Empowerment Technologies: Netiquette and Contextualized Online Search
Empowerment Technologies: Netiquette and Contextualized Online Search
Empowerment Technologies: Netiquette and Contextualized Online Search
Technologies
(Quarter 3-Module 2/Lesson 2/
Week2)
Netiquette and
Contextualized Online
Search
Department of Education
SDO- City of San Fernando (LU)
Region 1
hat I Need to Know
This module is designed as a Self-Learning Module for Grade 11 Learners. This will help
learners to grasp concepts in Empowerment Technologies. The module is designed considering
in mind the different types of learners, which includes the language and vocabulary usage as
well as the differentiated activities that are well-suited for the kind of learners. The lessons in
this module are arranged in a way that follows the standard format found on the Most Essential
Learning Competencies.
The module focuses on the lesson:
• 3rd Quarter Lesson 2 – Netiquette and Contextualized Online Search
What I Know
DIRECTIONS: Write YES if you agree with statement and NO if you disagree on the blank
before each number. Use a separate answer sheet.
1. You met a person in the Role-Playing Game (RPG) agreed to level up your character,
so you provide him the password.
2. You posted about your friends, after 5 years then post showed up and because of this
your friends were not able to get a job due to reputation issues. Does the post affect your
friends?
3. My computer has an antivirus, so it is okay to open email attachments like e-cards
and video effects.
4. Keyloggers are software that show pop-up ads even if you are not using your browser.
5. You forgot to pass your essay in English, while browsing you saw an article related
to your essay, is it okay to use the article in your essay?
6. Search engines scan websites for search result even if you have set your post to
“private”.
7. Virus is a malware that multiple and infects other computer through flash drives.
1
8. Letting people know your birthday is a must if you want to get as many gifts as
possible. But having it posted in your profile makes you vulnerable to identity theft.
9. You received an email stating that your mother’s bank account is going to be forfeited
if you do not respond to the email. Is it safe to reply?
10. There is a danger in posting information about a future vacation.
What ‘s New
DIRECTIONS: Below is a questionnaire about how much information you have shared so
far. Put a check () under “NA-SHARE KO NA” or “HINDI KO PA NA SHARE”.
Type of Information Na-Share ko Hindi ko pa
na na-share
1. First name
2. Last name
3. Middle name
4. Current and previous (schools)
5. Your cellphone number
6. The name of your mother and father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
Count the number of check marks under na-share ko na. You probably answered ‘na-share ko
na’ in the first two items. If that is the case, try using a search engine like Google then type
your first and last name. Did you get links to your profile page? Try switching to image search.
Did your pictures appear? If you have unique name, chances are, it did. Do not feel bad if it
2
did not appear though, well in fact, it is what is probably for your best interest not to have
pictures of yourself in a search engine.
What is It
As digital natives, it is not new to share private information out in public. Sharing personal
information makes one more vulnerable to fraud and exploitation. The internet may be a great
way to access unlimited content and services, it is also a free highway for bad people to
disseminating spam, viruses, malware, and scams.
Cybercrime comprises offences against computers and data. For instance, an illegal access to
a computer known as hacking, interception of a communication, preventing a computer from
functioning or damaging or deleting data, but also offences committed by means of computers,
such as fraud or sexual violence against children. Malware, spam and phishing and other forms
of identity theft are some of the tools used by cybercriminals.
Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software,
which includes viruses, trojan horses and others. The objectives of malware are very diverse.
They can aim simply to disrupt the functioning of your computer by damaging the software or
corrupt-in the hardware, or they may steal information and data which can be monetized in
some way or another Your infected computer may also become a “bot” that is controlled by
criminals without your knowledge; it may then be used together with millions of other infected
computers as part of a “botnet” to spread spam, commit fraud, or carry out attacks against
hospitals, airports or banks.
Malicious Software
1. Virus- a malicious program that transfers from one computer to another by any type of
means.
2. Worms – a malicious program that transfers from one computer to another by any type
of means. Often use computer networks to spread. One of the well-known worm is the
I Love You or the Lovebug worms.
3. Trojan- distinguished as a useful program but once downloaded or installed, your PC
will be unprotected, and hackers can get your information.
4. Spyware- a program that in that background without knowing it. It can monitor what
you are currently doing and typing through keylogging.
3
5. Keyloggers – use to record keystrokes done the users for the purpose of stealing the
password. It can record email, messages through the keyboard.
6. Adware – a program designed to send you advertisement mostly in a form of pop-ups.
7. Spam- Unwanted email mostly from bots or advertisers. It can be used to send
malwares.
8. Phishing -The goal is to acquire sensitive information like passwords and credit card
details. In a form of email.
9. Pharming -It is more complicated because it exploits the DNS (Domain Name Service)
Keeping this in mind, it is then important to always observe precautions. If there are chances
that you need to use a public computer like in computer café, the best way to be secured is turn
into incognito by CTRL +Shift + N. In an incognito mode all passwords, activity history and
even keylogging activities will not be seen. If you fail to do it. As you went home, change all
your passwords.
Online Reputation
An online reputation, or e-reputation, is the reputation of a company, person, product, service
or any other element on the Internet and digital platforms. This online reputation is impacted
by the content an organization distributes, the reactions of and interactions with web users,
activity on social networks and many other more. For instance, the e-commerce brands, online
reputation is very important, as it can affect their online store’s credibility and visibility.
The “think before you click” tagline might have been overused already but really, it is a must.
Below are some of the things we need to keep in mind:
1. Before posting something out there in public, ask yourself the question, “would you want
your parents or grandparents to see it?”
2. Your friends depend on you to protect their reputation online it is then important to talk to
your friends about this serious responsibility.
3. Set your post to “private”. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to can.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull
it down or report it as inappropriate.
4
Copyright Infringement
If you create something it may be an idea, an invention, or a research, you have the right as to
how it should be used by others and this is called intellectual property. In other words, the
copyright law includes your right over your work, and anyone who uses it without your consent
is punishable by law. Try grabbing any book then browser its first few pages and you will find
a page with a disclaimer with the words: “No part of this book may copied, reproduced…”
That is a copyright page. You must consider that not everything out there is free for you to use.
Just like your own, contents that you see from the websites have their respective copyrights.
There are several instances where employees or business owners face copyright infringement
and are sentenced to a huge fine die to reckless copying of materials.
5
Internet research has had a profound impact on the way ideas are formed and knowledge is
created. Common applications of Internet research include personal research on a particular
subject, students doing research for academic projects and papers, and journalists and other
writers researching stories.
Research is a broad term. Here, in this module it is used to mean “looking something up (on
the Web)”. It includes any activity where a topic is identified, and an effort is made to actively
gather information for the purpose of furthering understanding. It may include some post-
collection analysis like a concern for quality or synthesis.
The internet is like a dream library, with a simple type, it will give you enormous amount of
result to choose from. Possibly the biggest obstacle facing researchers on the internet is how to
effectively and
efficiently access the vast amount of information available with the simple click of the mouse.
The search for reliable resources can be both overwhelming and frustrating if you are left on
their own in their initial search. A few simple guidelines can make conducting research more
manageable, reliable, and fun.
The Research Process
Lessons and projects should be designed so that research time on the Web can be maximized
in terms of efficiency. This may mean gathering necessary information beforehand. Barron and
Ivers (1996) outlined the following cycle for online research projects.
• Questioning
Step 1
• Planning
Step 2
• Gathering
Step 3
• Synthesizing
Step 5
• Evaluating
Step 6
6
Advantages and Disadvantages
Advantages:
•Ability to obtain a large sample, which increases statistical power
•Data is automatically coded so no data entry errors
•Reduced cost of conducting research
Disadvantages:
•Online is not totally secure and theft is one of the numerous dangers it poses, researchers’
personal information is at risk of being access by rogue persons.
•Some of the materials on the internet have not been evaluated by experts or thoroughly
screened.
• Lack of accreditation and low quality
7
Asterisks ( * )
Asterisks can be used for wild cards in some search engines. For example: Filipi* will look for
Filipino, Filipina, Filipin, etc.
Although some search engines allow you to turn on filters to help filter out adult content, they
are not always thorough or accurate. There are several good search engines that are specifically
designed for the younger audience, such as Ask Jeeves and Yahooligans.
8
Analyzing Web Resources
Answer the following questions to evaluate web resources.
1. Accuracy
•Are sources listed for the facts?
•Can information be verified through another source?
•Has the site been edited for grammar, spelling, etc.?
2. Authority
•Is the publisher reputable?
•Is the sponsorship clear?
•Is a phone number or postal address available?
•Is there a link to the sponsoring organization?
•Is the author qualified to write on this topic?
3. Objectivity
•Does the sponsor have commercial interests?
•Is advertising included on the page?
•Are there obvious biases?
4. Currency
•Is a publication date indicated?
•Is there a date for the last update?
•Is the topic one that does not change frequently?
•Coverage Are the topics covered in depth?
•Does the content appear to be complete?
Setting Bookmarks on the Web
Browsers such as Safari, Firefox, and Internet Explorer provide a way to create a list of your
favorite sites that you can access with a click of the mouse. The procedure for creating a list of
sites is an easy and powerful tool for web use.
When you find a web page that you want to bookmark, simply select the "Add Bookmark" or
"Add Favorite" option from the menu bar. To return to the site later, choose the name from the
bookmark or favorite list, and you will immediately access the site. You can organize your
bookmarks into file folders and can save them on a disk to transfer and use on other computers.
Copyright Issues
Copyrightable works include the following categories:
•literary works
•musical works, including any accompanying words
9
•dramatic works, including any accompanying music, pantomimes, and choreographic works
•pictorial, graphic, and sculptural works
•motion pictures and other audiovisual works
•sound recordings
•architectural works
These categories should be viewed broadly. For example, computer programs and most
"compilations" may be registered as "literary works"; maps and architectural plans may be
registered as "pictorial, graphic, and sculptural works."
10
What ‘s More
Enrichment Activity 1
DIRECTIONS: Match the descriptions found on COLUMN A with the correct term/s in
COLUMN B. Write your answer on a separate answer sheet.
COLUMN A COLUMN B
1. Adding this mark/symbol before a word means that it
must be included in each site listed
A. Addition Sign
2. A malicious program that transfers from one computer
to another by any type of means B. Asterisks
C. Quotation Mark
3. Using this mark/symbol will help to find specific
phrases involving more than one word D. Subtraction Sign
DIRECTIONS: List down below the three (3) important things to remember in browsing the
internet.
1. 2. 3.
11
What I Can Do
DIRECTIONS: Using the major search engines on the Web, find the best way to look for a
needle. Fill out the following chart, noting the number of hits you receive in each of the search
engines for the word needle and the phrase "Space Needle." Then, answer the questions at the
next page.
Search Engine Search for: needle Search for: "Space Needle"
Excite
Webcrawler
Yahoo!
Guide Questions:
1. Which search engine would be the best if you were looking for something very obscure
(ambiguous, vague, unclear)?
2. Did searching for "Space Needle" always result in more hits or less hits than searching for
needle? Why?
12
Assessment
DIRECTIONS: Choose the letter of the correct answer. Write the chosen letter on a separate
sheet of paper.
1. Which of the following refers to a malicious program that transfers from one computer to
another by any type of means?
a. spyware b. trojan c. virus d. worm
2. What malware is seen as a useful program but once downloaded or installed, your PC will
be unprotected, and hackers can get your information?
a. spyware b. trojan c. virus d. worm
3. The lovebug was one of the well-known malwares that infiltrated even the most secured
companies. Which type of malware is it?
a. spyware b. trojan c. virus d. worm
4. Which of the following is disguised as a program that can monitor what you are currently
doing and typing through keylogging?
a. spyware b. trojan c. virus d. worm
5. Which of the following can be in form of email that once open can acquire information such
as password and credit card number?
a. keyloggers b. pharming c. phishing d. spam
6. In analyzing web resources, which of the following tool answers the question such as, “are
sources listed for the facts?
a. accuracy b. authority c. currency d. objectivity
7. Which tool involves learning about the authors credibility and qualifications?
a. accuracy b. authority c. currency d. objectivity
8. This tool frowns on obsolete materials. Which of the following tool is being described?
a. accuracy b. authority c. currency d. objectivity
9. In this evaluation tool, biases are focused on. Which among them is being referred to?
a. accuracy b. authority c. currency d. objectivity
10. Which among the choices is NOT copyrightable?
a. dramatic work b. literary work c. parody d. pictorials
13
Additional Activities
DIRECTIONS: List down at least ten (10) non-copyrightable works and another ten (10)
copyrightable works that were not yet mentioned in this module. Follow the format below.
Place your work on a separate answer sheet.
10 Copyrightable 10 Non-Copyrightable
14
References
Bibliography
Empowerment Technologies Teacher’s Guide
Empowerment Technologies. Innovative Training Works, Inc. 2016 Edition
Internet Literacy Handbook
Online Resources
https://enelsonbalneg.weebly.com/
www.coe.int/children
Brenda A. Sabado
Principal IV
Layout Artist: Marie Joyce B. Hidalgo
Special Science Teacher I
Management Team: Dr. Rowena C. Banzon, CESO V, SDS
Dr. Wilfredo E. Sindayen, ASDS
Dr. Agnes B. Cacap, Chief- CID
Dr. Jose Mari P. Almeida, Chief- SGOD
Genevieve B. Ugay, EPS- LRMS
Hazel Jane B. Libatique, Librarian II
Aurelio C. Dayag, Jr. , PDO II