Anda di halaman 1dari 65

USE, COMMUNICATE AND SEARCH VIA THE INTERNET

LEARNER GUIDE
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Published by

HEART TRUST/NATIONAL TRAINING AGENCY

Produced by

Learning Resources Development Unit


Gordon Town Road
Kingston 7
Jamaica W.I.

This material is protected by copyright ©. Copying this material or any part of it by any means,
including digital or in any form is prohibited unless prior written permission is obtained from the
HEART Trust/NTA.

© 2017

LRDU-LG-ITICOR0271C-1.0
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

TABLE OF CONTENTS

PAGES

Introduction .................................................................................................................. i

Welcome ............................................................................................................................. i

This Competency Unit....................................................................................................... i

Planning your Learning Programme ............................................................................... ii

Self-Assessment Checklist ................................................................................................. iii

How to use this Learner Guide ...................................................................................... vi

Using the Computer and Other Resources ................................................................. viii

Methods of Assessment ................................................................................................. viii

Quality Assurance .......................................................................................................... viii

Element 1 Connect to and Access the Internet ....................................................... 10

Self-Assessment Checklist ................................................................................... 22

Element 2 Use E-Mail for Communication ............................................................. 23

Self-Assessment Checklist ................................................................................... 34

Element 3 Search Internet ..................................................................................... 35

Self-Assessment Checklist ................................................................................... 42

LRDU-LG-ITICOR0271C-1.0
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Element 4 Access and Use Consumer Specific Sites on


the Internet ........................................................................................... 43

Self-Assessment Checklist ................................................................................... 45

Element 5 Undertake Online Transactions ............................................................. 45

Self-Assessment Checklist ...................................................................................50

Element 6 Conduct An Advanced Search ............................................................... 51

Self-Assessment Checklist ................................................................................... 56

Element 7 Use Information that has Been Located ................................................. 57

Self-Assessment Checklist ...................................................................................60

LRDU-LG-ITICOR0271C-1.0
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

LG – ITICOR0271C:
USE, COMMUNICATE AND SEARCH
VIA THE INTERNET

INTRODUCTION

Welcome

Welcome to the Learner Guide for Unit of Competency “Use Communicate and Search
Via The Internet”. This is just one of a number of Learner’s Guides produced for the
Information Technology Industry, and it is designed to guide you, the learner, through a
series of learning processes and activities that will enable you to achieve the specified
learning outcomes for the competency unit.

The content of this guide was developed from the Competency Standard ITICOR0271C,
which is one of the basic building blocks for the National Vocational Qualification of
Jamaica (NVQJ) certification within the industry.

You are also advised to consult the Competency Standard for a better understanding of
what is required to master the competency.

This Competency Unit

“Use, communicate and search VIA the Internet” addresses the knowledge and skills
requirements to effectively use, communicate and search VIA the internet. There are
seven main areas or elements:

Element 1 Connect to and access the internet


Element 2 Use e-mail for communication
Element 3 Search Internet
Element 4 Access and use consumer specific sites on the Internet
Element 5 Undertake online transaction
Element 5 Conduct an advanced search
Element 6 Use information that has been located
Element 7 Use information that has been located

LRDU-LG-ITICOR0271C-1.0 i
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

As you go through each element, you will find critical information relating to each of
them. You are advised to study them carefully so that you will be able to develop the
necessary knowledge, skills and attitudes for using communicating and search via the
internet

Planning your Learning Programme

The following self-assessment checklist will assist you in planning your learning
programme as it will help you to think about the knowledge, skills and attitudes needed
to demonstrate competency in this unit. As you go through the checklist, you will be able
to find out what competencies you have already mastered, and which ones you will
need to pay more attention to as you go through the learning process.

To complete the checklists simply read the statements and tick the ‘Yes’ or ‘No’ box.

LRDU-LG-ITICOR0271C-1.0 ii
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Self-Assessment Checklist
Use, communicate and search via the internet

Element 1 Connect to and Access the Internet Yes No

1. I can connect to the Internet via existing Internet connection


and confirm functionality. ( ) ( )

2. I can open Internet browser and set home page to page


choice by setting Internet option. ( ) ( )

3. I can ensure Internet browser software security. ( ) ( )

4. I can adjust display of the Internet browser to suit personal


Requirement ( ) ( )

5. I can modify toolbar to meet user and Internet browser


needs ( ) ( )

6. I can enter uniform resource locator (URL) in address line of


Internet browser ( ) ( )

7. I can use socially responsible behaviour when sharing


information on the Internet ( ) ( )

Element 2 Use email for communication Yes No

1. I can open e-mail application package, create and e-mail new


messages, and add addresses ( ) ( )

2. I can create and add an automatic signature for the user ( ) ( )

3. I can attach files to the e-mail message where required ( ) ( )

4. I can compose text of an e-mail message according to organizational


guidelines, spell-check, and edit text as required ( ) ( )

5. I can determine, set priority, and send e-mail messages ( ) ( )

6. I can reply to and forward a received message using available


features ( ) ( )

LRDU-LG-ITICOR0271C-1.0 iii
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

7. I can open and save an attachment to the relevant folder ( ) ( )

8. I can search for, sort, and save e-mail message using available setting ( ) ( )

9. I can adjust e-mail accounts to restrict and quarantine possible e-mail


security problems ( ) ( )

10. I can print e-mail messages as required ( ) ( )

Element 3 Search Internet ( ) ( )

1. I can review organizational guidelines on Internet access ( ) ( )

2. I can open Internet application, locate, and access a search engine


on the Internet, and define search expressions based on data
required
( ) ( )
3. I can enter appropriate key words into the search engine to locate
desired information ( ) ( )

4. I can refine a search depending on outcomes of original search ( ) ( )

5. I can save a search expression results and present them in a report


according to information required ( ) ( )

6. I can create a bookmark within the Internet browser or a link for


the required web page for the key results
( ) ( )
7. I can save key results in a bookmark folder ( ) ( )

8. I can modify Internet browser options for printing and print a web
page ( ) ( )

9. I can close Internet browser ( ) ( )

Element 4 Access and Use Consumer Specific Sites on the Internet Yes No

1. I can identify, access, and review information specific for specific


sites to gain consumer information ( ) ( )

LRDU-LG-ITICOR0271C-1.0 iv
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

2. I can identify and use Internet application sites to lodge details and
gain access and information ( ) ( )

3. I can access and use online forums on the Internet ( ) ( )

Element 5 Undertake Online Transactions Yes No

1. I can access online transaction site/Ensure security of transaction site ( ) ( )

2. I can enter required information into fields on merchant’s website ( ) ( )

3. I can enter, check, and make changes to preferred transaction option ( ) ( )

4. I can complete online transaction ( ) ( )

5. I can record and archive receipts according to business processes ( ) ( )

6. I can ensure pop-up dialog boxes, prompts, or feedback mechanisms


are completed ( ) ( )

7. I can close down and leave transaction process ( ) ( )

Element 6 Conduct an Advanced Search Yes No

1. I can use search tools and advanced search features ( ) ( )

2. I can use Boolean search techniques when required to enhance the


search ( ) ( )

3. I can use multiple or meta-search tools with a range of key words ( ) ( )

4. I can use search engines particular to a field of knowledge to refine


the outcomes ( ) ( )

5. I can access related virtual community sites and newsgroups, and


note their objectives and operational arrangements ( ) ( )

6. I can conduct a search with domain names to refine the search ( ) ( )

LRDU-LG-ITICOR0271C-1.0 v
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Element 7 Use Information that has been located Yes No

1. I can cross reference information found by using several websites to


determine accuracy of information ( ) ( )

2. I can check date that website was last updated or properties of


website to determine currency of information ( ) ( )

3. I can determine website authority by looking at copyright


statements, privacy statements, and organizational information ( ) ( )

4. I can save and print information found in different file forms ( ) ( )

If you ticked all or most of the ‘Yes’ boxes, then you might not need to go through the
entire guide. Ask your learning facilitator to assist you in determining the most
appropriate direction for this competency.
If you ticked a few of the ‘Yes’ boxes or none at all, then you should work through the
entire guide, even though some elements of the material may be familiar to you.

Plan your learning based on your answers. Be sure to involve your learning facilitator in
the planning process.

