You are on page 1of 38

SENIOR HIGH SCHOOL

11/12

EMPOWERMENT
TECHNOLOGY
1ST SEMESTER - FIRST QUARTER 2ND SEMESTER - THIRD QUARTER
1ST SEMESTER - SECOND QUARTER 2ND SEMESTER - FOURTH QUARTER

LEARNING ACTIVITY SHEET

Note: Practice Personal Hygiene protocols at all times.


H.F.E.

i
TABLE OF CONTENTS

COMPETENCIES PAGE NO.

Compare and contrast the nuances of varied online 1


platforms, sites, and content to best achieve specific class
objectives or address situational challenges.

Apply online safety, security, ethics, and etiquette 10


standards and practice in the use of ICTs as it would relate
to their specific professional tracks.

Use the Internet as a tool for credible research and 24


information gathering to best achieve specific class
objectives or address situational.

Note: Practice Personal Hygiene protocols at all times.


H.F.E.

ii
Republic of the Philippines
Department of Education

Name of Student:
Grade and Section:
Learning Area: Empowerment Technology
Lesson Content: What is Information and Communications Technology?
Date: WEEK 1 ______________________

LEARNING ACTIVITY SHEET # 1

I. Background Information for Learners:

This lesson will give you an introduction into ICT and the different online
platforms that may be used for its specific purpose. It allows you to discover the
world of ICT in general and helps you improve your skills in various applications.
This learning activity sheet contains different learning activities on the
internet and computer readiness, evaluate and compare Web 1.0, 2.0 and 3.0,
and identify the correct web platform for Social Change.

Key Words and Concepts

 Web 1.0 – static websites without interactivity


 Web 2.0 – websites that contain dynamic content.
 Web 3.0 – a concept of the World Wide Web that is designed to cater to the individual
user.
 Static – refers to the web pages that are the same regardless of the user.
 Dynamic - refers to the web pages that are affected by user input or preference.
 Folksonomy- allows users to categorize and classify/arrange information.
 Hashtag – use to “categorize” posts on the website.
 Convergence - the synergy of technological advancements to work on a similar goal
or task.
Note: Practice Personal Hygiene protocols at all times. H.F.E.

1
 Social Media - websites, applications, or online channels that enable user to create,
co-create, discuss, modify, and exchange user-generated content.
 Digital Native - a person born or brought up during the age of digital technology and
therefore familiar with computers and the Internet from an early age.

Information and Communications Technology (ICT) often deals with the use of
different technologies such as mobile phones, telephones, computer, Internet,
and other devices, as well as software and applications to locate, save, send, and
manipulate information. Empowering ICT is important for its innovative uses
impacts our daily lives. It has affected our ways of communicating, made our lives
more convenient, and assisted countries towards their modernization plans. Thus,
there is a need to create a foundation of understanding in the world of ICT.

ICT in the Philippines


Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers. In a data gathered
by the Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares
19.3% of the total employment population.

When the internet was fully commercialized in 1995, it has tremendously impacted
culture and commerce, including the rise of near instant communication by email, instant
messaging, telephony (Voice over Internet Protocol or VoIP), two-way interactive video
calls, and the World Wide Web with its discussion forums, blogs, social networking,
and online shopping sites. Internet is the global system of interconnected computer
networks that uses the Internet protocol suite (TCP/IP) to communicate between networks
and devices.

The World Wide Web

The World Wide Web is an information system on the Internet that allows documents
to be connected to other documents by hypertext links, enabling the user to search for
information by moving from one document to another. It was invented by Tim-Berners Lee.
The World Wide Web browser software, such as Microsoft's Internet Explorer/Edge, Mozilla
Firefox, Opera, Apple's Safari, and Google Chrome, let users navigate from one web page
to another via the hyperlinks embedded in the documents. These documents may also
contain any combination of computer data, including graphics, sounds, text, video,
multimedia and interactive content that runs while the user is interacting with the page. The
Web has enabled individuals and organizations to publish ideas and information to a
potentially large audience online at greatly reduced expense and time delay.

Types of Web Pages

 Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat
or stationary page since it cannot be manipulated by the user.
 Web 2.0 or The Social Web allows users to interact with the page, the user may be
able to comment or create a user account. Most website that we visit today are Web
2.0.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

2
 Web 3.0 or Semantic Web. The semantic web provides a framework that allows
data to be shared and reuse to deliver web content specifically targeting the user.
Search Engine will learn about you and your habits from each search you perform
and will gather details about you from your previous activities like likes and social
postings and present the answers as per your preferences.

