CONTEXTUALIZED
ONLINE SEARCH AND
RESEARCH SKILLS
Today’s Lesson :
OBJECTIVES:
At the end of the lesson the student will be able to:
1. Information is just literally just a click away.
Information can be accessed through personal
computers, smartphones, and other digital devices
anytime and anywhere. However, most of the Internet
users are experiencing an information overload
which oftentimes affects the quality of information
that they take.They often take information online as
facts even if it is just the author’s opinion.
*What is Netiquette?
*What are the rules of
Netiquette?
ONLINE SEARCH ACTIVITY
Do an online search to answer the given question using any search engine.
Provide the required data below.
Question: When do you say that an information contained in web pages is
credible or not?
Search Engine Used:________________________________________________
Keywords: _________________________________________________________
Number of Search Results: ___________________________________________
Sites used to answer question:
1. ______________________________________________________
2. _______________________________________________________
3. _______________________________________________________
Answer to the question:
____________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
____________________________________________
Research Skills
TIPS ON IMPROVING SEARCH AND
RESEARCH SKILLS
Online search and research are more than just
‘googling’ – typing a word in Google and then
clicking the search button. It is a skill that
every Internet user should know to do smart
searching and this starts with improving
search and research skills to get better results.
TIPS ON IMPROVING SEARCH AND RESEARCH
SKILLS
1. When searching online, narrow your topic.
Identify the key concepts or important ideas.
Assuming that you would like to search for the answer to this
question:
“What precautionary measures should you observe when you are
logged in in a public computer?”
Do not type the whole question in the search box.Typing the whole
question often leads to a large number of and inappropriate search
results.
From the question, the keywords are: precautionary
measures, observed, logged-in, public computer.
Keywords are terms that are used in by most search
engines to find related documents
TIPS ON IMPROVING SEARCH AND
RESEARCH SKILLS
2. Use the word “AND” between each keyword to create a search string.You may
type the following in the search box: Precautionary measures AND observe
AND logged-in AND public computer
INTERNET TTIPS ON IMPROVING SEARCH
AND RESEARCH SKILLSHREATS
3. Identify synonyms of the key words. Not all databases or
articles use the same words to describe a topic.
Group similar words together by using the word “OR”
for a quick and relevant search.
In the case of our example: the synonyms of some of the
keywords are: Precautionary measures – preventive
measures Observe – pay attention to Logged-in – signed-in.
You may type the following in the search box: Precautionary
measures OR preventive measures AND observe OR pay
attention to AND logged-in OR signed-in AND public computer
This gives you another set of search
results:
Types of Malware:
a. Virus
-a malicious program designed to replicate itself and transfer
from one computer to another (internet, local networks, FDs,
CDs, etc.)
b. Worm
-a malicious program that transfers from one computer to
another by any type of means.
Ex. ILOVEYOU Worm - The malware originated in the
Pandacan neighborhood of Manila in the Philippines on
May 5, 2000.
Types of Malware:
c.Trojan
a malicious program that disguises as a useful program but once
downloaded or installed, leaves your PC unprotected and allows
hackers to get your information.
d. Spyware
a program that runs in the background without you knowing it
(thus called “spy”). It has the ability to monitor what you are currently
doing and typing through keylogging.
Ex. Keylogger – used to record keystrokes done by the user.This is
done to steal their password or any other sensitive information.The
key logger software typically uses log file to store its recording.
Types of Malware:
e. Adware
a program designed to send you advertisements, mostly
as pop-ups,
f. Ransomware
or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim's data
or perpetually block access to it unless a ransom is paid.
HOW MALWARE WORKS?
INTERNET THREATS
2. Spam- an unwanted email mostly from bots or
advertisers. It can be used to send malware.
3. Phishing - its goal is to acquire sensitive personal
information like passwords and credit card details.This
is done by sending you an e-mail that will direct the user
to visit a fake website and be asked to update his/her
username, password, credit card or personal
information.
ACTIVITY 2: ARE YOU THREATENING ME?
Students will be presented pictures
and they will identify the type of
online threats.
ONLINE ETHICS AND
ETIQUETTE
Today’s Lesson :
OBJECTIVES:
At the end of the lesson the student will be
able to:
a) Define Netiquette;
b) identify the different rules of netiquette;
c) consider one’s and others’ reputation
when using the Internet.
WHAT IS NETIQUETTE?
Netiquette- from network and etiquette or Internet and etiquette.
“Having good netiquette involves
being mindful of your behavior,
avoiding offensive or derogatory
language, and treating others as you
would in face-to-face interactions.”
-someone famous
BASIC RULES OF NETIQUETTE
6. Respect People's
Privacy
7. Fact Check Before
Reposting
8. Don't Spam
9. Respond to Emails and
Texts Promptly
10.Update Online
Information
1. Make Real People a
Priority
2. Use Respectful
Language
3. Share With Discretion
4. Don't Exclude Others
5. Choose Friends
Wisely
PERFORMANCE TASK:
"DIGITAL FOOTPRINTS AND REPUTATIONS"
In this role-playing activity, students will explore how online
behavior affects reputations.
Students will be divided into small groups, each taking on different
roles such as students, teachers, parents, or peers.
Student’s task is to role-play the scenario, considering how their
behavior impacts both your own reputation and others‘. Students will
also incorporate in the different scenarios, the different rule of
Netiquette.
This activity aims to help you understand and manage digital
footprints responsibly, ensuring positive online interactions.
