0% found this document useful (0 votes)
145 views

Module 1. Empowerment Intro

Module for empowerment

Uploaded by

Luisa Sevilla
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views

Module 1. Empowerment Intro

Module for empowerment

Uploaded by

Luisa Sevilla
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 18

CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

INTRODUCTION TO INFORMATION
AND COMMUNICATION MODULE 8
TECHNOLOGIES

INTRODUCTION

Empowerment Technologies is a specialized module designed to provide students with


the foundation of knowledge and skills needed to succeed in environments that require the use
of computer and the internet.

Gathering information and facts about teaching competencies that are essential in the
information Age, such as the state of ICT technologies; online safety, security, ethics, and
etiquette; productivity tools with advances application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change, which are
aligned to the standards sets by the Department Of Education.

This module is prepared for you to help you achieve the required learning that need to
develop. This will be the source of information that will enable you to acquire the knowledge
and skills in Empowerment Technologies.

LEARNING OBJECTIVES

At the end of this lesson, the students should be able to:

improve their knowledge on how ICT affects their everyday lives and the state of our
notion;
compare and contrast the difference between online platforms, sites, and content;
understand the feature of Web 2.0;
understand the future of the World Wide Web through Web 3.0; and
Learn the different trends in ICT and use them to their advantage.

LET’S TEST YOUR PRIOR KNOWLEDGE


Multiple Choice: Circle the letter that corresponds to the correct answer.

1. A web page that allows interaction from the user


a. static b. dynamic c. social d. comment
This refers to the feature where users are able to categorize and locate information through
tagging.
a. rich user experience b. folksonomy c. taxonomy d. hashtags
A feature of a dynamic website that’s allows users to put their own content
a. rich user experience b. mass participation c. user participation d. long tail
4. It provides common framework to allow data to be shares and reused across platform,
enterprise and community boundaries.
a. W3C b. Semantic Web c. Web 1.0 d. Web 2.0

Empowerment Technologies 1
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

According to this magazine, two Philippine cities are part of the top 10 in their research
about “The selfiest Cities around the world”
a. Reader’s digest b. Time c. People d. Candy
6. This is the operating system for black berry phone.
a. Black berry OS b. Windows mobile c. Symbian d. IOS
Pinterest is the social media website that can be classified as
a. Book marking site b. Blogs and forums b. Microblogging d.Media
sharing
Currently, this is the fastest mobile network.
a. 2G b. 3G c. 4G d. 5G
This media is designed to help people who have visual and reading impairments.
a. assistive b. social c. bookmark d. accessibility
10. This type of social media website focuses on short updates posted by the user.
a. hashtagging b. microblogging c. social media d. blogging

KEY TERMS

Web 1.0 – static websites without interactivity


Web 2.0 – websites can contain dynamic content
Web 3.0 – a concept of a World Wide Web that is designed to cater to the individual user
Static – refers to web pages that are the same regardless of the user
Dynamic – refers to the web pages that are affected by the user or preference
Folksonomy – allows users to categories/ arrange information
Hashtag- used to categorized post in website
Convergence – the synergy of technological advancements to work on a similar goal or task
Social media – websites, application, or online channels that enable users to create, co-
create, discuss, modify, and exchange user-generated content

Introduction to Information and Module


Communication Technologies 1

IMPORTANT CONCEPT

Information and Information Technologies

Information and Information Technology (ICT) deals with the use of different communication
technologies such as mobile phones, telephone, Internet etc. to locate, save, send and edit
information.

ICT in the Philippines


Empowerment Technologies 2
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

Several International companies dub the Philippines as the “ICT hub of Asia”. It is no secret
that there is a huge growth of ICT- related jobs around the country, one of which is the
call center or BPO (Business Process Outsourcing) centers.
According to the 2013 edition of measuring the information Society by the international
Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012.
That would mean that for every 100 Filipinos you meet, there is a high chance that they
have a cellphone and approximately for the seven of them, they have two.
In the data gathered by the Annual survey of Philippine Business and Industries, NSO, in
2010, the ICT industry shares 19.3% of the total employment population here in the
Philippines.
To add to these statistics, Time Magazine’s “ The Selfiest Cities around the World” of
2013 places two cities from the Philippines in the top 1 and top 10 spots. The study was
conducted using Instagram, a popular photo sharing application.
With these numbers, there is no doubt that the Philippines is one of the countries that
benefits most out of ICT.

Web 2.0: Dynamic Web Pages

The internet has been a vital tool to our modern lives that is why it is important to make the
best of the internet.
The World Wide Web is invented by Timbers Berners-Lee. When the World Wide Web was
invented, most web pages were static. Static (also known as flat page or stationary page) n
the sense is “as is” and cannot be manipulated by the user. The content is also the same for all
users. This is referred to as Web 1.0

Web 2.0 is a term coined by the Darcy Di Nucci on January 1999.


Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages-the user is able to see a
website differently than others. Example of Web 2.0 include social networking sites, blogs,
wikis, video sharing sites, hosted services, and web applications.

Web 2.0 allows users to interact with the page: instead of just reading a page, the user may be
able to comment or create a user account.

Web 2.0 allows user to use web browsers instead of just using their operating system.

Features of Web 2.0


The key features of web 2.0 include:
Folksonomy – allows users to categorize and classify/arrange information using freely
using keywords (e.g tagging).Popular social networking sites such as Twitter, Instagram,
Facebook, etc use tags that start with the pound sign (#). This is also referred to as
hashtag.
Rich User Experience – content is dynamic and is responsive to user’s input. An
example would be a website that shows local content.
User Participation – the owner of the website is not the only one who is able to content.
Others are able to place comments, reviews, and evaluation. Some websites

Empowerment Technologies 3
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

allow reader to comment on an article, participate in a poll, or review a


specific product(e.g., Amazon.com online stores)
Longtail – services that are offered on demand rather than on a one-time purchase. In
certain cases, time-based pricing is better than file size-based pricing or vice-versa. This
is synonymous to subscribing a data plan that charges you for the amount of time you
spent in the internet, or a data plan that charges you for the amount of band width you
used.
Software as a Service – users will subscribe to software only when needed rather than
purchasing them. This is a cheaper option if you do not always need to use software.
For instance a Google docs is a free web-based application that allows the user to
create and edit word processing and spreadsheet documents online. When you need a
software, like a word processor, you can purchase it for a one-time huge amount and
install it in your computer and it is yours forever. Software as a service allows you to
“rent” software for a minimal fee.
Mass Participation – diverse information sharing through universal web access. Since
most users can use the Internet, Web 2.0’s content is based on people from various
cultures.

Web 3.0 and the Semantic Web

The semantic web is a movement led by the World Wide Web Consortium (W3C). The
W3C standard encourages web developers to include semantic content in their web pages.
According to the W3C, “The semantic web provides a common framework that allows
data to be shared and reused across application, enterprise, and community
boundaries.”
The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences to
be able to deliver web content specifically targeting the user.

Web 3.0 is yet to be fully realized because of several problems:

Compatibility- HTML files and current web browsers could not support Web 3.0.
Security – The user’s security is also in question since the machine is saving his or her
preferences.
Vastness – The World Wide Web already contains billions of web pages.
Vagueness – Certain words are imprecise. The words “old” and “small” would depend on the
user.
Logic – Since machines use logic, there are certain limitations for a computer to be able to
predict what the user is referring to at a given time.

Trends in ICT

As the world of ICT continues to grow, the industries have focused on several innovations. This
innovation caters the needs of the people that cater the needs of the people that that benefits
most out of ICT.

Convergence – technological convergence is the synergy of technological advancements to


work on a similar goal or task. For example, besides using your
Empowerment Technologies 4
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

personal computer to create word documents, you can now use you smartphone. It can
also use cloud technologies to sync files from one device to another while also using
several technology which mean you can access your files anytime, anywhere.
Convergence is using several technologies to accomplish a task conveniently.
Social Media – is a website, application, or online channel that in able web users to create
co-creates, discuss, modify and exchange user-generated content.

