You are on page 1of 12

NAME: _______________________________________ COURSE & SECTION _______________________

BUILDING AND ENHANCING NEW LITERACIES ACROSS THE CURRICULUM (ProfEd - PCK6)
First Semester S.Y. 2020-2021
Module 14

4E. Digital Literacy


E. Researching and evaluating the web
F. Social media use
G. Mobile devices
H. Digital traits
I. Introduction / Rationale
The Internet is a digital world at our fingertips, just brimming with information waiting to be discovered. But
what are the most effective ways of exploring that world? You should know that the Internet is a global
communication network that allows computers to exchange and share information worldwide. The Internet
makes it possible for people around the world to connect and share ideas across time zones and geographical
locations. However, because cyberspace is such a large realm, it is easy to get "lost". It can sometimes be
difficult to find the information you need. So, the most effective way to explore the Internet is to have strategies
in place for doing research on the Web and for evaluating the websites you find there.
II- Learning Objective
At the end of the unit, pre-service teachers should be able to:
a. examine the ethical considerations of using digital media
b. demonstrate skills in the positive use of ICT
c. evaluate cyber threats, cases and media
III- Content
E. Researching and evaluating the web
What is a Website?
A website is a collection of publicly accessible, interlinked Web pages that share a single domain name.
Websites can be created and maintained by an individual, group, business or organization to serve a variety of
purposes. Together, all publicly accessible websites constitute the World Wide Web.
Three key factors to surfing the web
1. Search
Most surfing sessions start with the user typing targeted keywords about a subject into a search engine.
Often, it's helpful to employ a Boolean search, linking keywords with and, or, or not.
2. Strategy
Good strategies for searching the Web include writing research questions; extracting keywords from the
questions and typing them into a search engine; using synonyms if the keywords don't bring up the
results you want; keeping track of which keywords and synonyms you use; and recording the results of
your searches.
3. Safety
You should always be cautious about what information you share online and which websites you visit.
Evaluating the web
1. Author
Who is the author or publisher of the website? You'll want to look at the credentials of the blogger,
company, or expert and determine if he or she has the qualifications to provide information on the
subject you are researching. Blogger names are often listed at the top or bottom of a blog post or in a
sidebar. Some websites do not list specific authors, but you can learn more about the credibility of a
company or a purported expert by reviewing the site's "About" page, if one is available.
2. Contact
Is contact information available? Most credible websites will list contact information such as a telephone
number, an email address, or a mailing address so that users may get in touch if they have questions.
3. Fact vs. Opinion
Is the author writing from experience, using experts and research to discuss ideas, or simply giving an
opinion? If you're doing research for a school paper, you'll want to stick with sites that present factual
information offered by experts, rather than opinions. Be on the lookout for biases, too. A bias is a
prejudice for or against something. If the author is biased, the information on the site might be one-sided.
4. Date
When was the website published or updated? Look for copyright information at the bottom of a
website's home page. If the site is more than a few years old and it has not been updates regularly, you
may not be getting the most up-to-date information.
5. Purpose
What is the purpose of the site? Is it to sell, inform, or discuss? Analyze the goals of the website to
determine if you are reading an informational site or what amounts to an advertisement.
6. URL
What does the URL look like? Does it have a URL ending in .edu for education, .gov for
government, .org for organization, .com for commercial sites, or .net for network sites? Different
websites have different URLs. To help determine a site's credibility, you'll want to determine if you are
visiting a personal website or blog, a government website, or another type of website.
 Websites ending in .gov are government-related websites. Generally, they can be trusted
to provide credible statistical information, articles on many different topics, and
government news.
 Websites ending in .edu are the websites of educational institutions, such as colleges and
universities. These sites usually offer a variety of credible data, especially about the
school's operations and the research findings of its faculty and staff.
 Websites ending in .org are the websites or organizations. Some provide credible
information; they may sometimes be advertising products or services, too. Some
