Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Grade 4 - 1st Quarter

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

TABUK INSTITUTE

United Church of Christ in the Philippines


Magsaysay, Tabuk City, Kalinga
email address: tabukinstitute@yahoo.com
CP No. 09067731977
Junior High School Program- Accredited Level II- 3Year Re-Accreditation Status

Elementary Department

MODULE IN COMPUTER IV
First Quarter
S.Y. 2021-2022

UNIT 1
Information and Communication
Technology

Prepared by:

NORMAN G. DACANAY
Subject Teacher
Computer IV
August 16-20, 2021
Unit: Information and Communication Technology
Lesson 1: Safe and Responsible use of ICT

INTRODUCTION
Sneak Peek
If you do your assignment, project, or research in school by getting information from your school
library, reference books, magazines , or newspaper, you will probably be overwhelmed by reading, copying,
writing, and documentation of available references. For many pupils, such tasks can be time-consuming. Today
with the technology available to everyone, most information you need for your school work is available to
everyone, most information you need for your school work is available using ICT tools.

Zoom In
At the end of the lesson, you should be able to:

 define ICT;
 identify the impact of ICT on Society;
 identify the activities that you can do using the internet; and
 practice safe and responsible use of computers and internet.

LESSON PROPER
Observe and name the following gadgets.

Do you have these gadgets?


What are the uses of these gadgets?
Do you use them properly?

Find out more of these as you go through this module.

Impact of ICT on Society


Information and Communication technology, or
ICT, is a set of tools and resources used to create or
distribute, store, and manage information. It is also used for
communication. These tools include computers, radios,
TV’s, telephones, and the internet. ICT helps people
connect to society, in areas such as the home, school,
business, government, Church, and community. Let us
learn some of them

PERSONAL 2
Getting in touch with friends and relative who live far from us used to take so much time and money.
Weeks or months pass before a letter is delivered by snail mail.
With ICT…
- personal messages can now be sent in a minute or two through different means, such as smartphones or email;

- Shopping is convenient with e-commerce websites like LAZADA and


Shopee;
- ICT tools allow people to do online transactions with banks, airlines, offices, government agencies and other
institutions;

-ICT allows you to view favorite movies, listen to music, chat with friends, and play games.

SCHOOL
Tools and resources in ICT have made learning
accessible, engaging enjoyable, and motivating to a wide
range of learners. These have influenced curricular
designs and classroom instruction. Pupils are equipped to
communicate connect, collaborate, and above all, learn in
this digital world.
ICT provides teachers with a wide variety of
resources that will help them facilitate engaging and
interesting discussions and interactions in and outside the
classroom.

COMMUNITY
ICT plays a key role in communities. Communication and
collaboration using ICT tools among community members
foster development and growth. Products and services are
delivered in methods that save time, money, and energy.
Awareness of weather disturbances, traffic, disease, and other
areas of community through ICT tools.

ACTIVITY (See attached Activity Sheet)

Name: ________________________________________________ Date: __________________


Grade and Section: ____________________ Score:__________________
ACTIVITY SHEET
Computer IV
Lesson 1: Safe and Responsible use of ICT

ACTIVITY
Importance of ICT in Society
On the blanks, write the uses of ICT in the following areas of our society
A. Personal

_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

B. School

_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

C. Community

_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

ACTIVITY
On the box draw one situation that portrays the use of ICT during this Pandemic.

Parent’s/Guardian’s signature over printed name: ____________________________________________

Computer IV
August 23-27, 2021
Unit: Information and Communication Technology
Lesson 1: Safe and Responsible use of ICT (Continuation)
ACTIVITY
Quick Recall
Name some tools that we can use in Information and Communication technology, or ICT
Example: Smartphones
1.______________________________________ 4.________________________________
2.______________________________________ 5. ________________________________
3.______________________________________

LESSON PROPER

The Internet
The internet, simply called the Net , is a worldwide network of computers in which the users can get
information from other computers. History says that the idea of an internet started as a solution from Advanced
Research Project Agency (ARPA) for the United States government to create a galactic network of scientific
users who could talk to one another even if the telephone system was destroyed.

These are numerous activities you can do using the internet. Here are some of them

Email exchange, Email, short for electronic mail, is a way of transmitting


messages electronically. It involves the use of email addresses of both the sender and
receiver.

Social networking. This activity allows friends, family, and classmates to


connect with each other using internet-based social networking applications such as
Facebook, twitter, Instagram, and Google+

Instant Messaging. Also known as IM or IM-ing, it is the real time exchange of


images through an application or software. It allows you to see easily who among
your contacts are online. Some popular instant messaging services are Skype, and
Facebook Messenger.

Communication in chat rooms. A chat room is a virtual room where a group of people can
communicate and exchange messages with each other in real time about a particular subject,

Forum Discussion. A forum is a place on the internet where people can share thought and ideas by
posting messages. People can respond to post by other forum members. A forum is different from online chat
because it is not a real-time exchange and messages can be read anytime.

Blogging. A blog, or web Blog, is a websites similar to an online personal journal or diary, and is
regularly updated, it is regularly updated. It is a place where an individual can freely express thoughts ideas,
stories, experiences, or opinions for the public to use.
5
Using the computer and the Internet safely
and responsibly
Computers and internet have become part of our daily lives. Because you are a minor, your parents and teachers
will guide you in your activities using computers and the internet. Understand and following the basic rules in
using them safely and responsibly is very important.

1. Do not share your password with anyone, except your parent and teachers.

2. Do not give out your personal information such as name of school, home address, birthday, and telephone

number.

3. Chat only with people you know personally.

4. If you receive an email or message from someone you do not know, do not reply to the message and do not
open any attachment from email.

5. If you come across a site that you find disturbing. Close the site and tell your parent about it.

6. Do not participate in activities where others will be hurt by harsh words, gossip, threats, and other forms of
cyberbullying. If others call your names, threaten you, or make you feel afraid or uncomfortable online, do not
keep it to yourself. Immediately tell your parent or teacher about it.

7, Do not believe everything you see or read in the internet. Just because it is there does not mean that is true.
Find out if the information you have read is factual or merely made up. In the same way, do not pass
information without verifying its accuracy and correctness

Understanding Malware
Malware, from, malicious software, are programs designed to infect and cause harm to a computer

The common types of malware are the following:


Viruses. These are programs designed to damage or change your data. Viruses will not only corrupt or delete ]
data on your computer but will replicate themselves on others computer as well
Worms. These are programs malicious programs the reproduce again and again. Worms do not harm any data or
files on your computer. However, they make the operating system of the computer vulnerable to
malfunction
Spyware. This is a type of malicious software that works like a spy. It tracks your internet activities. It helps
hackers gather information for their own activities without your knowledge.
Adware. These are the programs that are designed to display advertisement on your computer, redirect your
search request to advertising websites, and collect information about the types of website that you visit

Techno Tips and Tricks


The use of Firewall, Anti-virus, Anti-Malware and Anti-exploit technology can lessen
the attacks on your computer. For tight security, use firewalls and antiviruses at the
same time

6
GENERALIZATION
Lesson Bookmark

ICT helps people connect to society, in areas such as the home, school, business, government, Church,
and community.
The INTERNET is a network of computers worldwide in which users can get information from other
computers.
Some activities that you can do using the internet are email exchange, social networking, Instant
messaging, Communications in chat rooms, Forum discussions, and blogging
Information Communication Technology is a set of tools and resources used to create or distribute, store, and
manage information.
There are many uses of ICT in the different areas of Our Society like:
Personal- ICT allows you to view favorite movies, listen to music, chat with friends, and play games.
School - Pupils are equipped to communicate connect, collaborate, and above all, learn in this digital
world.
Community - Awareness of weather disturbances, traffic, disease, and other areas of community through
ICT tools.
 Since the Internet is easily accessible to anyone, keep in mind the basic rules in using the computer and
internet safely and responsibly
1. Malware are programs designed to infect and harm the computer with viruses, worms, spyware, and
adware
2. Keep your security application and antivirus software updated to protect your computer

APPLICATION (See attached Activity Sheet)

Post Assessment Activity (Take home Unit Test)

REFERENCES

 Conception C. Santos, (2019)My Computer 4; Quezon City; Abiva Publishing House INC.
 Jennifer Joan B. Gatchalian,(2001)Learning Computer the easy way 4; Quezon City; The Library
Publishing House

Name: ________________________________________________ Date: __________________


Grade and Section: ____________________ Score:__________________
ACTIVITY SHEET
Computer IV
Lesson 1: Safe and Responsible use of ICT (continuation)
APPLICATION
ACTIVITY
Activities you can do using the Internet

Write ten activities you can do using the internet.


