You are on page 1of 37

11

Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills
11

Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills

Module in Empowerment Technologies


Author: MARIA BUENASGRACIA O. NOBLETA
School: SENIOR HIGH SCHOOL IN MALVAR
School Address: MALVAR, BATANGAS
For the learner:

Welcome to the Empowerment Technologies Alternative Delivery Mode (ADM) Module


on Introduction to ICT, Online Safety and Contextualized Online Search and
Research Skills. This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning resource while being an active
learner.
This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in the
module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.

What’s In This is a brief drill or review to help you link


the current lesson with the previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such as a
story, a song, a poem, a problem opener, an
activity or a situation.

What is It This section provides a brief discussion of the


lesson. This aims to help you discover and
understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.

What I Have Learned This includes questions or blank


sentence/paragraph to be filled in to process
what you learned from the lesson.

What I Can Do This section provides an activity which will


help you transfer your new knowledge or skill
into real life situations or concerns.

Assessment This is a task which aims to evaluate your


level of mastery in achieving the learning
competency.

Additional Activities In this portion, another activity will be given


to you to enrich your knowledge or skill of the
lesson learned. This also tends retention of
learned concepts.

Answer Key This contains answers to all activities in the


module.

At the end of this module you will also find:

References This is a list of all sources used in developing


this module.
Introductory Message
For the facilitator:

This will aid in teaching competencies that are essential in the Information Age, such
as the state of ICT Technologies; online safety, security, ethics and etiquette;
productivity tools with advanced application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change,
which are aligned to the standards set by the Department of Education for the senior
high school level.

For the learner:

(This module contains information about: the massive world of Information and
Communication Technology (ICT) has continued to shape the world including the
Philippines. This unit allows you to discover the world of ICT in general and also helps
you improve your skills in various applications. It also creates several real-life
scenarios where you can use these applications and resources properly.

2
What I Need to Know

This module was designed and written with you in mind. It is here to help you
master the Empowerment Technologies. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.

The module is divided into Two lessons and five sub topics, namely:
• Lesson 1 – Information and Communication Technologies
▪ Lesson 1.1 – ICT in the Philippines
▪ Lesson 1.2 – ICT, Me, and my Community
▪ Lesson 1.3 - Web 2.0: Dynamic Web Pages
▪ Lesson 1.4 - Web 3.0 and the Semantic Web
▪ Lesson 1.5 - Trends in ICT
• Lesson 2 – Online security, safety, and ethics
▪ Lesson 2.1 – Internet Threats
▪ Lesson 2.2 – Protecting reputations online
▪ Lesson 2.3 – Copyright
• Lesson 3 – Contextualized Online Search and Research Skills

After going through this module, you are expected to:


1. create a foundation of understanding of the world of ICT;
2. understand and demonstrate the proper etiquette in using
ICT;
3. demonstrate appropriate skills in using several computer applications,
4. discover opportunities where one can use these skills in real-world scenarios;
and
5. collaboratively create an online portal.
6. Consider one’s and others’ safety when sharing information using the
Internet;
7. Consider one’s and others’ reputation when using the Internet;
8. Determine and avoid the dangers of the internet;
9. Be responsible in the use of social networking sites; and
10. Browse the internet efficiently and properly through proper referencing.

3
What’s New

Did you use the internet after you woke up this morning?
On your activity sheet, answer the questions.
1. How many times have you checked your phone this
morning?
2. How many status updates have you posted in FB
or Twitter today?
3. Did you use internet for an hour after you woke
up this morning?
4. Do you follow a celebrity via his/her social media
account?

Unlocking of Difficulties

The following are the terms you will encounter with this module:

Key Terms

• Web 1.0- static website without interactivity


• Web 2.0- websites that contain dynamic content
• Web 3.0- a concept of the World Wide Web that is designed to
cater to the individual user
• Static-refers to the web that are the same regardless of the user
• Folksonomy- allows users to categorize and classify/ arrange
information
• Hashtag- used to categorize posts in website
• Convergence- the synergy of technological advancements to work
on a similar goal or task
• Social media- websites, applications, or online channels that enable
users to create, co-create, discuss, modify, and exchange user
generated content.