organizations show considerable bias as well, so you must evaluate .org sites carefully.
 Websites with the top-level domains of .biz, .com, and .net deserve a higher level of
scrutiny. For the most part, they are less likely to provide accurate information, especially
because many of them are corporate or e-commerce websites bent on selling products to
consumers. However, there are some exceptions. Most news organizations for example,
have .com websites, and they generally strive to provide the most accurate, unbiased
information possible.
IV- Self- Test
1. These websites are government-related websites.
a. .edu b. .gov
c. .org d. .com
2. These are websites of educational institutions, such as colleges and universities.
a. .edu b. .gov
c. .org d. .com
3. These sites usually offer a variety of credible data, especially about the school's operations and the research
findings of its faculty and staff.
a. .edu b. .gov
c. .org d. .com
4. These websites deserve a higher level of scrutiny.
a. .edu b. .gov
c. .org d. .com
5. These are websites of organizations.
a. .edu b. .gov
c. .org d. .com
F. Social media use
What is Social Media?
Social media is a collective term for websites and applications which focus on communication, community-
based input, interaction, content-sharing and collaboration. Different types of social media are normally
dedicated to forums, micro-blogging, social networking, social bookmarking, social curation, and wikis are
among the.
Facebook is a popular free social networking website that allows registered users to create profiles,
upload photos and video, send messages and keep in touch with friends, family and colleagues.
Twitter is a free microblogging service that allows registered members to broadcast short posts called
tweets. Twitter members can broadcast tweets and follow other users' tweets by using multiple platforms and
devices.
Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a
community of users known as Wikipedians. Anyone registered on the site can create an article for publication;
however, registration is not required to edit articles. Wikipedia was founded in January of 2001.
LinkedIn is a social networking site designed specifically for the business community. The goal of the
site is to allow registered members to establish and document networks of people they know and trust
professionally.
Reddit is a social news website and forum where stories are socially curated and promoted by site
members. The site is composed of hundreds of sub-communities, known as "subreddits." Each subreddit has a
specific topic such as technology, politics or music. Reddit site members, also known as, "redditors," submit
content which is then voted upon by other members. The goal is to send well-regarded stories to the top of the
site's main thread page.
Pinterest is a social curation website for sharing and categorizing images found online. Pinterest
requires brief descriptions, but the main focus of the site is visual. Clicking on an image will take a user to the
original source. For example, clicking on a picture of a pair of shoes might redirect users to a purchasing site
and an image of blueberry pancakes might redirect to the recipe.
Social Media Etiquette
1. Don’t Mix Business and Pleasure
Some public figures get paid to post outrageous or inspiring things on their social media accounts, but
mere mortals don’t have this privilege. If your job requires you to maintain a social media account with your
name on it, don’t use it to talk about where you’re going clubbing tonight, or to share photos of your new puppy.
Keep separate accounts for this type of engagement. If the handles of your personal and business accounts are
similar, clearly indicate which account is which in the about section. To soften the blow of questionable content,
attach a disclaimer, such as “All views expressed are my own,” to your personal Twitter and Facebook accounts.
2. Use Caution Posting and Tagging Photos
You probably don’t appreciate it when your friends tag you in unflattering or candid photos, so why put
them in the same position? If you’re posting a group photo, ask permission before tagging your friends, or post
the photo with the caption “Tag yourself” to encourage others to take the initiative. Also, make sure your profile
pictures, especially on business-focused social sites such as LinkedIn, are professional. Crisp, high-resolution
head shots work best.
3. Be Self-Centered in Small Doses
Even if you understand you’re not the center of the universe, your social media presence could be
singing a different tune. Before you post, tweet, or share anything, think about how others might interpret it –
will it be perceived as insightful and informative, or crass and boring? This is particularly important if you
depend on Facebook, Twitter, Google+, LinkedIn, and other tools to market your professional side.
4. Understand That Your Sense of Humor Isn’t Universal
