Anda di halaman 1dari 29

11

Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills
11

Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills

Module in Empowerment Technologies


Author: MARIA BUENASGRACIA O. NOBLETA
School: SENIOR HIGH SCHOOL IN MALVAR
School Address: MALVAR, BATANGAS
For the learner:

Welcome to the Empowerment Technologies Alternative Delivery Mode (ADM) Module


on Introduction to ICT, Online Safety and Contextualized Online Search and
Research Skills. This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning resource while being an active
learner.
This module has the following parts and corresponding icons:

This will give you an idea of the skills or


What I Need to Know competencies you are expected to learn in the
module.
This part includes an activity that aims to
What I Know check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.
This is a brief drill or review to help you link
What’s In the current lesson with the previous one.
In this portion, the new lesson will be
What’s New introduced to you in various ways such as a
story, a song, a poem, a problem opener, an
activity or a situation.
This section provides a brief discussion of the
What is It lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent
What’s More practice to solidify your understanding and
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.
This includes questions or blank
What I Have Learned sentence/paragraph to be filled in to process
what you learned from the lesson.
This section provides an activity which will
What I Can Do help you transfer your new knowledge or skill
into real life situations or concerns.
This is a task which aims to evaluate your
Assessment level of mastery in achieving the learning
competency.
In this portion, another activity will be given
Additional Activities to you to enrich your knowledge or skill of the
lesson learned. This also tends retention of
learned concepts.
This contains answers to all activities in the
Answer Key module.

NOTE: please do not write ANYTHING on this MODULE, write your answers on your
notebook.
Introductory Message
For the facilitator:

This will aid in teaching competencies that are essential in the Information Age, such
as the state of ICT Technologies; online safety, security, ethics and etiquette;
productivity tools with advanced application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change,
which are aligned to the standards set by the Department of Education for the senior
high school level.

For the learner:

(This module contains information about: the massive world of Information and
Communication Technology (ICT) has continued to shape the world including the
Philippines. This unit allows you to discover the world of ICT in general and also helps
you improve your skills in various applications. It also creates several real-life
scenarios where you can use these applications and resources properly.

What I Need to Know

This module was designed and written with you in mind. It is here to help you
master the Empowerment Technologies. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.

The module is divided into Two lessons and five sub topics, namely:
• Lesson 1 – Information and Communication Technologies
▪ Lesson 1.1 – ICT in the Philippines
▪ Lesson 1.2 – ICT, Me, and my Community
▪ Lesson 1.3 - Web 2.0: Dynamic Web Pages
▪ Lesson 1.4 - Web 3.0 and the Semantic Web
▪ Lesson 1.5 - Trends in ICT
• Lesson 2 – Online security, safety, and ethics
▪ Lesson 2.1 – Internet Threats
▪ Lesson 2.2 – Protecting reputations online
▪ Lesson 2.3 – Copyright
• Lesson 3 – Contextualized Online Search and Research Skills

After going through this module, you are expected to:


1. create a foundation of understanding of the world of ICT;

2
2. understand and demonstrate the proper etiquette in using ICT;
3. demonstrate appropriate skills in using several computer applications,
4. discover opportunities where one can use these skills in real-world scenarios;
and
5. collaboratively create an online portal.
6. Consider one’s and others’ safety when sharing information using the Internet;
7. Consider one’s and others’ reputation when using the Internet;
8. Determine and avoid the dangers of the internet;
9. Be responsible in the use of social networking sites; and
10. Browse the internet efficiently and properly through proper referencing.

What’s New

Activity 1:
Did you use the internet after you woke up this morning?
On your activity sheet, answer the questions.
1. How many times have you checked your phone this morning?
2. How many status updates have you posted in FB or Twitter today?
3. Did you use internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?
Unlocking of Difficulties

The following are the terms you will encounter with this module:
Key Terms

• Web 1.0- static website without interactivity


• Web 2.0- websites that contain dynamic content
• Web 3.0- a concept of the World Wide Web that is designed to
cater to the individual user
• Static-refers to the web that are the same regardless of the user
• Folksonomy- allows users to categorize and classify/ arrange information
• Hashtag- used to categorize posts in website
• Convergence- the synergy of technological advancements to work
on a similar goal or task
• Social media- websites, applications, or online channels that enable users to
create, co-create, discuss, modify, and exchange user generated content.

