Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
DEPARTMENT OF EDUCATION
Region VII, Central Visayas
FOURTH QUARTER
Compiled by:
Arlyn Q. Ramacho (Valencia NHS-Valencia)
Louelyn M. Lajot (Casiano Z. Napigkit NHS Manalongon, Santa Catalina)
Lou A. Rubio (Froilan A. Alanano Memorial HS Dauin)
Roziel P. Granaderos (San Miguel NHS San Miguel, Bacong)
DepEd NegOr ICT Year II
Page 1
Topic:
Process and Delivery in
Internet & E-mail
Timeframe: 40 Days
STAGE 1
Content Standard:
Performance Standard:
4 Ms of production in using
Internet and E-mail
History/timeline, concepts and
terminologies used in the Internet
and E-mail
Technology used in Internet and Email Protocols and structure
Hardware requirement in setting
and connecting to the Internet
Software requirement in connecting
to the Internet
Search commands phrases when
Essential Question/s:
STAGE 2
Product or
Performance
Task:
Production plan
in the use of
Internet and Email that
applies
the 4 Ms of
production and
application of
concepts in
Internet
and E-mail
Page 3
Page 4
EXPLORE
Day 1
Diagnostic Test.
Match Column A with Column B.
Column A
1. A system for sending and receiving messages online.
2. It allows a user to have telephone service through an
Internet connection.
3. A type of website that is usually updated frequently, often
with news articles or random thoughts.
4. A way to receive updates from favorite websites and blogs.
5. A system that allows users in real time.
6. It refers to online services that allow people to interact with
each other and stay connected with friends and family.
7. It is the largest computer network in the world.
8. A computer that "helps" many different computers in a
network by running specialized software and storing
information.
9. The project of the US Department of Defense which is the
foundation of the Internet.
10. A virtual network of web sites connected by hyperlinks.
11. The year when the foundation of the Internet began.
12. The year when the World Wide Web was invented.
13. Known as web address, that tells the browser where to find
the web page.
14. A software that is used to access the World Wide Web.
15. The markup language for creating web pages.
16. Amount of data that can move through the connection over
a given period of time.
17. A part of the browser window that shows the URL of a
page.
18. The term given to copying web contents to the computers
memory.
Column B
a. E-mail
b. Voice over Internet
Protocol
c. Blog
d. Web Feed
e. Online Chat
f. Social Networking
g. Internet
h. Server
i. ARPAnet
j. World Wide Web
k. 1969
l. 1979
m. Uniform Resource
Locator
n. Web Browser
o. Hypertext Markup
Language
p. Bandwidth
q. Address Bar
r. Download
s. Plug-ins
t. Search Engines
Page 5
Day 2
It's no secret that more and more the Internet is becoming an integral part of our
everyday lives. But if you are new to the online experience, it may be a bit overwhelming.
You may be wondering, "What exactly is the Internet, and how does it work?"
In this Topic, we will give a brief overview of the Internet, and we will talk about
some fundamental concepts such as networks, servers, and clients.
The Internet Today
In the early days, most people just used the Internet to search for information. Today's
Internet is a constantly evolving tool that not only contains an amazing variety of
information, but also provides new ways of accessing, interacting and connecting with
people and content.
As a result, new terms are constantly appearing as new technologies are introduced.
The interactive below contains a few common terms that you might encounter online.
What is the Internet?
The Internet is a large system of computer networks that are linked together by a
common language protocol called the TCP/IP (Transmission Control Protocol/Internet
Protocol).
Page 6
The Internet is the largest computer network in the world, connecting millions of
computers. A network is a group of two or more computer systems linked together.
There are two main types of computer networks:
1. Local Area Network (LAN): A LAN is two or more
connected computers sharing certain resources in a
relatively small geographic location, often in the same
building. Examples include home networks and office
networks.
2. Wide Area Network (WAN): A WAN typically consists
of two or more LANs. The computers are farther apart
and are linked by telephone lines, dedicated telephone
lines, or radio waves. The Internet is the largest Wide
Area Network (WAN) in existence.
The foundation of the Internet began in 1969, when the US Department of Defence
created ARPAnet, a project to allow military personnel to communicate with each other
in an emergency.
Page 7
By 2011, the number of Internet users worldwide reached 2 billionover one quarter of
the world's population.
Program
Entertainment-
Discussion groups
On-line shopping
World Wide Web (WWW) - Also known as the Web; is all the users on the Internet that
are using the Hypertext Transfer Protocol (HTTP)
What are a website/ page/ homepage & hotspots?
A Web site is a collection of related Web pages that you can access electronically.
Web page is an electronic document on the Web.
The first page in a series of related documents or a site is called a home page
Hot spot is a portion of an image or a piece of text that changes the arrow to a hand
with a pointing finger, indicating the location of a hyperlink. You can click on a hot
spot to go to a linked Web page.
Web Browser - A browser is a computer program enabling you to use the computer to
view web pages and access the Internet
Anatomy of a URL
Page 8
commercial
network
educational
organization
military
government
Topic 2
Day 3
Page 9
Whenever you log into your online bank or your web email account, you should see https at
the front of the page address.
:// is the strange expression for 'this is a computer protocol'. We add these 3
characters in a Web address to denote which set of computer language rules affect the
document you are viewing.
3. Browser
A browser is a free software package that lets you view web pages, graphics, and
most online content. Browser software is specifically designed to convert HTML and XML
into readable documents.
The most popular web browsers in 2010 are: Firefox, Google Chrome, Internet
Explorer, and Safari.
4. HTML and XML
Hypertext Markup Language is the programmatic language that web pages are based
on. HTML commands your web browser to display text and graphics in orderly fashion.
