You are on page 1of 31

Week 1: The Current State of ICT

The Internet

As you may already know, the Internet or the World Wide Web is a massive digital network
that connects billions of electronic devices all over the planet. Today, there have been
numerous practical applications in business, education, health care, entertainment, and many
other fields. To have a better appreciation of the current state of the Internet, first, we have to
learn a few things about its history. From a historical point of view, the Internet can be divided
into generations. Each generation represents the combination of technologies, trends and ways
of thinking that drive the development of the Internet. For now, there are 3 recognizable
generations; Web 1.0, Web 2.0 and Web 3.0. It is important to note that these generations do
not necessarily represent periods of time.

It is true that Web 1.0 websites were prevalent during the late 90's and early 2000's but they did not
entirely disappear when Web 2.0 websites took over. Elements of an older generation can still exist in
the present and the future. Think of it like our society, which is composed by people from different
generations.

Web 1.0 - Web 1.0 is the name given to the first generation of the Internet. It is the time when most
websites were Static. Webpages are usually just single files in Hypertext Markup Language (html or
htm) format that are displayed in a web browser. Static websites Websites from the Web 1.0 generation
are mostly read-only or static. The main characteristic of a static web page is that they are delivered to
the users exactly as they are stored. This is because a static web page is only a single file, normally in
html or htm (Hypertext Markup Language) format, which is saved in a server. The contents of these
files can then be displayed in a user's web browser when its address is entered.

A great example of a static website from the Web 1.0 generation is the website for the 1996 movie
Space Jam. You can still view this website here:
- http://www.warnerbros.com/archive/spacejam/movie/jam.htm

Notice that this website can only display text and pictures. Its elements do not change unless its owner
or administrator updates it. It is also important to note the Uniform Resource Locator (URL) or address
of each web page in this website remains the same even if they are accessed by different people in
different locations.

Web 2.0 - Web 2.0 represents the second generation of the Internet. Unlike Web 1.0 where users are
merely audiences or readers who absorb information from websites, Web 2.0 focuses on user
participation. Web 2.0 emphasizes a give-and-take relationship between a website and its users. This is
accomplished by giving the users the power to share different types of information such as text, images,
sounds, and videos. This allows for the creation of interactive with more real-life uses like online
banking, online shopping, and media sharing.
Dynamic Websites - In contrast with static websites, dynamic websites can change their appearance
and behavior based on the users' actions. For example, let's take a look at google.com. Google search
is a dynamic website, which means that its URL changes depending on the users' location, credentials
and search parameters. It also recognizes different forms of user input like keywords, voice command,
and image upload.

Notice that the address is not in HTML format and it changes depending on what you searched for.
Social Media One of the biggest elements of Web 2.0, "social media" is a term used to define
applications and websites that people use to make online social interactions. These social interactions
include sharing information, sending messages and exchanging ideas.

Social media relies on users to contribute web contents. For example, Instagram lets their users upload,
manage and promote their own pictures. Facebook allows users to build their own profiles, share files,
and form online communities. These websites do not develop and publish their own web content.
Instead, they merely provide a platform for their users to do so. (Social media apps are used to connect
with other people and make interactions such as messaging, writing comments and sharing pictures and
videos)

Wiki - Derived from the Hawaiian word wikiwiki, which means "quick" or "super fast", a wiki is a
website that allows visitors to add or edit its contents. Each wiki page is about a single topic that is
presented in a manner similar to an encyclopedia or an educational article. Users with the proper
permissions can ed it these pages. To ensure quality, administrators can check these wikis and
determine if the information contributed by the users is correct and unbiased.
Wikis have become popular because of their simplicity and the huge amount of information that they
contain. As you may already know, Wikipedia is the world's largest and most popular wiki website.
The English Wikipedia alone has more than 5 million articles. Globally, there are more than 40 million
Wikipedia articles written in 293 languages.
- (source: en.wikipedia.org/wiki/Wikipedia:Size_comparisons)

Web 3.0 - Some people are already referring to the current generation of the Internet as Web 3.0. Web
3.0's main characteristics include, but are not limited to:

1. Real-time - Events and information are made available to users as they happen. Ex: Vibers
real-time video calling
2. Ubiquitous - Users are always connected to the Internet.
3. Machine learning - Computers and mobile devices can create data and make decisions based
on the user's previous actions. - These characteristics may sound familiar because we already
use them today. For example, Facebook recently released a live stream feature that allows users
to broadcast live events. Youtube can now suggest videos that you might like, based on the
videos that you previously watched
- Video lesson: https: //youtube/oZQd1c3YVuI
Web Applications - Web applications are internet-based programs that are accessed through web
browsers. Web applications represent the next step in the evolution of the Internet. Unlike earlier
websites with mostly read-only features and very little user interaction, modern websites offer many
different kinds of services to clients. This opened new opportunities in entertainment, business and
learning. Most of the websites that we use today are web applications. They allow us to do more than
just reading text on a screen. Youtube, for example, is a web application that is used to upload and
watch videos. Ebay and other online shopping websites are virtual marketplaces where people can buy
and sell items. Social media and Wikis, which will be further discussed in this chapter, are also web
applications.

Web Apps vs Native Apps - Native applications are programs that are directly installed in a computer
or mobile device. Unlike web apps that are accessed through web browsers, native apps can be run
independently in the computer or device that they are installed in. Here are some examples of popular
native apps and their web app counterparts:

Some developers provide both native and web-based versions of their apps. The last 2 examples,
Spotify and Facebook can both be installed in mobile apps or accessed through Internet browsers.

Fast facts: The mobile apps in your phone are native apps because they are installed to your phone.
Facebook games that are played in computers are web-based apps because they can only be accessed
using web browsers

Cloud Computing - Video lesson: https://youtu.be/ae_DKNwK_ms


Cloud computing is the name given to Internet-based networks that are used to store, manage, and
share resources and information. To better understand this concept, first we need to learn some new
terms:
Server, client, and service - A server is a computer that does tasks for other computers. A task that is
done by a server is called a service. The computer that accesses the services that are provided by a
server is called a client.
For example, in a Local Area Network (LAN), a print server tells a printer to print documents that are
sent by client computers. The clients don't have direct access to the printer. Instead, they connect to the
server, which then tells the printer to print the documents.

The cloud - First of all, "the cloud" is not an actual cloud. The cloud is a network of servers that
provide different services. For example, one server may be tasked to collect information from other
servers that are tasked to store them. All these servers work together to provide one unified service to
the client. To get an idea of how big these networks are; Google is estimated to have over 1 million
servers. These servers are housed in centralized locations called data centers located in seven countries.
(source: www.google.com/about/datacenters/inside/locations)

Many cloud-based services can be used for free and you may already be using some of them for free
without knowing it. The most common examples are social media platforms like Facebook, Twitter,
and Instagram. There are also cloud-based services that were created for more serious purposes like
business and project management. These services are commonly offered in a paid subscription basis.
Businesses and organizations have to pay certain amounts to gain access to these services for a certain
period of time.