4
What I Know

Choose the letter of the best answer. Write the chosen letter on a separate sheet of
paper.
1. A web page that allows interaction from the user
a. static c. social
b. dynamic d. comment

2. This refers to the feature where users are able to categorize and locate
information through tagging.
a. hashtags c. taxonomy
b. folksonomy d. rich user experience

3. A feature of a dynamic website that allows users to put their own content
a. rich user experience c. user participation
b. long tail d. mass participation

4. It provides a common framework to allow data to be shared and reused across


platform, enterprise, and community boundaries.
a. W3C c. Web 1.0
b. Semantic Web d. Web 2.0

5. According to this magazine, two Philippine cities are part of the top 10 in their
research about “The Selfiest Cities around the World.”
a. People c. Reader’s Digest
b. Time d. Candy

6. This is the operating system for blackberry phones.


a. Blackberry OS c. Window’s Mobile
b. Symbian d. iOS

7. Pinterest is a social media website that can be classified as


a. Bookmarking site c. Microblogging
b. Media Sharing d. Blogs and Forums

8. Currently, this is the fastest mobile network.


a. 2G c. 4G
b. 3G d. 5G

9. This media is designed to help people who have visual and reading
impairments.
a. assistive c. bookmark
b. social d. accessibility
10. This type of social media website focuses on short updates posted by the user.
a. blogging c. social media
b. microblogging d. hashtagging

5
Lesson
Information and
1 Communication Technologies

Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to
locate, save, send, and edit information.

When we make a video call, we use the Internet. When we send


a text or make a call, we use cellular networks. When we run out of
load or battery, we use payphones which use a telephone network.
Having a unified way to communicate is one of the goals of ICT.
In terms of economics, ICT has saved companies a lot of
resources (time and money) with the kind of communication
technology they use, nowadays. In a similar way, we spend less
because of ICT. As it normally costs us a peso to send a text
message or SMS, with the Internet, we can send multiple
messages and only be charged by a fraction.

What’s In

- It deals with the use of different communication technologies such as


mobile phones, telephone, Internet to locate, save, send and edit
information.

ICT in the Philippines

Several international companies dub the Philippines as the "ICT Hub of Asia"
It is no secret that there is a huge growth of ICT-related jobs around the country, one
of which is the call center or BPO (Business Process Outsourcing) centers.

According to the 2013 edition of Measuring the Information Society by the


International Telecommunication Union, there are 106.8 cellphones per 100
Filipinos in the year 2012. That would mean that for every 100 Filipinos you meet,
there is a high chance that they have a cellphone and approximately for the seven of
them, they have two.

In a data gathered by the Annual Survey of Philippine Business and Industries


in 2010, the ICT industry shares 19.3% of the total employment population here in
the Philippines.

6
To add to these statistics, Time Magazines "The Selfiest Cities around the
World” of 2013 places two cities from the Philippines in the top 1 and top 10 spots.
The study was conducted using Instagram, a popular photo sharing application.

With these numbers, there is no doubt that the Philippines is one of the
countries that benefits most out of ICT.

• Philippines is dub as the “ICT Hub of Asia”


because of huge growth of ICT-related jobs, one of
which is BPO, Business Process
Outsourcing, or call centers
• ICT Department in the Philippines
is responsible for the planning, development and
promotion of the country's information and
communications technology (ICT) agenda in
support of national development.

What is It

ICT, Me, and My Community

To fully understand the importance of ICT, let us first look at our community. Look
for a small business around your community.

Conduct a short interview (via messenger) of the business owner using the
following guide:

Company/Establishment Name:
Address:
Nature of Business:
Guide Questions:
1. What are the different ways for customers and/or suppliers to contact you?
2. How often do you use a phone or cellular phone for business? Estimate
only.
3. Does your establishment have Internet connection? If yes, what is its
purpose? If no, would you consider having it in the future? Why or why
not?
4. Does your business have a website? if yes, how does it help the company?
If no, would you consider having one in the future? Why or why not?
5. If applicable) Would you consider giving free Wi-Fi access in the future?
If you already have it, does it help boost sales?

