[go: up one dir, main page]

0% found this document useful (0 votes)
41 views21 pages

E-Tech Module 1

Uploaded by

Nichole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
41 views21 pages

E-Tech Module 1

Uploaded by

Nichole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 21
INFORMATION AND COMMUNICATION TECHNOLOGY What I Need to Know? Hello dear leamners! Welcome to this module on Empowerment Technology. It contains activities that will let you create your own ICT contents. This module will help you explore the different technologies and online platforms and how they can be used effectively. it contains activities that wil let you create your own ICT contents and evaluate existing online creation tools, platforms, and applications. The module is seff — instructional and allows you to learn in your own space, at your awn pace. So, relax and enjoy learning, To get the most of this module, here are some reminders for you! 1. Take your time in reading the lessons. 2. Write down points for clarification and discuss this with your teacher. 3. Perform all activities and answer all worksheets, 4. Answer all tests in this module and check against the answer key to measure how well you have understood the lesson. 5. Answer all activities, there are spaces provided for in the different activities in this module. 6. Have fun while learning with this module. It will totally be of great use which ever strand you may belong because ICT is for everybody. Learning Outcome After going through this lesson, you are expected to: 1. Independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and professional tracks; 2. Apply intemet online safety, security ethics and etiquette standards and practice in the use of ICTs; and 3. Use intemet as tool for gathering reliable information for research in order for them to achieve a speottic class abjective. LESSON 1: INFORMATION AND COMMUNICATION TECHNOLOGY Learning Objectives By the end of this lesson, you are expected to 1. Identity varied online platforms and sites. 2. Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges. 3. Evaluate existing online creation tools, platforms and applications in developing ICT content. What I Know ‘You must be excited to flip over the pages and begin with the lessons. But first, please answer the pre-test to measure what topics have you known so far. 1 Empowerment Technologies -Module 1 Direction: Read each item carefully and choose the letter of the correct answer. Write your answers on the provided answer sheet. 1. What type of web page is classified as flat or stationary? A.Web 1.0 — B. Web 2.0 C. Web 3.0 D. Web 4.0 2. What web 2.0 feature allows users to subscribe to a data plan that charges for the amount of time spent on the internet? A.Folksonomy ——_B. Long Tail C. User Participation D. Application 3. What is the name of the symbol that is used to classify and categorize information? ‘A. Hashtag B. Question Mark —C. Asterisk D. Atsign 4, What specific type of social media allows you to connect with other people? ‘A. Microblogging —_B. Media Sharing _C. Social Networks D. Social News 5. Twitter is an example of what specific type of social media? A. Microblogging __B. Media Sharing _C.. Social Networks D. Social News 6. YouTube and instagram are examples of what specific type of social media? A. Blogs and Forums B. Media Sharing —_C. Social Networks D. Bookmarking Sites 7. What specific type of social media allows its users to post their original content on websites such as WordPress, Blogger, and Tumblr? A. Blogs and Forums B. Media Sharing _C. Social Networks D. Bookmarking Sites 8, What type of social media allows you to manage links to various websites? A. Blogs and Forums B. Media Sharing —C. Social Networks D. Bookmarking Sites 9. What do you call the global system of interconnected computer networks that use servers to link billions of devices woridwide? A. Websites B. Web browser —_C. Internet D. World Wide Web 10. What type of web page is classified as a dynamic page? A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0 What's In Reflect on the following questions: How many times have you checked your phone this morning? ¥ How many updates have you posted on Facebook, Twitter, or Instagram today? ¥ Do you use the intemet/ mobile for an hour after you woke up this morning? Y Have you followed a celebrity/ a crush on his/ her social media? Information and Communications Technology (ICT) often deals with the use of different technological inventions like mobile phones, telephones, computer, Intemet, and other devices, as well as software and applications to locate, save, send, and manipulate information. ICT has greatly contributed to how easy our lives has been today. Our gadgets have become part of our necessity that we check on them after we wake up. it made communication easier. We can use cellular phones that are designed for communicating with other people even they are miles away from us. It has also assisted us in our work since there are Internet-based jobs. It has revolutionized our education and in the modernization of our economy. What's New ACTIVITY 1.1: Internet and Computer Readiness Test 2 Empowerment Technologies -Module 1 Directions: Read and reflect each item carefully. State whether you agree or disagree to each of the statements by drawing a happy face © if you agree and a sad face '@ if you disagree. There are no right or wrong answers for this activity. SITUATIONS 7. | have reliable access 10 a computer, mobile phone, tablet, or any gadget that can act as substitute to computers. 