0% found this document useful (0 votes)
122 views

EmTech Module Lesson 1 2

The document provides an introduction to information and communication technologies (ICT). It discusses how ICT has improved lives and gives statistics about ICT usage in the Philippines. It also explains the differences between static websites of Web 1.0 and dynamic websites that allow user participation and tagging in Web 2.0.

Uploaded by

RHYNALYN UNTARAN
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views

EmTech Module Lesson 1 2

The document provides an introduction to information and communication technologies (ICT). It discusses how ICT has improved lives and gives statistics about ICT usage in the Philippines. It also explains the differences between static websites of Web 1.0 and dynamic websites that allow user participation and tagging in Web 2.0.

Uploaded by

RHYNALYN UNTARAN
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

LESSON 1

INTRODUCTION TO INFORMATION AND


COMMUNICATION TECHNOLOGIES

Welcome to Empowerment Technologies online class!

INTRODUCTION

Lesson 1 covers topics about the Introduction to Information and Communication Technologies.

It includes the following topics:

 The State of ICT Technologies


 Online Systems, Functions, and Platforms

At the end of this lesson, you should be able to:

1. improve your knowledge on how ICT affects your everyday life and the state of our nation;

2. compare and contrast the differences between online platforms, sites and content;

3. understand the features of Web 2.0;

4. understand the future of the World Wide Web through Web 3.0; and

5. learn the different trends in ICT and use them to their advantage.

1
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

Answer the following questions below honestly.

1. How many times have you checked your phone this morning?

2. How many status updates have you posted in Facebook or Twitter today?

3. Did you use the internet for an hour after you woke up this morning?

4. Do you follow a celebrity via his/her social media account?

If you happened to be “guilty as charged” in most of these questions, chances are, you are a
digital native. And chances are, from the moment you were born, you were surrounded by technology.
You are surrounded by ICT.

DISCUSSION

As the popular saying goes, “Love makes the world go round.” But before you start
looking for someone to fall in love witH, you could argue how the internet has made the world go
round for decades. Likewise, the internet has probably made your world go round. In this lesson, we
will understand how information and Communication Technologies have improved our lives in such a
short period of time.

Information and Communication Technologies

Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send,
and edit information.

When we make video call, we use the Internet. When we send a text or make a call,
we use cellular networks. When we run out of load or battery, we use payphones which use a
telephone network. Having unified way to communicate is one of the goals of ICT. In terms of
economics, ICT has saved companies a lot of resources (time and money) with the kind of
communication technology they use, nowadays. In a similar way, we spend less because of ICT. As it
normally costs us a peso to send a text message or SMS, with the internet, we can send multiple
messages and only be charged by a fraction.

2
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

ICT in the Philippines

Several International Companies dub the Philippines as the “ICT Hub of Asia.” It is no secret
that there is a huge growth of ICT-related jobs around the country, one of which is the call center of
BPO (Business Process Outsourcing) center.

According to the 2013 Edition of Measuring the Information Society by the International
Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. That would
mean that for every 100 Filipinos you meet, there is a high chance that they have a cellphone and
approximately for the seven of them, they have two.

In a data gathered by the Annual Survey of the Philippine Business and Industries, NSO, in
2010, the ICT industry shares 19.3 of the total employment population here in the Philippines.

To Add to this statistics, Time Magazine’s “ The Selfiest Cities around the World” of 2013
places two cities from the Philippines in the top 1 and top 10 spots. The study was conducted using
Instagram, a popular photo sharing application.

With these numbers, there is no doubt that the Philippines is one of the countries that benefits
most out of ICT.

Web 2.0: Dynamic Web Pages

The internet has been a vital tool to our modern lives that is why it is also important to make
the best of the Internet.

When the World Wide Web was invented, most web pages were static. Static (also known as
flat page or stationary page) in the sense that the page is “as is” and cannot be manipulated by the
user. The content is also the same for all users. This is referred to as Web 1.0.

However, the World Wide Web is more than just static pages. Pretty soon, Web 2.0 came to
the picture.

Web 2.0 is aterm coined by Darcy DiNucci on January 1999. In her article titled, “Fragemneted
Future,” she wrote:

“The web we know now, which loads into a browser window in essentially atatic screenfuls, is
only an empty embryo of the web to come. The first glimmerings of Web 2.0 are beginning to appear,
and we are just starting to see how that embryo might develop.”

Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages – the user is able to see a
website differently than others. Examples of Web 2.0 include social networking sites, blogs, wikis,
video sharing sites, hosted services, and web applications. Web 2.0 allows users to interact with the
page: instead of just reading a page, the user may be able to comment or create a user account. Web
2.0 also allows users to use web browsers instead of just using their operating system. Browsers can
now be used for their user interface, application software (or web applications), and even for file
storage. Most websites that we visit today are Web 2.0.

3
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

ACTIVITY 1

Static vs. Dynamic

Look for 10 websites and classify them as static or dynamic. What makes each website static
or dynamic? Use the table below.

Website URL Static Dynamic Reason

Submit your output in Activity 1 Submission bin following this filename format:
Section_Surname_First Name_Activity 1

DISCUSSION

Features of Web 2.0

The key features of Web 2.0 include:

1. Folksonomy- allows users to categorize and classify/arrange information using freely


chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram,
Facebook, etc. use tags that start with the pound sign (#). This is also referred to as hashtag.

2. Rich User Experience – content is dynamic and is responsive to user’s input. An example
would be a website that shows local content. In the case of social networking sites, when logged on,
your account is used to modify what you see in their website.

3. User Participation – the owner of the website is not the only one who is able to put cont.
Others are able to place a content of their own by means of comments, reviews, and evaluation.
Some websites allow readers to comment on an article, participate in a poll, or review a specific
product (e.g., Amazon.com, online stores).

4. Long Tail – services that are offered on demand rather than on a one-time purchase. In
certain cases, time-based pricing is better than file size-based pricing or vice versa. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in the
Internet or a data plan that charges you for the amount of bandwidth you used.

4
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

5. Software as a Service – users will subscribe to a software only when needed rather than
purchasing them. This is cheaper option if you do not always need to use a software. For instance,
Google Docs is a free web-based application that allows the user to create and edit word processing
and spreadsheet documents online.

When you need a software, like a Word Processor, you can purchase it for a one-time huge
amount and install it in your computer and it is yours forever. Software as a service allows you to
“rent” a software for a minimal fee.

6. Mass Participation – diverse information sharing through universal web access. Since
most users can use the Internet, Web 2.0’s content is based on people from various cultures.

Web 3.0 and the Semantic Web

The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The W3C
standard encourages web developers to include semantic content in their webpages. The term was
coined by the inventor of the World Wide Web, Tim Berners-Lee. Lee also noted that the Semantic
Web is a component for Web 3.0.

According to the W3C,” The Semantic Web provides a common framework that allows data to
be shared and reused across application, enterprise, and community boundaries.” The aim of Web
3.0 is to have machines (or servers) understand the user’s preferences to be able to deliver web
content specifically targeting the user. For example, when doing a web search in Web 2.0, the
topmost result is based on the preference of several users who already searched for the item. The
search engine then labels it the most common answer to the search query. Though there are
instances wherein several preferences are considered like geographic location, Web 3.0 aims to do
better. This is through studying personal preferences of an individual user and showing results based
on those preferences. The internet is able to predict the best possible answers to your question
“learning” from your previous choices.

For example, if you search the Internet for “where is the best place to go shopping?” Web 3.0
will aim to give you results depending on how you have made choices in the past. If you have
purchased several shoes online, the Internet will give you result on the best place with the highest
rated shoes around your vicinity.

Another example is when you search for the best restaurant to visit in a specific area. First, it
may look for your previous visits from other restaurants and if you have rated them whether good or
bad. In return, Web 3.0 will search for restaurants that have similar menu, good rating, and budget
that fit your preference in the past.

Web 3.0 is yet to be fully realized because of several problems:

1. Compatibility. HTML files and current web browsers could not support Web 3.0.

2. Security. The user’s security is also in question since the machine is saving his or her preferences.

3. Vastness. The World Wide Web already contains billions of web pages.

4. Vagueness. Certain words are imprecise. The words “old” and “small” would depend on the user.

5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict
what the user is referring to at a given time.

5
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

Trends in ICT

As the world of ICT continues to grow, the industry has focused on several innovations.
These innovations cater to the needs of the people that benefit most out of ICT. Whether it is for
business or personal use, these trends are current front runners in the innovation of ICT.

1. Convergence

Technological Convergence is the synergy of technological advancements to work on a


similar goal or task. For example, besides using your personal computer to create word documents,
you can now use your smartphone. It can also use cloud technologies to sync files from one device to
another while also using LTE technology which means you can access your files anytime, anywhere.
Convergence is using several technologies to accomplish a task conveniently.

2. Social Media

Social Media is a website, application, or online channel that enables web users to create, co-
create, discuss, modify, and exchange user-generated content. According to Nielsen, a global
information and measurement company, Internet users spend more time in social media sites than in
any other type of sites. With this, more and more advertisers use social media to promote their
product.

There are 6 types of social media:

a. Social Networks. These are the sites that allow you to connect with other people with the
same interest or background. Once a user creates his or her account, he or she can set up a profile,
add people, create groups, and share content. Examples: Facebook and Google +

b. Bookmarking Sites. These are sites that allow you to store and manage links to various
websites and resources. Most of these sites allow you to create a tag that allows you and others to
easily search or share them. Examples: StumbleUpon and Pinteres.

c. Social News. These are sites that allow users to post their own news items or links to
other news sources. The users can also comment on the post and comments may also be ranked.
They are also capable of voting on these news articles of the website. Those who get the most
amount of votes are shown most prominently. Examples: reddit and Digg

d. Media Sharing. These are sites that allow you to upload and share media content like
images, music, and video. Most of these sites have additional social features like liking, commenting,
and having user profiles. Examples: Flicker, Youtube, and Instagram

e. Microblogging. These are sites that focus on short updates from the user. Those
subscribed to the user will be able to receive those updated. Examples: Twitter and Plurk

f. Blogs and Forums. These websites allow users to post their content. Other users are able
to comment on the said topic. There are several free blogging platforms like Blogger, WordPress, and
Tumblr. On the other hand, forums are typically part of a certain website or web service.

3. Mobile Technologies

The popularity of Smartphones and tablets has taken a major rise over the years. This is
largely because of the devices’ capability to do tasks that were originally found in personal computers.
Several of these devices are capable of using high-speed internet. Today, the latest mobile devices
use 4G Networking (LTE), which is currently the fastest mobile network. Also, mobile devices use
different operating systems:

6
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

a. iOS – used in Apple devices such as iPhone and iPad

b. Android – an open source operating system developed by Google. Being open source

means several mobile companies use this OS for free.

c. Blackberry OS – used in Blackberry devices

d. Windows Phone OS – a closed source and proprietary operating system developed by

Microsoft.

e. Symbian – the original smartphone OS; used by Nokia devices

f. WebOS – originally used for smartphones; now used for smart TVs.

g. Windows Mobile – developed by Microsoft for smartphones and pocket PCs.

4. Assistive Media

Assistive Media is a nonprofit service designed to help people who have visual and reading
impairments. A database of audio recordings is used to read to the user. You may visit
http://www.assistivemedia.org/ for several of their audio recordings.

ENGAGEMENT

Identifying the correct Web platform for Social Change

1. Identify a problem in your community (e.g., littering, garbage disposal, blocked


drainages, etc.).

2. Imagine that you are going to create a website to persuade both community
leaders and members to solve this problem.

3. Fill out the form below and submit your output in Activity 2 Submission Bin using
this filename format: Section_lastname_firstname_activity2

Community Problem: _________________________________________________________

Vicinity: _______________________________________________________________________

Campaign Name: _______________________________________________________________

Type of Social Media Used: ________________________________________________________

Website Used: __________________________________________________________________

7
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

What will be the content of your social media site?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

Why do you choose that type of social media?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

Why did you choose that website?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

ACTIVITY 2

Reflection Paper

Compose a 300-word insightful reflection paper on the nature of ICT in the context of your life,
society, and enrolled senior high school track/strand.

Submit your reflection paper in Activity 3 Submission Bin using this filename format:
Section_Lastname_firstname_reflection paper.

8
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

QUIZ

True or False: Choose True if the Statement is Correct; Otherwise choose False.

________ 1. Tim Berners-Lee created the World Wide Web

________ 2. People Magazine conducted the research on “The Selfiest cities in the World.”

________ 3. Web 2.0 introduced static webpages that allow users to interact with the
webpage.

________ 4. Folksonomy allows users to categorize and locate information

________ 5. Technological convergence is the synergy of technological advancements to


work on a similar goal or task.

________ 6. According to Nielsen, users who use the Internet spend more time in social
media sites than in any other type of site.

________ 7. Blogging sites are sites that focus on short updates from the user.

________ 8. Android is a mobile operating system for Apple devices

________ 9. Assistive Media is a nonprofit service designed to help people who have visual
and reading impairments.

________ 10. Information and Communication Technology (ICT) deals with the use of
different communications Technology to locate, save, send, and edit
information.

REFERENCES

(2016). Empowerment Technologies, Innovative Training Works, Inc. First Edition. Rex Bookstore

9
LESSON 2

ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

INTRODUCTION

In the previous lesson, you learn how Information and Communication


Technologies have improved our lives in such a period of time. In this lesson you’ll
learn to consider one’s and other’s safety when sharing information using the
Internet and be responsible in the use of social networking sites.

Most of us use the internet every day. Sometimes, we do not pay attention on how much
information we share online. Below is a questionnaire about how much information you have shared
so far. Put a check (/) under Shared or Not Shared.

How Safe Are You?

Type of Information Shared Not Shared


1. First Name
2. Last Name
3. Middle Name
4. Current and Previous School (s)
5. Your Cellphone Numbers
6. The name of your father and mother
7. Name of your siblings
8. Your address
9. Your home phone number
10. Your birthday

How many checks did you have for Shared? You probably answered Shared in the first two
items. If that is the case, try using a search engine like Google then type your first and last name. Did
you get links to your profile page? Try switching to image search. Did your picture appear? If you have
a unique name, chances are, it did. Do not feel bad if it did not appear though. In fact, it id probably for
your best interest not to have pictures of yourself in a search engine.

So how did this happen? How can search engines locate you? Is there any danger of being
found by search engines?

10
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

DISCUSSION

How many hours do you spend on the Internet per day? Can you live without the Internet for a
week? How many aspects of your life depend on the Internet?

We are all exposed to many things powered by the Internet. Without proper knowledge in
responsible use of the Internet, we could be a victim or hurt other people.

The Internet is defined as the “Information Superhighway.”

This means that anyone has access to this highway, can place information, and can grab
information. Any information, even things that you have set privately, can be access one way or
another. The threat of cybercrime is very real. While you may not experience the threat now, whatever
information we share today could affect our future.

NETIQUETTE

The term “netiquette” is a coined or portmanteau term of network and etiquette. A netiquette
is a set of ideal rules and conduct that a netizen should observe in communicating and/or publishing
information and materials over the World Wide Web and in ICT in general.

TIPS TO STAY SAFE ONLINE

 Be mindful of what you share online and what site you share it to.
 Do not just accept terms and conditions; read it.
 Check out the privacy policy page of a website to learn how the website handles the
information you share.
 Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
 Do not share your password with anyone.
 Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode,” a feature
of the browser, will not protect you from hackers.
 Do not talk to strangers whether online or face-to-face.
 Never post anything about a future vacation. It is similar to posting, “Rob my house at this
date.”
 Add friends you know in real life.
 Avoid using untrusted websites.
 Install and update an antivirus software on your computer. Use only one anti-virus software to
avoid conflicts.
 If you have a Wi-Fi at home, make it private network by adding a password.
 Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-
peer downloads (torrents) as the download is most likely not monitored by the site owner.
 Buy the software; do not use pirated ones.
 Do not reply or click links from suspicious emails.

You can also watch these videos:

Core Rules of Netiquette by: Angel Rivera (2016). Core Rules of Netiquette
https://youtu.be/FWMk_Zv7nB8. Youtube.com.

11
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

Responsible Use of Social Media THINK by Projonmo Agami


https://www.youtube.com/watch?v=qKxJA7bE-xw

Dos and Don'ts when using social networks By leadinginnovation


https://www.youtube.com/watch?v=hqezbib5qpQ

Online Ethics By: Dua Nadeem


https://www.youtube.com/watch?v=hUxMpDcXhw0

Safe Web Surfing: Top Tips for Kids and Teens Online By: watchwellcast 
https://www.youtube.com/watch?v=yrln8nyVBLU

INTERNET THREATS

1. MALWARE - stand for malicious software.


a. Virus – a malicious program designed to replicate itself and transfer one computer to
another either through the Internet and local networks or data storage like flash drives and CDs.

b. Worm – a malicious program that transfers from one computer to another by any type
of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.

c. Trojan – a malicious program that is disguised as a useful program but once


downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

*Rogue Security Software – tricks the user into posing that it is a security software. It asks
the user to pay to improve his/her security but in reality, they are not protected at all.

d. Spyware – a program that runs in the background without you knowing it (thus called
“spy”). It has the ability to monitor what you are currently doing and typing through keylogging.

*Keyloggers – used to record the keystroke done by the user. This is done to steal their
password or any other sensitive information. It can record email, messages, or any information
you type using your keyboard.

e. Adware – a program designed to send you advertisements, mostly as pop-ups.

2. SPAM – unwanted email mostly from bots or advertisements. It can be used to send malware.

3. PHISHING – its goal is to acquire sensitive personal information like passwords and credit card
details. This is done by sending you an email that will direct the user to visit a website and be asked to
update his/her username, password, credit card, or personal information.

12
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

*Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name
Service) System.

Watch the following video about internet threats:

(2018). Internet Threats by Lorenzo Dinglasan. https://youtu.be/YYeSrPjSob4

PHISHING

- the illegal act of sending emails or messages that appear to come from authentic sources,
but really come from spammers. Phishers often try to get people to send them their personal
information, everything from account numbers to passwords.

PROTECTING REPUTATIONS ONLINE

1. Before you post something on the web, ask these questions to yourself: Would you want
your parents or grandparents to see it? Would you want your future boss to see it? Once
you post something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scanthat post

4. Avoid using names. Names are easy for search engines to scan.

5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull
it down or report as inappropriate.

COPYRIGHT INFRINGEMENT

If you create something – an idea, an invention, a form of literary work, or a research, you
have the right as to how it should be used by others. This is called Intellectual Property.

In other words, the copyright law includes your rights over your work, and anyone who uses it
without your consent is punishable by the law.

Tips that could help avoid copyright infringement:

1. UNDERSTAND – express something using your own words. You should give credit
to the source.
2. BE RESPONSIBLE – know if something has copyright.
3. BE CREATIVE – add your own creative genius.
4. KNOW THE LAW – know about copyright laws, fair use

13
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

ONLINE RESEARCH

The information that we need is more likely already in the Internet. It is just a matter of how to
look for it and how to use information from the most credible source. Here are some tips in conducting
online research.

 Have a question in mind. Focus on a question you want to answer. If it is a series of


questions, start with one. Never search anything on the go.
 Narrow it down. Search engine like Google, Bing, or Yahoo use several filters to
determine the most appropriate result for you. These search engines use your
previous search history and your geographical location, and send you the result
which is the most related to you.
 Advanced search. The best way to filter information you get from search engines is
by using advanced search. This will allow you to filter out information you do not
need. In Google, simply search a word like you would normally do, then click the
advanced search option on the options button located at the upper right corner of the
page.
 Look for a credible source. Some wikis, though filled with updated information, are not
a credible source. This is due to the fact that anyone can edit its content. When using
wikis, check out the link of the cited text to be navigated to the footnote where the list
of sources is located. (The more credible sources are scientific journals, established
news and magazines websites, online encyclopedias, and scholarly databases.
Check the URL of a website if it ends with a .org, .gov, and ,edu. .Edu websites are
best for research.)
 Give credit. If you are going to use the information from a source for educational
purposes, give credit to the original author of the page or information.

To properly cite a reference, you may use the format below:

Name of the person or organization (the author of the information). Title of the home
page in italics (title is shown in title bar but is sometimes missing or unrelated). URL.
Date last seen.

Example:

Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”


http://oleader.penz.com/random/bananalove.htm. Viewed on September 7, 2015.

“Accounting: What you should know.” Jargon Online Network.


http://www.jargononline.com/accounting101.html. Viewed on April 12, 2015.

GOOGLE TECHNIQUES

A. Find the Hidden Calculator


If number crunching just isn't your thing -- and you need a fast answer -- Google's
hidden calculator is a lifesaver. Head straight to the search bar and type in the problem or
equation you're looking to solve. You'll know you've gotten to the right place when a gray,
calculator-like tool pops up as the search result.

Bonus tip: How many teaspoons equal a tablespoon? When the homework is put
away and you need an extra hand at the Chemistry lab, this tool converts measurements, too.

14
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

B. Definitions and More


Browsing the Merriam-Webster dictionary for hours might be a lost art, but
broadening kids' vocabulary doesn't have to be. Simply add the word "define" before a search
term (for example, “define onomatopoeia”) to bring up the proper spelling, definition, origin,
and even 17 of 63 fun tools like voice and translation options.

Bonus tip: If you struggle with spelling, don't worry. Google will suggest and search
based on the appropriate spelling of most words, just as it does for regular searches.

C. Age-Appropriate Results

● Tools like Google SafeSearch9 and YouTube's Safety Mode10 can help filter out mature
content that's beyond what those below 18 are ready to see or read. This can also be taken a
step further with search results filter by reading level so you or your younger siblings or
friends feel comfortable with what's in front of them. Let Google annotate the results with
reading levels labeled, or choose to only show basic, intermediate, or advanced level content.

● If you are looking for credible information -- or your first taste of scholarly research --can
check out Google's academic offshoot, Google Scholar .11

Bonus tip: Explore with confidence12 by viewing content critically. Just because you
see it online doesn't mean it's true.

D. Time-Zone Challenged

If you have far-flung family and don’t want to wake them up in the middle of the night,
you can find the local time anywhere in the world by typing "time" and a city's name into the
search bar.

E. The Perfect Search


Let’s say the homework assignment requires you to use only one source of
information.

Enter your query, followed by the url for the website (i.e., weaving site:ncca.gov.ph/ ) and hit
enter. You'll see only results from that website.

Need help with weaving homework but getting search results for weaving for sale?
Add a minus sign before "sale" to eliminate sale-related results.

15
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

F. Photo Magic
Learning how to attribute photos is a critical research skill. With Google Reverse
Image Search, you can upload any photo to Google Images and hit "search" to find the name
of it, and a whole lot more.

Bonus tip: In Google's Chrome browser, you can just right-click on any image and
select "search Google for this image." There's a Firefox add-on, too.

G. Just for Fun


If all you really need is a little distraction, go to Google and type in "tilt," browse the
Google Doodle archives, or just tell Google to do a barrel roll. You won't be disappointed.”
And if you want some more keyword tricks, check out the search techniques below.

TRIVIA/SEARCH QUERY TIPS

1. Define. When your query includes the define: operator, Google displays all the definitions it
finds on the web.
2. Site. “If you really like a web site (e.g. http://ncca.gov.ph) but its search tool isn’t very
good, fret not—Google almost always does a better job”.
Example: [site:ncca.gov.ph culture]
3. Reverse Image search. Instead of typing the keywords, you upload an image of an
unknown product or point to its URL in the search box or bar. Useful to find product names,
recipes, and more
4. Autocomplete. Google's autocomplete is a handy tool for both saving time and getting a
feel for what people are searching. See the image below.
5. More advanced search operators: https://goo.gl/aLuTFZ

ENGAGEMENT

Activity 1. Privacy Policies

Visit a social networking site and look for the site’s privacy policy. The link is typically
found at the bottom of the page and sometime labeled only as “Policy.’ Write a short summary
on how the website handles both private and public information.

Submit your output in Activity 1 Submission Bin.

16
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

Activity 2. Cyber News Report (Optional)

Research for several news and events related to cybercrime. Using your cellphone or
any video-recording device, report it as if you were a newscaster. Submit your video in
Activity 2 Submission Bin.

ASSIMILATION

Activity 3. Digital Poster Forum


Using a computer, tablet or smartphone, create a digital poster that shows issues or
problems that may be encountered which is related to online safety and security. Write a brief
reflection about the importance of being safe and secured online. Join and submit your output
in the Forum. Look at the digital posters that your classmates have submitted and comment
on 1 of your classmates’ output.

RUBRICS
Criteria Excellent (10) Good (8) Fair (5) NI (2)
Content (issues or
problems that may
Message is clear, Message is Message is
be encountered Message is clear
accurate, and clear but unclear and/ or
which is related to and accurate.
strong. question-able. inaccurate.
online safety and
security)
All graphics are
All graphics are All graphics Graphics do not
related to the topic
related to the topic relate to the relate to the topic
and most make it
and make it easier topic. Two and/or three or
Graphic (Relevance easier to
to understand. All borrowed more borrowed
and Citation) understand. One
borrowed graphics graphics have graphics do not
borrowed graphics
have a source no source have a source
have no source
citation. citation. citation.
citation.
The poster is excep- The poster is
The poster is The poster is
tionally attractive in acceptably
attractive in terms of poorly designed,
Design and Layout terms of design, attractive
design, layout, and and the layout is
layout, and though layout is
neatness. cluttered.
neatness. cluttered.
Every individual in
Group members
the group Group work is done Group work is
Work Ethics are not working
contributed to the mostly by two done mostly by
(Cooperation) during the
creation of the individuals. one individual.
designated time.
digital poster. 

17
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

QUIZ

Matching Type: Match column A with Column B. Write the letter of the correct answer on the
space before each number.

Column A Column B

1. Virus a. designed to send you advertisements


2. rogue b. sends an official-looking email and is designed to steal
sensitive personal information.
3. keylogger
c. a provision that allows you to use copyrighted work
4. adware
without consent with certain limitations
5. spam
d. a browser feature that is synonymous to “private”
6. phishing browsing

7. fair use e. replicates and can transfer from one computer to


another.
8. spyware
f. exploits the DNS system.
9. private
g. states that anyone who uses your work without your
10. malware consent is punishable by law.

11. incognito h. runs in the background and monitors what you are
doing
12. internet
i. unwanted email mostly from bots
13. Trojan
j. disguised as a useful program but is not
14. copyright
k. the information superhighway
15. pharming
l. tricks the user into posing that it is a security software

m. a malicious software

n. an option to hide a post so that search engines could


not scan it.

o. used to record the keystrokes done by the user.

18
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

REFERENCES

Web Surfing: Top Tips for Kids and Teens https://www.youtube.com/watch?v=yrln8nyVBLU By:
Watchwellcast

Malware: Differences Between Computer Viruses https://www.youtube.com/watch?v=n8mbzU0X2nQ


By: Kaspersky Lab

Online Research: Tips for Effective Search Strategies -https://www.youtube.com/watch?


v=LTJygQwYV84 By: Sarah Clark

(2016). Empowerment Technologies, Innovative Training Works, Inc. RexBookstore, pp. 19-25

http://www.google.com/doodles#archives

http://www.google.com/#q=do+a+barrel+roll

Angel Rivera (2016). Core Rules of Netiquette https://youtu.be/FWMk_Zv7nB8. Youtube.com.

Core Rules of Netiquette by: Angel Rivera (2016). Core Rules of Netiquette
https://youtu.be/FWMk_Zv7nB8. Youtube.com.

Responsible Use of Social Media THINK by Projonmo Agami


https://www.youtube.com/watch?v=qKxJA7bE-xw

Dos and Don'ts when using social networks By leadinginnovation


https://www.youtube.com/watch?v=hqezbib5qpQ

Online Ethics By: Dua Nadeem


https://www.youtube.com/watch?v=hUxMpDcXhw0

Safe Web Surfing: Top Tips for Kids and Teens Online By: watchwellcast 
https://www.youtube.com/watch?v=yrln8nyVBLU

(2018). Internet Threats by Lorenzo Dinglasan. https://youtu.be/YYeSrPjSob4

19

You might also like