Below is a comparison of Web 1.0, Web 2.0 and Web 3.0:

CRITERIA WEB 1.0 WEB 2.0 WEB 3.0


Communication Broadcast Interactive Engaged/ Invested
Information Static/ Read-only Dynamic Portable & Personal
Focus Organization Community Individual
Content Ownership Sharing Immersion
Interaction Web Forms Web Application Smart Applications
Search Directories Tags/ Keywords Context/ Relevance
Metrics Page Views Cost per Click User Engagement
Advertising Banners Interactive Behavioral
Technologies HTML/ FTP Flash/ Java/ XML RDF/ RDFS/ OWL

Features of Web 2.0


FEATURES WEB 2.0
FOLKSONOMY allows users to collectively classify and find information using
freely chosen keywords (e.g. "tagging" by facebook). Tagging
uses the pound sign #, often referred to as hastag.
RICH USER dynamic content that is responsive to user input (e.g., a user can
EXPERIENCE "click" on an image to enlarge it or find out more information)

USER the owner of website is not the only one who is able to put
PARTICIPATION content. Others are able to place a content on their own by
means of comments, reviews, and evaluation.
LONG TAIL services that are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spent in the Internet, or
a data plan that charges you for the amount of bandwidth you
used.
SOFTWARE AS users will subscribe to a software only when needed rather
A SERVICE than purchasing them.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

3
Online Platforms and Sites

Because of the wide capacity of Web 2.0, it has helped in creating dynamic online
platform sites. Online platform is a specially developed platform using Internet technology.
Online platforms have revolutionized access to any information. Online platforms currently
include, but are not limited to:

1. Presentation or Visualization Platform allows you to present and share


presentations, infographics and videos with other people. It is used to communicate
information clearly and efficiently.
2. Cloud Computing Platform is also called as “The cloud.” It is the practice of using a
network of remote servers hosted on the internet. Instead of using your computer’s
hard drive, you store and access your data and programs over the Internet.

3. File Management Platform is used for the storing, naming, sorting, and handling of
computer files. Allows you to convert and manage files without download in the
software tool.

4. Mapping Platform is a transformation taking the points of one space into the points of
the same or another space. Uses GPS to detect location and used for navigation.

5. Social Media Platform is a computer-mediated tools that allow large group of people
to create, share or exchange information, interest and the information shared can be
in the form of ideas, pictures, videos or anything that you want to create and share to
virtual communities. It can be in the following platforms:
Social Networks. These sites allow you to connect with other people with
the same interests or background.
Bookmarking Sites. These are sites that allow you to store and manage
links to various websites and resources.
Social News. These are sites that allow users to post their own news items
or links to other news sources.
Media Sharing. These are sites that allow you to upload and share media
content like images, music, and video. Media sharing sites can be specific
for video sharing, photo sharing, slide sharing, social bookmarking, and
gaming.
Microblogging. These are sites that focus on short updates from the user.
Those subscribed to the user will be able to receive these updates. Posts
are brief that range typically from 140 – 200 characters.
Blogs and Forums. These are websites that allow users to post their
content. Other users can comment on the said topic.

II. Learning Competency with Code:

 Compare and contrast the nuances of varied online platforms, sites, and content
to best achieve specific class objectives or address situational challenges.
CS_ICT11/12-ICTPT-Ia-b-1

Note: Practice Personal Hygiene protocols at all times. H.F.E.

4
III. Activities:
Activity 1.1 - Internet and Computer Readiness Test
Directions: Read and reflect each item carefully. State whether you agree or disagree to
each of the statements by drawing a happy face () if you agree and a sad face
() if you disagree. There are no right or wrong answers for this activity.

SITUATIONS  or 
1. I have reliable access to a computer, mobile phone, tablet, or any gadget
that can act as substitute to computers.
2. I have access to a high-speed internet connection with video streaming
capabilities.
3. I have experience using email: I can create, send, forward, reply to, and
save email messages and attachments.
4. I have experience in word processing: I can create, edit, save, and
navigate documents using software program such as Microsoft Word or
Pages for Mac.
5. I have experience in creating slide presentations: I can use programs
such as Microsoft PowerPoint or Keynote for Mac.
6. I know how to search the web using Internet browsers such as Firefox or
Google Chrome.
7. I have experience using online or mobile social media (ex. Facebook,
Twitter)
8. I have experience viewing videos online (YouTube)

9. I have experience filling out forms and taking quizzes online.


10. I have experiences using cloud-based programs such as Google Drive
or Google Docs.
11. I have experience searching online for academic resources (ex. Google
Scholar)
12. I have experience with video conferencing (ex. Skype).

Activity 1.2 - Where do I belong?

DIRECTIONS: Using the Internet, look for the webpages of the pages listed below. Evaluate
whether they are Web 1.0, Web 2.0, or Web 3.0.

1. Amazon.co.uk __________ 6. Siri’s Apple Voice Recognition __________

2. __________ 7. __________

Note: Practice Personal Hygiene protocols at all times. H.F.E.

5
__________
3. 8. Encyclopedia Britannica __________

4. __________ 9. Trio Healthcare Group __________


__________
__________
5. 10.

Activity 1.3 - Which Website Is It?


DIRECTIONS: Listed below are some of the platforms. Complete the table below by providing
name of website and a short description using the internet.

PLATFORMS NAMES OF WEBSITES DESCRIPTION

Presentation or
Visualization

Cloud Computing

File Management

Mapping

Social Networks

Social News

Microblogging

Blogs and Forums

Note: Practice Personal Hygiene protocols at all times. H.F.E.

6
Activity 1.4 – Identifying the Correct Web Platform for Social Change
Directions:
1. Identify a problem in your community (e.g. littering garbage disposal, blocked
drainages, etc.)
2. Imagine that you are going to create a website to persuade both community leaders
and members to solve this problem.
3. Fill out the form below.

Community Problem: _______________________________________________________________


Vicinity: _________________________________________________________________________
Campaign Name: __________________________________________________________________
Type of Social Media Used: _________________________________________________________
Website Used: ____________________________________________________________________

What will be the content of your social media site?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Why did you choose that type of social media?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Note: Practice Personal Hygiene protocols at all times. H.F.E.

7
IV. Reflection:

DIRECTION: Reflect on the following questions and answer them briefly. Please refer to the
rubrics.

1. How dependent are we on technology?

Answer:

2. What do you think of Web 3.0? Do you think it will be realized someday in the future? Why?

Answer:

3. How do the different online platforms help you as a student in your chosen track?

Answer:

Note: Practice Personal Hygiene protocols at all times. H.F.E.

8
V. Scoring Rubrics:

Criteria Score
Completeness (5 points)
Does your response directly answer each part of the 5 4 3 2 1
question(s)?
Knowledge (10 points)
Does your response clearly show you have read and
understand the lesson content by correctly defining key terms,
key persons and summarizing concepts? 10 - 9 8-7 6-5 4-3 2-1
Have you made inferences based on this knowledge to
personal or modern-day applications?
Writing Skills (5 points)
Do you write clearly, in complete sentences, with minimal errors 5 4 3 2 1
in grammar and spelling?

VI. References for Learners:


1. De Lara, Maricel. (2016, Nov. 3). Empowerment Technology. Retrieved from
https://www.slideshare.net/maricelbaldomerodelara/lesson-1-empowerment-technology. Retrieved on May
19, 2020.
2. Educational Technology: Students Readiness and Self – Assessment.
Retrieved from https://www.surveymonkey.com/r/ET_student-readiness. Retrieved on May 19, 2020.
3. Quiambao, A. (2019, Sep 8). Online platforms for ICT Content Development.
Retrieved from https://www.slideshare.net/AngelitoQuiambao/online-platforms-for-ict-content-
development-169954837. Retrieved on May 20, 2020.
4. https://lcy0210.wordpress.com/2019/01/11/web-3-0-to-5-0-is-coming-soon/
5. Rex Book Store Inc., Empowerment Technologies Innovative Training Works, Inc., First Edition June 2016

VII. Answer Key:


Activity 1.1 - Internet and Computer Readiness Test - Students’ answers may vary.
Activity 1.2 - Where do I belong? Activity 1.3 - Which Website is It?
10. Web 1.0
1. Web 3.0 4. Web 2.0 7. Web 2.0 Students’ answers may vary. It is
2. Web 3.0 5. Web 2.0 8. Web 1.0 necessary for the teacher to also
check their answers with the
3. Web 1.0 6. Web 3.0 9. Web 1.0 Internet.
Activity 1.4 – Identifying the Correct Web Platform for Social Change - Students’ answers may vary

Prepared by:

HAZEL F. ENO Checked by:


Teacher II
KENNETH A. LIM
TVL Coordinator

Approved by:

EDWIN G. RETURAN
ASP II / OIC-SHS

Note: Practice Personal Hygiene protocols at all times. H.F.E.

9
Republic of the Philippines
Department of Education

Name of Student:
Grade and Section:
Learning Area: Empowerment Technology
Lesson Content: Online Safety, Security and Netiquette
Date: WEEK 1 ______________________

LEARNING ACTIVITY SHEET # 2

I. Background Information for Learners:

In this lesson you will tackle on online safety, security, and online etiquette
standards and practices in the use of ICTs. You will be able to understand possible
deceptive information and wrongly evaluated data, and the importance of making
judgment calls on possible implications and consequences of making certain
information public.

Key Words and Concepts

 Cybercrime – a crime committed or assisted through the use of the Internet.


