Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

1

Republic of the Philippines


Department of Education
N a t i o n a l C a pi t a l Re g i o n
Sc h o o l s D i v i s i o n O f f i c e o f La s Pi ñ a s C i t y
NAME: ___________________________________________ Score:______________
GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 1

MOST ESSENTIAL LEARNING COMPETENCY


• Compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges
(CS_ICT11/12-ICTPT-Ia-b1)

OBJECTIVES
1. Improve their knowledge on how ICT affects their everyday lives and the state of
our nation;
2. Compare and contrast the differences between hardware and software;
3. Understand the functions and importance of a computer.

PRE-TEST: Multiple Choice (10 Points)


Directions: Read each item carefully. Write the letter of the correct answer on a
separate sheet of paper.
1. What does RAM stand for?
A. Radical Amount of Memory C. Rich Amount of Money
B. Random Access Memory D. Right Amount of Memory

2. What is the smallest unit of measure?


A. Bit C. Kiloybyte
B. Byte D. Megabyte

3. What does CPU stand for?


A. Central Processing Unit C. Computer Processing
Upflow
B. Computer Patch Unit D. Control Printing Unit

4. Which of the following is the largest?


A. Bit C. Entertainment
B. Byte D. Megabyte

5. Who started Microsoft?


A. Bill Gates C. James Brown
B. Elon Musk D. Steve Jobs

2
INFORMATION AND COMMUNICATION TECHNOLOGIES

Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to locate,
save, send, and edit information.

When we make a video call, we use the Internet. When we send a text or make a call, we
use cellular networks. When we run out of load or battery, we use payphones which use a
telephone network. Having a unified way to communicate is one of the goals of ICT. In terms
of economics, ICT has saved companies a lot of resources (time and money) with the kind
of communication technology they use.

ICT in the Philippines

Several international companies dub the Philippines as the “ICT Hub of Asia.” It is
no secret that there is a huge growth of ICT-related jobs around the country, one of which
is the call center or BPO (Business Process Outsourcing) centers.

According to the 2013 edition of Measuring the Information Society by the


International Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in
the year 2012. That would mean that for every 100 Filipinos you meet, there is a high
chance that they have a cellphone and approximately for the seven of them, they have two.

https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.lifewire.com%2Fhow-fast-
does-your-pc-need-to-be-
832310&psig=AOvVaw0yA7sU4LWx1BEiWTa2ibZH&ust=1625388411141000&source=im
ages&cd=vfe&ved=0CAoQjRxqFwoTCJi18fDBxvECFQAAAAAdAAAAABAD

COMPUTER

3
A computer is an electronic device, operating under the control of instructions stored
in its own memory that can accept data (input), process the data according to specified
rules, produce information (output), and store the information for future use.

FUNCTIONALITIES OF A COMPUTER
Any digital computer carries out five functions in gross terms:
• Takes data as input.
• Stores the data/instructions in its memory and use them when required.
• Processes the data and converts it into useful information.
• Generates the output.
• Controls all the above four steps.

Computer Components:
Any kind of computers consists of HARDWARE AND SOFTWARE.

• Hardware:
o Computer hardware is the collection of physical elements that constitutes a
computer system. Computer hardware refers to the physical parts or
components of a computer such as the monitor, mouse, keyboard, computer
data storage, hard drive disk (HDD), system unit (graphic cards, sound cards,
memory, motherboard and chips), etc. all of which are physical objects that
can be touched.

https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.pinterest.com%2Fpin%2F
20618110771593878%2F&psig=AOvVaw2R3JHsGpSYMn1f87I581vR&ust=16253886304

4
69000&source=images&cd=vfe&ved=0CAoQjRxqFwoTCIC819rCxvECFQAAAAAdAAAAABA
D

INPUT DEVICES
Input device is any peripheral (piece of computer hardware equipment to provide
data and control signals to an information processing system such as a computer or other
information appliance. Input device Translate data from form that humans understand to
one that the computer can work with. Most common are keyboard and mouse.

https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.assignmentpoint.com%2
Fwp-content%2Fuploads%2F2014%2F09%2Finput-
devices.jpg&imgrefurl=https%3A%2F%2Fwww.assignmentpoint.com%2Fscience%2Fcomp
uter%2Flecture-input-
devices.html&tbnid=FrU55AuMc9JWDM&vet=12ahUKEwj2kvr2wsbxAhVI7JQKHW9jBYM
QMygKegUIARDIAQ..i&docid=_VoHvvrh3GDdZM&w=260&h=194&q=example%20of%20in
put%20devices&ved=2ahUKEwj2kvr2wsbxAhVI7JQKHW9jBYMQMygKegUIARDIAQ

Example of Input Devices:


1. Keyboard 8. MIDI Keyboard 15. Digital Camera
2. Mouse (pointing 9. Graphic Tablets 16. Joystick
device)
3. Microphone 10. Cameras 17. Gamepad
4. Touch Screen 11. Pen Input 18. Electronic
Whiteboard
5. Scanner 12. Video Capture Hardware
6. Webcam 13. Trackballs
7. Touchpads 14. Barcode Reader

Central Processing Unit (CPU)


- A CPU is brain of a computer. It is responsible for all functions and processes.
Regarding computing power, the CPU is the most important element of a
computer system.

5
The CPU is comprised of three main parts :
1. Arithmetic Logic Unit (ALU): Executes all arithmetic and logical operations.
Arithmetic calculations like as addition, subtraction, multiplication and division.
Logical operation like compare numbers, letters, or special characters

2. Control Unit (CU): controls and co-ordinates computer components.


1. Read the code for the next instruction to be executed.
2. Increment the program counter so it points to the next instruction.
3. Read whatever data the instruction requires from cells in memory.
4. Provide the necessary data to an ALU or register.
5. If the instruction requires an ALU or specialized hardware to complete,
instruct the hardware to perform the requested operation.

3. Registers: Stores the data that is to be executed next, "very fast storage area".

PRIMARY MEMORY

1. RAM: Random Access Memory (RAM) is a memory scheme within the computer
system responsible for storing data on a temporary basis, so that it can be promptly
accessed by the processor as and when needed. It is volatile in nature, which means
that data will be erased once supply to the storage device is turned off. RAM stores
data randomly and the processor accesses these data randomly from the RAM
storage. RAM is considered "random access" because you can access any memory
cell directly if you know the row and column that intersect at that cell.