How to use this Learner Guide

This Learner Guide is designed to assist you in working and learning at your own pace.

We suggest that you:

 Go through the Unit as it is presented


 Check your progress at each checkpoint to ensure that you understand the material

 Observe the icons and special graphics used throughout this guide to remind you of
what you have to do and to enhance your learning. The icons and their meanings
are as follows:

Self-Assessment Exercise
This exercise requires you to think about the
knowledge and skills that you have or will
develop in this competency unit.

LRDU-LG-ITICOR0271C-1.0 vi
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Key Concepts Box


Words/phases are defined or explained in
this box. The words/phases being explained
are in bold print.

Checkpoint
This denotes a brain teaser and is used to
check your understanding of the materials
presented. No answers are provided for the
questions asked.

Activity
This denotes something for you to do either
alone or with the assistance of your
trainer/supervisor.

Reference
This points you to the reference materials
and other support documents or resources
used in compiling the unit content.

 Ask your learning facilitator for help if you have any problems with the interpretation
of the content, the procedures, or the availability of resources.

 Complete each activity as you come to it. If the activity requires you perform an
actual task, be sure to tell your learning facilitator when you get to that activity so
that he/she can make arrangements, if necessary.

 Complete the self-assessment checklist at the end of each section or element.

When you have worked through all elements of the guide, and when you can tick every
‘Yes’ box, you are ready for assessment and should ask your learning facilitator to assist
you in making the arrangements to have your performance assessed.

LRDU-LG-ITICOR0271C-1.0 vii
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Using the Computer and Other Resources

Where your activities refer you to the library, computer and Internet resources, ask your
learning facilitator to assist you with locating these resources. If you are getting your
training in an institution, there may be a library and computer laboratory. If this is not
the case, visit the local library and find out what resources are available.

If you are unable to use the computer and the Internet, someone should be able to show
you how to use these resources.

Please note that in many of your activities you have been referred to information on the
Internet. This is because the Internet has a vast amount of information that can help you
acquire the particular competencies. We would like to advise you, however, that we
cannot guarantee that all the sites will be available when you need them. If this happens,
ask your learning facilitator to assist you with locating other sites that have the
information you require.

Methods of Assessment

Your competency will be assessed while you are actually performing the tasks related to
this competency unit. This may be in real workplace or simulated situation that
accurately relates to the work situation. You are advised to consult the associated
competency standard for further details relating to the assessment strategies.

Quality Assurance

A feedback form is included at the back of each Learner Guide, so all users are afforded
the opportunity to document their concerns pertinent to the various aspects of the guide.
Such concerns will assist in the review process of the Learner Guides. Users are
encouraged to cut out the form, complete and submit same to the address provided.

You may now start your learning. Have fun while you work!

LRDU-LG-ITICOR0271C-1.0 viii
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

LG – ITICOR0271C:
USE, COMMUNICATE, AND SEARCH VIA
THE INTERNET

This unit is divided into seven elements:


1. Connect to and access the Internet
2. Use e-mail for communication
3. Search Internet
4. Access and use consumer specific sites on the Internet
5. Undertake online transaction
6. Conduct an advanced search
7. Use information that has been located

LRDU-LG-ITICOR0271C-1.0 9
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Introduction to Communicating via the Internet


The Internet plays a pivotal role in the way we KEY CONCEPT
communicate today. The advent of the Internet has
made communication more efficient and effective, Internet
through the provision of multiple methods of
communication, including electronic mail (e-mail) The Internet is a global network
and blogging. Electronic communication enables of computers that are
you to combine multiple media in one message— interconnected. These
text, sound, video, and graphics. Electronic interconnected computers share
communication allows you to modify your information using various
messages to suit specific audience based on specific methods such as e-mail, instant
needs. message, file transferring using
file transfer protocol (FTP),
Communicating via the Internet is a daily routine downloading music and videos,
for persons who work within the business among others.
processing industry. It enables you to locate
information in an efficient and effective manner that promotes productivity and
profitability.

Key Concepts
 Internet
 World Wide Web (www)
 Web browsers
 Security
 Netiquette
 E-mail
 Responsible use of the Internet

ELEMENT 1 CONNECT TO AND ACCESS THE INTERNET

Learning Outcomes
Upon completion of this unit you should be able to:

1. Connect to Internet via existing Internet connection and confirm functionality


2. Open Internet browser and set home page to personal choice by setting Internet
option
3. Ensure Internet browser software security
4. Adjust display of the Internet browser to suit personal requirements

LRDU-LG-ITICOR0271C-1.0 10
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

5. Modify toolbar to meet user and Internet browser needs


6. Enter uniform resource locator (URL) in address line of Internet browser
7. Use socially responsible behavior when sharing information on the Internet
8. Access a particular website, note privacy and other conditions of use, and retrieve
data

Connect to Internet via Existing Internet Connection and Confirm Functionality

Without web browsers, it would be practically impossible to


access or connect to the Internet. Netscape Navigator, Mosaic
and Microsoft Internet Explorer are all examples of browsers.
Browsers are software that allow you to connect, display, and
navigate the web pages. The browsers’ tasks are basically to
request specific web pages when you enter the web site address,
for example, www.google.com, or clicking a link on a web page.
This request is sent by the browser, to a web server—an extremely powerful computer
that simultaneously handles multiple browser requests by the browser. The web server
attends to these requests and sends back the requested contents of the desired web page.
The browser, after receiving these contents, renders/draws the web pages or simply
converts the plain texts that it receives from the server into a display document based on
the formatting instructions that are embedded in the plain-text. The final results are the
graphical and colourful pages with various typefaces and links that appear in front of
you.

Existing Internet connectivity infrastructure should be in place at your local site before
you can actually launch your browser. You can confirm the functionality of your
connection using various ways such as:
 launching a browser and checking whether it connects to the Internet
 performing a ping test

How to Perform a Ping Test on a computer using Windows OS


 Access the command prompt by doing the following:
- Press the Windows key on the taskbar or keyboard
- Type cmd or command prompt
- Select Command Prompt icon after search results appear
 In the command prompt window, type ping hotmail.com or a website of your
choice and then press Enter
 Check the statistics that are returned; you need to be able to read or understand
the statistics

LRDU-LG-ITICOR0271C-1.0 11
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

These statistics show:


Packets: Sent = 4, Received = 4,
Lost = 0 (0% loss),

This simply means that you are connected to the Internet

Open Internet Browser and Set Home Page to Personal Choice by Setting Internet
Option

KEY CONCEPT
You can access features of the World Wide Web using a
Home page browser; these include:
 e-mail
Home page is the starting  chat
point of a website  blogs
providing information
about the site’s purpose Regardless of your location, as long as you have Internet
and content connectivity, you can access information and communicate. The
World Wide Web can be likened to a giant library of
information; but instead of books and magazines, the World
Wide Web is stocked with websites and web pages with the

LRDU-LG-ITICOR0271C-1.0 12
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

primary web page being called the Home Page.

To open an Internet browser, for example, Microsoft Internet Explorer or Microsoft


Edge, you simply double-click the browser icon, which is located on your desktop. The
website to which you are initially taken when you launch a browser is referred to as your
Home Page. It is also known as the Start Page or Entry Page.

You have the option of deciding your Home Page. To set your home page, take the
following steps:
 Select Tools from the Menu bar in your browser
 Choose Internet Options; this will display the dialog box shown below from
screen capture
 On the General tab, under Home page, enter the URL of the site that you wish to
be made your Home page
 NB. You can also use the site that you are currently on by selecting Use current
site
 Select Apply
 Select OK

LRDU-LG-ITICOR0271C-1.0 13
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

CHECKPOINT

1. What is the difference between the Internet and the World


Wide Web?

2. What are the main functions of a browser?

ACTIVITY

Use your browser to access the World Wide Web and change your
current Home Page to:

www.msn.com

Ensure Internet Browser Software Security

Browser security is a very important part of ensuring that your information is secure; it
ensures your privacy and security whenever you are using the particular browser. In light
of the increase in identity and information theft, it is imperative that you browse in a safe
and secure environment. There is some comfort in knowing that the major browsers
have built-in security features. Regardless, you need to ensure that you install and set
these features in order to reduce the risk malicious attacks.

When browsing using Google Chrome:

Access the security features/settings through Chrome’s Advanced Settings menu or by


navigating to Chrome://settings/. To stay secure, you need to do the following:
 Enable phishing and malware protection
 Turn of instant search
 Do not sync your e-mail account with your Chrome browser
 Configure content settings by:
- clicking Content settings, under Privacy and:
o Cookies - choose “keep local data only until I quit my browser and
block third-party cookies and site data
o JavaScript – choose do not allow any site to run JavaScript
o Pop-ups – choose do not allow any site to show pop-ups

LRDU-LG-ITICOR0271C-1.0 14
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

o Location – choose do not allow any site to track my physical location


 Configure passwords and forms setting by:
o Disabling Autofill
o Deselecting Passwords and forms

When browsing using Internet Explorer 10:

Enable security features under Internet Options by:


 Selecting Tools, Internet Options
 Configure security settings under Security tab by:
- Setting the security zones
- Setting Internet zone to security to Medium High or higher
- Disable JavaScript by:
o Clicking Custom Level and
o Finding Active Scripting setting and selecting Disable
 Automatically clearing history by selecting Delete browsing history on exit, under
the General tab
 Configure privacy setting by completing the following tasks under the Privacy tab:
- Privacy setting – set the Internet zone privacy to Medium High or higher
- Location- choose Never allow websites to request you physical location
- Pop-up blocker – ensure that this is enabled
 Configure Advanced Security Setting by scrolling down to the security section
under the Advanced tab and:
- Ensure that all defaults settings are in place by clicking Restoring advanced
settings
- Choose Do not save encrypted pages to disk
- Choose Empty Temporary internet Files folder when browser is closed
- Turn off auto-complete

ACTIVITY

Connect to the www by launching Microsoft Internet


Explorer 10 browser; install all the browser security features
of EI 10

LRDU-LG-ITICOR0271C-1.0 15
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Adjust Display of the Internet Browser to Suit Personal Requirements

The Display Window displays messages stored in, or information relevant to, the folder
highlighted in the Folder List. For example, when the Inbox is highlighted in the Folder
List, the Display Window displays the items stored in that folder.

The Display Window can also be divided horizontally. When this occurs, the lower half is
referred to as the Preview Pane. If an item or a message is highlighted in the Display
Window, the contents of that item or message appear in the Preview Pane. This enables
you to read or review the items or messages without opening them.

Messages that appear in the Preview Pane also display details of the sender, the recipient
and the subject name. To display or hide the Preview Pane, select View from the menu
bar and choose Preview Pane.

In order to suit personal requirements, various features on an Internet screen can be


displayed or hidden. Customization of this kind would include such features as the
Toolbar, Status Bar, and Explorer Bar.

CHECKPOINT

1. What is the purpose of the display window ?

2. What can messages that appear in the Preview Pane display ?

ACTIVITY

A. Adjust the display of your Internet Browser to suit your personal


preference or requirements.

LRDU-LG-ITICOR0271C-1.0 16
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Modify Toolbar to Meet User and Internet Browser Needs

KEY CONCEPT After you access the Home Page of your browser, you
must now be able to modify the home page to meet
Browsing your browsing requirements/preferences/needs. To
meet your needs, the appearance of the Tool Bar
This is the process of reading buttons can be changed or, as mentioned earlier, the
Web pages and traversing various toolbars can be displayed or hidden. This not
links to more Web pages only helps the user to access various options, but also
helps to make browsing a lot easier and much
quicker.

Enter Uniform Resource Locator (URL) In Address Line of Internet Browser

After you have set up your home page, you should be able to access other sites and
retrieve data. To accomplish this task, one of the most frequent methods is to access
other sites by means of the address bar on the home page.

Type desired site address in the address bar

After you have done this, you may browse and select the information you require.

Each website is located at a unique global address KEY CONCEPT


called a Uniform Resource Locator (URL). When you
know the address of a website, it is much easier to URL
locate. Referencing the Uniform Resource Locator
URL allows you to jump directly to that page at that Uniform Resource Locator
URL regardless of where you currently are on the (URL) is a unique address for
web. All web browsers let you jump directly to a URL Internet resources that are
available through a Web
browser, including files or
directories.

LRDU-LG-ITICOR0271C-1.0 17
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

A URL is used to access a web page. You enter the URL into the browser. The URL
consists of the name of the host computer (server), the domain, the directory on the
server, and the title of the web page (actual filename).

Example http://eduscapes.com/tap/index.htm
Format Domain Name Directory Actual Filename
Protocol on server

It is possible to access the links that are contained within that site when a website is
displayed on the screen. Clicking on a link (or tabbing to the link and pressing Enter) will
take you to another section of the website, a Web page related to the site or even to a
different web site.

A link - is a connection from one web resource to another. Although it is quite simple,
the link has been a primary force driving the success of the web.

A link has two ends – called anchors -- and a direction. The link starts at the "source"
anchor and points to the "destination" anchor, which may be any Web resource (e.g., an
image, a video clip, a sound bite, a program, an HTML document, an element within an
HTML document, etc.).
After you have successfully identified the URL, you will be able to access the links
provided by the URL.

CHECKPOINT

1. What is the meaning of URL?


2. Name the parts of a URL
3. What is the bar on the Internet screen (where the web address
is typed) called?
4. What is the coloured or underlined highlighted word or phrase
on a web page that will link to new web pages called?
5. What is the name of the set of rules and standards that enable
computers to exchange information?

LRDU-LG-ITICOR0271C-1.0 18
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Use Socially Responsible Behavior When Sharing Information on the Internet/Access a


Particular Website, Note Privacy and Other Conditions of use, and Retrieve Data

It is very important that you use the Web responsibly. There are informal rules, referred
to as netiquette, which govern how you behave when you are using the Internet. They
apply to sending e-mail, texting, and other interaction on the Web; these rules include:
 Keeping your message short and simple. Try
to limit your message to one screen
 Identifying yourself as the sender in the
communication; include your name and school
address
 Double-checking the URL or address before
you send the message
 Ensuring that you do not forward e-mails without sender’s permission
 Ensuring that you do not post commercial messages to newsgroups
 Lurking before posting
 Respecting other’s time and privacy
 When replying to an email, include the pertinent portions of the original message
 Not writing anything that you do not want someone other than the receiver to
read
 Checking spelling, grammar, and punctuation. Use lowercase letters except for
proper names and beginning of sentences. When texting, use common convention
where appropriate
 Being sensitive to others. Treat others with respect, courtesy, especially in
reference to social, cultural, and ethnic differences.
 Avoiding sarcasm. It often falls flat and doesn’t come across as intended.
 Cooperating and sharing. Consider yourself a guest on someone’s systems, just as
if you were a guest in someone’s home
 Being careful with humour. It is a two-edged sword. The reader does not have the
benefit of your facial expression, body language or tone of voice.

LRDU-LG-ITICOR0271C-1.0 19
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

 Consider copyright. Just because something can be copied electronically, does not
mean it should be distributed without permission. Unless otherwise stated, all
materials on the Internet is copyrighted
 Be alert for obscenity. Laws governing obscenity apply to messages on the
Internet.
Whenever you access a particular website, you need to check for the privacy of your use
of the site—refer to criterion 3 above on how to ensure Internet browser security. You
should also note the conditions for the use of the particular site, check to the stipulations
for using the site for research or for retrieving data from the site. Evaluate the site for
authority, reliability, and authenticity.

CHECKPOINT

1. What is netiquette?
2. List at least 10 rules of netiquette.
3. Outline some guidelines that you should follow when you
are using the Internet to research.

LRDU-LG-ITICOR0271C-1.0 20
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

References

1. Customizing the Browser Toolbar. (2017). Retrieved from


https://msdn.microsoft.com/en-us/library/aa753592(v=vs.85).aspx

2. Blockmon, R. (2017). Definition of a Web Browser.


Retrieved from http://study.com/academy/lesson/what-is-a-web-browser-
definition-examples-quiz.html

3. Decker, F. (2017). Examples of Web Browsers. Retrieved from


https://www.techwalla.com/articles/examples-of-web-browsers

4. Egan, M. (2014). How to remove unwanted browser toolbars. Retrieved from


http://www.techadvisor.co.uk/how-to/security/how-remove-unwanted-
browser-toolbars-3462529/

5. Lord, N. (2017). Browser Security for Setting for Chrome, Firefox and Internet
Explorer: Cybersecurity 101. Retrieved from
https://www.veracode.com/blog/2013/03/browser-security-settings-for-
chrome-firefox-and-internet-explorer

6. Safe and Responsible use of Digital Technologies. (2017). Retrieved from


http://www.education.vic.gov.au/school/teachers/support/Pages/safeandrespo
nsibleuse.aspx

LRDU-LG-ITICOR0271C-1.0 21
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

READY TO ASSESS YOUR COMPETENCE?


