Module 1emtech
Module 1emtech
ICT has greatly contributed to how easy our lives has been today. Our gadgets have become part of our necessity
that we check on them after we wake up. It made communication easier. We can use cellular phones that are designed for
communicating with other people even they are miles away from us. It has also assisted us in our work since there are
Internet-based jobs. It has revolutionized our education and in the modernization of our economy.
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of
paper or in your notebook.
1. What type of web provides a framework that allows data to be shared and reused to deliver web content
specifically targeting the user?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Website
2. Which of the following is an example of sites under web 2.0?
A. Facebook B. YouTube C. Wikipedia D. All of the above
3. What type of web page is classified as flat or stationary?
A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0
4. Twitter statuses are only composed of a few characters. What type of social media site does Twitter belong to?
A. Micro blogging B. Media Sharing C. Social Networks D. Bookmarking Sites
For #’s 5-6, use the choices inside the box.
A. If only the FIRST statement is TRUE. C. If BOTH statements are TRUE.
B. If only the SECOND statement is TRUE. D. If BOTH statements are FALSE.
5. Social networks are sites that allow you to connect with other people having the same interests. It allows you to
share your own news and other news from other sources.
6. The Philippines is considered as the ―ICT Hub in Asia. The ICT Industry shares 19.3% of the total employment
population in the Philippines coming from the government agencies.
7. Marisa wants to publish her collections of original poems online. Which online platform must she do this?
A. Social News B. Bookmarking Site C. YouTube D. Blogs
8. Watson is creating a cover video of his favorite song. Which online platform must he publish this?
A. Social News B. Bookmarking Site C. YouTube D. Blogs
9. Cathy has created a very good slideshow presentation on a certain topic, and she wants to share it to other teachers
around the world. Which online platform must she publish this?
A. Presentation Platforms C. File Management Platforms
B. Cloud Computing Platforms D. Social Media Platforms
10. What is the name of the symbol that is used to classify and categorize information?
A. Hashtag B. Question Mark C. Asterisk D. At sign
ACTIVITY:
Read the headlines found below and try to reflect on the questions that follow. (ABS-CBN News Topic Page on Identity-theft.
Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.)
Reflect on the following questions:
What is common among the headlines above?
Are your social media accounts secured enough that you may not be a victim of these things?
What type of information do you share in your social media accounts?
There's almost no limit to what you can do online. The Internet makes it possible to access information quickly,
communicate around the world, and much more. Unfortunately, the Internet is also home to certain risks, such as
malware, spam, and phishing. If you want to stay safe online, you'll need to understand these risks and learn how to avoid
them.
There are numerous delinquencies that can be committed on the internet such as stalking, identity theft, privacy
violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable business having a
secure service. To make sure that you are in a secured network, the website address should begin with “https://’ as
opposed to ―http://. Never access your accounts by following an email link, instead type your URL by yourself.
Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly online.
Below are the 10 rules of netiquette:
The following are the top kinds of online threats that you should be aware of:
Phishing happens when an email is sent from an internet criminal disguised as an email from a legitimate,
trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
Pharming happens when a hacker (or ―pharmer) directs an internet user to a fake website instead of a legitimate
one. These ―spoofed‖ sites can capture a victim’s confidential information, including usernames, passwords, and
credit card data, or install malware on their computer. Pharmers usually focus on websites in the financial sector,
including banks, online payment platforms, or other e-commerce destinations.
Internet Scam generally refers to someone using internet services or software to defraud or take advantage of
victims, typically for financial gain. Cybercriminals may contact potential victims through personal or work
email accounts, social networking sites, dating apps, or other methods in attempts to obtain financial or other
valuable personal information. Online scams may come in various forms such as lottery scams, charity fraud
scams, job offer scams, and online dating scams to name a few.
Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is programmed
to do certain tasks. Bots are automated, which means they run according to their instructions without a human
user. Some bots are useful, such as search engine bots that index content for searches or customer service bots that
help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact
information for sending spam, or perform other malicious activities. If it's connected to the Internet, a bot will
have an associated IP address.
