Empowerment Technology: Quarter 1 - Module 1 ICT in The Context of Global Communication
Empowerment Technology: Quarter 1 - Module 1 ICT in The Context of Global Communication
                         EMPOWERMENT
                          TECHNOLOGY
                                               Quarter 1 – Module 1
                     ICT in the Context of Global Communication
Source image: id.techinasia.com
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein
the work is created shall be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.)
included in this book are owned by their respective copyright holders. Every effort has been exerted to
locate and seek permission to use these materials from their respective copyright owners. The
publisher and authors do not represent nor claim ownership over them.
 Development Team:
 Chairperson:             Dr. Arturo B. Bayocot, CESO III
                          Regional Director
 Members:       Neil A. Improgo, PhD, EPS-LRMS; Bienvenido U. Tagolimot, Jr., PhD, EPS-ADM;
                Erlinda G. Dael, PhD, CID Chief; Maria Teresa M. Absin, EPS (English); Celieto B.
                Magsayo, LRMS Manager; Loucile L. Paclar, Librarian II;
                Kim Eric G. Lubguban, PDO II
Telefax:                ____________________________________________________
E-mail Address:         ____________________________________________________
                                                SENIOR HIGH SCHOOL
         EMPOWERMENT
          TECHNOLOGY
                       Quarter 1 – Module 1
       ICT in the Context of Global Communication
                                     i
                                 TABLE OF CONTENTS
                                                                            Page No.
Cover Page                                                                       i
Table of Contents
                                                                                ii
Introduction                                                                     1
     Module Content                                                              1
     Learning Competencies                                                       2
LESSON 1: What is Information and Communications Technology?                     3
     What I Need to Know                                                         3
     What I Know: Pre-Test                                                       3
     What’s In                                                                   5
     What’s New: Activity 1.1 Internet and Computer Readiness Test               5
     What Is It                                                                  6
       ICT in the Philippines                                                    6
       The World Wide Web                                                        7
       Features of Web 2.0                                                       8
       What Is It: Activity 1.2: Where do I belong?                              8
     What’s New: Lesson 1.1: Online Platforms and Sites                          9
     What Can I Do: Activity 1.3: Which Website Is It?                          10
     What I Have Learned                                                        11
     Assessment                                                                 12
     Answer Key and References                                                  14
 LESSON 2: Online Safety, Security and Netiquette                               15
     What I Need to Know                                                        15
     What I Know: Pre-Test                                                      15
     What’s In                                                                  17
     What’s New: Activity 2.1: Shared or Not Shared? That is the Question       18
     What Is It                                                                 19
       Online Safety, Security and Netiquette                                   19
       Netiquette                                                               21
     What Can I Do: ACTIVITY 2.2: Can You Keep It Private?                      22
     What Is It
                                                                                23
       Kinds of Online Threats
     What Can I Do: Activity 2.3: Show Me How You Hashtag                       27
     What I Have Learned                                                        28
     Assessment                                                                 28
     Answer Key                                                                 30
     References                                                                 31
LESSON 3: Effective Internet Research                                           32
     What I Need To Know                                                        32
     What I Know: Pre-Test                                                      31
     What’s In: Activity 3.1: What’s In My Name                                 33
     What’s New
                                                                                34
       Searching the Web
     What Is It: Activity 3.2: Can You Find Me?                                 37
     What’s New: Evaluating Sites                                               38
     What Can I Do: Activity 3.3: Evaluating Websites: Checklist                40
     What I Have Learned                                                        43
     Assessment                                                                 43
     Answer Key and References                                                  44
                                               ii
                           WHAT I NEED TO KNOW:
                               Overview
      Hello dear learners! Welcome to this module on Empowerment Technology.
This module will help you explore the different technologies and online platforms and
how they can be used effectively. It contains activities that will let you create your
own ICT contents and evaluate existing online creation tools, platforms, and
applications. The module is self – instructional and allows you to learn in your own
space, at your own pace. So, relax and enjoy learning.
Module Content
To get the most of this module, here are some reminders for you:
2. Write down points for clarification and discuss this with your teacher.
   4.        Answer all tests in this module and check your answers to the answer
      key found on page 14.
                                           1
   6.        Have fun while learning with this module. It will totally be of great use
      which ever strand you may belong because ICT is for everybody.
Learning Competencies
   1. Compare and contrast the nuances of varied online platforms, sites, and
      content to best achieve specific class objectives or address situational
      challenges.