Benefits of Cloud Computing

1. Reduced Cost - Subscribing to cloud-based services is a lot cheaper than traditional options
such as building your own programs, buying your own hardware, and hiring more people.
2. Flexibility - Cloud-based services can be upgraded or downgraded to suit the clients' need.
Subscribers can upgrade their subscriptions to gain access to bigger data storage, more
powerful tools, and exclusive features. On the other hand, subscribers on a tight budget can
downgrade their subscriptions to reduce their expenses but still get the necessary services.
3. Mobility - Because cloud-based services rely on the Internet, clients can access them using
computers and mobile devices in different locations. For example, an employee can save his
work in the cloud and access it at home or on vacation.
4. Better Collaboration - The cloud enables people in different location to work on the same
project. A multi-national team can communicate and share information and resources with one
another using cloud based services.
5. Updated Software - Providers of cloud-based services compete with each other in delivering
the best services to clients. Because of this, cloud-based apps are constantly improved and these
improvements are immediately made available to the clients.
Week 2: Online Safety and Security

Information Security

We usually need to submit some personal information in order to gain access to online sites and
services. These personal details are often required to secure our online activities and
transactions. However, in the wrong hands, our personal information can be used to cause
inconvenience, loss or even harm to us and other people. Here are some of the most commonly
shared personal details, how they can be used in dishonest and malicious ways and what you
can do to secure them.

Full Name - Almost every app and website with a log-in feature require your full name. Most of the
time, they just ask for it to determine how to properly address you in emails and personal messages.
Some sites, like Facebook, use it to label your account and online interactions.

● What's the risk? - Your name is probably the most widely known detail about you but it can
still be used in the simplest forms of identity theft. Anyone can use your full name to sign up
and create a fake account. This account can then be used in ways that may put you in trouble
like posting malicious content or leaving rude comments.

● What can I do? - Just like in the real world, you should always be careful of whom you tell
your name to. Online, you can refrain from using your full name especially in apps and sites
where they are not really required.

Username - A username is an alias that represents your online presence. It can be your real name or
combinations that totally depend on your creativity. Some apps and websites address you by your
username instead of your full name. In many cases, your username, along with your password are all
that is needed to log in to your account

What's the risk? - On the Internet, your username is as good as your actual name. Therefore, anyone
who knows it can start looking for you or sometimes even contact you. What can I do? Like your real
name, do not readily give out your username, especially with people that you don't trust. As a
precaution, you can select usernames that do not include your real name.

Password - The password is one of the most important bits of information on the Internet. A password
is a combination of characters that can unlock your account, when paired with your username or email
address, can unlock your user account. For this reason, website and app owners have many ways to
keep your password secure.

● What's the risk? - For obvious reasons, hackers take special interest in people's passwords.
People tend to use similar if not identical passwords for their online accounts so figuring out the
password to one account may also compromise the others.

● What can I do? - There are several steps that you can do to keep your passwords secure:

1. Do not share your password with ANYONE.


2. Memorize your password. Do not write it down anywhere
3. Do not use obvious passwords like important dates or names of you or your loved ones.
4. Use combinations of uppercase letters, lowercase letters, numbers and special characters.
Some websites require this but it's a good practice to do so even if it's not.
- Tip: To prevent yourself from forgetting your password, use phrases that are easy for
you to remember but hard for others to guess like lines from a song or movies or
phrases that have personal meaning to you.
5. Do not use the same passwords for different accounts.
- Tip: More specifically, do not use the same passwords for apps that are used for leisure
(Facebook, Instagram) and apps that are used for financial transactions (Paypal, eBay,
online banking)
6. Change your passwords periodically
7. Do not save your password when using public computers or other people's device.
- Tip: Web browsers commonly give you the option to save your password when you
first log in to some websites. This feature may be convenient when using your own
computer or mobile device but it can be dangerous if you accidentally save your
password in someone else's computer or device especially if it is in a public place like a
library or a computer shop.

Birth Date - Birth dates are mostly required to determine if you are old enough to access certain
contents and features on the Internet. Sometimes, it is also used in security checks to determine if it is
indeed the rightful owner who is accessing the account since birth dates are not usually widely known.

● What's the risk? - The birth date, along with other personal details can be used to pass
security checks and hack personal accounts.

● What can I do? - For your own protection, observe the age restrictions of online content.
Websites are required by law to add warnings to age-sensitive content but it is still up to the
users to choose whether or not to view them.

Home Address and Locations - Some online services ask for users' home address. Some apps can
automatically determine your current location using your device's GPS (Global Positioning System)
feature. They do this in order to give you location-specific contents and options. For example,
YouTube determines the user's location and suggests videos that are relevant to that area.

● What's the risk? - Carelessly sharing your location or home address can ultimately compromise
your physical security because it will tell potential criminals where you are. Also, because it is
usually required information in online commerce like online shopping, your home address can
be used in identity theft.

● What can 1do? - Always check if a website or app requires you to submit your address or allow
them to automatically track you. If it is required, then check the settings if you can hide your
address and current location from other users. If it is not required, then don't submit it at all.

Phone Numbers - Phone numbers are usually required by many online services in order to have a
direct line to their clients.

● What's the risk? - Home phone and mobile numbers should not be shared carelessly since
anyone who has your phone number has a direct way to harass, threaten, or inconvenience you.

● What can I do? - Because of the sensitivity of this information, very few apps and websites
insist on getting your phone number. Do not submit your phone number unless it is absolutely
necessary.

Email Address - Almost every website that has a sign-up feature requires an email address to confirm
the user's identity.

● What's the risk? - Like phone numbers, your email address is a direct link to you. The
practicality and versatility of emails make it the most used and abused method of
communication on the Internet. The most common forms of Internet fraud such as spamming
and phishing (to be discussed later in this chapter) are done through emails.

● What can I do? - You can create multiple email addresses. You can have a dedicated email
address for leisure purposes like online gaming and social media. This email can then be shared
and used to sign up to apps and websites. On the other hand, you can create another one for
formal use like job applications and schoolwork.

Financial information - This includes bank account names, account numbers, credit card numbers and
security details like pin codes and answers to security questions. These details, especially the credit
card number, are used in online commerce.

