0% found this document useful (0 votes)
647 views

Empowerment Technologies: Student Module For Senior High School

This document provides an overview of Information and Communication Technologies (ICT) including: 1. Definitions of ICT and related terms like Information Technology. 2. Descriptions of current ICT trends like convergence, social media, mobile technologies, and assistive media. 3. Explanations of online platforms including Web 1.0, Web 2.0, Web 3.0 and the semantic web, comparing features like folksonomy and user participation. 4. Learning objectives and activities for students to better understand the impact and implications of various online platforms and ICT in their lives and society.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
647 views

Empowerment Technologies: Student Module For Senior High School

This document provides an overview of Information and Communication Technologies (ICT) including: 1. Definitions of ICT and related terms like Information Technology. 2. Descriptions of current ICT trends like convergence, social media, mobile technologies, and assistive media. 3. Explanations of online platforms including Web 1.0, Web 2.0, Web 3.0 and the semantic web, comparing features like folksonomy and user participation. 4. Learning objectives and activities for students to better understand the impact and implications of various online platforms and ICT in their lives and society.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

DEPARTMENT OF EDUCATION

SCHOOLS DIVISION OFFICE I PANGASINAN


MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

EMPOWERMENT
TECHNOLOGIES
STUDENT MODULE FOR SENIOR HIGH SCHOOL

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

THE CURRENT STATE OF ICT TECHNOLOGIES AND


LESSON 1 ONLINE PLATFORMS

OVERVIEW

Information and Communication Technologies (ICT) covering the topics the current state of
ICT technologies (i.e., Web 2.0, 3.0, convergent technologies, social, mobile, and assistive media)
and online systems, functions, and platforms.

LEARNING COMPETENCIES

At the end of subject period, learner will be able to compare and contrast the nuances of
varied online platforms, sites, and content to best achieve specific class objectives or address
situational challenges. (CS_ICT11/12-ICTPT-Ia-b-1)

LEARNING OBJECTIVE
At the end of this lesson, the learners should be able to:

1. Define Information and Communication Technology.


2. Improve their knowledge on how ICT affects their everyday lives and state of our nation;
3. Define online platforms.
4. Compare and contrast the nuances of varied online platforms, sites and content.
5. Cite examples of online platforms, sites and content

QUICK CHALLENGE

Search certain current Information and Communication Technologies that catch your
attention nowadays. Find out their features and use that may help you as a student.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

CONTENT / GLOSSARY OF TERMS

Information Technology – refer to the entire information domain,


which include the hardware, software, peripherals and networking.
Its purpose is to store, protect, retrieve and process data
electronically.

Information and Communications Technology (ICT)

ICT is an umbrella term that includes any communication device


or application, encompassing: radio, television, cellular phones,
computer and network, hardware and software, satellite systems and
so on,\ as well as the various services and applications associated
with them, such as videoconferencing and distance learning.

CLOUD COMPUTING It is the delivery of computing services –servers, storage, databases,


networking, software, and more – over the INTERNET (―THE CLOUD‖) to offer faster innovation,
flexible resources and economies of scale.

PHILIPPINES: ICT HUB OF ASIA - The huge growth of ICT – related jobs in the
Country is brought by the CALL CENTER or BPO (Business Process Outsourcing)
centers. According to the 2013 edition of measuring the Information Society by the International
Telecom Union, in the year 2012 every 100 Filipinos you meet, there is a high chance that they
have a cellphone or two more.

ONLINE PLATFORMS

WEB 1.0

When the World Wide Web was invented,


most web pages were static. Static (also
known as flat page or stationary page) in
the sense that the page is ―as is‖ and cannot
be manipulated by the user. The content is
also the same for all users. This is referred
to as Web 1.0.

WEB 2.0 / DYNAMIC PAGE

Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website
differently than others. Examples of Web 2.0 include social networking sites, blogs, wikis, video
sharing sites, hosted services, and web applications.

FEATURES OF WEB 2.0

1. FOLKSONOMY. It allows users to categorize and classify/arrange information using freely


chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram,
Facebook, etc. use tags that start with the pound sign (#). This is also referred to as hashtag.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

2. RICH USER EXPERIENCE. Content is dynamic and is responsive to user‘s input. An


example would be a website that shows local content. In the case of social networking sites,
when logged on, your account is used to modify what you see in their website.

3. USER PARTICIPATION. The owner of the website is not the only one who is able to put
content. Others are able to place a content of their own by means of comment, reviews, and
evaluation. Some websites allow readers to comment on an article, participate in a poll, or
review a specific product (e.g., Amazon.com, online stores).

4. SOFTWARE AS A SERVICE. Users will subscribe to a software only when needed rather
than purchasing them. This is a cheaper option if you do not always need to use a software.
For instance, Google Docs is a free web-based application that allows the user to create and
edit word processing and spreadsheet documents online.