Now that you have completed this element, check if you have fully grasped all
the components by doing the following self-assessment:

Self-Assessment Checklist Yes No


1. I can connect to the Internet via existing Internet connection and
confirm functionality. ( ) ( )

1. I can open Internet browser and set home page to page choice by
setting Internet option. ( ) ( )

3. I can ensure Internet browser software security. ( ) ( )

4. I can adjust display of the Internet browser to suit personal


Requirement ( ) ( )

5. I can modify toolbar to meet user and Internet browser needs ( ) ( )

6. I can enter uniform resource locator (URL) in address line of Internet


browser ( ) ( )

7. I can use socially responsible behavior when sharing information


on the Internet ( ) ( )

LRDU-LG-ITICOR0271C-1.0 22
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

ELEMENT 2 USE E-MAIL FOR COMMUNICATION

Learning Outcomes
Upon completion of this unit you should be able to:

1. Open e-mail application package, create e-mail, new messages, and add addresses
2. Create and add an automatic signature for the user
3. Attach files to the e-mail message where required
4. Compose text of an e-mail message according to organizational guidelines, spell-
check, and edit text as required
5. Determine, set priority, and send e-mail messages
6. Reply to, and forward a received message using available features
7. Open and save an attachment to the relevant folder
8. Search for, sort, and save e-mail message using available setting
9. Adjust e-mail accounts to restrict and quarantine possible e-mail security problems
10. Print e-mail messages as required
11. Review organisational guidelines on Internet access

E-mail has become increasingly popular, for businesses as well as


personal use, because it is economical and fast. It is cheaper to send
an e-mail message than it is to mail a letter, a fax a correspondence,
or make a long-distance telephone call. It also provides for the
recipient, an efficient and quick method of replying to your message.
In addition, e-mail helps us overcome problems associated with
telephoning people who live in different time zones. Once your
computer has e-mail access, messages can be exchanged between
computers anywhere in the world at any time of day or night. Prior
to the development of the e-mail system, sending letters would take days and sometimes
weeks. Now, it only takes seconds.

Creating new e-mail messages

Your inbox is quite similar to a file that contains your incoming mail. Whenever you
receive an e-mail it is delivered to your mailbox, which is usually located in a mail server.

LRDU-LG-ITICOR0271C-1.0 23
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Inbox contains messages that


have been sent to you. It records
the total number of messages
stored

In order to access your e-mail inbox, you need to sign in by entering your username and
password.

To access the login screen, you need to take the following steps:
 Type the domain name and the extension in your browser, for example,
hotmail.com
 Enter your e-mail address in the required section
 Enter your password
 Click login or simply press the Enter key

You will be taken to your inbox as shown in the photo above.

To create an e-mail, click on new and the following window will appear:

LRDU-LG-ITICOR0271C-1.0 24
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Enter the
Enter the
recipient’s
subject of the
address
message
here

Click Send after Enter the


you have body of
completed your your
message message

CHECKPOINT

1. How many parts does an e-mail address consist?


2. What are some benefits of using e-mails to communicate?

LRDU-LG-ITICOR0271C-1.0 25
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

ACTIVITY

1. As supervisor of your team, you were told that there will be an


after-work social on Friday, August 4, 2017. You are tasked
with the responsibility of inviting the members of your team to
this party. The party is semi-formal function, and each team
member may bring one guest.
Send an e-mail to each member of your team, inviting him/her
to this function. Ensure that you include all the relevant parts
of the message and that you adhere to netiquette

Create and Add an Automatic Signature for the User

An automatic signature can be added to the end of your outgoing messages. You can
create different signatures for different recipients. For example, you may wish to add
only your first name to messages to family or friends, but for business contacts, you may
wish to add your full name, e-mail address and business details.
You can also differentiate between the signatures added to the end of:

 new messages you create


 your replies to messages and messages you forward

You can place your personalized signature to your composed document. To do this, you
can scan your signature or have an electronic copy of the signature [use an electronic
pen]. Then, on the compose window click in checked box beside use my signature.

LRDU-LG-ITICOR0271C-1.0 26
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

ACTIVITY

1. Use a method of your choice and add an automatic


signature to your e-mail account.

Attach Files to the E-Mail Message Where Required

An e-mail attachment is a file that is sent with an e-mail message. The contents of the
attachment are hidden until the attachment is opened in the application software that
was used to create it. When a document is created in Microsoft Word, Excel, Access, or
any other type of programme, any formatting within that document, represented by
hidden codes, cannot be typed into an e-mail. It is for this reason that the formatted file
is attached to, rather than displayed within, the e-mail message.
To send an attachment from a Microsoft e-mail server, do the following:

Click on the attachment icon and follow


the instructions; you will be required to
browse and locate the file that you wish
to attach; select the file and upload it to
your e-mail message.

LRDU-LG-ITICOR0271C-1.0 27
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

CHECKPOINT

1. What is an e-mail attachment?


3. How does sending an e-mail message as an attachment
affect the security of the message?

ACTIVITY

1. Use a search engine of your choice and research computer


ergonomics; compile this data in a Microsoft Word document
and e-mail it to your instructor as an attachment.

Determine, Set Priority, and Send E-Mail Messages

Some ISP’s allow you to prioritize your message. When you use this facility, the message
is listed in the recipient's Inbox; the message priority will be indicated by an icon
displayed to the left of the message details.

The levels of message priority are below:

High priority - will display a red explanation mark


Normal priority - does not display a special icon
Low priority - will display a blue downward pointing arrow

When recipients open a prioritized message, a line appears above the Message Header
displaying "This message was sent with High (or Low) importance."

To send an e-mail, as noted previously, click on Send in the bottom left corner of the
message screen if you are sending a Windows mail or from the Toolbar, depending on
which e-mail server you are using.

LRDU-LG-ITICOR0271C-1.0 28
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Reply to and Forward a Received Message Using Available Features

When replying to, or forwarding a message, the message can either be opened or just
highlighted in the Display Window.

To reply to a message, select Reply from the Toolbar. The Message Window will open
with the Title Bar displaying the subject of the message preceded by ‘RE:’ The 'To'
textbox is automatically readdressed to the sender and the 'Subject' line displays the
subject of the message, also preceded with ‘RE:’ Underneath the Subject line, a blank
area is available for the reply to be entered. The insertion point is automatically
positioned in this area, below which is displayed the original message headed with the
words 'Original message' and repeating the 'From', 'Sent', 'To' and 'Subject' details.

After typing the reply to the message, it can be sent by selecting Send from the Toolbar.

To reply to a message that has several recipients, select Reply to All from the Toolbar. In
such situations, when the Message Window opens, the 'To' text box and also the 'Cc' text
box are automatically readdressed. Then, reply and send the message as previously
noted.

To forward a message, select ‘Forward’ from the Toolbar. The Message Window will
open as with replying, except that the subject of the message will now be preceded by
'FW:'. instead of RE. All other details and procedures are the same as noted above.

ACTIVITY

Compose and send an e-mail to two of your classmates


informing them of a group assignment on which you are
supposed to be working.

You are required to read and respond to each other and


then forward the responses of each group member to your
instructor.

LRDU-LG-ITICOR0271C-1.0 29
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Open and Save an Attachment to the Relevant Folder

When a message which includes an attached file is received, a symbol appears in the
shape of a paperclip to the left of the message displayed in the Inbox folder.

As a security measure and a virus check, it is advisable to save attachments to disk and
scan them prior to opening. It is only recommended that the attachment be opened from
its location, if you are completely sure that it has been sent from a secure site.