 Privacy Policy – tells the user how the website will handle its data.
 Malwares - stands for malicious software.
 Virus – a malicious program design to replicate itself and transfer from one computer
to another.
 Worm – a malicious program that transfer from one computer to another by any type of
means.
 Trojan – a malicious program that is designed as useful program but once downloaded
or installed, leave your PC unprotected and allows hackers to get your information.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

10
 Spyware – a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through keylogging.
 Adware – a program designed to send you advertisements, mostly pop-ups.
 Spam – unwanted email mostly from bots or advertisers
 Phishing – acquires sensitive personal information like passwords and credit card
details.
 Pharming – a more complicated way of phishing where it exploits the DNS (Domain
Name System) system

The internet is the guiding technology of the Information Technology Age just as the
electrical engine was of the Industrial Age. In these times, more and more people are already
engaged in the use of technology. These people who are raised in a digital, media-saturated
world are called digital natives. No doubt, the Internet has been very useful to us but with the
rise of instant messaging, chat rooms, emails and social networking sites, it can also bring
trouble - from cyberbullying to more serious Internet dangers, including exposure to sexual
predators. Thus, internet safety is always our primary concern.
There's almost no limit to what you can do online. The Internet makes it possible to
access information quickly, communicate around the world, and much more. Unfortunately,
the Internet is also home to certain risks, such as malware, spam, and phishing. If you want to
stay safe online, you'll need to understand these risks and learn how to avoid them.

Lesson 2.1 - Online Safety and Security

Online safety refers to the practices and precautions that should be observed when using the
internet to ensure that the users as well as their computers and personal information are safe
from crimes associated with using the internet. Below are personal information that must be
kept confidential.

Type of Information Shared


1. First name There is a risk In sharing your first name Chances are, a hacker
may already know plenty of stuff about you even H you only we
out your first name. Likewise, you cannot just walk In a room and
start introducing yourself to everyone. You do not know whom
you can come across with.

2. Last name If sharing your first name is a small risk, having both your first
and last is more risky. You will be vulnerable to being searched
for using search engines which include image search. Matching
a name with a face is modus to several cybercrimes like identity
theft.
3. Middle name Sharing your middle name alone is probably not the most risky
of these shared information, but sharing your full name would be.
4. Current and previous Most people who steal identities study their subject. They can
school(s) use this information for verification purposes.
5. Your cellphone number Your cellphone number should never be posted over the
Internet. The Internet is a public place. It is the same as posting
your number on a billboard. You would not want random
Note: Practice Personal Hygiene protocols at all times. H.F.E.

11
strangers to text or call you, or worse, pretend that they are
someone else.
6. The name of your mother Risky, yet not as risky as posting their full names, especially your
and father mother's maiden name. In fact, you may have already
encountered many websites that require your mother's maiden
name as an answer to a secret question whenever you lose your
password.
7. The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their
identity to dupe you.
8. Your address Hopefully, you answered 'no' to this one. Giving the Internet your
number is one thing; giving them y0ur address is a whole other
level. It would be much easier for criminals to find you.
9. Your home phone number This shared information is more risky than sharing your personal
phone number. Scams usually use this information to deceive
you, one of which is when a stranger pretends to know your
parents or pretends to be you.
10. Your birthday Letting people know your birthday is probably a must if you want
to get as many gifts as possible. But having it in your profile
makes you vulnerable to identity theft.

There are numerous delinquencies that can be committed on the internet such as
stalking, identity theft, privacy violations, and harassment.

To avoid these online crimes, follow the following online safety measures:

Never give any personal information out about yourself over the internet.

Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service. To make sure that you are in a secured network, the
website address should begin with “https://’ as opposed to “http://”. Never access your
accounts by following an email link, instead type your URL by yourself.

Info source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate

Never open messages or attachments from someone you do not know.


Note: Practice Personal Hygiene protocols at all times. H.F.E.

12
Regularly review your privacy settings in your online accounts to make sure you are not
sharing important personal information.

When using a public computer terminal, be sure to delete your browsing data before
leaving.

Keep your software updated to avoid security holes.

Do not download or install software or anything on your computer or cell phone that is
unknown to you.

Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:

TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human


Rule No. 2: Adhere to the same standards online that you follow in real life.
Rule no. 3: Know where you are in cyberspace.
Rule no. 4: Respect other people’s time and bandwidth.
Rule no. 5: Make yourself look good online.
Rule no. 6: Share expert knowledge.
Rule no. 7: Help keep flame wars under control.
Rule no. 8: Respect other people’s privacy.
Rule no. 9: Don’t abuse your power.
Rule no. 10: Be forgiving of other people’s mistake.

Flame war is a series of flame posts or messages in a thread that


are considered derogatory in nature or are completely off-topic. Often
these flames are posted for the sole purpose of offending or upsetting
other users. The flame becomes a flame war when other users
respond to the thread with their own flame message.
Image from: https://twitter.com/Parkster00/status/1246347088625045504

Note: Practice Personal Hygiene protocols at all times. H.F.E.

13
Lesson 2.2 - Kinds of Online Threats

There is no doubt that you need to be vigilant online. As the World Wide Web evolved
over the years, many internet predators have been playing on vulnerabilities to attack
computers and retrieve sensitive data from individuals. Half the time, we aren’t even aware it
is happening until it is too late.