1.____________________________________________________________________________

2.____________________________________________________________________________

3.____________________________________________________________________________

4.___________________________________________________________________________

5.____________________________________________________________________________

6.____________________________________________________________________________

7.____________________________________________________________________________

8.____________________________________________________________________________

9.____________________________________________________________________________

10.___________________________________________________________________________

ACTIVITY

Remind Tanya about the things to remember when using the internet. Write yes or no before
each sentence.

______ 1. Download files only from trusted website

______ 2. Uninstall your antivirus program before you download files.

______ 3. Do not download picture files if they contain an extension name such as .exe, .bat, .pif, and .scr.

______ 4. Always update your antivirus program.

______5. Make sure that your antivirus software is up to date

Parent’s/Guardian’s signature over printed name: ____________________________________________

Computer IV
August 31-September 3, 2021
Unit: Information and Communication Technology
Lesson 2: Gathering and organizing Information Using ICT

INTRODUCTION

Sneak Peek
In this lesson, you will learn how to use the internet as an effective tool for searching information. You will also
learn how to gather information from the internet and organize them in your computer.

Zoom In
In this lesson, you will learn how to:

 differentiate a web browser from a search engine ;


 search the internet using a web browser and a search engine ;
 save and organize data using a computer file system ;
 be organized in everything that you do.

LESSON PROPER
Quick Recall
You have learned that the internet offers a wide range of information that you can use for you activities
such as a research project. It enables you to gather detailed information Some activities that you can do using
the internet are email exchange, social networking, Instant messaging, Communications in chat rooms, Forum
discussions, and blogging. Information Communication Technology is a set of tools and resources used to
create or distribute, store, and manage information.
How a Computer File System Works

'The first thing that you need to do if you are


doing a research project is to gather data or information.
The internet provides tremendous help for this kind of
work because everything you might need is available
online. There are times when you need information for
different purposes. Such as road directions, school
assignments. Flight schedules. Long-lost relatives.
Recipes. And do-it-your self-tasks. How are you going
to get the information you need from the internet? What
is the importance of organizing and storing them in the
computer? Let us study how the computer file system
works.
Take the example of a filing cabinet it stores files
or documents that are usually grouped by folders with
proper labels. These files are kept in the drawers of the filing cabinet you know that computers store information. In
fact, computers can hold large amounts of data or information. A computer stores information as a filing cabinet
stores documents. Information in a computer is stored 111 its memory devices. These devices allow the computer to
rend and store information. Knowing how a computer's file system works will help you locate files easily.

9
What Is a File?
A file is a collection of data that is saved on the computer. It can be of any activity that you do using the
computer. You can create, label. Save, or delete it. Files can be stored on different storage devices or media
such as hard drive, compact disk (CD). Or flash drive.

A soft copy is an electronic copy of a file that is stored in a computer file system.
It can be viewed using the computer's monitor and an application program. Files are named according to type. It is
known as a file name. A file name consists of two parts: name and type or extension. A period (.) is used to separate
the name from its type of file.

Example: MyFirstDocument.docx File type


File name Period

Computers files have different types such as textiles, graphic files, and program files. Study the table below
Type of file (extension) Computer program
.txt Wordpad/notepad
.doc/.docx Microsoft Word
.htm/.html Web Browser
.jpg(joint photographic experts group) Graphic program like Photoshop,
.gif (Graphics Interchange Format) CorelDraw, Paint
.pdf (Portable Document Format) Adobe Reader

What is file Naming Convention


A File Naming
Convention (FNC) is a guide for naming
your files, each file name indicates what it
contains and how it relates to other files in
your computer. Such a guide will allow you
to organize and track your files effectively.
Look at the image below. The files show
you lessons in order and information about
its contents.

Organizing Files and Directories


Keeping your files organized will help you locate them easily. There are advantages in organizing files
into folder structures. If you can find files faster, you can focus on doing work instead of spending too much of
your time looking for missing files.