HTML uses commands called 'HTML tags'.
XML is eXtensible Markup Language, a cousin to HTML. XML focuses on
cataloguing and databasing the text content of a web page.
XHTML is a combination of HTML and XML.
5. URL
URL's, or 'uniform resource locators', are the web browser addresses of Internet pages
and files. A URL works together with IP addresses to help us name, locate, and
bookmark specific pages and files for our web browsers.
URL's commonly use three parts to address a page or file: the protocol (which is the
portion ending in '//:'); the host computer (which sometimes ends in .com); and the
filename/pagename itself. For example:
https://personal.bankofamerica.com/login/password.htm
http://forums.about.com/ab-guitar/?msg61989.1
ftp://files.microsoft.com/public/eBookreader.msi
telnet://freenet.edmonton.ca/main
6. IP Address
Your computer's 'internet protocol' address is a four-part electronic serial number. An
IP address looks something like '202.3.104.55', complete with dot separators. Every
computer, cell phone, and device that accesses the Internet is assigned at least one IP address
for tracking purposes. Wherever you browse, whenever you send an email or instant
message, and whenever you download a file, your IP address acts like a type of automobile
licence plate to enforce accountability and traceability.
7. Email
Page 10
Email (formerly spelled e-mail with a hyphen) is electronic mail. It is the sending
and receiving of typewritten messages from one screen to another. Email is usually handled
by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g.
Microsoft Outlook).
Email has many cousins: text messaging, instant messaging, live chat, videomail (vmail), Google Waving.
8. Blogs and Blogging
A blog ('web log') is a modern online writer's column. Amateur and professional
writers publish their blogs on most every kind of topic: their hobby interest in paintball and
tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of
favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and
some people actually make reasonable incomes by selling advertising on their blog pages.
Web logs are usually arranged chronologically, and with less formality than a full
website. Blogs vary in quality from very amateurish to very professional. It costs nothing to
start your own personal blog.
9. Social Media and Social Bookmarking
Social media is the broad term for any online tool that enables users to interact with
thousands of other users. Instant messaging and chatting are common forms of social media,
as are blogs with comments, discussion forums, video-sharing and photo-sharing websites.
Facebook.com and MySpace.com are very large social media sites, as are YouTube.com and
Digg.com.
Social bookmarking is a specific form of social media. Social bookmarking is where
users interact by recommending websites to each other ('tagging sites').
10. ISP
ISP is Internet Service Provider. That is the private company or government
organization that plugs you into the vast Internet around the world. Your ISP will offer
varying services for varying prices: web page access, email, hosting your own web page,
hosting your own blog, and so on. ISP's will also offer various Internet connection speeds
for a monthly fee. (e.g. ultra high speed Internet vs economy Internet).
Today, you will also hear about WISP's, which are Wireless Internet Service
Providers. They cater to laptop users who travel regularly.
11. Download
Downloading is a broad term that describes when you make a personal copy of
something you find on the Internet or World Wide Web. Commonly, downloading is
associated with songs, music, and software files (e.g. "I want to download a new musical
ringtone for my cell phone", "I want to download a trial copy of Microsoft Office 2010").
The larger the file you are copying, the longer the download will take to transfer to your
computer. Some downloads will take 12 to 15 hours, depending on your Internet speed.
Be warned: downloading itself is fully legal, as long as you are careful not to
download pirated movies and music.
12. Malware
Page 11
Malware is the broad term to describe any malicious software designed by hackers.
Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other
software that seeks to do one of four things:
1. vandalize your computer in some way
2. steal your private information
3. take remote control of your computer ('zombie' your computer) for other ends
4. manipulate you into purchasing something
Malware programs are the time bombs and wicked minions of dishonest
programmers.
13. Router (aka 'Network Router')
A router, or in many cases, a router-modem combination, is the hardware device that
acts as the traffic cop for network signals into your home. A router can be wired or wireless
or both. Your router provides both a defense against hackers, and the redirection service of
deciding which specific computer or printer should get which signals in your home. If your
router or router-modem is configured correctly, your Internet speed will be fast, and hackers
will be locked out. If your router is poorly configured, you will experience network
sluggishness
and
possible
hacker
intrusions.
14. Keywords and Tags/Labels
Keywords are search terms used to locate documents. Keywords are anywhere from
one to five words long, separated by spaces or commas: e.g. "horseback riding calgary" e.g.
"ipad purchasing advice" e.g. "ebay tips selling". Keywords are the foundation for
cataloging the Web, and the primary means by which you and I will find anything on the
Web.
Tags (sometimes called 'labels') are recommendation keywords. Tags and labels focus
on crosslinking you to related content... they are the modern evolution of 'suggestions for
further reading'.
15. Texting/Chatting
Texting is the short way to say 'text messaging', the sending of short electronic notes
usually from a cell phone or handheld electronic device. Texting is popular with people who
are mobile and away from their desk computers. Texting is something like the pagers of old,
but has the file attachment ability of email.
To send a text message, you will usually need a keyboard-enabled cellphone and a
text message service through your cellphone provider. You address your text messages using
the recipient's phone number.
In 2010, texting has spawned a controversial habit called 'sexting', which is when
young people send sexual photos of themselves to other cell phone users.
16. I.M.
I.M. (usually spelled 'IM' without the periods) is instant messaging, a form of modern
online chatting. IM is somewhat like texting, somewhat like email, and very much like
DepEd NegOr ICT Year II
Page 12
sending notes in a classroom. IM uses specialized no-cost software that you install on your
computer. That IM software in turn connects you to potentially thousands of other IM users
through the Internet. You locate existing friends and make new friends by searching for their
IM nicknames.
