Professional Documents
Culture Documents
Quarter 1 – Module 1:
Introduction to ICT and Online Safety
What I Need to Know This will give you an idea of the skills or competencies
you are expected to learn in the module.
What I Know This part includes an activity that aims to check what
you already know about the lesson to take. If you get
all the answers correct (100%), you may decide to skip
this module.
What’s In This is a brief drill or review to help you link the current
lesson with the previous one.
What’s New In this portion, the new lesson will be introduced to you
in various ways such as a story, a song, a poem, a
problem opener, an activity or a situation.
What I Can Do This section provides an activity which will help you
transfer your new knowledge or skill into real life
situations or concerns.
NOTE: please do not write ANYTHING on this MODULE, write your answers on your notebook.
Introductory Message
For the facilitator:
This will aid in teaching competencies that are essential in the Information Age, such as the state of
ICT Technologies; online safety, security, ethics and etiquette; productivity tools with advanced
application techniques; imaging and designing for online environment; multimedia tools; and powerful
tools to create a social change, which are aligned to the standards set by the Department of Education
for the senior high school level.
(This module contains information about: the massive world of Information and Communication
Technology (ICT) has continued to shape the world including the Philippines. This unit allows you to
discover the world of ICT in general and also helps you improve your skills in various applications. It
also creates several real-life scenarios where you can use these applications and resources properly.
Quarter 1 – Module 2:
Internet as a Tool for Credible Research and
Information and Common Productivity Tools
What I Know
Activity: e-Know
Directions: Write the word/group of words being described below on a separate sheet.
__________ 1. This is a scam where Scammers attempt to acquire sensitive information by
impersonating as a trustworthy entity.
__________ 2. It is a malicious software used to disrupt computer operations, gather sensitive
information, or gain access to private computer systems.
__________ 3. It is a software that has the capability to record every keystroke you make to a log file.
__________ 4. It is a program that, when executed, replicates by inserting copies of itself into other
computer programs, data files, or the boot sector of the hard drive.
__________ 5. It is the use of the Internet or other electronic means to stalk or harass an individual, a
group, or an organization.
__________ 6. It is the act of tormenting, threatening, harassing, or embarrassing another young person
using the internet or other technologies, like cellphones.
__________ 7. It focuses on the acceptable use of online resources in an online social environment.
__________ 8. It is a set of rules and norms for acceptable conduct or behavior online.
__________ 9. It is a type of scam that misleads the user in many ways attempting to take lead of them.
__________ 10. It refers to the practices and precautions that should be observed when using the Internet
to ensure that the users as well as their computers and personal information are safe
from crimes associated with using the internet.
What’s In
What’s New
e-Guess Mo Yan!!!
Directions: Guess the Scrambled Letters on a separate sheet of paper.
AHERSC EEINGN NLINEO HERASC
SYROKEWD DNA SLMYBOS EIDYLRIBCIT
REBAEILL
What is It
Contextualized Online Search and Research Skills
Being a vast sea of information is one of the key features of the Internet. it
is such a big repository of data that is believed that one could find out something
about anything on the internet. Developing the necessary knowledge and skills in
online searching, however, is the key to maximizing its use. i
SEARCH ENGINE
A search engine is a software system designed to search the Internet for
documents related to the keyword or search word used or entered into the
system. Users are able to maximize the potential of search engines by
learning the proper searching protocols.ii
TYPES OF SEARCH ENGINES
❑ Crawler-based search engine - It uses a spider or a crawler to search the Internet. The crawler digs
through individual web pages, pulls out keywords, and then adds the pages to the search engine's
database. Google and Yahoo are its examples.
❑ Directories - depend on human editors to create their listings or database. There are two types of
directories: (1) academic and professional directories which are often created and maintained by
subject experts to support the needs of researchers; and (2) commercial and portal directories that
cater to the general public and are competing for Internet traffic.
❑ Hybrid search engine uses both crawler based searches and directory searches to obtain their
results.
❑ Meta search engines - transmit user supplied keywords simultaneously to several individual search
engines to carry out the search. In this type of search engine, duplicates can be eliminated and
clustering by subjects within search is implemented. iii
ONLINE RESEARCH
In the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also
provisions for “fair use”.
❑ Have a question in mind- Focus on a question you want answered.
❑ Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine
the most appropriate result for you.
❑ Advanced Search- The best way to filter information you get from search
engines is by using the advanced search.
❑ Look for a credible source- Some wikis, filled with updated information,
are not a credible source. When using wikis, check out
the link of the cited texts.
❑ Give credit- Give credit to the original author of the page or information.
To properly site a reference, you may use the format below
Symbol Function
Finds web pages that contain all the terms that are preceded by the + symbol;
+
allows you to include terms that are usually ignored
““ Finds the exact words in a phrase
() Finds or excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases
NOT or - Excludes web pages that contain a term or phrase
OR or | Finds web pages that contain either of the terms or phrases
What’s More
Activity: e-Fill Mo!!! (Note: Write your answers on a separate sheet of paper)
I am a student, I am going to post something online, but first I have to considered things up, like
________________________ it is a focus on a question you want answered. When I am searching I
should ________________________ it means search engines like Google, Bing, or Yahoo use several
filters to determine the most appropriate result for you. There are ___________________________
which is it is the best way to filter information you get from search engines is by using the advanced
search.