● What's the risk? - These details can be used to access your financial accounts. Therefore,
anyone who has this information can spend or take the contents of your bank account or make
purchases that will be charged to you.
● What can I do? - Treat this information with the same care as you do with your money
because they are as valuable as your money. Don't do online financial transactions with
suspicious looking websites and merchants. Do a background check to make sure that the
person or website that you are dealing with is legitimate.

Malware: Online Threats - These are some of the most common types of malicious software or
Malware. Keep in mind that while all of them can spread through the Internet, some of them also
spread through offline means such as flash drives and local area networks (LAN)

1. Virus - A virus is a program designed to interfere with your computer, device or network's
normal operation. A virus attaches itself in a program or a file and like real-life viruses,
computer viruses can multiply or make complete copies of themselves when you copy the
program or file that it is attached to.
● What can they do? - Because a virus is a program, it can be programmed to do different sorts
of harm to your system. It can slow down your device or computer or network's speed by
running unwanted processes or it can fill your computer's memory with unwanted files. In the
worst cases, a virus can overload servers and cause entire networks to shut down.
● How do they spread? - A computer virus can spread whenever a computer makes contact with
another computer. It can spread in a network like LAN or the Internet or through indirect
means like infecting a flash drive or a DVD. Keep in mind that a virus relies on human action
to spread. It is, therefore, possible to have a virus in your computer and still be uninfected
unless you open the file or program that it is attached to.

2. Worm - A worm is considered as a type of virus. Like a virus, it can make copies of itself in
computers that it comes in contact with.
● What can they do? - Like a virus, a worm can harm your system in different ways which can
range from minor annoyances like hiding your icons or major damage like destroying your files
or causing your computer to shut down on its own.
● How do they spread? - The main difference between viruses and worms is that worms don't
rely on human action to propagate. A worm will automatically spread and copy itself.

3. Trojan - A Trojan Horse or simply a Trojan is a type of malware that disguises itself as a
useful and/or harmless program or file. Named after the fictional wooden horse used by the
Greeks to defeat Troy, a Trojan's goal is to get through your computer's security features and
cause harm once it's in.
● What can they do? - Like a virus, a Trojan can damage your computer or system in different
ways, which include but are not limited to deleting, copying and altering files. It can also cause
harm slowing down system performance.
● How do they spread? - Unlike worms, Trojans cannot create copies of themselves. Instead,
they pose as harmless files or programs such as pictures or videos and rely on people to send,
copy, and download them.
4. Spam - spam is where unwanted, suspicious and unsolicited messages/email go.
● What can they do? Spam emails are usually just promotions to sites and services. Though not
normally harmful, large amounts of spam emails are annoying and can use up your memory
space. It is not uncommon to have hundreds or even thousands of spam in your email address.
In the worst of cases, viruses can also be attached to spam emails.
● How do they spread? People who spread spam or Spammers collect emails using several
methods. The easiest way is to simply guess email addresses through this process can be
automated using programs. They can use programs that search web pages for email addresses
or by hacking mailing lists. It is also known that some dishonest website owners sell list of their
subscribers' emails to spammers.

5. Adware - An adware is a type of malware that launches unwanted advertisements in your


Internet browser or your desktop.
● What can they do? - Other than being majorly bothersome, adware programs can cause your
system to slow down because they initialize automatically and remain running in the
background.
● How do they spread? - Adwares are usually included in the installers of other programs or
browser add-ons. Installing these programs and add ons will also cause the adware to be
installed.

6. Phishing - Derived from the word "fishing", phishing is the fraudulent practice of stealing
important information from users such as passwords pin codes and credit card numbers.

● What can they do? - Information stolen via phishing can be used in identity theft and stealing
money. For example, someone can use stolen credit card details for purchasing items, which
will then be charged to the real account holder.
● How do they spread? - Phishing is done by tricking people into submitting their personal
details. It can be done by sending emails and offers that imitate legitimate businesses like banks
and credible websites.

How to Avoid Malware - The risk of falling victim to malware will always be present as long as
mankind uses interconnected digital devices. However, there are precautions that can be taken to
minimize this risk.
1. Install an antivirus program - An anti-virus program can detect and delete virus in your
computer. It can also block malware before they infect your system. Many trusted anti-virus
companies give out free versions of their products. Try them and find one that suits your needs.
2. Do not submit your email address to suspicious looking websites You don't have to sign up
every time you are asked to. To avoid getting spam, weigh the benefits of signing up against
the risk of compromising your email address.
3. Don't fall for obvious tricks Fake prizes are probably the bread and butter of online scams.
When you receive an email or see a pop-up that says you've won something, you can almost
always be sure that it's not true. As a rule, do not believe any one who tells you that you won a
prize for a contest that you didn't join.
4. Don't Open spam emails - Spam emails are normally obvious. Delete these emails immediately
and block the sender.
5. Do not click suspicious looking links If you see a link that promises a prize or offers something
that is too good to be true, like a free iPad or ways to get free Internet access, it may direct you
to a website that has malware. As a rule, do not trust any ad or message that says you've won
something in a contest that you did not join.
6. Read before you install. Sometimes even legitimate and useful programs come with unwanted
"freebies". These so-called freebies are often small programs that may alter your computer's
settings or automatically subscribe you to unwanted services and newsletters. Read through the
installation steps to see if another program will be installed. There is usually an option to leave
out the freebies and install only the main program.
7. Do not download pirated contents - Because pirated files and software are unregulated, they
tend to be a breeding ground for malware. Also, piracy is against the law. (is harmful because
it denies the rightful owners the proper compensation/payment for their work.)
8. Install an ad-blocker Ad-blockers are browser add-ons that prevent ads from being displayed in
your browser. Most ad-blockers are free.
Week 4: Netiquette

What is Netiquette? - Netiquette, which is short for "Network Etiquette", is the name given to the set
of rules and guidelines about how to properly behave online. (Netiquette is considered formal if it is
strictly upheld in an online community)

Formal Netiquette

Netiquette can be formal or informal. Formal Netiquette involves a strict set of rules that are
imposed by online groups like message boards, chat rooms and social media sites. The most
common rules imposed in online communities are intended to prevent actions and practices that
are disruptive or harmful to other users and the community in general. The following are
examples of such actions:

1. Foul language - This is a common rule in formal settings such as corporate and academic
websites. Like in real life, foul language is frowned upon in such environments. (cursing)
2. Spamming - As we learned in the previous chapter, a spam is an unwanted and unsolicited
message or email. Spamming is banned in most chat rooms and forums because it takes up a lot
of space and is annoying to other users.
3. Bullying - Recently, a lot of attention has been given to the act of bullying and how to prevent
it. Bullying is the use of strength or power to intimidate someone into doing something that he
does not want or to make him feel bad. Cyberbullying is bullying that is done using electronic
technology. Ex: (The use of strength or power to intimidate someone into doing something that
he does not want or to make him feel bad)
4. Trolling - A troll is an unruly member who deliberately breaks the rules of an online
community. The most common acts of trolls include posting inappropriate or banned contents,
posting off topic messages, and leaving sarcastic comments. These actions are intended to
disrupt the normal operation of online communities. Ex: Someone keeps posting cat pictures in
a forum about car maintenance
5. Sock puppets - "Sock puppets" is the term used to refer to multiple accounts that are used by
the same person. Trolls use sock puppet accounts to pose as different persons in order to
advance their agendas. Ex: A politician employs persons who create multiple accounts to create
posts and comments maligning his political rivals.
6. Flame Wars - Online discussions or "threads" may get out of hand when the users who
disagree with each other start getting emotional. They may then post insults or threats against
each other. This incident is called a "Flame war." Flame wars are harmful to online
communities because they cause a decline in the quality of the topics that are being discussed. If
allowed to persist, this may destroy the integrity of the group as a whole. Breaking these rules
may result in a warning from website or group administrators. An administrator or admin is a
member who is tasked with monitoring activity and imposing the rules.
7. usually have the power to "kick" or revoke the membership of users who break the rules and to
delete posts that are deemed inappropriate. Ex: (Supporters of two opposing candidates always
have an heated war, to the point that they throw insults to each other)

Plagiarism - Plagiarism is the practice of using someone else's work as if it is yours. It is quite
common on the Internet because online information is easy to locate and copy. In most cases, it occurs
when someone uses a quote or a part of a published work without mentioning who originally wrote it
and which publication it belongs to. Plagiarism is considered as a fraudulent act and can be punishable
by law.
Piracy - Piracy is the act of reproducing and distributing materials without the owner's consent. It is
harmful because it denies the rightful owners the proper compensation for their work. Ultimately,
rampant piracy can cause a stop in the production of original works because owners and publishers will
no longer have enough income to fund future projects. Here are the most common types of piracy of
copyright-protected materials based on UNESCO's World Anti-Piracy Observatory
(http://portal.unesco.org)

● Books
"Any unauthorized use of a copyrighted work, such as a book, school manual, journal article or sheet
music, represents an infringement of copyright or a case of copyright piracy, unless covered by a
copyright exception. Piracy of printed works affects both paper copies and works in digital format."

● Music
"Music piracy includes both traditional unlawful use of music and unauthorized use of music on on-line
communication networks."
- Bootlegging is the unauthorized recording and distribution of a live or broadcast performance. Ex:
Unauthorized copies of Adobe Photoshop are available for free download in a website
- Counterfeiting is the unauthorized copying of the material support, labels, artwork and packaging"

● Film
Movies and TV shows are pirated either physically, by making and selling hard copies or virtually, by
distributing unlicensed copies online. Making copyrighted materials available for online viewing or
streaming without the owner's permission is also an act of piracy.

● Software
Commercial software such as productivity tools and games are also counterfeited by making and selling
physical copies such as DVDs but the most common form of software piracy is still unauthorized online
redistribution. Ex: Unauthorized copies of Adobe Photoshop are available for free download in a
website

Copyright

All the forms of piracy mentioned above are violations of copyright. Copyright is the legal right
to own an original work. Copyright laws may differ in every country but in all cases, they
govern the use and distributions of original works such as music, film, literature and drawings.
In the Philippines, the REPUBLIC ACT NO. 8293, also known as the Intellectual Property
Code of the Philippines or IP Code, protects intellectual property. The IP Code lists 15 types of
works that are covered by copyright protection. This includes books, musical compositions,
drawings, and photographic works. (Source: ipophil.gov.ph)

Informal Netiquette - Informal Netiquette is a lot like real-world etiquette. These are guidelines that
may not be imposed by law but are expected to be followed by everyone. Many real-life etiquettes
apply online. They are usually simple common-sense actions that make social interaction pleasant for
everyone involved.

Here are some of the most useful netiquettes that we can follow.
1. The Golden Rule "Do unto others as you would have them do unto you." This saying seems to
apply in any form of human interaction. Even on the Internet, it is still a good practice to treat
others with the same fairness and respect that we expect to receive.

2. Act as you would in real life. It is easy to be disrespectful online because there is no threat of
physical confrontation. Acting as if you are talking face to face with the other person will keep
you grounded and level headed in your online interactions.

3. Know where you are and act accordingly. Like in real-life, our online conduct may vary from
place to place. Most online environments like social media and recreational forums tend to be
casual. In these environments, informal speech and some teasing are considered normal.
However, there are also formal environments like government portals and university websites.
In these settings, be sure to use proper language and act courteously.

4. Respect people's privacy. Privacy is probably a bigger deal in the Internet than it is in the real
world mainly because it is easier to invade someone's privacy online. Avoid communicating
with people in ways that are intrusive or overly demanding.

5. Respect other people's properties - The Internet is a freeway of information but information is
not always free. Many online contents like music, videos and writings are regarded as
intellectual properties of their creators. Like real-world properties, there are rules that govern
the use, sharing and reproduction of these contents. Illegally copying or taking credit for
someone else's intellectual property is against the law.

Mobile Device Etiquette


Mobile devices such as smartphones and tablets have become parts of our daily lives. These
handy gadgets have many useful features such as Internet access, playing music, videos and
games, taking pictures and videos and of course making and receiving calls and texts. Their
compact and lightweight designs enable us to use them practically anywhere. Mobile devices
have certainly improved modern living.

However, using mobile devices also has negative effects. Listed below are the practices that may lead
to these negative effects and how we can minimize or eliminate them:

1. Talking too loudly on your phone If you talk too loudly on your phone in public places like
buses, streets, and restaurants, you may be disturbing the people around you.
● The solution: Speak softly. If the line is choppy and if the other part can't properly hear you,
use other means of communication like texting or email instead of raising your voice.

2. Making long phone calls Like raising your voice in public, talking too much on your phone can
also be annoying to people who overhear your conversation. It can also be bothersome to the
person you are talking to.
● The solution: Keep your phone calls short and concise. Avoid small talk and gossiping When
making or taking calls in public places

3. Putting the other party on a loud speaker Although it is sometimes necessary when you can't
properly hear the other party, putting him or her on speakerphone adds more unwelcomed
sounds to your conversation. Others also often see it as vulgar and impolite.
● The solution: Earphones. Most mobile devices come with free earphones. Use one if you have
trouble hearing the person you are talking to.