Unless you’re sending a private message, your social media posts reach well beyond your friends and
family members. What flies in the locker room or frat house might not be kosher in a setting where people from
different backgrounds congregate. This doesn’t mean you can’t use well-placed humor in your posts – just make
sure it’s appropriate.
5. Don’t Be Reactive
There are many ways to start a social media spat, from personally responding to a politically tinged
Facebook post, to publicly calling someone out for wrongdoing. No matter how the fight starts, the results
aren’t constructive. In addition to alienating your adversary and his or her associates, you could develop a
reputation as a hot head. And if you’re a senior employee, such as a VP or public relations specialist, your
employer could take action against you, even if the dispute has nothing to do with your job.
6. Avoid Over-Sharing
Your social media feeds shouldn’t read like an inner monologue. Occasionally sharing what your cat’s
up to or how awesome dinner was last night is fine. But over-sharing – as in posting your cereal choice every
morning – is the quickest way to lose your friends and followers. Even if you don’t use your accounts for
professional purposes, your social presence is a big part of your personal brand. You want your brand to be
interesting, engaging, and representative of your best characteristics. You don’t want to dilute it with scads of
irrelevant posts.
7. Build a Legacy for the Future
It’s standard for employers and educational institutions to vet candidates’ social media activity before
granting an interview or accepting an application, so be sure that your accounts don’t jeopardize your chances.
Ramp up the privacy settings on your personal accounts so your posts aren’t visible to non-contacts. Remove
and un-tag morally or legally questionable photos. Find and delete any disparaging comments you’ve made
about previous employers or colleagues. Make sure your LinkedIn profile has an updated resume, and begin
engaging with relevant professional groups.
8. Don’t Misrepresent Yourself
Dishonesty can have serious personal and professional consequences, even on social media. It might feel
easy to misrepresent yourself when you’re hiding behind a screen, but even a seemingly innocent
embellishment on your LinkedIn profile, such as inventing a more impressive title at a previous job, could get
you canned. Using social media to take credit for the achievements of your coworkers is also a no-no.
9. Don’t Drink and Tweet
If you’re impaired in any way – lack of sleep, jet lag, or one too many drinks – you’re more likely to
break the rules of social media etiquette. If you’d feel unsafe behind the wheel, wait to engage online until
you’re in a better frame of mind. Similarly, if your first instinct after a hard day at work or a fight with your
partner is to vent digitally, resist the temptation. You’re liable to say something that could damage your
personal or professional reputation.
10. Understand Each Platform’s Best Practices
Some social media etiquette principles are broadly applicable, and many are extensions of offline
courtesy. But others, such as what to include in direct messages on Twitter, and when or with whom to connect
on LinkedIn, are platform-specific. Before you become an active user of a new social media platform, read up
on its best practices. And since these practices can change as new features emerge, study up each month to stay
current.
IV- Self- Test
1. If your job requires you to maintain a social media account with your name on it, don’t use it to talk about
where you’re going clubbing tonight, or to share photos of your new puppy.
a. Sense of Humor Isn’t Universal
b. Be Self-Centered in Small Doses
c. Use Caution Posting and Tagging Photos
d. Don’t Mix Business and Pleasure
2. Even if you understand you’re not the center of the universe, your social media presence could be singing a
different tune.
a. Sense of Humor Isn’t Universal
b. Be Self-Centered in Small Doses
c. Use Caution Posting and Tagging Photos
d. Don’t Mix Business and Pleasure
3. If you’re posting a group photo, ask permission before tagging your friends, or post the photo with the
caption “Tag yourself” to encourage others to take the initiative.
a. Sense of Humor Isn’t Universal
b. Be Self-Centered in Small Doses
c. Use Caution Posting and Tagging Photos
d. Don’t Mix Business and Pleasure
4. What flies in the locker room or frat house might not be kosher in a setting where people from different
backgrounds congregate.
a. Sense of Humor Isn’t Universal
b. Be Self-Centered in Small Doses
c. Use Caution Posting and Tagging Photos
d. Don’t Mix Business and Pleasure
5. No matter how the fight starts, the results aren’t constructive. In addition to alienating your adversary and
his or her associates, you could develop a reputation as a hot head.
a. Don’t Be Reactive
b. Be Self-Centered in Small Doses
c. Use Caution Posting and Tagging Photos
d. Don’t Mix Business and Pleasure

