You are on page 1of 28

1

Empowerment Technologies N.Bobis, L.Castro,


A.Facelo, A. Palomar
What Is This Worksheet About?

Welcome to Empowerment Technologies Subject!


Course Description:
Information and Communications Technology as a tool for curating, contextualizing,
collaborating, and creating content and experiences for learning in the professional tracks.

To get the most from this Worksheet, do the following.


1. Read the Learning Outcome/s. These tell you what you should know and be able to do at
the end of each lesson.
2. Read the lesson content carefully it contains important notes or basic information that
you need to know.
3. Accomplish the required Learning Activities.
4. Demonstrate what you learned by doing what the Activity directs you to do.
5. You must be able to apply what you have learned in another activity or in real life
situation.
6. Accomplish the Scoring Rubrics for you to know how well you performed.

Your success in this worksheet on Empowerment Technologies is shown in your ability


to answer/ perform all activities in each Lesson.
This worksheet is strictly for officially enrolled students of Iloilo NHS Senior High
School only. Please read carefully the Pledge of Commitment, fill in the blank, and sign after
you have agreed to the terms stated.

PLEDGE OF COMMITMENT:
I commit fully to the accomplishment of the worksheet with all honesty and dedication.
I promise to spend ________________________________________________(no. of
hours/specific day(s) of the week) learning about Empowerment Technologies.
Further, I promise that no part of this worksheet will be posted publicly, and I will not
allow anybody to have it photocopied without a written permit of my teacher.

________________________________________
STUDENT’S SIGNATURE OVER PRINTED NAME /DATE

Writers
NEIL C. BOBIS ALEX JR. E. FACELO
LOVELYN F. CASTRO ARNIL C. PALOMAR

Reviewers
JO-ANN R. PET LEO C. ABE ABE

Grammarian Proofreader In-Charge, TVL LR


MAE SHANE G. LAMANERO LEO C. ABE ABE ELIJAH V. ESTANTE

Empowerment Technologies N.Bobis, L.Castro,


A.Facelo, A. Palomar
Semester: FIRST Code: CS_ICT11/12-ICTPT-Ia-b-1
Quarter: FIRST Week Number: 1 Day: 1 No. of Hours: 2

At the end of this Lesson, you are expected to:


 compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.

Lesson 1: Introduction in ICT


The study of information and communications technology (ICT) is increasingly
important. Technological skills are becoming mandatory in the workplace and are a prerequisite
for employment. Students today require the ability to reason and communicate, to solve
problems, and to understand and use ICT for a variety of purposes. Students also need
opportunities to develop the skills required for e-learning so they are better prepared to pursue
future learning opportunities.
ICT deals with the use of different communication technologies such as mobile phones,
telephone, Internet to locate, save, send and edit information. It is a study of computers as data
processing tools. It introduces students to the fundamental of using computer systems in an
internet environment

ICT in the Philippines

Philippines is dub as the ‘‘ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers. At the end of 2018,
51.2 percent of individuals, or 3.9 billion people, were using the Internet. This represents an
important step towards a more inclusive global information society. In developed countries, four
out of five people are online, reaching saturation levels. In developing countries, though, there is
still ample of room for growth, with 45 per cent of individuals using the Internet. In the world’s
47 least-developed countries (LDCs), Internet uptake remains relatively low and four out of five
individuals (80 per cent) are not yet using the Internet.
In addition, most people can access the Internet through a 3G or higher-quality network.
This evolution of the mobile network, however, is going faster than the growth in the percentage
of the population using the Internet.

Internet
Internet sometimes called “the Net’’, is the global system of interconnected computer
networks that use the internet protocol suite (TCIP/IP) to link billions of devices worldwide. It is
also a worldwide system of computer networks- a network of networks in which the users at any
one computer can get information from any other computer.

Transmission Control Protocol/Internet Protocol (TCIP/IP) refers to a family of


network protocols which are the basis for communication and data exchange over the internet as
well as on private IP networks.

World Wide Web is an information system on the internet invented by Tim-Berners


Lee that allows documents to be connected to other documents by hypertext links, enabling the
user to search for information by moving from one document to another.

Page 1
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Web page is a hypertext document connected to the World Wide Web. It is a
document that is suitable for the World Wide Web while website is a location connected to the
internet that maintains one or more pages on the World Wide Web.

Types of Website

Static website is the basic type of website that is easy to create. You don’t need the
knowledge of web programming and database design to create a static website. Its web pages are
coded in.
 HTML (Hypertext Markup Language). HTML is the standard markup language for
creating web pages. The codes are fixed for each page so the information contained
in the page does not change and its looks like a printed page.
Dynamic website is a collection of dynamic web pages whose content changes
dynamically. It accesses content from a database or Content Management System (CMS).
Therefore, when you alter or update the content of the database, the content of the website is also
altered or updated.

The different online platforms of World Wide Web:

1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of
the Web pages connected by hyperlinks. According to Berners Lee, Web 1.0 could be
considered as “read only web”. In other words, the early web allowed us to search for
information and read it. There was little in the way of user interaction or content
contribution.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a
website differently than others. It allows users to interact with the page; instead of just
reading the page, the user may be able to comment or create user account. According to
Berners Lee, it is considered as “read and write web”.
Web 2.0 also allows users to use web browsers instead of just using their operating system.
Browsers can now be used for their user interface, application software (or web applications),
and even for file storage.
3. Web 3.0 – this platform is all about semantic web. It aims to have machines (or servers)
understand the user’s preferences to be able to deliver web content. According to Berners Lee,
it is considered as “read, write and execute web”.
The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The
W3C standard encourages web developers to include semantic content in their web pages.

Features of WEB 2.0


1. Folksonomy- allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as
hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input.
3. User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews and
evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you
spent in the internet.

Page 2
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
5. Software as a service- users will subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread
sheet.
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.

Several problems of Web 3.0


1. Compatibility - HTML files and current web browsers could not support Web 3.0.
2. Security - The user’s security is also in question since the machine is saving his or her
preferences.
3. Vastness - The World Wide Web already contains billions of web pages.
4. Vagueness - Certain words are imprecise. The words “old” and “small” would depend on the
user.
5. Logic - Since machines use logic, there are certain limitations for a computer to be able to
predict what the user is referring to at a given time.