There are six types of social media:

Social Networks. These are sites that allow you to connect with other people with the
same interest or background. Once a user creates his or her account, he or she can
set up a profile, add people, create groups, and share content.
Example: Facebook and Google+

Bookmarking Sites. These are sites that allow you to store and manage links to
various websites and resources. Most of these sites allow you to create a tag that
allows you and others to easily search or share them.
Example: StumbleUpon and Pinterest

Social News. These are site that allow user to


post their own news items or link to other news
sources. The user can also comment on the
post and comments may be ranked. They are
also capable of voting on these news articles of
the websites. Those who get the amount of
votes are shown prominently.
Example: Reddit and Digg

Empowerment Technologies 5
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

Media Sharing. These are site that allow you to upload and share media content like
images, music, and video. Most of these sites are have additional social features like
liking, commenting, and having user profiles.
Example: Flicker, Youtube, and Instagram

Micro blogging. These are sites that focus on short updates from the user. Those
subscribed to the user will be able to receive these updates.
Example: Twitter and Plurk

Blog and Forums. These website allow users


to post their content. Other users are able
to comment on the said topic. There are
several free blogging platforms like
Blogger, Wordpress, and Tumblr, On the
other hand, Forums are typically part of a
certain website or web service.

Mobile Technologies – The popularity of smartphones and tablet has taken a major rise
over the years. This is largely because of the device’s capacity to do tasks that were
originally found in personal computers.
Today, the latest mobile devices use 4G Networking (LTE), which is currently the
fastest mobile network.
Mobile devices use different operating systems:
a. iOS – used in apple devices such as the iPhone and iPad.
Empowerment Technologies 6
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

Android – an open source operating system developed by Google. Being open source
means several mobile phone companies use this OS foe free.
Blackberry OS - used in blackberry OS.
Windows Phone OS- a closed source of propriety operating system developed by
Microsoft.
Symbian – the original smart phone OS; now used in smart TV’s
Windows Mobile – developed by Microsoft for smart phones and pocket PCs

Assistive media – is a nonprofit service designed to help people who have visual and
reading impairments. A database of radio recordings is used to read to the user.

ACTIVITY 1

Direction: True or False. Write “T” if the statement is correct; otherwise; write “F” if the
statement is incorrect.

_T_1. Tim Berners Lee created the World Wide Web.


_F_2. People Magazine conducted the research on “The Selfiest Cities in the world”
_F_3. Web 2.0 introduced static web pages that allow users to interact with the web page.
_T_4. Folksonomy allows users to categorize and locate information.
_T_5. Technological convergence is the synergy of technological advancements to work on a
similar goal or task.
_T_6. According to Nielsen, users who use the internet spend more time in social media sites
than in any other type of site.
_F_7. Blogging sites are sites that focus on short updates from the user.
_F_8. Android is the operating system for apple devices.
_T_9. Assistive media is a non-profit service designed to help people who have visual and
reading impairments.
_T_10. Information and Communication Technology (ICT) deals with the use of different
communications technology to locate, save, send and edit information.

Empowerment Technologies 7
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

ACTIVITY 2

Write SO if the social media website is a social network, BS for bookmarking


site, SN for social news, MS for media sharing, MI for microblogging, and BF for blogs
and forums.

_SO_1. Facebook _SO_6. Google+


_MI_2. Plurk _MS_7 Instagram

_MI_3. twitter _BS_8. Pinterest

_BF_4. Tumblr _BF_9. Blogger

_SN_5. reddit _BS_10. StumbleUpon

ACTIVITY 3
Identify the correct Web Platform for Social Change.

Identify a problem in your community (e.g., littering, garbage disposal, blocked


drainages, etc)
Imagine that you are going to create a website to persuade both community leaders and
members to solve this problem.
Fill out the form below, you may refer to the sample provided after the form.
Community Problem: Garbage Disposal
Vicinity: St. Maligaya, Brgy. Vito, Siruma Camarines Sur
Campaign: "Waste to Resources"
Type of Social Media Used: Social Networks
Website Used: Facebook

What will be the content of your social media site?


—It will contain pictures and videos of garbages that are thrown around and to separate the
biodegradable and the non- biodegradable.This initiative help to set up collection.The people
will be educated on the ecology and vulnerability of the area.

