Professional Documents
Culture Documents
Empowerment Technology
Empowerment Technology
3rd Floor Rosario Uy Bldg., San Jose Street, Goa, Camarines Sur
S/Y 2020 - 2021
_____________________________________________________________________________________
1 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
CURRICULUM
CONNECTION
I am a Globalista – a student of Global Site for I.T. Studies, Inc., a conscientious, adept
performer, achievers, competently pursuing my mission in life.
PROGRAM OUTCOMES:
Explain and apply the fundamental elements of effective conflict resolution processes
and use to reduce group conflicts and divisions, foster agreement, and promote future
collaboration.
Describe and explain the new abilities they have developed as the result of self-initiated
learning experience and projects through analyzation and understanding every topic in the
chapter.
INSTRUCTION:
1. Before working on this self-learning module, make sure you have a notebook, pen or
pencil and learning materials with you.
2. Read carefully the instructions given. Don’t hurry. Always review your answers.
5. Submit outputs on or before the deadline at the agreed drop area like Barangay Hall or to
the assigned Barangay Official in your Barangay.
7. Enjoy learning.
_____________________________________________________________________________________
2 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Info source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate
Regularly review your privacy settings in your online accounts to make sure you are
not sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data before
leaving.
Netiquette is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:
_____________________________________________________________________________________
3 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Flame war is a series of flame posts or messages in a thread
that are considered derogatory in nature or are completely off-
topic. Often these flames are posted for the sole purpose of
offending or upsetting other users. The flame becomes a flame
war when other users respond to the thread with their own flame
message.
Lesson
2 Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities to
attack computers and retrieve sensitive data from individuals. Half the time, we aren’t even
aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are usually
done by computer hackers who uses the World Wide Web to facilitate cybercrime. Web
threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS
protocols, but may also employ other protocols and components, such as links in email or
Instant Messaging apps, or any malware attachments on servers that access the Web. They
_____________________________________________________________________________________
4 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
benefit cybercriminals by stealing information for subsequent sale and help absorb infected
PCs into botnets. Web threats pose a broad range of risks, including financial damages,
identity theft, loss of confidential information/data, theft of network resources, damaged
brand/personal reputation, and erosion of consumer confidence in e-commerce and online
banking.
The following are the top kinds of online threats that you should be aware of:
_____________________________________________________________________________________
5 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html
_____________________________________________________________________________________
6 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Internet robots are also known as spiders, crawlers, and web bots. It is a software
application that is programmed to do certain tasks. Bots are automated, which
means they run according to their instructions without a human user. Some bots are
useful, such as search engine bots that index content for search or customer service
bots that help users. Other bots are "bad" and are programmed to break into user
accounts, scan the web for contact information for sending spam, or perform other
malicious activities. If it's connected to the Internet, a bot will have an associated IP
address.
Virus and Worms are malwares that attach to another program and, when
executed—unintentionally by the user—replicates itself by modifying other
computer programs and infecting them with its own bits of code.
Ransomware is a form of malware that locks you out of your device and/or
encrypts your files, then forces you to pay a ransom to get them back.
Spams are unsolicited emails, instant messages coming from recipients that are not
granted verifiable permission for the message to be sent. Spam messages can be
damaging if you open or respond to it.
_____________________________________________________________________________________
7 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Cyberstalking refers to the use of the internet or other electronic device to harass
or stalk individuals or organizations.
_____________________________________________________________________________________
8 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Spoofing happens when someone or something pretends to be something else to
gain our confidence, get access to our systems, steal data, steal money, or spread
malware.
Lesson
3 Effective Internet Research
The Internet has made our lives easier especially in terms of doing research. By
browsing the internet, we can access limitless topics. Web-based catalogs are available in
many libraries to assist researchers in locating printed books, journals, government
documents and other materials. The biggest obstacle facing all researchers on the internet is
how to effectively and efficiently access the vast amount of information available (The
Internet: Research Tools, 2013).
There are billions of information on the web and it is a challenge for us to truly find which
information is reliable and relevant. Here are some tips you may use to be able to look for
relevant and reliable sources:
Search Engines are websites used for retrieval of data, files, or documents from
data bases. Some search engines we use today are:
_____________________________________________________________________________________
9 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic term for
all types of names and addresses that refer to objects on the world wide web.
Knowing the URL endings will give you clues to who is sponsoring the website
and help evaluate the sources.
https://www.searchenginejournal.com/alternative-searchengines/271409/#close
4 5
1 2 3 6 7
3. Domain 6. Page
Popular Domains
Top- level Domains Country code top level domains
.net - network
_____________________________________________________________________________________
10 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
b. Boolean “and” – this operator will
retrieve only pages containing both terms
Ex. A and B
A B
c. Boolean “not” – this operator will find
pages that do not include search term
immediately following it.
Ex. A not B
A B
3. Plus (+) – indicates that the word after the sign is a required word must be
found in search. Example: +fire
4. Minus (–) sign – indicates to exclude a word from your search that is not
required on the result. Example: Jaguar speed –car
7. Finding Documents – using the filetype refines the search for documents on
the web.
o filetype:pdf
o filetype:doc
o filetype:xls
Ex. ICT in the Philippines pdf
8. Searching Site – the sites find webpage from a website.
Ex.: National Geographic information in Australia
Search: Australia site: NationalGeographic.com
_____________________________________________________________________________________
11 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
RULES IN DOING THE ACTIVITY
6. What type of online threat happens when an attacker uses electronic devices to do
unwanted surveillance against its victim?
A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking
7. What type of online threat happens when the attacker impersonates another
individual or organization to gather personal or business information?
A. Cyberstalking B. Spoofing C. Scamming D. Pharming
8. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
10. You get an email telling you that you won a hundred thousand without joining in a
competition. You should ____________.
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge
11. What type of malicious program is designed to replicate itself and transfer from
one computer to another either through the internet or local networks or data
storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
12. What harmful online programs are designed to send you advertisements, mostly
pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
13. What harmful online program is used to record keystrokes done by users to steal
passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
16. Which of the following must NOT be done if you received an embarrassing picture
from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
_____________________________________________________________________________________
14 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
C. You are judged by your intent - if you didn't mean to hurt someone's
feelings, then it's okay.
First Name
Middle Name
Last Name
Name of Siblings
Your Address
Your Birthday
3. Based from your answers above, do you think you are safe when using the Internet?
Why?
__________________________________________________________
__________________________________________________________
________________________________________
_____________________________________________________________________________________
15 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Activity 3. Show Me How You Hashtag
Instruction: Look at the following images and create a hashtag based on the type of online
threat represented by each image. Write your answers on the space provided.
1. #__________________ 2. # _________________
3. # __________________ 4. # _________________
5. # _________________
HONESTY PLEDGE:
I hereby pledge that I took this tasks with all honesty and integrity.
______________________________ ____________________________
Student’s Signature over Printed Name Parent’s Signature over Printed Name
_____________________________________________________________________________________
16 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Key to Correction
1. A
2. B
3. B
4. D
5. D
6. D
7. B
8. A
9. A
10. B
11. C
12. A
13. B
14. D
15. A
16. B
17. D
18. B
19. C
20. B
_____________________________________________________________________________________
17 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester