Professional Documents
Culture Documents
1liye - Info Empowerment 2 PR
1liye - Info Empowerment 2 PR
Technologies
Quarter 1 – Module 2:
Internet as a Tool for Credible Research and
Information and Common Productivity Tools
What I Need to Know This will give you an idea of the skills or competencies
you are expected to learn in the module.
What I Know This part includes an activity that aims to check what
you already know about the lesson to take. If you get
all the answers correct (100%), you may decide to skip
this module.
What’s In This is a brief drill or review to help you link the current
lesson with the previous one.
What’s New In this portion, the new lesson will be introduced to you
in various ways such as a story, a song, a poem, a
problem opener, an activity or a situation.
What I Can Do This section provides an activity which will help you
transfer your new knowledge or skill into real life
situations or concerns.
NOTE: please do not write ANYTHING on this MODULE, write your answers on your notebook.
What I Need to Know
This module was designed and written with you in mind. It is here to help you master the
Empowerment Technologies. The scope of this module permits it to be used in many different learning
situations. The language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.
The module covers:
• Internet as A Tool for Credible Research and Information; and Common
Productivity Tools
After going through this module, you are expected to:
1. determine and avoid the dangers of the internet; and
2. be responsible in the use of social networking sites.
3. format pictures, clip art, shapes, SmartArt, charts and screen clippings.
4. Discuss the concept of Mail Merge;
5. Apply advanced formulas in Excel workbook.
6. Animate text or objects in a presentation; and
7. Apply timing in a presentation.
What I Know
Activity: e-Know
Directions: Write the word/group of words being described below on a separate sheet.
__________ 1. This is a scam where Scammers attempt to acquire sensitive information by
impersonating as a trustworthy entity.
__________ 2. It is a malicious software used to disrupt computer operations, gather sensitive
information, or gain access to private computer systems.
__________ 3. It is a software that has the capability to record every keystroke you make to a log file.
__________ 4. It is a program that, when executed, replicates by inserting copies of itself into other
computer programs, data files, or the boot sector of the hard drive.
__________ 5. It is the use of the Internet or other electronic means to stalk or harass an individual, a
group, or an organization.
__________ 6. It is the act of tormenting, threatening, harassing, or embarrassing another young person
using the internet or other technologies, like cellphones.
__________ 7. It focuses on the acceptable use of online resources in an online social environment.
__________ 8. It is a set of rules and norms for acceptable conduct or behavior online.
__________ 9. It is a type of scam that misleads the user in many ways attempting to take lead of them.
__________ 10. It refers to the practices and precautions that should be observed when using the Internet
to ensure that the users as well as their computers and personal information are safe
from crimes associated with using the internet.
What’s In
Activity : yourself challenge!!!
Do you remember the colors of each letter in the google?
• Using this Word Art, color the letters according to the Google logo.
What’s New
e-Guess Mo Yan!!!
Directions: Guess the Scrambled Letters on a separate sheet of paper.
AHERSC EEINGN NLINEO HERASC
SYROKEWD DNA SLMYBOS EIDYLRIBCIT
REBAEILL
What is It
Contextualized Online Search and Research Skills
Being a vast sea of information is one of the key features of the
Internet. it is such a big repository of data that is believed that one could
find out something about anything on the internet. Developing the
necessary knowledge and skills in online searching, however, is the key
to maximizing its use.i
SEARCH ENGINE
A search engine is a software system designed to search the
Internet for documents related to the keyword or search word used
or entered into the system. Users are able to maximize the
potential of search engines by learning the proper searching
protocols.ii
TYPES OF SEARCH ENGINES
❑ Crawler-based search engine - It uses a spider or a crawler to search the Internet. The crawler digs
through individual web pages, pulls out keywords, and then adds the pages to the search engine's
database. Google and Yahoo are its examples.
❑ Directories - depend on human editors to create their listings or database. There are two types of
directories: (1) academic and professional directories which are often created and maintained by
subject experts to support the needs of researchers; and (2) commercial and portal directories that
cater to the general public and are competing for Internet traffic.
❑ Hybrid search engine uses both crawler based searches and directory searches to obtain their
results.
❑ Meta search engines - transmit user supplied keywords simultaneously to several individual search
engines to carry out the search. In this type of search engine, duplicates can be eliminated and
clustering by subjects within search is implemented. iii
ONLINE RESEARCH
In the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also
provisions for “fair use”.