Online threat is deemed any malicious act that attempts to gain access to a computer
network without authorization or permission from the owners. These are usually done by
computer hackers who uses the World Wide Web to facilitate cybercrime. Web threats use
multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may
also employ other protocols and components, such as links in email or Instant Messaging
apps, or any malware attachments on servers that access the Web. They benefit
cybercriminals by stealing information for subsequent sale and help absorb infected PCs into
botnets. Web threats pose a broad range of risks, including financial damages, identity theft,
loss of confidential information/data, theft of network resources, damaged brand/personal
reputation, and erosion of consumer confidence in e-commerce and online banking.

The following are the top kinds of online threats that you should be aware of:

 Phishing happens when an email is sent from an internet criminal disguised as an email
from a legitimate, trustworthy source. The message is meant to lure you into revealing
sensitive or confidential information.

Image source: https://searchsecurity.techtarget.com/definition/phishing

 Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake
website instead of a legitimate one. These “spoofed” sites can capture a victim’s
confidential information, including usernames, passwords, and credit card data, or
install malware on their computer. Pharmers usually focus on websites in the financial
sector, including banks, online payment platforms, or other e-commerce destinations.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

14
Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html

 Internet Scam generally refers to someone using internet services or software to


defraud or take advantage of victims, typically for financial gain. Cybercriminals may
contact potential victims through personal or work email accounts, social networking
sites, dating apps, or other methods in attempts to obtain financial or other valuable
personal information. Online scams may come in various forms such as lottery scam,
charity fraud scams, job offer scams, and online dating scams to name a few.

 Internet robots are also known as spiders, crawlers, and web bots. It is a software
application that is programmed to do certain tasks. Bots are automated, which means
they run according to their instructions without a human user. Some bots are useful,
such as search engine bots that index content for search or customer service bots that
help users. Other bots are "bad" and are programmed to break into user accounts, scan
the web for contact information for sending spam, or perform other malicious activities.
If it's connected to the Internet, a bot will have an associated IP address.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

15
 Malware or malicious software, is any program or file that is harmful to a computer user.
Here are the most common offenders in the rogues’ gallery of malware:

Adware (advertising supported software) is unwanted software designed to


throw advertisements up on your screen. Example, pop-up ads and banner ads.
Spyware is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author. Example is a keylogger.
Virus and Worms are malwares that attach to another program and, when
executed—unintentionally by the user—replicates itself by modifying other
computer programs and infecting them with its own bits of code.
Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Once it’s on your
system, the attackers behind the Trojan gain unauthorized access to the affected
computer. From there, Trojans can be used to steal financial information or install
threats like viruses and ransomware.
Ransomware is a form of malware that locks you out of your device and/or
encrypts your files, then forces you to pay a ransom to get them back.

 Spams are unsolicited emails, instant messages coming from recipients that are not
granted verifiable permission for the message to be sent. Spam messages can be
damaging if you open or respond to it.

 Cyberstalking refers to the use of the internet or other electronic device to harass or
stalk individuals or organizations.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

16
 Cyberbullying refers to the act of tormenting, harassing, or embarrassing another
person using the internet.

 Spoofing happens when someone or something pretends to be something else to gain


our confidence, get access to our systems, steal data, steal money, or spread malware.

II. Learning Competency with Code:

 Apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks.
CS_ICT11/12-ICTPT-Ia-b-2

III. Activities:

Activity 2.1 - Shared or Not Shared? That is the Question.

DIRECTIONS: Read and reflect each item carefully. Check the space whether you have
shared or not shared these pieces of information in all your social media accounts.

TYPE OF INFORMATION SHARED NOT SHARED


First Name
Middle Name
Last Name
Current and Previous School/s
Your cellphone number
Complete name of mother and
father

Note: Practice Personal Hygiene protocols at all times. H.F.E.

17
Your parents’ cellphone
numbers
Name of Siblings
Your Address
Your Birthday

1. How many of these information have you SHARED?

______________________________________________________________

2. How many of these information have you NOT SHARED?


______________________________________________________________

3. Based from your answers above, do you think you are safe when using the Internet?
Why?
____________________________________________________________________
____________________________________________________________________
__________________________________________________

Activity 2.2 - Can You Keep It Private?

DIRECTIONS: Choose the most appropriate thing to do in the following situation. Write the
letter of the correct answer in the box.

1. Your family is going out on a vacation. What should you do?


A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
2. Do you have the same passwords for all your accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my accounts.

3. Choose which image below describes how you feel about sharing your password with
your boyfriend/ girlfriend?
Image source: https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

18
A C

B D

4. Your parents bought you your first cellphone. How will you share your cellphone
number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.

5. Your social media friends list should only be composed of ______________.


A. Your favorite brands. C. Anyone who sends you a friend request
B. Family and friends D. Foreigners

Activity 2.3 - Show Me How You Hashtag


DIRECTION: Look at the following images and create a hashtag based on the type of online
threat represented by each image.

Image source: https://www.avg.com/en/signal/what-is-spyware Image source: https://itigic.com/tag/adware/

1. #_______________________ 2. #_______________________

Note: Practice Personal Hygiene protocols at all times. H.F.E.