4. Using loud or annoying ringtones /notification sounds While it is important to be notified when
someone calls or sends you a message, phone rings can sometimes be unnecessarily loud. Also,
people sometimes use notification sounds that can be irritating or even unsettling to others such
as animal sounds, sirens or even gunshots.
● The solution: Normally, less than half of your phone's full volume is enough to hear it ring
through your pocket or bag. If you put it in your pocket most of the time, just set it to vibrate.

5. Playing music, videos, and games too loudly We usually do these things to pass time and
entertain ourselves in public places. However, it may cause frustration to the people around you
if you play music or watch videos in full volume. Sound effects of games tend to be sharp and
surprising and can therefore be irritating to others.
● The solution: Again, ear phones will do the trick. Plug in and enjoy your music, videos, or
games in private
.
6. Taking pictures or videos of live performances is a bad idea for 3 reasons. First, because you
usually have to raise your phone above your head to get a good shot of the performance, you
may be blocking the view of the people behind you. Secondly, some artists do not want people
to take unauthorized pictures of their shows. Lastly, focusing on capturing the moment on
camera will cause you to miss the enjoyment of watching it live without distractions.
● The solution: If you really want to take a video or a picture of a show, keep it short and subtle.
Make sure that doing so does not spoil the experience for you and others.

7. Using your phone in cinemas The light coming out of your device is intrusive and bothersome
to the other members of the audience. More importantly, using your phone in a movie theater
may give the impression that you are taking a video of the movie, which is against the law.
● The solution: Refrain from using your phone inside movie theaters. Most of all do not take
pictures and videos of the movie being shown.

8. Taking pictures and videos without asking permission, taking pictures and videos of other
people and their properties such as vehicles and pets may not be against the law but it can be
seen as unethical and rude.
● The solution: As a sign of respect, always ask for permission before taking pictures of people
and their property.

9. Using your mobile device while waiting in line Though this is not always a bad thing to do,
staring at your phone while queuing can be distracting and may cause you to hold up the line
and be an inconvenience to others.
● The solution: It is okay to use your phone while waiting in line but make sure to stay alert so
you can readily react to people and things around you.

10. Using your mobile device while driving Not only is it dangerous for obvious reasons, it is also
illegal.
● The solution: Don t do it.

11. Using your mobile device while walking Like when driving, looking at your mobile device
while walking will certainly cause you to bump into people or get hit by traffic. It may also
cause you to walk slower and get in the way of other people
● The solution: Avoid doing this as much as you can. If you absolutely have to check your phone
while walking in a crowded place, stop in a place where you won't get in the way of people or
traffic.

12. Wearing earphones/headphones while walking. This may seem like a common and harmless
thing to do but the sound coming from your earphones can impede your ability to hear and act
on signs of danger such as car horns, and machinery and traffic sounds.
● The solution: When walking in streets, sidewalks, and other crowded places, avoid using
earphones that completely block your hearing.
13. Using your mobile device in social gatherings and important events Using your phone or tablet
for extended periods of time while in situations like group lunches, ceremonies and class
discussions is considered rude and inconsiderate because of two main reasons. The first reason
is that it takes your attention away from the conversation or discussion. Secondly, it gives the
impression that you are not interested in the event and the people involved.
● The solution: Excuse yourself and step away from the event or gathering it you have to check
your phone. In more formal settings like meetings and classrooms, always ask for permission
when you have to answer calls or check your phone.

Week 5: Online Search

The need to locate electronic information has been around since the invention of electronic
computing. After the Internet was made available to the public in 1990, this need started to
become bigger as the amount of information available online increased. Today, in what is being
called The Information Age, the ability to search for information in the Internet has become one
of the most useful skills.

Web Search Engines

The majority of online searches today are done using web search engines. A web search engine
is a single program or a system of programs designed to look for information on the
Internetbased on the user's search requirements. The most popular examples of web search
engines are Google, Bing, Yahoo and Ask. In this chapter we will be exploring Google,
currently the most popular search engine which hosts 69.89% of all online searches as of May
2016 (source: netmarketshare.com) (A web search engine can be accessed using Internet
browsers)

Basic Search - The most common way of making a web search is by using keywords. To start
searching using Google, go to google.com using your web browser. You will be taken to Google's
main page, which varies from country to country. In the Philippines, for example, it is google.comph

Another way to start an online search is to use your web browser's search feature. Popular browsers
have a search feature in which they connect to a particular search engine whenever the user types
keywords in their address bar or search bar. You will have to go to your browser's settings in order to
choose which search engine your browser connects to. Here are the most commonly used web browsers
and how to use their search features.

Google Chrome - For obvious reasons, Google Chrome connects to Google Search by default. To do a
web search:
1. Open Google Chrome
2. Type a keyword in the Address Bar (You can make an online search by entering your
keywords in the browser's address bar)
3. Next, you can either: a Press the Enter button OR b Click one of the suggestions that appear
below your keyword(s) (when you are typing your keyword in the address bar or the search
bar, several suggestions may appear below it)
4. You will be directed to the Google search results page. From there you can choose from several
search results.
● Tip: Most mouse wheels can be pressed just like a button. Clicking on a search result using the
mouse wheel will open the link in a new tab. Do this to open several results at once.

Mozilla Firefox - You can search using Mozilla Firefox by entering your keyword in either the address
bar or the search bar (located in the upper right side right beside the address bar)

If using the address bar:


1. Type your search keyword (s) in the address bar
2. Press the Enter button

If using the search bar:


1. Type your search keyword (s) in the search bar
2. You can either: a. Press the Enter button b. Click the arrow button beside the text box c. Click
one of the suggestions that appear below your keyword(s)

Safari - Apple's Safari web browser's address bar also doubles as the search bar. Simply type your
search keywords) in the address bar and press Enter or click one of the suggested results.

Tips on conducting online research


(Source RBS Empowerment Technologies, First Edition 2016)

1. Have a question in mind.


First of all, think of a question and make it your goal to find the answer to it. You do not necessarily
have to type the whole question in the search engine. Just keep your question in mind as a guide to your
search.

2. Narrow it down.
Keep your queries specific. For example, if you are searching for instructions on how to use Adobe
Photoshop, you can type "adobe photoshop instructions" or "how to photoshop" otherwise, if you just
search for "photoshop", you will end up with a wide range of results such as sites selling the software,
its official website and its social media accounts.

3. Advanced Search
The most popular search engines such as Yahoo, Bing and Google have advanced search features in
which you can make complex searches. Using advanced search, you can use multiple keywords and
entire phrases and narrow down your search by selecting language, region, date, and file type. (Most
web search engines have an an advanced search feature which can be used to make complex web
searches)

Google Advanced Search - To use Google's advanced search feature:


● Go To The web address. Website: https://www.google.com/advanced _search Images:
http://www.google.com/advanced_image_search
● Enter your search terms in the "Find pages with..." section.
● Use the filters in the "Then narrow your results by..." section.
● Click the Advanced Search button (Advanced search can be used if you want to search for
information published in a specific year.)