Trends in ICT
 Convergence– is the synergy of technological advancements to work on a similar goal or task.
For example, besides using your personal computer to create word documents, you can
now use your smartphone.
 Social Media– is a website, application, or online channel that enables web users web users
to create, co-create, discuss modify, and exchange user generated content.

Six Types of Social Media

a) Social Networks – These are sites that allows you to connect with other people with the same
interests or background. Once the user creates his/her account, he/she can set up a
profile, add people, share content, etc.
Example: Facebook and Google+
b) Bookmarking Sites –. Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
Example: Stumble Upon, Pinterest
c) Social News – Sites that allow users to post their own news items or links to other news
sources. The users can also comment on the post and comments may also be rank.
Example: Reddit and Digg
d) Media Sharing – sites that allow you to upload and share media content like images,
music and video.
Example: Flickr, YouTube and Instagram
e) Microblogging – focus on short updates from the user. Those that subscribed to the user
will be able to receive these updates.
Example: Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other users are able to comment on
the said topic.
Example: Blogger, WordPress and Tumblr

Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is
largely because of the devices capability to do the tasks that were originally found in PCs.
Several of these devices are capable of using a high-speed internet. Today the latest model
devices use 4G Networking (LTE), which is currently the fastest.

Page 3
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Mobile OS

a) iOS – use in apple devices such as iPhone and iPad


b) Android – an open source OS developed by Google. Being open source means mobile
phone companies use this OS for free
c) Blackberry OS – use in blackberry devices
d) Windows phone OS – A closed source and proprietary operating system developed by
Microsoft.
e) Symbian – the original smartphone OS. Used by Nokia devices.
f) WebOS- originally used in smartphone; now in smart TVs.
g) Windows Mobile – developed by Microsoft for smartphones and pocket PCs

Assistive Media
A non- profit service designed to help people who have visual and reading impairments.
A database of audio recordings is used to read to the user.

Cloud Computing
A distributed computing on internet or delivery of computing service over the internet.
Instead of running an e-mail program on your computer, you log in to a Web e-mail account
remotely. The software and storage for your account doesn’t exist on your computer – it’s on the
service’s computer cloud.
Example: Yahoo!, Gmail, Hotmail

Three Components of Cloud Computing

1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – often servers are in geographically different places, but server
acts as if they are working next to each other.
3. Data centers - It is a collection of servers where application is placed and is accessed via
Internet.
Types of Clouds

 Public Cloud - allows systems and services to be easily accessible to the general public.
Public cloud may be less secured because of its openness, e.g. e-mail
 Private Cloud - allows systems and services to be accessible within an organization. It
offers increased security because of its private nature.
 Community Cloud - allows systems and services to be accessible by group of
organizations.
 Hybrid Cloud - is a mixture of public and private cloud. However, the critical activities
are performed using private cloud while the non-critical activities are performed
using public cloud.

Page 4
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score:_______
Activity Number: 1.1-A
Directions: Identify the various media platforms, and sites. Write your answers on the
space provided before each number.

_________________1. It deals with the use of different communication technologies such as


mobile phones, telephone, Internet to locate, save, send and edit
information.
_________________2. Known as a flat page or stationary age in the sense that the page is
“as is’’ and cannot be manipulated by the user. The content is also the
same for all users that is referred to as Web 1.0.
_________________3. Diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.
_________________4. A website, application, or online channel that enables web users web
users to create, co-create, discuss modify, and exchange user generated
content.
_________________5. Allows users to interact with the page; instead of just reading the page,
the user may be able to comment or create user account.
_________________6. An information space where documents and other web resources are
identified by URLs, interlinked by hypertext links, and can be accessed via
the Internet.
_________________7. Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
_________________8. Services that are offered on demand rather than on a one-time purchase.
_________________9. Focus on short updates from the user. Those that subscribed to the user
will be able to receive these updates.
_________________10. A database of audio recordings is used to read
_________________11. It is collection of servers where application is placed and is accessed
via Internet.
_________________12. Allows systems and services to be accessible by group of
organizations.
_________________13. It is developed by Microsoft for smartphones and pocket PCs.
_________________14. An open source OS developed by Google. Being open source means
mobile phone companies use this OS for free.
_________________15. Facebook is an example site that allows you to connect with other
people with the same interests or background.

Page 5
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Activity Number: 1.1-B
Directions: Compare and contrast media platforms by analyzing their differences and
similarities.

Media Platforms Similarities Differences

Convergent
Technologies

Social Media

Mobile Media

Assistive Media

Congratulations! You did a great job! Rest and relax a while


then move on to the next lesson. Good luck!

Page 6
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Semester: FIRST Code: CS_ICT11/12-ICTPT-Ia-b-2
Quarter: FIRST Week Number: 1 Day: 2 No. of Hours: 2

At the end of this Lesson, you are expected to:


apply online safety, security, ethics, and etiquette standards and practice in the
use of ICT as it would relate to their specific professional tracks.

Lesson 2: Internet Safety and Security


“I think computer viruses should count as life. I think it says something about human nature that
the only form of life we have created so far is purely destructive. We’ve created life in our own
image.”

- Stephen Hawking

Most of us are ‘connected’ via our laptops, mobile phones, tablets or personal computer.
The potential for the internet to be a valuable and a fun resource for entertainment, making
friends, keeping in touch and learning is huge. But if you use the internet, you could be at risk of
illegal activity or abuse - be it bullying, fraud or something more serious. Unlike seeing someone
face to face, on the net, people aren't always what they first seem. We need to stay safe while
using the internet, but we may not know just how to do that. In the past, Internet safety was
mostly about protecting your computer from viruses. But today, the internet’s vast reach,
constantly changing technologies, and growing social nature have made the users more
vulnerable to identity theft, scams, privacy violations and even harassment.
This lesson introduces you to the different internet threats you may encounter while
online. It will teach you some tips to stay safe online and encourage you to adopt a safer mindset
toward using the Internet.

Why is it Important to Stay Safe Online?


The internet is defining as the information superhighway but considered as the most
dangerous places. Today you can see various cybercrime and about the people cheated on the
internet. Even big companies, banking, government websites are hacked and information is
leaked very often. The use of the web in the online bill payment, shopping, payment services,
internet banking and mobile banking and now digital wallets look convincing for users. That’s
why the internet is a good source for hackers, thieves, and pickers too to collect any confidential
information from any country. The importance of Internet safety in between a variety of
information, personal data and property protection is really important. It is important for every
citizen of the country to use the internet safely and securely without leaking private information
and be aware of different internet threats.

Internet Threats
Cyberbullying is the use of information and communication technologies to support
deliberate, repeated and hostile behavior by an individual or group, which is intended to harm
(Bill Belsey, www.cyberbullying.org). Examples of cyberbullying include posting hurtful
images making online threats, and sending hurtful emails or texts.
Page 7
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Cyberstalking is the act of persistent and unwanted contact from someone online. It
may involve any number of incidents including threats, libel, defamation, sexual harassment, or
other actions in which to control, influence, or intimidate their target. (John Sammons, Michael
Cross, www.sciencedirect.com)
Identity theft is the crime of obtaining the personal or financial information of another
person for the sole purpose of assuming that person’s name or identity to make transactions or
purchases. (Julia Kagan,www.investopedia.com)
Internet fraud / scam is the use of internet services or software with Internet access to
defraud victims or to otherwise take advantage of them. Internet crime schemes steal millions of
dollars each year from victims and continue to plague the internet through various methods.
Several methods include the following:
 Phishing
The act of sending an email to a user falsely claiming to be an established legitimate
enterprise in an attempt to scam the user into surrendering private information that will be
used for identity theft. Phishing email will typically direct the user to visit a website where
they are asked to update personal information, such as a password, credit card, social security,
or bank account numbers, that the legitimate organization already has. The website, however,
is bogus and will capture and steal any information the user enters on the page.
Here's an example of popular phishing emails we've seen over the years.

Consider this fake Paypal security notice warning


potential marks of "unusual log in activity" on their
accounts:

FAKE! Notice that


almost identical in
appearance to an actual
notice from Microsoft
concerning "Unusual
sign-in activity":

 Pharming
A more complicated way of phishing where it exploits the DNS (Domain Name Service)
system. is a scamming practice in which malicious code is installed on a personal computer
or server, misdirecting users to fraudulent Web sites without their knowledge or consent.
Pharming has been called "phishing without a lure."
 Ransomware
A form of malware targeting both human and technical weaknesses in organizations and
individual networks in an effort to deny the availability of critical data and/or systems. It is

Page 8
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
frequently delivered through spear phishing emails to end users, resulting in the rapid
encryption of sensitive files on a corporate network. When the victim organization
determines they are no longer able to access their data, the cyber perpetrator demands the
payment of a ransom to regain access to their data.

Malware short for Malicious Software. Malware refers to software designed


specifically to damage or disrupt a system.

Types of
Description
Malware
Designed to replicate itself and transfer from one computer to another either
Virus
through the Internet and local networks or data storage like flash drives and CDs.
Worms spread from computer to computer, but unlike a virus, it has the capability
Worm
to travel without any human action.
Trojan It will appear to be useful software but will actually do damage once installed or
horse run on your computer.
The common name used to describe software that is given to the user with
Adware advertisements embedded in the application. Adware is considered a legitimate
alternative offered to consumers who do not wish to pay for software.
Spyware A program that runs in the background without you knowing it.
Financial Designed to scan a computer system for information related to financial
Malware transactions.

Online grooming is the term used to describe inappropriate behavior towards a young
person, putting them at risk to a sexual offence. Pedophiles have been known to use this method
to contact young people by disguising themselves as another young person. This can lead to
gaining the trust of an individual and their friends.
Sexting usually refers to sending and receiving rude messages or videos of naked
pictures, 'underwear shots', any sexual texts, images or videos. These images or videos can be
sent from a boyfriend or girlfriend or a friend or someone you've met online. You also may have
sent a sexual photo, video or text to someone else.

Spam is usually considered to be electronic junk mail or junk newsgroup postings. Some
people define spam even more generally as any unsolicited email. However, if a long-lost brother
finds your email address and sends you a message, this could hardly be called spam, even though
it is unsolicited. Real spam is generally email advertising for some product sent to a mailing list
or newsgroup.

Golden Rules to stay safe online.

 Don't give out personal information such as your address or phone number.
 Don’t send pictures of yourself to anyone, especially indecent pictures.
 Don't open emails or attachments from people you don't know.
 Don't become online ‘friends’ with people you don't know.
 Never arrange to meet someone in person who you've met online.
 If anything you see or read online worries you, tell someone about it.
 Be mindful of what you share online and what site you share it to.
 Do not accept terms and conditions; read it.

Page 9
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
 Check out the privacy policy page of a website to learn how the website handles the
information you share.
 Do not share your password with anyone.
 Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
 Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode”, a
feature of the browser, will not protect you from hackers.
 Do not talk to strangers whether online or face – to – face.
 Never post anything about a future vacation. It is similar to posting, “Rob my house at
this date.”
 Add friends you know in real life.
 Avoid visiting untrusted websites.
 Install and update an antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
 If you have a Wi-Fi at home, make it a private network by adding a password.
 Avoid downloading anything from untrusted websites. You are most vulnerable in peer -
to – peer downloads (torrents) as the download is most likely not monitored by the site
owner.
 Buy the software; do not use pirated ones.
 Do not reply or click links from suspicious emails.

Tips to Combat Viruses, Worms and Trojan Horses on Your Computer

1. Keep The Operating System Updated


The first step in protecting your computer from any malicious there is to ensure that your
operating system (OS) is up-to-date. This is essential if you are running a Microsoft
Windows OS. Secondly, you need to have anti-virus software installed on your system and
ensure you download updates frequently to ensure your software has the latest fixes for new
viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus
program has the capability to scan e-mail and files as they are downloaded from the Internet,
and you also need to run full disk scans periodically. This will help prevent malicious
programs from even reaching your computer.

