100% found this document useful (1 vote)
2K views32 pages

Empowerment Technologies Week2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views32 pages

Empowerment Technologies Week2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Senior High School

Empowerment and
Technology
First Quarter – Week 2
Online Safety, Security Ethics and Etiquette
Standards using ICT’s
Contextualized Online Search and Research Skills
TVL/ACADEMIC – Grade 11/12
Most Essential Learning Competency (MELC) – Based Exemplar
Quarter 1 – Week 2: Online Safety, Security Ethics and Etiquette Standards
using ICT’s; Contextualized Online Search and Research Skills
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary
for exploitation of such work for profit. Such agency or office may, among
other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this exemplar are owned by their
respective copyright holders. Every effort has been exerted to locate and seek
permission to use these materials from their respective copyright owners. The
publisher and authors do not represent nor claim ownership over them.

Development and Quality Assurance Teams


Writers: CHRISTARYN E. SERVILLON, JAZEL SHEEN S. AHIT
Illustrator:
Layout Artist:
Language Editor:
Content Evaluator: CHRISHA D. ENCENDENCIA, LANNY FE TEJANO, DON JC LOREN
Layout Evaluator:
Management Team: PSDS/DIC

1
Rationale

Project PPE (Portfolio Predicate on Exemplar) is a backup contingency response


of the Schools Division of Surigao del Sur for learning delivery and learning resource
which parallel to the on-going endeavors of the higher offices in the Department.
It is the utilization of a lesson exemplar that is streamlined in a teacher-and-learner-
friendly format to cater to the new classroom setup in light of the COVID-19 health
crisis. These exemplars will be paired with a self-contained and self-instructional
portfolio.

The portfolio is a deliberate collection of works that highlight a learner’s effort that
would enable the him/her to see his/her growth and achievement, ability to
reflect on his/her own work and ability to establish goals for future learning.

Introductory Message

For the teacher:

Welcome to the TVL/ACADEMIC– 11/12– First Quarter Exemplar on Online Safety,


Security Ethics and Etiquette Standards
using ICT’s; Contextualized Online Search and Research Skills

This exemplar was collaboratively designed, developed and reviewed by


educators from different schools in the Division to assist you in helping the learners
meet the standards anchored on Most Essential Learning Competencies (MELC)
set by the Department while overcoming the constraints in schooling brought by
the COVID-19 pandemic.

This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration their
needs and circumstances.

As a teacher, you are expected to orient the learners on how to use this exemplar
in the most fit modality. You also need to keep track of the learners' progress while
allowing them to manage their own learning through portfolio assessments.

For the learner:

Welcome to TVL/ACADEMIC – 11/12 – First Quarter) Exemplar on Online Safety,


Security Ethics and Etiquette Standards
using ICT’s; Contextualized Online Search and Research Skills!

2
This exemplar was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning resource while being an active
learner, either at home or in school. To help you with this, this exemplar comes with
a Weekly Portfolio Assessment. Your teacher will provide you with a template and
you will be given a privilege to organize the portfolio in your own creative way.

This exemplar has the following parts and corresponding icons:

This will give you an idea of the competencies


What I Need to Know
you are expected to learn in the exemplar and
the objectives you are expected to realize.
This part includes an activity that aims to check
What I Know
what you already know about the lesson to
take.
This section provides a brief discussion of the
What is It
lesson. This aims to help you discover and
understand new concepts and skills.
This section provides an activity which will help
What I Can Do (1,2 & 3)
you transfer your new knowledge or skill into real
life situations or concerns.

This task aims to evaluate your level of mastery


What I Have Learned
in achieving the learning objectives.

Answer Key This contains answers to all activities in the


module.

This contain instructions about recording your


Portfolio Goal Setting
positive, realistic goals before going through this
exemplar.
This contain instructions about completing the
Portfolio Completion -Your
components of the portfolio. This also includes a
Growth Clue!
rubric to guide you of how your portfolio will be
assessed.

At the end of this module you will also find:

References This is a list of all sources used in


developing this exemplar.