4. Look for a credible source.


It is important to determine whether the source of the information is credible or not. Because the
Internet is the biggest source of information in the world, some of this information is not always
accurate or updated.

● Here are some factors to consider:

a. The author. Does the article say who the authoris? If so, you can do a little background check
on him/her to know if he/she is a credible writer.
b. The authors purpose. Why was the article written? Was it written to share information or does
it have a different agenda? Some articles may have been written as a promotion for a product or
service. For example, an article may look like a guide on how to repair your computer but is
actually promotional material for a store that sells computer parts. Look for signs of
commercial interest such as mentioning brand names or recommending specific products.
c. Publication date. Knowing the article's publication date is important especially if you are
searching for fast-changing matters such as statistics, technology, and current events. An old
article may have been accurate back when it was published but it may already be outdated by
time you read it. (article length is not part of a source’s credibility)
d. Top-level domain. The TLD is a segment of the domain name. Identifying it can give you a lot
about the website that you are visiting.

Here are the most common TLDs:

● .com - Derived from the word commercial, com was initially created for business entities.
Today, it is the most common TLD and can be used by anyone. (including businesses)
● Can I trust it? Because com websites are the most common in the Internet, it falls on you, the
user, to determine whether the information found in these sites can be trusted. (most common)
● .net - From the word network, net was originally intended for networks such as internet service
providers. This restriction was not strictly enforced and net became a common TLD but it is
still preferred by network-related entities.
● Can I trust it? Like.com, net websites can now be purchased and used by anyone. Exercise
caution when using information from these sites.

● .org - Short for organization, this TLD was intended for non-profit entities such as online
communities, open-source (non-commercial) projects and non-profit organizations.
● Can I trust it? The Org domain is popular among non profit organizations so it can be a good
source of non-commercial information. However, being an org website does not guarantee
information integrity or quality.

Wikipedia, the most popular.org website, is an open-source encyclopedia. This means that the
information in this website can be edited by anyone. While Wikipedia is still a good source of general
information, it is not normally accepted as a valid source for formal and important matters such as
school, science and health. However, Wikipedia and other open-source websites usually provide a list
of references at the end of their articles. Explore these lists to see if the articles have reliable sources.

● .gov - Derived from government, gov is restricted to government entities.


● Can I trust it? Yes. (most reliable) These websites are good sources of information because
they are from government institutions that oversee their particular fields. For example,
http://www.doh.gov.ph/ is the official website of the Department of Health which oversees all
the matters of public health in the country. Websites like these are a great source of official
information such as policies, bulletins, and advisories. (not used by many websites)

● .info - The name for this TLD is derived from the word information. However, it is similar
to.com and net in the sense that it can be used by anyone
● Can I trust it? Although the name itself sounds official and trustworthy, info websites are not
guaranteed to provide credible information. Exercise the same caution as you do for.com and
net websites when searching these sites for information.

● .edu - Derived from the word education, this TLD is reserved for education-related institutions.
● Can I trust it? Websites that use edu domains are almost always the official websites of the
educational institutions that they represent. They are a good source of official information about
these schools and universities.

5. Give credit
Giving credit to the source of the information that you use is important because of these particular
reasons:
● To avoid plagiarism
● It gives credibility to the information
● It is a sign of respect to the author

To properly cite an online source, you have to mention the following:


● The name of the author or the organization that owns that article(name of the researcher is not
included)
● The title of the article
● The article's address or URL
● Date When you last viewed the article

Week 7: Applied Productivity Tools

Paperwork is something that we all have to deal with at least once in our lives. Lists, letters,
bookkeeping, accounting: these tasks may not be considered enjoyable but someone has to do
them and sometimes, that someone happens to be you. Fortunately, today, we rarely have to do
these things manually. For decades now, we've been using computers to do tasks that would
take a lot longer if done by hand. In this chapter we will be learning how to do some of these
tasks using programs called productivity tools.

Productivity software or productivity tools are programs that are used to create new information such as
text documents, charts, graphs, tables and presentations. Here are some of the most commonly used
types of productivity tools:

1. Word Processor - A word processor is a program that is used to create, view, edit, and print
documents. Think of it as a digital version of a typewriter.
2. Spreadsheet - A spreadsheet is an application tool that stores, organizes, and calculates data in
tables. They are primarily used in recordkeeping tasks and accounting.
3. Presentation program - As the name implies, a presentation program is used to design
presentations in the form of slide shows.
4. Database management system (DBMS) - A DBMS is a software tool for creating, editing, and
managing collections of information called databases.
5. Graphics suite - A graphics suite is a group of programs that are used to view, manipulate, and
print computer graphics. Popular examples are Corel and Adobe, which includes Photoshop.
These productivity tools and others like them normally come in software bundles called office
productivity suites. The idea is to make the most commonly used productivity tools available to
the public as a single product with uniform designs and controls so they are easier to purchase,
learn and use. Because they come in a suite, these productivity tools can be installed all at once,
Ex: creating a tarpaulin and invitations

LibreOffice - In this chapter, we will be using LibreOffice, an open-source office productivity suite.
Open-source means it was developed through the collaboration of a public community of developers and
can be altered, improved, and distributed by anyone. Open source programs like LibreOffice are
usually non-commercial and free to use.
● Download and Installation
● Source: www.libreoffice.org/get-help/install-howto/windows
● To download LibreOffice, go to their official website in libreoffice.org and look for the
download link For personal use, download LibreOffice Fresh, the LibreOffice version that has
the latest features.

Once the installer has been downloaded, double-click it to start the installation process. During
installation, you will be given options to customize LibreOffice to fit your needs. You can choose
which features you want to install, what language the applications will use, etc. For a step-by step
guide, follow the instructions here: www.libreoffice.org/get-help/install-
howto/windows

Mail Merge - Now that you have LibreOffice installed and ready to use, it's time to learn some tasks
that we can do with it. First off we will learn about mail merge. Mail merge is the process of adding
information from a database to a document.

Mail merge can be used to create documents that have pretty much the same content but have different
specific details. For example, if you have to send letters with the same message to different people, you
can use mail merge to collect the names of the recipients from a list and create a letter for each of them.
This is a lot easier then having to copy the letter over and over again and typing the names one by one.

