Saturday, February 9, 2019

Lesson 3


Advanced Word Processing Skills
    In this lesson I already know how to use Mail Merge in resume. Mail Merge is a process to create personalized letters and pre-addressed envelopes or mailing labels for mass mailings from a form letter. Form Document and List of Data File are the two components of Mail Merge. In Form Document, the document contains the main body of the message we want to convey or send. In List or Data File this is where the individual information or data that needs to be plugged in (merged) to our form document is placed and maintained. 


Steps in Creating Mail Merge:





1. Open an existing Word document, or create a new one.

2. From the Mailings tab, click the Start Mail Merge command and select Step by Step Mail Merge Wizard from the drop- down menu.
3. Save your letter and name it "Sample Letter“.

4.
Insert the fields in the letter (Name, Company, Address Line 1, and Title)

5. Save the main document once more. You can use Ctrl+S to quickly do this step.



6. On the Mailings tab in the Start Mail Merge group, choose Select Recipients.

7. Click the Customize Columns button on the dialog box for the New Address List


8. Select a field that you don’t need then click the DELETE button. A confirmation dialog           box appears.

9.
Click YES in the confirmation dialog box. The dialog box closes, and the unnecessary field disappears.

10. Repeat steps 8 & 9 for each field you do not need. After removing the excess fields, the           next step is to add the fields you need.

11. To add a field that you need in your document, click the ADD button.


12. Type the field name on the prompt inside a small ADD FIELD dialog box and click the             OK button.

13. Repeat steps 11 & 12 for each new field you need in your main document.

14.
Click the OK button on the Customize Address List dialog box to confirm your changes.

15.
The New Address List dialog box will appear again ready for you to type in your data.

16. Type the individual data from your list corresponding to Name, Company, Address Line         1, Address Line 2, Address Line 3, and Title.

17. Press the Tab key each time to enter the next field.


18.
To add a new record, press the Tab key after inputting the last field. When you press the Tab key on the last field in a record, a new record is automatically created and added on the next line.

19.
Repeat steps 16 through 18 until you enter all the records you want. Once you are done           typing your data, click the OK button on the Add New List dialog box to save your data.           A special Save Address List dialog box pops up, allowing you to save the recipient list.

20. Type a name for the address list. Name it "Client List".

21. Click the Save button. You should be back on your main document soon after.

22.
Select a field place holder (ALL CAPS) in the main document.


23.
Click the Insert Mail Field command button.

24. Choose the proper field to insert into your text. For example, if you are replacing the text name in your document with a name field, choose the Name Field from Insert Merge Field menu. The field is inserted into your document and replaces the ALL CAPS text.

25. Continue adding fields until the document is complete. Repeat steps 22 through 24 as necessary to stick all fields into your document.


26. Save the main document.

27.
Choose Finish & Merge to edit, print, or send your merged documents through email.

28. Or you may want to choose Preview Results to check your work before you send it.

29. You should get a merged closed to this one.

30. Save and close your document

Integrating Images and External Materials

Kinds of Material:
  1. Pictures
  2. Clip Art
  3. Shapes
  4. Smart Art
  5. Chart
  6. Screenshot


Image Placement :



Thursday, February 7, 2019

Lesson 4


Advanced Spreadsheet Skills

    In this lesson I learned that i can use  Microsoft Excel as a viable tool in market research and product development. I know already on how can i do some of my home works by using Microsoft Excel, it can helps me a lot to improve my skills and knowledge  and I want to explore more and learn more about this topic.


     -Microsoft Excel is a widely use spreadsheet program. A spreadsheet program is a software for entering, editing, manipulating, and printing information in a tabulate form. 




Using Formulas and Function


"PLEASE EXCUSE MY DEAR AUNT SALLY"

-is a shortcut for the precedence which operations take place:
Operation enclosed within Parenthesis, Exponential , Multiplication, Division, and then Addition and Subtraction

List of commonly used mathematical symbol in Excel

Exponentiation(^)   Multiplication(*)
Division(/)                 Addition(+)
Subtraction(-)           Equal to(=)
Greater than(>)        Less than(<)

Sum(range) is used to compute the total of all items in the specific range. 
Average(range) is used to get the average of the items in a range.
Count(range) is used to count the values found in the range.
Max(range) is used to get the largest value within the range.
Min(range) is used to get the smallest value within the range.
COUNTIF(range,criteria) is used to count the cells with specified content within a range.
SUMIF(range, criteria) is used to compute for the summation of a range if a certain condition is met.
AVERAGEIF(range,criteria) is used to compute for the average of a range if a certain condition is met. 

Wednesday, February 6, 2019

Lesson 1


 Introduction to Information and Communication Technologies 

     I learned that Information and Communication Technologies (ICT) deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information. ICT ranked 74th out of 77 countries in terms of 4G speed, Download speed of just 8.24 Mbps (CNN Phils, Nov. 2017) ICT in Philippines.

     Web 1.0 it is also know as flat page or stationary page and cannot manipulate by the users. 
Web 2.0 it is the evolution of Web 1.0 by adding dynamic web pages. It also allows users to interact to this page, the users maybe able to comment or create user account.The examples of Web 2.0 include Social networking sites, blogs, wikis, hosted service, etc.

Features Of Web 2.0 :

  • Folksonomy
  • Rich Users Experience
  • Long Tail
  • Users Participation
  • Software as a service 
  • Mass Participation

       Web 3.0 is the Semantic Web movement led by World Wide Web Consortium (W3C) also it encourages Web developers to include semantic content in their web pages. The aim of Web 3.0 is to have machines understand the user's preferences to be able to deliver web content specifically targeting the user.

Several Problems of Web 3.0 :

  • Compatibility 
  • Security
  • Vastness
  • Vagueness
  • Logic
          

Kinds Of Operating System :

                A. IOS              B. Android    
                          C. BlackBerryO        DWindow Phone Os       E. Symbian                                  F.  Web Os       G. Windows Mobile


There are 4 Trends in ICT :           
 1Convergence                                                       
 2. Social Media  
                                                  
Six Types Of Social Media                        
  1. Media Sharing                                   
  2. Micro blogging
  3. Blogs and Forums 
  4. Social Networks
  5. Book Marking Sites 
  6. Social News
3.Mobile Technologies
4. Assistive Media

Lesson 2




 Rules Of Netiquette

   In this lesson, I learned the tips on how stay safe online. There's a 15 tips on  how stay safe online.

These are the some of tips:

  • Be mindful of what you shared online and what site you share to it.
  • Do not share your password to any one.
  • Do not reply or click links from suspicious emails.
  • Do not just accept terms and conditions; read it.
  • Add friend you know in real life.
I also learned the different threats in internet. One of this is "MALWARE" it stands for malicious
software. VIRUS , WORM, TROJAN, SPYWARE, ADWARE these are the kinds of malware that will threat you in the internet. "SPAM" is the unwanted email mostly from bots or advertisers. It can be use to send malware. PHISHING its goal is to acquire sensitive personal information like password and credit and card details.


Tips to avoid copyright infringement :

  • UNDERSTAND
  • Be Responsible
  • Be Creative
  • Know The Law

Online Research is the process of interactively searching for and retrieving requested information via a computer from data bases  that are online.

Tips in conducting online research:


  • Have a question in mind
  • Narrow it down
  • Advance Research
  • Look for credible source
  • Give credit
Name of the person or organization(the author of the information). Title of the home page in italics (title is shown in title bar but is sometimes missing or unrelated).