   3. Apply online safety, security, ethics, and etiquette standards and practice in
      the use of ICTs as it would relate to their specific professional tracks.
   4. Use the Internet as a tool for credible research and information gathering to
      best achieve specific class objectives or address situational.
                                           2
                          WHAT I NEED TO KNOW
              LESSON 1: What is Information and Communications
                           Technology?
                                        WHAT I KNOW
               You must be excited to flip over the pages and begin with the lessons.
But first, please answer the pre-test to measure what topics have you known so far.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
                                           3
1. What type of web page is classified as flat or stationary?
     A. Web 1.0        B. Web 2.0        C. Web 3.0           D. Web 4.0
2. What web 2.0 feature allows users to subscribe to a data plan that charges for
   the amount of time spent on the internet?
       A. Folksonomy B. Long Tail C. User Participation          D. Application
3. What is the name of the symbol that is used to classify and categorize
   information?
       A. Hashtag        B. Question Mark        C. Asterisk    D. At sign
4. What specific type of social media allows you to connect with other people?
     A. Microblogging                C. Media Sharing
     B. Social Networks              D. Social News
6. YouTube and Instagram are examples of what specific type of social media?
     A. Blogs and Forums         C. Media Sharing
     B. Social Networks          D. Bookmarking Sites
7. What specific type of social media allows its users to post their original
   content on websites such as WordPress, Blogger, and Tumblr?
      A. Blogs and Forums            C. Media Sharing
      B. Social Networks             D. Bookmarking Sites
8. What type of social media allows you to manage links to various websites?
     A. Blogs and Forums            C. Media Sharing
     B. Social Networks             D. Bookmarking Sites
9. What do you call the global system of interconnected computer networks that
   use servers to link billions of devices worldwide?
      A. Websites        B. Web browser       C. Internet D. World Wide Web
                                        4
                                      WHAT’S IN
         Reflect on the following questions:
              How many times have you checked your phone this morning?
              How many updates have you posted on Facebook, Twitter, or
               Instagram today?
              Do you use the internet/ mobile for an hour after you woke up this
               morning?
              Have you followed a celebrity/ a crush on his/ her social media
               account?
                                    WHAT’S NEW
communicating with other people even they are miles away from us. It has also
assisted us in our work since there are Internet-based jobs. It has revolutionized our
education and in the modernization of our economy.
                                          5
              ACTIVITY 1.1: Internet and Computer Readiness Test
       Directions: Read and reflect each item carefully. State whether you agree or
disagree to each of the statements by drawing a happy face ( ) if you agree and a
sad face () if you disagree. There are no right or wrong answers for this activity.
Write your answers on your notebook.
                                  SITUATIONS
1. I have reliable access to a computer, mobile phone, tablet, or any gadget that
   can act as substitute to computers.
2. I have access to a high-speed internet connection with video streaming
   capabilities.
3. I have experience using email: I can create, send, forward, reply to, and save
   email messages and attachments.
4. I have experience in word processing: I can create, edit, save, and navigate
   documents using software program such as Microsoft Word or Pages for Mac.
      Did you agree to all or most of the questions? If so, then you must have
            experienced using the different online platforms and sites!
                                      WHAT IS IT
                                           6
       Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of
ICT-related jobs, one of which is BPO, Business Process Outsourcing, or call
centers. In a data gathered by the Annual Survey of Philippines Business and
Industries in 2010, the ICT industry shares 19.3% of the total employment
population.
       When the internet was fully commercialized in 1995 , it has tremendously
impacted culture and commerce, including the rise of near instant communication by
email, instant messaging, telephony (Voice over Internet Protocol or VoIP), two-way
interactive video calls, and the World Wide Web with its discussion forums,
blogs, social networking, and online shopping sites. Internet is the global system of
interconnected computer networks that uses the Internet protocol suite (TCP/IP) to
communicate between networks and devices.
The World Wide Web
       The World Wide Web is an information system on the Internet that allows
documents to be connected to other documents by hypertext links, enabling the user
to search for information by moving from one document to another. It was invented
by Tim-Berners Lee. The World Wide Web browser software, such as Microsoft's
Internet Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome,
let users navigate from one web page to another via the hyperlinks embedded in the
documents. These documents may also contain any combination of computer data,
including graphics, sounds, text, video, multimedia and interactive content that runs
while the user is interacting with the page. The Web has enabled individuals and
organizations to publish ideas and information to a potentially large audience online
at greatly reduced expense and time delay.
       Types of Web Pages
      Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It
       is a flat or stationary page since it cannot be manipulated by the user.
      Web 2.0 or The Social Web allows users to interact with the page, the user
       may be able to comment or create a user account. Most website that we visit
       today are Web 2.0.
      Web 3.0 or Semantic Web. The semantic web provides a framework that
       allows data to be shared and reuse to deliver web content specifically
       targeting the user. Search Engine will learn about you and your habits from
                                           7
        each search you perform and will gather details about you from your previous
        activities like likes and social postings and present the answers as per your
        preferences.
WHAT IS IT
                                                     8
               ACTIVITY 1.2: Where do I belong?
      DIRECTIONS: Using the Internet, look for the webpages of the pages listed
below. Evaluate whether they are Web 1.0, Web 2.0, or Web 3.0. Write your
answers in your activity notebook.
2. 7.
3. 8. Encyclopedia Britannica
5. 10.
        Presentation or Visualization
        Cloud Computing
        File Management
        Mapping
        Social Media
                                            9
3. File Management Platform is used for the storing, naming, sorting, and
   handling of computer files. Allows you to convert and manage files without
   download in the software tool.
4. Mapping Platform is a transformation taking the points of one space into the
   points of the same or another space. Uses GPS to detect location and used
   for navigation.
5. Social Media Platform is a computer-mediated tools that allow large group of
   people to create, share or exchange information, interest and the information
   shared can be in the form of ideas, pictures, videos or anything that you want
   to create and share to virtual communities. It can be in the following platforms:
              Social Networks. These sites allow you to connect with other
              people with the same interests or background.
              Bookmarking Sites. These are sites that allow you to store and
              manage links to various websites and resources.
              Social News. These are sites that allow users to post their own
              news items or links to other news sources.
              Media Sharing. These are sites that allow you to upload and share
              media content like images, music, and video. Media sharing sites
              can be specific for video sharing, photo sharing, slide sharing,
              social bookmarking, and gaming.
              Microblogging. These are sites that focus on short updates from
              the user. Those subscribed to the user will be able to receive these
              updates. Posts are brief that range typically from 140 – 200
              characters.
              Blogs and Forums. These are websites that allow users to post
              their content. Other users can comment on the said topic.
                              WHAT CAN I DO
                 ACTIVITY 1.3: Which Website Is It?
                                      10
      DIRECTIONS: Listed below are some of the platforms. Complete the table
below by providing name of website and a short description using the internet. Write
your answers on your notebook.
Cloud Computing
File Management
Mapping
Social Networks
Social News
Microblogging
Blogs and
Forums
                                        11
   2. How do the different online platforms help you as a student in your chosen
      track?
      ______________________________________________________________
      ______________________________________________________________
      ______________________________________________________________
      ______________________________________________________________
      ______________________________________________________________
                Criteria                                      Score
Completeness (5 points)
  Does your response directly answer             5       4     3       2     1
  each part of the question(s)?
Knowledge (10 points)
  Does your response clearly show you
  have read and understand the lesson
  content by correctly defining key
  terms, key persons and summarizing           10 - 9   8-7   6-5     4-3   2-1
  concepts?
  Have you made inferences based on
  this knowledge to personal or modern-
  day applications?
Writing Skills (5 points)
  Do you write clearly, in complete
  sentences, with minimal errors in              5       4     3       2     1
  grammar and spelling?
                                          12
                                      ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write
your answers on a separate sheet of paper or in your notebook.
 1. What type of web provides a framework that allows data to be shared and reuse to
    deliver web content specifically targeting the user?
        A. Web 1.0         B. Web 2.0              C. Web 3.0        D. Website
 4. Twitter statuses are only composed of a few characters. What type of social media
    site does Twitter belong?
        A. Micro blogging                C. Social Networks
        B. Media Sharing                 D. Bookmarking Sites
 5. Social networks are sites that allow you to connect with other people having the
    same interests. It allows you to share your own news and other news from other
    sources.
 6. The Philippines is considered as the “ICT Hub in Asia.” The ICT Industry shares
    19.3% of the total employment population in the Philippines coming from the
    government agencies.
 7. Marisa wants to publish her collections of original poems online. Which online
    platform must she do this?
       A. Social News       B. Bookmarking Site           C. YouTube          D. Blogs
 8. Watson is creating a cover video of his favorite song. Which online platform must he
    publish this?