3
What I Need to Know

Most Essential Learning Competency:


LO 1. Apply online safety, security, ethics, and etiquette standards and
practice in the use of ICT’s as it would relate to their specific professional
tracks CS_ICT11/12-ICTPT-la-b-2

Use the internet as a tool for credible research and information gathering to
best achieve specific class objectives or address situational (CS_ICT11/12-
ICTPT-Ia-b-3)

Objectives:

After going through this exemplar, you are expected to:

A. Knowledge: Identify different tips to stay safe online;


Identify the methods used to search on the internet;
B. Skill: Discuss the various internet threats and ways in – order to stay
safe online;
Create a plan to make searching more organized; and,

C. Attitude: Manifest appreciation of evaluating the veracity of


online information.

Portfolio Goal Setting

Using the Portfolio Assessment Template provided by your teacher along


with this exemplar, accomplish now your weekly goal setting. Refer to the
objectives above. Think of positive and realistic goals that you can
considerably achieve with this exemplar. List them as your plans. Remember:
Do not proceed with this exemplar unless you have accomplished your goal
setting.

4
What I Know

Multiple Choice.
Direction:
Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. All of the following are types of information with risk in dealing with social
media sites except?
A. Mother and Father’s name
B. address
C. phone number
D. Relationship status

2.What program is designed to replicate itself and transfer from one


computer to another
A. Virus
B. Worm
C. Trojan
D. Spyware

3. This is a type of malware that is malicious program that transfers from one
computer to another by any types of means.
A. Virus
B. Worm
C. Trojan
D. Spyware

4.What kind of internet threat that is unwanted acquisition of sensitive


personal information like passwords and credit card details?
A. Spam
B. Botnet
C. Phishing
D. Denial of Service Attack

5. All of the following are types of malware except?


A. Trojan
B. Worm
C. Spyware
D. Spam

5
6. It is the process of interactively searching for and retrieving requested
information via a computer from databases that are online.

A. Online Search
B. Research Skill
C. Search Engine
D. Browser

7. The icon you see when the computer is processing something and you have
to wait?

A. Printer
B. Hourglass
C. Browser
D. Clip art
8. What does URL stands for?
A. Uniform Resource Locator
B. Uniform Remote Learning
C. Uniform Right Location
D. Uniform Real Link
9. A word, phrase, or image that allows you to jump to another document on
the World Wide Web.
A. Link
B. Hypertext
C. cyberspace
D. Website
10. All of the following are consequences of relying on false information from
the internet except one;
A. online fame
B. personal embarrassment
C. legal troubles
D. personal injury
11. Why is it important to evaluate online information?
A. It’s important to evaluate the quality of the information to be sure it
contains accurate and reliable information.
B. Adhere to online standards
C. You can narrow your focus and find specific information.
D. We don’t put ourselves in dangerous situations on the internet.
12. What is the advantage of online search?
A. Not too costly in conducting research
B. Lack of accreditation and low quality
C. Not thoroughly screened
D. Not totally secure

6
13. Which of the following statements is incorrect regarding online searching
and research skills?

A. All the results and information of your search online will be accurate,
unbiased and up-to-date.
B. Search for keywords instead of questions, and you’ll probably find
exactly what you’re looking for.
C. In online search, every word matter, order matters while
capitalization does not matter.
D. Learning how to attribute photos is a critical research skill. With Google
Reverse Image Search19, you can upload any photo to Google Images
and hit "search" to find the name of it, and a whole lot more.

14. How can you stay safe online?


A. Give all the information's needed when logging in into your favorite
websites
B. Enable your WIFI open for possible connections with other people
C. Avoid visiting untrusted websites
D. Don’t bother installing antivirus software on your computer

15. All of the following are part of the ten core rules of netiquette except?
A. Adhere to the same standard of behavior online that you would
follow in real life
B. Remember the human
C. Share expert knowledge
D. Prevail your pride and disrespect another people’s privacy

What is It

“Online Safety, Security, Ethics and Etiquette”

Internet is defined as the information superhighway. This means that


anyone has access to this highway, can place info, and can grab that info.
You might be interested to know that digital media can be interchanged with
more popular terms such as social media or social networking sites. At the same
time you might wonder. What is social media’s role in your life?

7
How to make you safe and secured online
The following are types of information with risk when you log in to social
media accounts
 Mother and Father’s name
 Sibling’s name
 Address
 Home Phone Number
 Birthday
 Email Address
 First Name, Last Name, Middle Name
 Current and Previous School
 Cellphone Number

In – order to be safety here are some tips to stay safe online:

 Be mindful on what you share online


 Do not just accept terms and conditions, read it
 Do not share your password with anyone
 Do not talk to strangers whether online or face – to – face
 Never post anything about a future vacation
 Add friends you know in real life
 Avoid visiting untrusted websites
 If you have WIFI at home make it private by adding a password
 Install and update an antivirus software on your computer
How to stay protected?