To open an attachment, locate and open the message that has the attachment. The
Message window opens, displaying an additional line underneath the Subject line,
labelled 'Attach?’ Details of the attached file are displayed, comprising an icon of the
programme in which the attachment was created together with the filename. Click on
the file or simply click Download, and click on Open; the file will open in the
appropriate application. You can read your file and you can also save your file in
whatever location you desire.

Indicate the drive, folder and name by which the attachment is to be saved in the 'File
name:' text box - the highlight is automatically positioned in the 'File name': text box.
Select save. This will save the attachment by the file name given in the drive and folder
specified.

CHECKPOINT

1. Outline the procedures for opening an attachment and saving it to


the relevant folder.

Search for, Sort, and Save E-Mail Message Using Available Setting

The Sort feature enables messages to be sorted by specific fields in ascending or


descending order, last name or first name etc. Messages will be displayed in the order
chosen. (Screen capture shown below for Outlook).

LRDU-LG-ITICOR0271C-1.0 30
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Click on
Filter

Click on
Sort

You may also save your messages in folders. The default folders provided in Outlook are
Outlook Today (Personal Folders), Calendar, Contacts, Deleted Items, Drafts, Inbox,
Journal, Notes, Outbox, Sent Items and Tasks. Alternatively, you may create your own
folder. The following explains the purpose of the e-mail message folders:

Drafts - stores messages you are currently working on


Sent Items - lists messages you have sent
Outbox - lists messages that are waiting to be sent
Inbox - lists messages that you have received
Deleted Items - lists items that have been deleted

CHECKPOINT

1. What does the term ‘flag’ mean?


2. What are the purposes of sort and search?:
3. What is likely to happen to your e-mails that have been in
your inbox for several weeks?

LRDU-LG-ITICOR0271C-1.0 31
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

ACTIVITY

1. You are required to log into your e-mail account, sort, and save
the messages in your inbox in date order.

Adjust E-Mail Accounts to Restrict and Quarantine Possible E-Mail Security Problems

Messages may be quarantined based on key words


KEY CONCEPT or specific file types. To quarantine e-mails, a built-
in feature/content filter agent will scan your
Quarantine
incoming mails and will check key words and
To quarantine an e-mail message specific file types to determine whether to
means that you hold the specific quarantine a particular e-mail. All mails that are
message in isolation of the regular
considered suspicious will be placed in a
quarantined folder. When you enable the spam
mails, or simply do not allow it to
confidence level (SCL) quarantine threshold, all
be placed in your inbox to avoid
quarantined messages are placed in the spam
possible infection.
quarantine mailbox that you specify.
.
Not all messages that are quarantined are necessarily
infectious or malicious and so you may need to recover
or release the mails that were incorrectly quarantined.

CHECKPOINT

1. What does the word quarantine mean ?


2. How important is it to quarantine e-mail messages that are
perceived as suspicious ?

LRDU-LG-ITICOR0271C-1.0 32
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Print E-Mail Messages as Required

To print e-mail messages, you can download the attachment, open with the appropriate
application software, and print as a regular document. To print an e-mail message in
Microsoft Outlook:
 Click on the ellipses to the right of Category on the Menu bar
 Scroll down and click on print and follow the prompts

ACTIVITY

Log into your e-mail account and print one of your messages
that do not have an attachment.

NB. Ask your instructor for the name of the local printer to
print the document

References

1. Christian, C. (1995). The ABCs of the Internet. Dryden Press

2. How to Change a message’s Priority in Windows Mai. (20l7).


Retrieved from https://www.lifewire.com/change-message-priorityoutlook-
1173554

3. Lowe, D. (1999). Internet explorer 5 for Windows for dummies. Hungry Minds

4. Mueller, S. (2000). Upgrading and repairing PCs (12th ed.). Indianapolis, IN: Que.

5. Dallas, P. (1997). Internet training manual for teachers. Kingston: KNG

LRDU-LG-ITICOR0271C-1.0 33
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

READY TO ASSESS YOUR COMPETENCE?


Now that you have completed this element, check if you have fully grasped all
the components by doing the following self-assessment:

Self-Assessment Checklist Yes No


1. I can open e-mail application package, create and e-mail new
messages, and add addresses ( ) ( )

2. I can create and add an automatic signature for the user ( ) ( )

3. I can attach files to the e-mail message where required ( ) ( )

4. I can compose text of an e-mail message according to organizational


guidelines, spell-check, and edit text as required ( ) ( )

5. I can determine, set priority, and send e-mail messages ( ) ( )

6. I can reply to and forward a received message using available features ( ) ( )

7. I can open and save an attachment to the relevant folder ( ) ( )

8. I can search for, sort, and save e-mail message using available setting ( ) ( )

9. I can adjust e-mail accounts to restrict and quarantine possible e-mail


security problems ( ) ( )

10. I can print e-mail messages as required ( ) ( )

LRDU-LG-ITICOR0271C-1.0 34
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

ELEMENT 3 SEARCH INTERNET

Learning Outcomes
Upon completion of this unit you should be able to:

 Open Internet application, locate, and access a search engine on the Internet, and
define search expressions based on data required
 Enter appropriate key words into the search engine to locate desired information
 Refine a search depending on outcomes of original search
 Save a search’s expression results and present them in a report according to
information required
 Create a bookmark within the Internet browser or a link for the required web
page for the key results
 Save key results in a bookmark folder
 Modify Internet browser options for printing and print a web page
 Close Internet browser

Review Organizational Guidelines on Internet Access


Organizations generally have policies and procedures regarding Internet access and usage.
It is imperative that you familiarize yourself with these rules and procedures before you
even consider accessing the Internet. These guidelines are generally implemented to
protect the company’s security and productivity.
Sometimes employees waste a lot of time on the Internet performing personal
transactions; this results in waste of company’s time and money. There may also be sites
that are deemed off-limits during work hours. Organizations implement these guidelines
for one reason or the other, so be sure to know and adhere to them.

LRDU-LG-ITICOR0271C-1.0 35
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Open Internet Application, Locate, and Access a Search Engine on the Internet, and
Define Search Expressions Based on Data Required/Enter Appropriate Key Words into the
Search Engine to Locate Desired Information

KEY CONCEPT To open an Internet application, you first need to


access the Internet; you do this by using your choice
Search Engine browser. After which, you will enter the URL or web
address into the appropriate section of your browser.
This is an Internet application This will take you to your desired search engine.
that returns a ranked list of
documents from a large
database of online documents When you first begin to work with search engines, it
in response to a search query. is advisable to consult their online documentation
Most search engines are located under the Help or Search Tips link. You can
stay abreast of what is happening with search engines
available free of cost on public
by visiting Search Engine Watch at the following
Web servers
address: (http://www.searchenginewatch.com). This
site offers timely articles, reviews and performance
evaluations.

When using Internet Explorer, there are two areas where the search topics can be typed.
These are:

 search pane
 address bar

The Address bar (screen capture shown below) is mainly used to either type the URL of
the Web site required or to display the URL for the active web site. However, a keyword
search can also be activated from the Address bar. In such a case, the query is directed to
the browser's default search engine.

LRDU-LG-ITICOR0271C-1.0 36
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

You can access the search option


by typing your query here

You can access the search option


by typing your query here

When the search is complete, regardless of which search method is used, a list of hits is
displayed. Each category or site listed is a hyperlink and will access either a further list of
related sites (if a category) or a web site on that topic. The list generally includes the
name of the site, the URL and a brief description, with the most relevant usually listed

Search Methods

Subject search - Subject search lists


web sites by categories. It is best used
when looking for general topics such
as: Arts, Education, Health, News
and Media, Science. Examples are:
www.yahoo.com (this also supports
a keyword search)
www.looksmart.com.

Keyword search - A keyword search is used to search for keywords. Keywords can be
commands or parameters and are used by a search engine in its search for relevant web
pages. They are best used for more specific topics such as: volcanoes, tigers, racing cars,
diamonds, etc. Examples are: www.altavista.com, www.excite.com, www.yahoo.com

LRDU-LG-ITICOR0271C-1.0 37
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

(this also supports a subject search) www.lycos.com, www.google.com, www.seti-


search.com, www.raging.com

Meta search - A meta search is used to search several search engines at once. It is excellent
to use when cross-referencing web sites. Examples are: www.dogpile.com ,
www.metacrawler.com www.savvysearch.com

CHECKPOINT

1. What is a search engine?


2. Give five examples of search engines.
3. Describe the process of accessing a search engine.

ACTIVITY

1. Use a search engine of your choice and conduct a research


on how to get the best from your search engines. Compile a
report and share with the rest of the class.