Most computers have a directory structure for organizing and managing files.
A directory is a place on a computer where files or other folders are kept. A folder is a place in which we put the
files or data that we gather or create on the computer. All folders found under the root directory are called
subfolders or subdirectories. To locate a file stored in a sub folder, one must navigate to that subfolder beginning
from the root directory. This is called as the file path or the full path of a file. A folder helps keep our files
10
organized. Let us study how to create folders.
1. On the desktop, double-click or right-click this pc.
2. A window should appear. Select the folder or
drive where you last saved your file. For this
example, double-click the Documents folder.
3. The Documents window will then be displayed.
You can create a folder in two ways.
 Right-click on an empty space in the
window. A drop-down menu should appear.
Point your mouse to New and another set of
menu will appear. Select Folder.

 On the Windows’s Quick Access Toolbar


located at the top left, Click on the icon that
looks like a folder

4. Once you have done either of them, a new folder will


automatically appear on the window. Notice that its folder name, New Folder, is highlighted in blue and has a
blinking cursor next to it. This means that you can rename it. Rename your folder as Practice folder

However, if New folder is not highlighted blue, you can still rename it. Simply click to select the folder,
Right click, Select rename from the drop-down menu that appears, and rename.

APPLICATION (See attached Activity Sheet)

11
Name: ________________________________________________ Date: __________________
Grade and Section: ____________________ Score:__________________
ACTIVITY SHEET
Computer IV
Lesson 2: Gathering and Organizing Information Using ICT

APPLICATION
Activity
Different types of computer files.
Analyze the picture below and write the File Name , File type, and what Program Used on the different file type.

File Name File Type Program Used


Example: 1. animals Microsoft Publisher Document Microsoft Publisher
2.
3.
4.
5.
6.
7.
8.
9.
10
Parent’s Signature ___________________________________________

12
Computer IV
September 6-10, 2021
Unit: Information and Communication Technology
Lesson 2: Gathering and organizing Information Using ICT (Continuation)

LESSON FOCUS
Quick Recall
Last week you have learned that a computer file sytem works to help you gather, organize, and manage
information effectively. It Helps you save time in looking for files that you need by organizing the folders and
directories.
Sneak Peak
What is the use of the following things?

They are used for ___________________________ money?


Is it important to save money? ___________________
Values Integration
Using the different objects above, we can save money. Saving money is important because
you can something for future use.

In computer we can also save not money but files using different media.

Let’s Discuss
Saving Files Using Different Media
When you are working on your computer, it is very important that you save your work. Save means to store
your work on a permanent medium, which you can access when needed. You may select a storage location,
which is the place where you would like to save the file that contains your work.

A storage medium is a device that holds electronic data and information temporarily or permanently.

Different types of storage devices that can be used to save information.

Flash drive (USB memory card)


* 4 Gigabytes and above
* it is ideal for moving small files, such as documents between computer.
Hard Disk
* can have a size of over 500 gigabytes
* this is the main memory storage of computer

CD (Compact Disk)
*700 Megabytes
* It is CD used to install software for games and program, and also stores music
DVD (Digital Versatile Disk)
*4.7 Gigabytes
*looks like a CD. It used to install software for games and program, and also
stores music
Blu-ray disk
*50 Gigabytes
*it is a medium for films and video games.
Understanding File Memory Capacity
13
Just like liquid, which can be measured in quarts or gallons, computers measures information in units called
bytes. The smallest unit of measurement used for measuring data is a bit. Computers use the metric system, where
1000 bytes make up a kilobytes and 1000000 bytes make up a megabytes. Since most files contain thousands of bytes,
file are often measured I kilobytes. Bigger files that contain millions of bytes are measured in megabytes.

Conversion of data (smallest to the largest unit)


10b (bit) =1.25B (byte)
1000B (byte) =1KB (kilobyte)
1000KB (kilobyte) = 1MB (megabyte)
1000MB (megabyte) = 1GB (gigabyte)
1000GB (gigabyte) = 1TB (terabyte)

Using the Web Browser and a Search Engine


The difference between a web browser and search engine. A web browser is a software installed in your
computer that allows you to access websites and web pages in the internet.
A search engine is a software that is designed to search for information using specific keywords. A
keyword is a word or phrase that you can type into a search bar to enable the search engine to find information
on a topic. A search engine searches for information through specified keywords and provides a list of available
web pages where the keywords were found.

