Module 2 Week 2
Module 2 Week 2
Module 2 Week 2
Technologies
Quarter 1 – Module 2
Online Safety, Security Ethics,
and Etiquette
Office Address: 16 S Quiling Sur, City of Batac, 2906, Ilocos Norte, Philippines
Website: www.csdbatac.com
ii
Introductory Message
Particularly, this module hopes to engage the learners into guided and independent
fun-filled learning activities at their own pace and time. Furthermore, this aims to help learners
acquire the needed 21st century skills and the four livelihood skills for survival – the 4As
(agtagibalay, agtaraken, agmula, agliwliwa), which are considered very vital in surviving any
crisis.
To achieve the above objectives, the facilitators and learners need to be guided by the
following reminders:
iii
For the learner:
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities included
in this module.
3. Read the direction/s carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher or facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will become an active learner and you will
experience meaningful learning and gain deeper understanding of the relevant
competencies. You can do it!
iv
What I Need To Know
People are becoming dependent on the Internet in which sometimes we do not pay attention
to how much information we share online. Being on different platforms, we should be aware
of our actions and protect ourselves at the same time. Remember that once something has
been shared online, it cannot be deleted. Thus, internet safety is always our primary concern.
This module allows you to explore your digital life and learn the importance of acting
responsibly when carrying out relationships over digital media.
• Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational challenges (CS_ICT11/12-
ICTPT-Ia-b-3)
1. identify one’s and other’s safety when sharing information using the internet;
2. identify one’s and other’s reputation when using the internet;
3. identify the different threats using the Internet;
4. explain how to prevent different Internet threats;
5. demonstrate responsible use of social networking sites;
6. demonstrate resourcefulness and creativity in generating search terms using a
search engine; and
7. demonstrate discernment in judging the credibility, value, and usefulness of
researched materials.
1
What I Know
Direction. Read the following questions carefully. On the space provided in each item, write
the letter that corresponds to the correct answer. If there is no answer in an item, write E.
_________ 2. When responding to my classmate's wiki posts, I should only say things that I
would be willing to say when I meet with them face to face. What specific rule in
the netiquette was followed?
A. Share expert knowledge.
B. Respect other people’s time and bandwidth.
C. Help keep flame wars under control.
D. Adhere to the same standard that you follow in real life.
_________ 3. The web is a maze of connected data and information. Which of the following
is NOT TRUE on online searching?
A. Choose your web browser based on the best search engine.
B. Do not use punctuation and Boolean operators like AND, OR, NOT.
C. Limit your search to specifics.
D. Use quotation marks for specific phrases.
_________ 4. Jack Cyber received an email stating that her mother’s bank account is going
to be forfeited if he will not respond to the email immediately. What type of
internet threat is encountered by Jack Cyber?
A. Adware B. Scam C. Phishing D. Malware
_________ 5. Jimuel created a fake website that looks nearly identical to a real website to
trick his users into entering their login information. What type of internet threat is
this?
A. Adware B. Scam C. Phishing D. Malware
_________ 6. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
2
_________ 8. Criminals access someone’s computer and encrypt the user’s files and data. The
user is unable to access this data unless they pay the criminals to decrypt the
files. This practice is called ___________.
A. Adware B. Scam C. Phishing D. Malware
_________ 10. Which of the following must NOT be done if you received an embarrassing
picture from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
_________ 11. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
_________ 12. When I encounter wrong grammar and wrong spelling of posts of my friends
on Facebook, I message them privately to inform his/her mistakes. What
specific rule in the netiquette was followed?
A. Don’t abuse your power.
B. Make yourself look good online.
C. Remember the human.
D. Be forgiving of other people’s mistakes.
_________ 13. What should you do if you feel you are being cyber-bullied?
A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Internet
3
For #’s 14-15, use the choices below.
A. If only the FIRST statement is TRUE. C. If BOTH statements are TRUE.
B. If only the SECOND statement is TRUE. D. If BOTH statements are FALSE.
Let’s Check!
Turn to page 32 to check your answer.
If you got 100% you may skip the module.
If you got 99%-50% you may proceed with the module.
4
Lesson
Online Safety, Security Ethics
1 and Etiquette
What’s In
You have learned from your previous module that the
introduction of the World Wide Web and the internet has made
great breakthroughs in the field of information sharing and
communication. It helped connect people miles away from each
other However, these advances carried drawbacks wherein the
issue of safety, security, and ethics of the consumers is
compromised. Thus, how you are going to keep yourself safe
while surfing the web?
Photo Credit: http://emergentdigital.com/3-
small-business-social-media-tips/
Let’s find out!
Key Questions:
1. What is social media’s role in your life?
2. What are your favorite and least favorite things to do with social media?
4. Do you connect with others or create things using social media? Finish this statement:
For example, My media life is like a track meet because it is so exhausting at the end of the
day.
5
What’s New
The next activity aims to assess how safe are you in using the Internet by tracking what have
you shared and not shared over the internet.
Direction: Below is a questionnaire about how much information you have shared so far. Put
a check under Shared or Not shared.
Key Questions
Try using a search engine like Google then type your First and Last Name
• Did you get links to your profile page? _____
Generalization
• Based from your answers above, do you think you are safe when using the Internet?
Why?
So how did these things happen? Is there any danger of being found by search engines?
Let us find out!
6
What Is It
Online Safety and Security
The internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment through games,
online communities, and everything in between. But like most things in this world, there is
always the “other side of the coin”. The internet is one of the most dangerous places, especially
if you do not know what you are doing with it. But here is no need to worry; it is never that late.
Hopefully, by the end of this lesson, you can consider how you go about your use of the
Internet.
Let us go back to the “How Safe are You?” activity. Let us visit each item and see how risky it
is to share them.
Any information, even things that you have set privately, can be accessed one way or another.
Here are some tips to help you stay safe when using the internet.
• Be mindful of what you share online and what site you share it to.
• Do not just accept terms and conditions; read it.
7
• Check out the privacy policy page of a website to learn how the website handles the
information you share.
• Know the security features of the social networking site you use.
• Do not share your password with anyone.
• Avoid logging into public networks/Wi-Fi. Browsing in incognito (or private) mode, a
feature of the browser, will not protect you from hackers.
• Do not talk to strangers whether online or face-to-face.
• Never post anything about a future vacation. It is similar to posting, “Rob my house at
this date”.
• Add friends you know in real life.
• Avoid visiting untrusted websites.
• Install and update antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
• If you have Wi-Fi at home, make it a private network by adding a password.
• Avoid downloading anything from untrusted websites.
• Buy the software; do not use pirated ones.
• Do not reply or click links from suspicious emails.
o Before you post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your future
boss to see it?
o Your friends depend on you to protect their reputation online.
o Set your post to private. In this way, search engines will not be able to scan
that post.
o Avoid using names. Names are easy for search engines to scan.
o If you feel that a post can affect you or other’s reputation, ask the one posted it
to pull it down or report it as inappropriate.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
a. Virus
o It is a malicious computer program that infects other programs by
attaching a copy of itself to executable files such as those having the
extensions of .exe and .com.
o It infects other computers when the infected file is run.
o The effects of having a virus in your system vary depending on what it
attacks.
8
e.g. You might experience system slowdown or failure in some
applications even in the hardware; lost or damaged files.
b. Worm
o It is a sub-class of a computer virus.
o Instead of attaching to executable files, it sends hundreds or even
thousands of copies of itself through email from an infected computer.
o It scans the computer for email addresses and sends itself. So, when
the other person opens the email, the infection starts again and
hundreds of thousands of copies of the worm are sent again.
o The biggest danger to worms is its capability to travel through the
networks.
e.g. The very large amount of internet traffic caused by worms can lead
to a system choke where little bandwidth is left for legitimate
communication purposes. Thus, usually causes the computer, network,
and servers to stop responding.
c. Trojan Horse
o It is not a virus nor a worm because it does not create copies of
themselves.