2. Use a Firewall
You should also install a firewall. A firewall is a system that prevents unauthorized use and
access to your computer. A firewall can be either hardware or software. Hardware firewalls
provide a strong degree of protection from most forms of attack coming from the outside
world and can be purchased as a stand-alone product or in broadband routers. Unfortunately,
when battling viruses, worms and Trojans, a hardware firewall may be less effective than a
software firewall, as it could possibly ignore embedded worms in outgoing e-mails and see
this as regular network traffic.

Page 10
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Activity Number: 2.1
General Directions: Read the statements carefully in each test item and follow strictly the
direction given.
Test I: TRUE/ FALSE:
Directions: Write “A” if the statement is correct otherwise, write “B” on the space provided
before the number.
______ 1. What you post and upload to the internet is there forever, even if you delete it.
______ 2. Popular sites are always safe from spyware, malware, and other online threats.
______ 3. Following pop-up and spam links can lead to viruses, spyware, and malware.
______ 4. Firewall is a software that aims to gather information about a person or organization
without their knowledge.
______ 5. When online, you should be careful whenever approached by a new person or asked
to provide personal information.
______ 6. Cyberbullying can include such acts as making threats, sending provocative insults or
racial or ethnic slurs, or gay bashing.
_______7. Installing and updating more than one antivirus software on your computer may cause
an effective security against any malicious software.
_______8. When Susan shops online, it’s okay for her to enter a credit card and personal
information as long as she feels like the online store is legitimate.
_______9. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private)
mode”, a feature of the browser, will not protect you from hackers.
______ 10. It’s just okey to share your personal information such as, complete name, birth date,
address and contact number in social networking sites to gain more friends.
Test II: IDENTIFICATION.
Directions: Solve the crossword puzzle by answering what is being defined in the statements
below.
HORIZONTAL
1. Use of information and communication
technologies to support deliberate, repeated
and hostile behavior by an individual or group,
which is intended to harm.
2. It harms the computer and has the capability to
travel without any human action.
3. It replicates itself and harms the computer
using flash drives.
4. refers to sending and receiving rude messages or
videos of naked pictures, ‘underwear shots', any
sexual texts, images or videos.
5. An act of acquiring sensitive information by
means of sending fake email to the victims.

VERTICAL
6. Act of harassment online.
7. Any unsolicited email.
8. Phishing without a lure.
9. The crime of obtaining the personal or financial information of another person for the sole
purpose of assuming that person’s name or identity to make transactions or purchases.
10. It is frequently delivered through spear phishing emails to end users, resulting in the rapid
encryption of sensitive files on a corporate network.

Page 11
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Activity Number: 2.2
Directions: Compose an insightful reflection paper on online safety and security which you
can apply in your strand. Write your answer on the space provided below.

RUBRIC FOR REFLECTION PAPER


Exemplary Sufficient Minimal Beginning
20 15 10 5
Student
Student demonstrates Student demonstrates
demonstrates a
an in-depth reflection Student demonstrates a minimal reflection
lack of reflection
on, and a general reflection on, and
on, or
personalization of the on, and personalization of, the
personalization of,
theories, concepts, personalization of, the theories, concepts,
the theories,
and/or strategies theories, concepts, and/or strategies
concepts, and/or
presented in the and/or strategies presented in the
strategies
course materials. presented in the course materials.
Self-disclosure / presented in the
Viewpoints and course materials. Viewpoints and
Depth of reflection course materials.
interpretations are Viewpoints and interpretations are
Viewpoints and
insightful and well interpretations are unsupported or
interpretations are
supported. Clear, supported. supported with
missing,
detailed examples Appropriate examples flawed arguments.
inappropriate,
from personal are provided from Examples are not
and/or
experiences are personal experiences, provided or are
unsupported.
provided, as as applicable. irrelevant to the
Examples are not
applicable. assignment.
provided.
Student goes into
Student makes Student goes into
some detail
in-depth synthesis of little detail explaining
explaining some
thoughtfully selected some specific ideas or
specific ideas or Student merely
aspects of issues from outside
issues from outside identifies some
Connection to experiences related to experiences related to
experiences related to general ideas or
outside the topic and makes the topic and makes
the topic and makes issues from outside
experiences clear connections very few connections
general connections experiences related
between what is between what is
between what is to the topic.
learned from outside learned from outside
learned from outside
experiences and the experiences and the
experiences and the
topic. topic.
topic.
Student goes into
Student makes
more detail
in-depth synthesis of
explaining some
thoughtfully selected Student goes into
specific ideas or
aspects of readings little detail explaining Student identifies
issues from readings
related to the topic some specific ideas or some general ideas
related to the topic
and makes clear issues from readings or issues from
and makes general
Connection to connections between related to the topic readings related to
connections between
readings what is learned from and makes general the topic. Readings
what is learned from
readings and the connections between are only those
readings and the
topic. Includes what is learned from assigned for the
topic. Includes
reference to at least readings and the topic.
reference to at least
two readings other topic.
one reading other
than those assigned
than those assigned
for class.
for class.
Student synthesizes,
Student attempts to Student has
analyzes and Student synthesizes
synthesize some difficulty restating
evaluates thoughtfully clearly some directly
Connection to directly appropriate some general ideas
selected aspects of appropriate ideas or
class discussions & ideas or issues from or issues from the
ideas or issues from issues from the class
unit objectives the class discussion as class discussion as
the class discussion as discussion as they
they relate to this they relate to this
they relate to this relate to this topic.
topic. topic.
topic.

Page 12
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Congratulations! You did a great job! Rest and relax a while

then move on to the next lesson. Good luck!

Page 13
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Semester: FIRST Code: CS_ICT11/12-ICTPT-Ia-b-2
Quarter: FIRST Week Number: 2 Day: 3 No. of Hours: 2

At the end of this Lesson, you are expected to:


apply online safety, security, ethics, and etiquette standards and practice in the
use of ICT as it would relate to their specific professional tracks.