7
Internet

• It is the global system of interconnected computer networks that use


the Internet protocol suite TCP/IP) to link billions of devices worldwide.
• means of connecting a computer to any other computer anywhere in
the world via dedicated routers and servers.
• sometimes called simply "the Net," is a worldwide system of computer
networks - a network of networks in which users at any one computer
can get information from any other computer

World Wide Web


• an information system on the Internet that allows documents to be connected to
other documents by hypertext links, enabling the user to search for information
by moving from one document to another.
• is an information space where documents and other web resources are
identified by URLs, interlinked by hypertext links, and can be accessed via
the Internet.
• Invented by Tim-Berners Lee

Web Pages

• Web page is a hypertext document


connected to the World Wide Web.
• It is a document that is suitable for
the World Wide Web

Web Sites
• a location connected to the
Internet that maintains one or
more pages on the World Wide
Web.
• It is a related collection of
World Wide Web (WWW) files
that includes a beginning file
called a home page.

8
Web Browser
• It displays a web page on a monitor or mobile device
• is a software application for retrieving, presenting,
and traversing information resources on the World
Wide Web.

Static Web Pages

• Static is Web 1.0


• Dynamic is Web 2.0, 3.0
• Static web page is known as flat page or stationary page in the sense that
the page is “as is” and cannot be manipulated by the user.
• The content is also the same for all users that is referred to as Web 1.0

Dynamic Web Pages


• web 2.0 is the evolution of Web 1.0 by adding
dynamic web pages
• The user is able to see website differently than
others e.g social networking sites, wikis, video
sharing sites
• Web 2.0 allows users to interact with the page,
the user may be able to comment or create a
user account
• Most website the we visit today are Web 2.0

9
Static vs. Dynamic Web Page
• Static" means unchanged or constant, while "dynamic" means changing or
lively.
• A static site is one that is usually written in plain HTML and what is in the
code of the page is what is displayed to the user. A dynamic site is one that
is written using a server-side scripting language such as PHP, ASP, JSP, or
ColdFusion.

Features of Web 2.0


1. Folksonomy- allows user to categorize and classify information using freely
chosen keywords e.g tagging by Facebook, twitter, use tags that start with the
pound sign #, referred to as hashtag
2. Rich User Experience- content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able
to put content. Others are able to place a content of their own by means of
comments, reviews, and evaluation e.g lazada.com, amazon.com
4. Long Tail- services that are offered on demand rather than on a one-
time purchase. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spent in the Internet, or a data
plan that charges you for the amount of bandwidth you used.
5. Software as a Service- users will be subscribe to a software only when
needed rather than purchasing them e.g Google docs used to create and
edit word processing and spread sheet.
6. Mass Participation- diverse information sharing through universal
web access. Web 2.0’s content is based on people from various cultures.

Web 3.0 and Semantic Web


• Semantic Web is a movement led by the World Web Consortium (W3C).
• The W3C standard encourages web developers to include semantic content
in their web pages.
• Semantic web is a component of Web 3.0
• Semantic web provides a common framework that allows data to be shared
and reused across application, enterprise, and community boundaries.
• The aim of web 3.0 is to have is to have machines or servers understand the
user’s preferences to be able to deliver web content specifically targeting the
user.

Web 3.0 is yet to be fully realized because of several problems:

1. Compatibility. HTML files and current web browsers could not support Web
3.0.
2. Security. The user's security is also in question since the machine is saving
his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.

10
4. Vagueness. Certain words are imprecise. The words "old" and "small would
depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer
to be able to predict what the user is referring to at a given time.

Trends in ICT

2. Convergence- is the synergy of technological advancements to work on a


similar goal or task
3. Social media- is a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange user-generated
content.