What I Know

Activity 2:
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

3
1. A web page that allows interaction from the user
a. static c. social
b. dynamic d. comment

2. This refers to the feature where users are able to categorize and locate
information through tagging.
a. hashtags c. taxonomy
b. folksonomy d. rich user experience

3. A feature of a dynamic website that allows users to put their own content
a. rich user experience c. user participation
b. long tail d. mass participation

4. It provides a common framework to allow data to be shared and reused across


platform, enterprise, and community boundaries.
a. W3C c. Web 1.0
b. Semantic Web d. Web 2.0

5. According to this magazine, two Philippine cities are part of the top 10 in their
research about “The Selfiest Cities around the World.”
a. People c. Reader’s Digest
b. Time d. Candy

6. This is the operating system for blackberry phones.


a. Blackberry OS c. Window’s Mobile
b. Symbian d. iOS

7. Pinterest is a social media website that can be classified as


a. Bookmarking site c. Microblogging
b. Media Sharing d. Blogs and Forums

8. Currently, this is the fastest mobile network.


a. 2G c. 4G
b. 3G d. 5G

9. This media is designed to help people who have visual and reading
impairments.
a. assistive c. bookmark
b. social d. accessibility
10. This type of social media website focuses on short updates posted by the user.
a. blogging c. social media
b. microblogging d. hashtagging

4
Lesson Information and Communication
1 Technologies

Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to
locate, save, send, and edit information.

When we make a video call, we use the Internet. When we send a text or make
a call, we use cellular networks. When we run out of load or battery, we use
payphones which use a telephone network. Having a unified way to communicate is
one of the goals of ICT. In terms of economics, ICT has saved companies a lot of
resources (time and money) with the kind of communication technology they use,
nowadays. In a similar way, we spend less because of ICT. As it normally costs us a
peso to send a text message or SMS, with the Internet, we can send multiple
messages and only be charged by a fraction.

What’s In

- It deals with the use of different communication technologies such as


mobile phones, telephone, Internet to locate, save, send and edit
information.

ICT in the Philippines

Several international companies dub the Philippines as the


"ICT Hub of Asia" It is no secret that there is a huge growth of ICT-
related jobs around the country, one of which is the call center or
BPO (Business Process Outsourcing) centers.
According to the 2013 edition of Measuring the
Information Society by the International Telecommunication
Union, there are 106.8 cellphones per 100 Filipinos in the year
2012. That would mean that for every 100 Filipinos you meet,
there is a high chance that they have a cellphone and approximately for the seven of
them, they have two.
In a data gathered by the Annual Survey of Philippine
Business and Industries in 2010, the ICT industry shares 19.3%
of the total employment population here in the Philippines.
To add to these statistics, Time Magazines "The Selfiest
Cities around the World” of 2013 places two cities from the
Philippines in the top 1 and top 10 spots. The study was
conducted using Instagram, a popular photo sharing
application.
With these numbers, there is no doubt that the Philippines is one of the
countries that benefits most out of ICT.

5
• Philippines is dub as the “ICT Hub of Asia” because of huge growth of
ICT-related jobs, one of which is BPO, Business Process
Outsourcing, or call centers
• ICT Department in the Philippines
is responsible for the planning, development and promotion of the
country's information and
communications technology (ICT) agenda in support of national
development.

What is It
Activity 3:
ICT, Me, and My Community

To fully understand the importance of ICT, let us first look at our community. Look
for a small business around your community.
Conduct a short interview (via free data on messenger) of the business owner using
the following guide:
Company/Establishment Name:
Address:
Nature of Business:
Guide Questions:
1. What are the different ways for customers and/or suppliers to contact
you?
2. How often do you use a phone or cellular phone for business? Estimate
only.
3. Does your establishment have Internet connection? If yes, what is its
purpose? If no, would you consider having it in the future? Why or why
not?
4. Does your business have a website? if yes, how does it help the company?
If no, would you consider having one in the future? Why or why not?
5. If applicable) Would you consider giving free Wi-Fi access in the future? If
you already have it, does it help boost sales?
Internet

• It is the global system of interconnected computer networks that use


the Internet protocol suite TCP/IP) to link billions of devices worldwide.
• means of connecting a computer to any other computer anywhere in
the world via dedicated routers and servers.
• sometimes called simply "the Net," is a worldwide system of computer
networks - a network of networks in which users at any one computer
can get information from any other computer
World Wide Web
• an information system on the Internet that allows documents to be connected to
other documents by hypertext links, enabling the user to search for information
by moving from one document to another.

6
• is an information space where documents and other web resources are
identified by URLs, interlinked by hypertext links, and can be accessed via
the Internet.
• Invented by Tim-Berners Lee
Web Pages
• Web page is a hypertext document connected to the World Wide Web.
• It is a document that is suitable for the World Wide Web
Web Sites
• a location connected to the Internet that
maintains one or more pages on the World
Wide Web.
• It is a related collection of World Wide Web
(WWW) files that includes a beginning file
called a home page.

Web Browser
• It displays a web page on a monitor or mobile device
• is a software application for retrieving, presenting, and traversing
information resources on the World Wide Web.

Static Web Pages

• Static is Web 1.0


• Dynamic is Web 2.0, 3.0
• Static web page is known as flat page or stationary page in the sense that
the page is “as is” and cannot be manipulated by the user.
• The content is also the same for all users that is referred to as Web 1.0
Dynamic Web Pages
• web 2.0 is the evolution of Web 1.0 by adding dynamic web pages
• The user is able to see website
differently than others e.g social
networking sites, wikis, video
sharing sites
• Web 2.0 allows users to interact
with the page, the user may be able
to comment or create a user
account
• Most website the we visit today are
Web 2.0

7
Static vs. Dynamic Web Page
• Static" means unchanged or constant, while
"dynamic" means changing or lively.
• A static site is one that is usually written in plain
HTML and what is in the code of the page is what
is displayed to the user. A dynamic site is one that
is written using a server-side scripting language
such as PHP, ASP, JSP, or ColdFusion.
Features of Web 2.0
1. Folksonomy- allows user to categorize and classify
information using freely chosen keywords e.g
tagging by Facebook, twitter, use tags that start with the pound sign #,
referred to as hashtag
2. Rich User Experience- content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able
to put content. Others are able to place a content of their own by means of
comments, reviews, and evaluation e.g lazada.com, amazon.com
4. Long Tail- services that are offered on demand rather than on a one-
time purchase. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spent in the Internet, or a data
plan that charges you for the amount of bandwidth you used.
5. Software as a Service- users will be subscribe to a software only when
needed rather than purchasing them e.g Google docs used to create and
edit word processing and spread sheet.
6. Mass Participation- diverse information sharing through universal
web access. Web 2.0’s content is based on people from various cultures.
Web 3.0 and Semantic Web
• Semantic Web is a movement led by the World Web Consortium (W3C).
• The W3C standard encourages web developers to include semantic content
in their web pages.
• Semantic web is a component of Web 3.0
• Semantic web provides a common framework that allows data to be shared
and reused across application, enterprise, and community boundaries.
• The aim of web 3.0 is to have is to have machines or servers understand
the user’s preferences to be able to deliver web content specifically targeting
the user.

Web 3.0 is yet to be fully realized because of several problems:

1. Compatibility. HTML files and current web browsers could not support Web
3.0.
2. Security. The user's security is also in question since the machine is saving
his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words "old" and "small would
depend on the user.

8
5. Logic. Since machines use logic, there are certain limitations for a computer
to be able to predict what the user is referring to at a given time.