o It is a program that disguises itself as a normal or useful application.
o Users are usually tricked into running them due to disguise that they are
using.
e.g. one might run an application named calculator.exe thinking that it
is a calculator program but is a Trojan horse.
o It can also be used to install programs that create a backdoor in the
system where it can allow another person to remotely access and
control the computer.
o Rogue security software- - is a form of malicious software and internet
fraud that misleads users into believing there is a virus on their
computer and manipulates them into paying money for a fake malware
removal tool.
d. Adware
o It is a program designed to display advertisements in pop windows and
redirect the browsers to load promotional websites.
o It is usually secretly bundled with free applications that can download
from the internet.
o A Trojan Horse may also install adware the moment you run them.
e. Spyware
o It is installed without you knowing them either by running a Trojan Horse
or by visiting a website that secretly installs spyware.
o It is a program that may perform any or a combination of the following:
• Track surfing habits
• Harvest email addresses
• Keylogging
9
• Gathering information such as passwords, credit card numbers,
etc.
o The computer will experience system and connection slowdowns. It can
also send spam using your email client and email account directly from
your computer.
o It can be detected with the help of anti-spyware programs such as:
• Free Microsoft Windows Defender for older systems
• Microsoft Forefront Endpoint Protection for users that own a
genuine Microsoft Windows OS
• Spybot Search & Destroy and Malwarebytes
2. Email Spam
10
3. Identity Theft
b. Skimming
• Credit cards are swiped in a device that copies the data stored in it such
as name and card number.
• It is usually done in restaurants and bars.
c. Phishing
• An email scam where recipients are made to believe that the email is
from a legitimate business such as a bank.
11
Tips to prevent identity theft.
o Secure your paper and computer records.
o Always be aware of people looking at your financial records especially
your bank, credit, and identification card.
o Do not give your personal information to people especially when it is not
yours.
o Shred your financial statements such as banks, credit card, and utility
bills.
o Do not post personally identifiable information on the internet.
Online ethics- focuses on the acceptable use of online resources in an online environment.
Netiquette- focuses on the acceptable behavior of the person while using internet resource.
o You need to remember that you are talking to a real person when you are online.
o The internet brings people together who would otherwise never meet.
o Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
o You need to behave the same way online that you do in real life.
o You need to remember that you can get caught doing things you should not be doing
online just like you can in real life.
o You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
o Always take a look around when you enter a new domain when surfing the web.
o Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
o Remember people have other things to do besides read your email. You are not the
center of their world.
o Keep your post and emails to a minimum by saying what you want to say.
Rule no. 5: Make yourself look good online.
12
o Post the answers to your questions online because someone may have the same
question you do.
Rule no. 7: Help keep flame wars under control
o Do not take advantage of other people just because you have more knowledge or
power than them.
o Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistakes.
What’s More
Activity1. Cartoon Analysis
Direction: Study the images below and briefly answer the questions.
Source: https://bit.ly/2WMr8H7
13
What is the message of this cartoon? Do you agree
with the message? Why or why not?
Source:
https://www.pinterest.com/pin/55591995189
41926/
Activity 2.
YOUR
How do you think people will see you when they see your social
media accounts, your pictures or videos, post, or comments on
the internet?
IMAGE
HERE
What are the three ideas that you have learned from this module?
What are the two things that reinforce (coincides with) you to know about the topic?
14
What I Can Do
Exploration1: ICT in Action
Direction: Watch the video and briefly answer the following key questions.
Call center agent charged under cybercrime law. (2014) ABS-CBN News. YouTube. Retrieved
July 23, 2020, from https://www.youtube.com/watch?v=C0WJ-LVKWWo
Key Questions
1. What cybercrime was mentioned in the given news? Give a brief explanation of the
crime.
2. What pieces of advice were given by the authorities on how people can be protected
against cybercrime?
Direction: Read the headlines found below and try to reflect on the questions that follow.
Key Questions:
15
Assessment
Direction. Read the following questions carefully. On the space provided in each item, write
the letter that corresponds to the correct answer. If there is no answer in an item, write E.
_________ 1. Criminals access someone’s computer and encrypt the user’s files and data.
The user is unable to access this data unless they pay the criminals to decrypt
the files. This practice is called ___________.
A. Adware B. Scam C. Phishing D. Malware
_________ 3. Which of the following must NOT be done if you received an embarrassing
picture from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
_________ 4. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
_________ 5. When I encounter wrong grammar and wrong spelling of posts of my friends on
Facebook, I message them privately to inform his/her mistakes. What specific
rule in the netiquette was followed?
A. Don’t abuse your power.
B. Make yourself look good online.
C. Remember the human.
D. Be forgiving of other people’s mistakes.
_________ 6. What should you do if you feel you are being cyber-bullied?
A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Internet
16
_________ 7. Copyright infringement does not occur when a person __________________.
A. Alters the author’s name attached to a piece of work electronically
B. Offers for sale and exhibits in public of any article where the infringer knows
that the article was made without the copyright owner’s consent
C. Falsely attributes the authorship of a work
D. Showcase a film in public after obtaining permission from the copyright owner
_________ 8. When responding to my classmate's wiki posts, I should only say things that I
would be willing to say when I meet with them face to face. What specific rule in
the netiquette was followed?
A. Share expert knowledge.
B. Respect other people’s time and bandwidth.
C. Help keep flame wars under control.
D. Adhere to the same standard that you follow in real life.
_________ 9. The web is a maze of connected data and information. Which of the following
is NOT TRUE on online searching?
A. Choose your web browser based on the best search engine.
B. Do not use punctuation and Boolean operators like AND, OR, NOT.
C. Limit your search to specifics.
D. Use quotation marks for specific phrases.
_________ 10. Jack Cyber received an email stating that her mother’s bank account is going
to be forfeited if he will not respond to the email immediately. What type of
internet threat is encountered by Jack Cyber?
A. Adware B. Scam C. Phishing D. Malware
_________ 11. Jimuel created a fake website that looks nearly identical to a real website to
trick his users into entering their login information. What type of internet threat is
this?
A. Adware B. Scam C. Phishing D. Malware
_________ 12. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
17
_________ 15. Avoid downloading anything from untrusted websites.
Use at least two antivirus software to avoid conflicts.
Additional Activities
DIFFERENTIATED TASK
Goal Your goal is to improve student’s awareness of how to protect
themselves and others while using the Internet.
Audience High School Students
Situation The country has recorded an increasing number of cybercrime
victims, particularly among the students. These alarming situations
have signaled the different concern agencies to do a campaign.
As a social media influencer, you are asked by the leading
agencies to create a campaign material promoting “Think before
you Click”.
Product You will create one of the following products:
Note: NO COPYING FROM THE INTERNET
18
Samples of Typography Posters:
19
Lesson
Contextualized Online Search
2 and Research
What’s In
You have learned that the Internet is defined as the Information Superhighway. This means
that anyone has access to this highway, can place information, and can grab that information.
This lesson will help you to make the most out of the Internet when you research any topic.
Thus, are you a smarter user of search engines?
Direction: Open the Google application and type your Name in the search engine.
3. Should these bits of information need to be posted or shown in public? Why or Why not?
20
What’s New
The next activity aims to assess your familiarity with the different search engines.
Quick Check
Search Engines Which one works the best for you and
1. why?
2.
3.
4.
5.
What Is It
To stay meaningfully informed, you should be aware of search techniques that will give results
that are useful for your academic and chosen career.
EVALUATING INFORMATION
• ACCURACY- Content is grammatically correct, verifiable and cited when necessary
21
• DOMAIN TYPES
o com (commercial)
o .org (organization)
o .edu (education)
o .gov (government)
o .net (network)
o .mil (military)
o .ph (country domain)
• FAIRNESS- Content is balanced, presenting all sides of an issue and multiple points
of view.
• USE OF SEVERAL SEARCH ENGINES- Search Engines are programs that look for
documents based on specified keywords and return these documents where the
keyword was found.
E.g. Google, Yahoo (uses google), AltaVista, Bing, Lycos
• Consider the Source- Click away from the story to investigate the site, its mission,
and its contact information.
• Read Beyond- Headlines can be outrageous to get clicks. What’s the whole story?
• Check the Author- Do a quick search on the author. Are they credible? Are they
real?
• Supporting Sources? - Click on those links. Determine if the information given
supports the story.
• Check the date- Reposting old news doesn’t mean they’re relevant to current
events.
• Check your Biases- Consider if your own beliefs could affect your judgments.
• Is it a joke? - If it is too much outlandish, it might be satire. Research the site and
author to be sure.
• Ask the Experts- Ask a librarian or consult a fact-checking site.
SEARCH TOOLS
• SAFE SEARCH
o Helps you block inappropriate or explicit images from your Google Search
results.
o Its filter isn’t 100% accurate, but it helps you avoid most adult content.
22
• RESTRICTED MODE
o an opt-in setting available on the computer and mobile site that helps screen
out potentially objectionable content that you may prefer not to see or don't
want others in your family to stumble across while enjoying YouTube.
o A parental control setting for YouTube.
• GOOGLE SCHOLAR
o Provides a simple way to broadly search for scholarly literature.
o From one place, you can search across many disciplines and sources: articles,
theses, books, abstracts and court opinions, from academic publishers,
professional societies, online repositories, universities and other web sites.
SEARCH OPERATORS
The following is a set of tips to help you build smart search skills, as adapted from Common
Sense Media.
If number crunching just isn't your thing—and you need an answer fast— Google's hidden
calculator is a lifesaver. Head straight to the search bar and type in the problem or equation
23
you're looking to solve. You'll know you've gotten to the right place when a gray, calculator-
like tool pops up as the search result.
Bonus tip: How many teaspoons equal a tablespoon? When the homework is put away and
you need an extra hand at the Chemistry lab, this tool converts measurements, too.
Browsing the Merriam-Webster dictionary for hours might be a lost art, but broadening kids'
vocabulary doesn't have to be. Simply add the word "define" before a search term (for
example, “define onomatopoeia”) to bring up the proper spelling, definition, origin, and even
fun tools like voice and translation options.
Bonus tip: If you struggle with spelling, don't worry. Google will suggest and search based on
the appropriate spelling of most words, just as it does for regular searches.
3. Age-Appropriate Results
Tools like Google SafeSearch and YouTube's Safety Mode can help filter out mature content
that's beyond what those below 18 are ready to see or read. This can also be taken a step
further with search results filter by reading level so you or your younger siblings or friends feel
comfortable with what's in front of them. Let Google annotate the results with reading levels
labeled, or choose to only show basic, intermediate, or advanced level content.
If you are looking for credible information—or your first taste of scholarly research—you can
check out Google's academic offshoot, Google Scholar. Bonus tip: Explore with confidence by
viewing content critically. Just because you see it online doesn't mean it's true.
4. Time-Zone Challenged
If you have a far-flung family and don’t want to wake them up in the middle of the night, you
can find the local time anywhere in the world by typing "time" and a city's name into the search
bar.
Let’s say the homework assignment requires you to use only one source of information. Enter
your query, followed by the URL for the website (i.e., weaving site: ncca.gov.ph/) and hit enter.
You'll see only results from that website.
Need help with weaving homework but getting search results for weaving for sale? Add a
minus sign before "sale" to eliminate sale-related results.
6. Photo Magic
Learning how to attribute photos is a critical research skill. With Google Reverse Image
Search, you can upload any photo to Google Images and hit "search" to find the name of it,
and a whole lot more.
24
Bonus tip: In Google's Chrome browser, you can just right-click on any image and select
"search Google for this image." There's a Firefox addon, too.
If all you need is a little distraction, go to Google and type in "tilt," browse the Google Doodle
archives, or just tell Google to do a barrel roll. You won't be disappointed.”
PLAGIARISM
• an act or instance of using or closely imitating the language and thoughts of another
author without authorization; the representation of that author's work as one's own,
as by not crediting the original.
• Using other people’s words and ideas without clearly acknowledging the source of
the information
25
How to Avoid Plagiarism
• You need to cite the things you copy on the internet.
• Put quotation marks around everything that comes directly from the text and cite the
source.
• Paraphrase, but be sure that you are not simply rearranging or replacing a few words
and cite the source.
• Use the style manual in properly citing sources.
What’s More
Activity 1. Explore the Search Engines
Direction. Using the major search engines on the Web, find the best way to look for the given
words. Fill out the following chart, noting the number of hits you receive in each of the
search engines. Then, answer the questions at the bottom of the page.
Adobo
Sky blue
Blue Sky
Rodrigo Duterte
rodrigo Duterte
+Rodrigo Duterte
-Rodrigo Duterte
Sample:
26
Key Questions
1. Which search engine would be the best if you were looking for something not clear?
2.1. Did searching for "How to cook adobo?" always result in more hits or fewer hits
than searching for Adobo? Why?
2.2. Did searching for "Sky blue?" always result in more hits or fewer hits than searching
for Blue Sky? Why?
2.3. Did searching for "Rodrigo Duterte?" always result in more hits or fewer hits than
searching for rodrigo duterte? Why?
2.4. Did searching for "+Rodrigo Duterte?" always result in more hits or fewer hits than
searching for Rodrigo Duterte? Why?
2.5. Did searching for "-Rodrigo Duterte?" always result in more hits or fewer hits than
searching for Rodrigo Duterte? Why?
What are the three ideas that you have learned from this module?
What are the two things that reinforce (coincides with) you to know about the topic?
27
What I Can Do
This activity aims to develop your skills in evaluating the credibility, value, and usefulness of
researched materials from the Internet.
Direction. Research and read the latest news article in the Philippines. Then, fill out the
table following the guide questions as you evaluate the article.
Direction. Reflect on the following question. Write your answers in your notebook.
The internet offers a great source of information; however, how are you going to make sure
this information is reliable
28
Assessment
Direction: Read each item carefully and choose the letter of the correct answer. Write your
answers on a separate sheet of paper.
6. Which of the following can be considered as fake, untrue, and merely opinion-based?
A. Dr. Jose Rizal was the Philippines’ National Hero.
B. Dr. Jose Rizal studied at Ateneo De Manila and University of the Philippines.
C. Dr. Jose Rizal wrote a third book after Noli Me Tangere and El Filibusterismo.
D. Dr. Jose Rizal was born on the 19th day of June, not on 30th day of December.
7. As a student, you are responsible when a specific information was presented to you. Which
of these cannot be done upon searching?
A. Ask someone knowledgeable and get to know the site.
B. Always be cautious and read the contents of the source
C. Click any sites that appeared as a source of information
D. Navigate around the internet, and check if the site is alleged as satirical
29
9. What happens when a phrase or sentence is placed inside quotation marks when doing
research?
A. Will only return items that have both terms.
B. Will search for words that are together and in order
C. Will return items that exclude a term
D. Will return items that have either of the terms
10. What are the three main search expressions, or operators, recognized by Boolean logic?
A. and, or, not C. and, or, but
B. from, to, whom D. search, keyword, text
12. Arrange the commands in the correct order when doing a contextualized online navigation:
I. Open the Google site, on the upper right side of the window, click the Google Apps icon
and click search.
II. On the lower right part of the window, click Settings and the Google Search Settings
pop-up list will appear.
III. Click Advanced search and the Advanced Search window will appear.
IV. Type the keywords that you would like to search and click the Advanced Search button
A. I, II, III, IV C. I, II, IV, III
B. I, III, IV, II D. I, IV, III, II
13. Which of the following cannot be considered as a guide in identifying the good source from
the satirical source of information?