Six Types of Social Media:

a. Social Networks- these are sites that allow you to connect with other
people with the same interests or background.
b. Bookmarking Sites- these are sites that allow you to store and manage
links to various websites and resources.
c. Social news- these are sites that allow users to post their own news
items or links to other news sources. The users can also comment on the
post and comments may also be ranked.
d. Media Sharing- these are sites that allow you to upload and share media
content like images, music, and video.
e. Mircoblogging- these are sites that focus on short updates from the
user. Those subscribed to the user will be able to receive these updates.
f. Blogs and Forums- these websites allow users to post their content.
Other users are able to comment on the said topic.
4. Mobile Technologies- popularity of smartphones and tablets. Latest
mobile devices use 4G Networking LTE, which is currently the fastest
mobile network. Mobile devices use different operating systems

• iOS
• Windows Phone OS

• Symbian
• Android

• Web OS
• Blackberry OS
• Windows Mobile

5. Assertive Media- is a nonprofit service designed to help people who


have visual and reading impartments. A database of audio recordings
is used to read to the user.

11
What’s More

Activity 1.1 Your Turn to Shine

1. Why do you think microblogging platforms have become popular when regular
blogging becomes platforms already exist?

2. What do you think of Web 3.0? Do you think it will be realized someday in
the future?

Take the Challenge!

Research on one momentous event in the Philippine history wherein ICT play
a huge role in making it a success.

What you will do


Self-Test 1.2
Allow students to use their android phones and have them research to find
the dates for the technological advances they plan to include on their time lines.
(Prehistoric technology can be dated simply by the word "prehistoric. Students can
make their time lines on long strips of paper, cut out and tape together or on brown
paper that comes in rolls. Time lines should include illustrations of the technological
advances students wish to highlight. (The learners will take a snapshot of their
finished output and send it via google classroom; or will submit their output together
with activity sheets)

3
Assessment

Post-Test

I. True or False: Write T if the sentence is correct; otherwise, write F on the


blank before each item.

___ 1. Tim Berners-Lee created the World Wide Web.


___ 2. People Magazine conducted the research on "The Selfiest Cities in the
World"
___ 3. Web 2.0 introduced static web pages that allow users to interact with
the web page.
___ 4. Folksonomy allows users to categorize and locate information.
___ 5. Technological convergence is the synergy of technological
advancements to work on a similar goal or task.
___ 6. According to Nielsen, users who use the Internet spend more time in
social media sites than in any other type of site.
___ 7. Blogging sites are sites that focus on short updates from the user.
___ 8. Android is a mobile operating system for Apple devices.
___ 9. Assistive media is a nonprofit service designed to help people who have
visual and reading impairments.
___ 10. Information and Communication Technology (ICT) deals with the use
of different communications technology to locate, save, send, and edit
information
II. Write SO if the social media website is a social network, BS for
bookmarking site, SN for social news, MS for media sharing, MI for
microblogging, and BF for blogs and forums.

___ 1. Facebook
___ 2. Plurk
___ 3. Twitter
___ 4. Tumblr
___ 5. reddit
___ 6. Google+
___ 7. Instagram
___ 8. Pinterest

4
___ 9. Blogger
___ 10. StumbleUpon

3
Answer Key

References

For educational purposes only; All rights reserved for rightful owners

• Empowerment Technologies by Innovative Training Works, Inc. and Rex


Bookstore ISBN 978-971-23-7830-0; Published, Copyright 2016 and
distributed by rex Book Store, Inc. (RSBI)
• Reygie Fabro-College Instructor at Divine Word College of Laoag; Published
on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology
What I Know

Name: Score:

Section: Date:

I. Pre-Test: Write Yes if you agree with the statement and No if you disagree
on the blank before each number.

_______ 1. My computer has an antivirus so it is okay to open most email


attachments like e-cards and video files.
_______ 2. Your friend told you that his college application was rejected due
to the fact that you posted a video of him doing crazy stuff at a
party. You posted the video several years ago but later took it
down to protect your friend's reputation. Can your friend be right
that the college found the video?
_______ 3. You and your best friend plays a lot of video games. One time,
she asks you for your password so she can help you level up and
get in-game money. She promises to keep your password a secret.
Is it okay to give away your password?
_______ 4. You received an email stating that your mother's bank account is
going to be forfeited if you do not respond to the email. Is it safe
to' reply?
_______ 5. You forgot that your essay for English class is due tomorrow.
While doing your research, you found a website offering free
essays. Is it okay to use the essays from this free essay website?
_______ 6. A virus is a malware that multiplies and infects other computers
through flash drives.
_______ 7. Keyloggers are software that show pop-up ads even if you are not
using your browser.
_______ 8. Search engines scan websites for search results even if you have
set your post to "private"
_______ 9. There is a danger in posting information about a future vacation.
_______ 10. Letting people know your birthday is probably a must if you want
to get as many gifts as possible. But having it in your profile
makes you vulnerable to identity theft.
Lesson

2 Rules of Netiquette

Most of us use the Internet every day, Sometimes, we do not pay attention
on how much information we share online. Below is a questionnaire about
how much you have shared so far. Put a check (✓) under Shared or Not
Shared.

How Safe Are You?

Type of Information Shared Not Shared

1. First name
2. Last name
3. Middle name
4. Current and previous school(s)
5. Your cellphone number
6. The name of your mother and
father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday

How many checks did you have for Shared? You probably answered Shared in the
first two items. If that is the case, try using a search engine like Google then type
your first and last name. Did you get links to your profile page? Try switching to
image search. Did your pictures appear? If you have a unique name, chances are, it
did. Do not feel bad if it did not appear though; in fact, it is probably for your best
interest not to have pictures of yourself in a search engine.

So how did these things happen? How can search engines locate me? Is there any
danger of being found by search engines?
What’s In

How many hours do you spend on the Internet per day? Can you live without
the Internet for a week? How many aspects of your life depend on the Internet? How
many times have you complained about your Internet connection
speed? As teenagers, you are all exposed to many things powered by
the Internet. Whether it is socializing, playing games, reading sports
news, shopping, etc., the Internet has given you one of the most
powerful tools that your parents, during their teenage years,
did not have. Because of this, do you not think that it is also
important to wield this powerful tool properly? Without proper
training, a swordsman can easily injure himself when
wielding a swordsman, the same could be said for you
whenever you use the Internet.

What’s New

• Lesson 2 – Online security, safety, and ethics


• Lesson 2.1 – Internet Threats
• Lesson 2.2 – Protecting reputations online
• Lesson 2.3 – Copyright

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to promote your business, gain
Online Safety and Security new friends, and stay in touch with the old ones. It is also
a source of entertainment through games, online communities, and everything in
between. But like most things in this world there is always the 'other side of the coin
The Internet is one of the most dangerous places especially if you do not know what
you are doing with it. But there is no need to worry: it is never that late. Hopefully,
by the end of this lesson, you are able to consider how you go about your use of the
Internet.
Let us go back to the "How Safe Are You?" test.
Let us visit each item and see how risky it is to share them. pe of information Risks
There is a risk in sharing your
The Internet, truly, is a powerful tool. It can be used to promote your business, gain
Online Safety and Security new friends, and stay in touch with the old ones. It is also
a source of entertainment through games, online communities, and everything in
between. But like most things in this world there is always the 'other side of the coin
The Internet is one of the most dangerous places especially if you do not know what
you are doing with it. But there is no need to worry: it is never that late. Hopefully,
by the end of this lesson, you are able to consider how you go about your use of the
Internet.

Let us go back to the "How Safe Are You?" test.


Let us visit each item and see how risky it is to share them. pe of information Risks
There is a risk in sharing your

First name There is a risk in sharing your first name.


Chances are, a hacker may already know
plenty of stuff about you even if you only
give out your first name. Likewise, you
cannot just walk in a room and start
introducing yourself to everyone. You do
not know whom you can come across with.

Last name If sharing your first name is a small risk, having


both your first and last is riskier. You will be
vulnerable to being searched for using search
engines, which include image search. Matching
a name with a face is modus to several
cybercrimes like identity theft.

Middle name
Sharing your middle name alone is probably
not the riskiest of this shared information,
but sharing your full name would be.

Current
and
Previous Most people who steal identities study their
Schools subject. They can use this information for
verification purposes.