G. Mobile devices
What is a Mobile Device?
A mobile device is a general term for any type of handheld computer. These devices are designed to be
extremely portable, and they can often fit in your hand. Some mobile devices—like tablets, e-readers, and
smartphones—are powerful enough to do many of the same things you can do with a desktop or laptop
computer.
Types of Mobile Devices
1. Smartphones
With the rise of Android and iOS, smartphones are the most popular mobile device right now, and for a
good reason. These devices are handheld, can fit in a pocket, have a million and one uses, and help keep
us connected at all times thanks to a constant network connection from a wireless carrier. There are
many different device choices, so it should be easy to find a one that meets all of you needs.
2. Tablets
Similarly to smartphones, tablets share many of the same benefits but in a larger form factor. A tablet
really shines when performing tasks that would be more suitable for a larger display with more battery
life. Some examples include work presentations, heavy gaming, or even live streaming of shows in high
definition on Netflix.
3. Laptop Computers
These devices have always been popular because they give us the functionality of a desktop computer
that we can take anywhere. We can use the same operating system with the same programs, which
means there is no device learning curve. Having a full-sized keyboard, the same input/output ports and
the ability to connect an external display are some added benefits as well.

4. Smartwatches
These devices are relatively new and play in somewhat of a niche market at this point in time. The main
benefits a smartwatch can provide us with are the ability to get notifications and necessary information
on our wrist without having to pick up another device. With some of the new standalone models, we can
even take and receive phone calls just like our smartphones can.
5. E-readers
We have had these devices around for many years, and they share some commonalities with a tablet, but
their primary purpose is for reading. The Amazon Kindle and Barnes & Noble Nook have made the e-
reader a popular choice for people who enjoy reading books in a digital format. These devices changed
the whole concept of reading and helped to bring books into a new era.
6. Handheld Gaming Consoles
These devices go way back to Nintendo's Gameboy, and have forever changed how we think about
mobile gaming. Some of the most well known mobile gaming devices we have today include the
Nintendo Switch and the Nintendo 3DS. Gaming is now one of the most popular forms of entertainment,
and there will always be a need for such devices.
IV- Self- Test
1. With the rise of Android and IOS, These are the most popular mobile device right now, and for a good reason.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
2. These devices are handheld, can fit in a pocket, have a million and one uses, and help keep us connected at
all times thanks to a constant network connection from a wireless carrier.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
3. These devices have always been popular because they give us the functionality of a desktop computer that we
can take anywhere.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
4. Similarly to smartphones, tablets share many of the same benefits but in a larger form factor. A tablet really
shines when performing tasks that would be more suitable for a larger display with more battery life.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
5. It can provide us with are the ability to get notifications and necessary information on our wrist without
having to pick up another device.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches

H. Digital traits
What is Cyber Traits?
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices,
programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as
information technology security.
1. Modest. Those that tend to excel in cybersecurity typically prefer to avoid the spotlight. A successful
cybersecurity agenda is not egotistical or fame hungry and instead favours a more low-key lifestyle. After all,
most of the well-known names in cybersecurity are notorious cyber-criminals.
2. Altruistic. Cybersecurity professionals should want to help people. While they are working all day with
systems and programming, protecting and helping people is at the core of this profession. They should work
well with others and avoid isolating themselves. Fighting threats will require cooperation and trust between
colleagues as they are striving together towards the same security goals.
3. Composed. The enterprise systems they are protecting from attacks are always under threat. Cybersecurity
agents naturally need to have a sense of urgency, but it is crucial that they stay composed handling cyber threats.
Unnecessary outbursts when the pressure is rising can be counterproductive and shift their attention away from
what is at stake.
4. Scientific. The perfect cybersecurity professional wants to solve problems using data and analytic skills.
Cybercriminals are increasingly sophisticated in their attacks and this requires individuals who are highly
technical and value evidence-based decision making.
5. Inquisitive. The world of cybersecurity is ever changing. When threats are prevented, new ones emerge
which can require a completely different set of skills than the ones needed previously. A successful
cybersecurity candidate is imaginative, curious and creative. They need to figure things out quickly, show the
motivation to learn and be open to new ideas.
6. Sceptical. ‘Trust no one’ would be a useful motto for a cybersecurity worker. To get ahead of the game and
prevent attacks means sometimes having to think like a hacker. This means maintaining suspicion about what’s
going on around you because in a world of constant threats, naivety can be a dangerous thing.
7. Responsive. In cybersecurity, things can go wrong quickly, and you might be blamed for breaches that
weren’t your fault. If someone in the company opens a phishing email and exposes sensitive information, you
might be held accountable. It is thus very important for a cybersecurity worker to be open and responsive to
criticisms and avoid being passive-aggressive.
8. Diligent. In a pressured environment with a firm’s security at stake, a successful candidate needs to be detail-
oriented and constantly pushing projects to completion. One small oversight could lead to attacks, so
cybersecurity specialists need to scrutinise every detail. They also need to value achievement and making an
impact.
IV- Self- Test
1. The enterprise systems they are protecting from attacks are always under threat. Cybersecurity agents
naturally need to have a sense of urgency, but it is crucial that they stay composed handling cyber threats.
a. Modest b. Altruistic
c. Composed d. Scientific
2. Cybersecurity professionals should want to help people. While they are working all day with systems and
programming, protecting and helping people is at the core of this profession. They should work well with others
and avoid isolating themselves.
a. Modest b. Altruistic
c. Composed d. Scientific
3. Those that tend to excel in cybersecurity typically prefer to avoid the spotlight. A successful cybersecurity
agenda is not egotistical or fame hungry and instead favours a more low-key lifestyle.
a. Modest b. Altruistic
c. Composed d. Scientific
4. The perfect cybersecurity professional wants to solve problems using data and analytic skills. Cybercriminals
are increasingly sophisticated in their attacks and this requires individuals who are highly technical and value
evidence-based decision making.
a. Modest b. Altruistic
c. Composed d. Scientific
5. The world of cybersecurity is ever changing. When threats are prevented, new ones emerge which can require
a completely different set of skills than the ones needed previously. They need to figure things out quickly,
show the motivation to learn and be open to new ideas.
a. Modest b. Altruistic
c. Composed d. Inquisitive
V- Learning Activity
INSTRUCTION: (Group work) Present teaching strategies showcasing the positive use of ICT to
promote learners’ digital literacy.
Output: Group project

RUBRIC FOR TEACHING STRATEGIES SHOWCASING THE POSITIVE USE OF ICT


VI. Assessment / Reflection
INSTRUCTION: Write a reflection based on the film viewed from youtube about environmental
problems in the Philippines
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________