2. [have access to a high-speed internet connection with video streaming capabilities. 3. | have experience using email: | can ereate, Send, forward, reply to, and save email messages and attachments, 4. | have experience in word processing: | can create, edit, save, and navigate documents using software program such as Microsoft Word or Pages for Mac. 5. | have experience in creating PowerPoint or Keynote for Mac. lide presentations: | can use programs such as 6. | know how to search the web using Internet browsers such as Firefox or Google Chrome 7. [have experience using online or mobile social media (ex. Facebook, Twitter) ®. | have experience viewing videos online (YouTube). ‘9. [have experience filing out forms and taking quizzes online. 0. [have experiences using cloud-based programs such as Google Drive or Google Docs, 77. [have experience Searching online for academic resources (ex. Google Scholar) 12, [have experience with video conferencing (ex. Skype). Whatis It ICT in the Philippines Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is BPO, Business Process Outsourcing, or call centers. In a data gathered by the Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares 19.3% of the total employment population. When the intemet was fully commercialized in 1995, it has tremendously impacted culture and commerce, including the rise of near instant communication by email, instant messaging, telephony (Voice over Internet Protocol or VoIP), two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. Internet is the global system of 3 Empowerment Technologies -Module 1 interconnected computer networks that uses the Intemet protocol suite (TCP/IP) to communicate between networks and devices. The World Wide Web ‘The World Wide Web is an information system on the Internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. It was invented by Tim-Berners Lee. The World Wide Web browser software, such as Microsoft Internet Explorer/Edge, Mozilla Firefox, Opera, Appie's Safari, and Google Chrome let users to navigate form one users to another via the hyperlinks embedded in the documents. These documents may also contain any combination of computer data, including graphics, sounds, video, text, multimedia and interactive content that runs while the user is interacting with the page. The Web has enabled individuals and organizations to publish ideas and information to a potentially large audience oniine at greatly reduced expense and time delay. EVOLUTION OF WEB Web 1.0 Web 2.0 Web 3.0 Web 1.0 or The Web v When the World Wide Web was invented, most web pages were static. ¥ Static also known as flat page or stationary page in the sense that the page is “as is” and cannot be manipulated by the user. Web 2.0 ¥ tis the evolution of Web 1.0, by adding dynamic web pages. Y Web 2.0 allows users to interact with the page: instead pf just reading the page, the user may be able to comment or create a user account. ¥ Example OF Web 2.0 includes social networking site, blogs, wikis, video sharing sites, and web applications. Features of Web 2.0 [ead eee 1. allows users to collectively classify and find information using freely chosen FOLKSONOMY keywords (e.g. "tagging" by Facebook). Tagging uses the pound sign #, often referred to as hashtag. 2,RICHUSER dynamic content that is responsive to user input (e.g., a user can ‘click’ on an EXPERIENCE rage oonarge tor find cut more iformaton) 3. USER the owner of website is not the only one who is able to put content. Others are PARTICIPATION able to piace a content on their own by means of comments, reviews, and evaluation: 4.LONG TAIL services that are offered on demand rather than on a one-time purchase. This is ‘synonymous to subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used. 5.SOFTWARE __ users will subscribe to a software only when needed rather than purchasing AS ASERVICE __ them. 6. MASS ltis advers PARTICIPATION formation sharing through universal web access. 4 Empowerment Technologies -Module 1 Web3.0 ¥ The Semantic Web is a movement led by the Worid Wide Web Consortium (W3C). The WSC standard encourages web developers to include semantic web pages. v The aim of Web 3.0 is to have machines (or serversO which understand the user's preferences to be able to deliver web content targeting the user in the fast manner. rison of Web 1.0, 2. 0 aay WE TE WEB 3.0 ‘Communication Broadcast Interactive Engaged Invested Information Static/ Read-only Dynamic Portable & Personal Focus Organization ‘Community Individual Content ‘Ownership Sharing Immersion Interaction Web Forms Web Application ‘Smart Applications Search Directories Tags/ Keywords Context/ Relevance Metrics Page Views Cost per Click User Engagement Advertising Banners Interactive Behavioral Technologies | HTML/FTP Flash/ Java/ XML Flash/ Java/ XML ROF/ RDFS/OWL RDF/ RDFS/ OWL. TRENDS IN ICT 1. Convergence Technological convergence is the synergy of technological advancements to work on a similar goal or task For example, besides using your personal ‘computer to create word documents, you ‘can now use your smartphone 2. Social Media Social media is a website, application, or online channels that enable web users to create, co-create, discuss, modify, and ‘instead of promoting socal enavor soca! med promotes alsengagement ‘setr-aDsorption ronetiness nd sadness These are sites that allow you to connect with other people with the same interests or background. Ex. Facebook, Googie+ These are sites that allow you to store and manage links to various websites and resources. Ex. Pinterest These are sites that allow users to post their own news items or inks to other news sources. Ex Reddit, Digg, Quora These are sites that allow you to upload and share media content like images, music, and video. Ex. Youtube, instagram, Flickr 5 ; “These are sites that focus on short updates from the user. 5. Microblogging Ex. Tuner, Tumbir re These websites allow users to post their content. 8 Blogs and Forums | £y"Worgpress, Medum, Web), Blogger Social Networks 2. Bookmarking Sites 3. Social News: 4. Media Sharing 5 Empowerment Technologies -Module 1 3. Mobile Technologies The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’ capability to do tasks that were originally found in personal computers. '& Several of these devices are capable of using high-speed internet, Today, the latest model devices use 4G - LTE Networking and 5G which is the fastest mobile network KINDS OF MOBILE OPERATING SYSTEM. 08 ‘Android * BlackBerry. Blackberry 0S wr Windows Phone OS icons ons202 ANE) 0 WebOS PalmOS: symbian Kindle y! an 4. Assistive Media Assistive media is a nonprofit service designed to help people who have visual and reading impairments. ‘A database of audio recordings is used to read to the user. What Can I Do Activity1.1: Where Do I Belong? Directions: Using the internet, look for the webpages of the pages listed below. Evaluate whether they are Web 1.0, Web 2.0, or Web 3.0. Write your answers on the separate sheet 1. The New Mork Times 6. facebook Instagram 7. INQUIRER.NET ia Britannica 8. Sir's Apple Voice Recognition 9. Amazon.co.uk 10. #WolframAlpha LESSON 1.1: ONLINE PLATFORMS AND SITES Because of the wide capacity of Web 20, it has helped in creating dynamic online piatform sites. Online platform is a specially developed platform using Intemet technology. Online platforms have revolutionized access to any information. Online platforms currently include, but are not limited to: > Presentation or Visualization 6 Empowerment Technologies -Module 1 % Cloud Computing 9 File Management > Mapping > Social Media Let us go through them one by one! 1. Presentation or Visualization Platform allows you to present and share presentations, infographics and videos with other people. It is used to communicate information clearly and efficiently. 2. Cloud Computing Platform is also called as “The cloud.” It is the practice of using a network of Temote servers hosted on the intemet. instead of using your computer's hard drive, you store and access your data and programs over the Intemet. 3. File Management Platform is used for the storing, naming, sorting, and handling of computer files. Allows you to convert and manage files without download in the software tool. 4, Mapping Platform is a transformation taking the points of one space into the points of the same or another space. Uses GPS to detect location and used for navigation 5. Social Media Platform is a computer-mediated tools that allow large group of people to create, share or exchange information, interest and the information shared can be in the form of ideas, pictures, videos or anything that you want to create and share to virtual communities. It can be in the following platforms: > Social Networks. These sites allow you to connect with other people with the same interests or background. > Bookmarking Sites. These are sites that allow you to store and manage links to various ‘websites and resources. > Social News. These are sites that allow users to post their own news items or links to other news sources. > Media Sharing. These are sites that allow you to upload and share media content like images, music, and video. Media sharing sites can be specific for video sharing, photo sharing, slide sharing, social bookmarking, and gaming. Microblogging. These are sites that focus on short updates from the user. Those subscribed to the user will be able to receive these updates. Posts are brief that range typically from 140 - 200 characters. Blogs and Forums. These are websites that allow users to post their content. Other users can comment on the said topic. ~ Ma What Can I Do ACTIVITY 1.2: Which Website Is It? DIRECTIONS: Listed below are some of the platforms. Complete the table below by providing name of website and a short description using the internet. Write your answers on the answer sheet. 7 Empowerment Technologies -Module 1 PLATFORMS NAME OF WEBSITES DESCRIPTIONS 1. Presentation/Visualization 2. Cloud Computing 3. File Management 4. Mapping 5. Social News 6. Social Networks 7. Microblogging 8. Blogs and forums ate Se What I Have Learned You are leaming a lot! The best way to improve skills and get the proper direction to express your feelings about your |eaming is to write a self- refiection. Let's do it. Write your answer on the answer sheet. 1. What is the major contribution of using social media in your life as a student? 2. How do the different oniine platforms help you asa student in your chosen track? 8 Empowerment Technologies -Module 1 Rubrics for grading: Criteria Score ‘Completeness (5 points) Does your response directly answer 5 |a]3]2 1 each part of the question(s)? Knowledge (10 points) Does your response clearly show you have read and understand the lesson content by correctly defining key terms, key persons and summarizing | 49 9| g-7| 6-5 | 4-3 | 2-1 concepts? Have you made inferences based on this knowledge to personal or modern- day applications? Writing Skills (6 points) Do you write clearly, in complete sentences, with minimal errors in 5 4 3 2 1 grammar and spelling? Reference: 1, De Lara, Maricel, (2016, Nov. 3). Empowerment Technology. Retrieved from https:/www. slideshare.net/maricelbaldomeradelara/lesson-1 empowerment-technology. Retrieved on May 19, 2020. 2. Educational Technology: Students Readiness and Self - Assessment Retrieved from httnsi/www.surveymonkey.com/r/ET_studentreadiness. Retrieved on May 19, 2020. 3. Quiambao, A. (2019, Sep 8). Online platforms for ICT Content Development. Retrieved from hitps:/www. slideshare.net/AngelitoQuiambao/oniineplatforms-for-ict-content-development-1 69954837. Retrieved on May 20, 2020, LESSON 2: ONLINE SAFETY, SECURITY AND NETIQUETTE Learning Objectives: By the end of this lesson, you are expected to: 1. Identity what constitutes appropriate and inappropriate online behavior. 2. Apply intemet online safety, security ethics and etiquette standards and practice in the use of ICTs. Are you ready? This time, you are tasked to read the text below and be able to comprehend it well. Online Safety, Security and Net 9 Empowerment Technologies -Module 1 The intemet is the guiding technology of the Information Technology Age just as the electrical engine was of the Industrial Age. Nowadays, more and more people are already engaged in the use of technology. These people who are raised in a digital, media saturated world are called digital native. No doubt, the internet has been very useful to us but with the rise of instant messaging, chat rooms, emails and social networking sites. it can also bring trouble, from cyberbullying to more serious intemet, dangers, including exposure to sexual predators. Thus, intemet safety is always our primary concer. Online Safety refers to the practices, and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet. To avoid oniine crimes such as staking, identity thett, privacy violations, and harassment follow the following safety measures: + o ° ° + * ° Never give any personal information about yourself over the internet. Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure business. To make sure that you are in a secure network, the website address should begin with http:/’ as opposed to “http:/”. Never access your accounts by following an email link, instead type your URL by yourself. Never open messages from someone you do not know. Regularly review your privacy settings in your online accounts to make sure you are not sharing your important personal information When using a public computer terminal, be sure to delete your browsing data before leaving Keep your software updated to avoid security holes. Do not download or install software or anything on your computer or celiphone that is unknown to you What is Netiquette? Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly online. The Core Rules of Netiquette Rule 1: Remember the human When communicating with a person, especially with a stranger, always ask a question, ‘Would you say it to the person's face?” Rule 2: Adhere to the same standards of behavior online that you follow in real life. You should not change your persona whenever you are in front of the screen. Rule 3: Know where you are in cyberspace. There are different areas or domains in the cyberspace, and the type of person also vary. Rule 4: Respect other people's time and bandwidth. Rule 5: Make yourself look good online. You will mostly be judged for your writing, so read and read in order to make comments and messages with good spelling and grammar. Rule 6: Share expert knowledge Do not be afraid to tell what you know. Internet was founded on the idea that scientists wanted to share their knowledge. Rule 7: Help keep flame wars under control Be a referee and know how to control other people's emotion. Rule 8: Respect other people's privacy Do not snoop on other people's private accounts, especially their files and messages. Rule 9: Don’t abuse your power Just because you know other things does not mean you are superior. Rule 10: Be forgiving of other people’s mistake if you noticed a mistake, correct it in a very polite manner. 10 Empowerment Technologies -Module 1 SLO REESE Flame war is a series of flame posts or messages in a thread that are considered derogatory in nature or are completely off-topic. Often these on you flames ate posted for the sole purpose of offending or upsetting other users, The flame becomes a flame war when Sree other users respond to the thread with fopepbee rat their own flame message. Image trom: ‘haps: /twitter com/Parkster00/status/1246347088625045504 Juanbebegsto What Can I Do Activity 2.1: Can You Keep It Private? DIRECTIONS: Choose the most appropriate thing to do in the following situation. Write the letter of the correct answer on the answer sheet 1. Your family is going out on a vacation. What should you do? A. Post pictures when you return home, B. Post the dates you will be gone online. C. Post updates of where you are currently checking in hotels or places, D. Tell no one. Vacations are for getting away. 2. Do you have the same passwords for all your accounts? A. Yes. That is how | remember all my passwords B. | have different passwords for all different accounts, C. i keep it simple. | don’t have any passwords. D. | have two similar passwords that | alternately use for all my accounts. 3. The Golden Rule of Netiquette is A. remember the human! B. a smiley in every message. C. follow the other rules of netiquette. D. never flame a friend. 4. Your parents bought you your first cellphone. How will you share your cellphone number? A. Do not share your cellphone number to anyone. B. Post your cellphone number in your social media account. C. Share your celiphone number only in person. D. Post your cellphone number in your group chat. 5. Your social media friends list should only be composed of _ - A. Your favorite brands. C. Anyone who sends you a friend request B. Family and friends D. Foreigners cry Empowerment Technologies -Module 1 Whatis It LESSON 2.2: KINDS OF ONLINE THREATS Online Threats are threats that use the World Wide Web, Cyberspace, or the Internet to facilitate cybercrime, which is committed by cybercriminals. Kinds of Online Threats 1. Phishing - is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as, personally identifiable information, banking, credit card details and passwords. Re Sa) nab Bear customer, In our precautions against intemet fraud, our bank come up with a new policy to ‘revent costumers from being vicims of legal vansactons, There are 2 steps required inthis procedure, in order to avoid problems with your ‘sccount Wnatshould ido? 1. Download the attached file and open iton your intemet browser. 2. Confim that you are the owner and folow the instructions carefully Thank you fr he cooperation and once again Rank you forchosing pg BBR ‘© National Australia Bank Limited. Use ofthe int | govemed by Austalian law and is subpectto the, ‘on the disclaimer page View the NAB 2. Pharming — fraudulent practice of directing intemet users to a bogus website that mimics the appearance of the legitimate one, in order to obtain personal information such as passwords, account numbers etc. These “spoofed” sites can capture a victim's confidential information, including usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually focus on websites in the financial sector, including banks, online payment platforms, or other e- commerce destinations. | OA4 Qeee Groom Oe SOT IE 3. Internet scams - generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain. Cybercriminals may contact potential victims through personal or work email accounts, social networking sites, dating apps, or other methods in attempts to obtain financial or other valuable personal information. Online scams may come in various forms such as lottery scam, charity fraud scams, job offer scams, and online dating scams to name a few. < FB +63 9275909515 10/17/2013 Thu Maan/Sir This is Sec. Francis L. Teves (head officer) of P.C.S.0. Special project division. Your mobile # won (860,000+Lap Top) 2nd prize winner To claim the prize call this#09275909515# ASAP! DTI-NCR-Permit# 3556. 10:11PM 4. Internet robots are also known as spiders, crawlers, and web bots. itis a software application that is, programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user. Some bots are useful; such as search engine bots that index content for search or customer service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact information for sending spam, or perform other malicious activities. fits connected to the Internet, a bot will have an associated IP address. 5, Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: > Adware (advertising supported software) is unwanted software designed to throw advertisements up on your screen. Example, pop-up ads and banner ads. > Spyware is malware that secretly observes the computer user's activities without perr and reports it to the software's author. Example is a key logger. ion > Virus and Worms are malwares that attach to another program and, when executed— unintentionally by the user—teplicates itself by modifying other computer programs and infecting them with its own bits of code Trojan, of Trojan horse, is one of the most dangerous malware types. it usually represents itself as something useful in order to trick you. Once it's on your system, the attackers behind the Trojan gain unauthorized access to the affected computer. From there, Trojans can be used to steal financial information or install threats like viruses and ransomware. Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back v v 6. Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent. Spam messages can be damaging if you open or respond to it 7. Cyberstalking refers to the use of the intemet or other electronic device to harass or stalk individuals or organizations. 13 Empowerment Technologies -Module 1 roy Are you a victim of cyber- stalking? ° ° © Proposed aw on staking toinchide cyber staking MANILA. Philppines-A proposed law seeking to penalize stalking willbe expanded to include Atahearing ofthe Senato justice and human rights committee on Tuesday, Atty. Joaquin Parcero of the National Bureau of Investigation (NBN said the agency's ant-computer crimes unit receives an average 2000 complaints of eyberstaking monthly. usually onthe social networking ‘Sometimes, ater ailthe stalking ie dane an Facebook, they gata the information and ae able to Eo tothe house ofthe people they're stalking” he said 8. Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using the “erst Teen arrested for Facebook blackmail by: JunmeteLAndrade-Reparer/iandradeINQ_Micen ating /O536PM neo2.22 (owpgmappity d="0"1 MANILA, Philippines—Agents ofthe National Bureau of Investigation arrested Thursday n an entrapment operation at a Manila school a 15-year old oy who allegedly blackmailed and extorted P15,000 from another teenager through the social networking site Facebook ee 9. Spoofing happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money, of spread malware. What Can I Do Activity 2.2: Show Me How You Hashtag! Directions: Look at the following images and create a hashtag based on the type of online threat represented by each image. Write your answers on the biank provided in each pictures. 4 Empowerment Technologies -Module 1 xt, QP What I Have Learned Directions: Reflect on the image below. From all you have learned in Lesson 2, why is it that we need to ink before you click? Limit your ideas to a maximum of 10 sentences. 15 Empowerment Technologies -Module 1 | LY Bef ore You Click | Image source: htips//shiskiquide. wordpress.conv2017/03/2/hink-before-yourclck! Reference: 1. ABS-CBN News Topic Page on Identity-theft. Retrieved from _httpsi//news.abs- cbn.com/listtag/identity-theft. Retrieved on May 22, 2020. 2. National Center for Missing and Exploited Children. (n.d). NSTeens: Can you keep it private. Retrieved from 3. Netiquette Quiz. Retrieved from https:/www.nku.edu/~rkdrury/experimentinetiquette_quiz.htm. Retrieved on May 22, 2020. 4, Quiambao, Angelito. (2018, Jul. 23). Online safety, security, ethics, and etiquette. Retrieved from hittpsi/www. slideshare.net/AngelitoQuiambao/online-safety-security-ethicsamp-etiquette. Retrieved on May 22, 2020. 5. Belcic, Ivan. (2019, Nov. 7). What is pharming and how to protect against attacks. Retrieved from https:/www.avg.com/en/signal/what-is-pharming. Retrieved on May 22, 2020. Images 1. https:/witter.com/Parkster00/status/1246347088625045504 2. Shea, Virginia. (2011). Netiquette. Retrieved from http://www albion. com/netiquette/introduction html Retrieved on May 22, 2020. .chtarget.com/definition/phishin 4. https:vied45 1 phishnpharm.weebly.com/how-to-spot-a-fake-websitepharming htm! 5. Chua, Ryan (2011, May 24). ABS-CBN News. Are you a victim of cyberstalking. Retrieved from https:/Inews.abs-cbn.com/nation/05/24/11/are-youvictim-cyber-stalking. Retrieved on May 22, 2020. 6. Andrade, Jeannette. (2012, June 2). Teen arrested for Facebook blackmail. Retrieved from hitps:/technology inquirer net/1 1673/teen-arrested-forfacebook-blackmail, Retrieved on May 22, 2020. 7. httpsv/www.ava.com/er/signal/what-is-spyware 16 Empowerment Technologies -Module 1 8. https/www.safetydetectives, com/wp-content/uploads/2019/03/what-is-adware-and-how-to-remove- ittin-2019-1 jpeg. webp 9. https://dlpng.com/png/6702600 10. https://www.gtmaritime.com/iree-phishing-penetration-test/ 11 http/Awww.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-tobenefit-consumers-says- globe-telecom/ 12, https:/Ishieldquide wordpress.com/201 7/03/12/think-before-you-click/ 413, https:/twitter.com/Parkster00/status/1246347088625045504 LESSON 3: EFFECTIVE INTERNET RESEARCH The Internet has made our lives easier especially in terms of doing research. By browsing the internet, we can access limitless topics. Web-based catalogs are available in many libraries to assist researchers in locating printed books, journals, government documents and other materials. The biggest obstacle facing all researchers on the intemet is how to effectively and efficiently access the vast amount of information available (The Internet: Research Tools, 2013). Learning Objectives By the end of this lesson, you are expected to: 1. Facilitate the practice in judging the credibility, value, and usefulness of researched materials. 2. Use the Intemet as a tool for credible research and information gathering to best achieve specific objectives. What I Know Before we take on another journey towards exploring the great capacity of the internet into research, kindly take time to answer the following questions for your pretest. Direction: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of paper. 1. What is the Boolean logic technique used for? ‘A. Narrowing, broadening or eliminating a search term, B. Using a robot to do instant research C. Searching several search engines at the same time. . Searching the infinite information from the internet, 2. http/www.avg.com/en/signal/what-is-spyware is an example of? A. Access code B. Directory C. Server D.URL 3. Which of the following is a search engine? A. Netscape ©. Elsevier B. Yahoo D. Macromedia Flash 4, Which of the following is NOT an example of a domain? A. .gov B. com C. npr D. .edu 5. What are the three Boolean logic search operators? ‘A. FROM, TO, WHOM C. AND, OR, BUT B. AND, OR, NOT D. SEARCH, KEYWORD, TEXT What's In Activity 3.1: What's In My Name? 7 Empowerment Technologies -Module 1 Direction: Write all your answers in your activity 1. Using the Internet, try to search for your complete name. 2. Write down how many sites have featured your personal name and what is written about you. 3. Answer the following: What other information are written about you? Are the search results coming from reliable sources? Why? ‘Should these bits of information need to be posted or shown in public? Note: Write your answers on the answer sheet. What's New SEARCHING THE WEB There are billions of information on the web and it is a challenge for us to truly find which information is reliable and relevant. Here are some tips you may use to be able to look for relevant and reliable sources: Search engine - are websites used for retrieval of data, files, or documents from data bases. ‘Some search engines we use today are: bbing Batter @ yaHoo! §=@ Aol. Yandex Anatomy of a URL (Uniform Resource Locator) ‘A URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types of names and addresses that refer to objects on the world wide web. Knowing the URL endings will give you clues to who is sponsoring the website and help evaluate the sources. https:/www.searchenginejournal.com/alternative-searchengines/271409/#close f a | 5 1 2 3 4 6 7 4. Protocol 4, Top-level domain 7. Named anchor 2. Subdomain 5, Folders/Paths 3.Domain 6. Page 18 Empowerment Technologies -Module 1 Top-level domains Country-code top-level domains -edu — educational institution ph — Philippines .0fg — non-profit organization eu — European Union -gov - government site ‘uk = United Kingdom -com ~ commercial site au - Australia net - network Search Skills and Tools 1. Boolean Logic — narrows, broadens, or eliminates search term. a. Boolean “or” — this operator will find pages that include either of the search terms. Ex. A or B b. Boolean “and” — this operator will retrieve only pages containing both terms Ex. A and B ¢, Boolean “not” — this operator will find pages that do not include search term immediately following it. Ex. A not B 2. Phase Searching - is used to search for famous quotes, proper names, recommendations, etc. It encloses the phrase in quotation marks. Ex. “Jane Doe” “To be or not to be” A B 3, Plus (+) ~ indicates that the word after the sign is a required word must be found in search. Example: #fire 4, Minus (-) sign ~ indicates to exclude a word from your search that is not required on the result. Example: Jaguar