Refine a Search Depending on Outcomes of Original Search/Save a Search Expression


Results and Present Them in a Report According to Information Required

The secret of effective web searching is to make the first ten documents in the search
engine’s hit list the ones you need to see. This means you should
become familiar with the available resources and learn to
thoughtfully analyze your information needs.

Thus, before you begin searching for information, it is best to plan


how the search query you are going to use is to be formulated.
Remember, a general search query will give general results. The more information the
search query contains, the shorter and more accurate the results will be.

When planning the search query, you will also need to consider the order of the
keywords. The search will concentrate on the words that are entered first; for example,

LRDU-LG-ITICOR0271C-1.0 38
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

searching for ‘tea leaf’ would give first priority to 'tea', whereas searching for ‘leaf tea’
would give first priority to 'leaf'.

After you have made an initial search, you will have adequate information to narrow an
additional search. You may examine the key words that were used in the initial search
and make adjustments where you become specific depending on how far or near the
content of the initial search matches your key word. You may need to remove or change
some key words or include additional keywords.

You can save the results of your search by highlighting/blocking the content, copying it,
and then paste it in the application that you are using to sort/compile the data and
report.

CHECKPOINT

1. Outline how you would refine a search phrase and conduct


a follow-up search for the same information/data.
; 2. Describe how you would save this information/data in a
specific application.

Create a Bookmark within the Internet Browser or a Link for the Required Web Page For
the Key Results/Save Key Results in a Bookmark Folder

When you find a web site that you wish to revisit often, rather
than writing down its URL to retype it later, you can add it to
your Bookmarks (a Netscape Navigator term) or Favourites
(Microsoft Internet Explorer term) . This will allow you to
record and access regularly-visited Web sites from the menu
bar without re-typing the URL. Click on Favourites on the
menu toolbar, select Add a Favourite then write the
appropriate web site information you wish to bookmark and
then click Add.
You can also add to Favourites Bar.
You can also save and organise your favourites in the associated bookmark folder. This is
accomplished by clicking New Folder.

LRDU-LG-ITICOR0271C-1.0 39
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

CHECKPOINT

1. What are bookmarks?


2. Explain the importance of bookmarks when you are
conducting a research.

ACTIVITY

Follow the procedures/steps outlined in the document and create a


bookmark for a site that you think contains valuable information
that you do not wish to lose

Modify Internet Browser Options for Printing and Print a Web Page/Close Internet
Browser

Most documents you acquire through a web site cannot be


modified on the site itself. Most sites also prevent you from
making changes to their documents. Hence, you have to copy
these documents from the sites to a desired location, e.g.
Microsoft Word to make any modifications. If you wish to print
an image you can right click on image, click Print Picture, select
the installed printer, enter the number of copies to be printed, and then click Print. You
may also print Web pages directly by clicking on File and selecting the print option. On
some Web pages, an icon often appears in which case you can simply click on it.

To close a tab in the browser, click File on the Menu toolbar then Close tab. To exit the
browser, click File on the Menu toolbar, then Exit or simply click on the X in the top
right corner of the screen or on the title bar.

LRDU-LG-ITICOR0271C-1.0 40
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

References

1. Chadwick, T. B. (2001). How to Conduct Reearch on the Internet.


Retrieved from http://www.tbchad.com/resrch.html

2. Christian, C. (1995). The ABCs of the Internet. Dryden Press.

3. Create bookmarks to save your favorite webpages. (2017). Retrieved from


https://support.mozilla.org/en-US/kb/create-bookmarks-save-your-favorite-
webpages

4. Jaclson, C. (2017). Researching Online. Retrieved from


https://support.mozilla.org/en-US/kb/create-bookmarks-save-your-favorite-
webpages

5. Littell, M. (2017). Search Engines. Retrieved from


http://www.classzone.com/books/research_guide/page_build.cfm?content=search
_engines&state=none

6. Lowe, D. (1999). Internet explorer 5 for Windows for dummies. Hungry Minds

7. Parson, A. (2017). How to Bookmark a Web Page. Retrieved from


https://www.techwalla.com/articles/how-to-bookmark-a-web-page
8. Patel, S. (2012). 5 Tips for Conducting Semantic Keyword Research. Retrieved
from https://www.searchenginejournal.com/5-tips-for-conducting-semantic-
keyword-research/43538/

LRDU-LG-ITICOR0271C-1.0 41
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

READY TO ASSESS YOUR COMPETENCE?


Now that you have completed this element, check if you have fully grasped all the
components by doing the following self-assessment:

Self-Assessment Checklist Yes No


1. I can review organizational guidelines on Internet access ( ) ( )

2. I can open Internet application, locate, and access a search engine


on the Internet, and define search expressions based on data
( ) ( )
required

3. I can enter appropriate key words into the search engine to locate
desired information ( ) ( )

4. I can refine a search depending on outcomes of original search ( ) ( )

5. I can save a search expression results and present them in a report


according to information required ( ) ( )

6. I can create a bookmark within the Internet browser or a link for


the required web page for the key results ( ) ( )

( ) ( )
7. I can save key results in a bookmark folder

8. I can modify Internet browser options for printing and print a web
( ) ( )
page

9. I can close Internet browser ( ) ( )

LRDU-LG-ITICOR0271C-1.0 42
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

ELEMENT 4 ACCESS AND USE CONSUMER SPECIFIC SITES ON


THE INTERNET

Learning Outcomes
Upon completion of this unit you should be able to:

1. Identify, access, and review information specific for specific sites to gain consumer
information
2. Identify and use Internet application sites to lodge details and gain access and
information
3. Access and use online forums on the Internet

As a Customer Engagement/Business Process Outsource (BPO)


employee, you will be required to access websites that are specific to
the needs of your clients or even your employer. Employees in the
BPO industry generally work for specific accounts or clients; for
example, some persons may be working for International Business
Machine (IBM) and are required to access websites that are specific to IBM.

Your firm will provide you with their policies, procedures, and protocols regarding how
you access and utilise these sites. Ensure that you are well-acquainted with these
procedures and protocols because it may be the difference between being employed and
being unemployed. The BPO industry requires extreme confidentiality with the data and
information to which the employees have access; when you access and review consumer
information, use this information only for its intended purpose.

CHECKPOINT

Why is it important that you adhere to the policies and procedures


of your firm regarding how you access and use consumer
information?

LRDU-LG-ITICOR0271C-1.0 43
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Access and use Online Forums on the Internet

KEY CONCEPT Some organisations have implemented online


discussion boards or forums for their employees so
Online Forums that they may obtain instant assistance on most, if not
all issues that they may encounter on a daily basis.
These are Internet message These online forums usually include experts in various
boards that contain online areas that can provide instant solutions to issues or
discussion where individuals queries that employees in various locations may have.
can have live synchronous or
asynchronous conversations There are usually guidelines and procedures for using
about specific or a multitude an organisation’s online forum. Ensure that you
of topics familiarise yourself with these guidelines so that you
can access and use these forums as intended, guided
by the appropriate protocols, to avoid
embarrassment.

CHECKPOINT

1. How can online forums benefit an organization and its employees?

LRDU-LG-ITICOR0271C-1.0 44
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

READY TO ASSESS YOUR COMPETENCE?


Now that you have completed this element, check if you have fully grasped all the
components by doing the following self-assessment:

Self-Assessment Checklist Yes No

1. I can identify, access, and review information specific for specific sites
to gain consumer information ( ) ( )

2. I can identify and use Internet application sites to lodge details and
gain access and information ( ) ( )

3. I can access and use online forums on the Internet ( ) ( )

ELEMNET5 UNDERTAKE ONLINE TRANSACTIONS

Learning Outcomes
Upon completion of this unit you should be able to:

1. Access online transaction site


2. Ensure security of transaction site
3. Enter required information into fields on merchant’s website
4. Enter, check, and make changes to preferred transaction option
5. Complete online transaction
6. Record and archive receipts according to business processes
7. Ensure pop-up dialog boxes, prompts, or feedback mechanisms are completed
8. Close down and leave transaction process

LRDU-LG-ITICOR0271C-1.0 45
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Access Online Transaction Site/Ensure Security of Transaction Site

When you are conducting online business transactions, it is critical that you ensure that
the security on the particular site is up-to-date. You need to adhere to your firm’s
procedures and guidelines for accessing these transactions in order to maintain security
and confidentiality of the information.

Generally, firms have security administrators who are responsible for all online security
issues. If you suspect that the security of the site may be compromised in the slightest
manner, you need to close the transaction and immediately inform the appropriate
personnel in your firm according to the policies and procedures. Wait for advice of the
security administrator before you attempt another transaction on that particular site.

CHECKPOINT

1. Discuss the importance of ensuring that a site on which you are


carrying out a transaction is safe and secure.

2. What are some transactions that may be carried out on a site?

ACTIVITY

Conduct a role-play in which you are in the middle of a


transaction with a customer and you realized that a security
feature appears to have been breached. How would you deal with
the situation?

LRDU-LG-ITICOR0271C-1.0 46
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Enter Required Information into Fields on Merchant’s Website/Enter, Check, and Make
Changes to Preferred Transaction Option

Generally, employees who are required to work with


company specific software or websites as part of their daily
routine are trainedto manipulate the specific software or
website. The same goes for persons who are working in the
BPO industry. Regardless of your qualifications, you will be
trained on how to use the software and website.

Software generally have a specific method of entering information. Some fields cannot be
left empty; they are required and the transaction will not be complete until all those
fields have been populated. The optional fields are exactly that; optionalIf left blank,
they will not affect the completion of the transaction.

Similar to any area in which you are required to input data/information, you need to
verify the data that was entered against the source document to ensure that it is correct
in all regards. There may be times when you are required to make adjustments to a
transaction, whether because of error on your part or a change in choice by the
customer. Simply observe the firm’s policy and procedures for making such adjustments.
Your firm may require that you document any change that you make to a transaction.
Remember to do this and note the reason for the change. Confidentiality and security are
major elements in any industry, especially the BPO, with the increase in “scamming” and
hacking.

Complete Online Transaction/Record and Archive Receipts According to Business


Processes

After you complete each online transaction you may need to document and archive each
receipt based on the policy of your firm. When you are documenting and archiving these
receipts, do so under the established guidelines of your firm.

LRDU-LG-ITICOR0271C-1.0 47
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

CHECKPOINT

Why is it important to verify data/information that you enter into


a software or website ?

How might a transaction be affected when you do not enter data


in all required fields ?

Discuss the need to document/record and archive online


transaction receipts.

Ensure Pop-Up Dialog Boxes, Prompts, or Feedback Mechanisms are Completed/Close


Down and Leave Transaction Process

Before you close and leave a transaction, you need to ensure that
all pop-up dialog boxes, prompts, and feedback mechanisms are
completed. You do not want to close any of these before the
transaction or task has been completed. Doing so may result in the
loss of valuable data, which translates into money and time for
your firm. If you are required to prematurely close a transaction,
you need to save the transaction so that you may continue when
you log into your system the next time.

LRDU-LG-ITICOR0271C-1.0 48
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Some software do not give you the permission to save a transaction and complete it in
the future; if the transaction is not complete, you will be required to start all over.

Security and confidentiality dictate that all transactions be completed before you close
and leave the application.

References

1. Online Transaction Types. (2017). Retrieved from


http://www.financemagnates.com/fintech/payments/online-transaction-
types-2/
2. Online Transactions. (2003). Retrieved from
http://www.encyclopedia.com/books/educational-magazines/online-transactions
3. Dave, R., & Thanawala, H. (2016). 3 types of cashless transaction option via
prepaid payment instrument for you. Retrieved from
http://economictimes.indiatimes.com/wealth/spend/a-look-at-various-cashless-
options/articleshow/55508641.cms
4. Advantages and Disadvantages of Online Transaction Processing Systems. (2015).
Retrieved from http://www.onlinecmag.com/advantages-disadvantages-online-
transaction-processing-systems/

LRDU-LG-ITICOR0271C-1.0 49
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

READY TO ASSESS YOUR COMPETENCE?


Now that you have completed this element, check if you have fully grasped all
the components by doing the following self-assessment:

Self-Assessment Checklist Yes No


1. I can access online transaction site/Ensure security of transaction
site ( ) ( )

2. I can enter required information into fields on merchant’s


website ( ) ( )

3. I can enter, check, and make changes to preferred transaction


option ( ) ( )

4. I can complete online transaction ( ) ( )

5. I can record and archive receipts according to business processes ( ) ( )

6. I can ensure pop-up dialog boxes, prompts, or feedback


mechanisms are completed ( ) ( )

7. I can close down and leave transaction process ( ) ( )

LRDU-LG-ITICOR0271C-1.0 50
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

ELEMENT 6 CONDUCT AN ADVANCED SEARCH

Learning Outcomes
Upon completion of this unit you should be able to:

1. Use search tools and advanced search features


2. Use Boolean search techniques when required to enhance the search
3. Use multiple or meta-search tools with a range of key words
4. Use search engines particular to a field of knowledge to refine the outcomes

KEY CONCEPT Depending on the enormity or level of your research,


you may need to resort to advanced search features
Search Tools and multiple search tools.
These are services that are
available online to assist you There are various search tools that can assist you with
when you are conducting your search; these include:
research.  Internet directories
 Search engines
 Meta-search engines

Internet Directory
This is also referred to as Web directory and it organises Web sites according to subject;
they are generally maintained by humans. They are a list of links or listings of websites.
When you are conducting your searches, you can search in a series of categories and
menus. These databases are usually smaller than those of a search engine’s.

Meta search - A meta search is used to search several search engines at once. It is excellent
to use when cross-referencing web sites. Examples are: www.dogpile.com,
www.metacrawler.com, www.savvysearch.com
Search Engines
These are online software that search databases that contain words or characters that you
specify, and identify terms similar to your specification. The most popular search engine
is Google.

LRDU-LG-ITICOR0271C-1.0 51
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Advanced search options are useful features that are offered by a number of search
engines and search tools on the Web. It gives you the
ability to narrow your searches by using different filters,
including:
 Language – specifies the language in which the
search results should be displayed
 Domain – allows you to limit your search to specific
domain(s) or server(s)
 Region – geographic region within which the search should be centred
 Last updated date – date when the content of the article was last updated
 Safe search – offers filters for language, explicit images or things or websites that
you would wish to avoid
 Reading level – allows you to determine reading level of search results
 File type – file type in which you wish the search results to be displayed
 Usage rights – locate pages for which content you have permission to use

Advanced search features enable you to conduct more powerful searches; it makes
researching much more effective and efficient.

In order to help you to be more specific in your search and improve the chances of
finding the required information, there are certain search parameters that can be used.
These include:
 keywords
 exact Phrase
 plus/minus symbols
 booleans
 wildcards
KEY CONCEPT

Boolean Search

This type of search enables the


researcher to combine keywords
with various operators such as
AND, NOT, OR

LRDU-LG-ITICOR0271C-1.0 52
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Boolean operators
 AND – is used to include two search terms
 NOT – is used to exclude a specific term from your search
 OR – is used to broaden your search by including multiple terms
 Quotes – you can place your search terms in quotes if you need to obtain the
exact phrase
 Parenthesis - are used to combine modifiers to create a complex search

When you are researching information on the Web, you should endeavor to utilize the
following guidelines:

 Use several search tools


 Read search tips of help information at each search engine
 Search using key words
 Utilise bookmarks/favourites to save important webpages

CHECKPOINT

1. What are search tools?


2. List five of the most common search engines
3. What are Boolean operators?
4. What parameters would you use to search for?
- various forms of a word
- a specific phrase

ACTIVITY

Use a search engine of your choice and conduct research on the


difference between Web directories and search engines. Utilize the
following Boolean operators in your search:

 AND
 NOT
 OR
Share your findings with your colleagues/classmates

LRDU-LG-ITICOR0271C-1.0 53
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Use Search Engines Particular to a Field of Knowledge to Refine the Outcomes/Access


Related Virtual Community Sites and Newsgroups, and Note Their Objectives and
Operational Arrangements

Depending on the particular field in which you are


conducting research, you may be able to access databases
that have a wealth of information in that specific discipline.
This can make your research experience less stressful and
more enjoyable. Organizations such as schools and colleges
tend to have databases that are arranged according to
discipline and subject area. When you are searching these
databases you can utilize the advanced search tools and features outlined in the previous
sections.

Additionally, you can access virtual community sites and newsgroups to obtain
information. You need to be mindful of the date, quality, and conditions of use of these
contents. A virtual community is a social network of individuals who communicate using
social media. These networks usually span wide geographical and political boundaries;
these individuals usually discuss topics that are of mutual interest.

Newsgroups are discussion forums in which the participants discuss specific topics. Both
virtual community websites and newsgroups can provide some amount of information or
data that may prove useful in your particular area of research. Be mindful that the
information you include in your report must be credible and reliable.

CHECKPOINT

1. Differentiate between virtual community sites and newsgroups.


2. How can databases that are associated with specific fields of
study be beneficial when you are conducting research?

LRDU-LG-ITICOR0271C-1.0 54
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

References
1. Beal, V. (2017). Boolean search. Retrieved from
http://www.webopedia.com/TERM/B/Boolean_search.html

2. Boswell, W. (2016). What is a Web Directory? Retrieved from


https://www.lifewire.com/what-is-web-directory-3482036

3. Boswell, W. (2017). What are Advanced Search options? Retrieved from


https://www.lifewire.com/what-are-advanced-search-options-3481444

4. Mitchell Communications Group. (2013). Why You Need Advanced Research.


Retrieved from http://blog.mitchcommgroup.com/mitchell-communications-
group/why-you-need-advanced-research

5. Usernet and Newsgroups: What is Usernet? (2017). Retrieved from


http://www.internet-guide.co.uk/newsgroups.html

6. What are newsgroups? (2017). Retrieved from http://www.internet-


guide.co.uk/newsgroups.html

LRDU-LG-ITICOR0271C-1.0 55
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

READY TO ASSESS YOUR COMPETENCE?


Now that you have completed this element, check if you have fully grasped all the
components by doing the following self-assessment:

Self-Assessment Checklist Yes No

1. I can use search tools and advanced search features ( ) ( )

2. I can use Boolean search techniques when required to enhance


the search ( ) ( )

3. I can use multiple or meta-search tools with a range of key words ( ) ( )

4. I can use search engines particular to a field of knowledge to


refine the outcomes ( ) ( )

5. I can access related virtual community sites and newsgroups, and


note their objectives and operational arrangements ( ) ( )

6. I can conduct a search with domain names to refine the search ( ) ( )

LRDU-LG-ITICOR0271C-1.0 56
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

ELEMENT 7 USE INFORMATION THAT HAS BEEN LOCATED

Learning Outcomes
Upon completion of this unit you should be able to:

1. Cross reference information found by using several websites to determine accuracy


of information.
2. Check date that website was last updated or properties of website to determine
currency of information.
3. Determine website authority by looking at copyright statements, privacy
statements and organisational information
4. Save and print information found in different file forms.

When evaluating Internet sites for authority, reliability, and authenticity be sure todo the
following:
 Be clear about the purpose of the research.
 Know what information you want and do not want.
 Look at author’s credentials.
 Look for evidence of quality control (e.g. information presented on organisational
website and peer reviewed material).
 Look for evidence of lack of credibility (e.g. anonymous author, bad grammar and
misspellings).
 Note when information was made available and determine relevance.
 Ensure information is comprehensive.
 Consider the intended audience and purpose of the information.
 Look for corroboration of information.

When you conduct research it is imperative that you cross reference or


triangulate your information to ensure validity, reliability, and
authenticity. When your information is supported by multiple sources,
it becomes more credible and authentic. This does not mean that
information that is garnered from a single source is inaccurate. Cross-
referencing researched information will inform you of the level of
authority the author has in the area and it adds value to your final
work.

Researched information is also more credible when it is recent or current. We are living
in a dynamic world where things change rapidly; information that was valid six years ago
may not be valid or applicable today. It is advisable to include information from sources
not older than five years. There are some areas or fields in which information is never

LRDU-LG-ITICOR0271C-1.0 57
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

perceived as being out-of-date. In some aspects of technology, older information is


required to substantiate new claims.

CHECKPOINT

1. Why is the date of information that you include in your research


report important?
2. How can outdated information affect a firm?

Determine Website Authority by Looking at Copyright Statements, Privacy Statements,


and Organizational Information

Not all websites have the same level of credibility, especially


as it relates to conducting research, more so, academic
research. For example, it is advisable that you avoid
including content from Wikipedia in your research.

Google scholar is an excellent site to use when you are


conducting high quality research. It is considered far more
superior than your regular Google search because it gives you
access to scholarly, peer-reviewed articles.

You can check the authority of a particular website by examining its copyright and
privacy statements as well as the information of the particular organization that owns the
website. This is generally located at the bottom of each website as afooter. It is essential
that you include all relevant copyright information about the website in your document.

Save and Print Information Found in Different File Forms

After you have located your information, you need to save and print the document. The
saving and printing procedures may vary slightly depending on the format of the content
or materials.
To save information that is in HTML format, you simply block or highlight the content,
copy, and paste in a word processing application and follow the regular method of
saving a word processing file.

LRDU-LG-ITICOR0271C-1.0 58
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Saving a Web document that is in PDF format requires that you:


 Right-click the link to the PDF file, and then click Save Target As from the sub-
menu.
 The File Download dialog box opens and a progress bar will allow you to view
and monitor the progress of the download.
 When the file has finished downloading, the Save As dialog box will open.
 Specify the location on your computer where you wish for the file to be saved
and then press the Save button.

To print the files, regardless of format, you need to locate and open the file:
 Click on File on the menu bar
 Scroll down and click on Print
 Verify the local printer that is installed on your computer,set your printing
preferences and click OK

CHECKPOINT

1. How do you locate the copyright information on a website?


2. Explain how to save and print information that is in different
format from the Internet.

LRDU-LG-ITICOR0271C-1.0 59
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

References

1. Appleyard, D. (2008). The Footer Copyright Notice. Retrieved


from https://designshack.net/articles/the-footer-copyright-notice/

2. Copyright notices on Websites. (2017). Retrieved from


https://www.copyright.com.au/about-copyright/website-terms/
3. Sample IT policies, disclaimers andnotices. (2017). Retrieved from
https://www.nibusinessinfo.co.uk/content/sample-internet-copyright-notice-
guidelines
4. Website Copyright Statement. (2016). Retrieved from
https://www.asprs.org/other-news-a-advocacy/website-copyright-statement.html

READY TO ASSESS YOUR COMPETENCE?


Now that you have completed this element, check if you have fully grasped all the
components by doing the following self-assessment:

Self-Assessment Checklist Yes No


1. I can cross reference information found by using several websites to
determine accuracy of information ( ) ( )

2. I can check date that website was last updated or properties of


website to determine currency of information ( ) ( )

3. I can determine website authority by looking at copyright


statements, privacy statements, and organizational information ( ) ( )

4. I can save and print information found in different file forms ( ) ( )

LRDU-LG-ITICOR0271C-1.0 60
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

Learning Resources Development Department


Learning Resources Development Unit
Learner Guide Feedback Form

Your feedback on the Learner Guide is important to us. Please complete the form below to
indicate areas for review as necessary. For each component tick [√ ] the appropriate box.

Learner Guide Title:

Learner Guide Code:

LEARNER GUIDE INVES IGATION


Area of Concern Good Fair Weak Element/Page
Self As essment Checklist
Content
Activities
Checkpoints
Element Checklists
Graphics
References
Details of Concern:

Other Comments:

Your contact details:

Learner Instructor Institution:

Telephone #: E-mail:
Please cut along the dotted line and submit to:
Learning Resources Development Unit, Learning Resources Development Department
Gordon Town Road, Kingston 6. Tel: 977-1700-5; Fax: 977-1115/977-1707

LRDU-LG-ITICOR0271C-1.0 61
August 2017
USE, COMMUNICATE AND SEARCH VIA THE INTERNET

LRDU-LG-ITICOR0271C-1.0 62
August 2017

Anda mungkin juga menyukai