Em Tech Module 2 1
Em Tech Module 2 1
Department of Education
REGION 1V-A CALABARZON
SCHOOLS DIVISION OF BATANGAS PROVINCE
MALVAR SENIOR HIGH SCHOOL
POBLACION, MALVAR, BATANGAS
Empowerment
Technologies
Quarter 1 – Module 2:
Internet as a Tool for Credible Research and
Information and Common Productivity Tools
What I Need to This will give you an idea of the skills or competencies you are
Know expected to learn in the module.
This part includes an activity that aims to check what you already
What I Know know about the lesson to take. If you get all the answers correct
(100%), you may decide to skip this module.
This is a brief drill or review to help you link the current lesson
What’s In with the previous one.
This icon signals the presentation of the new lesson. It tells you to
What’s New carefully study the concepts, principles, or processes discussed in
the text. This part serves as the discussion and composes the body
of the lesson.
This icon signals the activities that you need to do to check on how
What is It well you understood the topic presented. It involves varieties of
exercises to test your comprehension of the discussed topic as well
as your analysis on certain concepts and ideas.
This comprises activities for independent practice to solidify your
What’s More understanding and skills of the topic.
This includes questions or blank sentence/paragraph to be filled in
What I Have Learned to process what you learned from the lesson.
This section provides an activity which will help you transfer your
What I Can Do new knowledge or skill into real life situations or concerns.
This is a task which aims to evaluate your level of mastery in
Assessment achieving the learning competency.
Additional In this portion, another activity will be given to you to enrich your
Activities knowledge or skill of the lesson learned. This also tends retention
of learned concepts.
This contains answers to all activities in the module.
Answer Key
NOTE: please do not write ANYTHING on this MODULE, write your answers on your notebook.
What I Need to Know
This module was designed and written with you in mind. It is here to help you master the
Empowerment Technologies. The scope of this module permits it to be used in many different
learning situations. The language used recognizes the diverse vocabulary level of students. The
lessons are arranged to follow the standard sequence of the course. But the order in which you read
them can be changed to correspond with the textbook you are now using.
The module covers:
Internet as A Tool for Credible Research and Information; and Common
Productivity Tools
After going through this module, you are expected to:
1. determine and avoid the dangers of the internet; and
2. be responsible in the use of social networking sites.
3. format pictures, clip art, shapes, SmartArt, charts and screen clippings.
4. discuss the concept of Mail Merge;
5. apply advanced formulas in Excel workbook.
6. animate text or objects in a presentation; and
7. apply timing in a presentation.
What I Know
Activity: e-Know
Directions: Write the word/group of words being described below on a separate sheet.
__________ 1. This is a scam where Scammers attempt to acquire sensitive information by
impersonating as a trustworthy entity.
__________ 2. It is a malicious software used to disrupt computer operations, gather sensitive
information, or gain access to private computer systems.
__________ 3. It is a software that has the capability to record every keystroke you make to a log
file.
__________ 4. It is a program that, when executed, replicates by inserting copies of itself into other
computer programs, data files, or the boot sector of the hard drive.
__________ 5. It is the use of the Internet or other electronic means to stalk or harass an individual, a
group, or an organization.
__________ 6. It is the act of tormenting, threatening, harassing, or embarrassing another young
person using the internet or other technologies, like cellphones.
__________ 7. It focuses on the acceptable use of online resources in an online social environment.
__________ 8. It is a set of rules and norms for acceptable conduct or behavior online.
__________ 9. It is a type of scam that misleads the user in many ways attempting to take lead of
them.
__________ 10. It refers to the practices and precautions that should be observed when using the
Internet to ensure that the users as well as their computers and personal information
are safe from crimes associated with using the internet.
What’s In
e-Guess Mo Yan!!!
Directions: Guess the Scrambled Letters on a separate sheet of paper.
AHERSC EEINGN NLINEO HERASC
SYROKEWD DNA SLMYBOS EIDYLRIBCIT
REILBAEL
What’s New
SEARCH ENGINE
A search engine is a software system designed to search the Internet
for documents related to the keyword or search word used or entered
into the system. Users are able to maximize the potential of search
engines by learning the proper searching protocols. ii
ONLINE RESEARCH
In the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There
are also provisions for “fair use”. Fair use is the act of copying of copyrighted materials
done for purposes such as commenting, criticizing, or parodying a copyrighted work
without the permission from the copyright owner. It is used as a defense under
copyright infringement.