5. MASS PARTICIPATION. It is a diverse information sharing through universal web access.


Since most users can use the Internet, Web 2.0‘s content is based on people from various
cultures.

WEB 3.0 – SEMANTIC WEB PAGES

―A phrase coined by John Markoff of the New York Times in


2006, refers to a supposed third generation of Internet-based
services that collectively comprise what might be called ‗the
intelligent Web‘— such as those using semantic web, micro formats,
natural language search, data-mining, machine learning,
recommendation agents, and artificial intelligence technologies—
which emphasize machine facilitated understanding of information
in order to provide a more productive and intuitive user experience.‖

TRENDS IN ICT

1. CONVERGENCE: Technological convergence is the synergy of technological


advancements to work on a similar goal or task. an extension of the term convergence,
which means a ―coming together of two or more disparate disciplines or technologies. For
example, the so-called fax revolution was produced by a convergence of
telecommunications technology, optical scanning technology, and printing technology.‖
Convergent Technologies also refers to an American computer company formed by a
small group of people who left Intel Corporation and Xerox PARC in 1979.

2. SOCIAL MEDIA is a website, application, or online channels that enable web users to
create, co-create, discuss, modify, and exchange user-generated content.

SIX TYPES OF SOCIAL MEDIA

a. Social Networks. These are sites that allow you to connect with other people with the
same interests or background.
b. Bookmarking Sites. These are sites that allow you to store and manage links to
various websites and resources.
c. Social News. These are sites that allow users to post their own news items or links to
other news sources.
d. Media Sharing. These are sites that allow you to upload and share media content like
images, music, and video.
e. Microblogging. These are sites that focus on short updates from the user.
f. Blogs and Forums. These websites allow users to post their content.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

3. Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This
is largely because of the devices‘ capability to do tasks that were originally found in
personal computers.

KIND OF OPERATING SYSTEM


a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile

4. ASSISTIVE MEDIA
Assistive media is a nonprofit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.

ACTIVITY

1. Compare and contrast the implications of varied online platforms, sites and content (Web
1.0 and 2.0)

2. Compose an insightful reflection paper about the impact of ICT (specifically online
platforms) in your lives (as a student) and in the society.

Note: Join the Google E-Classroom, download the application or log in Google Classroom using
your Gmail Account, Join the Modular Class using the designated code: z85b6a

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

ONLINE SAFETY, SECURITY, ETHICS


LESSON 2 AND ETIQUETTE

OVERVIEW

The learners demonstrate an understanding of ICT in the context of global communication for
specific professional track.

LEARNING COMPETENCIES

At the end of subject period, learner will be able to apply online safety, security, ethics, and
etiquette standards and practice in the use of ICTs as it would relate to their specific professional
tracks (CS_ICT11/12-ICTPT-Ia-b-2).

LEARNING OBJECTIVES

At the end of this lesson, the learners should be able to:


1. Consider one‘s and others‘ safety when sharing information using the Internet
2. Consider one‘s and others‘ reputation when using the Internet.
3. Determine and avoid the dangers of the Internet.
4. Be responsible in the use of social networking sites.

QUICK CHALLENGE

Describe / How is your digital media life like?


Hint: You have to think figuratively.

Illustrate your answer on a separate paper,


you may include pictures or images.

HOW SAFE ARE YOU?

Type of Information Shared Not Shared


1. First Name
2. Last Name
3. Middle Name
4. Current and Previous Schools
5. Your Cellphone
6. The name of your mother/ father
7. The name of your siblings
8. Your address
9. Your home address
10. Your Birthday

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

CONTENT/ GLOSSARY OF TERMS

ETTIQUETTES - The rules indicating the proper and polite way to behave; manners, behavior.
NET + ETTIQUETTES = NETIQUETTES

TIPS TO STAY SAFE ONLINE

 Be mindful of what you share online


and what site you share it to.

 Do not accept terms and conditions;


read it.

 Check out privacy policy page of a


website to learn how the website
handles the information you share.

 Know the security files feat

 ures of the social media you use.

 Do not share your password with


anyone.

 Avoid logging in to public network /


Wi-Fi.

 Do not talk to strangers whether


online or F2F.

 Never post anything about a future


vacation.

 Add friends you know in real life.

INTERNET THREATS

1. Malware – stands for malicious software


Types: Virus, Worm, Trojan, Spyware, Adware

2. Spam – unwanted email mostly from bots or advertisers.


It can be used to send malware.

3. Phishing – Its goal is to acquire sensitive personal


information like passwords and credit card details.

