ETech Q1 Weeks 1-2
ETech Q1 Weeks 1-2
ETech Q1 Weeks 1-2
PLEDGE OF COMMITMENT:
I commit fully to the accomplishment of the worksheet with all honesty and dedication.
I promise to spend ________________________________________________(no. of
hours/specific day(s) of the week) learning about Empowerment Technologies.
Further, I promise that no part of this worksheet will be posted publicly, and I will not
allow anybody to have it photocopied without a written permit of my teacher.
________________________________________
STUDENT’S SIGNATURE OVER PRINTED NAME /DATE
Writers
NEIL C. BOBIS ALEX JR. E. FACELO
LOVELYN F. CASTRO ARNIL C. PALOMAR
Reviewers
JO-ANN R. PET LEO C. ABE ABE
Philippines is dub as the ‘‘ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers. At the end of 2018,
51.2 percent of individuals, or 3.9 billion people, were using the Internet. This represents an
important step towards a more inclusive global information society. In developed countries, four
out of five people are online, reaching saturation levels. In developing countries, though, there is
still ample of room for growth, with 45 per cent of individuals using the Internet. In the world’s
47 least-developed countries (LDCs), Internet uptake remains relatively low and four out of five
individuals (80 per cent) are not yet using the Internet.
In addition, most people can access the Internet through a 3G or higher-quality network.
This evolution of the mobile network, however, is going faster than the growth in the percentage
of the population using the Internet.
Internet
Internet sometimes called “the Net’’, is the global system of interconnected computer
networks that use the internet protocol suite (TCIP/IP) to link billions of devices worldwide. It is
also a worldwide system of computer networks- a network of networks in which the users at any
one computer can get information from any other computer.
Page 1
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Web page is a hypertext document connected to the World Wide Web. It is a
document that is suitable for the World Wide Web while website is a location connected to the
internet that maintains one or more pages on the World Wide Web.
Types of Website
Static website is the basic type of website that is easy to create. You don’t need the
knowledge of web programming and database design to create a static website. Its web pages are
coded in.
HTML (Hypertext Markup Language). HTML is the standard markup language for
creating web pages. The codes are fixed for each page so the information contained
in the page does not change and its looks like a printed page.
Dynamic website is a collection of dynamic web pages whose content changes
dynamically. It accesses content from a database or Content Management System (CMS).
Therefore, when you alter or update the content of the database, the content of the website is also
altered or updated.
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of
the Web pages connected by hyperlinks. According to Berners Lee, Web 1.0 could be
considered as “read only web”. In other words, the early web allowed us to search for
information and read it. There was little in the way of user interaction or content
contribution.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a
website differently than others. It allows users to interact with the page; instead of just
reading the page, the user may be able to comment or create user account. According to
Berners Lee, it is considered as “read and write web”.
Web 2.0 also allows users to use web browsers instead of just using their operating system.
Browsers can now be used for their user interface, application software (or web applications),
and even for file storage.
3. Web 3.0 – this platform is all about semantic web. It aims to have machines (or servers)
understand the user’s preferences to be able to deliver web content. According to Berners Lee,
it is considered as “read, write and execute web”.
The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The
W3C standard encourages web developers to include semantic content in their web pages.
Page 2
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
5. Software as a service- users will subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread
sheet.
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.
Trends in ICT
Convergence– is the synergy of technological advancements to work on a similar goal or task.
For example, besides using your personal computer to create word documents, you can
now use your smartphone.
Social Media– is a website, application, or online channel that enables web users web users
to create, co-create, discuss modify, and exchange user generated content.
a) Social Networks – These are sites that allows you to connect with other people with the same
interests or background. Once the user creates his/her account, he/she can set up a
profile, add people, share content, etc.
Example: Facebook and Google+
b) Bookmarking Sites –. Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
Example: Stumble Upon, Pinterest
c) Social News – Sites that allow users to post their own news items or links to other news
sources. The users can also comment on the post and comments may also be rank.
Example: Reddit and Digg
d) Media Sharing – sites that allow you to upload and share media content like images,
music and video.
Example: Flickr, YouTube and Instagram
e) Microblogging – focus on short updates from the user. Those that subscribed to the user
will be able to receive these updates.
Example: Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other users are able to comment on
the said topic.
Example: Blogger, WordPress and Tumblr
Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is
largely because of the devices capability to do the tasks that were originally found in PCs.
Several of these devices are capable of using a high-speed internet. Today the latest model
devices use 4G Networking (LTE), which is currently the fastest.
Page 3
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Mobile OS
Assistive Media
A non- profit service designed to help people who have visual and reading impairments.
A database of audio recordings is used to read to the user.
Cloud Computing
A distributed computing on internet or delivery of computing service over the internet.
Instead of running an e-mail program on your computer, you log in to a Web e-mail account
remotely. The software and storage for your account doesn’t exist on your computer – it’s on the
service’s computer cloud.
Example: Yahoo!, Gmail, Hotmail
1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – often servers are in geographically different places, but server
acts as if they are working next to each other.
3. Data centers - It is a collection of servers where application is placed and is accessed via
Internet.
Types of Clouds
Public Cloud - allows systems and services to be easily accessible to the general public.
Public cloud may be less secured because of its openness, e.g. e-mail
Private Cloud - allows systems and services to be accessible within an organization. It
offers increased security because of its private nature.
Community Cloud - allows systems and services to be accessible by group of
organizations.
Hybrid Cloud - is a mixture of public and private cloud. However, the critical activities
are performed using private cloud while the non-critical activities are performed
using public cloud.
Page 4
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score:_______
Activity Number: 1.1-A
Directions: Identify the various media platforms, and sites. Write your answers on the
space provided before each number.
Page 5
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Activity Number: 1.1-B
Directions: Compare and contrast media platforms by analyzing their differences and
similarities.
Convergent
Technologies
Social Media
Mobile Media
Assistive Media
Page 6
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Semester: FIRST Code: CS_ICT11/12-ICTPT-Ia-b-2
Quarter: FIRST Week Number: 1 Day: 2 No. of Hours: 2
- Stephen Hawking
Most of us are ‘connected’ via our laptops, mobile phones, tablets or personal computer.
The potential for the internet to be a valuable and a fun resource for entertainment, making
friends, keeping in touch and learning is huge. But if you use the internet, you could be at risk of
illegal activity or abuse - be it bullying, fraud or something more serious. Unlike seeing someone
face to face, on the net, people aren't always what they first seem. We need to stay safe while
using the internet, but we may not know just how to do that. In the past, Internet safety was
mostly about protecting your computer from viruses. But today, the internet’s vast reach,
constantly changing technologies, and growing social nature have made the users more
vulnerable to identity theft, scams, privacy violations and even harassment.
This lesson introduces you to the different internet threats you may encounter while
online. It will teach you some tips to stay safe online and encourage you to adopt a safer mindset
toward using the Internet.
Internet Threats
Cyberbullying is the use of information and communication technologies to support
deliberate, repeated and hostile behavior by an individual or group, which is intended to harm
(Bill Belsey, www.cyberbullying.org). Examples of cyberbullying include posting hurtful
images making online threats, and sending hurtful emails or texts.
Page 7
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Cyberstalking is the act of persistent and unwanted contact from someone online. It
may involve any number of incidents including threats, libel, defamation, sexual harassment, or
other actions in which to control, influence, or intimidate their target. (John Sammons, Michael
Cross, www.sciencedirect.com)
Identity theft is the crime of obtaining the personal or financial information of another
person for the sole purpose of assuming that person’s name or identity to make transactions or
purchases. (Julia Kagan,www.investopedia.com)
Internet fraud / scam is the use of internet services or software with Internet access to
defraud victims or to otherwise take advantage of them. Internet crime schemes steal millions of
dollars each year from victims and continue to plague the internet through various methods.
Several methods include the following:
Phishing
The act of sending an email to a user falsely claiming to be an established legitimate
enterprise in an attempt to scam the user into surrendering private information that will be
used for identity theft. Phishing email will typically direct the user to visit a website where
they are asked to update personal information, such as a password, credit card, social security,
or bank account numbers, that the legitimate organization already has. The website, however,
is bogus and will capture and steal any information the user enters on the page.