Here are some things that you need to know to improve your online search and research skills.
This will guide you to obtain the most relevant information that you need.
Have a question in mind- Focus on a question you want answered.
Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine
the most appropriate result for you.
Advanced Search- The best way to filter information you get from search engines is by using
the advanced search.
To improve your search and research skill using a search engine, you may use the following
symbols in typing in the search box.
Symbol Function
Finds web pages that contain all the terms that are preceded by the + symbol;
+
allows you to include terms that are usually ignored
“ ” Finds the exact words in a phrase
() Finds or excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases
NOT or - Excludes web pages that contain a term or phrase
OR or | Finds web pages that contain either of the terms or phrases
Look for a credible source- Some wikis, filled with updated information, are not a credible
source. When using wikis, check out the link of the cited texts.
To help you evaluate the website’s credibility, here are the questions that you need to answer:
What is the domain type of the website? Preferred domain types include .edu, .org,
.gov, and .net
Who wrote the article? Check if the author’s credentials or affiliations are listed so you
can tell whether or not the author is qualified to write the topic. Check also the publisher
of the article if it is a reliable publisher. Make sure that the author provides e-mail or a
contact address/phone number.
When was the document published and updated? The document should be regularly
updated. As to the freshness of the date, it depends on the information needed. The links
should also be up-to-date. There should be no dead links.
What is the purpose of the document and why was it produced? It is also important to
check the document’s purpose and why it was produced. The document should provide
accurate information and must be objective in presenting it. The author should at least
claim accountability and responsibility for the information contained in the web page.
Give credit- Give credit to the original author of the page or information by properly citing
the author/s and other sources.
What is It
Directions: Answer the following in your own words on a separate sheet of paper.
1. What is a search engine? Give examples.
_________________________________________________________________________________
_________________________________________________________________________________
2. Why is it important to evaluate the credibility of a website?
_________________________________________________________________________________
_________________________________________________________________________________
What’s More
Directions: Write an essay answering the given question on a separate sheet of paper.
When do you say that an information contained in a web page is credible or not?
Directions: On a short bond paper, create a poster with the theme: “Think before you click”. Please
refer to the following rubric for evaluation.
SOURCE: https://www.emich.edu/it/security/initiatives/cybersac/click.php
Reflection
Directions: In your notebook, journal or portfolio, write your personal insights about
the lesson by completing the following statements.
What I Know
Activity: e-Know
These are features in Microsoft Word, Microsoft Excel and
Microsoft PowerPoint. Can you name these features?
Ctrl + M – Tab
Ctrl + N – Create a new document
Ctrl + A – Select All Ctrl + O – Open a document
Ctrl + B – Bold Text Ctrl + P – Display Print dialog box
Ctrl + C – Copy Text Ctrl + R – Align Text to Right
Ctrl + D – Show Font Dialog Box Ctrl + S – Save a document
Ctrl + E – Align Text to Center Ctrl + U – Underline Text
Ctrl + F – Display Find Dialog Box Ctrl + V – Paste a copied text
Ctrl + G – Display Go To Dialog Box Ctrl + X – Cut a selected Text
Ctrl + H – Display Replace Dialog Box Ctrl + Y – Redo the last undone
Ctrl + I – Italicize Text action
Ctrl + Z – Undo the last action
Ctrl + J – Justify Text
Ctrl + K – Create a hyperlink
Ctrl + L – Align Text to Left
Hi! I am Sir Jomel.
I can help you with
Mail Merging in
Microsoft Word.
We have
six
STEPS…
Hi! I am Teacher Golda.
I can help you with
Microsoft Excel.
EXAMPLES OF SPREADSHEET
SOFTWARE:
LibreOffice Calc
OpenOffice.org Calc
Google Sheets
Apple iWork Numbers
Kingsoft Office Spreadsheets
StarOffice Calc
Microsoft Excel
Teacher Ronald
here…
ADVANTAGES DISADVANTAGES
1. 1.
2. 2.
3. 3.
2. Now, write 3 things to sum up the importance of the lesson to your ICT
skills.