      A. Social News        B. Bookmarking Site          C. YouTube            D. Blogs
 9. Cathy has created a very good slideshow presentation on a certain topic, and she
    wants to share it to other teachers around the world. Which online platform must
    she publish this?
      A. Presentation Platforms                   C. File Management Platforms
      B. Cloud Computing Platforms                D. Social Media Platforms
10. What is the name of the symbol that is used to classify and categorize information?
           A. Hashtag        B. Question Mark          C. Asterisk     D. At sign
                                               13
                                   ANSWER KEY
4. A 9. A
5. A 10. A
                                     14
   1. De Lara, Maricel. (2016, Nov. 3). Empowerment Technology. Retrieved from
            https://www.slideshare.net/maricelbaldomerodelara/lesson-1-
            empowerment-technology. Retrieved on May 19, 2020.
   3. Quiambao, A. (2019, Sep 8). Online platforms for ICT Content Development.
           Retrieved from https://www.slideshare.net/AngelitoQuiambao/online-
           platforms-for-ict-content-development-169954837. Retrieved on May
           20, 2020.
      By
the end of this lesson, you are expected to:
   1. Identify what constitutes appropriate and inappropriate online behavior.
   2. Apply internet online safety, security ethics and etiquette standards and
      practice in the use of ICTs.
   3. Discern possible deceptive information and wrongly evaluated data.
WHAT I KNOW
                                          15
   I bet you are ready to know if you have practiced online safety, aren’t you? But
before that, take time to answer the pre-test to gauge how much you know about the
lesson.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or on your notebook.
 1. What is Netiquette?
     A. The proper use of manners and etiquette on the Internet.
     B. Using a net to catch fish.
     C. Being mean to other people on Facebook.
     D. Using proper manners at the dinner table.
   6. What type of online threat happens when an attacker uses electronic devices
      to do unwanted surveillance against its victim?
       A. Cyberbullying     B. Phishing        C. Spamming      D.
          Cyberstalking
                                         16
7. What type of online threat happens when the attacker impersonates another
   individual or organization to gather personal or business information?
    A. Cyberstalking       B. Spoofing       C. Scamming          D. Pharming
8. What type of information should you avoid giving when using the internet?
   A. Phone number       B. Profile Picture  C. Shirt Size       D. Religion
10. You get an email telling you that you won a hundred thousand without joining
    in a competition. You should ____________.
     A. Claim the prize.                    C. Return the email with response.
     B. Ignore the email.                   D. Send rude message as revenge
                                      WHAT’S IN
   Read the headlines found below and try to reflect on the questions that follow.
                                      17
  ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.
        There's almost no limit to what you can do online. The Internet makes it
possible to access information quickly, communicate around the world, and much
more. Unfortunately, the Internet is also home to certain risks, such as malware,
spam, and phishing. If you want to stay safe online, you'll need to understand these
risks and learn how to avoid them.
                                              WHAT’S NEW
        ACTIVITY 2.1: Shared or Not Shared? That is the Question
DIRECTIONS: Read and reflect each item carefully. Copy the table below on your
notebook and check the space whether you have shared or not shared these pieces
of information in all your social media accounts.
       First Name
       Reflect on the following questions:
        Middle Name
           What  is common among the headlines above?
              Are your social media accounts secured enough that you may not
           Name
        Last
              beand
        Current  a victim of these things?
                    Previous
        School/s
           What type of information do you share in your social media
        Your cellphone
              accounts?number
        Complete name of mother
        and father
        Your parents’ cellphone
        numbers
        Name of Siblings
Your Address
Your Birthday
                                                     18
2. How many of these information have you NOT SHARED?
   ______________________________________________________________
3. Based from your answers above, do you think you are safe when using the
   Internet? Why?
   ______________________________________________________________
   ______________________________________________________________
   ______________________________________________________________
                               WHAT IS IT
   Lesson 2.1: Online Safety, Security and Netiquette
                                  19
       Online safety refers to the practices and precautions that should be observed
when using the internet to ensure that the users as well as their computers and
personal information are safe from crimes associated with using the internet. Below
are personal information that must be kept confidential.
To avoid these online crimes, follow the following online safety measures:
                                           20
      Never give any personal information out about yourself over the internet.
      Do not give any banking or sensitive information unless you are sure that it is
      a reputable business having a secure service. To make sure that you are in a
      secured network, the website address should begin with “https://’ as
      opposed to “http://”. Never access your accounts by following an email link,
      instead type your URL by yourself.
      Regularly review your privacy settings in your online accounts to make sure
      you are not sharing important personal information.
      When using a public computer terminal, be sure to delete your browsing data
      before leaving.
                                                    21
    Flame war is a series of flame posts or
messages in a thread that are considered
derogatory in nature or are completely off-topic.
Often these flames are posted for the sole
purpose of offending or upsetting other users. The
flame becomes a flame war when other users
respond to the thread with their own flame
message.
WHAT CAN I DO
          22
                            ACTIVITY 2.2: Can You Keep It Private?
DIRECTIONS: Choose the most appropriate thing to do in the following situation.
Write the letter of the correct answer in your notebook.
   1. Your family is going out on a vacation. What should you do?
      A. Post pictures when you return home.
      B. Post the dates you will be gone online.
      C. Post updates of where you are currently checking in hotels or places.
      D. Tell no one. Vacations are for getting away.
   2. Do you have the same passwords for all your accounts?
      A. Yes. That is how I remember all my passwords.
      B. I have different passwords for all different accounts.
      C. I keep it simple. I don’t have any passwords.
      D. I have two similar passwords that I alternately use for all my accounts.
   3. Choose which image below describes how you feel about sharing your
      password with your boyfriend/ girlfriend?
        Image source: https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm.
A C
B D
   4.                                     Your                               parents
        bought you your first cellphone. How will you share your cellphone number?
        A. Do not share your cellphone number to anyone.
        B. Post your cellphone number in your social media account.
        C. Share your cellphone number only in person.
        D. Post your cellphone number in your group chat.
                                                         23
                                                        WHAT IS IT
                            Lesson 2.2: Kinds of Online Threats
       There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities
to attack computers and retrieve sensitive data from individuals. Half the time, we
aren’t even aware it is happening until it is too late.
       Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which utilize
HTTP or HTTPS protocols, but may also employ other protocols and components,
such as links in email or Instant Messaging apps, or any malware attachments on
servers that access the Web. They benefit cybercriminals by stealing information for
subsequent sale and help absorb infected PCs into botnets. Web threats pose a
broad range of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking.
       The following are the top kinds of online threats that you should be aware of:
                                                        24
 Pharming happens when a hacker (or “pharmer”) directs an internet user to a
   fake website instead of a legitimate one. These “spoofed” sites can capture a
   victim’s confidential information, including usernames, passwords, and credit
   card data, or install malware on their computer. Pharmers usually focus on
   websites in the financial sector, including banks, online payment platforms, or
   other e-commerce destinations.
                                                     25
 Internet robots are also known as spiders, crawlers, and web bots. It is a
   software application that is programmed to do certain tasks. Bots are
   automated, which means they run according to their instructions without a
   human user. Some bots are useful, such as search engine bots that index
   content for search or customer service bots that help users. Other bots are
   "bad" and are programmed to break into user accounts, scan the web for
   contact information for sending spam, or perform other malicious activities. If
   it's connected to the Internet, a bot will have an associated IP address.
                                      26
 Cyberstalking refers to the use of the internet or other electronic device to
   harass or stalk individuals or organizations.
                                        27
                                                        WHAT CAN I DO
                                                                   Image source:https://www.gtmaritime.com/free-phishing-
Image source: https://dlpng.com/png/6702600                        penetration-test/
     3.   # ________________________
                                                                        4.    # _____________________
                                                              28
Image source: http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-
telco-player-to-benefit-consumers-says-globe-telecom/
5. # ___________________________
https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________
                                                            ASSESSMENT
   Directions: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
     1. What type of malicious program is designed to replicate itself and transfer from
        one computer to another either through the internet or local networks or data
        storage like flash drives and CDs?
             A. Adware                    C. Worms and Virus
             B. Spyware                   D. Ransomeware
                                                                       29
2. What harmful online programs are designed to send you advertisements,
   mostly pop-up ads?
      A. Adware                  C. Worms and Virus
      B. Spyware                 D. Ransomeware
3. What harmful online program is used to record keystrokes done by users to
   steal passwords?
        A. Adware                  C. Worms and Virus
        B. Spyware                 D. Ransomeware
                                      30
           B. Strike first - post mean things about other people on your Wall on
              Facebook.
           C. Observe proper netiquette rules.
           D. Ignore any requests from people to be your friend online.
                                   ANSWER KEY
                                You are finally done with Lesson 2!
2. B          7.        B
                                                         ACTY 2.2: Can You Keep It Private?
3. B          8.        A
                                          1. A         3. A        5.   B
4. D          9.        A
                                          2. B         4. C
5. D          10. B
  1. C             6.       B                      3. #Worms
                                  1. #Spyware                     5. #Pharming
                                                      #Virus
  2. A             7.       D
                                  2. #Adware       4. #Phishing
  3. B             8.       B
4. D 9. C POST-TEST
5. A 10. B
                                         31
  1. ABS-CBN News Topic Page on Identity-theft. Retrieved from
     https://news.abs-cbn.com/list/tag/identity-theft. Retrieved on May 22, 2020.
  2. National Center for Missing and Exploited Children. (n.d.). NSTeens: Can you
     keep it private. Retrieved from
  3. Netiquette               Quiz.                Retrieved               from
     https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm. Retrieved on
     May 22, 2020.
  4. Quiambao, Angelito. (2018, Jul. 23). Online safety, security, ethics, and
     etiquette.                          Retrieved                            from
     https://www.slideshare.net/AngelitoQuiambao/online-safety-security-ethics-
     amp-etiquette. Retrieved on May 22, 2020.
  5. Belcic, Ivan. (2019, Nov. 7). What is pharming and how to protect against
     attacks. Retrieved from https://www.avg.com/en/signal/what-is-pharming.
     Retrieved on May 22, 2020.
Images
  1. https://twitter.com/Parkster00/status/1246347088625045504
  2. Shea,       Virginia.     (2011).       Netiquette.      Retrieved  from
     http://www.albion.com/netiquette/introduction.html. Retrieved on May 22,
     2020.
  3. https://searchsecurity.techtarget.com/definition/phishing
  4. https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-
     pharming.html
  5. Chua, Ryan (2011, May 24). ABS-CBN News. Are you a victim of cyber-
     stalking. Retrieved from https://news.abs-cbn.com/nation/05/24/11/are-you-
     victim-cyber-stalking. Retrieved on May 22, 2020.
                                        32
   6. Andrade, Jeannette. (2012, June 2). Teen arrested for Facebook blackmail.
      Retrieved    from     https://technology.inquirer.net/11673/teen-arrested-for-
      facebook-blackmail. Retrieved on May 22, 2020.
   7. https://www.avg.com/en/signal/what-is-spyware
   8. https://itigic.com/tag/adware/
   9. https://dlpng.com/png/6702600
   10. https://www.gtmaritime.com/free-phishing-penetration-test/
   11. http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-to-
      benefit-consumers-says-globe-telecom/
   12. https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
      The Internet has made our lives easier especially in terms of doing research.
By browsing the internet, we can access limitless topics. Web-based catalogs are
available in many libraries to assist researchers in locating printed books, journals,
government documents and other materials. The biggest obstacle facing all
researchers on the internet is how to effectively and efficiently access the vast
amount of information available (The Internet: Research Tools, 2013).
WHAT I KNOW
                                          33
    Before we take on another journey towards exploring the great capacity of the
internet into research, kindly take time to answer the following questions for your pre-
test.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper.
                                       WHAT’S IN
                             Activity 3.1: What’s In My Name?
       Direction: Write all your answers in your activity notebook.
                                          34
       1. Using the Internet, try to search for your complete name.
       2. Write down how many sites have featured your personal name and what is
          written about you.
       3. Answer the following:
                                     WHAT’S NEW
                     Lesson 3.1: Searching the Web
  There are billions of information on the web and it is a challenge for us to truly find
which information is reliable and relevant. Here are some tips you may use to be
able to look for relevant and reliable sources:
      Search Engines are websites used for retrieval of data, files, or documents
      from data bases. Some search engines we use today are:
                                           35
         Anatomy of a URL
         A URL is one type of Uniform Resource Identifier (URI). It is a generic
         term for all types of names and addresses that refer to objects on the
         world wide web. Knowing the URL endings will give you clues to who is
         sponsoring the website and help evaluate the sources.
        1. Protocol                4. Top-level Domain           7. Named anchor
    https://www.searchenginejournal.com/alternative-searchengines/271409/#close
        2. Subdomain               5. Folders/ Paths
        3. Domain                  6. Page
                                       4               5
      1     2        3                                                6       7
Popular Domains
      Top- level Domains                Country code top level domains
      .edu – educational institution         .ph – Philippines
      .org – non-profit organization          .eu – European Union
      .gov – government site                  .uk – United Kingdom
      .com – commercial site                  .au - Australia
      .net - network
A B
                                        36
      c. Boolean “not” – this operator will find
          pages that do not include search term
          immediately following it.
             Ex. A not B
A B
3. Plus (+) – indicates that the word after the sign is a required word must be
   found in search. Example: +fire
4. Minus (–) sign – indicates to exclude a word from your search that is not
   required on the result. Example: Jaguar speed –car
7. Finding Documents – using the filetype refines the search for documents
   on the web.
          o filetype:pdf
          o filetype:doc
          o filetype:xls
                                      37
                                    WHAT IS IT
                      Activity 3.2: Can You Find Me?
URL: _______________________________________________________
Title of Article: _______________________________________________
                                        38
sheet of paper. Do not forget to include the URL of the article you have taken the
information.
                                      WHAT’S NEW
                           Lesson 3.3: Evaluating Sites
    The web provides access to some excellent information and can also give
access to those that are irrelevant and outdated. Here is some checklist that you can
use to evaluate your website:
    1. Authority. It reveals that the person, institution or agency responsible for a
       site has the qualifications and knowledge to do so. Evaluating a web site for
       authority:
           Authorship: It should be clear who developed the site.
           Contact information should be clearly provided: e-mail address, snail
               mail address, phone number, and fax number.
           Credentials: the author should state qualifications, credentials, or
               personal background that gives them authority to present information.
           Check to see if the site supported by an organization or a commercial
               body
                                          39
       Does the site claim to be selective or comprehensive?
       Are the topics explored in depth?
       Compare the value of the site’s information compared to other similar
          sites.
       Do the links go to outside sites rather than its own?
       Does the site provide information with no relevant outside links?
4. Currency. It refers to: (1) how current the information presented is, and (2)
   how often the site is updated or maintained. It is important to know when a
   site was created, when it was last updated, and if all of the links are current.
   Evaluating a web site for currency involves finding the date information was:
       first written
       placed on the web
       last revised
6. Accuracy. It refers to the credibility of the website. Evaluating a web site for
   accuracy:
       Reliability: Is the author affiliated with a known, respectable institution?
       References: do statistics and other factual information receive proper
          references as to their origin?
       Is the information comparable to other sites on the same topic?
       Does the text follow basic rules of grammar, spelling and composition?
       Is a bibliography or reference list included?
                                       40
                                       WHAT CAN I DO
                Activity 3.3: Evaluating Websites: Checklist
    This activity is adapted from the University of Maryland: Evaluating Web Sites: A Checklist
                           www.lib.umd.edu/tl/guides/evaluating-checklist
Directions:
   1. Using the Internet, research on topics under CoVid-19 in the Philippines.
   2. Read through the checklist and answer each question in your notebook.
   3. Attach a printout of the web site you are evaluating and paste in your
      notebook:
                                                41
1. What is the URL or web address of the web site you are evaluating?
http://_____________________________________________________
What authorship clues did the URL (web address) provide? Check all that apply:
What is the purpose of the web page or site? Check all that apply:
                                          42
          A forum for ideas, opinions, or points of view
          Other – please explain:
    In your own words, briefly describe the purpose of the web site:
    ______________________________________________________________
    ______________________________________________________________
CURRENCY
           I couldn’t tell
           Yes
           No
                                       43
File: Evaluating Websites: A Checklist    University of Maryland Libraries * T&L * 2/2014
                                         ASSESSMENT
        Direction: Read each item carefully and choose the letter of the correct
        answer. Write your answers on a separate sheet of paper or in your notebook.
    1. What happens when a phrase or sentence is placed inside quotation marks
       when doing research?
         A. Will only return items that have both terms.
         B. Will search for words that are together and in order
         C. Will return items that exclude a term
         D. Will return items that have either of the terms
    2. What is a URL?
         A. A computer software program
         B. An acronym for Unlimited Resources for Learning
         C. The address of a document or "page" on the World Wide Web
         D. A search engine
                                           44
  5. An article that only presents one point of view or omits facts is biased.
         A. True                         B. False
                                 ANSWER KEY
                                You are finally done with Lesson 3!
 2. D              2. C
                                                          ACTY 3.2: Can You Find Me?
 3. B              3. A
                                                                   Answers may vary.
 4. C              4. D
Telefax: _______________________________________
46