2. ROM (Read Only Memory): ROM is a permanent form of storage. ROM stays active
regardless of whether power supply to it is turned on or off. ROM devices do not
allow data stored on them to be modified.

SECONDARY MEMORY
Stores data and programs permanently: its retained after the power is turned off.
1. Hard drive (HD): A hard disk is part of a unit, often called a "disk drive," "hard drive,"
or "hard disk drive," that store and provides relatively quick access to large amounts
of data on an electromagnetically charged surface or set of surfaces.

2. Optical Disk: an optical disc drive (ODD) is a disk drive that uses laser light as part
of the process of reading or writing data to or from optical discs. Some drives can
only read from discs, but recent drives are commonly both readers and recorders,
also called burners or writers. Compact discs, DVDs, and Blu-ray discs are common
types of optical media which can be read and recorded by such drives. Optical drive
is the generic name; drives are usually described as "CD" "DVD", or "Bluray", followed
by "drive", "writer", etc. There are three main types of optical media: CD, DVD, and
Blu-ray disc. CDs can store up to 700 megabytes (MB) of data and DVDs can store
up to 8.4 GB of data. Blu-ray discs, which are the newest type of optical media, can

6
store up to 50 GB of data. This storage capacity is a clear advantage over the floppy
disk storage media (a magnetic media), which only has a capacity of 1.44 MB.

3. Flash Disk: A storage module made of flash memory chips. A Flash disks have no
mechanical platters or access arms, but the term "disk" is used because the data are
accessed as if they were on a hard drive. The disk storage structure is emulated.

OUTPUT DEVICES
An output device is any piece of computer hardware equipment used to communicate
the results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into humanreadable
form.

Example on Output Devices:


1. Monitor 5. Plotters
2. LCD Projection Panels 6. Speaker(s)
3. Printers (all types) 7. Projector
4. Computer Output Microfilm (COM)
• SOFTWARE TYPES
A. System software
- is responsible for controlling, integrating, and managing the individual
hardware components of a computer system so that other software and the
users of the system see it as a functional unit without having to be
concerned with the low-level details such as transferring data from memory
to disk, or rendering text onto a display. Generally, system software consists
of an operating system and some fundamental utilities such as disk
formatters, file managers, display managers, text editors, user
authentication (login) and management tools, and networking and device
control software.

B. Application software

- is used to accomplish specific tasks other than just running the computer
system. Application software may consist of a single program, such as an
image viewer; a small collection of programs (often called a software
package) that work closely together to accomplish a task, such as a
spreadsheet or text processing system; a larger collection (often called a
software suite) of related but independent programs and packages that have
a common user interface or shared data format, such as Microsoft Office,
which consists of closely integrated word processor, spreadsheet, database,
etc.;

UNIT OF MEASUREMENTS
Storage measurements:

7
The basic unit used in computer data storage is called a bit (binary digit). Computers
use these little bits, which are composed of ones and zeros, to do things and talk to other
computers. All your files, for instance, are kept in the computer as binary files and
translated into words and pictures by the software (which is also ones and zeros). This two
number system, is called a “binary number system” since it has only two numbers in it.
The decimal number system in contrast has ten unique digits, zero through nine.
Computer Storage Units
Bit BIT 0 or 1
Kilobyte KB 1024 bytes
Megabyte MB 1024 kilobytes
Gigabyte GB 1024
megabytes
Terabyte TB 1024 gigabytes
Size example
• 1 bit - answer to an yes/no question
• 1 byte - a number from 0 to 255.
• 90 bytes: enough to store a typical line of text from a book.
• 4 KB: about one page of text. • 120 KB: the text of a typical pocket book.
• 3 MB - a three minute song (128k bitrate)
• 650-900 MB - an CD-ROM
• 1 GB -114 minutes of uncompressed CD-quality audio at 1.4 Mbit/s
• 8-16 GB - size of a normal flash drive
COMPUTERS CLASSIFICATION*
Computers can be generally classified by size and power as follows, though there is
Considerable overlap:
• Personal computer: A small, single-user computer based on a microprocessor. In
addition to the microprocessor, a personal computer has a keyboard for entering
data, a monitor for displaying information, and a storage device for saving data.
• Workstation: A powerful, single-user computer. A workstation is like a personal
computer, but it has a more powerful microprocessor and a higher-quality monitor.
• Minicomputer: A multi-user computer capable of supporting from 10 to hundreds
of users simultaneously.
• Mainframe: A powerful multi-user computer capable of supporting many
hundreds or thousands of users simultaneously.
• Supercomputer: An extremely fast computer that can perform hundreds of
millions of instructions per second.

LAPTOP AND SMARTPHONE COMPUTERS


LAPTOP:
- A laptop is a battery or AC-powered personal computer that can be easily carried
and used in a variety of locations. Many laptops are designed to have all of the
functionality of a desktop computer, which means they can generally run the
same software and open the same types of files. However, some laptops, such as
netbooks, sacrifice some functionality in order to be even more portable.

8
Netbook:
- A netbook is a type of laptop that is designed to be even more portable. Netbooks
are often cheaper than laptops or desktops. They are generally less powerful than
other types of computers, but they provide enough power for email and internet
access, which is where the name "netbook" comes from.
Mobile Device:
- A mobile device is basically any handheld computer. It is designed to be extremely
portable, often fitting in the palm of your hand or in your pocket. Some mobile
devices are more powerful, and they allow you to do many of the same things you
can do with a desktop or laptop computer. These include tablet computers, e-
readers, and smartphones.
Tablet Computers:
- Like laptops, tablet computers are designed to be portable. However, they provide
a very different computing experience. The most obvious difference is that tablet
computers don't have keyboards or touchpads. Instead, the entire screen is
touch-sensitive, allowing you to type on a virtual keyboard and use your finger
as a mouse pointer. Tablet computers are mostly designed for consuming media,
and they are optimized for tasks like web browsing, watching videos, reading e-
books, and playing games. For many people, a "regular" computer like a desktop
or laptop is still needed in order to use some programs. However, the convenience
of a tablet computer means that it may be ideal as a second computer.