Install legit and well known antivirus on your computer

8
Some Tips to Stay Safe Online:

Avoid downloading anything from untrusted websites


Buy the software, do not use pirated ones
Do not reply or click links from suspicious emails

Internet Threats

1. MALWARE – stands for malicious software

5 types of Malware

a. Virus – a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks, FD’s, CD’s, etc.)

b. Worm – a malicious program that transfers from one computer to another by any
types of means. Ex. ILOVEYOU Worm

c. Trojan – a malicious program that disguises as a useful program but once


downloaded or installed leaves your PC unprotected and allows hackers to get your
information

d. Spyware - a program that runs in the background without you knowing it (thus
called “spy”). It has the ability to monitor what you are currently doing and typing
through key logging.

e. Adware - a program designed to send you advertisements, mostly as pop – ups.

2. SPAM – an unwanted email mostly from bots or advertisers. It can be used to send
malware

3. PHISHING – an unwanted acquisition of sensitive personal information like passwords


and credit card details.

4. BOTNET – group of compromised computer connected to a network (zombie)

5. DENIAL OF SERVICE ATTACK – disrupts computer access to internet services

9
TEN CORE RULES OF NETIQUETTE

1. Remember the Human


2. Adhere to the same standard of behavior online that you would follow
in real life
3. Know where you are in cyberspace
4. Respect other people’s time and bandwidth
5. Make yourself look good online
6. Share expert knowledge
7. Help keep Flame wars under control
8. Respect other people’s privacy
9. Don’t abuse your power online
10. Be forgiving of other people’s mistakes

Contextualized Online Search and Research Skills


Online search is the process of interactively searching for and retrieving
requested information via computer from databases that are online.
Interactive searches became possible in the 1980’s with the advent of faster
databases and smart terminals.
Advantages of Online Search
1. Ability to obtain a large sample, which increases statistical power.
2. Data is automatically coded so no data entry errors.
3. Reduced cost of conducting research.

Disadvantages of Online Search


1. Online is not totally secure and theft is one of the numerous
dangers it poses, researchers’ personal information is at risk of
being access by rogue persons.
2. Some of the materials on the Internet have not been evaluated
by experts or thoroughly screened.
3. Lack of accreditation and low quality.

Research is a broad term. Here it is used to mean “looking something up


(on the Web)”. It includes any activity where a topic is identified, and an effort
is made to actively gather information for the purpose of furthering
understanding. It may include some post-collection analysis like a concern for
quality or synthesis.

10
Research skills are our ability to find an answer to a question or a solution
to a problem. Research skills include the ability to gather information about
your topic, review that information and analyze and interpret the information
in a manner that brings us to a solution.

The research Process


Lessons and projects should be designed so that research time on the
Web can be maximized in terms of efficiency. This may mean gathering
necessary information beforehand, having students work in groups, or focusing
on whole-class projects.
Barron and Ivers (1996) outlined the following cycle for online research
projects.
Step 1: Questioning --- Before going on the Internet, you should structure their
questions.
Step 2: Planning --- Develop a search strategy with a list of sites to investigate.
Step 3: Gathering --- Use the Web to collect and gather information.
Step 4: Sorting & Sifting --- Analyze and categorize the data they gathered on
the Web.
Step 5: Synthesizing --- Integrate the information into the lesson, and draw
conclusions.
Step 6: Evaluating --- Assess the results, and if necessary, begin the process
again.

Search Engine is a software system that is designed to search for information


on the World Wide Web. The search results are generally presented in a line of
results often referred to as search engine results pages.
Examples of Search Engines

 Google
 Bing
 Yahoo
 Baidu
 Ask.com
 Yandex
 DuckDuckGo
 ChaCha.com

11
Sample Google Search Engine Image

Common commands for search engines include:

 Quotation Marks ( " ) Using quotation marks will help to find specific
phrases involving more than one word. For example: "Jose P. Rizal"

 Addition Sign ( + ) Adding a + sign before a word means that it


MUST be included in each site listed. For example: + Philippines +
taxes

 NOT or Subtraction Sign ( - ) Adding a - sign before a word means


that it will NOT appear in the sites listed. For example: + Corona -
virus

 Asterisks ( * ) Asterisks can be used for wild-cards in some search


engines. For example: Suriga* will look for Surigao city, Surigao del
sur, Surigao movie, etc.
 OR or I – finds web pages that contain either or the term or phrases
 AND or & - finds web pages that contains all the terms or phrases
 ( ) – finds or excludes web pages that contain a group of words

The following is a set of tips to help you build smart search skills, as
adapted from Common Sense Media.