Your Your cellphone number should never be posted


cellphone over the Internet. The Internet number is a
numbers public place. It is the same as posting your
number on a billboard. You would not want
random strangers to text or call you, or worse,
pretend that they are someone else.
The name Risky yet not as risky as posting their full names,
of your especially your mother's maiden name. In fact, you
mother and may have already encountered many websites that
father. require your mother's maiden name as an answer
to a secret question whenever you lose your
password.

The name
Disclosing this is a huge risk. Strangers may
of your
pretend or use their identity to dupe you.
siblings.

Your Hopefully, you answered "no" to this one. Giving


address the Internet your number is one thing; giving them
your address is a whole other level. It would be
much easier for criminals to find you.

Your home This shared information is riskier than sharing


phone your personal phone number. Scams usually
number. use this information to deceive you, one of
which is when a stranger pretends to know your
parents or pretends to be you.

Your Letting people know your birthday is probably a


birthday must if you want to get as many gifts as possible.
But having it in your profile makes you vulnerable
to identity theft.

What is It

TEN RULES OF NETIQUETTE

Rule no. 1: Remember the human


Rule no. 2: Adhere to the same standards online that you follow in real life.
Rule no. 3: Know where you are in cyberspace.
Rule no. 4: Respect other people’s time and bandwidth.
Rule no. 5: Make yourself look good online.
Rule no. 6: Share expert knowledge
Rule no. 7: Help keep flame wars under control
Rule no. 8: Respect other people’s privacy.
Rule no. 9: Don’t abuse your power
Rule no. 10: Be forgiving of other people’s mistake.

RULES OF NETIQUETTE
Skill Exploration

Privacy Policies

Visit a social networking site and look for the site's privacy policy. The link is
typically found at the bottom of the page and sometimes labeled only as "Privacy:
Write a summary on how the website handles both your private and public
information.
What is It

• Lesson 2 – Online security, safety, and ethics


• Lesson 2.1 – Internet Threats
• Lesson 2.2 – Protecting reputations online
• Lesson 2.3 – Copyright
• Lesson 2.4 – Contextualized online research skills
What is It

• Lesson 2 – Online security, safety, and ethics


• Lesson 2.1 – Internet Threats
• Lesson 2.2 – Protecting reputations online
• Lesson 2.3 – Copyright
What is It

• Lesson 2 – Online security, safety, and ethics


• Lesson 2.1 – Internet Threats
• Lesson 2.2 – Protecting reputations online
• Lesson 2.3 – Copyright
• Lesson 2.4 – Contextualized online research skills
Lesson
Contextualized Online Search
3 and Research Skills

Being a vast sea of information is one of the key features of the


Internet. it is such a big repository of data that is believed that one could
find out something about anything on the internet. Developing the
necessary knowledge and skills in online searching, however, is the
key to maximizing its use.i

What’s In

yourself challenge!!!

Have you Googled yourself lately?

• Open a web browser, go to


https://www.google.com/ and do a
search using your own full name. you
must share your thoughts on what has come out of the search results.

Guide Questions

• Are you happy with the results?


• Would you want to be searchable on Google?
• Are you a smarter user of search engines?
• Do you always rely on the first search results online?
What’s New

“Googling”

Indeed, Google might be our “friend” but using search


engines for the sake of plain information could actually lead
you misinformed.
In order to stay meaningfully informed, you should start appreciating the use of the
right combination of words or key phrases.

SEARCH ENGINE

A search engine is a software system designed to search the Internet for documents
related to the keyword or search word used or entered into the system. Users are
able to maximize the potential of search engines by learning the proper searching
protocols.ii

TYPES OF SEARCH ENGINES

❑ Crawler-based search engine - It uses


a spider or a crawler to search the
Internet. The crawler digs through
individual web pages, pulls out
keywords, and then adds the pages to
the search engine's database. Google
and Yahoo are its examples.
❑ Directories - depend on human editors
to create their listings or database.
There are two types of directories: (1)
academic and professional
directories which are often created
and maintained by subject experts
to support the needs of researchers;
and (2) commercial and portal
directories that cater to the general
public and are competing for
Internet traffic.
❑ Hybrid search engine uses both
crawler based searches and directory searches to obtain their results.
❑ Meta search engines - transmit user supplied keywords simultaneously
to several individual search engines to carry out the search. In this type of
search engine, duplicates can be eliminated and clustering by subjects
within search is implemented.iii
ONLINE RESEARCH

In the Philippines, copyrights only last a lifetime (of the author) plus 50 years.
There are also provisions for “fair use”.