speed ~car 5. Ampersand (@) is used to find social tags. Example: @SteveJobs 6. Hashtag (#) is used to find popular hashtags. Example: #LawOfCiassroom 7. Finding Documents — using the filetype refines the search for documents on the web. letype:paf + filetype:doc + filetype:x's| Ex. ICT in the Philippines pdf 8. Searching Site — the sites find webpage from a website, Ex.: National Geographic information in Australia Search: Australia site: NationalGeographic.com 19 Empowerment Technologies -Module 1 Whatis It Activity 3.2: Can You Find Me? Directions: Use the Internet to research on a news article on Information Technology in the Philippines. This information must come from a government site in PDF or Word document. Print the article and paste your work on the space provided. Do not forget to include the URL of the article you have taken the information. Note:Please use the separated answer sheet. EVALUATING SITES The web provides access to some excellent information and can also give access to those that are irrelevant and outdated. Here is some checkiist that you can use to evaluate your website: 1. Authority. it reveals that the person, institution or agency responsible for a site has the qualifications and knowledge to do so. Evaluating a web site for authority: (0 Authorship: It should be clear who developed the site. 0 Contact information should be clearly provided: e-mail address, snail mail address, phone number, and fax number. 0 Credentials: the author should state qualifications, credentials, or personal background that gives them authority to present information. (0 Check to see if the site supported by an organization or a commercial body 2, Purpose. The purpose of the information presented in the site should be clear. Some sites are ‘meant to inform, persuade, state an opinion, entertain, or parody something or someone. Evaluating a web site for purpose: 1 Does the content support the purpose of the site? (UIs the information geared to a specific audience (students, scholars, general reader)? (UIs the site organized and focused? 1 Are the outside links appropriate for the site? (i Does the site evaluate the links? 3. Coverage. This refers to how comprehensive the website is in their discussion of certain topics. Evaluating a web site for coverage: U Does the site claim to be selective or comprehensive? 1 Are the topics explored in depth? 1 Compare the value of the site's information compared to other similar sites, 1 Do the links go to outside sites rather than its own? {J Does the site provide information with no relevant outside links? 4, Currency. it refers to: (1) how current the information presented is, and (2) how often the site is updated or maintained. It is important to know when a site was created, when it was last updated, and if all of the links are current Evaluating a web site for currency involves finding the date information was: (first written U placed on the web (last revised 5. Objectivity. Objective sites present information with @ minimum of bias. Evaluating a web site for objectivity: (UIs the information presented with a particular bias? 1 Does the information try to sway the audience? 0 Does site advertising cantlict with the content? Us the site trying to explain, inform, persuade, or sell something? 6. Accuracy. It refers to the credibility of the website. Evaluating a web site for accuracy: (0 Reliability: 's the author affiliated with a known, respectable institution? 20 Empowerment Technologies -Module 1 (0 References: do statistics and other factual information receive proper references as to their origin? 7 |s the information comparable to other sites on the same topic? Does the text follow basic rules of grammar, spelling and composition? 11 Is a bibliography or reference list included? What Can I Do Activity 3.3: Evaluating Websites: Checklist This activity is adapted from the University of Maryland: Evaluating Web Sites: A Checklist ib.uond. ides/evaluating-checklist tions: 1. Using the Internet, research on topics under CoVid-19 in the Philippines. 2. Read through the checkiist and answer each question. 3. Attach a printout of the web site you are evaluating and paste in the space provided: rections: Write your reflection about the topic in less than 150 words. Use the provided answer sheet References: 1, Dalhousie University. (n.d.) 6 criteria for websites, Retrieved from. https:/icdn.dal.ca/contentidam/ dalhousie/pdiibrary/CoreSkills/6_Criteria_fo r Websites pdf. Retrieved on May 24, 2020. 2. Quiambao, Angelito. (2018, Jui. 23). Contextualized Online Search and Research Skills. Retrieved from https://www.slideshare net/AngelitoQuiambao/onlineresearch-107104482. Retrieved on May 24, 2020. 3. University of Maryland. (2020). Evaluating Web Sites: A Checklist. Retrieved from www lib.umd.edu/tiquides/evaluating-checkiist. Retrieved on May 24, 2020. at Empowerment Technologies -Module 1

You might also like