Here's an example of popular phishing emails we've seen over the years.
Pharming
A more complicated way of phishing where it exploits the DNS (Domain Name Service)
system. is a scamming practice in which malicious code is installed on a personal computer
or server, misdirecting users to fraudulent Web sites without their knowledge or consent.
Pharming has been called "phishing without a lure."
Ransomware
A form of malware targeting both human and technical weaknesses in organizations and
individual networks in an effort to deny the availability of critical data and/or systems. It is
Page 8
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
frequently delivered through spear phishing emails to end users, resulting in the rapid
encryption of sensitive files on a corporate network. When the victim organization
determines they are no longer able to access their data, the cyber perpetrator demands the
payment of a ransom to regain access to their data.
Types of
Description
Malware
Designed to replicate itself and transfer from one computer to another either
Virus
through the Internet and local networks or data storage like flash drives and CDs.
Worms spread from computer to computer, but unlike a virus, it has the capability
Worm
to travel without any human action.
Trojan It will appear to be useful software but will actually do damage once installed or
horse run on your computer.
The common name used to describe software that is given to the user with
Adware advertisements embedded in the application. Adware is considered a legitimate
alternative offered to consumers who do not wish to pay for software.
Spyware A program that runs in the background without you knowing it.
Financial Designed to scan a computer system for information related to financial
Malware transactions.
Online grooming is the term used to describe inappropriate behavior towards a young
person, putting them at risk to a sexual offence. Pedophiles have been known to use this method
to contact young people by disguising themselves as another young person. This can lead to
gaining the trust of an individual and their friends.
Sexting usually refers to sending and receiving rude messages or videos of naked
pictures, 'underwear shots', any sexual texts, images or videos. These images or videos can be
sent from a boyfriend or girlfriend or a friend or someone you've met online. You also may have
sent a sexual photo, video or text to someone else.
Spam is usually considered to be electronic junk mail or junk newsgroup postings. Some
people define spam even more generally as any unsolicited email. However, if a long-lost brother
finds your email address and sends you a message, this could hardly be called spam, even though
it is unsolicited. Real spam is generally email advertising for some product sent to a mailing list
or newsgroup.
Don't give out personal information such as your address or phone number.
Don’t send pictures of yourself to anyone, especially indecent pictures.
Don't open emails or attachments from people you don't know.
Don't become online ‘friends’ with people you don't know.
Never arrange to meet someone in person who you've met online.
If anything you see or read online worries you, tell someone about it.
Be mindful of what you share online and what site you share it to.
Do not accept terms and conditions; read it.
Page 9
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Check out the privacy policy page of a website to learn how the website handles the
information you share.
Do not share your password with anyone.
Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode”, a
feature of the browser, will not protect you from hackers.
Do not talk to strangers whether online or face – to – face.
Never post anything about a future vacation. It is similar to posting, “Rob my house at
this date.”
Add friends you know in real life.
Avoid visiting untrusted websites.
Install and update an antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
If you have a Wi-Fi at home, make it a private network by adding a password.
Avoid downloading anything from untrusted websites. You are most vulnerable in peer -
to – peer downloads (torrents) as the download is most likely not monitored by the site
owner.
Buy the software; do not use pirated ones.
Do not reply or click links from suspicious emails.
2. Use a Firewall
You should also install a firewall. A firewall is a system that prevents unauthorized use and
access to your computer. A firewall can be either hardware or software. Hardware firewalls
provide a strong degree of protection from most forms of attack coming from the outside
world and can be purchased as a stand-alone product or in broadband routers. Unfortunately,
when battling viruses, worms and Trojans, a hardware firewall may be less effective than a
software firewall, as it could possibly ignore embedded worms in outgoing e-mails and see
this as regular network traffic.
Page 10
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Activity Number: 2.1
General Directions: Read the statements carefully in each test item and follow strictly the
direction given.
Test I: TRUE/ FALSE:
Directions: Write “A” if the statement is correct otherwise, write “B” on the space provided
before the number.
______ 1. What you post and upload to the internet is there forever, even if you delete it.
______ 2. Popular sites are always safe from spyware, malware, and other online threats.
______ 3. Following pop-up and spam links can lead to viruses, spyware, and malware.
______ 4. Firewall is a software that aims to gather information about a person or organization
without their knowledge.
______ 5. When online, you should be careful whenever approached by a new person or asked
to provide personal information.
______ 6. Cyberbullying can include such acts as making threats, sending provocative insults or
racial or ethnic slurs, or gay bashing.
_______7. Installing and updating more than one antivirus software on your computer may cause
an effective security against any malicious software.
_______8. When Susan shops online, it’s okay for her to enter a credit card and personal
information as long as she feels like the online store is legitimate.
_______9. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private)
mode”, a feature of the browser, will not protect you from hackers.
______ 10. It’s just okey to share your personal information such as, complete name, birth date,
address and contact number in social networking sites to gain more friends.
Test II: IDENTIFICATION.
Directions: Solve the crossword puzzle by answering what is being defined in the statements
below.
HORIZONTAL
1. Use of information and communication
technologies to support deliberate, repeated
and hostile behavior by an individual or group,
which is intended to harm.
2. It harms the computer and has the capability to
travel without any human action.
3. It replicates itself and harms the computer
using flash drives.
4. refers to sending and receiving rude messages or
videos of naked pictures, ‘underwear shots', any
sexual texts, images or videos.
5. An act of acquiring sensitive information by
means of sending fake email to the victims.
VERTICAL
6. Act of harassment online.
7. Any unsolicited email.
8. Phishing without a lure.
9. The crime of obtaining the personal or financial information of another person for the sole
purpose of assuming that person’s name or identity to make transactions or purchases.
10. It is frequently delivered through spear phishing emails to end users, resulting in the rapid
encryption of sensitive files on a corporate network.
Page 11
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Activity Number: 2.2
Directions: Compose an insightful reflection paper on online safety and security which you
can apply in your strand. Write your answer on the space provided below.
Page 12
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Page 13
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Semester: FIRST Code: CS_ICT11/12-ICTPT-Ia-b-2
Quarter: FIRST Week Number: 2 Day: 3 No. of Hours: 2
Ethics in General
A guideline is needed to stop the current technology products from being exploited for
example replicating original CDs and selling them as pirated software, this unethical behavior
can be controlled by the code of conducts. Unethical refers to any code of conducts that are not
conforming to approved standards of social or professional behavior. Computer ethics is a
system of moral standards or values used as a guideline for computer users.
The term NETIQUETTE, is a short term for Network Etiquette. It is an etiquette of
cyberspace; a set of rules for behaving properly online. So when we talk about Etiquette it
simply means the forms required by good breeding or prescribed by authority to be required in
social or official life.
Why are rules of conduct important when communicating online?
Just like we expect other drivers to follow the rules of the road, there are many
unspoken rules of etiquette for communication online. Following these rules ensures clear
communication, and prevents misunderstandings and hard feelings.
What are some good things to do in your online communication?
Using common acronyms, smileys, clear subject lines; thinking twice before you send an
email or post online; or consulting a website’s FAQ are all acceptable answers.
What are some things to avoid?
Using all capital letters, writing lengthy emails, posting spam, or sending emails to a
large number of recipients are all things to avoid.
Proper etiquette is nothing new for most people. You grew up with your parents
constantly telling you to mind your manners. But in a digital age where the unwritten online
“rules” are constantly changing, proper netiquette may seem bit mystifying.
Page 14
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
The Core Rules of Netiquette (Book of Virginia Shea)
Rule no. 1: Remember the human.
“Do unto others as you'd have others do unto you”. This is the golden rule of netiquette,
never forget that the person reading your mail or posting is, indeed a person with feelings
that can be hurt. Stand up for yourself, but try not to hurt people's feelings.
Rule no. 2: Adhere to the same standards of behavior online that you follow in real life.
Be ethical, breaking the law is bad netiquette. You should abide with law of the land and
behave in accordance with the norm of the society.
Cyber law is also known as Cyber Law or Internet Law. The area of law that deals
with the Internet's relationship to technological and electronic elements, including Computer,
Software, Hardware and Information systems (IS).
Cyber laws prevent or reduce large scale damage from cybercriminal activities by
protecting information access, privacy, communications, intellectual property (IP) and freedom
of speech. It is related to the use of the internet, websites, email, computers, cell phones,
software and hardware, such as data storage devices.
The increase in Internet traffic has led to a higher proportion of legal issues worldwide.
Because cyber laws vary by jurisdiction and country, enforcement is challenging, and restitution
ranges from fines to imprisonment.
Page 16
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
The Ten Commandments of Computer Ethics
The Computer Ethics Institute provides their Ten Commandments of Computer Ethics
as a code of computer ethics. These principles consider the effective code of conducts for the
proper use of information technology.
1. You shall not use a computer to harm other people.
2. You shall not interfere with other people's computer work.
3. You shall not snoop around in other people's computer files.
4. You shall not use a computer to steal.
5. You shall not use a computer to bear false witness.
6. You shall not copy or use proprietary software for which you have not paid.
7. You shall not use other people's computer resources without authorization or proper
compensation.
8. You shall not appropriate other people's intellectual output.
9. You shall think about the social consequences of the program you are writing or the
system you are designing.
10. You shall always use a computer in ways that ensure consideration and respect for your
fellow humans.
Differences Between Ethics and Law
ETHICS LAW
Guideline As a guideline to Control As a rule, to control
computer users. computer users.
Moral Standards Ethical behavior is Judicial Standards Law is judged by
judged by moral judicial standards.
standards
Free to Follow Computer users are free Must Follow Computer users must
to follow or ignore the follow the regulations
code of ethics and law.
No Punishments No punishment for Penalties, Penalties,
anyone who violates imprisonments and imprisonments and
ethics. other punishments other punishments for
those who break the
law.
Universal Universal, can be Depends on the Depends on country
applied anywhere, all Country and state where the
over the world crime is committed.
Produce ethical To produce ethical Prevent misusing To prevent misuse of
computer users computer users. of computers computers.
Immoral Not honoring computer Crime Not honoring the law
ethics means ignoring means committing a
the moral elements crime.
(immoral).
Similarities Between Ethics and Law
Both ethics and law are complimentary to each other and are made:
to prevent any crime
to guide user from misusing computers
to create a healthy computer society, so that computers are used to contribute to a better
life
Note: Always remember to act within the ethics and laws of society online and keep yourself
safe offline or online.
Page 17
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Page 18
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Activity Number: 3.2
Directions: Compose an insightful reflection paper on the importance of Computer Ethics and
Law that greatly affect your daily routines which is applicable in your strand. Write your
answer on the space provided below.
RUBRIC FOR REFLECTION PAPER
Exemplary Sufficient Minimal Beginning
20 15 10 5
Student
Student demonstrates Student demonstrates
demonstrates a
an in-depth reflection Student demonstrates a minimal reflection
lack of reflection
on, and a general reflection on, and
on, or
personalization of the on, and personalization of, the
personalization of,
theories, concepts, personalization of, the theories, concepts,
the theories,
and/or strategies theories, concepts, and/or strategies
concepts, and/or
presented in the and/or strategies presented in the
strategies
course materials. presented in the course materials.
Self-disclosure / presented in the
Viewpoints and course materials. Viewpoints and
Depth of reflection course materials.
interpretations are Viewpoints and interpretations are
Viewpoints and
insightful and well interpretations are unsupported or
interpretations are
supported. Clear, supported. supported with
missing,
detailed examples Appropriate examples flawed arguments.
inappropriate,
from personal are provided from Examples are not
and/or
experiences are personal experiences, provided or are
unsupported.
provided, as as applicable. irrelevant to the
Examples are not
applicable. assignment.
provided.
Student goes into
Student makes Student goes into
some detail
in-depth synthesis of little detail explaining
explaining some
thoughtfully selected some specific ideas or
specific ideas or Student merely
aspects of issues from outside
issues from outside identifies some
Connection to experiences related to experiences related to
experiences related to general ideas or
outside the topic and makes the topic and makes
the topic and makes issues from outside
experiences clear connections very few connections
general connections experiences related
between what is between what is
between what is to the topic.
learned from outside learned from outside
learned from outside
experiences and the experiences and the
experiences and the
topic. topic.
topic.