Malware or malicious software is any program or file that is harmful to a computer user. Here are the most
common offenders in the rogues’ gallery of malware:
o Adware (advertising supported software) is unwanted software designed to throw advertisements up on
your screen. Example, pop-up ads and banner ads.
o Spyware is malware that secretly observes the computer user’s activities without permission and reports it
to the software’s author. Example is a keylogger.
o Virus and Worms are malware that attach to another program and, when executed—unintentionally by the
user—replicates itself by modifying other computer programs and infecting them with its own bits of
code.
o Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as
something useful in order to trick you.
Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected
computer. From there, Trojans can be used to steal financial information or install threats like viruses and
ransomware.
o Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then
forces you to pay a ransom to get them back.
Spam is unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for
the message to be sent. Spam messages can be damaging if you open or respond to it.
Cyberstalking refers to the use of the internet or other electronic devices to harass or stalk individuals or
organizations.
Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using the internet.
Spoofing happens when someone or something pretends to be something else to gain our confidence, get access to
our systems, steal data, steal money, or spread malware.
From all you have learned in Lesson 2, why is there a need to ―think before you click?”
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet
of paper.
1. What type of malicious program is designed to replicate itself and transfer from one computer to another either
through the internet or local networks or data storage like flash drives and CDs?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
4. What is ransomware based on?
A. Fear of hackers C. Fear of spyware
B. Fear of the Internet D. Fear of losing important files
5. Which of the following is an example of a ―phishing‖ attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone
reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their
login information.
C. Sending someone a text message looks like a notification that the person has won a contest. D. Sending
someone an email that records their keystroke activities while using their computers.
6. Which of the following must NOT be done if you received an embarrassing picture from your friend?
A. Tell your parents or teachers.
B. Send the picture to other friends.
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
7. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letters.
D. A post or email message that expresses a strong opinion or criticism.
8. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
10. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn’t mean to hurt someone's feelings, then it's okay.
D. You are judged by your based on your photos posted.
ASSIGNMENT: WHAT’S IN MY NAME?
Direction: Write all your answers in your activity notebook.
1. Using the Internet, try to search for your complete name.
2. Write down how many sites have featured your personal name and what is written about you.
3. Answer the following:
a. What other information are written about you?
b. Are the search results coming from reliable sources? Why?
c. Should these bits of information need to be posted or shown in public?
One to two students will share their assignment in front of the class.
LESSON 3: EFFECTIVE INTERNET RESEARCH
The Internet has made our lives easier, especially in terms of doing research. By browsing the internet, we can
access limitless topics. Web-based catalogs are available in many libraries to assist researchers in locating printed books,
journals, government documents and other materials. The biggest obstacle facing all researchers on the internet is how to
access the vast amount of information available effectively and efficiently (The Internet: Research Tools, 2013).
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types of names and addresses
that refer to objects on the world wide web. Knowing the URL endings will give you clues to who is sponsoring the
website and help evaluate the sources.
Popular Domains
Website evaluation is an important skill that everyone should practice and master through time. It is always
important to learn which information are relevant and reliable to be able to avoid misinformation and be a victim of fake
news.
ASSESSMENT
Direction: Read each item carefully and choose the letter of the correct answer.
1. What happens when a phrase or sentence is placed inside quotation marks when doing research?
A. Will only return items that have both terms.
B. Will search for words that are together and in order.
C. Will return items that exclude a term.
D. Will return items that have either of the terms.
2. What is a URL?
A. A computer software program
B. An acronym for Unlimited Resources for Learning
C. The address of a document or "page" on the World Wide Web
D. A search engine
3. What are the three main search expressions, or operators, recognized by Boolean logic?
A. and, or not B. from, to, whom C. and, or, but D. search, keyword, text
4. How do you evaluate a web page?
A. You confirm that the author or site an authority on the subject.
B. You check to see if the author has been objective.
C. You check to see if the information is current.
D. You do as many of the above as possible.
5. An article that only presents one point of view or omits facts is biased.
A. True B. False
GRADED ACTIVITIES
WRITTEN WORKS 1 REFLECTION PAPER