0% found this document useful (0 votes)
212 views6 pages

Internet Icf

This module covers the knowledge, skills and attitude required in exploring the World Wide web and network. Upon completion of this module the students / trainees should be able to: LO 1. Recognize network fundamentals and the benefits and risks of network computing. LO 2. Determine the relationship between computer networks, OTHER COMMUNICATIONS NETWORKS (like the telephone network) and the Internet.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
212 views6 pages

Internet Icf

This module covers the knowledge, skills and attitude required in exploring the World Wide web and network. Upon completion of this module the students / trainees should be able to: LO 1. Recognize network fundamentals and the benefits and risks of network computing. LO 2. Determine the relationship between computer networks, OTHER COMMUNICATIONS NETWORKS (like the telephone network) and the Internet.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Unit of Competency : Module Title Module Description : :

EXPLORE THE WEB AND NETWORK EXPLORING THE WEB AND NETWORK This unit covers the knowledge, skills and attitude required in exploring the World Wide Web and network to be able to use and operate the software at an efficient level.

Nominal Duration Learning outcomes:

36 hours

Upon completion of this module the students/trainees should be able to: LO 1. recognize network fundamentals and the benefits and risks of network computing ; LO 2. determine the relationship between computer networks, other communications networks (like the telephone network) and the Internet; LO 3. use web browsing application software in accessing information on the Internet ; LO 4. search the Internet for information using search engine; LO 5. identify how e-mail works and related netiquette; LO 6. identify how computers and Internet are used in different areas; LO 7. identify and compare the risks of using computer hardware and software; and LO8. determine the legal, ethical, and responsible uses of both the computers and Internet safety.

LO1.

RECOGNIZE NETWORK FUNDAMENTALS AND THE BENEFITS AND RISKS OF THE NETWORK COMPUTING

ASSESSMENT CRITERIA: 1. Terminologies relating to telecommunications, networks and the Internet are identified. 2. Logical or physical network topologies, diagrams, schematics or descriptions are recognized. 3. Networks characteristics are specified according to speed, length, topology, and cable type. 4. Benefits of networked computing are identified. 5. Advantages and disadvantages of networked computing are recognized. 1. Fundamental principles of security on a network are identified and implemented. CONTENTS: LO2. Understanding Networking Fundamentals Categorizing Different Kinds of Network Exploring the Benefits and Risks of Networked Computing Securing Computer Data

DETERMINE THE RELATIONSHIP BETWEEN COMPUTER NETWORKS, OTHER COMMUNICATIONS NETWORKS (LIKE THE TELEPHONE NETWORK) AND THE INTERNET

ASSESSMENT CRITERIA: 1. Different ways in using the telephone system to transmit information are discussed. 2. Telecommunication devices such as modems convert information from analog to digital and digital to analog formats are identified. 3. Units use to measure data transmissions rates is explained. 4. Internet as a super network of smaller computer networks is determined. 5. Hardware and software application required to connect the Internet are specified. CONTENTS: Looking at Telephone Networks Identifying Modems Measuring Data Transmission

LO3.

Connecting to the Internet Recognizing Intranets and Extranets Understanding Hardware and Internet Software

USE WEB BROWSING APPLICATION SOFTWARE IN ACCESSING INFORMATION ON THE INTERNET

ASSESSMENT CRITERIA: 1. Web browsing application is determined and used in accessing information. 2. Different elements, purpose and extensions of web sites are identified and used. 3. Difference between secure and unsecure web sites such as passwordprotected sites or sites secure for online transactions are verified. 4. Different ways of communication and correspondence via Internet are compared and contrasted. 5. Components of a Web address/Uniform Resource Locator (URL) are categorized and analyzed. 6. The Web is navigated using a browser. 7. Web page is reloaded and refreshed. 8. History of recently visited Web sites is shown and deleted. 9. Specific information on a Web site is accessed. 10. Bookmark sites/Favorite sites are managed. 11. Content of a Web site is copied and saved using another application. 12. Web page is printed as a whole or by specified region. 13. File from a Web site is downloaded to a specified location. 14. Settings of a Web browser application are modified. 15. Problems associated with using a Web browser are identified and solved. CONTENTS: Accessing the Internet Looking at Web Browsers Examining Web Site Types and Web Addresses Bookmarking Web Site Retrieving Data from a Particular Web Site Saving Web Pages to a Computer Modifying Web Browser Application

LO4.

SEARCH THE INTERNET FOR INFORMATION USING SEARCH ENGINE

ASSESSMENT CRITERIA: 1. Search engine is classified and used to access information based on specific tags. 2. Other ways of searching for information on the Web are identified and utilized. 3. Quality of information found on the Internet is categorized and evaluated. CONTENTS: Understanding Search Engines and Searching Strategies Searching Information Using Keywords and Boolean Techniques Identifying Different Types of Information Sources on the Internet Qualifying the Information LO5. IDENTIFY HOW E-MAIL WORKS AND RELATED NETIQUETTE

ASSESSMENT CRITERIA: 1. 2. 1. 2. 3. Ways to supplement a mail message with additional information are applied. Mail addresses are used. Mail attachments are managed. Frequently used mail-configuration options are performed. Advantages and disadvantages of electronic mail are discussed and compared. 4. Common problems associated with electronic mail are recognized, evaluated and solved. 5. Elements of professional and effective e-mail messages are utilized. 6. Other forms of correspondence more appropriate than e-mail are compared and contrasted. 7. Information from original e-mail message in a response as a method of tracking the "history" of e-mail communication are viewed and identified. 8. Appropriate e-mail attachments and other supplementary information are utilized. 9. Issues regarding unsolicited e-mail ("spam") are minimized and controlled. 10. Guidelines for safe and effective use of electronic mail are considered and followed. CONTENT: Understanding E-mail and How It Works Creating New Messages and Examining Message Windows Addressing, Composing and Sending E-mails

LO6.

Modifying the Address Book Adding and Deleting E-mail Attachments Exploring Formal and Informal Elements o E-mails Sending the Message Changing Message Formats Spamming Recognizing Potential Problems With E-mail

IDENTIFY HOW COMPUTERS AND INTERNET ARE USED IN DIFFERENT AREAS

ASSESSMENT CRITERIA: 1. The uses of computers and Internet are explained in collecting, organizing, and evaluating information to promote learning. 2. The benefits of electronic commerce (e-commerce) on individual, business, and government is discussed and compared to those who/which are non ecommerce users. 3. Technologies that support and/or provide opportunities to the disabled and disadvantaged are identified and used. CONTENT: LO7. Keeping Up With Technology Understanding E-Commerce Configuring Computer System for the Disabled

IDENTIFY AND COMPARE THE RISKS OF USING COMPUTER HARDWARE AND SOFTWARE

ASSESSMENT CRITERIA: 1. Safe working environment that comply with the legal health and safety rules are demonstrated and maintained. 2. Injuries resulting from the use of computers for long period of are identified, minimized and/or prevented. 3. Risks in using personal and organizational computer data are identified, minimized and solved. 4. Software threats, including viruses and worms are scanned and cleaned.

CONTENTS: LO8. Accessing the Internet in a Legal and Safe Manner Computing Risks Understanding Identity Theft Checking and Examining Security Levels

DETERMINE THE LEGAL, ETHICAL, AND RESPONSIBLE USES OF BOTH THE COMPUTERS AND INTERNET SAFETY

ASSESSMENT CRITERIA: 1. Different reasons for restricting access to files, storage, devices, computers, networks, and certain Internet sites are discussed. 2. Concepts related to intellectual property laws including copyrights, trademarks and plagiarism are explained and utilized. 3. Principles regarding the rules and guidelines of storing data in terms of property and ownership are explained and followed. 4. Dangers of using electronic commerce like giving credit card information only on secured sites are identified and prevented. 5. Privacy and personal security online, including web site tracking of online activities using cookies and other behind-the scenes systems are identified and applied. 6. Information about rules regarding the use of computers and the Internet, including laws, policies at school, and company guidelines at places of employment are accessed and done. 7. Information about changes and advancements in technology are upgraded. 8. Computer and Internet use are responsibly applied.

CONTENTS: Understanding Copyright Law and Removable Media Checking Product ID Examining The Content Advisor Controlling Cookies Disabling Personal Information Protecting Data and Privacy Updating and Upgrading Computers

You might also like