Common Parts of a web browser


Function buttons.
These allow you to perform various tasks, such as going back to the previous page viewed, forwarding or
moving on to the next page, refreshing the web page, and so on.
Address bar.
This is where you type the URL of the website you want to visit.
Control buttons.
These buttons allow you to minimize the window to Taskbar button, maximize or expand the window to fill
the entire screen, and close the window.
Search engine.
This is a software that allow you to search for and access information in the World Wide Web.
Search bar.
This is where you type in the keyword/s or phrase that describe/s the information you want to search.

14
Web browsing
Web browsing is an activity in which you view webpages. It is like looking through a book without
having read everything on it. It is often called surfing the net. To maximize the use of the internet, you must
understand how a web browser works.

Copying and Downloading Information from the Internet


Indeed, information about almost everything is available on the internet. However, you must know that
not everything that you read on the net is accurate. You must consider the source information-the author, the
date when the information was created, and the trustworthiness of the source. You must be careful I copying
and downloading information. There are laws about copying or downloading information from the internet.
This is to protect the rights of the owners of the information.

GENERALIZATION
* Keeping your files organized will help you locate them easily.
* A keyword is a word or phrase that is significant to a topic.
* The common parts of a web browser are function buttons, address bar, control buttons, search engine, and
search bar.
* The following are some tips in searching the internet.
- use specific keywords
- Narrow the search using the plus(+) or minus (-) operator.
- Do not use “stop” words.
- capitalization does not matter.
- Refine your searches using wildcards and Boolean operators.
- add the keyword image if you are looking for images.

APPLICATION (See attached Activity Sheet)

Post Assessment Activity (to be done in school per schedule)

REFERENCES

 Conception C. Santos, (2019)My Computer 4; Quezon City; Abiva Publishing House INC.
 Jennifer Joan B. Gatchalian,(2001)Learning Computer the easy way 4; Quezon City; The Library
Publishing House

15

Name: ________________________________________________ Date: __________________


Grade and Section: ____________________ Score:__________________
ACTIVITY SHEET
Computer IV
Lesson 2: Gathering and Organizing Information Using ICT week 4

Application
Activity 1 – Use the Search Engine
1. Launch a web browser, such as Google Chrome.
2. In the address bar, type google.com
3. On the search field, find the meaning of the following terminologies. Write your answer on the space
provided.
Terminologies Meaning

1. hyperlink

2. www

3. URL

4. plagiarism

5. copyright infringement

Activity 2

Identify what is being described in the following sentences. Write your answer on the blanks

______________________1. It allows you to view information on the Internet.


______________________2. It is a collection of data that is saved on the computer.
______________________3. It is the electronic copy of a file saved on the computer system.
______________________4. It is program that allows you to search different websites using keywords.
______________________5. It is one example of a web browser.
______________________6. This is where you type the URL of the website that you want to view.
______________________7. You click this button to start your search.
______________________8. It is a guide for naming your files and telling about its content.
______________________9. It temporarily or permanently holds information that you have collected.
______________________10. This is where you type the keyword to search for inform.

16
Computer IV
September 13-17, 2021
Unit: Information and Communication Technology
Lesson 3: Using ICT Tools for Communication and Collaboration

INTRODUCTION
Working together as a group with a common purpose is called collaboration. It is an activity in which
two or more people share their thoughts and ideas to produce or create an output. A number of online
collaboration tools can be used for such. In this lesson, you will learn the use of email as an effective
collaboration tool and proper and responsible internet use.
Zoom In
At the end of the lesson, you should be able to:
 define online collaboration;
 use email as a collaboration tool;
 demonstrate an understanding of netiquette; and
 practice online safety and security.

LESSON PROPER
Quick Recall
Last week you have learned how to save files using different media, understand File Memory Capacity, how
to use a web browser and a search engine, and copying and downloading information from the Internet.
Sneak Peek
1. Before you have to leave your house to socialize but now we are now using social media platforms like
__________.
2. Communication before uses snail mail as a primary source of communication, but now we are using
__________ to communicate with our friends and relatives.
Answer key: 1. Facebook, twitter, Instagram 2. Instant Messaging, Email

Login
What is Online Collaboration?
Online collaboration is an activity in which you can share and
exchange your ideas and files with others over the internet. You can
download and upload files to share with others. You can form study
groups, attend lectures and seminars, organize meetings, or present your
group homework or projects to your teacher. Doctors in different locations can hold conferences to discuss
medical cases. Communities and individuals can confer with government leaders in times of disaster and
dangers. Businessmen from around the world can transact business anytime. A variety of collaboration tools is
available for different groups and purposes.

Email as a Collaboration Tool


The online encyclopedia, Wikipedia, describe the invention of email as a collaboration tool that has
changed the way people communicate. It has made communication with others easier and faster than ever
before. Electronic mail or email is the most commonly used tool in collaborating with others due to its
effectiveness and speed in sending and receiving messages.

Email is a way of sending messages to your 17family and friends using the internet. You can attach
documents, photos, and other files in an email. You can send an
email to multiple recipients all at once.
The use of email presents advantages because of the following
features.
 It is secured.
 It cuts costs that could otherwise be incurred through
postal mail, courier services, telephone communications,
or travel.
 It is fast. Your message can be sent and received within
minutes.
 It can be sent to multiple recipients.
 It is convenient. Your message can be stored until the recipient is ready to read it.
Since email works like a personal letter to someone, both the sender and the recipient must have a personal
email address.
Creating your Email using Gmail Account
Gmail is a free email service developed by Google.
Users can access Gmail on the web, tablets, and smartphones as
well as with third-party programs that synchronize email
content.
Email accounts may seem relatively harmless, but kids
as young as five often have their own email address for their
online activities. It is nearly impossible to create an online
profile without an email address. That said, an unchecked email
address is a potential access point for your child to correspond
with people you do not know.
Note: ( For parents and Guardian) I assume that all parents
and guardian has a Gmail account because in this activity parents and guardian will make their child their own
Gmail account. If you don’t have one please create one or follow the steps on this videos:
for computer laptop or desktop https://youtu.be/Mr5OsAa0uvQ
and this is for mobiles https://youtu.be/a8bwSlZ694w
For Kids Under 13
For children under 13, Google Accounts will need to be created with an app called Family Link, which you can
also use to supervise their Google Accounts.
How to create a Google Account for children under 13 using Mobile phones

1. Download the Family Link app.


2. Open the Family Link app.
3. In the top right, tap Create or +.
4. Follow the instructions on screen to create your child’s account.
5. When you're done, a confirmation will show on the screen.
How Gmail accounts are different for kids under 13
For the most part, Gmail will be the same for children as it is for adults. There are only a few Gmail features
that aren't available to children under 13.
 Ads: Google won't serve ads in Gmail or process Gmail messages for advertising purposes.
 Automatic forwarding: Children can't automatically forward emails to another email address.
 Gmail offline: If their device isn't connected to the internet, children can’t read, send, or search their
Gmail emails.
 Google+: Children can't use any Google+ features available in Gmail.
 Labs: Children can’t turn on experimental Gmail features.
 Mail delegation: Children can't give someone else access to read, send, or delete their emails.
 Spam: If Gmail identifies an email as spam, it won't get delivered to your child's inbox or spam folder.
If you are done creating your child Gmail account. Log in them and do:
APPLICATION (See attached Activity Sheet)

18
Name: ________________________________________________ Date: __________________
Grade and Section: ____________________ Score:__________________
ACTIVITY SHEET
Computer IV
Lesson 3: Using ICT Tools for Communication and Collaboration week 5

Activity 1 – Send an Email


1. Open your web browser.
2. Type in your email provider on the address bar and press Enter(Gmail).
3. Type in the email address you have created, then click Next. Remove the tick in Stay signed in box.
4. type in your password. Click Sign in. You will directed to your ,mail page
5. Click Compose. Type the email address (blootooth007@gmail.com) on the subject line, type Greetings.

6. Below the subject line, type your message. Review your message before you click Send.
Note: You will know that your email has been sent when you see it in your Sent folder.

Activity 2 – Attached Files to an Email


1. After signing in to your email account, click compose
2. Type in the email address (blootooth007@gmail.com)
3. Type your complete name on the text field.