❑ Have a question in mind- Focus on a question you want answered.


❑ Narrow it down- Search engines like Google, Bing, or Yahoo use several
filters to determine the most appropriate result for you.
❑ Advanced Search- The best way to filter information
you get from search engines is by using the advanced
search.
❑ Look for a credible source- Some wikis, filled with
updated information, are not a credible source. When using
wikis, check out
the link of the cited texts.
❑ Give credit- Give credit to the original author
of the page or information. To properly site a
reference, you may use the format below

Symbol Function
Finds web pages that contain all the terms that are preceded by
+ the + symbol; allows you to include terms that are usually
ignored

““ Finds the exact words in a phrase

() Finds or excludes web pages that contain a group of words

AND or & Finds web pages that contain all the terms or phrases

NOT or - Excludes web pages that contain a term or phrase

OR or | Finds web pages that contain either of the terms or phrases


What’s More

Activity 3 Your Turn to Shine


Self-Check 3.1

On your activity sheets, complete the sentences with relevant


concepts:
3. When I search using “Jos” the search may result to:
4. If I will search the internet using AND, in the word,
online platforms the result is:
5. If I will use NOT in my search, what will be its result?

Take the Challenge!

1. Using google, search for the definition of the term


information and communication technology.
2. Use the tips given in this lesson to get the most
relevant information about the topic.
3. Have a documentation of what are the most useful
search tips you used to obtain the most relevant
information.
4. Be familiar with different types of search engines and have a list of
example for each category.iv

What’s More

Activity 1.1 Your Turn to Shine


Self-Check 1.1

1. Do you agree or disagree with the provisions of the


copyright law? Defend your answer.
2. How would you feel if someone posted something embarrassing about you?
What would you do?

Self-Check 1.1.1

Essay: Why is internet safety important?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
Essay: How misusing social media can create a negative digital foot print?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Take the Challenge!

Research on one momentous event in the Philippine history


wherein ICT play a huge role in making it a success.

What you will do

Each learner will create a Digital Poster that will show brief explanation in one
of the 10 Rules in Netiquette by Virginia Shea.
Assessment

Name: Score:
Section: Date:

Post-Test Matching Type: Match Column A with Column B. Write the letter of
the correct answer on the space before each number.

A B
___ 1. virus a) designed to send you advertisements
___ 2. rogue b) sends an official-looking email and is
designed to steal provision that allows you to
use copyrighted work sensitive personal
information
___ 3. keylogger c) without consent with certain limitations
___ 4. adware d) a browser feature that is synonymous to
"private" browsing
___ 5. spam e) replicates and can transfer from one
computer to another
___ 6. phishing f) exploits the DNS system
___ 7. fair use g) states that anyone who uses your work
without your consent is punishable by law
___ 8. spyware h) runs in the background and monitors what
you are doing
___ 9. private i) unwanted email mostly from bots
___ 10. malware j) disguised as a useful program but is not
___ 11. incognito k) the information superhighway
___ 12. internet l) tricks the user into posing that it is a
security software
___ 13. trojan m) a malicious software
___ 14. copyright n) an option to hide a post so that search
engines could not scan it
___ 15. pharming o) used to record the keystrokes done by the
user
Answer Key

References
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN
978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Patronage of Mary Development School (PMDS), Published on May 6, 2020;
https://www.slideshare.net/arias201625/empowerment-technologies-lesson-
2?qid=45c533b4-a83e-4e70-ae13-92c5b3b8b650&v=&b=&from_search=3
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 1.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 2.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 3.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 367,
paragraph 3.

i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.
iv
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 367, paragraph 3.

You might also like