Lesson 3: Computer Ethics


“Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful.”
- Samuel Johnson
The internet offers you a lot of freedom and this can lead some people to behave in
ways they would not behave in public. They might say things on a status update / post / tweet
they would never say face to face or they may give out personal information about themselves or
others (including photos) that they would normally keep private. Both morality and the law try to
guide human action. There are laws in place to govern the use of computers and the internet.
However, legal issues are not always straightforward. Technology and the internet are evolving
rapidly and this throws up new ethical and legal dilemmas. Legal and ethical questions affect
many areas of computing including privacy, sharing, hacking and the environment.
In this lesson, we will tackle about the importance of Ethics and Law in terms of online
activities. It will provide the core rules of netiquette and the Ten Commandments of Computer
Ethics that you should always remember and put into practice.

Ethics in General
A guideline is needed to stop the current technology products from being exploited for
example replicating original CDs and selling them as pirated software, this unethical behavior
can be controlled by the code of conducts. Unethical refers to any code of conducts that are not
conforming to approved standards of social or professional behavior. Computer ethics is a
system of moral standards or values used as a guideline for computer users.
The term NETIQUETTE, is a short term for Network Etiquette. It is an etiquette of
cyberspace; a set of rules for behaving properly online. So when we talk about Etiquette it
simply means the forms required by good breeding or prescribed by authority to be required in
social or official life.
Why are rules of conduct important when communicating online?
Just like we expect other drivers to follow the rules of the road, there are many
unspoken rules of etiquette for communication online. Following these rules ensures clear
communication, and prevents misunderstandings and hard feelings.
What are some good things to do in your online communication?
Using common acronyms, smileys, clear subject lines; thinking twice before you send an
email or post online; or consulting a website’s FAQ are all acceptable answers.
What are some things to avoid?
Using all capital letters, writing lengthy emails, posting spam, or sending emails to a
large number of recipients are all things to avoid.

Proper etiquette is nothing new for most people. You grew up with your parents
constantly telling you to mind your manners. But in a digital age where the unwritten online
“rules” are constantly changing, proper netiquette may seem bit mystifying.

Page 14
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
The Core Rules of Netiquette (Book of Virginia Shea)
Rule no. 1: Remember the human.
“Do unto others as you'd have others do unto you”. This is the golden rule of netiquette,
never forget that the person reading your mail or posting is, indeed a person with feelings
that can be hurt. Stand up for yourself, but try not to hurt people's feelings.

Rule no. 2: Adhere to the same standards of behavior online that you follow in real life.
Be ethical, breaking the law is bad netiquette. You should abide with law of the land and
behave in accordance with the norm of the society.

Rule no. 3: Know where you are in cyberspace.


“Lurk before you leap”. Netiquette varies from domain to domain. Always take a look
around when you enter a new domain when surfing the web. Get a sense of what the
discussion group is about before you join it. And because Netiquette is different in different
places, it's important to know where you are.

Rule no. 4: Respect other people's time and bandwidth.


As a virtual world communicator, it is your responsibility to make sure that the time
spent, reading your words isn’t wasted. Make your written communication meaningful and
to the point, without extraneous text or superfluous graphics or attachments that may take
forever to download.

Rule no. 5: Make yourself look good online.


Be polite and pleasant to everyone. Always check your spelling and grammar before
posting. Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge .


The reason asking questions online works is that a lot of knowledgeable people are
reading the questions. And if even a few of them offer intelligent answers, the sum total of
world knowledge increases. Don't be afraid to share what you know. Sharing your
knowledge is fun.

Rule no. 7: Help keep flame wars under control.


Netiquette does not forgive flaming. Flaming is what people do when they express a
strongly held opinion without holding back any emotion. Tact is not its objective. Don't use
offensive language, and don't be confrontational for the sake of confrontation.

Rule no. 8: Respect other people's privacy


Do not read other people’s mail without their permission. Going through other people’s
things could cost you, your job or you could even go to jail. Not respecting other people’s
privacy is a bad netiquette.

Rule no. 9: Don't abuse your power.


Some people in cyberspace have more power than others. There are wizards in MUDs
(multiuser dungeons), experts in every office, and system administrators in every system. Do
not take advantage of other people just because you have more knowledge or power than
them.
Rule no. 10: Be forgiving of other people's mistakes.
Do not point out mistakes to people online. Remember that you were once the new kid
on the block. You still need to have a good manner even though you are online and cannot
see the person face to face.
Page 15
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
LAW (Computer Law)
Law is a legal system comprising of rules and principles that govern the affairs of a
community and controlled by a political authority. Law differs from one country to another. In
the era of technology, computer law is needed to clarify goods or actions that fall under the
computer law. Computer law refers to all areas in law that requires an understanding of
computer technology such as hardware, software and Internet.

Why Do We Need Ethics and Law in Computing?


Respecting Ownership
We must respect ownership by not stealing other people’s work either by duplicating or
distributing it. Duplicating and distributing copies of audio tapes, video tapes and computer
programs without permission and authorization from the individual or company that created
the program are immoral and illegal.
Respecting Privacy and Confidentiality
We should respect other people's privacy and confidentiality by refraining ourselves
from reading their mails or files without their permission. If we do so, it is considered as
violating an individual’s rights to privacy and confidentiality.
Respecting Property
Property here means ownership. Since an individual data and information are considered
as property, therefore, an act of tampering and changing electronic information is considered
as vandalism and disrespect for other people’s property.

Cyber law is also known as Cyber Law or Internet Law. The area of law that deals
with the Internet's relationship to technological and electronic elements, including Computer,
Software, Hardware and Information systems (IS).

Cyber laws prevent or reduce large scale damage from cybercriminal activities by
protecting information access, privacy, communications, intellectual property (IP) and freedom
of speech. It is related to the use of the internet, websites, email, computers, cell phones,
software and hardware, such as data storage devices.
The increase in Internet traffic has led to a higher proportion of legal issues worldwide.
Because cyber laws vary by jurisdiction and country, enforcement is challenging, and restitution
ranges from fines to imprisonment.

The Cyber Law Acts of the Philippines


Republic Act 10175 – Cybercrime Prevention Act is an act defining cybercrime,
providing for the prevention, investigation, suppression and the imposition of penalties
therefore and for other purposes.