4. click attach Files with the paper clip icon on the bottom part of the
window.
5. In the open dialog box, browse the folders to search for the file you would like to attach to your message.
(file to attach: Picture of yourself/ Selfie)

6. Once you have attached the file, you will see the paper clip icon in the message.

7. Click send.

Parent’s Signature ___________________________________________

19
Computer IV
September 20-24, 2021

Unit: Information and Communication Technology


Lesson 3: Using ICT Tools for Communication and Collaboration.(Continuation)

LESSON PROPER
Quick Recall
Last week you have learned how to use email as a collaboration tool that email is a way of sending
messages to your family and friends using the Internet. You also created your own Gmail account and send
messages.

Login
10 Netiquette guidelines every online student needs to know
Learn how to be on your best behavior in an online classroom with 10 netiquette guidelines every online student
needs to know.
1. NO YELLING, PLEASE
There’s a time and a place for everything—BUT IN MOST SITUATIONS TYPING IN ALL CAPS IS
INAPPROPRIATE. Most readers tend to perceive it as shouting and will have a hard time taking what you say
seriously, no matter how intelligent your response may be.
2. Sarcasm can (and will) backfire
Sarcasm has been the source of plenty of misguided arguments online, as it can be incredibly difficult to
understand the commenter’s intent. What may seem like an obvious joke to you could come across as off-
putting or rude to those who don’t know you personally
3. Don’t abuse the chat box
Chat boxes are incorporated into many online classes as a place for students to share ideas and ask questions
related to the lesson. It can be a helpful resource or a major distraction—it all depends on how well students
know their classroom netiquette.
Rather than asking relevant questions or giving clear answers, students might use the chat box to ask questions
irrelevant to the discussion, or to talk about an unrelated topic.
5. Stop ... grammar time!
Always make an effort to use proper punctuation, spelling and grammar. Trying to decipher a string of
misspelled words with erratic punctuation frustrates the reader and distracts from the point of your message.
6. Set a respectful tone
Every day may feel like casual Friday in an online classroom where you don’t see anyone in person, but a
certain level of formality is still expected in your communication with instructors. In addition to proper
punctuation and spelling, it’s good netiquette to use respectful greetings and signatures, full sentences and even
the same old “please” and “thank you” you use in real life.
7. Submit files the right way
You won’t be printing assignments and handing to them to your teacher in person, so knowing how to properly
submit your work online is key to your success as an online student. Online course instructors often establish
ground rules for file assignment submissions, like naming conventions that help them keep things organized or
acceptable file formats. Ignoring these instructions is a common example of bad netiquette.

20
8. Read first
Take some time to read through each of the previous discussion post responses before writing your own
response. If the original post asked a specific question, there’s a good chance someone has already answered it.
Submitting an answer that is early similar to a classmate’s indicates to the instructor that you haven’t paid
attention to the conversation thus far.
9. Think before you type
A passing comment spoken in class can be forgotten a few minutes later, but what you share in an online
classroom is part of a permanent digital record. “Whether or not privacy settings are in place, the internet has a
tendency to house things forever, and what you say privately can easily become public,” .
10. Be kind and professional
Online communication comes with a level of anonymity that doesn’t exist when you’re talking to someone face-
to-face. Sometimes this leads people to behave rudely when they disagree with one another. Online students
probably don’t have the complete anonymity that comes with using a screen name, but you could still fall prey
to treating someone poorly because of the distance between screens.

Online Safety and Security


Though the internet offers plenty of information and resources, you must understand that there are also
risks and dangers in its use. Always trust the guidance of your parents and teacher about your use of the tools
available on the internet and your interaction with other users. Practice online safety and security at all times.
* Do not share personal (and family) information such as your address, birthday, phone number, school,
your family member’s names, and your whereabouts.
* Do not give out information about others without their permission.
* keep your password to yourself. If you must have a written copy of your passwords, keep it in a place
that cannot be accessed by anyone.
*If anyone makes you feel uncomfortable, gives inappropriate remarks, offers to see you personally, or
threatens you in any way, tell your elders. They should be able to show you how to ignore or handle people
such as these.
*Be wary about people who ask for help or donations. Sometimes, they use the name of your friend or
family member to make you believe them. Ask your parents or teachers to guide you in dealing with them.
* Not everything you see, read, or hear online is true or accurate. Take time to verify information.
* Close websites with contents that promote illegal, violent, vulgar, or obscene activities.