A wealth of built-in—but sometimes hidden—features can help


you find the information you need much more efficiently than your usual
shot-in-the-dark searches. A little Google technique can open up a
world of trusted facts, homework boosters, and cool tricks to impress your
friends (or your parents).

12
A. Find the Hidden Calculator
If number crunching just isn't your thing—and you need an answer
fast— Google's hidden calculator is a lifesaver. Head straight to the
search bar and type in the problem or equation you're looking to solve.
You'll know you've gotten to the right place when a gray, calculator-like
tool pops up as the search result.

Bonus tip: How many teaspoons equal a tablespoon? When the


homework is put away and you need an extra hand at the Chemistry
lab, this tool converts measurements, too.

B. Definitions and More


Browsing the Merriam-Webster dictionary for hours might be a lost
art, but broadening kids' vocabulary doesn't have to be. Simply add the
word "define" before a search term (for example, “define
onomatopoeia”) to bring up the proper spelling, definition, origin, and
even fun tools like voice and translation options.

Bonus tip: If you struggle with spelling, don't worry. Google will suggest
and search based on the appropriate spelling of most words, just as it
does for regular searches.

C. Age-Appropriate Results
Tools like Google SafeSearch15 and YouTube's Safety Mode16
can help filter out mature content that's beyond what those below 18
are ready to see or read. This can also be taken a step further with search
results filter by reading level so you or your younger siblings or friends feel
comfortable with what's in front of them. Let Google annotate the results
with reading levels labeled, or choose to only show basic, intermediate,
or advanced level content.

If you are looking for credible information—or your first taste of scholarly
research—you can check out Google's academic offshoot, Google
Scholar.17 Bonus tip: Explore with confidence18 by viewing content
critically. Just because you see it online doesn't mean it's true.

D. Time-Zone Challenged
If you have far-flung family and don’t want to wake them up in
the middle of the night, you can find the local time anywhere in the
world by typing "time" and a city's name into the search bar.

E. The Perfect Search


Let’s say the homework assignment requires you to use only one
source of information. Enter your query, followed by the URL for the

13
website (i.e., weaving site: ncca.gov.ph/) and hit enter. You'll see only
results from that website.

F. Photo Magic
Learning how to attribute photos is a critical research skill. With
Google Reverse Image Search19, you can upload any photo to Google
Images and hit "search" to find the name of it, and a whole lot more.

Bonus tip: In Google's Chrome browser, you can just right-click on any
image and select "search Google for this image." There's a Firefox
addon20, too.

G. Just for Fun


If all you really need is a little distraction, go to Google and type
in "tilt," browse the Google Doodle archives21, or just tell Google to do a
barrel roll.22 You won't be disappointed.” 23

What Matters In A Query?

Do the following and get the first link of the result:


1. Every word matters.
Try searching for [who], [the who], and [a who]
2. Order matters.
Try searching for [blue sky] and [sky blue]
3. Capitalization does not matter.
Try searching for [barack Obama] and [Barack Obama]
4. Punctuation does not matter.
Try searching for [red, delicious% apple&] and [red delicious apple]

* There are exceptions! $ C# C++ Google+ Can you think of any? but
not ¶ £€©®÷§%() or @

If you want some more keyword tricks, check out the search techniques
below.
TRIVIA/SEARCH QUERY TIPS

1. Define. When your query includes the define: operator, Google


displays all the definitions it finds on the web.

2. Site. “If you really like a web site (e.g. http://ncca.gov.ph) but its
search tool isn’t very good, fret not—Google almost always does a
better job”. Example: [site: ncca.gov.ph culture]

3. Reverse Image search. Instead of typing the keywords, you upload an


image of an unknown product or point to its URL in the search box or bar.
Useful to find product names, recipes, and more

14
4. Autocomplete. Google's autocomplete is a handy tool for both saving
time and getting a feel for what people are searching. See the image
below.

5. More advanced search operators: https://goo.gl/aLuTFZ

Tips in Conducting online Research

 Have question in mind


 Narrow it down
 Advanced search
 Look for credible sources
 Give credit

Evaluating Internet sources

Students often uncritically accept information they see in print or on


computer screens. It is encouraged to carefully evaluate sources found on the
Internet. The evaluation tool (below) will help to analyze web resources in terms
of accuracy, authority, objectivity, timeliness, and coverage. Consideration of
these factors will weed out many of the inaccurate or trivial sites students may
encounter.
Some possible consequences that could result from believing false
information includes professional or personal embarrassment, legal troubles,
personal injury, etc.

Analyzing web resources

Answer the following questions to evaluate web resources.

Accuracy
Are sources listed for the facts?
Can information be verified through another source?

15
Has the site been edited for grammar, spelling, etc.?

Authority
Is the publisher reputable?
Is the sponsorship clear?
Is a phone number or postal address available?
Is there a link to the sponsoring organization?
Is the author qualified to write on this topic?

Objectivity
Does the sponsor have commercial interests?
Is advertising included on the page?
Are there obvious biases?

Currency
Is a publication date indicated?
Is there a date for the last update?
Is the topic one that does not change frequently?

Coverage
Are the topics covered in depth?
Does the content appear to be complete?

Setting bookmarks on the Web

Browsers such as Safari, Firefox, and Internet Explorer provide a way to


create a list of your favorite sites that you can access with a click of the mouse.
The procedure for creating a list of sites is an easy and powerful tool for web
use.

When you find a web page that you want to bookmark,


simply select the "Add Bookmark" or "Add Favorite" option from the menu
bar.
To return to the site at a later time, choose the name from the bookmark or
favorite list, and you will immediately access the site.

You can organize your bookmarks into file folders and can save them on a disk
to transfer and use on other computers.

Copyright issues

Everyone has a somewhat flexible, but not unlimited, copyright privilege


under the "fair use clause" of the U.S. Copyright Act. "Fair use" is the means by
which educators of non-profit educational institutions may use copyrighted
works without seeking permission or making payment to the author or publisher.
Teachers and students are also protected to some extent by the Digital
Millennium Copyright Act, which went into effect in October 1998. Under

16
current guidelines, teachers and students are able to make limited use of
copyrighted materials for instructional purposes.

Currently, copyright law as it relates to the Internet is vague and being


challenged and rewritten on an ongoing basis. However, the guidelines of the
"fair use clause" can be applied to Internet use in the classroom. Although
classroom use allows teachers and students to be creative, you must also be
extremely careful. Teachers and students should realize that all materials found
on the Internet are protected by the same copyright laws as printed materials.
Copyright protects "original works of authorship" that are in a tangible form of
expression.

Copyrightable works include the following categories:

literary works
musical works, including any accompanying words
dramatic works, including any accompanying music, pantomimes, and
choreographic works
pictorial, graphic, and sculptural works
motion pictures and other audiovisual works
sound recordings
architectural works

These categories should be viewed broadly.


For example, computer programs and most "compilations" may be
registered as "literary works"; maps and architectural plans may be registered
as "pictorial, graphic, and sculptural works."

Important questions to ask

What is the purpose for using the material?


Who is the audience?
How widely will the material be distributed?
Will the material be reproduced?

It is allowable under copyright guidelines to use copyrighted materials


for class assignments. Check specific guidelines for length of time the material
can be kept up on a web site.

Definition of Terms:

Browser- A software program that allows internet documents (like webpages)


to be viewed, also called a Web Browser.

Cyberspace- The world of computer networks.

17
Domain Name- A unique name that identifies a specific computer on the
internet.

Download- A term for transferring software or other files from one computer to
another.

Email- Electronic Mail- Messages sent from one specific user to another using
the internet.

Email address- The way a specific user is identified so that they may receive
email. An email address can be identified by the “@” sign. E.g.,
[email protected]

Homepage- The first page of a Website, similar too a table of contents.

HTML- Hypertext Markup Language- A computer language used to make


hypertext documents that are sent via the World Wide Web and viewed using
a Browser.

HTTP- HyperText Transfer Protocol- The way that hypertext documents are
transferred over the internet.