For me, to look for an authentic source I should ________________________, some wikis, filled
with updated information, are not a credible source. When using wikis, check out the link of the cited
texts. When I use information, I should ________________________, that should cite the original
author of the page or information.
Activity:
• Create a campaign material promoting “Think Before your click.” It could be in a form of poster.
SOURCE:
https://www.google.com/url?sa=i&url=https%3A%2F%2F
www.pinterest.com%2Ffunnybroad%2Fcyber-security-
awareness%2F&psig=AOvVaw0gldtD6uCdgFRjVUEdz0w
k&ust=1595322090839000&source=images&cd=vfe&ved
=0CAIQjRxqFwoTCICQ9Ia82-
oCFQAAAAAdAAAAABAa
Assessment
Post-Test Matching Type: Match Column A with Column B. Write the letter of the
correct answer on the space before each number.
A B
___ 1. virus a) designed to send you advertisements
___ 2. rogue b) sends an official-looking email and is designed to steal
provision that allows you to use copyrighted work
sensitive personal information
___ 3. keylogger c) without consent with certain limitations
___ 4. adware d) a browser feature that is synonymous to "private"
browsing
___ 5. spam e) replicates and can transfer from one computer to another
___ 6. phishing f) exploits the DNS system
___ 7. fair use g) states that anyone who uses your work without your
consent is punishable by law
___ 8. spyware h) runs in the background and monitors what you are doing
___ 9. private i) unwanted email mostly from bots
___ 10. malware j) disguised as a useful program but is not
___ 11. incognito k) the information superhighway
___ 12. internet l) tricks the user into posing that it is a security software
___ 13. trojan m) a malicious software
___ 14. copyright n) an option to hide a post so that search engines could not
scan it
___ 15. pharming o) used to record the keystrokes done by the user
What I Know
Activity: e-Know
These are features in Microsoft Word, Microsoft Excel and
Microsoft PowerPoint. Can you name these features?
NOTE: In a separate sheet answer the following and
please do not write anything on this module
What is It
I want to know how these topics in this
book are proofread?
• Ctrl + M – Tab
• Ctrl + N – Create a new document
• Ctrl + A – Select All • Ctrl + O – Open a document
• Ctrl + B – Bold Text • Ctrl + P – Display Print dialog box
• Ctrl + C – Copy Text • Ctrl + R – Align Text to Right
• Ctrl + D – Show Font Dialog Box • Ctrl + S – Save a document
• Ctrl + E – Align Text to Center • Ctrl + U – Underline Text
• Ctrl + F – Display Find Dialog Box • Ctrl + V – Paste a copied text
• Ctrl + G – Display Go To Dialog Box • Ctrl + X – Cut a selected Text
• Ctrl + H – Display Replace Dialog Box • Ctrl + Y – Redo the last undone
• Ctrl + I – Italicize Text action
•• Ctrl + J – Justify Text • Ctrl + Z – Undo the last action
• Ctrl + K – Create a hyperlink
• Ctrl + L – Align Text to Left
We have
six STEPS
here…
Hi! I am Teacher
Golda!!!
I can help you with
Microsoft Excel!!!
EXAMPLES OF SPREADSHEET
SOFTWARE:
❑ LibreOffice Calc
❑ OpenOffice.org Calc
❑ Google Sheets
❑ Apple iWork Numbers
❑ Kingsoft Office Spreadsheets
❑ StarOffice Calc
❑ Microsoft Excel
Teacher Mary Angel here…
What’s More
Activity: Your Turn to Shine
Activity
In your activity sheet, using this table, list down the ADVANTAGES and DISADVANTAGES of
using POWERPOINT Presentations.
ADVANTAGES DISADVANTAGES
1. 1.
2. 2.
3. 3.
4. 4.
5. 5.
Now, write 3 separate words to sum up what you have learned in this module.
9. Use as many slides as you can so that the audience can clearly understand your >Smart
Art
10. Use bullets to simplify your message.
11. PowerPoint Presentation is a form of visual aid.
12. To insert a hyperlink, go to the Home tab then click the Hyperlink options.
13. Use dark fonts on dark backgrounds to gain proper contrast.
14. To embed an object, go to the Insert tab and under the text group, click object.
15. There are two options when inserting an object, create new from file and create new
from existing file.
Reflection
Directions: In your notebook, journal or portfolio, write your personal insights about
the lesson by completing the following statements.
✓ I understand that ________________________________________________
__________________________________________________________________
References
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-
23-7830-0
http://microscopy.berkeley.edu/courses/dib/sections/WP/WP_Graphics.html
Empowerment Technologies Textbook by Ivy M. Tarun - Isabela State University, Cabagan,
Philippines · College of Computing Studies Information and Communication Technology
https://www.google.com/search?q= +Crawler-
based+search+engine&client=opera&hs=Mrp&sxsrf=ALeKk02WxOqtz5AAtP5QHT7G5XRewGx8v
Q:1591661239058&source=lnms&tbm=isch&sa=X&ved=2ahUKEwi_zoaWuPPpAhW8yIsBHRuTB
cgQ_AUoAXoECBAQAw&biw=1326&bih=627#imgrc=vw4cGx2TbIfTAM
Lesson Discussion, Empowerment Technologies for Senior High School Copyright 2016 and
Distributed by Rex Book Store, Inc. RSBI, By Innovative Trainings Works, Inc.
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0; Published,
Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Reygie Fabro-College Instructor at Divine Word College of Laoag; Published on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.