19
mage source: https://dlpng.com/png/6702600 Image source:https://www.gtmaritime.com/free-phishinpenetration-test/

3. #_______________________ 4. #_______________________

5. #_______________________

Image source: http://www.upgrademag.com/web/2018/07/18/entry- of-3rd-telco-player-to-


benefit-consumers-says-globe-telecom/

Activity 2.4 - Privacy Policies


DIRECTIONS: Visit a social networking site and look for the site's privacy policy. The link is
typically found at the bottom of the page and sometimes labeled only as “Privacy.”
Write a summary on how the website handles both your private and public
information. Write your summary in a separate sheet of paper or bond paper.

IV. Reflection:
DIRECTION: Reflect on this and write your answers on the space provided. Please refer to
the rubrics.
From all you have learned in Lesson 2, why is there a need to “think before you click?”

Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/

Note: Practice Personal Hygiene protocols at all times. H.F.E.

20
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
___________________________________________________________

V. Rubrics for grading:

Criteria Score
Completeness (5 points)
Does your response directly answer each part of the 5 4 3 2 1
question(s)?
Knowledge (10 points)
Does your response clearly show you have read and
understand the lesson content by correctly defining key
terms, key persons and summarizing concepts? 10 - 9 8-7 6-5 4-3 2-1
Have you made inferences based on this knowledge to
personal or modern-day applications?
Writing Skills (5 points)
Do you write clearly, in complete sentences, with minimal
5 4 3 2 1
errors in grammar and spelling?

Read the headlines found below and try to reflect on the questions that follow.

ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-theft

Note: Practice Personal Hygiene protocols at all times. H.F.E.

21
Reflect on the following questions:
 What is common among the headlines above?
 Are your social media accounts secured enough that you may not
be a victim of these things?
 What type of information do you share in your social media
accounts?

__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

VI. References for Learners:

1. ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-


cbn.com/list/tag/identity-theft. Retrieved on May 22, 2020.
2. National Center for Missing and Exploited Children. (n.d.). NSTeens: Can you keep it private.
Retrieved from
3. Netiquette Quiz. Retrieved from https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm.
Retrieved on May 22, 2020.
4. Quiambao, Angelito. (2018, Jul. 23). Online safety, security, ethics, and etiquette. Retrieved
from https://www.slideshare.net/AngelitoQuiambao/online-safety-security-ethics-amp-
etiquette. Retrieved on May 22, 2020.
5. Belcic, Ivan. (2019, Nov. 7). What is pharming and how to protect against attacks. Retrieved
from https://www.avg.com/en/signal/what-is-pharming. Retrieved on May 22, 2020.
6. Rex Book Store Inc., Empowerment Technologies Innovative Training Works, Inc., First Edition
June 2016
Images
1. https://twitter.com/Parkster00/status/1246347088625045504
2. Shea, Virginia. (2011). Netiquette. Retrieved from
http://www.albion.com/netiquette/introduction.html. Retrieved on May 22, 2020.
3. https://searchsecurity.techtarget.com/definition/phishing
4. https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html
Note: Practice Personal Hygiene protocols at all times. H.F.E.

22
5. Chua, Ryan (2011, May 24). ABS-CBN News. Are you a victim of cyber-stalking.
Retrieved from https://news.abs-cbn.com/nation/05/24/11/are-you-victim-cyber-
stalking. Retrieved on May 22, 2020.
6. Andrade, Jeannette. (2012, June 2). Teen arrested for Facebook blackmail. Retrieved
from https://technology.inquirer.net/11673/teen-arrested-for-facebook-blackmail.
Retrieved on May 22, 2020.
7. https://www.avg.com/en/signal/what-is-spyware
8. https://itigic.com/tag/adware/
9. https://dlpng.com/png/6702600
10. https://www.gtmaritime.com/free-phishing-penetration-test/
11. http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-to-benefit-
consumers-says-globe-telecom/
12. https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/

VII. Answer Key:

Activity 2.1 - Shared or Not Shared Activity 2.2 - Can You Keep It Private?

Answers may vary. 1. A 3. A 5. B

2. B 4. C

Activity 2.3 - Show Me How You Hashtag Activity 2.4 - Privacy Policies

3. #Worms Answers may vary.


1. #Spyware 5. #Pharming
#Virus
2. #Adware 4. #Phishing

Prepared by:

HAZEL F. ENO Checked by:


Teacher II
KENNETH A. LIM
TVL Coordinator

Approved by:

EDWIN G. RETURAN
ASP II / OIC-SHS

Note: Practice Personal Hygiene protocols at all times. H.F.E.

23
Republic of the Philippines
Department of Education

Name of Student:
Grade and Section:
Learning Area: Empowerment Technology
Lesson Content: Effective Internet Research

Date: WEEK 2 ______________________

LEARNING ACTIVITY SHEET # 3

I. Background Information for Learners:

In this lesson you will facilitate and practice in judging the credibility, value, and
usefulness of researched materials. You will use internet as a tool for credible research
and information gathering to best achieve specific class objectives or address
situational.