Hypertext- A way pf presenting information that allows words, pictures, sounds,


and actions to be inter-linked so that you may jump between them however
you choose.

Internet- A global system of interconnected computer networks

Link- A word, phrase, or image that allows you to jump to another document
on the World Wide Web.

URL- Uniform Resource Locator- The entire address for a piece of information
of the internet. E.g., www.google.com

Webpage- A hypertext document available on the World Wide Web.

Website- A collection of webpages.

World Wide Web- A collection of resources available on the internet using a


web browser.

18
What I Can Do 1

Activity I – Identification

Direction: Write the correct answer on the answer sheets provided at the
back of this module

_____________1. Stands for malicious software


_____________2. A malicious program designed to replicate itself and transfer
from one computer to another
_____________3. An unwanted email mostly from bots or advertisers, it can be
used to send malware
_____________4. A program designed to send you advertisements mostly as
pop – ups
_____________5. A program that runs in the background without you knowing
it and has the ability to monitor what you are currently doing and typing
trough key logging
_____________6. A malicious program that disguises as a useful program but
once downloaded or installed leaves your PC unprotected and allows
hackers to get your information
_____________7. An unwanted acquisition of sensitive personal information like
passwords and credit card details
_____________8. A group of compromised computer connected to a network
(zombie)
_____________9. Disrupts computer access to internet services
_____________10. Is defined as the information superhighway

Activity II– Matching Type

Direction:
Identify the terms in column A by forming the scrambled letters and
match its meaning/description in column B. Write your answers in your activity
notebook.

A B
1. SRCHEAER KSILL A. is the means by which educators of non-profit
educational institutions may use copyrighted
works without seeking permission or making
payment to the author or publisher.

2. EWSBTIE B. A collection of webpages.

19
3.RBESWOR C. A word, phrase, or image that allows you to jump
to another document on the World Wide Web.

4.RTNEIENT D. A global system of interconnected computer


networks

5.ESU IRAF E. A software program that allows internet


documents (like webpages) to be viewed, also
called a Web Browser.

6.EASRHC EEGINN F. It answers the question, is the publisher reputable?

7.ONIENL RESAHC G. can be used for wild-cards in some search engines.

8. REASTKSI H. the process of interactively searching for and


retrieving requested information via computer
from databases that are online.

9.THAUOTYIR I. a software system that is designed to search for


information on the World Wide Web.

10.INKL J. ability to find an answer to a question or a solution


to a problem.

Activity III– True or False

Direction:
Write TRUE if the statement is correct and FALSE if the statement is wrong.
Write your answer in the answer sheets provided at the back of this module

1. When signing in a social media site refrain from giving your private
information to make you safe online.

2. To make your PC protected install an antivirus to make your gadget


safe.
3. Accept terms and condition without reading the content

4. To exercise freedom of expression you can post anything in social


media such as; nature of work, vacation plans, and family peers

5. Do not talk to strangers whether online or face to face

20
Activity IV – Cross Word Puzzle

Direction:
Complete the cross-word puzzle by answering the Across and Down
questions. Write your answer on your activity notebook.

Across
1. One example of search engine
2. Second step in the research process
3. requires you to use only one source of information.
4. a handy tool for both saving time and getting a feel for what people are
searching.
5. Are the topics covered in depth?

Down
2. ____ is not totally secure and theft is one of the numerous dangers it
poses, researchers’ personal information is at risk of being access by
rogue persons.
3. _____-Appropriate Results
4. _____matters. Try searching for [blue sky] and [sky blue]
5. ____web resources; to evaluate online resources

1. 2. 3.

4.

2.

3. 5.

4.

5.

21
What I Can Do 2

Activity I: Discussion

Direction:
Discuss the following statement by giving your own opinion in a 3
paragraph essay

1. “Think before you click”

Activity II: Discussion

Direction:
The following situations talk about Online search and Research Skills.
Provide necessary information on the following given conditions. Give brief
and concise answer. Write it on your activity notebook.

1. According to Barron and Ivers (1996) what is the outlined cycle for
online research?
2. Cite set of tips to help you build smart search skills, as adapted from
Common Sense Media.
3. What are the common keywords and commands for search engine?

4. What are the factors to be considered in analyzing web resources in


order to get reliable information?
5. Why is it important to evaluate online information?

