Professional Documents
Culture Documents
Module 2 Empowerment Technologies
Module 2 Empowerment Technologies
Module No. 2
Learning Outcomes At the end of the lesson, the learners are expected to:
Determine the different online safety, security and ethics.
Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to
their specific professional tracks.
Know what internet research and its effective way of using search engines.
Use the Internet as a tool for credible research and information gathering to best achieve specific class objec-
tives or address situational
Preparatory Activities Show video clip depicting a scenario where only safety, security, or ethical issues arise, and have a class discussion about it.
The importance of internet plays a crucial part in human development. Life becomes easy and comfortable because of this technology. Most of us are
connected to the internet via laptop, mobile phone, tablet, personal computer, and other electronic gadgets. Behind this technology there is a risk that
everyone should be aware of. You could be at risk on scam, bullying, and illegal activities if you will not take precautions
in using internet. We need to keep ourselves safe and secure whenever we use the internet. That is why it is very important to know and learn the
Content
Tips on how to be safe online
Internet is truly a powerful tool. It can be used to promote business, gain new friends, and stay in touch with the old ones.
Internet Risk
Common threats faced by the netizens everyday include other netizens with malicious intent.
• Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.
• Identity Theft
It is a crime of stealing personal information for the purpose of assuming the person’s name or identity to make any form of transactions.
• Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass individual or group.
• Sexting
The act of sending sexually explicit text messages, images, and videos.
Internet Threats
Types of Malware
• Virus – a malicious program that replicate itself by copying itself to another program.
• Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your
computer.
• Worm – malicious program that copy’s itself and spreads to other computers.
• Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker.
• Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close
them.
• Keylogger – A program that runs in the background and steals user credentials and confidential information and send back to hack by
• Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of
malware.
• Rootkit –software tools used by hackers to gain control over a computer on a network without being exposed.
• Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online
B. Spam
Also known as junk email or unwanted email send by advertiser or bot. It can
C. Phishing
D. Cybercrime
A crime in which computer is used as object and tool in committing a crime such
hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and
others.
E. Cybercrime Law
WHAT IS NETIQUETTE?
It is a word that came from the two words “net” and “etiquette”. It is an etiquette
applied online that shows proper manner and behavior. If you are a member of an
online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is
• Adhere to the same standards of behavior online that you follow in real life.
Internet Research is a research method in collecting and gathering information via internet by using search engine such as google.
Search Engine is a program that allows users to search for content on internet.
Examples of Search Engines
Getting the correct and reliable information is our goal in internet research. We may rely on the capability of search engine but sometimes it may not
give us the correct information because of the keywords we entered a search engine. There are techniques in searching information that can be applied
in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of AND, OR, and NOT.
Online Research
• Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for you.
• Advanced Search. The best way to filter information you get from search engines is by using the advanced search. This will allow you
• Look for a credible sources. Some wikis, filled with updated information, are not a credible source. When using wikis, check out the
Tips for
Effective Internet Research by George Mathews
7. Bookmark
Copyright Issues
There are millions of information that we can get from the internet. Some of this information are free but others are not. They are protected by a
copyright law.
What is Copyright?
Copyright is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and
computer programs. This original work is called intellectual property which is protected under Republic Act 8293 known as the “Intellectual Property
Copyright Infringement
This happens when the copyrighted work is use by other person without permission of the author or copyright holder. Any person who is infringing
FAIR USE
Fair use is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an
infringement of copyright.
Scenario #1:
You were tasked to create and send out formal invitations for a Reunion of Batch ‘99. You were also initially
given a list of 100 names of participants to send out to.
1. From the scenario above, describe briefly how you would most likely complete the task of sending 100 invitations
with individual names of recipients using Microsoft Word.
2. Give examples of documents that you can personalize and send or distribute.
Innovative Training Works Inc., (2016). Empowerment technologies. Manila: Rex Book Store Inc,.
References https://znnhs.zdnorte.net/wp-content/uploads/2021/03/signed-off_Empowerment-TechG12._q1-_Mod2_Empwerment-_.pdf