Why did you choose that type of social media?


—I chose social networks than the other type of social media because people in my community are
usually using it as their way of knowing things for them to be more updated.

Why did you choose the website?


—Because in facebook it helps to spread the message about environmental protection and waste
management and even if we don't have load we can access this app unlike the other type of social
media. And this site encourages us for an online community to share what's on our mind like
interests,ideas,stories and other things that can be share and posted.

Empowerment Technologies 8
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

Sample
Community Problem: Severe flooding during rainy days due to blocked drainages
Vicinity: Lapiz, St., Oleander Village, Brgy. Pulo, Quezon City
Campaign: “Anti-Flooding Movement”
Type of Social Media Used: Blogging
Website Used: WordPress

What will be the content of your social media site?


It will contain pictures of the flooded area during rainy days. It will also contain pictures of the
drainages that are blocked with garbage. I will also plan to update every once in a while. Anyone who
views that site is able to comment on these updates.

Why did you choose that type of social media?


People in my community are avid readers of blog. Most of them follow several blogs that concern the
community.

Why did you choose the website?


WordPress, unlike other blogging platforms, has a more “serious feel” to it. It also contains
professional-looking templates that will fit the more serious tone of my campaign.

ASSIGNMENT
Do you think your information shared in social media is safe and
secure?

No. We need to be cautious about how much personal information


on social networking sites.The more information we post, the easier it
may be for a hacker to steal identify, access data or commit other crimes.Social networks are
a great way to stay connected with others, but you should be wary
about how much personal information you post.

Empowerment Technologies 9
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

RULES OF NETIQUETTE Module 2

INTRODUCTION

Empowerment Technologies is a specialized module designed to provide students with


the foundation of knowledge and skills needed to succeed in environments that require the use
of computer and the internet.

Gathering information and facts about teaching competencies that are essential in the
information Age, such as the state of ICT technologies; online safety, security, ethics, and
etiquette; productivity tools with advances application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change, which are
aligned to the standards sets by the Department Of Education.

This module is prepared for you to help you achieve the required learning that need to
develop. This will be the source of information that will enable you to acquire the knowledge
and skills in Empowerment Technologies.

LEARNING OBJECTIVES

At the end of this lesson, the students should be able to:

consider one’s and other’s safety when sharing information using the internet;
consider one’s and other’s reputation when using the internet
determine and avoid the danger of the internet
be responsible in the use of social networking sites;
browse the internet efficiently and properly through proper referencing

LET’S TEST YOUR PRIOR KNOWLEDGE

Write YES if you agree with the statement and NO if you disagree on the before
each number.

YES 1. My computer has an antivirus so it is okay to open most email attachments like e-cards
and video files.

YES 2. Your friend told you that his college application was rejected due to the fact that you
posted a video of him doing crazy stuff at a party. You posted the video several years ago but
later took it down to protect your friend’s reputation. Can your friend be right that the college
found the video?

Empowerment Technologies 10
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

NO 3. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up so she can help you level up and get in game money.
She promises to keep your password a secret. Is it okay to give away you password?

NO 4. You received an email stating that your mother’s bank account is going to be forfeited
if you do not respond to the email. Is it safe to reply?

NO 5. You forgot that your essay is due tomorrow. While doing your research, you found a
website offering free essays. Is it okay to use the essay from this free essay website?

YES 6. A virus is a malware that multiplies and infects other computers through flash drives.

NO 7. Keyloggers are software that shows up ads even if you are not using your browser.

NO 8. Search engines scan websites for search results even if you have set your post to
“private”.

YES 9. There is a danger in posting information about a future vacation.

YES 10. Letting people know your birthday is probably a must if you want to get as many gifts
as possible. But having it in your profile makes you vulnerable to identify theft.

KEY TERMS

Cybercrime – a crime committed or assisted through the use of internet.


Privacy policy – tells the user how the website will handle its data.
Malwares – stands for malicious software
Virus – a malicious program designed to replicate itself and transfer from one another
Worm – a malicious program that transfers from one computer to another by any type of
means.
Trojan- a malicious program that is disguised as a useful program but once downloaded or
installed, leaves a PC unprotected and allows hackers to get your information
Spyware- a program that runs in a background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisements, mostly pop-ups
Spam – unwanted email mostly from bots or advertisers.
Phishing – acquires sensitive personal information like password and credit card details.
Pharming – a more complicated way of phishing where it exploits the DNS ( Domain
Name Service) system
Copyright – a part of the law, wherein you have the rights to your work, and anyone
who uses it without your consent is punishable by law.

Empowerment Technologies 11
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

Fair use – means that an intellectual property may be used without a consent as long as it
is used in commentaries, critisms, search engines, parodies, news reports, research,
library archiving, teaching and education.

Module 2
RULES OF NETIQUETTE

IMPORTANT CONCEPT

Online Safety and Security

The internet is truly a powerful tool. It can be used to promote a business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment through games, online
communities and everything in between. But, there is always the “other side of the coin”.

The internet is one of the most dangerous places, especially if you do not know what you are
doing with it.

Let us identify the risk of sharing your information.

TYPES OF INFORMATION RISKS


1. First name There is a risk in sharing your first name; Chances are the hacker
may already know plenty of stuff about you only gives out first
name. Likewise, you cannot just walk in a room and start
introducing yourself to everyone. You do not know whom you can
come across with.
2. Last name If sharing your first name is a small risk, having both your first and
last is more risky. You will be vulnerable to being searched for
using search engines, which include image search. Matching a
name with a face is a modus to several cybercrimes like identity
theft.
3. Middle name Sharing you middle name alone is probably not the most risky of
these shared information, but sharing your full name would be.
4. Current and previous Most people who steal identities study their subject. They can use
schools this information for verification purposes.
5. Your cell phone number Your cell phone number should never be posted over the internet.
The internet is a public place. It is the same as posting your
number on a billboard. You would not want random strangers to
text you or call you, or worse pretend that they are someone else.
6. The name of your mother Risky, yet not as risky as posting their full names, especially you
and father mother’s maiden name. In fact you may have already encountered
many websites that requires your mother’s maiden name as an
answer to a secret question whenever you lose your password.
7. The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their
identities to dupe you.
8. Your address Giving the internet your number is one thing; giving them your
address is a whole other level. It would be much easier for

Empowerment Technologies 12
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
Highway 1, Francia, Iriga City, Philippines 4431

criminals to find you.


9. Your home phone number This shared information is more risky than sharing your personal
phone number. Scams usually used this information to device you,
one of which is when a stranger pretends to know your parents or
pretends to be you.
10. Your Birthday Letting people know your birthday is probably a must if you want
to get as many gifts as possible. But having it in profile makes you
vulnerable to identify theft.

The Internet is defined as the “ Information superhighway”. This means that anyone has
access to this highway, can place information and can grab that information. Any information,
even things that you have set privately, can be accessed one way or another.

The treat of cybercrime is very real, while you may not experience the threat now, whatever
information we share today could affect our future.

Tips to Stay Safe Online

The internet is a public place and it is set up to protect you. Here are some tips to help you stay
safe when using the internet.

Be mindful of what you share online and what site you share it.
Do not just accept terms and conditions; read it.
Check out the privacy policy page of the social networking site you use. By keeping your
profile private, search engines will be able to scan your profile.
Know the security features of the social networking site you use. By keeping your profile
private, search engine will not be able to scan your profile.
Do not share your password with anyone.
Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode,” a
feature of the browser, will not protect you from hackers.
Do not talk to strangers whether online or face-to-face.
Never post anything about a future vacation. It is similar to posting,”Rob my house at this
date”.
Add friends you know in real life.
Avoid visiting untrusted websites.
Install and update anti-virus software on your computer. Use only one anti-virus software to
avoid conflicts.
If you have a Wi-Fi at home, make it a private network by adding a password.
Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-
peer downloads (torrents) as the download is most likely not monitored by the site
owner.
Buy software; do not use pirated ones.
Do not reply or click links from suspicious emails.

Empowerment Technologies 13
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

INTERNET THREATS
Here are some threats you should be aware of when using the internet:
Malware – stands for malicious software

Virus- a malicious program design to replicate itself and transfer from one computer to
another either through the internet and local networks or data storage like flash
drives and CDs
Worm – a malicious program that transfer from one another by any type of means.
Often, it uses a computer network it spread itself. For example, the ILOVEYOU worm
(Love bug Worm) created by a Filipino.
Trojan – a malicious program that is disguised as a powerful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get your
information.
Rogue security software- tricks the user into posting that it is security
software. It asks the user to pay to improve his/her security but in reality
they are not protected at all.
Spyware- a program that runs in the background without you knowing (thus called
“spy”). It has the ability to monitor what you are currently doing and typing through
Keylogging.
Keyloggers – used to record the keystroke dine by the users. This is done to
steel the password or any sensitive information. It can record email,
messages, or any information you typed using your keyboard.
Spam – unwanted email mostly from bots or advertisers. It can be used as malware.
Phishing – Its goal is to acquire sensitive personal information like passwords and credit
card details.
Pharming – a more complicated way of phishing where it exploits the DNS
(Domain Name Service) system.
Think Before You Click

Here are things you might want to consider before posting something over the internet:

Before you post something on the web, ask this question to yourself: Would you want your
parents or grandparents to see it? Would you want your future boss to be it? Once you
post something on the web, you have no control of who sees your posts.
Your friends depend on you to protect their reputation online. Talk to your friends about this
serious responsibility.
Set your post to “private”. In this way, search engines will not be able to scan that post.
Avoid using names. Names are easy for search engines to scan.
If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it
down or report it as inappropriate.

Empowerment Technologies 14
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

Copy Infringement
Here are some tips that could help you avoid copyright infringement:
Understand – Copyright protects literacy works, photographs, paintings, drawings, films,
music (and lyrics), choreography, and sculptures but it generally does NOT protect
underlying ideas and facts.

Be responsible – Even if a material does not say that it is copyrighted, it is not a valid defence
against copyright. Be responsible enough to know if something has a copyright.

Be creative – Ask yourself whether you are making is something that came from you or
something made from somebody else’s creativity.

Know the law- there are some limitations to copy right law. For
instance in the Philippines, copyright only last a lifetime (of the
author) plus 50 years. There are also provisions for “Fair use” which
mean that an intellectual property may be used without consent as
long as it is used in commentaries, criticisms. Search engines,
parodies, news reports, research, library archiving,
teaching, and education. Figure 1 Fair Use Logo

Online Research
Here are some tips in conducting online research:
Have a question in mind – Focus on a question you want answered. If it is a series of
questions, start with one. Never search on one go.
Narrow it down - Search engines like Google, Bing, or Yahoo use several filters to
determine the most appropriate result for you.
Advanced Search – The best way to filter information you get from search engines is by
using the advanced search. This will allow you to filter out information you do not
need.

Figure 2 Screenshot of Google Advanced Search

In Microsoft engine, Bing,you can use certain keywords and symbols for your advance search:

Symbol Function
+ (and) Finds webpage that contain all the items that are preceded by he + symbol; allows
you to include terms that are usually ignored
“” Finds the exact words and phrase
() Finds and excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases

Empowerment Technologies 15
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

NOT or - Excluded wen pages that contain a term or phase


Or or │ Finds web pages that contain either of the terms or phrases

By default, all searches are AND searches.


You must capitalize the NOT and OR functions. Otherwise, Bing will ignore them as stop
words, which are commonly occurring words and numbers that are omitted to speed a
full-text search.
Stop words and all punctuations marks, except for the symbols noted in this topic, are
ignored unless they are surrounded by quotation marks or preceded by the + symbol.
Only the first ten terms are used to get search results.
Similar to the MDAS, whenever you solve an arithmetic problem (where multiplication is
computed first over division, addition, and subtraction), term grouping and Boolean
functions are supported in the following preferred order:
parenthesis ( )
quotation marks “ “
NOT+-
AND &
OR │

Because OR is the function with the lowest precedence, enclose OR terms in parentheses when
combined with other operators in a search.
Source: Microsoft.com
Look for a credible source – Some wikis, though filled with updated information, are not
credible source. This is due o the fact that anyone can edit its content.

Figure 3 References found at the bottom of every Wikipedia page contain links to entry's sources of information

Give Credit – If you going to use the information from a source of educational purposes,
give credit to the original author of page or information

Empowerment Technologies 16
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

ACTIVITY 1

Matching Type: Match Column A with Column B. Write the letter of the correct answer on
the space before each number.
A B

e 1. virus a. designed to send you advertisements


l 2. rogue b.sends an official-looking email and is designed to steal sensitive
personal information
o 3. keylogger
c.a provision that allows you to use copyrighted work without consent
a 4. adware with certain limitations
i 5. spam d.a browser future that is synonymous to “private” browsing
b 6. phishing e.replicates and can transfer from one computer to another.
f.exploits the DNs system
c 7. fair use
g.states that anyone who uses your work without your consent is
h 8. spyware punishable by law.
n 9. private h.runs in a background and monitors what you are doing
m 10. malware i.unwanted email mostly from bots
j.disguised as a useful program but is not
d 11. incognito
k.the information super highway
k 12. internet l. tricks the users into posing that it is a security software
j 13. Trojan m.a malicious software
g 14.copyright n.an option to hide a post so that search engines could not scan it.
f 15. pharming o.used to record the keystrokes done by the user.

ACTIVITY 2

Below is a questionnaire about how much information you have shared so far. Put check (/)
under shared or not shared.

Type of Information Shared Not Shared


First name /
Last name /
Middle name /
Current and previous school (s) /
Your cellphone numbers /
The name of your mother and father /
The name of the sublings /
Your address /
Your home phone number /
Your Birhday /
How can search engines locate you? Is there of being found by search engines?Search engines
work by taking a list of known URLs, which then go to the scheduler. The scheduler decides when to
crawl each URL. Crawled pages then go to the parser where vital information is extracted and indexed.
Parsed links go to the scheduler, which prioritizes their crawling and re-crawling.

Empowerment Technologies 17
Grade 12
L
CEGUERA TECHNOLOGICAL COLLEGES

Highway 1, Francia, Iriga City, Philippines 4431

ACTIVITY 3

Essay: Defend you answer. 100 pts


•Do you agree or disagree with the provisions of the copy right law?
Copyright is the intellectual property that governs work resulting from creation from the mind from the artistic
literaly and scholarly areas. So, when we say output from the three areas literary, scholarly, artistic these are the
written works, visual arts and basically all original written works, written published, visual in nature. Those are
covered by copyright, it also covered computer programs, the books, the magazines, paintings, photos and
artworks.You cannot protect or copyright does not applied to ideas it has to be inform, physical, visual and tangible
form; copyright protection sets in. Copyright protection basically covers two aspects we have economic rights and
your moral rights. If you have an original idea or piece of creative work, no matter what others may say, it’s still a
potential asset and should be treated as such. Your work can end up having considerable value in the future and
can even potentially be used for financial collateral. Therefore, I agree to this provisions since it only shows that
this gives value and importance to our work.
•How would you feel if someone posted something embarrassing about you? What would you do?
If someone posted something embarrassing about, first is I would be upset if that thing would
really involved my personal life that other people should not know. It is really disappointing
since it can affect me as a subject of her/his embarrassing post. I will confront her/him and
explain my side. I would tell her/him honestly about what I feel about his/her post for them to
know if I like it or not so that next next time they will know what to post and not.

ASSIGNMENT

As a whole, what you think is the essence of the rules of Netiquette to


you?

The rules of netiquette are just as important in cyberspace as they are in the real world— and
the evidence of poor netiquette can stick around to haunt you for much longer. Follow the
basic rules of netiquette to avoid damaging your online and offline relationship. Be ethical,
breaking the law is bad netiquette. Strong and heated arguments must be operated

Good Luck and God Bless!

Submit this module on

“Much education today is monumentally ineffective. All too


often we are giving young people cut flowers when we should
be teaching them to grow their own plants.”
John W. Gardner
Empowerment Technologies 18
Grade 12

You might also like