22
What I Can Do 3

Activity I: GRAPHIC ORGANIZER


Direction:

Give at least 5 disadvantages and advantages of using Internet

Advantages Disadvantages

Activity II: Search It!


Direction:
The following situations is about using keywords to search for
information online. Write your answers in your activity notebook.

1. Go to www.google.com
you want to look for information about English classes. Click in the
search box. What will you type______________________?

2. It is basketball season. Basketball matches are being played around


the world. Ryan is searching for information about the match
schedules and broadcasts on TV. What search phrases should he
give?
__________________________________________________________________
__________________________________________________________________

23
3. Google is just one search engine. There are many different search
engines. Go to: _________________(write a search engine aside from
google).Find the search box. Click in the search box.
David wants to go to a movie in Robinsons, Butuan this Saturday. He
needs to know the name of the movie, the location, and the time.
Circle the best keywords for this search.
a). movie Robinson’s Butuan
b). theaters in Butuan
c). movie theaters Butuan
d). Saturday movies
Type the keywords you circled in the search box here ____________
Press ENTER.

Activity III: Graphic Organizer

Direction:
Create a plan on how to make online searching more organized by
completing the graphic organizer below. Write your answer in your activity
notebook.

Step 1

Step 2

Step 3

Step 4

Step 5

24
What I Have Learned

Activity I - Multiple Choice

Direction:
Choose the letter of the best answer. Write chosen letter on a separate
sheet of paper.

1. All of the following are consequences of relying on false information from the
internet except one;
A. online fame
B. personal embarrassment
C. legal troubles
D. personal injury
2. Why is it important to evaluate online information?
A. It’s important to evaluate the quality of the information to be sure it
contains accurate and reliable information.
B. Adhere to online standards
C. You can narrow your focus and find specific information.
D. We don’t put ourselves in dangerous situations on the internet.
3. What is the advantage of online search?
A. Not too costly in conducting research
B. Lack of accreditation and low quality
C. Not thoroughly screened
D. Not totally secure

4. Which of the following statements is incorrect regarding online searching


and research skills?

A. All the results and information of your search online will be accurate,
unbiased and up-to-date.
B. Search for keywords instead of questions, and you’ll probably find
exactly what you’re looking for.
C. In online search, every word matter, order matters while
capitalization does not matter.
D. Learning how to attribute photos is a critical research skill. With Google
Reverse Image Search19, you can upload any photo to Google Images
and hit "search" to find the name of it, and a whole lot more.

25
5. How can you stay safe online?
A. Give all the information's needed when logging in into your favorite
websites
B. Enable your WIFI open for possible connections with other people
C. Avoid visiting untrusted websites
D. Don’t bother installing antivirus software on your computer

6. All of the following are part of the ten core rules of netiquette except?
A. Adhere to the same standard of behavior online that you would
follow in real life
B. Remember the human
C. Share expert knowledge
D. Prevail your pride and disrespect another people’s privacy

7. All of the following are types of information with risk in dealing with social
media sites except?
A. Mother and Father’s name
B. address
C. phone number
D. Relationship status

8.What program is designed to replicate itself and transfer from one


computer to another
A. Virus
B. Worm
C. Trojan
D. Spyware

9. This is a type of malware that is malicious program that transfers from one
computer to another by any types of means.
A. Virus
B. Worm
C. Trojan
D. Spyware

10.What kind of internet threat that is unwanted acquisition of sensitive


personal information like passwords and credit card details?
A. Spam
B. Botnet
C. Phishing
D. Denial of Service Attack

11. All of the following are types of malware except?


A. Trojan
B. Worm
C. Spyware
D. Spam

26
12. It is the process of interactively searching for and retrieving requested
information via a computer from databases that are online.

A. Online Search
B. Research Skill
C. Search Engine
D. Browser

13. The icon you see when the computer is processing something and you have
to wait?

A. Printer
B. Hourglass
C. Browser
D. Clip art
14. What does URL stands for?
A. Uniform Resource Locator
B. Uniform Remote Learning
C. Uniform Right Location
D. Uniform Real Link
15. A word, phrase, or image that allows you to jump to another document on
the World Wide Web.
A. Link
B. Hypertext
C. cyberspace
D. Website