POST-TEST: Multiple Choice (5 Points)


Directions: Read each item carefully. Write the letter of the correct answer on a
separate sheet of paper.
1. Which of the following is NOT hardware?
A. CPU C. Mouse
B. Keyboard D. Windows 10

2. Which things are common to all computers?


A. Calculate and design C. calculate, design, type and print
B. input, store, process and output D. type and print

3. How many digits does a binary number system use?


A. 1 C. 10
B. 2 D. 100

4. Which of the following statements correctly describes an "Operating System?


A. It does all the processing.
B. It stores things in the memory.
C. Manages how software uses the hardware of a computer.
D. The program that does all the calculations.

5. Who started Apple?


A. Bill Gates C. James Brown
B. Elon Musk D. Steve Jobs

9
NAME: ___________________________________________ Score:______________
GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 2

MOST ESSENTIAL LEARNING COMPETENCY


• Compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class ob jectives or address situational challenges
(CS_ICT11/12-ICTPT-Ia-b1)

OBJECTIVES
4. Improve their knowledge on how ICT affects their everyday lives and the state of
our nation;
5. Compare and contrast the differences between hardware and software;
6. Understand the functions and importance of a computer.

PRE-TEST
Multiple Choice: Select the best answer to the following multiple-choice questions about
the Introduction to Computer (10 points)
1. Which of the following is the early internet that only allows people to read from the
internet.
A. Web 0.0 C. Web 2.0
B. Web 1.0 D. Web 3.0

10
2. Which of the following is a user-generated content and the read-write content?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0

3. Web 2.0 concept allow for many types of content (audio, video, text, and images)
and interaction (one-to-one, one-to-many, many-to-many). What does RIA stand
for?
A. Receive Internet Application C. Rich Internet Application
B. Receive Information Application D. Rock Internet Application

4. How web 2.0 tend to interact much more with the end user and making the end
user an Integral part.
A. Semantic Web C. Social Web
B. Spider Web D. Static Web

5. Which of the following does not belong to the web 1.0?


A. Companies own or produce the content
B. Focused on communities
C. Sites are static
D. Sites are not interactive
6. Which of the following does not belong to web 2.0?
A. Focuses on Communities
B. Read and Write Web
C. Sharing Content
D. Static Pages

7. Which of the following generations, where all the application on web or mobile will
be upgraded with more features which will allow for a unique browsing experience
for users?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0

8. Which of the following is an exciting new evolution of the World Wide Web (WWW)
providing machine-readable and machine-comprehensible information far beyond
current capabilities?
A. Dynamic Web C. Static Web
B. Semantic Web D. Web Browser

9. Read and Write, Web Interaction and collaborative communities are example of
which of the following?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0

11
10. Read only web, Information sharing, and company focused are example of
which of the following?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0

INFORMATION AND COMMUNICATION TECHNOLOGIES

The Current State of ICT ICT – Information and Communications Technology. It is


an extended term of Information Technology (IT). It stresses the role of unified
communications and the integration of telecommunications, computers, as well as
necessary enterprise software, middleware, storage, and audio- visual systems, which
enable users to access, store, transmit, and manipulate information.

Web 1.0, Web 2.0 and Web 3.0 with their difference

Web 1.0 refers to the first stage of the World Wide Web evolution. Earlier, there were
only few content creators in Web 1.0 with the huge majority of users who are consumers of
content. Personal web pages were common, consisting mainly of static pages hosted on ISP-
run web servers, or on free web hosting services.
In Web 1.0 advertisements on websites while surfing the internet is banned. Also, in
Web 1.0, Ofoto is an online digital photography website, on which user could store, share,
view and print digital pictures. Web 1.0 is a content delivery network (CDN) which enables
to showcase the piece of information on the websites. It can be used as personal websites.
It costs to user as per pages viewed. It has directories which enable user to retrieve a
particular piece of information.

Four design essentials of a Web 1.0 site include:


1. Static pages.
2. Content is served from the server’s file-system.
3. Pages built using Server Side Includes or Common Gateway Interface (CGI).
4. Frames and Tables used to position and align the elements on a page.

Web 2.0: Dynamic Web Pages

Web 2.0 is a term coined by Darcy DiNucci on January 1999. In her article titled,
“Fragmented Future”.

Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages – the user is able
to see a website differently than others, include social networking sites, blogs, wikis, video
sharing sites hosted services, and web application. Web 2.0 allows users to interact with
the page, instead of just reading a page, the user may be able to comment or create a user

12
account. Also, use web browser instead of just using their operating system. Browsers can
now be used for their user interface, application software, and even for file storage.

Folksonomy, Rich User Experience, User Participation, Long Tail, Software as a


Service and Mass Participation as among the features of Web 2.0

Web 3.0 and the Semantic Web

The Semantic Web is a movement led by the World Wide Web Consortium (W3C). the
W3C standard encourages web developers to include semantic content in their web pages.
The term was coined by the inventor of the World Wide Web, Tim Berners-Lee, noted that
the Semantic Web is a component for Web 3.0

The Semantic Web provides a common framework that allows data to be shared and
reused across application, enterprise, and community boundaries. The aim of Web 3.0 is
to have machines (or servers) understand the user’s preferences to be able to deliver web
content specifically targeting the user.

Web 3.0 fully realized some several problems: Compatibility, Security, Vastness,
Vagueness, and Logic

Trends in ICT

1. Converge. Technological convergence is the synergy of technological advancement


to work on a similar goal or task

2. Social Media. Social Media is a website, application, or online channel that enables
web users to create, co-create, discuss, modify, and exchange user-generated
content.

Types of Social Media:


a. Social Network
b. Bookmarking Sites
c. Social News
d. Media Sharing
e. Microblogging
f. Blogs and Forums

3. Mobile Technologies. These devices are capable of using high-speed Internet using
4G Networking (LTE).

Operating Systems on Mobile Devices


a. iOS – used in Apple devices such as iPhone and iPad

13
b. Android – an open source operating system developed by Google.
c. Blackberry OS – used in Blackberry devices
d. Windows Phone OS – a close source and proprietary operating system
developed by Microsoft
e. Symbian – the original smartphone OS; used by Nokia devices
f. WebOs – originally used for smartphones; ow used for smart TVs
g. Windows Mobile – developed by Microsoft for smartphones and pocket PCs

4. Assistive Media. Assistive media is a nonprofit service designed to help people who
have visual and reading impairments. A database of audio recordings is used to read
to the user.

Web 2.0 refers to world wide website which highlight user-generated content, usability and
interoperability for end users. Web 2.0 is also called participative social web. It does not
refer to a modification to any technical specification, but to modify in the way Web pages
are designed and used. The transition is beneficial but it does not seem that when the
changes are occurred. An interaction and collaboration with each other is allowed by Web
2.0 in a social media dialogue as creator of user-generated content in a virtual community.
Web 1.0 is enhanced version of Web 2.0.
The web browser technologies are used in Web 2.0 development and it includes AJAX and
JavaScript frameworks. Recently, AJAX and JavaScript frameworks have become a very
popular means of creating web 2.0 sites.

Five major features of Web 2.0 –


1. Free sorting of information, permits users to retrieve and classify the information
collectively.
2. Dynamic content that is responsive to user input.
3. Information flows between site owner and site users by means of evaluation & online
commenting.
4. Developed APIs to allow self-usage, such as by a software application.
5. Web access leads to concern different, from the traditional Internet user base to a
wider variety of users
Usage of Web 2.0
The social Web contains a number of online tools and platforms where people share
their perspectives, opinions, thoughts and experiences. Web 2.0 applications tend to
interact much more with the end user. As such, the end user is not only a user of the
application but also a participant by these 8 tools mentioned below:
1. Podcasting
2. Blogging
3. Tagging
4. Curating with RSS
5. Social bookmarking

14
6. Social networking
7. Social media
8. Web content voting

Web 3.0 It refers the evolution of web utilization and interaction which includes
altering the Web into a database. In enables the upgradation of back-end of the web, after
a long time of focus on the front-end.
The Semantic Web (3.0) promises to establish “the world’s information” in more reasonable
way than Google can ever attain with their existing engine schema. This is particularly true
from the perspective of machine conception as opposed to human understanding.

Below are 5 main features that can help us define Web 3.0:
1. Semantic Web
The succeeding evolution of the Web involves the Semantic Web. The semantic web
improves web technologies in demand to create, share and connect content through
search and analysis based on the capability to comprehend the meaning of words,
rather than on keywords or numbers.
2. Artificial Intelligence
Combining this capability with natural language processing, in Web 3.0, computers
can distinguish information like humans in order to provide faster and more relevant
results. They become more intelligent to fulfil the requirements of users.
3. 3D Graphics
The three-dimensional design is being used widely in websites and services in Web
3.0. Museum guides, computer games, ecommerce, geospatial contexts, etc. are all
examples that use 3D graphics.
4. Connectivity
With Web 3.0, information is more connected thanks to semantic metadata. As a
result, the user experience evolves to another level of connectivity that leverages all
the available information.
5. Ubiquity
Content is accessible by multiple applications, every device is connected to the web,
the services can be used everywhere.

POST-TEST
Multiple Choice: Select the best answer to the following multiple-choice questions about
the Introduction to Computer (10 points)

1. Read and Write, Web Interaction and collaborative communities are example of
which of the following?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
2. Which of the following is a user-generated content and the read-write content?

15
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
3. How web 2.0 tend to interact much more with the end user and making the end
user an Integral part.
A. Semantic Web C. Social Web
B. Spider Web D. Static Web
4. Which of the following is an exciting new evolution of the World Wide Web (WWW)
providing machine-readable and machine-comprehensible information far beyond
current capabilities?
A. Dynamic Web C. Static Web
B. Semantic Web D. Web Browser
5. Which of the following is a user-generated content and the read-write content?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
6. Which of the following is the early internet that only allows people to read from the
internet.
A. Web 0.0 C. Web 2.0
B. Web 1.0 D. Web 3.0
7. Which of the following does not belong to web 2.0?
A. Focuses on Communities
B. Read and Write Web
C. Sharing Content
D. Static Pages
8. Web 2.0 concept allow for many types of content (audio, video, text, and images)
and interaction (one-to-one, one-to-many, many-to-many). What does RIA stand
for?
A. Receive Internet Application C. Rich Internet Application
B. Receive Information Application D. Rock Internet Application
9. Read only web, Information sharing, and company focused are example of which of
the following?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
10. Which of the following does not belong to the web 1.0?
A. Companies own or produce the content
B. Focused on communities
C. Sites are static
D. Sites are not interactive

16
NAME: ___________________________________________ Score:______________
GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 3

MOST ESSENTIAL LEARNING COMPETENCY


• Compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges
(CS_ICT11/12-ICTPT-Ia-b1)

• apply online safety, security, ethics, and etiquette standards and practice in the use
of ICTs as it would relate to their specific professional tracks.
(CS_ICT11/12-ICTPT-Ia-b2)

• Use internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational challenges.
(CS_ICT11/12-ICTPT-Ia-b3)

OBJECTIVES
• Identify the online safety measures
• Define online ethics and netiquette
• Apply online safety, security, ethics and etiquette standards and practice in the
sue of ICTs.

PRE-TEST
Multiple Choice: Select the best answer to the following multiple-choice questions about
Rules of Netiquette (10 points)

1. What is a type of malware software that displays unwanted ads when a user is surfing
the internet?
A. Adware C. Trojans
B. Phishing D. Viruses

2. What malicious programs that leave your computer completely unprotected, which
can mean that hackers can steal any data from your system?
A. Spam C. Trojans
B. Spyware D. Viruses

3. Which programs are often attached to files for download?


A. Adware C. Spyware
B. Phishing D. Viruses

4. What programs usually make their way on to a computer via a malicious email
attachment or USB stick?

17
A. Adware C. Spam
B. Trojans D. Worms

5. This is a fraudulent activity using emails are sent to acquire people’s passwords and
credit card details. What do you call this malicious form of programs?
A. Adware C. Spam
B. Phishing D. Spyware

6. What do you call a combination of the words network and etiquette and is defined as
a set of rules for acceptable online behavior?
A. Behavior C. Proper Conduct
B. Etiquette D. Netiquette

7. What kind of harassment on the internet that can be just as frightening as other
forms of stalking?
A. Cyber Stalking C. Keylogger
B. Identity Theft D. Online Grooming

8. Which is NOT belong to Rules of Netiquette for Students?


A. If you wouldn't say it face to face, don't say it online.
B. Make sure identification is clear in all communications. ...
C. Use emoticons
D. None of the above

9. Which of the following is NOT belong to, Stay Safe on Social Networking sites?
A. Always use a ‘strong’ password.
B. If anything happens online that you don't like, tell someone.
C. Use the strongest privacy setting when you set up your profile.
D. All of the above.