Generalization
 Collaboration is an activity in which two or more people work together to create an output
 Online Collaboration is sharing your ideas and files with others over the internet.
 Email is the most commonly used tool in collaborating with others
 Some of the advantages of using email lie in its features such as security, cost effectiveness, ability to
attach documents and files, and fast and convenient exchange of messages.
 Using your email account, you can send and reply to messages with or without attachments.
 Practicing netiquette and safe use of the internet is the responsibility of all users.
Post Assessment Activity
REFERENCES

 Conception C. Santos, (2019)My Computer 4; Quezon City; Abiva Publishing House INC.
 Jennifer Joan B. Gatchalian,(2001)Learning Computer the easy way 4; Quezon City; The Library
Publishing House

21
Name: ________________________________________________ Date: __________________
Grade and Section: ____________________ Score:__________________
ACTIVITY SHEET
Computer IV
Lesson 3: Using ICT Tools for Communication and Collaboration week 6

Activity 1- Know How to Stay Safe Online


Write T on the blank if the statement is true. If not, write F.
______1. You must share your password to everyone.
______2.If you received an email from someone you do not know, open it to read the message.
______3. You can provide your personal information like your address school, and birthday online.
______4. Everything you see, read, or hear online is true or accurate. Take time to verify information.
______5. Think before you post anything online.
______6. Tell your parents if you accidentally click a website that contains illegal or violent content.
______7. Agree to meet someone you have just met online without asking your parents permission.
______8. In creating an email account you need a phone number.
______9. Be responsible in posting information about you online.
______10.Do not force somebody to reply immediately to your messages especially if it is not urgent.
Activity 2

A. List five ways of showing proper behavior when using the internet

1._____________________________________________________

2._____________________________________________________

3._____________________________________________________

4. _____________________________________________________

5. _____________________________________________________
B. Give five safety tips when using the Internet.

1. _____________________________________________________

2. _____________________________________________________

3. _____________________________________________________

4.______________________________________________________

5. _____________________________________________________

Parent’s Signature ___________________________________________

22
TABUK INSTITUTE
United Church of Christ in the Philippines
Magsaysay, Tabuk City, Kalinga
email address: tabukinstitute@yahoo.com
CP No.09067731977
Junior High School Accredited Level II – 3 Years Re-Accreditation Status
Elementary School Department

TAKE HOME UNIT TEST IN COMPUTER IV


First Quarter
S.Y. 2021-2022
Name: ________________________________________________ Date: __________________
Grade and Section: ____________________ Score:_______________

Test I. Identify the term being described in each item. Choose the correct answer in the box and write
it on the space provided.

Information
Instant Malicious
Communication Viruses adware
Messaging Software
Technology
Social
email chat rooms Internet Blogging
Networking
Internet
Forum
Worms Antivirus Communication Spyware
Discussion
Technology
_____________________1. It is an interconnected network of computers, simply called the net.
_____________________2. It is place where users can share thoughts or ideas by posting messages. Others can
respond to post by forum members,.
_____________________3. It is the exchange of messages in real time through an application or software.
_____________________4. It is a regularly updated online personal journal or diary.
_____________________5. It is what ICT stands for.
_____________________6. It is a program or software designed specially to infect and harm a computer.
_____________________7. These are malicious programs that reproduce again and again.
_____________________8. I tracks your internet activities and enables a hacker to gather and use your
information without your knowledge,
_____________________9. This should be updated regularly to keep your computer files safe from harm.
____________________10. Malware comes from these two words.
TEST II- Put check mark ( ) if the statement shows tip to stay online or cross mark ( ) if it does not.

______1. Cooperate with your parents is setting up rules for going online.
______ 2. Answer unknown messages.
______3. Do not give out personal information to people you do not know.
______4, Converse with anyone; even with those you do not know to have a lot of friends on the Internet.
_____ 5. Ask you parents first before giving out your name, addresses, telephone number, and other personal
information.
_____ 6. Only open the suggested websites from your parent or teacher.
_____ 7. Send photos even without permission from your parents
_____ 8. If you receive information that makes you feel uncomfortable, inform your parents immediately.
_____ 9. Do not let others know your password.
_____ 10. Read all unnecessary information on the Internet

Parent’s Signature over Printed Name

You might also like