For this lesson, we will be using mail merge to create ID cards. Imagine that your school org is
organizing a convention, which will be attended by hundreds students from different campuses. To
avoid awkward introduction, you've been tasked to create ID cards for each attendee. Each ID card will
have the person's name, nickname, school, organization and position. Now remember, we're expecting
hundreds of people so we can't just type each ID one by one.

The document - The first thing that we have to do is design the ID card. We will be doing this using
LibreOffice Writer, LibreOffice's word processor application. To access Writer and other LibreOffice
productivity tools, open LibreOffice on your desktop or Start Menu. You will see the home screen with
a list of actions and tools on the left side.

Click Writer Document. This will open a blank text document. Notice that it looks a lot like Microsoft
Word. The two office productivity suites have many similar features so if you are familiar with MS
Office, you won't have a hard time learning LibreOffice

Feel free to use your imagination to come up with an interesting design. Just remember to leave space
for the information that we will be adding
.
The Spreadsheet
The details that we will be
adding to the ID's will come
from a database, to do this,
first we need a spreadsheet
containing all the details.
Create one using Calc, which
can also be accessed from the
LibreOffice home screen. Calc
is a lot like Microsoft Excel
and adding rows of
information is practical and
easy to do. Once you've
entered all the information,
save your file, which should
look a lot like this:

The DataBase - We will then use this spreadsheet to create a database. To do this, open Database,
which is also in the LibreOffice home screen. A Database Wizard will open.

Follow these steps:


1. Click "Connect to an existing database" then click the list button and select Spreadsheet. After
that, click Next>>
2. Click Browse and look for the spreadsheet that you have created then double-click it. Click
Next>
3. In the 3rd step, do not change any of the default settings. Simply click Finish.
4. Name your database and click Save.
5. Once saved, the database will automatically open. To check if the information was properly
imported, double-click Sheet 1. A table that is identical to your spreads et should open. You
can close the database after you have checked it.

Merging - Now that we have all the files that we need, we can proceed with the merging. This is a
little tricky so please follow these steps so you won't get confused:
1. In the text document, Click View then Data Sources. This will open all the registered
databases.
2. In the list, double-click the name of our database. Double click Tables then double-click Sheet
1. This will open your table.
3. Click and drag each column into the space where you want them to be displayed. Don't forget
to delete the placeholders that you used.
4. Once you're satisfied with the design, click File and then Print. A message saying "Your
document contains address database fields. Do you want to print a form letter?" will appear.
Click Yes.
5. In the window that will appear, Click File under Output. Then click OK.
6. Name your file. If you want to open it using Microsoft Word, select "Microsoft Word 2007-
2013" in File Type. Once you're done, click Save.
7. Go to the folder where you saved your file and open it. You may want to make changes to your
design. To save your changes, repeat steps 4 to 6

Spreadsheet formulas - In this part of the lesson, we will learn how to use LibreOffice Calc in making
mathematical calculations. This is useful in bookkeeping and accounting tasks. Before we go ahead and
make calculations, first, we have to get familiarized with the parts of a spreadsheet program,
particularly LibreOffice Calc.

Parts of a spreadsheet

Toolbars - The sets of icons on the top part of the page are called toolbars. You may have noticed that
these are present in most LibreOffice tools as well as tools made by other companies like Microsoft
Office. Each icon in the toolbars has a different function such as changing font style and size, printing,
saving your document and zooming in and out. Toolbars can be moved in different areas of the page
but as beginners, it is advisable to leave them in their original place to avoid confusion.
Formula bar - The section below the toolbars is called the formula bar. The textbox in the right side is
called the Input Line. Later we will learn how it is integral to adding formulas.

Cell - Each box in the table is called a cell. Each cell is named after the combination of the
Row and Column that they belong to. For example, the upper-left-most cell is A1. The cell
below it is A2 and the one beside it is B1.

Columns - The vertical groupings of cells marked by letters are called columns. They are used
to group different categories of data in a table. For example, in the spreadsheet that we created
on the first part of this lesson, Name, Nickname, School, etc. are columns.

Rows - Each horizontal group of cells marked by a number is called a row. Cells that belong in
a row normally belong to a single entry in the spreadsheet. In our previous activity, all the
information that is included in each ID that we created belongs to an individual row in the
spreadsheet. (In a spreadsheet, the horizontal groupings are called a row)

Formula - A formula is a mathematical equation that can be applied to one or multiple cells. Formulas
can use data from its own cell and other cells to come up with a result. To add a formula to a cell,
select the cell and type the formula in the formula bar. Here are the most common formulas used in
Calc:

Basic operations: Use these signs to perform basic operations:


● + for Addition
● - for subtraction
● * for multiplication
● / for division
In the following examples, the results of several formulas are displayed in Cell C2
= A2 + B2
Features:
● Lets you set a goal or how much you want to save
● Automatically computes total allowance, total savings, and total spending for the year.
● Automatically displays your progress in percentage

Instructions:
1. Like the example below, create the following labels:

● Goal for 2016(A1)


● Total Allowance (A2)
● Total Spending (A3)
● Total Savings (A4)
● Balance (A5]

2. Progress (A6) In the cell beside Goal for 2016, input how much money you want to save for the
year. Make it realistic.

3. Select the rows right next to the first 5 labels (B1 to B5) then click the dropdown button beside
the Dollar sign on the uppermost toolbar. In the list, look for and select the peso sign. This will
form at the cells as currency.

4. In the 8th row, add the following labels:

● Week (AS)
● Start Date (B8)
● Allowance (CS)
● Savings (DS)

5. Right below Start Date, select B9 to B80


● Right-click the selected cells and click Format Cells. In the Numbers tab, select Date under
Category. In Format, select a display style. Click OK once you're done.

6. Select the rows below Allowance and Savings (C9 to CSO, D9 to D80) and set their format as
Peso currency, just like what you did in Step 2.

7. To add the formulas, select the cells beside the following labels and enter the corresponding
formulas
● Total Allowance
Formula: =SUM(C9: C80)
Purpose: Displays the sum of the Allowance column

● Total Savings
Formula: =SUM(D9:D80)
Purpose: Displays the sum of the Savings column

● Total Spending
Formula: =B2-B3
Purpose: Displays the difference of Total allowance and Total
Savings

● Balance
Formula: =B1-B3
Purpose: Displays the remainder of the Goal after Savings has been subtracted

● Progress
Formula: =B3/B1
Purpose: The percentage of the Total Savings divided by the Goal.
To change its format, select the cell and click the %6 icon beside the Dollar sign in the toolbar.