VII. Feedback / Comment


_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
VIII. Post -Test on 4E. Digital Literacy
E. Researching and evaluating the web
F. Social media use
G. Mobile devices
H. Digital traits
1. Most surfing sessions start with the user typing targeted keywords about a subject into a search engine. Often,
it's helpful to employ a Boolean search, linking keywords with and, or, or not.
a. Safety b. Strategy
c. Search d. Website
2. It website is a collection of publicly accessible, interlinked Web pages that share a single domain name.
a. Safety b. Strategy
c. Search d. Website
3. It can be created and maintained by an individual, group, business or organization to serve a variety of
purposes. Together, all publicly accessible websites constitute the World Wide Web.
a. Safety b. Strategy
c. Search d. Website
4. You should always be cautious about what information you share online and which websites you visit.
a. Safety b. Strategy
c. Search d. Website
5. Extracting keywords from the questions and typing them into a search engine.
a. Safety b. Strategy
c. Search d. Website
6. Most credible websites will list contact information such as a telephone number, an email address, or a
mailing address so that users may get in touch if they have questions.
a. Author b. Contact
c. Date d. Fact vs. Opinion
7. Analyze the goals of the website to determine if you are reading an informational site or what amounts to an
advertisement.
a. Author b. Contact
c. Date d. Purpose
8. You'll want to look at the credentials of the blogger, company, or expert and determine if he or she has the
qualifications to provide information on the subject you are researching.
a. Author b. Contact
c. Date d. Purpose
9. It is a collective term for websites and applications which focus on communication, community-based input,
interaction, content-sharing and collaboration.
a. Facebook b. Twitter
c. Pinterest d. Social Media
10. It is a free microblogging service that allows registered members to broadcast short posts called tweets.
Twitter members can broadcast tweets and follow other users' tweets by using multiple platforms and devices.
a. Facebook b. Twitter
c. Pinterest d. Social Media
11. It is a popular free social networking website that allows registered users to create profiles, upload photos
and video, send messages and keep in touch with friends, family and colleagues.
a. Facebook b. Twitter
c. Pinterest d. Social Media
12. It is a social curation website for sharing and categorizing images found online. Pinterest requires brief
descriptions, but the main focus of the site is visual. Clicking on an image will take a user to the original source.
a. Facebook b. Twitter
c. Pinterest d. Social Media
13. We have had these devices around for many years, and they share some commonalities with a tablet, but
their primary purpose is for reading.
a. Smartphones b. Tablets
c. E-readers d. Handheld Gaming Consoles
14. These devices go way back to Nintendo's Gameboy, and have forever changed how we think about mobile
gaming.
a. Smartphones b. Tablets
c. E-readers d. Handheld Gaming Consoles
15. One small oversight could lead to attacks, so cybersecurity specialists need to scrutinise every detail. They
also need to value achievement and making an impact.
a. Inquisitive b. Sceptical
c. Responsive d. Diligent
16. ‘Trust no one’ would be a useful motto for a cybersecurity worker. To get ahead of the game and prevent
attacks means sometimes having to think like a hacker.
a. Inquisitive b. Sceptical
c. Responsive d. Diligent
17. It is thus very important for a cybersecurity worker to be open and responsive to criticisms and avoid being
passive-aggressive.
a. Inquisitive b. Sceptical
c. Responsive d. Diligent
18. Be on the lookout for biases, too. A bias is a prejudice for or against something. If the author is biased, the
information on the site might be one-sided.
a. Author b. Contact
c. Date d. Fact vs. Opinion
19. Your social media feeds shouldn’t read like an inner monologue. Occasionally sharing what your cat’s up to
or how awesome dinner was last night is fine. But not every time –as in posting your cereal choice every
morning.

a. Avoid Over-Sharing
b. Build a Legacy for the Future
c. Don’t Misrepresent Yourself
d. Don’t Drink and Tweet
20. Ramp up the privacy settings on your personal accounts so your posts aren’t visible to non-contacts.
Remove and un-tag morally or legally questionable photos.
a. Avoid Over-Sharing
b. Build a Legacy for the Future
c. Don’t Misrepresent Yourself
d. Don’t Drink and Tweet
IX- Referrences:
https://www.techopedia.com/definition/5411/website

http://frimmerclass.weebly.com/exploring-the-internet-researching-and-evaluating-the-web.html

https://whatis.techtarget.com/definition/social-media

https://www.moneycrashers.com/social-media-etiquette-tips-personal-business/

https://edu.gcfglobal.org/en/computerbasics/mobile-devices/1/

https://www.computerhope.com/jargon/m/mobile.htm

https://study.com/academy/lesson/mobile-devices-examples-impact-trends.html

https://edu.gcfglobal.org/en/computerbasics/mobile-devices/1/

https://www.computerhope.com/jargon/m/mobile.htm

https://irishtechnews.ie/the-8-personality-traits-to-succeed-in-cybersecurity/

https://digitalguardian.com/blog/what-cyber-security

You might also like