Student goes into
Student makes
more detail
in-depth synthesis of
explaining some
thoughtfully selected Student goes into
specific ideas or
aspects of readings little detail explaining Student identifies
issues from readings
related to the topic some specific ideas or some general ideas
related to the topic
and makes clear issues from readings or issues from
and makes general
Connection to connections between related to the topic readings related to
connections between
readings what is learned from and makes general the topic. Readings
what is learned from
readings and the connections between are only those
readings and the
topic. Includes what is learned from assigned for the
topic. Includes
reference to at least readings and the topic.
reference to at least
two readings other topic.
one reading other
than those assigned
than those assigned
for class.
for class.
Student synthesizes,
Student attempts to Student has
analyzes and Student synthesizes
synthesize some difficulty restating
evaluates thoughtfully clearly some directly
Connection to directly appropriate some general ideas
selected aspects of appropriate ideas or
class discussions & ideas or issues from or issues from the
ideas or issues from issues from the class
unit objectives the class discussion as class discussion as
the class discussion as discussion as they
they relate to this they relate to this
they relate to this relate to this topic.
topic. topic.
topic.
Page 19
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Page 20
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Semester: FIRST Code: CS_ICT11/12-ICTPT-Ia-b-2
Quarter: FIRST Week Number: 2 Day: 4 No. of Hours: 2
Page 21
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Tips in Conducting Online Research
Name of the person or organization (The author of the information). Title of the home
page in italics (title shown in a title bar but is sometimes missing or unrelated).URL.
Date last seen.
For example
Page 22
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Common Commands for Search Engines
Quotation Marks ( " )
Using quotation marks will help to find specific phrases involving more than one
word.
For example: "Martin Luther King"
Addition Sign ( + )
Adding a + sign before a word means that it MUST be included in each site listed.
For example: + Florida + taxes
Subtraction Sign ( - )
Adding a - sign before a word means that it will NOT appear in the sites listed.
For example: + Washington -DC
Asterisks ( * ) Asterisks can be used for wild-cards in some search engines.
For example: Mexic* will look for Mexico, Mexican, Mexicali, etc.
Page 23
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Setting bookmarks on the Web
Browsers such as Safari, Firefox, and Internet Explorer provide a way to create a list of
your favorite sites that you can access with a click of the mouse. The procedure for creating a list
of sites is an easy and powerful tool for web use.
You can organize your bookmarks into file folders and can save them on a disk to transfer and
use on other computers
Copyright Issues
Everyone has a somewhat flexible, but not unlimited, copyright privilege under the "fair
use clause" of the U.S. Copyright Act. "Fair use" is the means by which educators of non-profit
educational institutions may use copyrighted works without seeking permission or making
payment to the author or publisher. Teachers and students are also protected to some extent by
the Digital Millennium Copyright Act, which went into effect in October 1998. Under current
guidelines, teachers and students are able to make limited use of copyrighted materials for
instructional purposes.
Copyrightable works include the following categories:
literary works
musical works, including any accompanying words
dramatic works, including any accompanying music, pantomimes, and choreographic
works
pictorial, graphic, and sculptural works
motion pictures and other audiovisual works
sound recordings
architectural works
These categories should be viewed broadly. For example, computer programs and most
"compilations" may be registered as "literary works"; maps and architectural plans may be
registered as "pictorial, graphic, and sculptural works."
Important questions to ask
What is the purpose for using the material?
Who is the audience?
How widely will the material be distributed?
Will the material be reproduced?
It is allowable under copyright guidelines to use copyrighted materials for class
assignments. Check specific guidelines for length of time the material can be kept up on a web
site.
Page 24
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Name: _______________________________ Gr. & Sec.: ______________ Score: _______
Activity Number: 4.1
Directions: Read the questions carefully and write your answer on the space provided.
1. Why is there a need for you to look for the most credible source? Explain your answer.
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
4. What could possibly happen if you’ve got the wrong source for your research?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
Page 25
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar
Congratulations! You did a great job!
REFERENCES
Page 26
Empowerment Technologies N.Bobis, L.Castro,
A.Facelo, A. Palomar