❑ Have a question in mind- Focus on a question you want answered.
❑ Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine
the most appropriate result for you.
❑ Advanced Search- The best way to filter information you get from search
engines is by using the advanced search.
❑ Look for a credible source- Some wikis, filled with updated information,
are not a credible source. When using wikis, check out
the link of the cited texts.
❑ Give credit- Give credit to the original author of the page or information.
To properly site a reference, you may use the format below
Symbol Function
Finds web pages that contain all the terms that are preceded by the + symbol;
+
allows you to include terms that are usually ignored
““ Finds the exact words in a phrase
() Finds or excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases
NOT or - Excludes web pages that contain a term or phrase
OR or | Finds web pages that contain either of the terms or phrases
What’s More
Activity: Your Turn to Shine
Self-Check 1.1 (Note: Write your answers on a separate sheet of paper)
1. Do you agree or disagree with the provisions of the copyright law? Defend your answer.
2. How would you feel if someone posted something embarrassing about you? What would you
do?
Activity: Self-Check 1.1 (Note: Write your answers on a separate sheet of paper)
• Essay: Why is internet safety important?
• Essay: How misusing social media can create a negative digital foot print?
SOURCE:
https://www.google.com/url?sa=i&url=https%3A%2F%2F
www.pinterest.com%2Ffunnybroad%2Fcyber-security-
awareness%2F&psig=AOvVaw0gldtD6uCdgFRjVUEdz0w
k&ust=1595322090839000&source=images&cd=vfe&ved
=0CAIQjRxqFwoTCICQ9Ia82-
oCFQAAAAAdAAAAABAa
Assessment
Activity Post-Test Matching Type: Match Column A with Column B. Write the letter of the
correct answer on the space before each number.
A B
___ 1. virus a) designed to send you advertisements
___ 2. rogue b) sends an official-looking email and is designed to steal
provision that allows you to use copyrighted work
sensitive personal information
___ 3. keylogger c) without consent with certain limitations
___ 4. adware d) a browser feature that is synonymous to "private"
browsing
___ 5. spam e) replicates and can transfer from one computer to another
___ 6. phishing f) exploits the DNS system
___ 7. fair use g) states that anyone who uses your work without your
consent is punishable by law
___ 8. spyware h) runs in the background and monitors what you are doing
___ 9. private i) unwanted email mostly from bots
___ 10. malware j) disguised as a useful program but is not
___ 11. incognito k) the information superhighway
___ 12. internet l) tricks the user into posing that it is a security software
___ 13. trojan m) a malicious software
___ 14. copyright n) an option to hide a post so that search engines could not
scan it
___ 15. pharming o) used to record the keystrokes done by the user
Reflection
Directions: In your notebook, journal or portfolio, write your personal insights about
the lesson by completing the following statements.
• Ctrl + M – Tab
• Ctrl + N – Create a new document
• Ctrl + O – Open a document
• Ctrl + A – Select All
• Ctrl + P – Display Print dialog box
• Ctrl + B – Bold Text
• Ctrl + R – Align Text to Right
• Ctrl + C – Copy Text
• Ctrl + S – Save a document
• Ctrl + D – Show Font Dialog Box
• Ctrl + U – Underline Text
• Ctrl + E – Align Text to Center
• Ctrl + V – Paste a copied text
• Ctrl + F – Display Find Dialog Box
• Ctrl + X – Cut a selected Text
• Ctrl + G – Display Go To Dialog Box
• Ctrl + Y – Redo the last undone
• Ctrl + H – Display Replace Dialog Box
action
•• Ctrl + I – Italicize Text
• Ctrl + Z – Undo the last action
• Ctrl + J – Justify Text
• Ctrl + K – Create a hyperlink
• Ctrl + L – Align Text to Left
We have
six STEPS
here…
Hi! I am Teacher
Golda!!!
I can help you with
Microsoft Excel!!!
EXAMPLES OF SPREADSHEET
SOFTWARE:
❑ LibreOffice Calc
❑ OpenOffice.org Calc
❑ Google Sheets
❑ Apple iWork Numbers
❑ Kingsoft Office Spreadsheets
❑ StarOffice Calc
❑ Microsoft Excel
Teacher Mary Angel here…
What’s More
Activity: Your Turn to Shine
Activity
In your activity sheet, using this table, list down the ADVANTAGES and DISADVANTAGES of
using POWERPOINT Presentations.