Write an essay in a separate sheet not exceeding 200 words explaining the importance of
common productivity tools such as word processing, spreadsheet and presentation softwares in line
with your respective chosen strands. To evaluate your output, the following rubrics will be used.
EVALUATION
5 (Exceeds 4 (Meets 3 (Needs
The essay… Expectations) Expectations) Improvement)
Cites the importance of productivity tools
(on your strand)
Is original
Is neat and clean
Reflection
Directions: In your notebook, journal or portfolio, write your personal insights
about the lesson by completing the following statements.
Assessment
This serves as your summative test. Use a clean sheet of paper in answering the following. Answer
the questions below following the instructions given in each set of test.
Test I - Matching Type. Directions: Match the items in Column A with those in Column B. Write
the letter of the correct answer on your paper.
A B
1. virus a) designed to send you advertisements
2. rogue b) sends an official-looking email and is designed to steal
provision that allows you to use copyrighted work sensitive
personal information
3. keylogger c) without consent with certain limitations
4. adware d) a browser feature that is synonymous to "private" browsing
5. spam e) replicates and can transfer from one computer to another
6. phishing f) exploits the DNS system
7. fair use g) states that anyone who uses your work without your consent is
punishable by law
8. spyware h) runs in the background and monitors what you are doing
9. private i) unwanted email mostly from bots
10. malware j) disguised as a useful program but is not
11. incognito k) the information superhighway
12. internet l) tricks the user into posing that it is a security software
13. trojan m) a malicious software
14. copyright n) an option to hide a post so that search engines could not scan it
15. pharming o) used to record the keystrokes done by the user
Test II - Multiple Choice. Directions: Write the letter of the correct answer on your paper.
1. What is the element of a formula that tells what operation to be performed?
a. Equal sign b. Cell reference c. Operator d. Mathematical equations
3. A function used to count the number of cells that contains something in them if the criteria are met
a. COUNT b. COUNTNOW c. COUNTING d. COUNTIF
4. What feature of Microsoft Word allows you to efficiently create documents that have the same
general content but may have different recipients or purpose?
a. mail merge b. print merge c. send message d. view merge
5. Which of the following types of document is NOT created using mail merge?
a. envelopes b. letters c. posters d. labels
7. What essential component of mail merge is required from users when generating labels?
a. data file b. form document c. place holder d. merge field
8. Among the text wrap options, which one allows you to place an image or external material in line
with the text, treating the image just like how a text is treated?
a. in line with text b. square c. through d. tight
Test III - True or False. Write True if the sentence is correct, otherwise, write False.
1. One should use as many slides as possible so that the audience can clearly understand the
Smart Art used.
2. Bullets should be used to simplify one’s message.
3. PowerPoint Presentation is a form of visual aid.
4. To insert a hyperlink, go to the Home tab then click the Hyperlink options.
5. Use dark fonts on dark backgrounds to gain proper contrast.
6. To embed an object, go to the Insert tab and under the text group, click object.
7. There are two options when inserting an object, create new from file and create new from
existing file.
References
For educational purposes only; All rights reserved for rightful owners.
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0
http://microscopy.berkeley.edu/courses/dib/sections/WP/WP_Graphics.html
Empowerment Technologies Textbook by Ivy M. Tarun - Isabela State University, Cabagan, Philippines · College of
Computing Studies Information and Communication Technology
-
based+search+engine&client=opera&hs=Mrp&sxsrf=ALeKk02WxOqtz5AAtP5QHT7G5XRewGx8vQ:1591661239
058&source=lnms&tbm=isch&sa=X&ved=2ahUKEwi_zoaWuPPpAhW8yIsBHRuTBcgQ_AUoAXoECBAQAw&b
iw=1326&bih=627#imgrc=vw4cGx2TbIfTAM
Lesson Discussion, Empowerment Technologies for Senior High School Copyright 2016 and Distributed by Rex Book
Store, Inc. RSBI, By Innovative Trainings Works, Inc.
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0; Published,
Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Reygie Fabro-College Instructor at Divine Word College of Laoag; Published on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Patronage of Mary Development School (PMDS), Published on May 6, 2020;
https://www.slideshare.net/arias201625/empowerment-technologies-lesson-2?qid=45c533b4-a83e-4e70-ae13-
92c5b3b8b650&v=&b=&from_search=3
i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta
Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.