10. Which is Core Rules of Netiquette for the following?


A. Review what you wrote and try to interpret it objectively.
B. Never give out personal information.
C. Respect other people's time and bandwidth
D. All of the above.

ONLINE SAFETY OR INTERNET SAFETY


The Internet has radically changed the way that people interact with the world. They
have accounts on different online platforms; some have unlimited Internet access; and
some are active users of the web. Yet along with this opportunity are the new risks or
threats that Internet may bring. Hence, online safety or Internet safety is an emergent
concern for children.

18
Online safety or Internet safety refers to the practices and precautions that should
be observed when using the Internet to ensure that the users as well as their computers
and personal information are safe from crimes associated with using the Internet.

MOST COMMON INTERNET THREATS


Spam. The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder
insinuates that spam emails are a huge issue, with more than 50% of emails being
syphoned into these folders.

Adware is a type of malware software that displays unwanted ads when a user is surfing
the internet. The ads often redirect your searches to advertising websites and collect
marketing-type data about you, behind your back, which is considered malicious.

https://www.google.com/url?sa=i&url=https%3A%2F%2Fteachonline.asu.edu%2F2016%
2F04%2Fteaching-good-netiquette%2F&psig=AOvVaw0cLyMI8IVrqVXrSSjJI-
ip&ust=1628134851436000&source=images&cd=vfe&ved=0CAsQjRxqFwoTCIjrpfu9lvICF
QAAAAAdAAAAABAD

Trojans leave your computer completely unprotected, which can mean that hackers can
steal any data from your system. Trojans often present themselves as harmless computer
programs so that hackers can penetrate your computer without being detected.

Virus. One of the most talked about internet threats is a virus. Viruses usually attach
themselves covertly to downloads as they are designed to spread at an alarming rate.
Viruses are often attached to files for download, shared via CDs, DVDs, and USB sticks, or
loaded on to computers by opening infected email attachments.

19
Worms usually make their way on to a computer via a malicious email attachment or USB
stick. Once your computer has been infected by a worm, it will likely send itself to every
email address logged in your system. To the receiver, your email will appear harmless, until
they open it and are infected by the same worm.

Phishing is a form of fraudulent activity. More often than not, official-looking emails are
sent impersonating a well-known provider, such as a bank. These emails are sent to acquire
people’s passwords and credit card details.

Spyware is an all-encompassing internet nasty and is usually attached to pop-ups of


downloadable files. Once installed on your computer, spyware can monitor your keystrokes,
read and delete your files, reformat your hard drive, and access your applications. Whoever
is controlling the spyware has access to your personal details without you even knowing.

Keyloggers similar to a part of spyware, keyloggers record a user’s keyboard actions. Most
keyloggers will be looking for distinguishable key entries, such as bank card details and
passwords. Keylogging is often linked to identity and intellectual property theft.

Pharming is a more complex version of phishing that exploits the DNS system. Pharmers
often create web pages mimicking that of a trustworthy business, such as an online banking
log-in page. Users will then enter their details, thinking they are logging in to their usual
service, and their details will be stolen by the pharmer.

Rogue Security Software if you are ever downloading antivirus or antispyware programs,
make sure you have purchased it from a legitimate source. Rogue security software will
often ask you to pay for extra protection, which is a huge con. The security software is
completely useless and criminals have robbed you of your money.

Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an
advanced, modular banking Trojan that primarily functions as a downloader or dropper of
other banking Trojans. Emotet continues to be among the most costly and destructive
malware.”

Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it
can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack
originates from a computer network. Cyber attackers often use a flood attack to disrupt the
“handshake” process and carry out a DoS.

Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party
transaction. After interrupting the traffic, they can filter and steal data, according to Cisco.
MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers

20
insert themselves between the visitor and the network, and then use malware to install
software and use data maliciously.

SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from
inserting malicious code into a server that uses SQL. When infected, the server releases
information. Submitting the malicious code can be as simple as entering it into a vulnerable
website search box.

Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social
engineering is a type of password attack that Data Insider defines as “a strategy cyber
attackers use that relies heavily on human interaction and often involves tricking people
into breaking standard security practices.” Other types of password attacks include
accessing a password database or outright guessing.

Evolution of Cyber Security

Cyber security practices continue to evolve as the internet and digitally dependent
operations develop and change. According to Secureworks, people who study cyber security
are turning more of their attention to the two areas in the following sections.

The Internet of Things

Individual devices that connect to the internet or other networks offer an access point for
hackers. Cytelligence reports that in 2019, hackers increasingly targeted smart home and
internet of things (IoT) devices, such as smart TVs, voice assistants, connected baby
monitors and cellphones. Hackers who successfully compromise a connected home not only
gain access to users’ Wi-Fi credentials, but may also gain access to their data, such as
medical records, bank statements and website login information.

The Explosion of Data

Data storage on devices such as laptops and cellphones makes it easier for cyber attackers
to find an entry point into a network through a personal device. For example, in the May
2019 book Exploding Data: Reclaiming Our Cyber Security in the Digital Age, former U.S.
Secretary of Homeland Security Michael Chertoff warns of a pervasive exposure of
individuals’ personal information, which has become increasingly vulnerable to cyber
attacks.

Consequently, companies and government agencies need maximum cyber security to


protect their data and operations. Understanding how to address the latest evolving cyber
threats is essential for cyber security professionals.

Netiquette is a combination of the words network and etiquette and is defined as a set of
rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use
of online resources in an online social environment.

21
10 rules of netiquette for students
• Make sure identification is clear in all communications. ...
• Review what you wrote and try to interpret it objectively. ...
• If you wouldn't say it face to face, don't say it online. ...
• Don't assume everyone understands where you're coming from. ...
• Don't spam. ...
• Use emoticons. ...
• Respect others' privacy.

Core Rules of Netiquette


• Rule 1: Remember the Human. ...
• Rule 2: Adhere to the same standards of behavior online that you follow in real life.
...
• Rule 3: Know where you are in cyberspace. ...
• Rule 4: Respect other people's time and bandwidth. ...
• Rule 5: Make yourself look good online. ...
• Rule 6: Share expert knowledge.

Netiquette (Online Etiquette) is a set of rules that encourages appropriate and courteous
online behavior. These rules are important as they promote communication skills, prevent
miscommunications, and help you understand what is socially acceptable when working
and collaborating online.

Netiquette is important as online communication is non-verbal. You have to follow


Internet etiquette because there are other people such as your friends, relatives, elders who
are using the Internet for all online communications. ... Your attitude and character can be
ascertained by the way you communicate with others.

Some Golden Rules


1. Don't give out personal information such as your address or phone number.
2. Don’t send pictures of yourself to anyone, especially indecent pictures.
3. Don't open emails or attachments from people you don't know.
4. Don't become online ‘friends’ with people you don't know.
5. Never arrange to meet someone in person who you've met online.
6. If anything you see or read online worries you, tell someone about it.

Social networking. Social networking websites and apps, such as Facebook, MySpace,
Instagram, Viber, Tumblr, SnapChat, Ask.fm and Twitter have become incredibly popular
in recent years. Most users are genuine, but because it is so easy to hide your real identity,
it is possible to come into contact with people you would normally avoid

22
The Risks (Privacy). The internet offers you a lot of freedom and this can lead some people
to behave in ways they would not behave in public.

Cyber bullying. Cyber bullying can work in the same way as bullying in the playground;
the victim feels frightened and alone, while the bully tries to hide from being caught.
Comments, images and videos about a person can be posted online causing the victim to
feel frightened and upset. It is even possible for cyber bullies to hack into the victim's
personal accounts and harass them from within their own user profile.

https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.istockphoto.com%2Fphot
os%2Fcyber-security&psig=AOvVaw1rIhO216OHLWm-
4JXsyuqI&ust=1628134761762000&source=images&cd=vfe&ved=0CAsQjRxqFwoTCMC5v
LO-lvICFQAAAAAdAAAAABAD

Cyber stalking. Harassment on the internet can be just as frightening as other forms of
stalking. Women and girls are usually the victims of this kind of behavior. They might be
harassed by an ex-boyfriend or girlfriend who is upset about the end of their relationship.

Identity Theft. The more information you make available online, the greater the risk of
identity theft. It can be very tempting to reply to an email or open an attachment or post
information about yourself on social networking sites, but you should never do it. Personal
information includes your: email address, phone number, postal address, any banking
information.

Sexting Sexting usually refers to sending and receiving rude messages or videos of naked
pictures,'underwear shots', any sexual texts, images or videos.

Online grooming. The internet is a highly interactive tool which can allow people to
communicate with each other very easily, through internet chat programs and social
networking sites and even mobile apps and games.

23
POST-TEST
Multiple Choice: Select the best answer to the following multiple-choice questions about
the Online Safety (10 points)
1. What type of cyber attack that results from inserting malicious code into a server
that uses SQL?
A. Denial of Service
B. Emotet
C. Man in the Middle
D. SQL Injection
2. Which programs are often attached to files for download?
A. Adware C. Spyware
B. Phishing D. Viruses
3. What programs usually make their way on to a computer via a malicious email
attachment or USB stick?
A. Adware C. Spam
B. Trojans D. Worms
4. What kind of harassment on the internet that can be just as frightening as other
forms of stalking?
A. Cyber Stalking C. Keylogger
B. Identity Theft D. Online Grooming
5. What is a type of malware software that displays unwanted ads when a user is surfing
the internet?
A. Adware C. Trojans
B. Phishing D. Viruses
6. What activity that is usually refers to sending and receiving rude messages or videos
of naked pictures, 'underwear shots', any sexual texts, images, or videos?
A. Networking C. Rogue Software
B. Pharming D. Sexting
7. What kind of cyber threat floods a computer or network so it can’t respond to
requests?
A. Denial of Service C. Man in the Middle
B. Emotet D. SQL Injection
8. What kind of malicious program that is a more complex version of phishing that
exploits the DNS system?
A. Pharming C. Rogue Software
B. Phishing D. Sexting
9. Which is a cyber threat that attack occurs when hackers insert themselves into a
two-party transaction?
A. Denial of Service C. Password Attack
B. Man in the Middle D. SQL Injection
10. Which of the following is NOT belong to, Stay Safe on Social Networking sites?
A. Always use a ‘strong’ password.
B. If anything happens online that you don't like, tell someone.
C. Use the strongest privacy setting when you set up your profile.
D. All of the above.

24
NAME: ___________________________________________ Score:______________
GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 4

MOST ESSENTIAL LEARNING COMPETENCY


• Uses common productivity tools effectively by maximizing advances application
techniques CS_ICT11/12-ICTPT-Ic-d4
• Creates an original or derivative ICT content to effectively communicate or present
data information related to specific professional tracks CS_ICT11/12-ICTPT-Ic-d5
• Evaluate existing websites and online resources based on the principles of layout,
graphic and visual message design. CS_ICT11/12-ICTPT-Ie-f6

OBJECTIVES
• identify the parts of word processing and its functions
• enumerate the shortcut keys in word processing
• create a word document using shortcuts for common editing tasks

PRE-TEST
Multiple Choice: Select the best answer to the following multiple-choice questions about
the Part of Word Processing (10 points)

1. What do you call the strip of buttons and icons located above the work area in
Word 2007?
A. Tab Button C. Ribbon
B. Task Bar D. Ruler

2. What do you call the typing area in Microsoft Word?


A. Document C. Presentation
B. Media D. Sheet

3. Which button than can easily set tab stops by clicking on the desired position on
the ruler?
A. First Line IndentButton C. Tab Selector Button
B. Hanging Indent Button D. Zoom Slide Button

4. What kind of bar shows open programs?


A. Scroll Bar C. Task Bar
B. Status Bar D. Tab Selector Button

5. Which bars that view entire workbook by moving it up, down, left or right?
A. Scroll Bar C. Task Bar

25
B. Status Bar D. Zoom Slide Bar

6. Which triangle controls where the first line of a paragraph begins?


A. First Line Indent C. Right Indent
B. Hanging Indent D. All of the above

7. What short key command that open the Font dialog box to change the font?
A. CTRL + SHIFT + C C. CTRL + SHIFT + F
B. CTRL + SHIFT + D D. CTRL + SHIFT + G

8. In changing the Case Of Letters, which short key command is appropriate?


A. SHIFT + F3 C. CTRL + SHIFT + C
B. SHIFT F4 D. CTRL + SHIFT + L

9. What short cut key need to be pressed when applying the “Normal Style”?
A. CTRL + F3 C. CTRL + SHIFT + N
B. CTRL + F4 D. CTRL + SHIFT + S

10. When deciding to print your documents, what is the short cut key?
A. CTRL + P C. CTRL + SHIFT + P
B. CTRL + D D. CTRL + SHIFT + D

BASIC PARTS OF MICROSOFT WORD

Microsoft Word or MS-WORD (often called Word) is a Graphical word processing program
that users can type with. It is made by the computer company Microsoft. Its purpose is to
allow users to type and save documents. Similar to other word processors, it has helpful
tools to make documents. (https://simple.wikipedia.org › wiki › Microsoft_Word)

Microsoft Word is a widely used commercial word processor designed by Microsoft.