A. Check if the site is alleged as satirical.
B. Ask someone knowledgeable and get to know the site.
C. Always be cautious and read the contents of the source.
D. Click any sites that appeared as a source of information.
14. The skill refers to the ability to produce good and continuous searches.
A. Thinking Skill B. Learning Skill C. Research Skill D. Production Skill
30
Additional Activities
Direction: Watch the videos and briefly answer the following key questions.
YouTube Channel: ABS-CBN News, Uploaded April 4, 2010, Retrieved July 23, 2020, from
https://www.youtube.com/watch?v=cRJL82uhwyU
YouTube Channel: GMA News and Public Affairs, Uploaded Nov. 13, 2012, Retrieved July
23, 2020, from https://www.youtube.com/watch?v=VZnkflY0L-c
Key Questions
31
32
L1-What I
Know L1- L2-
1. D Assessment Assessment
2. D
3. B 1. C 1. B
4. C 2. A 2. C
5. C 3. B 3. A
6. A 4. A 4. D
5. D
7. B 5. A
6. C
8. C 6. C
7. D
9. A 8. D 7. C
10. B 9. B 8. B
11. A 10. C 9. A
12. D 11. C 10. B
13. C 12. A 11. C
14. A 13. B 12. A
15. A 14. B 13. D
15. A 14. D
15. C
Answer Key
References
Books
Dennis Cesar R. Patiño and Miguel Q. Rapatan, Developing Useful Computer Applications for
Today’s World Series: Fundamentals of Web Design and Development, Quezon City:
Phoenix Publishing House, Inc., 2019.
Department of Education, Empowerment Technologies Student Reader, Pasig City: DepEd,
2016.
Erwin R. Callo and Rosario Laurel-Sotto, Science in Today’s World for Senior High School
Empowerment Technologies, Quezon City: Sibs Publishing House Inc., 2018, 2-10.
Innovative Training Works Inc., Empowerment Technologies, Manila: Rex Book Store Inc.,
2016,2-13.
Online References
Angelito Quiambao, Contextualized Online Search and Research, accessed July 28, 2020
from https://www.slideshare.net/AngelitoQuiambao/online-research-107104482.
Evaluating Internet Sources: Tips and Tricks for Evaluating Web Sites, accessed July 28, 2020
from http://www.library.illinois.edu/ugl/howdoi/webeval.html.
GMA News Online, Public school teacher in debt because of identity theft, accessed July 28,
2020 from https://www.gmanetwork.com/news/news/metro/556952/public-school-
teacher-in-debt-because-of-identity-theft/story/.
GMA News Online, Thief uses student’s ID posted on Facebook to pull off online scam,
accessed July 28, 2020 from
https://www.gmanetwork.com/news/hashtag/content/337672/thief-uses-student-s-id-
posted-on-facebook-to-pull-off-online-scam/story/.
Lyle Kenneth Maclang, Contextualized Online Search and Research, accessed July 28, 2020
from https://prezi.com/p/c9p66rqmfbov/grade-11-lesson-3-contextualized-online-
search-and-research-skills/.
Tutorials: How can I tell if a website is credible?, accessed July 28, 2020 from
https://www.edb.utexas.edu/petrosino/Legacy_Cycle/mf_jm/Challenge%201/website%
20reliable.pdf.
Images
Amanda Jensen, accessed July 28, 2020 from
https://www.pinterest.ph/pin/5559199518941926/.
Emergent Digital, accessed July 28, 2020 from http://emergentdigital.com/3-small-business-
social-media-tips/.
Lived Enhanced, accessed July 28, 2020 from
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.liveenhanced.com%2Fw
orlds-top-15-search-engines-list-updated-list-of-
2018%2F&psig=AOvVaw0QYdW5zlWR5_1QapOn3z5i&ust=1599723695818000&sour
ce=images&cd=vfe&ved=0CAIQjRxqFwoTCMDXsK3J2-sCFQAAAAAdAAAAABAI.
Peter Steiner, On the Internet, nobody knows you're a dog, July 5, 1993, The New Yorker,
accessed July 28, 2020 from https://bit.ly/2WMr8H7.
33
For inquiries or feedback, please write or call:
34