8. Now, to check if you ve set the formulas correctly, enter some data to simulate a couple of weeks
and check if the fields show correct results.
Week 8: Email

Why use email? - The email has become the successor of the traditional postal mail or snail mail.
Unlike the old-fashioned snail mail, emails are purely electronic, meaning they do not have a physical
form. This makes email more efficient and more practical. It can be sent and received instantly.
Modern emails can contain large amounts of information. For example, a hundred-page document can
be attached to just one email. Furthermore, emails are better for the environment because they do not
need to be printed in paper and delivered by hand

The Email Address

An email address is a unique name that represents a destination where emails can be delivered
to and sent from. Just like in the real-world postal system, people who want to send you letters
need to know your address. On the other hand, when you send a letter, you have to include
your address so that the receiver will know where to send a reply. The email address functions
as your home address in the World Wide Web.

Today the email address is one of the most important personal information that a person can have.
Besides being a destination for emails, the email address is also used to represent the identity of its
owner. Almost all forms of online registration require an email address. (See chapter Online Safety and
Security)

Parts of an Email Address

An email address is composed of 2 parts separated by @ or the "at sign". To illustrate these
parts, we will be using this sample email *myname @website.com"

1. Local part - The part to the left of the @ sign is called the local part. This is the part of the
email address that is chosen by you, the owner. It has to be unique and has to follow certain
naming rules (to be discussed later in this chapter). In our example the local part is myname
2. Domain part - The part on the right of the @ sign is called the domain part. It is the domain
name of the website that provides you the emailing service. Unlike the local part, you can not
personalize the domain part. In our example, the domain part is website.com How to Create an
Email Address An email address can be created in minutes. For this lesson, we will be creating
an email address using Gmail, a free email service owned and operated by Google. (source:
support.google.com) (Ex: "aaaaa@bbbbb.com" in bbbbb.com)

● Step 1: Go to Google's sign-up page. In your Internet browser, type


accounts.google.com/SignUp and press Enter

● Step 2. Enter your information In the signup page, you will be asked to enter some personal
details. Some of them are required while some of them are not.
Required:
- Name (first name and last name)
- Username
- Password (needs to be entered twice for confirmation)
- Birthday
- Gender
- САРТСНА
- Terms of Service and Privacy Policy (needs to be checked)

What is CAPTCHA? - Short for "Completely Automated Public Turing Test To Tell Computers and
Humans Apart", CAPTCHA is a test used to determine if the user is human and not a program or
robot. This is done to prevent hackers from using automated programs to sign up and use websites.

Not required:
- Mobile Number
- Your current email address
- Location (automatic)

1. To make your email address presentable and easy to remember, use your full name or variations of
your full name. For example: juandelacruz@gmail.com, jdelacruz@gmail.com, or
juan.delacruz@gmail.com.
2. Gmail will automatically check your "password strength". Use this as a guide to creating a secure
password.

● Step 3: Click the “next step” button. - You have successfully created an email address. Go to
gmail.com to log in and start sending emails.

The Email Client - You can now start using the email address that you have created. Using an em ail
client is easy but there are some things that you have to learn first.

What is an email client? - An email client is an application used for sending, receiving and organizing
emails. Gmail is the email client for the email address that we created. Other popular email clients
include Microsoft Outlook, Apple Mail, Mozilla Thunderbird, and Yahoo Mail.

How to log in to Gmail:


1. Go to accounts.google.com
2. Enter your email address and click Next.
3. Enter your password and click Sign in

● Tip: Click the "Stay signed in" checkbox below the Sign in button so you won't have to sign in
every time you open your email. For security purposes, do not use this feature when using
other people's computers.
Email Folders - Folders are sections of an email client that are used to store different kinds of email. It
is important to know that each email client has its own way of organizing and naming folders. Some
even allow users to create their own customized folders. However, there are some types of folders that
are essential to organizing emails. These folders can be found in almost all email clients:

Inbox - Like in mobile phones, an email client's inbox contains the messages you have received. In the
inbox, unopened emails are marked as unread while those that have already been opened are marked
read. (inbox is the email folder where you receive messages from different senders)

Outbox or Sent - The folder for the emails that you sent is called the outbox or sent folder depending
on the email client that you use. Other than the emails that you composed and sent, the outbox or sent
folder also contains emails that you replied to

Drafts - This folder contains the finished or unfinished emails that you have composed but did not send.
You can write an email and just save it. Later, you can reopen this email from your drafts folder and
send it. A majority of email clients automatically save your emails to prevent loss of data.

Flagged or Starred - You can mark important emails so that it will be easier to find them in the future.
To do this in Gmail, you can click the star icon beside the email header. This will cause the email to be
included in your Starred folder. Other email clients use a flag icon; hence the name "flagged" emails.

Spam - As the name implies, the spam folder is where suspicious emails are kept. This is done as a
security measure to prevent you from accidentally opening these emails. Most email clients can
automatically identify suspicious emails and send them to the spam folder. You can also manually mark
an email as spam. (Spam is where you can put an email from an unknown sender or from a person who
sends multiple emails repeatedly might go into this email folder.)

Trash - Instead of permanently deleting an email, it is sent to the Trash folder. This prevents you from
accidentally deleting emails. Emails in the trash folder can be recovered. However, emails that remain
in trash will be permanently deleted after a scheduled number of days. For example, Gmail deletes
messages that have been in trash for more than 30 days. Important note: It is possible for an email to be
found in several different folders. This is mainly because an email can contain the original message
from its creator and several replies from other people. For example, if you reply to an email that was
sent to you, it will appear in both your inbox and outbox

How to send an email - Follow these steps to send an email using your Gmail account.
(https://support.google.com)

1. Click the Compose button on the upper-left side of the screen. A new message window will
appear.
2. In the "To" section, type the email address of the recipient. You can add multiple recipients.
Use CC (carbon copy) or BCC (blind carbon copy) to include the email addresses of people
who are not the target of the email but need to be informed about it. The only difference is that
the CC will be visible to all the recipients of the email while BCC is hidden to the other
recipients.
3. In the Subject section, enter the subject or title of the email. (subject is considered as the
"headline" of an email)
4. Type your message in the large section below Subject. You can edit the text's size, format,
font, and color. You can also attach files such as pictures and documents.
5. Click the Send button

Optional Elements:

Tips:
● Keep your subject short and simple. Avoid adding too many details. For example, instead of
"Here is the information that you asked me to research for our Biology homework" you can
shorten it to "Research Data for Biology Homework" Write your email as if you are writing
traditional snail mail. As a sign of respect to the recipients, begin your message with a greeting.

● As a formality, add a "signature" containing your name, title, and contact details at the end of
the email even if your name is already indicated. Here's an example:

Juan A. Dela Cruz


Grade 7, Section 1
St. Nicholas National High School
09190000000

You might also like