27
What I Know 28
1. D
2. A
3. B
4. C What I Can Do 1
5. D
6. A I – Identification
What I Have Learned 7. B
1. Malware
8. A
1. A 2. Virus
9. A
2. A 3. Spam
10. A
3. A 4. Adware
11. A
4. A 5. Spyware
12. A
5. C 6. Trojan
13. A
6. D 7. Phishing
14. C
7. D 8. Botnet
15. D
8. A 9. Denial of Service
9. B Attack
10. C 10. Internet
11. D What I Can Do 2
12. A II – Matching Type
13. B 1. Research skill-j
14. A Discussion 2. Website-b
15. A 3. Browser-e
4. Internet-d
Activity I: Answer may vary
5. Fair Use-a
Activity II: 6. Search engine-i
1.Step 1: Questioning, Step 2: Planning Step 3: Gathering 7. Online Search-h
Step 4: Sorting & Sifting, Step 5: Synthesizing, Step 6: 8. Asterisk-g
What I Can Do 3 9. Authority-f
Evaluating
2.Use Google’s Hidden Calculator, write the word define 10. Link-c
Activity I: Answer may vary III-True or False
before a word to get the meaning of a word Let’s say
Activity II: Search It! the homework assignment requires you to use only one 1. True
source of information. Enter your query, followed by the 2. True
1. English Classes URL for the website (i.e., weaving site: ncca.gov.ph/) 3. False
2. National Basketball and hit enter. You'll see only results from that website, 4. False
Schedule 2020 with Google Reverse Image Search19, you can upload 5. True
3. www.yahoo.com; any photo to Google Images and hit "search" to find the
a. movies Robinson’s name of it, and a whole lot more. IV – Crossword Puzzle
Butuan
3. Quotation Marks ( " ) Using quotation marks will help Across
Activity III: Graphic Organizer to find specific phrases involving more than one word.
1. Google
Addition Sign ( + ) Adding a + sign before a word means
2. Planning
that it MUST be included in each site listed. NOT or 3. Perfect search
Subtraction Sign ( - ) Adding a - sign before a word means 4. autocomplete
that it will NOT appear in the sites listed. Asterisks ( * ) 5. coverage
Asterisks can be used for wild-cards in some search
engine. OR or I – finds web pages that contain either or Down
the term or phrases AND or & - finds web pages that 2. online
contains all the terms or phrases ( ) – finds or excludes 3. age
web pages that contain a group of words. 4. order
5. analyzing
4. accuracy, authority, objectivity, timeliness, and
coverage
5. It’s important to evaluate the quality of the information
to be sure it contains accurate and reliable information.
Answer Key
Portfolio Completion – Your Growth Clue!

You now go back to your portfolio and work on the other components
that follow your Goal Setting. Remember that your portfolio is a deliberate
collection of your works with the help of the exemplar. Highlighting your efforts
here enables you to see and reflect on your growth and achievement and
your ability to establish goals just to learn. Upon completion of your portfolio,
please be guided of the rubric below.

Rubric for Portfolio Assessment

29
References
Feleciano Agpaoa, 1991, Interior and Exterior Wiring Troubleshooting: National
Bookstore.

Efren F. Azares, and Cirilo B. Recana, 1999 Practical Electricity III; Adriana
Publishing.

Ulysses B. Balana, Electricity III: BEC Based.

Max P. Fajardo, and Leo B. Fajardo, Electrical Layout and Estimates.

Institute of International Electrical Engineering of the Philippines Incorporated,


2000 Edition, Philippine Electrical Code (PEC).

Roland E. Palmquist, 7th Edition, Audel House Wiring.

Empowerment Technologies for the Technical-Vocational-Livelihood Track


Teacher’s Guide First Edition 2016, Department of Education Republic of the
Philippines
https://enelsonbalneg.weebly.com/uploads/8/5/5/6/85567274/unit_3_lesson_
5_43_-_52_third_week.pdf
Empowerment Technology Student Reader First Edition 2016, Department of
Education Republic of the Philippines
https://www.bklynlibrary.org/sites/default/files/documents/internet%20Resear
ch%20Lesson%20Plan_FULL.pdf
https://www.slideshare.net/mobile/markjhonoxillo/empowerment-
technologies-online-seaarch-and-research-skills

30
For inquiries or feedback, please write or call:

DepEd Surigao del Sur Division – Schools District of Cantilan I

Address: _______________________________________________
___________________________________________________________
___________________________________________________________

Contact Number:
Email Address:

31

You might also like