COPY INFRINGEMENT

If you create something—an idea, an invention, a form of literary work, or a research, you have the
right of how it should be used by others. This is called intellectual property.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

Republic Act 10175: Cybercrime Law


―Cybercrime Prevention Act of 2012
Chapter 2: Punishable Acts

Section 4: Cybercrime Offenses. - The following acts constitute the offense of cybercrime punishable
under this Act:

(a) OFFENSES AGAINST THE CONFIDENTIALITY, INTEGRITY AND AVAILABILITY OF


COMPUTER DATA AND SYSTEMS:
(6) Cyber squatting. - The acquisition of a domain name over the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the same, if such a domain
name is:

(b) COMPUTER-RELATED OFFENSES:

(1) Computer-related Forgery.


(i) The input, alteration, or deletion of any computer data without right resulting in inauthentic
data with the intent that it be considered or acted upon for legal purposes as if it were
authentic. Regardless whether or not the data is directly readable and intelligible; or

(2) Computer· related Fraud. - The unauthorized input, alteration, or deletion of computer
data or program or interference in the functioning. of a computer system. Causing damage
thereby with fraudulent intent: Provided that if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.

(3) Computer-related Identity Theft. - The intentional acquisition, use, misuse, transfer,
possession) alteration or deletion of identifying information belonging to another, whether
natural or juridical, without right: Provided, That if no damage has yet been caused, the
penalty imposable shall be one (1) degree lower.

(4) Libel. - The unlawful or prohibited acts of libel as defined in Article 355 of the Revised
Penal Code, as amended, committed through a computer system or any other similar means
which may be devised in the future.

PLAGIARISM - an act or instance of using or closely imitating the language and thoughts of another
author without authorization; the representation of that author's work as one's own, as by not crediting
the original.

Cyber Bullying that takes place online, or using electronic technology such as cell phones,
computers, and tablets over communication tools including social media sites, text messages, chat,
and websites.

ACTIVITY

Create a campaign material, a poster / collage/ any art style promoting ―Think before
you click‖ that promotes awareness about Anti-Cyberbullying.

 You can used recycled materials


 You can do any style you want, (e.g. pop up box, or card etc.)

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

ONLINE RESEARCH VIA


LESSON 3 INTERNET WORLD

OVERVIEW

The learners demonstrate an understanding of ICT in the context of global communication for
specific professional track.

LEARNING COMPETENCIES

At the end of subject period, learner will be able to use the Internet as a tool for credible
research and information gathering to best achieve specific class objectives or address
situational. (CS_ICT11/12-ICTPT-Ia-b-3)

LEARNING OBJECTIVES

At the end of this lesson, the learners should be able to:


1. Define Internet.
2. Understand internet as a tool for research and information gathering.
3. Cite different search engine.
4. Identify advantages in using internet as a tool for credible research and information
gathering.
5. Identify disadvantages in using internet as a tool for credible research and information
gathering.

QUICK CHALLENGE

Cite the brief history of GOOGLE.COM

CONTENT / GLOSSARY OF TERMS

INTERNET - Defined as the


―Information Superhighway‖. This
means that anyone has access to
this highway, can place information
and can grab that information.

SEARCH ENGINE
A software system that is designed
to search information on the World
Wide Web.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

TIPS ON CONDUCTING ONLINE RESEARCH

• Have a question in mind. Focus on a question you want answered. Never search on one go.
• Narrow it down. Search engine like Google, Bing or Yahoo, use several filters to determine
the appropriate result for you.
• Advanced Search. The best way to filter information you get from search engines is by using
advanced search. This will allow you to filter information that you do not need.
• Have a question in mind. Focus on a question you want answered. Never search on one go.
• Narrow it down. Search engine like Google, Bing or Yahoo, use several filters to determine
the appropriate result for you.

Advanced Search. The best way to filter information you get from
search engines are by using advanced search. This will allow you to
filter information that you do not need.

Look for a credible source. Some wikis, though filled with updated
information are not credible source. This is due to the fact
that anyone can edit its content.

Give credit. If you‘re going to use the information from a source for education purposes, give credit to
the original author of the page or information

FORMAT:

Name of the person or organization (author of the information). Title of the home page in Italics
(title is shown in title bar but issometimes missing or unrelated. URL. Date last seen.

Lapiz, Adrian Harold L. “Oleanders Fun Facts about Bananas”.


http://oleander.penz.com/random/bananalove.htm. Viewed on September 7, 2015.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

CROSSWORD

(#10) It refers to the undesirable acts or harassment takes place online. _______________.
Refer to #10 answer: What are the possible ways to tip to avoid that.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

APPLIED PRODUCTIVITY TOOLS WITH ADVANCED


LESSON 4 APPLICATION TECHNIQUES – MAIL MERGE (MS WORD)

OVERVIEW

The learners demonstrate an understanding of the use of advanced tools and techniques
found in common productivity and software applications in developing ICT content for specific
professional tracks.