Trends in ICT

2. Convergence- is the synergy of technological advancements to work on a


similar goal or task
3. Social media- is a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange user-generated
content.

Six Types of Social Media:

a. Social Networks- these are sites that allow you to connect with other
people with the same interests or background.
b. Bookmarking Sites- these are sites that allow you to store and manage
links to various websites and resources.
c. Social news- these are sites that allow users to post their own news
items or links to other news sources. The users can also comment on the
post and comments may also be ranked.
d. Media Sharing- these are sites that allow you to upload and share media
content like images, music, and video.
e. Mircoblogging- these are sites that focus on short updates from the
user. Those subscribed to the user will be able to receive these updates.
f. Blogs and Forums- these websites allow users to post their content.
Other users are able to comment on the said topic.
4. Mobile Technologies- popularity of smartphones and tablets. Latest
mobile devices use 4G Networking LTE, which is currently the fastest
mobile network. Mobile devices use different operating systems

• iOS

• Android

• Blackberry OS

• Windows Phone OS

• Symbian

• Web OS

• Windows
Mobile

9
5. Assertive Media- is a nonprofit service designed to help people who
have visual and reading impartments. A database of audio recordings
is used to read to the user.
What’s More
Activity 4: Your Turn to Shine
1. Why do you think microblogging platforms have become popular when regular
blogging becomes platforms already exist?
2. What do you think of Web 3.0? Do you think it will be realized someday in
the future?

Take the Challenge!


Activity 5:
Ask your parents, or an elderly in your house for one momentous event in the
Philippine history wherein ICT play a huge role in making it a success.

What I Can Do
Activity 6:
Ask for help for help with the elderly during their time, the significant
“technological advances”, make time lines using long strips of paper, cut out and tape
together or on brown paper that comes in rolls. Time lines should include
illustrations of the “technological advances” you wish to highlight

Assessment
Activity 7:

Directions: True or False: Write T if the sentence is correct; otherwise, write F on


the blank before each item. (NOTE: please do not write ANYTHING on this MODULE,
write your answers on your notebook)
___ 1. Tim Berners-Lee created the World Wide Web.
___ 2. People Magazine conducted the research on "The Selfiest Cities in the
World"
___ 3. Web 2.0 introduced static web pages that allow users to interact with
the web page.
___ 4. Folksonomy allows users to categorize and locate information.
___ 5. Technological convergence is the synergy of technological
advancements to work on a similar goal or task.
___ 6. According to Nielsen, users who use the Internet spend more time in
social media sites than in any other type of site.
___ 7. Blogging sites are sites that focus on short updates from the user.
___ 8. Android is a mobile operating system for Apple devices.
___ 9. Assistive media is a nonprofit service designed to help people who
have visual and reading impairments.
___ 10. Information and Communication Technology (ICT) deals with the use
of different communications technology to locate, save, send, and edit
information
Activity 8:
Directions: Write SO if the social media website is a social network, BS for
bookmarking site, SN for social news, MS for media sharing, MI for microblogging,
and BF for blogs and forums.

___ 1. Facebook
___ 2. Plurk
___ 3. Twitter
___ 4. Tumblr
___ 5. reddit
___ 6. Google+
___ 7. Instagram
___ 8. Pinterest
___ 9. Blogger
___ 10. StumbleUpon

What I Know
Activity 9:
I. Directions: Pre-Test: Write Yes if you agree with the statement and No if
you disagree on the blank before each number.

_______ 1. My computer has an antivirus so it is okay to open most email


attachments like e-cards and video files.
_______ 2. Your friend told you that his college application was rejected due
to the fact that you posted a video of him doing crazy stuff at a
party. You posted the video several years ago but later took it
down to protect your friend's reputation. Can your friend be right
that the college found the video?
_______ 3. You and your best friend plays a lot of video games. One time,
she asks you for your password so she can help you level up and
get in-game money. She promises to keep your password a secret.
Is it okay to give away your password?
_______ 4. You received an email stating that your mother's bank account is
going to be forfeited if you do not respond to the email. Is it safe
to' reply?
_______ 5. You forgot that your essay for English class is due tomorrow.
While doing your research, you found a website offering free
essays. Is it okay to use the essays from this free essay website?
_______ 6. A virus is a malware that multiplies and infects other computers
through flash drives.
_______ 7. Keyloggers are software that show pop-up ads even if you are not
using your browser.
_______ 8. Search engines scan websites for search results even if you have
set your post to "private"
_______ 9. There is a danger in posting information about a future vacation.
_______ 10. Letting people know your birthday is probably a must if you want
to get as many gifts as possible. But having it in your profile
makes you vulnerable to identity theft.

Lesson
Rules of Netiquette
2
Most of us use the Internet every day, Sometimes, we do not pay
attention on how much information we share online. Below is a questionnaire
about how much you have shared so far. Put a check (✓) under Shared or
Not Shared.

How Safe Are You?

Type of Information Shared Not Shared


1. First name
2. Last name
3. Middle name
4. Current and previous school(s)
5. Your cellphone number
6. The name of your mother and
father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
How many checks did you have for Shared? You probably answered Shared
in the first two items. If that is the case, try using a search engine like Google then
type your first and last name. Did you get links to your profile page? Try switching
to image search. Did your pictures appear? If you have a unique name, chances are,
it did. Do not feel bad if it did not appear though; in fact, it is probably for your best
interest not to have pictures of yourself in a search engine.
Activity 10: e-Think Mo!!!
Directions: Think of this, with the concepts you have learned answer it based in
your opinion.
So how did these things happen? How can search engines locate me? Is there
any danger of being found by search engines?
What’s In
Activity 11: e-Think Mo!!!

How many hours do you spend on the Internet per day? Can you live without
the Internet for a week? How many aspects of your life depend on the Internet? How
many times have you complained about your Internet connection speed? As
teenagers, you are all exposed to many things powered by the Internet.
Whether it is socializing, playing games, reading sports news,
shopping, etc., the Internet has given you one of the most powerful
tools that your parents, during their teenage years, did not have.
Because of this, do you not think that it is also important to
wield this powerful tool properly? Without proper training, a
swordsman can easily injure himself when wielding a
swordsman, the same could be said for you whenever you use
the Internet.

What’s New
• Lesson 2 – Online security, safety, and ethics
Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business,
gain Online Safety and Security new friends, and stay in touch with the old ones. It
is also a source of entertainment through games, online communities, and everything
in between. But like most things in this world there is always the 'other side of the
coin

The Internet is one of the most dangerous places especially if you do not know
what you are doing with it. But there is no need to worry: it is never that late.
Hopefully, by the end of this lesson, you are able to consider how you go about your
use of the Internet.
Let us go back to the "How Safe Are You?" test.

Let us visit each item and see how risky it is to share them. pe of information
Risks There is a risk in sharing your
The Internet, truly, is a powerful tool. It can be used to promote your business,
gain Online Safety and Security new friends, and stay in touch with the old ones. It
is also a source of entertainment through games, online communities, and everything
in between. But like most things in this world there is always the 'other side of the
coin

The Internet is one of the most dangerous places especially if you do not know
what you are doing with it. But there is no need to worry: it is never that late.
Hopefully, by the end of this lesson, you are able to consider how you go about your
use of the Internet.
Let us go back to the "How Safe Are You?" test.

Let us visit each item and see how risky it is to share them. pe of information
Risks There is a risk in sharing your

First name There is a risk in sharing your first name.


Chances are, a hacker may already know
plenty of stuff about you even if you only
give out your first name. Likewise, you
cannot just walk in a room and start
introducing yourself to everyone. You do
not know whom you can come across with.

Last name If sharing your first name is a small risk, having


both your first and last is riskier. You will be
vulnerable to being searched for using search
engines, which include image search. Matching
a name with a face is modus to several
cybercrimes like identity theft.

Middle name
Sharing your middle name alone is probably
not the riskiest of this shared information,
but sharing your full name would be.

Current
and
Previous Most people who steal identities study their
Schools subject. They can use this information for
verification purposes.

Your Your cellphone number should never be posted


cellphone over the Internet. The Internet number is a
numbers public place. It is the same as posting your
number on a billboard. You would not want
random strangers to text or call you, or worse,
pretend that they are someone else.
The name Risky yet not as risky as posting their full names,
of your especially your mother's maiden name. In fact, you
mother and may have already encountered many websites that
father. require your mother's maiden name as an answer
to a secret question whenever you lose your
password.

The name
Disclosing this is a huge risk. Strangers may
of your
pretend or use their identity to dupe you.
siblings.

Your Hopefully, you answered "no" to this one. Giving


address the Internet your number is one thing; giving them
your address is a whole other level. It would be
much easier for criminals to find you.

Your home This shared information is riskier than sharing


phone your personal phone number. Scams usually
number. use this information to deceive you, one of
Your Letting people
which isknow
whenyour birthdaypretends
a stranger is probably a
to know your
birthday must if you wantortopretends
parents get as many
to begifts
you.as possible.
But having it in your profile makes you vulnerable
to identity theft.

What is It

TEN RULES OF NETIQUETTE


• Rule no. 1: Remember the human
• Rule no. 2: Adhere to the same standards online that you follow in
real life.
• Rule no. 3: Know where you are in cyberspace.
• Rule no. 4: Respect other people’s time and bandwidth.
• Rule no. 5: Make yourself look good online.
• Rule no. 6: Share expert knowledge
• Rule no. 7: Help keep flame wars under control
• Rule no. 8: Respect other people’s privacy.
• Rule no. 9: Don’t abuse your power
• Rule no. 10: Be forgiving of other people’s mistake.
RULES OF NETIQUETTE
Skill Exploration
Activity 12:
Directions: Privacy Policies
Choose one of the “Rules of Netiquette”, describe it through
DRAWING/POSTER.
What is It

• Lesson 2.1 – Internet Threats


What is It

• Lesson 2.2 – Protecting reputations online

What is It

• Lesson 2.3 – Copyright


Lesson Contextualized Online Search and
3 Research Skills
Being a vast sea of information is one of the key features of the
Internet. it is such a big repository of data that is believed that one
could find out something about anything on the internet. Developing
the necessary knowledge and skills in online searching, however, is the
key to maximizing its use.i

What’s In

Activity 13: yourself challenge!!!


Do you remember the colors of each letter in the google?
• Using this Word Art, color the letters according to
the Google logo.

What’s New
“Googling”
Indeed, Google might be our “friend” but using search
engines for the sake of plain information could actually lead
you misinformed.
In order to stay meaningfully informed, you should start
appreciating the use of the right combination of words or key phrases.
SEARCH ENGINE

A search engine is a software system designed to search the Internet for documents
related to the keyword or search word used or entered into the system. Users are
able to maximize the potential of search engines by learning the proper searching
protocols.ii

TYPES OF SEARCH ENGINES

❑ Crawler-based search engine - It uses a spider or a crawler to search the


Internet. The crawler digs through individual web pages, pulls out
keywords, and then adds the pages to the search engine's database. Google
and Yahoo are its examples.
❑ Directories - depend on human editors to create
their listings or database. There are two types of
directories: (1) academic and professional
directories which are often created and
maintained by subject experts to support the
needs of researchers; and (2) commercial and
portal directories that cater to the general public
and are competing for Internet traffic.
❑ Hybrid search engine uses both crawler based searches and directory
searches to obtain their results.
❑ Meta search engines - transmit
user supplied keywords
simultaneously to several individual
search engines to carry out the
search. In this type of search engine,
duplicates can be eliminated and
clustering by subjects within search
is implemented.iii

ONLINE RESEARCH

In the Philippines, copyrights only last a lifetime (of the author) plus 50 years.
There are also provisions for “fair use”.

❑ Have a question in mind- Focus on a question you want answered.


❑ Narrow it down- Search engines like Google, Bing, or Yahoo use several
filters to determine the most appropriate result for you.
❑ Advanced Search- The best way to filter information you get from
search engines is by using the advanced search.
❑ Look for a credible source- Some wikis, filled with
updated information, are not a credible source. When
using wikis, check out
the link of the cited texts.
❑ Give credit- Give credit to the original author of the page or
information. To properly site a reference, you may use the format below

Symbol Function
Finds web pages that contain all the terms that are preceded by
+ the + symbol; allows you to include terms that are usually
ignored
““ Finds the exact words in a phrase

() Finds or excludes web pages that contain a group of words

AND or & Finds web pages that contain all the terms or phrases

NOT or - Excludes web pages that contain a term or phrase

OR or | Finds web pages that contain either of the terms or phrases

What’s More
Activity 14: Your Turn to Shine
Self-Check
On your activity sheets, complete the sentences with relevant concepts:
1. When I search using “Jos” the search may result to:
_______________________
2. If I will search the internet using AND, in the word, online
platforms the result is:_____________________________
3. If I will use NOT in my search, what will be its result?
_________________________

Take the Challenge!

Activity 15:

1. 1990s is the development of ICT in the Philippines, supposed you are a first-
year college student, enumerate the ways on getting the
most relevant information about the Information and
Technology. You can ask for help within your family and
friends.
2. Have a documentation of what are the most useful search
tips you used to obtain the most relevant information.
What’s More

Activity 16: Your Turn to Shine

Self-Check 1.1

1. Do you agree or disagree with the provisions of the copyright


law? Defend your answer.
2. How would you feel if someone posted something
embarrassing about you? What would you do?

Activity 17: Self-Check 1.1.1


Essay: Why is internet safety important?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Essay: How misusing social media can create a negative digital foot print?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Take the Challenge!

Activity 18:

• There are lots of momentous event in the Philippine history


wherein ICT play a huge role in making it a success, cite one and
describe it.

What I Can Do!

Activity 19:

• Create a Poster that will show brief explanation in one of the 10 Rules in
Netiquette by Virginia Shea.
Assessment

Activity 20: Post-Test Matching Type: Match Column A with Column B. Write
the letter of the correct answer on the space before each
number.
A B
___ 1. virus a) designed to send you advertisements
___ 2. rogue b) sends an official-looking email and is designed
to steal provision that allows you to use
copyrighted work sensitive personal information
___ 3. keylogger c) without consent with certain limitations
___ 4. adware d) a browser feature that is synonymous to
"private" browsing
___ 5. spam e) replicates and can transfer from one computer
to another
___ 6. phishing f) exploits the DNS system
___ 7. fair use g) states that anyone who uses your work without
your consent is punishable by law
___ 8. spyware h) runs in the background and monitors what you
are doing
___ 9. private i) unwanted email mostly from bots
___ 10. malware j) disguised as a useful program but is not
___ 11. incognito k) the information superhighway
___ 12. internet l) tricks the user into posing that it is a security
software
___ 13. trojan m) a malicious software
___ 14. copyright n) an option to hide a post so that search engines
could not scan it
___ 15. pharming o) used to record the keystrokes done by the user

References:
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-
7830-0; Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)

Reygie Fabro-College Instructor at Divine Word College of Laoag; Published on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0

Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)

Patronage of Mary Development School (PMDS), Published on May 6, 2020;


https://www.slideshare.net/arias201625/empowerment-technologies-lesson-2?qid=45c533b4-a83e-
4e70-ae13-92c5b3b8b650&v=&b=&from_search=3

Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.

Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.

Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 367, paragraph 3.

Prepared by:

MARIA BUENASGRACIA O. NOBLETA


Teacher II

i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., c or Ma. Clara St., Quezon
City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon
City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon
City. Page 36, paragraph 3.

Anda mungkin juga menyukai