Key Words and Concepts

 Copyright – a part of the law, wherein you have the rights to your work, and anyone
who use it without your consent is punishable by law.
 Fair use – means that an intellectual property maybe used without a consent as long
as it is used in commentaries, criticisms, search engines, parodies, news, reports,
research, library archiving, teaching, and education.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

24
Lesson 3.1 - Searching the Web

There are billions of information on the web and it is a challenge for us to truly find which
information is reliable and relevant. Here are some tips you may use to be able to look for
relevant and reliable sources:

Search Engines are websites used for retrieval of data, files, or documents from data
bases. Some search engines we use today are:

Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic term for all
types of names and addresses that refer to objects on the world wide web. Knowing
the URL endings will give you clues to who is sponsoring the website and help
evaluate the sources.

https://www.searchenginejournal.com/alternative-searchengines/271409/#close

4 5
1 2 3 6 7

1. Protocol 4. Top-level Domain 7. Named anchor


2. Subdomain 5. Folders/ Paths
3. Domain 6. Page

Note: Practice Personal Hygiene protocols at all times. H.F.E.

25
Popular Domains

Top- level Domains Country code top level domains


.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network

Search Skills and Tools


1. Boolean Logic – narrows, broadens, or eliminates search term.
a. Boolean “or” – this operator will find pages
that include either of the search terms.
Ex. A or B

b. Boolean “and” – this operator will retrieve


only pages containing both terms
Ex. A and B

A B

c. Boolean “not” – this operator will find pages


that do not include search term
immediately following it.
Ex. A not B

A B

2. Phase Searching – is used to search for famous quotes, proper names,


recommendations, etc. It encloses the phrase in quotation marks.
Ex. “Jane Doe” “To be or not to be”

3. Plus (+) – indicates that the word after the sign is a required word must be found in
search. Example: +fire

Note: Practice Personal Hygiene protocols at all times. H.F.E.

26
4. Minus (–) sign – indicates to exclude a word from your search that is not required
on the result. Example: Jaguar speed –car

5. Ampersand (@) is used to find social tags. Example: @SteveJobs

6. Hashtag (#) is used to find popular hashtags. Example: #LawOfClassroom


7. Finding Documents – using the filetype refines the search for documents on the
web.
o filetype:pdf
o filetype:doc
o filetype:xls
Ex. ICT in the Philippines pdf

8. Searching Site – the sites find webpage from a website.


Ex.: National Geographic information in Australia Search: Australia site:
NationalGeographic.com

Lesson 3.2 – Evaluating Sites

The web provides access to some excellent information and can also give access to those
that are irrelevant and outdated. Here is some checklist that you can use to evaluate your
website:

1. Authority. It reveals that the person, institution or agency responsible for a site has
the qualifications and knowledge to do so. Evaluating a web site for authority:

 Authorship: It should be clear who developed the site.


 Contact information should be clearly provided: e-mail address, snail mail
address, phone number, and fax number.
 Credentials: the author should state qualifications, credentials, or personal
background that gives them authority to present information.
 Check to see if the site supported by an organization or a commercial body

2. Purpose. The purpose of the information presented in the site should be clear. Some
sites are meant to inform, persuade, state an opinion, entertain, or parody something
or someone. Evaluating a web site for purpose:

 Does the content support the purpose of the site?


 Is the information geared to a specific audience (students, scholars, general
reader)?
Note: Practice Personal Hygiene protocols at all times. H.F.E.

27
 Is the site organized and focused?
 Are the outside links appropriate for the site?
 Does the site evaluate the links?

3. Coverage. This refers to how comprehensive the website is in their discussion of


certain topics. Evaluating a web site for coverage:

 Does the site claim to be selective or comprehensive?


 Are the topics explored in depth?
 Compare the value of the site’s information compared to other similar sites.
 Do the links go to outside sites rather than its own?
 Does the site provide information with no relevant outside links?

4. Currency. It refers to: (1) how current the information presented is, and (2) how often
the site is updated or maintained. It is important to know when a site was created, when
it was last updated, and if all of the links are current. Evaluating a web site for currency
involves finding the date information was:

 first written
 placed on the web
 last revised

5. Objectivity. Objective sites present information with a minimum of bias. Evaluating a


web site for objectivity:

 Is the information presented with a particular bias?


 Does the information try to sway the audience?
 Does site advertising conflict with the content?
 Is the site trying to explain, inform, persuade, or sell something?

6. Accuracy. It refers to the credibility of the website. Evaluating a web site for accuracy:

 Reliability: Is the author affiliated with a known, respectable institution?


 References: do statistics and other factual information receive proper references
as to their origin?
 Is the information comparable to other sites on the same topic?
 Does the text follow basic rules of grammar, spelling and composition?
 Is a bibliography or reference list included?

II. Learning Competency with Code:

 Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.
CS_ICT11/12-ICTPT-Ia-b-3

Note: Practice Personal Hygiene protocols at all times. H.F.E.

28
III. Activities:

Activity 3.1 – What’s In My Name?

DIRECTIONS: Write all your answers on the space provided.

1. Using the Internet, try to search for your complete name.


2. Write down how many sites have featured your personal name and what is written
about you.
3. Answer the following:
What other information are written about you?
_______________________________________________________________
_______________________________________________________________
__________________________________________

Are the search results coming from reliable sources? Why?


_______________________________________________________________
_______________________________________________________________
__________________________________________

Should these bits of information need to be posted or shown in public?


_______________________________________________________________
_______________________________________________________________
__________________________________________

Activity 3.2 – Can You Find Me?


DIRECTIONS: Use the Internet to research on a news article on Information Technology in
the Philippines. This information must come from a government site in PDF or
Word document. Print the article and paste your work on a separate sheet of
paper. Do not forget to include the URL of the article you have taken the
information.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

29
URL: _______________________________________________________
Title of Article: _______________________________________________

Paste printed article here.

Activity 3.3 – Evaluating Websites: Checklist


This activity is adapted from the University of Maryland: Evaluating Web Sites: A Checklist
www.lib.umd.edu/tl/guides/evaluating-checklist

DIRECTIONS:
1. Using the Internet, research on topics under CoVid-19 in the Philippines.
2. Read through the checklist and answer each question in your notebook.
3. Attach a printout of the web site you are evaluating and paste your work on a separate
sheet of paper.

Note: Practice Personal Hygiene protocols at all times. H.F.E.

30
Print out of the Website

1. What is the URL or web address of the web site you are evaluating?
http://_____________________________________________________

2. What is the title of the web site? ____________________________________

Note: Practice Personal Hygiene protocols at all times. H.F.E.

31
AUTHORITY AND ACCURACY
Who is the author of the web site?
I couldn’t tell
The author is: _______________________________________
What authorship clues did the URL (web address) provide? Check all that apply:
company (.com) country-specific site (e.g., .uk)

non-profit organization (.org) military site (.mil)


academic institution (.edu) network of computer (.net)

government agency (.gov) other? Please describe:

personal web page (e.g., www.jamieoliver.com)

PURPOSE AND CONTENT


What is the purpose of the web page or site? Check all that apply:
A personal web page
A company or organization web site
A forum for educational/public service information
A forum for scholarly/research information
For entertainment
An advertisement or electronic commerce
A forum for ideas, opinions, or points of view
Other – please explain:

In your own words, briefly describe the purpose of the web site:
____________________________________________________________________
________________________________________________________

What does the web site provide? Check one:


Balanced, objective or factual information
Biased, subjective or opinionated statements
Are the arguments well supported? ____ Yes ____ No
Both objective and subjective information

Note: Practice Personal Hygiene protocols at all times. H.F.E.

32
I couldn’t tell
Other – please explain:

Does the web site provide any contact information or means of communicating with
the author or webmaster? ____ Yes _____ No

CURRENCY
When was the web site last revised, modified, or updated?
I couldn’t tell
It was updated on:___________________________________

Is the site well maintained?


I couldn’t tell
Yes

IV. Reflection:
Complete the following:

1. I learned that
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

2. Things I like most in the lessons:


_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

3. I want to learn more on


_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Note: Practice Personal Hygiene protocols at all times. H.F.E.

33
V. References for Learners:

1. Dalhousie University. (n.d.) 6 criteria for websites. Retrieved from


https://cdn.dal.ca/content/dam/dalhousie/pdf/library/CoreSkills/6_Criteria_for_Websites.pdf.
Retrieved on May 24, 2020.

2. Quiambao, Angelito. (2018, Jul. 23). Contextualized Online Search and Research
Skills. Retrieved from https://www.slideshare.net/AngelitoQuiambao/online-research-
107104482. Retrieved on May 24, 2020.

3. University of Maryland. (2020). Evaluating Web Sites: A Checklist. Retrieved


from www.lib.umd.edu/tl/guides/evaluating-checklist. Retrieved on May 24, 2020.

VI. Answer Key:

Activity 3.1 – What’s In My Name Activity 3.2 – Can You Find Me?

Answers may vary. Answers may vary.

Activity 3.3 – Evaluating Websites: Checklist

Answers may vary.

Prepared by:

HAZEL F. ENO Checked by:


Teacher II
KENNETH A. LIM
TVL Coordinator

Approved by:

EDWIN G. RETURAN
ASP II/ OIC-SHS

Note: Practice Personal Hygiene protocols at all times. H.F.E.

34
Note: Practice Personal Hygiene protocols at all times. H.F.E.

35
Note: Practice Personal Hygiene protocols at all times. H.F.E.

36

You might also like