LEARNING COMPETENCIES

At the end of subject period, learner will be able to use common productivity tools effectively
by maximizing advanced application techniques. (CS_ICT11/12-ICTPT-Ic-d-4)

LEARNING OBJECTIVES

At the end of the session, learners are expected to:


1. Discuss the function of a mail merge;
2. Identify the components of a mail merge; and
3. Perform the mail merge process.

QUICK CHALLENGE
List down 5 persons who will receive your
invitation you‘ve created with complete
Write an invitation letter here (any occasion will do) information.
Use the appropriate format in writing a letter.

1. ___________________________
___________________________
___________________________
___________________________
2. ___________________________
___________________________
___________________________
___________________________
3. ___________________________
___________________________
___________________________
___________________________
4. ___________________________
___________________________
___________________________
___________________________
5. ___________________________
___________________________
___________________________
___________________________

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

CONTENT / APPLICATION DETAILS

MAIL MERGE - the automatic addition of names and addresses


from a database to letters and envelopes in order to facilitate
sending mail, especially advertising, to many addresses.

COMPONENTS OF MAIL MERGE

1. Form Document. The document that contains the main body


of the message we want to convey or send.

2. List or Data File. This is where the individual information or


data that needs to be plugged in (merged) to our form
document is placed and maintained.

LABEL GENERATION - It creates a blank form document that


simulates either a blank label or envelope of pre-defined size and
will use the data file that you selected to print the information,
typically, individual addresses.

Therefore,
what is the
importance of
Mail Merge in
creating
letters?

THE SIX STEPS OF THE WIZARD


There are six steps in the mail merge wizard:
Microsoft Word. Microsoft Word, word-processor
software launched in 1983 by the
1. Select document type
Microsoft Corporation. Software developers Richard
2. Start the document
Brodie and Charles Simonyi joined
3. Select recipients
the Microsoft team in 1981, and in 1983 they
4. Write your letter
released Multi-Tool Word for computers that ran a
5. Preview your letters
version of the UNIX operating system (OS).
6. Complete the merge

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

MAIL MERGE DEMONSTRATION

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

ACTIVITY

Perform the Mail Merge using the Letter / Invitation you‘ve created including the
Five (5) receivers you listed down.

Send the softcopy on our Google Classroom.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

APPLIED PRODUCTIVITY TOOLS WITH ADVANCED


LESSON 4.2 APPLICATION TECHNIQUES – MICROSOFT EXCEL

OVERVIEW

The learners demonstrate an understanding of the use of advanced tools and techniques found in
common productivity and software applications in developing ICT content for specific professional
tracks.

LEARNING COMPETENCIES

The learners will be able to create an original or derivative ICT content to effectively communicate
or present data or information related to specific professional tracks. CS_ICT11/12-ICTPT-Ic-d-5

LEARNING OBJECTIVES

At the end of the session, learners are expected to:

1. Familiarize the most commonly used function in Microsoft Excel.


2. Use several conditional functions available in Microsoft Excel.
3. Use Microsoft Excel as viable tool in market research and product development.

QUICK CHALLENGE

Create your daily allowance –


budget planner by using the
provided sheet.

Calculate manually your input


values.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

CONTENT / GLOSSARY OF TERMS

What is Microsoft Excel?

 is a spreadsheet develop by Microsoft for Windows, mac


OS, Android and I OS. It features calculation, graphing
tools, pivot tables, and a macro programming language
called Visual Basic for Applications
 Basic Mathematical Operation are; Addition (+), Subtraction (-)
Division (/), Multiplication (*)

Never forget to put equal sign “=”


in creating your formulas.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

This calls the input value of a


specific cell from the other sheet

If the value is modified from the


origin sheet, it will be
automatically updated on the
sheet wherein the cell is called
out.

There are 3 arguments for the RANK function:

 number: in the above example, the


number to rank is in cell B2
 ref: We want to compare the number
to the list of numbers in
cells $B$2:$B$11.
 order: (optional) This argument tells
Excel whether to rank the list in
ascending or descending order.

Use the IF functions to test for or


evaluate certain conditions, and then
reacts differently depending on
whether the test was TRUE or
FALSE.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20
DEPARTMENT OF EDUCATION
SCHOOLS DIVISION OFFICE I PANGASINAN
MAPANDAN NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
S.Y. 2019-2020

The IF function can perform a logical test and return


one value for a TRUE result, and another for a
FALSE result. For example, to "pass" scores
above 70: =IF (A1>70,"Pass","Fail"). More than
one condition can be tested by nesting IF functions.
The IF function can be combined with logical
functions like AND and OR.

ACTIVITY Provide the formulas of the each values shown in the TOTAL
and RANK COLUMN.

PREPARED BY: ATHEA MEI U. CALAUNAN, SST-II


//THEACALAUNAN20

You might also like