ADVANTAGES DISADVANTAGES
1. 1.
2. 2.
3. 3.
4. 4.
5. 5.
Now, write 3 separate words to sum up what you have learned in this module.
Activity Post-Test Matching Type: Match Column A with Column B. Write the letter of the
correct answer on the space before each number.
I. Multiple Choice. Write the letter of the correct answer on your activity sheet. (Learning
Activity Sheets)
1. What is the element of a formula that tells what operation to be performed?
a. Equal sign c. Operator
b. Cell reference d. Mathematical equations
2. A function that gets the average of a range of cells.
a. AVERAGE c. MEAN
b. SUM d. MEDIAN
3. A function used to count the number of cells that contains something in them if the criteria
are met.
a. COUNT c. COUNTING
b. COUNTNOW d. COUNTIF
4. What feature of Microsoft Word allows you to efficiently create documents that have the
same general content but may have different recipients or purpose?
a. mail merge c. send message
b. print merge d. view merge
5. What types of document can you create using mail merge?
a. envelopes c. posters
b. letters d. labels
6. Where can you find the Start Mail Merge button?
a. File tab c. reference tab
b. Mailing tab d. home tab
7. What essential component of mail merge is required from users when generating labels?
a. data file c. place holder
b. form document d. merge field
8. Among the text wrap options, which one allows you to place an image or external material
in line with the text, treating the image just like how a text is treated?
a. In line with text c. through
b. square d. tight
9. Use as many slides as you can so that the audience can clearly understand your >Smart
Art
10. Use bullets to simplify your message.
11. PowerPoint Presentation is a form of visual aid.
12. To insert a hyperlink, go to the Home tab then click the Hyperlink options.
13. Use dark fonts on dark backgrounds to gain proper contrast.
14. To embed an object, go to the Insert tab and under the text group, click object.
15. There are two options when inserting an object, create new from file and create new
from existing file.
Enrichment Activities
Activity:
1. On a piece of paper, create a simple flow chart that summarizes the steps in creating a merged
document.
2. Describe how or in what ways you can manage the recipients list.
3. In your own words, describe or enumerate the steps in generating labels.
Reflection
Directions: In your notebook, journal or portfolio, write your personal insights about
the lesson by completing the following statements.
What I Know
1-phishing
2-trojan
3-spyware
4-virus
5-cyber stalking
6-cyber bullying
7- 8-netiquette
9- 10-internet / online safety pa check
Po..
References
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-
23-7830-0
http://microscopy.berkeley.edu/courses/dib/sections/WP/WP_Graphics.html
Empowerment Technologies Textbook by Ivy M. Tarun - Isabela State University, Cabagan,
Philippines · College of Computing Studies Information and Communication Technology
https://www.google.com/search?q= +Crawler-
based+search+engine&client=opera&hs=Mrp&sxsrf=ALeKk02WxOqtz5AAtP5QHT7G5XRewGx8v
Q:1591661239058&source=lnms&tbm=isch&sa=X&ved=2ahUKEwi_zoaWuPPpAhW8yIsBHRuTB
cgQ_AUoAXoECBAQAw&biw=1326&bih=627#imgrc=vw4cGx2TbIfTAM
Lesson Discussion, Empowerment Technologies for Senior High School Copyright 2016 and
Distributed by Rex Book Store, Inc. RSBI, By Innovative Trainings Works, Inc.
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0; Published,
Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Reygie Fabro-College Instructor at Divine Word College of Laoag; Published on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Patronage of Mary Development School (PMDS), Published on May 6, 2020; https://www.slideshare.net/arias201625/empowerment-
technologies-lesson-2?qid=45c533b4-a83e-4e70-ae13-92c5b3b8b650&v=&b=&from_search=3
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma.
Clara St., Quezon City. Page 36, paragraph 1.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma.
Clara St., Quezon City. Page 36, paragraph 2.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma.
Clara St., Quezon City. Page 36, paragraph 3.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma.
Clara St., Quezon City. Page 367, paragraph 3.
i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., c or Ma. Clara St., Quezon
City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., c or Ma. Clara St., Quezon
City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon
City. Page 36, paragraph 3.