Once the software and your friends list is in place, you can send instantaneous short
messages to each other, with the option of including file attachments and links. While the
recipient sees your message instantly, they can choose to reply at their leisure.
17. P2P
P2P file sharing ('peer-to-peer') is the most voluminous Internet activity today. P2P is
the cooperative trading of files amongst thousands of individual users. P2P participants
install special software on their computers, and then voluntarily share their music, movies,
ebooks, and software files with each other.
Through 'uploading' and 'downloading', users trade files that are anywhere from 1
megabyte to 5 gigabytes large. This activity, while in itself a fully legal past time, is very
controversial because thousands of copyrighted songs and movies trade hands through P2P.
18. E-commerce
E-commerce is 'electronic commerce': the transacting of business selling and buying
online. Every day, billions of dollars exchange hands through the Internet and World Wide
Web. Sometimes, the e-commerce is your company buying office products from another
company (business-to-business 'B2B' e-commerce). Sometimes, the e-ecommerce is when
you make a private purchase as a retail customer from an online vendor (business-toconsumer 'B2C' e-commerce).
E-commerce works because reasonable privacy can be assured through technical
means (e.g. https secure web pages), and because modern business values the Internet as a
transaction medium.
19. Bookmark
A bookmark (aka "favorite") is a marker that you can place on web pages and files.
You would bookmark something because:
1. You want to return to the page or file later
2. You want to recommend the page or file to someone else
Bookmarks/Favorites can be made using your right mouse click menu, or the
menus/toolbars at the top of your web browser. Bookmarks/Favorites can also be made on
your Mac or Windows computer files.
20. Social Engineering
Social engineering is the conman art of talking directly to people to trick them into
divulging passwords and their private information. All social engineering attacks are some
form of a masquerade or phishing attack, designed to convince you that the attacker is
trustworthy as a friend or as a legitimate authority figure. The attacker might use an email,
phone call, or even face-time interview to deceive you. Common social engineering attacks
Page 13
include greeting cards, bogus lottery winnings, stock investment scams, warnings from an
alleged banker that you've been hacked, credit card companies pretending to protect you.
21. Phishing and Whaling
'Phishing' is what modern-day con men do to defraud you of your personal accounts.
Phishing is the use of convincing-looking emails and web pages to lure you into typing your
account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake
PayPal warning messages, and fake bank login screens, phishing attacks can be very
convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users
distrust any email link that says "you should login and confirm this".
22. Addons and Plugins
Addons are custom software modifications. User optionally install addons to improve
the power of their Web browsers or office software. Examples include: a custom eBay
toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons
are free, and can be found and downloaded from the Web.
Plugins are a special kind of web browser addon. Plugins are essentially required
addons, if you wish to view very specialized web pages. Examples include: Adobe Flash or
Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.
23. Trojan
A trojan is a special kind of hacker program that relies on the user to welcome it and
activate it. Named after the famous Trojan horse tale, a trojan program masquerades as a
legitimate file or software program. Sometimes it will be an innocent-looking movie file, or
an installer that pretends to be actual anti-hacker software. The power of the trojan attack
comes from users naively downloading and running the trojan file.
24. Spamming and Filtering
'Spam' has two meanings. 1) Spam can mean 'the rapid repetition of a keyboard
command'. But more commonly, 2) spam is the jargon name of 'unwanted/unsolicited email'.
Spam email is usually comprised of two sub-categories: high-volume advertising, and
hackers attempting to lure you into divulging your passwords.
Filtering is the popular-but-imperfect defense against spam. Filtering uses software that
reads your incoming email for keyword combinations, and then either deletes or quarantines
messages that appear to be spam. Look for a 'spam' or 'junk' folder in your mailbox to see
your quarantine of filtered email.
25. Cloud Computing and Software-as-a-Service (SaaS)
Cloud computing is a fancy term to describe that your software is online and
'borrowed', instead of purchased and actually installed on your computer. Web-based email is
the most prevalent example of cloud computing: the users' email is all stored and accessed 'in
the cloud' of the Internet, and not actually on their own computers. This is the modern
version of the 1970's mainframe computing model. As part of the cloud computing model,
'Software as a Service' is the business model that claims people would rather rent software
Page 14
than actually own it. With their web browsers, users access the cloud of the Internet, and log
into their online rented copies of their SaaS software.
26. Apps and Applets
Apps and applets are small software applications. They are designed to be much
smaller than regular computer software, but still provide very useful functions. Lately, apps
are very popular with cellphone and mobile platforms; specifically: with the Apple
iPhone and the Google Android phone.
Examples of apps: rangefinder GPS for golfing, song identification software,
restaurant reviews, pocket video games, language translators for traveling.
27. Encryption and Authentication
Encryption is the mathematical scrambling of data so that it is hidden from
eavesdroppers. Encryption uses complex math formulas ('ciphers') to turn private data into
meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis
for how we use the public Internet as a pipeline to conduct trusted business, like online
banking and online credit card purchasing. On the provision that reliable encryption is in
place, your banking information and credit card numbers are kept private.
Authentication is directly related to encryption. Authentication is the complex way
that computer systems verify that you are who you say you are.
28. Ports and Port Forwarding
'Network ports' are thousands of tiny electronic 'lanes' that comprise your network
connection. Every computer has 65,536 tiny ports, through which Internetworking data
travels in and out. By using port management tools like a hardware router, users can control
port access to better safeguard themselves against hackers.
'Port forwarding' is the semi-complex technique of opening specific network ports.
You would port-forward to speed up your downloading and speed up your online connections
for gaming and teleconferencing.
29. Firewall
Firewall is a generic term to describe 'a barrier against destruction'. It comes from the
building term of a protective wall to prevent the spreading of house fires or engine
compartment fires. In the case of computing, 'firewall' means to have software and/or
hardware protecting you from hackers and viruses.
Computing firewalls range from small antivirus software packages, to very complex
and expensive software + hardware solutions. All the many kinds of computer firewalls offer
some kind of safeguard against hackers vandalizing or taking over your computer system.
30. Archives and Archiving
Page 15
Event
1959
1963
1965
1971
1973
1974
1975
1976
1977
Page 16
1978
1979
1980
1981
1982
1983
1984
1986
1988
1990
1991
1993
1994
1995
1996
1997
1998
2001
2002
2005
2006
graphics, is demonstrated
Ward Christensen writes the programme "MODEM" allowing two
microcomputers to exchange files with each other over a phone line
The first magnetic tape is developed in the US
Over half a million computers are in use in the United States.
IBM hires Paul Allen and Bill Gates to create an operating system for a
new PC. They buy the rights to a simple operating system manufactured
by Seattle Computer Products and use it as a template to develop DOS.
MS-DOS Computer Operating System increases its success
SMTP (Simple Mail Transfer Protocol) is introduced
More than 10 million computers are in use in the United States
Domain Name System (DNS) pioneered by Jon Postel, Paul Mockapetris
and Craig Partridge. Seven 'top-level' domain names are initially
introduced: edu, com, gov, mil, net, org and int.
Microsoft Windows introduced eliminating the need for a user to have to
type each command, like MS-DOS, by using a mouse to navigate through
drop-down menus, tabs and icons
William Gibson coins the word cyberspace when he publishes
Neuromancer
More than 30 million computers are in use in the United States.
Over 45 million PCs are in use in the United States.
The Internet, World Wide Web & Tim Berners-Lee
Tim Berners-Lee and Robert Cailliau propose a 'hypertext' system
starting the modern Internet
The World Wide Web: The World Wide Web is launched to the public
on August 6, 1991
At the beginning of the year only 50 World Wide Web servers are known
to exist
The World Wide Web Consortium is founded by Tim Berners-Lee to help
with the development of common protocols for the evolution of the World
Wide Web
YAHOO is created in April, 1994.
Java is introduced
Amazon.com is founded by Jeff Bezos
EBay is founded by Pierre Omidyar
Hotmail is started by Jack Smith and Sabeer Bhatia.
WebTV is introduced
Altavista introduces its free online translator Babel Fish
Microsoft acquires Hotmail
Google is founded by Sergey Brin and Larry Page on September 7, 1998
PayPal is founded by Peter Thiel and Max Levchin
Bill Gates introduces the Xbox on January 7th 2001.
Approximately 1 billion PCs been sold
PayPal is acquired by eBay
September 12: eBay acquires Skype
Skype announces that it has over 100 million registered users.
Page 17
Days 5-6
Equipment Needed
Computer
Page 18
megabyte (MB) photo from the Internet under optimal conditions takes about
1.5 seconds.
802.11a: transfers data at a maximum rate of 54 Mbps. Downloading a 10
megabyte (MB) photo from the Internet under optimal conditions takes about
1.5 seconds.
802.11n: depending upon the number of data streams the hardware supports,
802.11n can theoretically transmit data at up to 150 Mbps, 300 Mbps, 450
Mbps, or 600 Mbps.
Note
The transfer times listed are under ideal conditions. They aren't
necessarily achievable under normal circumstances because of
differences in hardware, web servers, network traffic conditions,
and so on.
Pros
Cons
Cons
Home PNA networks use existing home telephone wires to send information between
computers.
DepEd NegOr ICT Year II
Page 19
Speed HomePNA 2.0 transfers data at 10 Mbps. HomePNA 3.0 transfers data at 128
Mbps.
(For example, downloading a 10 megabyte [MB] photo from the Internet under
optimal conditions takes about 8 seconds on a HomePNA 2.0 network and about 1
second on a HomePNA 3.0 network.)
Pros
Cons
You need a phone jack in each room where you want to have a computer,
and all jacks must be on the same phone line.
Powerline networks use existing home electrical wiring to send information between
computers.
Speed A Powerline network can transfer data at up to 200 Mbps.
For example, downloading a 10 megabyte (MB) photo from the Internet under
optimal conditions can take less than a second on a Powerline network.
Pros
Cons
You need an electrical outlet in each room where you want to have a
computer.
Powerline networks can be affected by interference and "noise" on the line.
Hardware requirements
There are several kinds of hardware used in home networks.
Page 20
an Ethernet network. A switch costs a little more than a hub, but it speeds up the
transfer rate of information.
Ethernet hub
Routers and access points: Routers connect computers and networks to each other (for
example, a router can connect your home network to the Internet). Routers also enable
you to share a single Internet connection among several computers. Routers can be wired
or wireless. You don't need to use a
router for a wired network but we
recommend it if you want to share
an Internet connection. Access
points turn wired Ethernet
networks into wireless networks. If
you want to share an Internet
connection over a wireless
network, you will need a wireless
router or an access point.
AAccess point (left); wired router (center);
wireless router (right)
Modems: Computers use modems to send and receive information over telephone or
cable lines. You will need a modem if you want to connect to the Internet.
Cable modem
Page 21
Network cables (Ethernet and HomePNA only): Network cables connect computers to
each other and to other related hardware, such as hubs and routers.
Hardware
How many
Wireless
One
Ethernet
Page 22
Technology
Hardware
How many
computers)
Ethernet cables
Powerline
Ethernet router
Telephone cables
Ethernet router
Page 23
It's a good idea to find out what kind of network adapters your computers have, if any.
You might decide to go with a certain technology because you already have most of the
hardware, or you might decide to upgrade your hardware. A combination of technologies
might work best for your environment. For example, many people use a wireless router,
which accommodates both wired Ethernet connections for desktop computers and wireless
connections for laptops. For recommended layouts and information about assembling your
network, see Setting up a home network.
To connect to the Internet, follow the steps below.
Make sure you have a computer and a modem.
Connect the computer to the modem.
Install your browser software (and e-mail etc. if these are separate).
Install your software that allows you to access your ISP. How complicated or easy
this is depends on what software the ISP is using to give access. The information you
need to type into your access software is listed below.
Start your browser, enter your user name and password and you're on the net!
Information You Need To Connect To Your ISP
Domain Name: This is the name of your ISP's domain. Example: tech2u.com.au
Communications Port: The communications port on your computer that your modem
is attached to. It is usually called COM1 or COM2. This information is only needed
by PC users (not by Mac users).
Modem Speed: The slower speed of your modem and your ISP's modem. This is
measured in Kbps - Kilo (or thousand) bits per second.
Modem: The type of modem you have.
Phone Number: The number you call to connect to your ISP. This is entered exactly
as you would call it, including any area codes. Example: (02) 1122 3344
Username or login name: The name of your account with your ISP. Example emary
User password: This is the password for your account, given to you by your ISP. As
for all passwords, keep this secure.
Start Up Command: This is the command that says connect your computer to the ISP.
You can get this command from your ISP. You may not need a startup command,
most providers start communications straight away when you log in. Example: PPP
Domain Name Server address (DNS): The domain name server is a computer that
works on all addresses in the domain. It translates these English addresses into their
number addresses, and vice versa. The address of this computer is the DNS address,
and it is a string of numbers. Example:123.45.67.89
Interface Type: The interface your ISP provides between you and the Internet. You
have a choice of PPP, CSLIP and SLIP.
Your Own Numeric Internet Address: You get this address from your ISP. Some ISP's
use dynamic addressing, in which they allocate you an Internet address every time
you log in. This address is not a permanent number.
DepEd NegOr ICT Year II
Page 24
Your Own Host Name: Some ISP's will give your computer a name. Example: ryan /
Days 7-8
Browser Basics
A web browser is the tool that you use to access the World Wide Web. In order to
get the most out of the Web, it's important to understand the various features of a browser.
Like most modern programs, browsers use a Graphical User Interface (GUI), which
means you can navigate by pointing and clicking with a mouse instead of just typing. Some
DepEd NegOr ICT Year II
Page 25
devices such as mobile phones use different types of GUIs, such as touchscreens. However,
many of the principles remain the same.
Navigating to a Web Site
To get the most out of your web browser, there are some basic concepts that you need
to be familiar with.
Address Bar
Browsers have an address bar that shows the web address (also called a URL) of the
page you are on. To go to a different page, you can type an address in the address bar and
then press Enter (or Return).
Links
Most of the time, you will get to a different page by clicking on a link. A link can be
text or an image, and it's usually formatted to stand out so you know to click on it. Many
text links are blue, and they may also be underlined.
A link may lead to another web page, or it could lead to a document, video, or any
other type of file. If you're not sure if something's a link, hover the mouse over it. The
pointer should change to a hand symbol.
Navigation Buttons
Sometimes, after you click on a link, you might want to go back to the previous page.
You can do this using your browser's Back button. Once you've pressed the Back button,
you can press the Forward button to follow the link again.
When you use the Back and Forward buttons, your browser may use its web cache to
display the page. The web cache stores recently-viewed web pages so that they don't need
to be downloaded again. That's usually good because it speeds up your web browsing, but
Page 26
sometimes you want to see the most up-to-date information on the page. You can use the
Refresh button (sometimes called Reload) to tell the browser to load the page again.
If a page is taking too long to load, or if you've typed in the wrong URL, you use the
Stop button to stop the page from loading.
! There are some instances where you don't want to use the navigation buttons. For
example, in some online stores, you shouldn't refresh the page after purchasing an
item, as it could cause you to purchase the item twice.
Search Bar
Most browsers have a built-in search bar for performing web searches. We'll talk
more about those in the next Topic.
Tabbed Browsing
Many browsers allow you to open a link in a new tab. This allows you to keep the
current page open instead of going directly to the new page. For example, if you're reading
an article that has a link in it, you can open the link in a new tab so that you can finish
reading the article. Then, you can go to the new tab to view the link.
Tabs are designed to make browsing more convenient. You can open as many links
as you want, and they'll stay in the same browser window instead of cluttering up your
desktop with multiple windows.
DepEd NegOr ICT Year II
Page 27
To open a link in a new tab, right-click the link and click Open in New Tab (the
wording may vary from browser to browser). To close a tab, click the "X" on the
tab.
Many browsers have a built-in search bar, located to the right of the address bar. To
do a search, just type what you're looking for (known as the search terms) in the search bar,
and then press Enter. Your browser will then take you to the search engine's web site to
show you the search results, which is a list of all of the web sites that contain your search
terms.
Page 28
Many browsers allow you to add to or change the search engines used by the search
bar.
Assessing the Search Results
After you do a search, glance over the first page of search results. Did it return what
you are looking for, or is it just a lot of unnecessary "junk"?
If your search results don't seem very good, you may need to try different search
terms. Remember, the search engine can't read your mind; it just looks for matching words.
For example, if you just search for the word polish, the search engine doesn't know whether
you're looking for shoe polish or a history of the Polish language!
You could improve your search results by searching for shoe polish. However, that
still may return a wide variety of web sites, such as:
Stores that sell shoe polish
Guides on how to polish shoes
The history of shoe polish
And probably much more
To get the best results, ask yourself: What exactly am I looking for? Specific terms
usually return better results.
Related Searches
A search engine will often recommend related searches that may be more specific
than the search terms you used. Related searches are usually listed at the bottom of the page.
Bing also lists them to the left of the search results.
Advertisements
DepEd NegOr ICT Year II
Page 29
Search engines may include advertisements along with the search results. These ads
are picked by the search engine based on your search terms, and they look a lot like the
actual search results. While they may be useful in some cases, it's usually more effective to
focus on the "regular" search results.
Google puts its ads (which it calls Sponsored Links) at the top and to the right of the
search results.
Improving Your Searches
As you gain experience with search engines, you'll be able to do better and better
searches, which means it will become quicker and easier to find what you are looking for.
Here are a few tips for improving your searches:
Take suggestions. As you're typing your search terms, the search engine will try
to guess what you're searching for, and it will show a list of search suggestions
(which are similar to related searches, except they happen while you're typing).
These can give you ideas for search terms that you may not have thought of.
Search phrases. Put quotes around a phrase so each word in the phrase isn't
searched for separately. For example, if you put quotes around "free online
games", the search engine searches for that entire phrase in a web page. However,
Page 30
if you simply type free online games, the search engine searches for each of the
words individually which may not give you the results you desire.
Exclude words. Use a hyphen (-) at the beginning of a word to exclude search
results containing it. For example, macaroni -cheese. In many search engines the
word NOT (in all caps) is used, as in macaroni NOT cheese.
Use OR. You can use OR (all caps) to include either of two search words. For
example, soup recipe tofu OR fish should return recipes for soup that contain
tofu or fish (or both). You could also search for soup recipe tofu OR fish OR
chicken OR beef.
Get Help. Go to your search engine's Help page for more tips.
Quick Tips
Use nouns as query keywords. Never use articles ("a," "the"), pronouns ("he," "it"),
conjunctions ("and," "or") or prepositions ("to," "from") in your queries
Use 6 to 8 keywords per query
Where possible, combine keywords into phrases by using quotation marks, as in
"solar system"
Spell carefully, and consider alternate spellings
Avoid redundant terms
Check the "Help" function of the particular search engine you're using, since they all
have their own quirks and preferences
A successful Internet search can take several tries. But remember: it's estimated that
there are between 200 and 800 million documents online - with no master system for
organizing this information! No wonder effective searches take knowhow, patience and
ingenuity.
Specialized Searches
Are you looking for news articles, images, videos, or online stores? You can use a
specialized search to search for a specific type of content. For example, if you do an
image search, the search will find and display images for you, instead of finding
links to pages that may or may not have relevant images.
Generally, a search engine will include links at the top of the page to go to the
specialized searches.
Page 31
Day 9
Sociology of internet
The internet has created a new and interesting concept of sociology and how applied
sociology can be used which wasnt quite perceptible to begin with. When the internet was
first conceived it was seen as more of a tool for research and learning. And it has been just
that, greatly so for the field of sociology.
However, as advancements were made with internet technology and more people
began using it the landscape changed. No longer is the internet just a creation for
calculations, it is also a place for mass communication. It is a place for people to gather, to
find like-minded and not so like-minded people that they can interact with. Eventually the
groups that formed began to be organized into the internet communities that they are today.
This burgeoning world of societies is an amusement park for the science of sociology.
Its a whole new way to look at how we group ourselves and what it is that forms and
regulates these groups. It is even more interesting considering that location isnt one of the
boundaries for internet societies and rarely does actual physical interaction occur.
In these new societies we must act as applied sociologists to understand how we are
to interact within those communities that are cropping up every day as the internet expands.
Analysis is also needed to understand how these internet communities of the virtual world
intertwine and affect us in real world societies.
One of the most widely used methods of applied sociology is observation. It is a
quick, effective way to gather information about the behavior of a particular society,
including those of the internet. Because you wont be physically gathering behavior cues it is
DepEd NegOr ICT Year II
Page 32
key to concentrate on what is being said and how it is delivered. This is what is known as
content analysis in applied sociology. You should have a good idea of the type of community
to expect if you know the subject or topic thats at the core of a website.
However, not until you observe the interaction within the internet community will
you understand the norms of the internet society, whats appropriate opposed to whats not.
This couldnt be truer for social networking sites like MySpace. These internet phenomenons
interlace thousands of people at once, however the rules of stratification that can be found in
regular societies still hold true in internet communities.
Within MySpace alone there are dozens of ways to categorize yourself which
automatically leads to division within the larger group. This takes the internet society from
macro level to meso level which in and of itself changes the social structure. The more you
break it down the more significant the changes become between the internet communities
leading to different sets of behavioral rules.
Beyond the giants like MySpace there are millions of micro level internet
communities that are even more concentrated in the types of people that form the society and
the guidelines theyve created for interacting within it. Asking questions like what influences
have brought them together or if there is a common cause will help you better understand the
culture behind the internet community. What people share is part of the creation of a society.
Socialization is the term for the creation of these shared symbols and beliefs.
Another interesting area of study of sociology on the internet is concerning online
poker, and the government's role in censorship. There is an intriguing article about
the improper role of government censorship posted at the Northwestern law review. The
legislation, signed into law on October 13th, 2006 by President Bush, is highly controversial
amongst political pundits and poker advocates alike.
The purpose for the internet community will also direct the behavior of its members
greatly.
Was the community formed as a purely social network or one for education, building
business relations, politics, sharing do it yourself projects? If youre unsure, the applied
sociology method of archival research could help you dig up when the internet community
began, what its original mission was, past forum discussions and more.
