Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

module 1Q1

Empowerment
technology
ICT in the Context of
Global Communication

Empowerment Technology
MODULE 1Q1

ICT in the Context of


Global Communication

Course Objective: At the end of the course, will be able to explore the different technologies
and online platforms and how they can be used effectively.

Learning Outcomes: Quick Reminders:


• Compare and contrast the nuances of varied • Take your time in reading the lessons.
online platforms, sites, and content to best • Write down points for clarification and
achieve specific class objectives or address discuss this with your teacher.
situational challenges. • Perform all activities and answer all
• Evaluate existing online creation tools, worksheets.
platforms and applications in developing ICT • Answer all activities in a separate sheet of
content for specific professional tracks. paper or in your notebook.
• Apply online safety, security, ethics, and • Have fun while learning with this module. It
etiquette standards and practice in the use of will totally be of great use which ever strand
ICTs as it would relate to their specific you may belong because ICT is for
professional tracks. everybody.
• Use the Internet as a tool for credible
research and information gathering to best
achieve specific class objectives or address
situational.

Empowerment Technology
MODULE TITLE:
ICT IN THE CONTEXT OF GLOBAL COMMUNICATION

Description: This module will give you an introduction into ICT and the different online
platforms that may be used for its specific purpose.

Contents:
Lesson 1: What is Information and Communications Technology?
Pre-test
Lesson 1.1: Information and Communications Technology
Activity 1.1: Internet and Computer Readiness Test
Lesson 1.2: ICT in the Philippines
Lesson 1.3: The World Wide Web
Activity 1.2: Where do I belong?

Lesson 1.4: Online Platforms and Sites


Reflection Activity
Assessment
References
Lesson 2: Online Safety, Security and Netiquette
Pre-test
Lesson 2.1: Online Risks
Activity 2.1: Shared or Not Shared
Lesson 2.2: Online Safety, Security and Netiquette
Activity 2.2: Can You Keep It Private?
Lesson 2.3: Kinds of Online Threats
Activity 2.3: Show Me Your Hashtag
Reflection Activity
Assessment
References
Lesson 2: Effective Internet Research
Pre-test
Activity 3.1: What’s In My Name?
Lesson 3.1: Searching the Web
Lesson 3.2: Evaluating Sites
Activity 3.2: Evaluating Websites: Checklist
Assessment
References

Empowerment Technology
LESSON 1
What is Information and Communications
Technology?

Objectives:
By the end of this lesson, you should be able to:
1. Identify varied online platforms and sites.
2. Compare and contrast the nuances of varied online platforms, sites, and content to best achieve
specific class objectives or address situational challenges.
3. Evaluate existing online creation tools, platforms and applications in developing ICT content.

Pre-test: Please answer the pre-test to measure what topics have you known so far.

Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers in your notebook.

01. What type of web page is classified as flat or stationary?


a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0

02. What web 2.0 feature allows users to subscribe to a data plan that charges for time spent on
the internet?
a. Folksonomy b. Long Tail c. User Participation d. Application

03. What is the name of the symbol that is used to classify and categorize information?
a. Hashtag b. Question Mark c. Asterisk d. At sign

04. What specific type of social media allows you to connect with other people?
a. Microblogging c. Media Sharing
b. Social Networks d. Social News

05. Twitter is an example of what specific type of social media?


a. Microblogging c. Media Sharing
b. Social Networks d. Social News

06. YouTube and Instagram are examples of what specific type of social media?
a. Blogs and Forums c. Media Sharing
b. Social Networks d. Bookmarking
Sites

Empowerment Technology
07. What specific type of social media allows its users to post their original content on websites
such as WordPress, Blogger, and Tumblr?
b. Blogs and Forums d. Media Sharing
c. Social Networks d. Bookmarking
Sites
08. What type of social media allows you to manage links to various websites?

a. Blogs and Forums c. Media Sharing


b. Social Networks d. Bookmarking
Sites
09. What do you call the global system of interconnected computer networks that use servers to
link billions of devices worldwide?

b. Website c. Web Browser d. Internet d. World Wide Web

10. What type of web page is classified as a dynamic page?


a. Web 1.0 b. Internet c. Web 2.0 d. Web 3.0

Lesson 1.1: Information and Communications Technology?

Information and Communications Technology (ICT) often deals with the use of different
technological inventions like mobile phones, telephones, computer, Internet, and other devices, as well
as software and applications to locate, save, send, and manipulate information. ICT has greatly
contributed to how easy our lives has been today. Our gadgets have become part of our necessity that
we check on them after we wake up. It made communication easier. We can use cellular phones that
are designed for communicating with other people even they are miles away from us. It has also assisted
us in our work since there are Internet-based jobs. It has revolutionized our education and in the
modernization of our economy.

Activity 1.1: Internet and Computer Readiness Test

Directions: Read and reflect each item carefully. State whether you agree or disagree to each of the
statements by drawing a happy face if you agree and a sad face if you disagree. There are no right
or wrong answers for this activity. Write your answers on your notebook.

Empowerment Technology
Situation
1. I have reliable access to a computer, mobile phone, tablet, or any gadget that
can act as substitute to computers.
2. I have access to a high-speed internet connection with video streaming
capabilities.
3. I have experience using email: I can create, send, forward, reply to, and save
email messages and attachments
4. I have experience in word processing: I can create, edit, save, and navigate
documents using software program such as Microsoft Word or Pages for Mac.
5. I have experience in creating slide presentations: I can use programs such as
Microsoft PowerPoint or Keynote for Mac.
6. I know how to search the web using Internet browsers such as Firefox or
Google Chrome.
7. I have experience using online or mobile social media (ex. Facebook, Twitter)
8. I have experience viewing videos online (YouTube)
9. I have experience filling out forms and taking quizzes online.
10.I have experiences using cloud-based programs such as Google Drive or
Google Docs.
11.I have experience searching online for academic resources (ex. Google
Scholar)
12.I have experience with video conferencing (ex. Skype).

Lesson 1.2: ICT in the Philippines

Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which
is BPO, Business Process Outsourcing, or call centers. In a data gathered by the Annual Survey of
Philippines Business and Industries in 2010, the ICT industry shares 19.3% of the total employment
population.

When the internet was fully commercialized in 1995, it has tremendously impacted culture and
commerce, including the rise of near instant communication by email, instant messaging, telephony
(Voice over Internet Protocol or VoIP), two-way interactive video calls, and the World Wide Web with its
discussion forums, blogs, social networking, and online shopping sites. Internet is the global system of
interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate
between networks and devices.

Lesson 1.3: The World Wide Web

The World Wide Web is an information system on the Internet that allows documents to be connected
to other documents by hypertext links, enabling the user to search for information by moving from one
document to another. It was invented by Tim-Berners Lee. The World Wide Web browser software,
such as Microsoft's Internet Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome,
let users navigate from one web page to another via the hyperlinks embedded in the documents. These
documents may also contain any combination of computer data, including graphics, sounds, text, video,
multimedia and interactive content that runs while the user is interacting with the page. The Web has
enabled individuals and organizations to publish ideas and information to a potentially large audience
online at greatly reduced expense and time delay.

Empowerment Technology
Types of World Wide Web

a. Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat or
stationary page since it cannot be manipulated by the user.

b. Web 2.0 or The Social Web allows users to interact with the page, the user may be able to
comment or create a user account. Most website that we visit today are Web 2.0.
c. Web 3.0 or Semantic Web. The semantic web provides a framework that allows data to be
shared and reuse to deliver web content specifically targeting the user. Search Engine will
learn about you and your habits from each search you perform and will gather details about
you from your previous activities like likes and social postings and present the answers as per
your preferences.
Below is a comparison of Web 1.0, Web 2.0 and Web 3.0:
https://lcy0210.wordpress.com/2019/01/11/web-3-0-to-5-0-is-coming-soon/

Criteria Web 1.0 Web 2.0 Web 3.0


Communication Broadcast Interactive Engaged/Invested
Information Static/Read-only Dynamic Portable & Personal
Focus Organization Community Individual
Content Ownership Sharing Immersion
Interaction Web Forms Web Application Smart Applications
Search Directories Tags/Keywords Context/Relevance
Metrics Page Views Cost Per Click User Engagement
Advertising Banners Interactive Behavioral
Technologies HTML/FTP Flash/Java/XML RDF/RDFS/OWL

Features of Web 2.0

Features Web 2.0


Folksonomy allows users to collectively classify and find information using freely chosen
keywords (e.g. "tagging" by Facebook). Tagging uses the pound sign #, often
referred to as hashtag.
Rich User Interface dynamic content that is responsive to user input (e.g., a user can "click" on
an image to enlarge it or find out more information)
User Participation the owner of website is not the only one who is able to put content. Others
are able to place a content on their own by means of comments, reviews, and
evaluation.
Long Tail services that are offered on demand rather than on a one-time purchase. This
is synonymous to subscribing to a data plan that charges you for the amount
of time you spent in the Internet, or a data plan that charges you for the
amount of bandwidth you used.
Software as a Service users will subscribe to a software only when needed rather
than purchasing them.

Empowerment Technology
Activity 1.2: Where do I belong?

DIRECTIONS: Using the Internet, look for the webpages of the pages listed below. Evaluate whether
they are Web 1.0, Web 2.0, or Web 3.0. Write your answers in your activity notebook.

01. Amazon.co.uk 06. Siri’s Apple Voice Recognition

02. 07.
03. 08. Encyclopedia Britannica

04. 09. Trio Healthcare Group

05. 10.

Lesson 1.3: Online Platforms and Sites

Because of the wide capacity of Web 2.0, it has helped in creating dynamic online platform sites. Online
platform is a specially developed platform using Internet technology. Online platforms have
revolutionized access to any information. Online platforms currently include, but are not limited to:

Presentation or Visualization
Cloud Computing

File Management

Mapping

Social Media

01. Presentation or Visualization Platform 03. File Management Platform is used for the
allows you to present and share storing, naming, sorting, and handling of
presentations, infographics and videos computer files. Allows you to convert and
with other people. It is used to manage files without download in the software
communicate information clearly and tool.
efficiently.

02. Cloud Computing Platform is also 04. Mapping Platform is a transformation taking
called as “The cloud.” It is the practice of the points of one space into the points of the
using a network of remote servers hosted same or another space. Uses GPS to detect
on the internet. Instead of using your location and used for navigation.
computer’s hard drive, you store and
access your data and programs over the
Internet.

Empowerment Technology
Social Media Platform is a computer-mediated tools that allow large group of people to create,
05. share or exchange information, interest and the information shared can be in the form of ideas,
pictures, videos or anything that you want to create and share to virtual communities. It can be in
the following platforms:

Social Networks. These sites allow you to connect with other people with the same
interests or background.
Bookmarking Sites. These are sites that allow you to store and manage links to various
websites and resources.

Social News. These are sites that allow users to post their own news items or links to
other news sources.
Media Sharing. These are sites that allow you to upload and share media content like
images, music, and video. Media sharing sites can be specific for video sharing, photo
sharing, slide sharing, social bookmarking, and gaming.
Microblogging. These are sites that focus on short updates from the user. Those
subscribed to the user will be able to receive these updates. Posts are brief that range
typically from 140 – 200 characters.

Blogs and Forums. These are websites that allow users to post their content. Other users
can comment on the said topic.

Activity 1.3: Where do I belong?

DIRECTIONS: Listed below are some of the platforms. Complete the table below by providing name
of website and a short description using the internet. Write your answers on your notebook.

Platforms Name of Websites Description


Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Networks
Social News
Microblogging
Blogs & Forums

Empowerment Technology
Reflect on the following questions and answer them briefly on your activity notebook.
Please refer to the rubrics below.

01. How dependent are we on technology?

02. How do the different online platforms help you as a student in your chosen track?

Rubrics for Grading

Criteria Score
Completeness (5 points)
Does your response directly answer each part of 5 4 3 2 1
the question(s)?
Knowledge (10 points)
Does your response clearly show you have read
and understand the lesson content by correctly
defining key terms, key persons and summarizing 10-9 8-7 6-5 4-3 2-1
concepts? Have you made inferences based on
this knowledge to personal or modern-day
applications?
Writing Skills (5 points)
Do you write clearly, in complete sentences, with 5 4 3 2 1
minimal errors in grammar and spelling?

Empowerment Technology
Assessment
Directions: Read each item carefully and choose the letter of the correct
answer. Write your answers in your notebook.

01. What type of web provides a framework that allows data to be shared and reuse to deliver
web content specifically targeting the user?
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Website

02. Which of the following is an example of sites under web 2.0?


a. Facebook b. YouTube c. Wikipedia d. All of the above

03. What type of web page is classified as flat or stationary?

a. Web 1.0 b. Internet c. Web 2.0 d. Web 3.0

04. Twitter statuses are only composed of a few characters. What type of social media site does
Twitter belong?
a. Micro blogging c. Social Networks
b. Media Sharing d. Bookmarking Sites
For numbers 5 and 6, use the choices inside the box.
A. If only the FIRST statement is TRUE C. If BOTH statements are TRUE
B. If only the SECOND statement is TRUE D. If BOTH statements are FALSE

05. Social networks are sites that allow you to connect with other people having the same
interests. It allows you to share your own news and other news from other sources.

06. The Philippines is considered as the “ICT Hub in Asia.” The ICT Industry shares 19.3% of the
total employment population in the Philippines coming from the government agencies.

07. Marisa wants to publish her collections of original poems online. Which online platform must
she do this?
a. Social News c. YouTube
b. Bookmarking Sites d. Blogs

08. Watson is creating a cover video of his favorite song. Which online platform must he publish
this?
a. Social News c. YouTube
b. Bookmarking Sites d. Blogs

09. Cathy has created a very good slideshow presentation on a certain topic, and she wants to
share it to other teachers around the world. Which online platform must she publish this?
a. Presentation Platforms c. File Management Platforms
b. Cloud Computing Platforms d. Social Media Platforms
10. What is the name of the symbol that is used to classify and categorize information?
a. Hashtag b. Question Mark c. Askterisk d. At sign

Empowerment Technology
References

1. De Lara, Maricel. (2016, Nov. 3). Empowerment Technology. Retrieved from


https://www.slideshare.net/maricelbaldomerodelara/lesson-1-empowerment-
technology
2. Educational Technology: Students Readiness and Self – Assessment. Retrieved
from https://www.surveymonkey.com/r/ET_studentreadiness.
3. Quiambao, A. (2019, Sep 8). Online platforms for ICT Content Development.
Retrieved from https://www.slideshare.net/AngelitoQuiambao/onlineplatforms-
for-ict-content-development-169954837.

LESSON 2
Online Safety, Security and Netiquette

Objectives:
By the end of this lesson, you should be able to:
1. Identify what constitutes appropriate and inappropriate online behavior.
2. Apply internet online safety, security ethics and etiquette standards and practice in the use of ICTs.
3. Discern possible deceptive information and wrongly evaluated data

Pre-test: Please answer the pre-test to measure what topics have you known so far.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers in your notebook.

01. What is Netiquette?


a. The proper use of manners and etiquette on the internet?
b. Using a net to catch fish.
c. Being mean to other people on Facebook.
d. Using proper manners at the dinner table
02. What is considered shouting over the Internet?
a. Screaming at your computer.
b. Writing in all CAPS.
c. Putting a lot of exclamation marks at the end of a sentence.
d. Not answering a friend request on Facebook.

03. It is OK to forward or post an email message that you received if __________


a. the message is typed in all capitals.
b. the author of the message has given you permission to forward or post it.
c. it does not contain any copyrighted material.
d. the author of the message hasn't marked it as confidential.

Empowerment Technology
04. What is a flame in cyberspace?
a. A person who follows the rules of Netiquette.
b. An expert programmer.
c. An online chain letter.
d. A post or email message that expresses a strong opinion or criticism

05. Knowledge and understanding of netiquette is useful because ___________


a. it will help you create a positive impression on those you meet in cyberspace.
b. it explains some of the technical limitations of online communications.
c. it explains the conventions already being used by millions of cybernauts.
d. All of the above.

06. What type of online threat happens when an attacker uses electronic devices to do unwanted
surveillance against its victim?
a. Cyberbullying b. Phishing c. Spamming d. Cyberstalking

07. What type of online threat happens when the attacker impersonates another individual or
organization to gather personal or business information?
a. Cyberstalking b. Spoofing c. Scamming d. Pharming

08. What type of information should you avoid giving when using the internet?
a. Phone number b. Profile Picture c. Shirt Size d. Religion

09. What is the golden rule of netiquette?


a. Remember the human.
b. Put a smiley in every message.
c. Use correct grammar.
d. Respect people’s time.
You get an email telling you that you won a hundred thousand without joining in a competition.
10. You should ____________.

Lesson 2.1: Online Risks

There's almost no limit to what you


can do online. The Internet makes
it possible to access information
quickly, communicate around the
world, and much more.
Unfortunately, the Internet is also
home to certain risks, such as
malware, spam, and phishing. If
you want to stay safe online, you'll
need to understand these risks and
learn how to avoid them.

Empowerment Technology
Activity 2.1: Shared or Not Shared? That is the Question

DIRECTIONS: Read and reflect each item carefully. Copy the table below on your notebook and
check the space whether you have shared or not shared these pieces of information in all your social
media accounts.
Type of Information Shared Not Shared
First Name
Middle Name
Last Name
Current and Previous Schools
Your cellphone number
Complete name of mother and
father
Your parents’ cellphone number
Name of siblings
Your address
Your birthday

01. How many of the information have you SHARED?

02. How many of the information have you NOT SHARED?

03. Based on your answers above, do you think you are safe when using the Internet? Why?

Lesson 2.2: Online Safety, Security and Netiquette

Online safety refers to the practices and precautions that should be observed when using the
internet to ensure that the users as well as their computers and personal information are safe
from crimes associated with using the internet. Below are personal information that must be kept
confidential.

Empowerment Technology
There are numerous delinquencies that can be
committed on the internet such as stalking,
identity theft, privacy violations, and harassment.

To avoid these online crimes, follow the


following online safety measures:

Never give any personal information out


about yourself over the internet.

Do not give any banking or sensitive


information unless you are sure that it is a
reputable business having a secure
service. To make sure that you are in a
secured network, the website address
should begin with “https://’ as opposed to
“http://”. Never access your accounts by
following an email link, instead type your
URL by yourself.

Never open messages or attachments from someone you do not know

Regularly review your privacy settings in your online accounts to make sure you are not sharing
important personal information.

When using a public computer terminal, be sure to delete your browsing data before leaving.

Keep your software updated to avoid security holes.

Do not download or install software or anything on your computer or cell phone that is unknown to
you.

Netiquette is a combination of the words network and


etiquette. It is a set of rules for behaving properly online.
Below are the 10 rules of netiquette:
Flame war is a series of
flame posts or messages in
a thread that are considered
derogatory in nature or are
completely off-topic. Often
these flames are posted for
the sole purpose of offending
or upsetting other users. The
flame becomes a flame war
when other users respond to
the thread with their own
flame message.

Image from:
https://twitter.com/Parkster00/status/
1246347088625045504

Empowerment Technology
Lesson Activity 2.2: Can You Keep It Private?

DIRECTIONS: Choose the most appropriate thing to do in the following situation. Write the letter of
the correct answer in your notebook.

01. Your family is going out on a vacation. What should you do?
a. Post pictures when you return home.
b. Post the dates you will be gone online.
c. Post updates of where you are currently checking in hotels or places.
d. Tell no one. Vacations are for getting away.

02. Do you have the same passwords for all your accounts?
a. Yes. That is how I remember all my passwords.
b. I have different passwords for all different accounts.
c. I keep it simple. I don’t have any passwords.
d. I have two similar passwords that I alternately use for all my accounts.

03. Choose which image below describes how you feel about sharing your password with your
boyfriend/ girlfriend?

Image source: https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm.

04. Your parents bought you your first cellphone. How will you share your cellphone number?
a. Do not share your cellphone number to anyone.
b. Post your cellphone number in your social media account.
c. Share your cellphone number only in person.
d. Post your cellphone number in your group chat
05. Your social media friends list should only be composed of ______________.
a. Your favorite brands.
b. Family and friends
c. Anyone who sends you a friend request
d. Foreigners

Empowerment Technology
Lesson 2.3: Kinds of Online Threats

There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the years,
many internet predators have been playing on vulnerabilities to attack computers and retrieve sensitive
data from individuals. Half the time, we aren’t even aware it is happening until it is too late.

Online threat is deemed any malicious act that attempts to gain access to a computer network without
authorization or permission from the owners. These are usually done by computer hackers who uses
the World Wide Web to facilitate cybercrime. Web threats use multiple types of malware and fraud, all
of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such
as links in email or Instant Messaging apps, or any malware attachments on servers that access the
Web. They benefit cybercriminals by stealing information for subsequent sale and help absorb infected
PCs into botnets. Web threats pose a broad range of risks, including financial damages, identity theft,
loss of confidential information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking.

The following are the top kinds of online threats that you should be aware of:

Phishing happens when an email is sent from an internet criminal disguised as an email from a
legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or
confidential information

Image source: https://searchsecurity.techtarget.com/definition/phishing

Empowerment Technology
Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead
of a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including
usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually
focus on websites in the financial sector, including banks, online payment platforms, or other e-
commerce destinations.

Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html

Internet Scam generally refers to


someone using internet services
or software to defraud or take
advantage of victims, typically for
financial gain. Cybercriminals may
contact potential victims through
personal or work email accounts,
social networking sites, dating
apps, or other methods in
attempts to obtain financial or
other valuable personal
information. Online scams may

come in various forms such as lottery scam, charity fraud scams, job offer scams, and online
dating scams to name a few.

Empowerment Technology
Internet robots are also known as spiders, crawlers, and web bots. It is a software application that
is programmed to do certain tasks. Bots are automated, which means they run according to their
instructions without a human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots are "bad" and are
programmed to break into user accounts, scan the web for contact information for sending spam,
or perform other malicious activities. If it's connected to the Internet, a bot will have an associated
IP address.
Malware or malicious software, is any program or file that is harmful to a computer user. Here
are the most common offenders in the rogues’ gallery of malware:
Adware (advertising supported software) is unwanted software designed to throw
advertisements up on your screen. Example, pop-up ads and banner ads.

Spyware is malware that secretly observes the computer user’s activities without permission
and reports it to the software’s author. Example is a keylogger
Virus and Worms are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and
infecting them with its own bits of code.
Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents
itself as something useful in order to trick you. Once it’s on your system, the attackers behind
the Trojan gain unauthorized access to the affected computer. From there, Trojans can be
used to steal financial information or install threats like viruses and ransomware.
Ransomware is a form of malware that locks you out of your device and/or encrypts your
files, then forces you to pay a ransom to get them back.
Spams are unsolicited emails, instant messages coming from recipients that are not granted
verifiable permission for the message to be sent. Spam messages can be damaging if you open or
respond to it.

Cyberstalking refers to the use of the internet or other electronic device to harass or stalk
individuals or organizations.

Empowerment Technology
Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using
the internet.

Spoofing happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.

Lesson Activity 2.3: Show Me Your Hashtag

Direction: Look at the following images and create a hashtag based on the type of online threat
represented by each image. Write your answers in your activity notebook.

01. 02. 03.

04. 05.

Empowerment Technology
Reflect on this and write your answers in your notebook.
From all you have learned in Lesson 2, why is there a need to “think before you
click?”

Assessment
Directions: Read each item carefully and choose the letter of the correct
answer. Write your answers in your notebook.

01. What type of malicious program is designed to replicate itself and transfer from one
computer to another either through the internet or local networks or data storage like
flash drives and CDs?
a. Adware c. Worms and Virus
b. Spyware d. Ransomware
02. What harmful online programs are designed to send you advertisements, mostly pop-
up ads?
a. Adware c. Worms and Virus
b. Spyware d. Ransomware
03. What harmful online program is used to record keystrokes done by users to steal
passwords?
a. Adware c. Worms and Virus
b. Spyware d. Ransomware
04. What is ransomware based on?
a. Fear of hackers c. Fear of sypware
b. Fear of the internet d. Fear of losing important files
05. Which of the following is an example of a “phishing” attack?
a. Sending someone an email that contains a malicious link that is disguised to look
like an email from someone reliable.
b. Creating a fake website that looks nearly identical to a real website in order to trick
users into entering their login information.
c. Sending someone a text message looks like a notification that the person has won
a contest.
d. Sending someone an email that records their keystroke activities while using their
computers.

Empowerment Technology
06. Which of the following must NOT be done if you received an embarrassing picture
from your friend?
a. Tell your parents or teachers
b. Send the picture on to other friends
c. Talk to your friend about its negative outcomes.
d. Discourage your friend from sending pictures like that.

07. What is a flame in cyberspace?


a. A person who follows the rules of Netiquette.
b. An expert programmer.
c. An online chain letter.
d. A post or email message that expresses a strong opinion or criticism.

08. What is considered shouting over the Internet?


a. Screaming at your computer.
b. Writing in all CAPS.
c. Putting a lot of exclamation marks at the end of a sentence.
d. Not answering a friend request on Facebook.

09. To avoid being cyber-bullied you should always...


a. Give out personal information to anyone who asks.
b. Strike first - post mean things about other people on your Wall on Facebook.
c. Observe proper netiquette rules.
d. Ignore any requests from people to be your friend online

10. How are you judged in cyberspace?


a. No one can see you, so no one can judge you.
b. You are judged by what you do on the Internet and how it looks – by your spelling,
grammar, and netiquette.
c. You are judged by your intent - if you didn't mean to hurt someone's feelings, then
it's okay.
d. You are judged by how you look – your profile picture is important.

References

1. ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-


cbn.com/list/tag/identity-theft.
2. National Center for Missing and Exploited Children. (n.d.). NSTeens: Can you keep it
private
3. Netiquette Quiz. Retrieved from
https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.html
4. Quiambao, Angelito. (2018, Jul. 23). Online safety, security, ethics, and etiquette.
Retrieved from https://www.slideshare.net/AngelitoQuiambao/online-safety-security-
ethicsamp-etiquette.
5. Belcic, Ivan. (2019, Nov. 7). What is pharming and how to protect against attacks.
Retrieved from https://www.avg.com/en/signal/what-is-pharming.

Empowerment Technology
Images

1. https://twitter.com/Parkster00/status/1246347088625045504
2. Shea, Virginia. (2011). Netiquette. Retrieved from
http://www.albion.com/netiquette/introduction.html
3. https://searchsecurity.techtarget.com/definition/phishing
4. https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-websitepharming.html
5. Chua, Ryan (2011, May 24). ABS-CBN News. Are you a victim of cyberstalking.
Retrieved from https://news.abs-cbn.com/nation/05/24/11/are-youvictim-cyber-stalking.
6. Andrade, Jeannette. (2012, June 2). Teen arrested for Facebook blackmail. Retrieved
from https://technology.inquirer.net/11673/teen-arrested-forfacebook-blackmail.
7. https://www.avg.com/en/signal/what-is-spyware
8. https://itigic.com/tag/adware/
9. https://dlpng.com/png/6702600
10. https://www.gtmaritime.com/free-phishing-penetration-test/
11. http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-tobenefit-
consumers-says-globe-telecom/

LESSON 3
Effective Internet Research

Objectives:
By the end of this lesson, you should be able to:
1. Facilitate the practice in judging the credibility, value, and usefulness of researched materials.
2. Use the Internet as a tool for credible research and information gathering to best achieve specific
objectives.

Pre-test: Please answer the pre-test to measure what topics have you known so far.

Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers in your notebook.
01. What is the Boolean logic technique used for?
a. Narrowing, broadening or eliminating a search term.
b. Using a robot to do instant research.
c. Searching several search engines at the same time.
d. Searching the infinite information from the internet.

Empowerment Technology
02. http://www.avg.com/en/signal/what-is-spyware is an example of?
a. Access Code b. Directory c. Server d. URL

03. Which of the following is a search engine?


a. Netscape b. Yahoo c. Elsevier d. Macromedia Flash

04. Which of the following is NOT an example of a domain?


a. .gov b. .com c. .npr d. .edu

05. What are the three Boolean logic search operators?


a. FROM, TO, WHOM
b. AND, OR, NOT
c. AND, OR, BUT
d. SEARCH, KEYWORD, TEXT

Lesson Activity 3.1: What’s In My Name?

Direction: Write all your answers in your activity notebook

01. http://www.avg.com/en/signal/what-is-spyware is an example of?

02. Write down how many sites have featured your personal name and what is written about you

03. Answer the following:

What other information are written about you?

Are the search results coming from reliable sources? Why?

Should these bits of information need to be posted or shown in public?

Empowerment Technology
Lesson 3.1: Searching the Web

There are billions of information on the web and it is a challenge for us to truly find which information is
reliable and relevant. Here are some tips you may use to be able to look for relevant and reliable sources:

Search Engines are websites used for retrieval of data, files, or documents from data bases. Some
search engines we use today are:

Anatomy of a URL

A URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types of names and
addresses that refer to objects on the world wide web. Knowing the URL endings will give you clues to
who is sponsoring the website and help evaluate the sources.

1. Protocol 4. Top-Level Domain 7. Name anchor


2. Subdomain 5. Folders/Paths
3. Domain 6. Page

Empowerment Technology
Popular Domains

Top-Level Domain Country Code Top Level Domain


.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network

Search Skills and Tools

01. Boolean Logic – narrows, broadens, or eliminates search term


a. Boolean “or” – this operator will find pages that include either of the search terms.
Example: A or B

b. Boolean “and” – this operator will retrieve only pages containing both terms

Example: A and B

c. Boolean “not” – this operator will find pages that do not include search term
immediately following it.
Example: A not B

Phase Searching – is used to search for famous quotes, proper names, recommendations,
02. etc. It encloses the phrase in quotation marks.

Example: “Jane Doe” “To be or not to be”

Plus (+) – indicates that the word after the sign is a required word must be found in search.
03. Example: +fire

Empowerment Technology
Minus (–) sign – indicates to exclude a word from your search that is not required on the
04. result. Example: Jaguar speed –car
05. Ampersand (@) is used to find social tags. Example: @SteveJobs

06. Hashtag (#) is used to find popular hashtags. Example: #LawOfClassroom

07. Finding Documents – using the filetype refines the search for documents on the web.
o filetype:pdf
o filetype:doc
o filetype:xls
Ex. ICT in the Philippines pdf

08. Searching Site – the sites find webpage from a website.

Ex.: National Geographic information in Australia


Search: Australia site: NationalGeographic.com

Lesson 3.2: Evaluating Sites

The web provides access to some excellent information and can also give access to those that are
irrelevant and outdated. Here is some checklist that you can use to evaluate your website:
Authority. It reveals that the person, institution or agency responsible for a site has the
01. qualifications and knowledge to do so. Evaluating a web site for authority:

✓ Authorship: It should be clear who developed the site.


✓ Contact information should be clearly provided: e-mail address, snail mail address,
phone number, and fax number.
✓ Credentials: the author should state qualifications, credentials, or personal
background that gives them authority to present information.
✓ Check to see if the site supported by an organization or a commercial body.
Purpose. The purpose of the information presented in the site should be clear. Some sites
02. are meant to inform, persuade, state an opinion, entertain, or parody something or someone.
valuating a web site for purpose:
✓ Does the content support the purpose of the site?
✓ Is the information geared to a specific audience (students, scholars, general reader)?
✓ Is the site organized and focused?
✓ Are the outside links appropriate for the site?
✓ Does the site evaluate the links?
Coverage. This refers to how comprehensive the website is in their discussion of certain
03. topics. Evaluating a web site for coverage.
✓ Does the site claim to be selective or comprehensive?
✓ Are the topics explored in depth?
✓ Compare the value of the site’s information compared to other similar sites.
✓ Do the links go to outside sites rather than its own?
✓ Does the site provide information with no relevant outside links?

Empowerment Technology
Currency. It refers to: (1) how current the information presented is, and (2) how often the site
04. is updated or maintained. It is important to know when a site was created, when it was last
updated, and if all of the links are current. Evaluating a web site for currency involves finding
the date information was:
✓ First written
✓ Placed on the web
✓ Last revised
Objectivity. Objective sites present information with a minimum of bias.
05. Evaluating a web site for objectivity:
✓ Is the information presented with a particular bias?
✓ Does the information try to sway the audience?
✓ Does site advertising conflict with the content?
✓ Is the site trying to explain, inform, persuade, or sell something?

06. Accuracy. It refers to the credibility of the website. Evaluating a web site for accuracy:
✓ Reliability: Is the author affiliated with a known, respectable institution?

✓ References: do statistics and other factual information receive proper references as


to their origin?

✓ Is the information comparable to other sites on the same topic?

✓ Does the text follow basic rules of grammar, spelling and composition?
Lesson Activity 3.2: Evaluating Websites: Checklist
✓ Is a bibliography or reference list included?
This activity is adapted from the University of Maryland: Evaluating Web Sites: A Checklist

www.lib.umd.edu/tl/guides/evaluating-checklist
Directions
01. Using the Internet, research on topics under CoVid-19 in the Philippines.
02. Read through the checklist and answer each question in your notebook.

03. Attach a printout of the web site you are evaluating and paste in your notebook.

Please write your answers on your notebook:

01. What is the URL or web address of the web site you are evaluating?
http://______________________________________________

02. What is the title of the web site? _____________________________________________

AUTHORITY AND ACCURACY

I couldn’t tell

The author is: ____________________________________________________________


Who is the author of the web site?

Empowerment Technology
What authorship clues did the URL (web address) provide? Check all that apply:

company (.com) country-specific site (e.g., .uk)

non-profit organization (.org) military site (.mil)

academic institution (.edu) network of computer (.net)

government agency (.gov) other? Please describe:

personal web page (e.g., www.jamieoliver.com)

PURPOSE AND CONTENT

What is the purpose of the web page or site? Check all that apply:

A personal web page For entertainment

A company or organization web site An advertisement or electronic commerce

A forum for educational/public service information A forum for ideas, opinions, or points of view

A forum for scholarly/research information Other – please explain:

In your own words, briefly describe the purpose of the web site:

What does the web site provide? Check one:

Balanced, objective or factual Both objective and subjective


information information
Biased, subjective or opinionated I couldn’t tell
statements
Are the arguments well supported? ____ Yes ____ No Other – please explain:

Does the web site provide any contact information or means of communicating with the author
or webmaster? ____ Yes _____ No

Empowerment Technology
CURRENCY

I couldn’t tell

It was updated on: _____________________________________

When was the web site last revised, modified, or updated?

Is the site well maintained?

I couldn’t tell
Yes

No
File: Evaluating Websites: A Checklist
University of Maryland Libraries * T&L * 2/2014

Assessment
Directions: Read each item carefully and choose the letter of the correct
answer. Write your answers in your notebook.

01. What type of malicious program is designed to replicate itself and transfer from one computer
to another either through the internet or local networks or data storage like flash drives and
CDs?
a. Will only return items that have both terms.
b. Will search for words that are together and in order
c. Will return items that exclude a term
d. Will return items that have either of the terms

02. What is a URL?


a. A computer software program
b. An acronym for Unlimited Resources for Learning
c. The address of a document or "page" on the World Wide Web
d. A search engine
03. What are the three main search expressions, or operators, recognized by Boolean logic?
a. and, or, not
b. from, to whom
c. and, or, but
d. search, keyword, text

04. How do you evaluate a web page?


a. You confirm that the author or site an authority on the subject.
b. You check to see if the author has been objective.
c. You check to see if the information is current.
d. You do as many of the above as possible.

05. An article that only presents one point of view or omits facts is biased.
a. True b. False

Empowerment Technology
References
1. Dalhousie University. (n.d.) 6 criteria for websites. Retrieved from
https://cdn.dal.ca/content/dam/dalhousie/pdf/library/CoreSkills/6_Criteria_for_Websites
.pdf.
2. Quiambao, Angelito. (2018, Jul. 23). Contextualized Online Search and Research Skills.
Retrieved from https://www.slideshare.net/AngelitoQuiambao/onlineresearch-
107104482.
3. University of Maryland. (2020). Evaluating Web Sites: A Checklist. Retrieved from
www.lib.umd.edu/tl/guides/evaluating-checklist.

Empowerment Technology

You might also like