It is a law considered to be 11 years in the making as various groups, organizations, and


personalities lobbied for its passage. It took a while for the law to be passed as legislators
and various stakeholders need to understand the magnitude of cybercrime and whether the
penalty provisions indicated in the E-Commerce Law – Republic Act 8792 is sufficient or
not.

Page 16
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
The Ten Commandments of Computer Ethics
The Computer Ethics Institute provides their Ten Commandments of Computer Ethics
as a code of computer ethics. These principles consider the effective code of conducts for the
proper use of information technology.
1. You shall not use a computer to harm other people.
2. You shall not interfere with other people's computer work.
3. You shall not snoop around in other people's computer files.
4. You shall not use a computer to steal.
5. You shall not use a computer to bear false witness.
6. You shall not copy or use proprietary software for which you have not paid.
7. You shall not use other people's computer resources without authorization or proper
compensation.
8. You shall not appropriate other people's intellectual output.
9. You shall think about the social consequences of the program you are writing or the
system you are designing.
10. You shall always use a computer in ways that ensure consideration and respect for your
fellow humans.
Differences Between Ethics and Law
ETHICS LAW
Guideline As a guideline to Control As a rule, to control
computer users. computer users.
Moral Standards Ethical behavior is Judicial Standards Law is judged by
judged by moral judicial standards.
standards
Free to Follow Computer users are free Must Follow Computer users must
to follow or ignore the follow the regulations
code of ethics and law.
No Punishments No punishment for Penalties, Penalties,
anyone who violates imprisonments and imprisonments and
ethics. other punishments other punishments for
those who break the
law.
Universal Universal, can be Depends on the Depends on country
applied anywhere, all Country and state where the
over the world crime is committed.
Produce ethical To produce ethical Prevent misusing To prevent misuse of
computer users computer users. of computers computers.
Immoral Not honoring computer Crime Not honoring the law
ethics means ignoring means committing a
the moral elements crime.
(immoral).
Similarities Between Ethics and Law
Both ethics and law are complimentary to each other and are made:
 to prevent any crime
 to guide user from misusing computers
 to create a healthy computer society, so that computers are used to contribute to a better
life
Note: Always remember to act within the ethics and laws of society online and keep yourself
safe offline or online.

Page 17
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______

Activity Number: 3.1


Test I: IDENTIFICATION.
Directions: Identify what rule of netiquette does the following statements show. Write only the rule
number on the space provided before the number.
________ 1. Lurk before you leap.
________ 2. Do not point out mistakes to people online.
________ 3. Do not post messages that waste peoples time.
________ 4. Do unto others as you'd have others do unto you.
________ 5. Never try to read friends private messages or discover their password information.
________ 6. Do not take advantage of other people just because you have more knowledge or
power than them.
________ 7. Netiquette does however forbid people who are flaming to hurt discussion groups
by putting the group down.
________ 8. Internet was founded and grew because academics wanted to share info. Don't be
afraid to share what you know.
________ 9. When using a computer to communicate remember to see beyond the machine,
you must treat them with respect and dignity.
_________ 10. Take advantage of your physical anonymity. You won't be judged by appearance,
but you will be judged by the quality of your writing.
TEST II. TRUE/FALSE.
Directions. Write “T” if the statement is true and write “F” if otherwise on the space provided
before the number.
______ 1. Ethics is for control and Law is for guideline.
______ 2. We should respect other people's privacy and confidentiality by encouraging other
people to read other mails or files without their permission.
______ 3. An act of tampering and changing electronic information is considered as vandalism
and disrespect for other people’s property.
______ 4. A large number of recipients are all things to recommend when dealing with online
activities.
______ 5. Cyber laws prevent or reduce large scale damage from cybercriminal activities by
protecting information access, privacy, communications, Intellectual property (IP), and freedom
of speech.
TEST III. MULTIPLE CHOICE
Direction. Encircle the letter that corresponds to the correct answer.
1. What is a flame?
A. An online chain letter.
B. An expert programmer.
C. A person who consistently breaks the rules of Netiquette.
D. A post or email message that expresses a strong opinion or criticism.
2. A set of rules for behaving properly online.
A. Computer Ethics B. Etiquette C. Law D. Netiquette
3. This law protects an individual from various unwanted online and cyber acts that may harm or evade
one's privacy and integrity.
A. Cybercrime Prevention Act C. E-Commerce Law
B. Anti-Bullying Act of 2013 D. Cybersex Law
4. Both ethics and law are complimentary to each other and are made to______________:
A. to support people’s advocacy. C. to create a luxury computer society.
B. to promote cybercrime activities. D. to guide user from misusing computers
5. Knowledge and understanding of Netiquette is useful because ____________.
A. It explains some of the technical limitations of online communications.
B. It explains the conventions already being used by millions of cybernauts.
C. It will help you create a positive impression on those you meet in cyberspace.
D. All of the above.

Page 18
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Activity Number: 3.2
Directions: Compose an insightful reflection paper on the importance of Computer Ethics and
Law that greatly affect your daily routines which is applicable in your strand. Write your
answer on the space provided below.
RUBRIC FOR REFLECTION PAPER
Exemplary Sufficient Minimal Beginning
20 15 10 5
Student
Student demonstrates Student demonstrates
demonstrates a
an in-depth reflection Student demonstrates a minimal reflection
lack of reflection
on, and a general reflection on, and
on, or
personalization of the on, and personalization of, the
personalization of,
theories, concepts, personalization of, the theories, concepts,
the theories,
and/or strategies theories, concepts, and/or strategies
concepts, and/or
presented in the and/or strategies presented in the
strategies
course materials. presented in the course materials.
Self-disclosure / presented in the
Viewpoints and course materials. Viewpoints and
Depth of reflection course materials.
interpretations are Viewpoints and interpretations are
Viewpoints and
insightful and well interpretations are unsupported or
interpretations are
supported. Clear, supported. supported with
missing,
detailed examples Appropriate examples flawed arguments.
inappropriate,
from personal are provided from Examples are not
and/or
experiences are personal experiences, provided or are
unsupported.
provided, as as applicable. irrelevant to the
Examples are not
applicable. assignment.
provided.
Student goes into
Student makes Student goes into
some detail
in-depth synthesis of little detail explaining
explaining some
thoughtfully selected some specific ideas or
specific ideas or Student merely
aspects of issues from outside
issues from outside identifies some
Connection to experiences related to experiences related to
experiences related to general ideas or
outside the topic and makes the topic and makes
the topic and makes issues from outside
experiences clear connections very few connections
general connections experiences related
between what is between what is
between what is to the topic.
learned from outside learned from outside
learned from outside
experiences and the experiences and the
experiences and the
topic. topic.
topic.
Student goes into
Student makes
more detail
in-depth synthesis of
explaining some
thoughtfully selected Student goes into
specific ideas or
aspects of readings little detail explaining Student identifies
issues from readings
related to the topic some specific ideas or some general ideas
related to the topic
and makes clear issues from readings or issues from
and makes general
Connection to connections between related to the topic readings related to
connections between
readings what is learned from and makes general the topic. Readings
what is learned from
readings and the connections between are only those
readings and the
topic. Includes what is learned from assigned for the
topic. Includes
reference to at least readings and the topic.
reference to at least
two readings other topic.
one reading other
than those assigned
than those assigned
for class.
for class.
Student synthesizes,
Student attempts to Student has
analyzes and Student synthesizes
synthesize some difficulty restating
evaluates thoughtfully clearly some directly
Connection to directly appropriate some general ideas
selected aspects of appropriate ideas or
class discussions & ideas or issues from or issues from the
ideas or issues from issues from the class
unit objectives the class discussion as class discussion as
the class discussion as discussion as they
they relate to this they relate to this
they relate to this relate to this topic.
topic. topic.
topic.

Page 19
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Congratulations! You did a great job! Rest and relax a while

then move on to the next lesson. Good luck!

Page 20
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Semester: FIRST Code: CS_ICT11/12-ICTPT-Ia-b-2
Quarter: FIRST Week Number: 2 Day: 4 No. of Hours: 2

At the end of this Lesson, you are expected to:


use the internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational challenges.

Lesson 4: Contextualized online search and research skills


Internet research is the practice of using Internet information, especially free
information on the World Wide Web, in research. It is focused and purposeful (so not
recreational browsing), uses Internet information or Internet-based resources (like Internet
discussion forum), tends towards the immediate (drawing answers from information you can
access without delay), and tends to access information without a purchase price. Internet research
has had a profound impact on the way ideas are formed and knowledge is created. Common
applications of Internet research include personal research on a particular subject (something
mentioned on the news, a health problem, etc.), students doing research for academic projects
and papers, and journalists and other writers researching stories.
Research is a broad term. In this lesson, it is used to mean "looking something up (on
the Web)". It includes any activity where a topic is identified, and an effort is made to actively
gather information for the purpose of furthering understanding. It may include some post
collection analysis like a concern for quality or synthesis. The Internet can be a researcher's
dream come true. By browsing the Internet, much as you would browse the shelves of a library,
you can access information on seemingly limitless topics. In addition, web-based catalogs are
available in many libraries to assist researchers in locating printed books, journals, government
documents, and other materials.

The Research Processes Using the Web


Lessons and projects should be designed so that research time on the Web can be
maximized in terms of efficiency. This may mean gathering necessary information beforehand,
having students work in groups, or focusing on whole-class projects.Barron and Ivers (1996)
outlined the following cycle for online research projects.

Step 1: Questioning --- Before going on the


Internet, you should structure their questions.
Step 2: Planning --- Develop a search strategy with
a list of sites to investigate.
Step 3: Gathering --- Use the Web to collect and
gather information.
Step 4: Sorting & Sifting --- Analyze and
categorize the data they gathered on the Web.
Step 5: Synthesizing --- Integrate the information
into the lesson, and draw conclusions.
Step 6: Evaluating --- Assess the results, and if necessary, begin the process again.

Page 21
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Tips in Conducting Online Research

1. Have a question in mind. Focus on a question you want to be answered.


2. Narrow it down. Search engines like Google, Bing or Yahoo use several filters to determine
the most appropriate result for you. These search engines use your previous search
history and your geographical location and send you the result which is the most related
to you.
3. Advanced Search. The best way to filter information you get from search engines is by using
the advanced search. This will allow you to filter out information you do not need.
In Google, simply search a word like you would normally do, then click settings and
select advanced search option on the options button located at the upper right corner of
the page.
4. Look for a credible source. Some wikis, though filled with updated information, are not a
credible source. This is due to the fact that anyone can edit its content. When using
wikis, check out the link of the cited text (indicated by superscript number) to be
navigated to the footnote where the list of sources is located. Click the source of the
information and see if it is credible. The more credible sources are scientific journals,
established news and magazine websites, online encyclopedias and scholarly databases.
You can also checked the URL of a website if it ends with a .org,.gov, and .edu.
Another tip to validate if the information is correct is to have multiple sources of
information. Having two or more websites will tell you whether the information is
reliable or not.
5. Give credit. If you are going to use the information from a source for educational purposes,
give credit to the original author of the page or information. To properly cite a reference,
you may use this format.

Name of the person or organization (The author of the information). Title of the home
page in italics (title shown in a title bar but is sometimes missing or unrelated).URL.
Date last seen.
For example

“Accounting: What you should know.” Jargon Online Network.


https://www.jargononline.com/accounting101.html. Viewed on April 13,
2015.

Carla Lane. "The Distance Learning Technology Resource Guide," .


Gardner’s Multiple Intelligences. http://tecweb.org/styles/gardner.html.
Viewed on January 4, 2018.

Searching the Web


There are billions of pages of information on the World Wide Web, and finding relevant
and reliable information can be a challenge. Search engines are powerful tools that index
millions of web sites. When entering a keyword into a search engine, you will receive a list with
the number of hits or results and links to the related sites. The number of hits you receive may
vary a great deal among different search engines. Some engines search only the titles of the web
sites, and others search the full text.

Page 22
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Common Commands for Search Engines
 Quotation Marks ( " )
Using quotation marks will help to find specific phrases involving more than one
word.
For example: "Martin Luther King"
 Addition Sign ( + )
Adding a + sign before a word means that it MUST be included in each site listed.
For example: + Florida + taxes
 Subtraction Sign ( - )
Adding a - sign before a word means that it will NOT appear in the sites listed.
For example: + Washington -DC
 Asterisks ( * ) Asterisks can be used for wild-cards in some search engines.
For example: Mexic* will look for Mexico, Mexican, Mexicali, etc.

Search Engine Capabilities


Search engines are rated by the size of their index. Large engines such as Google are
good tools to use when searching for obscure information, but one drawback to an extensive
index is the overwhelming number of results on more general topics. If this is the case, it might
be better to use a search engine with a directory structure such as Yahoo. Many search engines
provide directory-listing search tools such as yellow pages, white pages, and email addresses.

Evaluating Internet Sources


Students often uncritically accept information they see in print or on computer screens.
It is encouraged to carefully evaluate sources found on the Internet. The evaluation tool (below)
will help to analyze web resources in terms of accuracy, authority, objectivity, timeliness, and
coverage. Consideration of these factors will weed out many of the inaccurate or trivial sites
students may encounter.
Analyzing Web Resources
Accuracy
 information can be verified through another source
Authority
 publisher is reputable
 sponsorship is clear
 phone number or postal address is available
 link to the sponsoring organization
 author qualified to write about the topic
Objectivity
 no biases included if the author has commercial interests
 focus on carrying out studies without manipulating methods to find a specific outcome
Currency
 publication date is indicated
 date is visible for the last update
 topic does not change frequently
Coverage
 topics covered in depth
 content appears to be complete

Page 23
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Setting bookmarks on the Web
Browsers such as Safari, Firefox, and Internet Explorer provide a way to create a list of
your favorite sites that you can access with a click of the mouse. The procedure for creating a list
of sites is an easy and powerful tool for web use.

When you find a web page that you want to bookmark,


 simply select the "Add Bookmark" or "Add Favorite" option from the menu bar.
 To return to the site at a later time, choose the name from the bookmark or favorite list,
and you will immediately access the site.

You can organize your bookmarks into file folders and can save them on a disk to transfer and
use on other computers

Copyright Issues
Everyone has a somewhat flexible, but not unlimited, copyright privilege under the "fair
use clause" of the U.S. Copyright Act. "Fair use" is the means by which educators of non-profit
educational institutions may use copyrighted works without seeking permission or making
payment to the author or publisher. Teachers and students are also protected to some extent by
the Digital Millennium Copyright Act, which went into effect in October 1998. Under current
guidelines, teachers and students are able to make limited use of copyrighted materials for
instructional purposes.
Copyrightable works include the following categories:
 literary works
 musical works, including any accompanying words
 dramatic works, including any accompanying music, pantomimes, and choreographic
works
 pictorial, graphic, and sculptural works
 motion pictures and other audiovisual works
 sound recordings
 architectural works
These categories should be viewed broadly. For example, computer programs and most
"compilations" may be registered as "literary works"; maps and architectural plans may be
registered as "pictorial, graphic, and sculptural works."
Important questions to ask
 What is the purpose for using the material?
 Who is the audience?
 How widely will the material be distributed?
 Will the material be reproduced?
It is allowable under copyright guidelines to use copyrighted materials for class
assignments. Check specific guidelines for length of time the material can be kept up on a web
site.

Page 24
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Activity Number: 4.1
Directions: Read the questions carefully and write your answer on the space provided.
1. Why is there a need for you to look for the most credible source? Explain your answer.
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

2. How will you be able to find a credible source in gathering information?


_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

3. How important is it to verify the details of an information?


_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

4. What could possibly happen if you’ve got the wrong source for your research?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

5. What are the ways in looking for a credible source of information?


_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

Page 25
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Congratulations! You did a great job!

Rest and relax a while then move on to the next lessons.


Good luck!

REFERENCES

Balneg,N. (2016).ICT 1a-Learning Materials. Retrieved from NelsonBalneg


ELearning .https//www.enelsonbalneg.weebly.com/ict-third-week.html
Empowerment Technologies: Innovative Training Works, Inc. (1st Edition).
Manila, Philippines. IT Works, Rex Bookstore, 2016
Kagan, J.(2019). Identity theft. Retrieved from Investopedia.
https://investopedia.com/terms/i/identitythet.asp.
Nelson Balneg ELearning. University of Southern Mindanao – Senior High
School, Empowerment Technologies. Unit 1: Web 1.0, 2.0, 3.0, Convergent
technologies, Social, Mobile, and assistive Media Online Systems, Functions,
and Platforms. Unit 2: Online Safety, Security, Ethics and Etiquette. Unit 3:
Contextualized Online Search and Research Skills.
Sammons,J. & Cross, M.(2017). Cyberstalking. Retrieved from ScienceDirect.
https://www.sciencedirect.com/topics/computer-science/cyberstalking.
Sharma, V.(2016).Importance of Internet safety. Retrieved from Klient Solutech
https://www.klientsolutech.com/importance-of-internet-safety.
Thomas W. Edgar, David O. Manz. Research Methods for Cyber Security, 2017
FBI.Scams and Safety. Retrieved from FBI.
https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/internet-fraud
http://www.sose-trnava.edu.sk/ict/dict.pdf. Retrieved on June 3, 2019
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-le
ssons-1-15/?fbclid=IwAR2tcO3__k1P8prE1ojtfBZz2DGSn9oFtA8m97
Ou4Z9WtcLuDzy_cP4Mx-I Retrieved on June 3, 2019
https://www.slideshare.net/mobile/AngelitoQuiambao/online-safety-security-ethics-
amp-etiquette. Retrieved June10,2020, 11:52 AM
https//www.enelsonbalneg.weebly.com. Retrieved on June 3, 2019
https//www.enelsonbalneg.weebly.com. Retrieved on June 3, 2019
https//www.enelsonbalneg.weebly.com. Retrieved on June 3, 2019
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175. Retrieved
June 15, 2020, 4:03 PM

Page 26
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar

You might also like