GROUP NO. _________
•Scenario (6 points) __________________
•Role Execution (6 points) __________________
•Creativity and Problem-Solving (6 points) __________________
•Authenticity (6 points) __________________
•Communication and Clarity (6 points) __________________
Comments
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
_____

4- Online Search and the different Search Engine.pptx

  • 1.
  • 2.
    OBJECTIVES: At the endof the lesson the student will be able to: 1. Information is just literally just a click away. Information can be accessed through personal computers, smartphones, and other digital devices anytime and anywhere. However, most of the Internet users are experiencing an information overload which oftentimes affects the quality of information that they take.They often take information online as facts even if it is just the author’s opinion.
  • 3.
    *What is Netiquette? *Whatare the rules of Netiquette?
  • 4.
    ONLINE SEARCH ACTIVITY Doan online search to answer the given question using any search engine. Provide the required data below. Question: When do you say that an information contained in web pages is credible or not? Search Engine Used:________________________________________________ Keywords: _________________________________________________________ Number of Search Results: ___________________________________________ Sites used to answer question: 1. ______________________________________________________ 2. _______________________________________________________ 3. _______________________________________________________
  • 5.
    Answer to thequestion: ____________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ ____________________________________________
  • 6.
  • 7.
    TIPS ON IMPROVINGSEARCH AND RESEARCH SKILLS Online search and research are more than just ‘googling’ – typing a word in Google and then clicking the search button. It is a skill that every Internet user should know to do smart searching and this starts with improving search and research skills to get better results.
  • 8.
    TIPS ON IMPROVINGSEARCH AND RESEARCH SKILLS 1. When searching online, narrow your topic. Identify the key concepts or important ideas. Assuming that you would like to search for the answer to this question: “What precautionary measures should you observe when you are logged in in a public computer?” Do not type the whole question in the search box.Typing the whole question often leads to a large number of and inappropriate search results.
  • 9.
    From the question,the keywords are: precautionary measures, observed, logged-in, public computer. Keywords are terms that are used in by most search engines to find related documents
  • 10.
    TIPS ON IMPROVINGSEARCH AND RESEARCH SKILLS 2. Use the word “AND” between each keyword to create a search string.You may type the following in the search box: Precautionary measures AND observe AND logged-in AND public computer
  • 11.
    INTERNET TTIPS ONIMPROVING SEARCH AND RESEARCH SKILLSHREATS 3. Identify synonyms of the key words. Not all databases or articles use the same words to describe a topic. Group similar words together by using the word “OR” for a quick and relevant search. In the case of our example: the synonyms of some of the keywords are: Precautionary measures – preventive measures Observe – pay attention to Logged-in – signed-in. You may type the following in the search box: Precautionary measures OR preventive measures AND observe OR pay attention to AND logged-in OR signed-in AND public computer
  • 12.
    This gives youanother set of search results:
  • 14.
    Types of Malware: a.Virus -a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.) b. Worm -a malicious program that transfers from one computer to another by any type of means. Ex. ILOVEYOU Worm - The malware originated in the Pandacan neighborhood of Manila in the Philippines on May 5, 2000.
  • 15.
    Types of Malware: c.Trojan amalicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. d. Spyware a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging. Ex. Keylogger – used to record keystrokes done by the user.This is done to steal their password or any other sensitive information.The key logger software typically uses log file to store its recording.
  • 16.
    Types of Malware: e.Adware a program designed to send you advertisements, mostly as pop-ups, f. Ransomware or ransom software is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
  • 17.
  • 18.
    INTERNET THREATS 2. Spam-an unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing - its goal is to acquire sensitive personal information like passwords and credit card details.This is done by sending you an e-mail that will direct the user to visit a fake website and be asked to update his/her username, password, credit card or personal information.
  • 19.
    ACTIVITY 2: AREYOU THREATENING ME? Students will be presented pictures and they will identify the type of online threats.
  • 30.
  • 31.
    OBJECTIVES: At the endof the lesson the student will be able to: a) Define Netiquette; b) identify the different rules of netiquette; c) consider one’s and others’ reputation when using the Internet.
  • 32.
    WHAT IS NETIQUETTE? Netiquette-from network and etiquette or Internet and etiquette. “Having good netiquette involves being mindful of your behavior, avoiding offensive or derogatory language, and treating others as you would in face-to-face interactions.” -someone famous
  • 33.
    BASIC RULES OFNETIQUETTE 6. Respect People's Privacy 7. Fact Check Before Reposting 8. Don't Spam 9. Respond to Emails and Texts Promptly 10.Update Online Information 1. Make Real People a Priority 2. Use Respectful Language 3. Share With Discretion 4. Don't Exclude Others 5. Choose Friends Wisely
  • 34.
    PERFORMANCE TASK: "DIGITAL FOOTPRINTSAND REPUTATIONS" In this role-playing activity, students will explore how online behavior affects reputations. Students will be divided into small groups, each taking on different roles such as students, teachers, parents, or peers. Student’s task is to role-play the scenario, considering how their behavior impacts both your own reputation and others‘. Students will also incorporate in the different scenarios, the different rule of Netiquette. This activity aims to help you understand and manage digital footprints responsibly, ensuring positive online interactions.
  • 35.
    GROUP NO. _________ •Scenario(6 points) __________________ •Role Execution (6 points) __________________ •Creativity and Problem-Solving (6 points) __________________ •Authenticity (6 points) __________________ •Communication and Clarity (6 points) __________________ Comments ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ _____