rather than on a one time purchase. In a certain cases, time-
based pricing is better than file size-based pricing or vice versa.
5. Software as a Service-users will subscribe to a software only when needed rather than purchasing them. This is a
cheaper option if you do not always need to use a software. Software as service allows you to rent a software for a
minimal fee.
6. Mass Participation- diverse information sharing through universal web access. Since most user can use the
internet, Web 2.0’s content is based on people from various cultures.
The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The W3C standard
encourages web developers to include semantic content in their web pages.
According to the W3C, The Semantic Web provides a common framework that allows data to be shared and
reused across application, enterprise, and community boundaries. The aim of Web 3.0 is to have machines (or
servers) understand the user’s preferences to be able to deliver web content specifically targeting the user
1. Compatibility. HTML files and current web browsers could not support Web 3.0.
2. Security. The user's security is also in question since the machine is saving his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words "old" and "small" would depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user is
referring to at a given time.
Trends in ICT
1. Convergence
Technological convergence is the synergy of technological advancements to work on a similar goal or task.
Convergence is using several technologies to accomplish a task conveniently.
2. Social Media
Social media is a website, application, or online channel that enables web users to create, co-create,
discuss, modify, and exchange user-generated content.
Social Networks. These are sites that allow you to connect with other people with the same interests or
background.
Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources.
Social News. These are the sites that allow users to post their own news item or links to other news source. The
user can also comment on the post and comments may also be ranked.
Media Sharing. These are sites that allowed that allow you to upload and share media content like images,
music, and video.
Microblogging. These are sites that focus on short updates from the user.
Blogs and Forums. These website allow users to post their content. Other users are able to comment on the
said topic.
3. Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of
the devices capability to do tasks that were originally found in personal computers.
4. Assistive media
Assistive media is a non-profit service designed to help people who have visual and reading impairments. A
database of audio recordings is used to read to the use. You may visit http://www.assistivemedia.org/ for several of
their audio recordings.
The internet, truly, is a powerful tool. It can be used to promote business, gain new friends, in stay in touch with the
old ones. It is also a source of entertainment through games, online communities, and everything in between. But
like most things in this world, there is always the “other side of the coin”. The Internet is one of the most
dangerous places, especially if you do not know what you are doing with it. But there is no need to worry, it is never
that late. Hopefully, by the end of this lesson, you are able to consider how you go about your use of the Internet.
Let us go back to the “how safe are you” test. Let us visit each item and see how risky it is to share them.
Type of Information
First Name
Last name
Middle Name
Your address
Your birthday
The Internet is defined as the Information superhighway. This means that anyone has access to this highway, can
place information and can grab that information, Any Information, even things that you have set privately, can be
accessed one way or another. This is why social networking sites like Facebook continue to improve their security
features..
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions.
3. Check out the privacy policy page of a website to learn how the website handles the information you share.
4. Know the security features of the social networking site you use. By keeping you profile private, search
engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public network/Wi-Fi. Browsing in “incognito (or private) mode”, a feature of the
browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face to face.
8. Never post anything about a future vacation. It is similar to posting, “rob my house this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an anti-virus software on your computer. Use only one anti-virus software to avoid
conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer to peer downloads
(torrents) as the download is most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Internet Threats
Here are some of the threats you should be aware of when using the internet:
Here are things you might want to consider before posting something over the Internet:
1. Before you post something on the web, ask these questions to yourself: Would you want your parents or
grandparents to see it? Would you want your future boss to see it? Once you post something on the web,
you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious
responsibility.
3. Set your post to “private”. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down on
report it as inappropriate.
Copyright Infringement
If you create something—an idea, an invention, a form of literary work, or a research, you have the right as to
how it should be used by others. This is called intellectual propert.
Here are some tips that could help you avoid copyright infringement:
1. Understand, Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but it generally does NOT protect underlying ideas and facts.
2. Be responsible, Even if a material does not say that it is copyrighted, it is not a valid defense against
copyright.
3. Be creative, Ask yourself whether what you are making is something that came from you or something
made from somebody else’s creativity.
Know the law. There are some limitations to copyright laws. For instance in the Philippines, copyrights only last a
lifetime (of the author) plus 50 years. There are also provisions for “fair use” which means that an intellectual
property may be used without a consent as long as it is used in commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching and education.
Online Research
1. Have a question in mind. Focus on a question you want answered. If it is a series of questions, start with
one.
2. Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to determine the most
appropriate results for you.”
3. Advance Search. The best way to filter information you het from search engines is by using the advanced
search. This will allow you to filter out information you do not need.
Symbol Function
Finds web pages that contain all the terms that are preceded by the + symbol; allows you to
included terms that are usually ignored
““ Finds the exact words in a phrase
() Finds or excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases
NOT or - Excludes web pages that contain a term or phrase
OR or l Finds web pages that contain either of the terms of phrases
4. Look for credible source. Some wikis, though filled with updated information, are not a credible source.
This is due to the fact that anyone can edit its content. When using wikis, check out the link of the cited
text (indicated by superscript number) to be navigated to the footnote where the list of sources is located.
Click the source of the information and see if it is credible.
5 Give Credit. If you are going to use the information from a source for educational purposes, give credit to the
original author of the page or information.
Mail Merge and Label Generation In the professional world, sending out information to convey important
information is vital. Because of ICT, things are now sent much faster than the traditional newsletters or postal mail.
You can now use the Internet to send out information you need to share. What if we could still do things much
faster-an automated way of creating and sending uniform letters with different recipients? Would that not be more
convenient?
Mail Merge
One of the important reasons in using computers per se is its ability to do recurring tasks automatically. But
this ability has to be honed by learning the characteristics and features of the software you use with your computer.
After all, no matter how good or advance your computer and software may be, it can only be as good as the person
using it.
1. Form Document
Our sample letter above is what we call a form document—the first component of our mail merged
document. It is generally the document that contains the main body of the message we want to convey or send. The
main body of the message is the part of the form document that remains the same no matter whom you send it to
from among your list.
Label Generation
Included in the mail merge feature on Microsoft Word is the label Generator. It just makes sense that after
you print out your form letters, you will need to send it to individual recipients in an envelope with the matching
address printed directly on the envelope or on a mailing label to stick on. By using virtually, the same process as a
standard mail merge Microsoft Word will print individual addresses to a standard form that it has already pre-
formatted. Simply put, it creates a blank form document that simulates either a blank label or envelope of pre-
defined size and will use the data file that you selected to print the information, typically individual addresses. So
even in generating labels, the two essential components of creating a merged document are present the form
document and the data file. Only in this case, you did not have to type or create the form document yourself
because it was already created and pre-formatted in Microsoft Word. All you need to do is select the correct or
appropriate size for the label or envelope and select the data file that contains the addresses (data) to be printed.
You can also preview your merged labels before printing if you want to.
Now that we have learned the components needed to accomplish a successful mall merge, let us put
theory into practice. Let us take a look at the steps to create a simple mail merge document.
Madam Maria Santos XYZ Corp. 45 Oro Drive San Juan Metro Manila
… … … … … …
Open Microsoft* Word and start a new blank document. You can use the keyboard shortcut Ctrl+N after
1.
Microsoft* Word has been loaded or opened.
On the Mailings tab, from the Start Mail Merge group, choose Start Mail Merge →Letters.
2.
4. Insert the fields you need in the letter (Name, Company, Address Line 1, Address Line 2, Address Line 3, and Title).
You may want to make special markings on these fields as you are typing it. Most common marking you can do is by
typing it in capital letters or ALL CAPS so you can easily identify them later.
5. Save the main document once more. You can use Ctrl+S to quickly do this step.
6. On the Mailings tab in the Start Mail Merge group, choose Select Recipients→Type a New List.
7. Click the Customize Columns button on the dialog box for the New Address List.
8. Select a field that you do not need then click the Delete button. a confirmation dialog box appears.
9. Click Yes in the confirmation dialog box. The dialog box closes, and the unnecessary field disappears.
10. Repeat steps 8 and 9 for each field you do not need. After removing the excess fields, the next step is to add the
fields you need.
11. To add a field that you need in your document, click the Add button.
12. Type the field name on the prompt inside a small Add field dialog box and click the Ok button.
13. Repeat steps 11 and 12 for each new field you need in your main document.
14. Click the Ok button on the Customize Address List dialog box to confirm your changes.
15. The New Address List dialog box will appear again ready for you to type in your data.
16. Type the individual data from your list corresponding to Name, Company, Address, Line 1, Address Line 2,
Address Line 3, and title.
17. Press the Tab key each time to enter the next field.
18. To add a new record, press the Tab key after inputting the last field. When you press the Tab key on the last field
record, a new record is automatically created added on the next line.
19. Repeat steps 16 through 18 until you enter all the records you want.
Once you are done typing your data, click the Ok button on the Add New List dialog box to save your data. A
special Save Address List dialog box pops up, allowing you to save the recipient list.
20. Type a name for the address list. Name it “Client List”.
21. Click the Save button. You should be back on your main document soon after.
24. Choose the proper field to insert into your text. For example, if you are replace the text name in your document
with a name field, choose the Name Field for the Insert Merge Field menu, The field is inserted into your document
replaces ALL CAPS text.
25. Continue adding fields until the document is complete. Repeat after 22 through 24 as necessary to stick all fields
into your document.
27. Choose Finish & Merge to edit, print, or send your merged documents through email
28. Or you may want to choose Preview Result to check you work before you send it.
Integrating or inserting pictures in your documents is fun and it improve the impression of your document. A
common use of inserting a picture on a document is when you are creating your resume.
Kinds of Materials
There are various kinds of materials Microsoft Word is capable of integrating to make your documents richer, more
impressive, and more informative.
The screenshot above shows the kinds of materials that can be integrated or inserted in your Microsoft Word
document.
1. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in any local
storage device.
a. JPG. This is pronounced as “jay-peg,” and is the short form for .jpeg or Joint Photographic Experts
Group.
b. .GIF. This stands for Graphics Interchange Format. This type of image file is capable of displaying
transparencies.
c. .PNG. This is pronounced as "ping." It stands for Portable Network Graphics. It was built
around the capabilities of .GIF
2. Clip Art. This is generally a .GIF type; line art drawings or images used as generic representation
for ideas and objects that you might want to integrate in your document.
3. Shapes. These are printable objects or materials that you can integrate in your document
to allow you to have some tools to use for composing and
representing ideas or messages.
4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form
ideas that are organizational or structural in nature. If you want to graphically represent an
organization, process, relationships, or flow for info graphic documents, then you will find this
easy and handy to use.
5. Chart. Another type of material that you can integrate in your Word document that allows you
to represent data characteristics and trends. This is quite useful when you are preparing
reports that correlate and present data in a graphical manner. You can create charts that can
be integrated in your document either directly in Microsoft Word or imported from external
files like Microsoft Excel.
6. Screenshot. Sometimes, creating reports or manuals for training or procedures will require the
integration of a more realistic image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot. Microsoft Word even provides a
snipping tool for your screen shots so you can select and display only the part that you exactly
like to capture on your screen.
Image Placement
In practice, inserting an image or any other material in your document is quite easy especially if the
material already exists in your local storage device. It is just a matter of opening up the image file through the
Microsoft Word dialog box or wizard. Sometimes, if the image you would like to insert is on a web page currently
displayed on your screen, it could be copied and pasted. The real challenge is where to put the image you inserted
or where to move it. In this part of the lesson, we will study the different characteristics of text wrapping options
that you can use with the image you integrated in your document.
1. In Line with Text. This is the default setting for images that are inserted or integrated in your document. It
treats your image like a text font with the bottom side totally aligned with the text line. This setting is
usually used when you need to place your image at the beginning of a paragraph. When placed between
texts in a paragraph or sentence, it distorts the overall appearance and arrangement of the texts in the
paragraph because it will take up the space it needs vertically pushing whole lines of texts upward as in the
example below.
2. Square. This setting allows the image you inserted to be placed anywhere within the paragraph
with the text going around the image in a square pattern like a frame.
3. Tight. This is almost the same as the Square setting, but here the text “hugs” or conforms to the general
shape of the image. This allows you to get a more creative effect on your document. This setting can mostly
be achieved if you are using an image that supports transparency like a .GIF or PNG file.
4. Through. This setting allows the text on your document to flow even tighter, taking the contours and shape
of the image. Again, this can be best used with a .GIF or PNG type of image.
5. Top and Bottom. This setting pushes the texts away vertically to the top and bottom of the image so that
the image occupies a whole text line on its own as in the example.
6. Behind Text. This allows your image to be dragged and placed anywhere on your document but with all
texts floating in front of it. It effective makes your image look like a background.
7. In Front of Text. As it suggests, this setting allows your image to be placed right on top of the text as if your image
was dropped right on it. That means whatever part of the text you placed the image on, it will be covered by the
image. In our example below, notice the difference between using a PNG file (on the left) with a transparency effect,
and a JPG file on the right.