Microsoft Word is a component of the Microsoft Office suite of productivity software, but
can also be purchased as a stand-alone product. ... Microsoft Word is often called simply
Word or MS Word.

26
Microsoft Word is a widely used commercial word processor designed by Microsoft.
Microsoft Word is a component of the Microsoft Office suite of productivity software, but
can also be purchased as a stand-alone product. ... Microsoft Word is often called simply
Word or MS Word.
The purpose of the MS Word is to allow the users to type and save documents.
...Microsoft word is used to save documents. The documents can be copied to flash drive
which serves as an external memory for your computer. This allows you to use the saved
documents conveniently taking with you anywhere.
One example of a Word Processor is Microsoft Word, but other word processing applications
are also widely used. Examples include: Microsoft Works Word Processor, Open Office
Writer, Word Perfect and Google Drive Document.. but certainly not limited to) reports,
letters, memos, newsletters and brochures.
Ribbon. The Ribbon is the strip of buttons and icons located above the work area in Word
2007. The Ribbon replaces the menus and toolbars found in earlier versions of Word.
Each ribbon contains groups of command buttons with common purpose. Each ribbon
contains 7 tabs.
Office Button is to find a drop down menu containing options, such as: open, save, and
print. Also shows previously opened files, which you may choose to “pin” them to make
them “permanent”choices.
Rulers gives an idea of where you are on the page
Tab Selector Button easily set tab stops by clicking on the desired position on the ruler.
This buttonallows you to determine which type of tab will be set left aligned , right aligned
, center aligned or decimal tab . Clicking on this button will allow you to change the tab
style.
Document this is what you are typing/what will print out.
Status Bar. This row can be customized by right-clicking and selecting desired options.
Desired options may include page number/number of total page, word count,
insert/overtype mode, caps lock, and zoom slide.
View Shortcuts. These four buttons allow to change the way you view your document on
the screen. From left to right they are: print layout, full screen reading, web layout and
draft. These can be added/removed by right clicking anywhere on the status bar and
checking/unchecking View shortcuts.
Task Bar shows open programs.
Zoom Slide allow to increase/decrease the amount of the document you see on the
screen.
View Ruler Button allows to view/hide the rulers.
Screen Split Button at the top of the vertical scroll bar is a new button. Just below the
double arrow is a tiny button that looks like a minus sign that lets you split your screen in
two when double-clicked. Double-clicking it a second time will unsplit your screen.
Scroll Bars allow to view entire workbook by moving it up, down (vertical scroll bar), left
or right (horizontal scroll bar)
Right Indent slide this triangle to the left of the margin to limit the right side of a paragraph
to that point. Move the triangle to the right of the margin to allow the right side of the
paragraph to extend beyond the margin. The triangle at the margin will keep the right side
of the paragraph with the margin.

27
Group command buttons with a common purpose are clustered together. Each ribbon
contains several groups. Some groups, but not all, contain a quick launch bar (dialogue
box launcher) in the bottom right hand corner.

Title Bar shows name of program and open document. Also contains minimize, maximize
and close buttons.
Quick Access Toolbar this customizable toolbar allows you to add frequently used
commands. Click on the down arrow at the end of the toolbar to add/remove command
buttons – or – right-click on any command button and choose Add to Quick Access Toolbar.
Tab the ribbon is broken down into 7 tabs. Each tab has a common purpose and consists
of several groups. To select a tab, simply click on it and the appropriate groups will be
displayed.
First Line Indent. This triangle controls where the first line of a paragraph begins. Moved
to the left of the margin, will allow the first paragraph to be in the left margin. Can be moved
to the right of the margin to indent your paragraph.
Hanging Indent. The opposite of a first line indent. It is often moved to the right of the first
line indent, which allows the remaining lines of a paragraph to be indented according to
placement of the triangle.

Here are keyboard shortcuts that you can use for working with text in Microsoft
Word 2010.

TO DO THIS PRESS

Open the Font dialog box to change the font. CTRL+SHIFT+F

Increase the font size. CTRL+SHIFT+>

Decrease the font size. CTRL+SHIFT+<

Increase the font size by 1 point. CTRL+]

Decrease the font size by 1 point. CTRL+[

Change The Case Of Letters. SHIFT+F3

Apply bold formatting. CTRL+B

Apply an underline. CTRL+U

Apply italic formatting. CTRL+I

Remove manual character formatting. CTRL+SPACEBAR

Open Styles task pane. ALT+CTRL+SHIFT+S

28
Apply the Normal style. CTRL+SHIFT+N

Apply the Heading 1 style. ALT+CTRL+1

Apply the Heading 2 style. ALT+CTRL+2

Apply the Heading 3 style. ALT+CTRL+3

WORD PROCESSING ACTIVITY 1


What you will learn:
• Changing font and size
• Changing alignment
• Using bold and underlining
• Typing using word wrap (soft return)
DIRECTIONS:
1. Open a blank Word document.
2. Change to Arial style font, size 14. (Font style and size are located in the upper
tool bar.)
3. Type your name (first and last). Hit ENTER once.
4. Type Activity 1. Press ENTER key two times.
5. Type the name of your school in a different font and use size 18 point. Press
ENTER key two times.
6. Change the font to Times New Roman size 16.
7. Type the following paragraph using word wrap. Word wrap means you DO NOT
hit the enter key at the end of a line. Let the computer move to the next line
when it is ready. Do not indent. At the end of each paragraph, press the ENTER
key two times.

8. Master Yoda says that fear is the path to the dark side. Fear leads to anger. Anger
leads to hate. Hate leads to suffering. Master Yoda is very smart.

29
9. Emperor Palpatine said that a Jedi gains power through understanding and a Sith
gains understanding through power.
10. Type your name once again. Underline it. Italicize it. Bold it.
11. Change the first paragraph to right alignment. (Alignment icons are to the right of
B I U series.) Hold your cursor on top of them to read which one is which.)
12. Change the second paragraph to justified alignment.
13. Center your name at the bottom using the centering alignment icon.
14. Make the school name Bold. (Use the B icon.).
15. Turn page over and proofread your assignment with the sample on the back. The
margins may be different so length of lines might vary.
16. Save as Activity 1. (FILE – SAVE AS. Click on the down arrow next to My
Documents. Click on your log in name. Type Activity 1 under File Name. Click on
Save.)
Output
Activity 1
Las Piñas City National Senior High School

Master Yoda says that fear is the path to the dark side. Fear leads to anger. Anger leads
to hate. Hate leads to suffering. Master Yoda is very smart.

Emperor Palpatine said that a Jedi gains power through understanding and a Sith gains
understanding through power.

POST-TEST
Multiple Choice: Select the best answer to the following multiple-choice questions about
the Introduction to Computer (10 points)
1. What is a Graphical word processing program that users can type with?
A. Microsoft Word C. Word Star
B. Office Write D. Google Docs
2. What is the ribbon broken down into 7 sections and each has a common purpose?
A. Tab Button C. Ribbon
B. Task Bar D. Ruler
3. Which bar that can customizable and allows you to add frequently used commands?
A. Quick Access Toolbar C. Task Bar
B. Status Bar D. Tab Selector Button
4. Which bar shows name of program and open document? Also contains minimize,
maximize and close buttons?
A. Scroll Bar C. Tab Selector Button
B. Task Bar D. Title Bar
5. What shortcut key for making a letter BOLD?
A. CTRL A C. CTRL C
B. CTRL B D. CTRL D
6. What is the function of Ctrl V?
A. To copy the Text C. To Highlight the Text
B. To paste the Text D. To Underline the Text

30
7. Alt F4 is for?
A. To open new Document C. To open New Application
B. To close a Document D. To close an Application
8. To save your document, what shortcut key command for this?
A. CTRL J C. CTRL P
B. CTRL N D. CTRL S
9. What happen to a paragraph when you press CTRL J?
A. Align to Center C. Align to Right
B. Align to Left D. Justify
10. What is the correct command when you want to select all in your document?
A. CTRL A C. CTRL C
B. CTRL B D. CTRL D

ANSWER KEYS:

WEEK 1 WEEK 2
10. B 10. A
9. A 9. B
8. C 8. B
7. D 7. C
5. D 5. A 6. B 6. D
4. C 4. D 5. B 5. B
3. B 3. A 4. B 4. A
2. B 2. A 3. A 3. C
1. D 2. B 2. A
1. B 1. B
1. B
Answer Key Answer Key Key Key
Post-Test Pre-Test Post-Test Answer Pre-Test Answer

WEEK 3 WEEK 4
10. C
9. D 10. D 10. A 10. A
8. D 9. B 9. D 9. C
8. A 8. D 8. A
7. A
7. A 7. D 7. C
6. D
6. D 6. B 6. A
5. B 5. B 5. A
5. A
4. D 4. A 4. D 4. C
3. D 3. D 3. A 3. C
2. C 2. D 2. A 2. A
1. A 1. D 1. A 1. C
Key Key Key Key
Pre-Test Answer Post-Test Answer Pre-Test Answer Post-Test Answer

31
References:
- Blanza, Maria Eloisa (The Current State of ICT Technologies). Retrieved from
July 15, 2021. Retrieved from
https://www.slideshare.net/MariaEloisaBlanza/the-current-state-of-ict-
technologies
- Lynch, Jim (Microsoft Keyboard Shortcuts). Retrieved from August 4, 2021.
Retrieved from https://www.computerworld.com/article/2725302/microsoft-
word-2010-keyboard-shortcuts-for-manipulating-text.html
- Mrs. Rembold, (Microsoft Word Activities), Retrieved from August 4, 2021.
Retrieved from https://rembold-dawg.weebly.com/microsoft-word-
activities.html
- Pappas, Christopher (10 Netiquette Tips For Online Discussions). Retrieved
from August 4, 2021. Retrieved from https://elearningindustry.com/10-
netiquette-tips-online-discussions
- Regisjoyce (from Wordpress Website; March 8, 2018). Retrieved from July 1,
2021. Retrieved from https://ictcom444251764.wordpress.com/blog/
- Retrieved from August 10, 2021. Retrieved from
https://quizizz.com/admin/quiz/5b2217dea1cb260019ebda3c/computer-quiz
- Retrieved from https://computer2101.wordpress.com/2017/12/09/the-parts-
functions-of-microsoft-word/
- Retrieved from July 1, 2021. Retrieved from
https://www.just.edu.jo/~mqais/CIS99/PDF/Ch.01_Introduction_%20to_comp
uters.pdf
- Rubenking, N.J., (12 Simple things to you can do to be more secure on line)
Retrieved from August 4, 2021. Retrieved from https://www.pcmag.com/how-
to/12-simple-things-you-can-do-to-be-more-secure-online
- Sharna, Madhurkant (Web 1.0, Web 2.0 and Web 3.0 with their difference)
Retrieved from July 15, 2021. Retrieved from
https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-their-
difference/
- Sison, Victor (Web 1.0, Web 2.0, Web 3.0, Quizizz Website). Retrieved from July
15, 2021. Retrieved from
https://quizizz.com/admin/quiz/5c7ca24214cbb4001c92a00b/web-10-web-
20-web-30
- UTEP Connect (8 Netiquette Tips for Networking Online). Retrieved from August
4, 2021. Retrieve from
https://www.utep.edu/extendeduniversity/utepconnect/blog
- WebRoot. Retrieved from August 4, 2021. Retrieve from
https://www.webroot.com/us/en/resources/tips-articles/netiquette-and-
online-ethics-what-are-they
-

Additional Materials for Learning (LR) portal


1. History of Internet in the Philippines – Empowerment Technologies K
TO 12 by ICT Tech Tips
2. What is ICT? - Empowerment Technologies K to 12 by ICT Tech Tips
3. Digital Life 101 (www.youtube.com/watch?=MkwmD60QrWQ)

32
33

You might also like