Perhaps the best way to understand and get a feeling for an internet community is by
the applied sociology method of participant observation. By actually getting on the site and
interacting with others youll get a first-hand experience as to what the internet community is
like and how the members interact. And today this isnt limited to text communication. We
can now stream voice and pictures over the internet instantly allowing us to not only speak
and see each other but also instantly share video and audio files as well to help us
communicate our ideas and share them with one another.
Page 33
The internet has changed how we communicate in general. There are functions for
filtering content, for excluding foul language and even to block a person from
communicating all together. We are learning to communicate within new confines as well as
societies with few boundaries. As weve become more comfortable with these changes in
communication theyve begun stretching beyond the computer into the real world.
Sociologists are just now gaining the ability to measure how communication through
the internet alters the way we communicate in person. The lack of physical interaction and
anonymity of communicating online had become a growing concern. This is especially true
for the younger generation who has never known life without these internet communities and
news ways of communicating.
Regardless of whether the affects internet communities have on real life societies are
positive or negative the one thing thats certain is it has forever altered our perception of what
a society is.
http://www.appliedsoc.org/internet
Topic 7: The Impact of the Internet
Day 10
Page 34
The ability to work from home by means of a PC or laptop and since some communications
link is increasing, and there are a number of benefits to the employer:
Office running costs and overheads (rates, electricity, heating etc.) can be reduced,
which in turn may reduce the need for office space.
Travel-related problems may be reduced.
It may tempt better staff to come and work for the company.
However, employers need to be able to trust their staff and be prepared to have less
direct control over them.
Benefits for the employee include:
You can work from the comfort of your own home.
There is no time wasted travelling and no travel costs.
It enables you to work around the needs of your family and/or children, giving you
greater flexibility.
It is more convenient - you can plan the working day to suit you, which could help
reduce stress levels.
Drawbacks include:
There is less opportunity to meet up with people and share ideas therefore teamwork
is more difficult.
There may be more temptation to spend time on non-work-related activities.
Video Conferencing
Video conferencing means using computers to provide a video-link between two or more
people. Instead of just talking to someone by telephone, you are able to see them as well.
Benefits include:
Meetings can take place without leaving the office.
Travel costs and the time taken to travel can be reduced significantly.
Meetings can be called instantly worldwide with little notice.
Delegates can still attend meetings even if they are physically unable to.
Drawbacks include:
May not be as productive as a discussion around a table.
Confidential documents may need to be viewed and signed in person.
There will always be times when you need to be able to meet face to face with
another person.
3. How the Internet is changing our lifestyle
Home Shopping
Home shopping options are many and varied and changing all the time. Most major
supermarkets are now on-line, offering home delivery of goods and increasingly, the major
Page 35
high street stores are also competing for on-line trading. The Internet lends itself to shops
selling goods which are easily portable, such as CDs and books.
The benefits of home shopping to the customer include:
You can avoid long queues, save time and shop from the comfort of your own home.
You do not have to travel into city centres or pay for car parking costs.
You can shop around for the best prices and shop abroad for cheaper goods.
It can offer the customer a wider range of shopping, 24 hours a day all year round.
People who are house-bound have the ability to shop and have goods delivered.
The possible drawbacks of home shopping include:
Security worries about payment by credit card over the Internet.
You do not get to see the goods before purchase which may be defective.
You may worry that the goods will never arrive!
There may be concerns over retailers collecting details about the buying habits of
customers.
Benefits to the company include:
It opens the market to customers nationally and internationally.
It enables smaller companies to compete with larger companies.
There may be a possible reduction in staffing and/or shopping outlets, thereby
reducing costs.
You can offer 24 hour shopping at minimum cost.
Home Banking
Most major banks now offer online banking and some are offering only Internet banking.
Without the overheads of running and staffing the high street branches they can offer higher
rates of interest to customers.
Services offered include:
You can pay your bills from the comfort of your home or the workplace.
It is possible to transfer money immediately to high interest accounts.
You can check balances and daily transactions on line anytime.
It is possible to set up direct debits and order stationery on line.
Benefits to the customer include:
All services are from the comfort of your home or workplace, 24 hrs. a day, 365 days
a year.
Higher interest rates are available to Internet bankers.
It is easy to shop around on line for the best interest rates and switch funds
automatically.
Concerns include:
Small branches are closing or having opening hours reduced.
Reductions in staffing at the major banks.
DepEd NegOr ICT Year II
Page 36
The move towards banking from your PC, digital TV or mobile phone will only
increase these concerns.
Some customers have worries about security because of possible credit card fraud.
4. Concerns about the Internet
The Internet and freedom of speech
No-one owns the Internet so anybody can post anything on it.
The Internet is a great source of information but it has also become the home of
political propaganda, racism, pornography and other controversial or illegal
material.
Apart from physically restricting access the only control is through some form of
filtering software.
Increasingly individuals and authorities are recommending some sort of control.
Arguments for control
To prevent illegal material being readily available, e.g. political propaganda, racism
and pornography.
To prevent young children accessing unsuitable material.
To make the Web more efficient - at present there is too much useless information.
To ensure copyright laws are maintained.
Arguments against control
The aim of the Internet is to be a free source of information.
Unsuitable material is easily available in other ways.
Control would cost money and users would have to pay.
Control would be very difficult to enforce.
Internet Crime
New technology brings with it new crimes and as a result some governments are setting up
special units to deal with Internet crime. Concerns surround:
the interception of credit card details and transactions online.
hacking into personal, private files with criminal intent.
fraudulent web sites taking credit card details from customers.
the spreading of viruses through the Internet.
Internet security
A number of steps are being taken to reassure the general public that the Internet is safe:
Data is encoded before transmission using encryption techniques which scramble
the data. The data is then decoded at the receiving end (decryption).
The use of passwords and access level restrictions.
The use of firewalls (servers that filter incoming messages to protect LANs from
viruses and hacking).
Tough penalties for offenders under the Computer Misuse Act.
Page 37
5. The future
Increased speed of access combined with digital, satellite and wireless technologies will see
Internet use and the resources on offer continue to expand.
In the home digital TV offering Internet access will enable home viewers to shop, bank, play
games and send email.
At work digital phone lines will offer companies high-speed communication enabling
business to be conducted quickly, efficiently and with reduced costs. Access to video
conference links will become commonplace.
Wireless technology (WAP) will support mobile phones offering hand-held Internet access.
Pocket-sized units will link email to weather, news, travel, entertainment listings and holiday
information. As connection speeds improve, banking, shopping and video conferencing will
take place on the move, in the car on the bus, train or plane.
On the road new systems will be able to pinpoint your car on an onboard computer which
will provide access to road and traffic information. Car phones will link to the Internet
allowing drivers to check their email.
The Advantages & Disadvantages of The Internet:
The Internet or the World Wide Web is indeed a wonderful and amazing addition in
our lives. The Internet can be known as a kind of global meeting place where people from all
parts of the world can come together. It is a service available on the computer, through which
everything under the sun is now at the fingertips of anyone who has access to the Internet.
Advantages of the Internet
The Internet provides opportunities galore, and can be used for a variety of things. Some of
the things that you can do via the Internet are:
E-mail: E-mail is an online correspondence system. With e-mail you can send and
receive instant electronic messages, which works like writing letters. Your messages
are delivered instantly to people anywhere in the world, unlike traditional mail that
takes a lot of time.
Access Information: The Internet is a virtual treasure trove of information. Any kind
of information on any topic under the sun is available on the Internet. The search
engines on the Internet can help you to find data on any subject that you need.
Shopping: Along with getting information on the Internet, you can also shop online.
There are many online stores and sites that can be used to look for products as well as
buy them using your credit card. You do not need to leave your house and can do all
your shopping from the convenience of your home.
Online Chat: There are many chat rooms on the web that can be accessed to meet
new people, make new friends, as well as to stay in touch with old friends.
DepEd NegOr ICT Year II
Page 38
Downloading Software: This is one of the most happening and fun things to do via
the Internet. You can download innumerable, games, music, videos, movies, and a
host of other entertainment software from the Internet, most of which are free.
Day 11
Do you ever feel like the only person who doesn't use email? You don't have to feel
left out. More than ever, email is easy to understand and use. In this Topic, you will learn
what email is, how it compares to traditional mail and what advantages it offers. You
will also see how email addresses are written. Then you will get to know the various types
of email providers and what kinds of features and tools they provide with an email account.
Getting to Know Email
You may know that email (electronic mail) is a way to send and receive messages
and contents across the internet, but do you know how individual emails are sent or what are
the costs for email or how email compares to traditional "snail" mail? To get a better idea of
what email is all about, review the infographic below and consider how you might benefit
from its use.
DepEd NegOr ICT Year II
Page 39
Louelyn M. Lajot
Manalongon, Sta. Catalina
6220 Negros Oriental
Your envelope or package
delivered by a mail carrier
Time
Contents
Costs
lowelane79@yahoo.com
Email Advantages
Productivity Tools Email is usually packaged with a calendar, address book, instant
messaging and more for convenience and productivity.
Access to Web Services If you want to sign up for accounts like Facebook, or order
products from services like Amazon, you will need an email address, so you can be safely
identified and contacted.
Easy Mail Management Email service providers have tools that allow you to file,
label, prioritize, find, group, and filter your emails for easy management. You can even
easily control spam or junk email.
Private Your email is delivered to your own personal and private account with a
password required for accessing and viewing emails.
Communicate with Multiple People You can send an email to multiple people at once
allowing you the option of having a conversation with several people or sending out a
message to a hundred.
Access Anywhere at Anytime You dont have to be at home to get your email. You can
access it from any computer or mobile device that gets an internet connection.
Page 40
exactly right, your emails will not be delivered or they might be delivered to the wrong
person.
Email addresses are always written in a standard format that includes a username, the
@ (at) symbol and the email provider's domain. The username is the name you choose to
identify yourself and the email provider is the website that hosts your email account.
Page 41
Many hosted web domains end with a suffix other than .com. Depending on the
organization, your provider's domain might end with a suffix like .gov (for government
websites), .edu (for schools), .mil (for military) or .org (for non-profit organizations).
Email Productivity Features
In addition to email access, email providers also provide other tools and features.
These features are part of a productivity suite, which is what we call a set of applications
and tools that help you work, communicate, and keep organized. The contents of the
providers' productivity suites vary, but the major three providers all offer the following
features:
Instant messaging, or chat, which lets you have informal text-based conversations with
other users.
An online address book, to store contact information for the people you email frequently.
An online calendar to help you keep track of your tasks and schedule, and share that
schedule with others.
A public profile, if desired, that contains your name and basic contact information. Think
of this as an online version of a business card or directory listing.
In addition, each provider offers some unique features. For instance, when you sign up
for Gmail, you get access to a full range of Google services, including Google Docs, Google
Reader, Picasa Web Albums and more. Hotmail, on the other hand, offers connectivity with
Windows Live and Microsoft Office Web Apps for Word, Excel and PowerPoint.
Email Etiquette & Safety
Like any form of online communication, it's important to practice good etiquette and
safety when using email. Etiquette is a set of rules or guidelines that people use to
communicate better and aid in other social interactions. Using good email etiquette can help
you get your point across and show that you are considerate of the person that you are talking
to. You should also be aware of important safety tips that you can use to protect yourself
from things like malware or phishing.
Email Do's and Don'ts
Here are some basic Do's and Don'ts that you can follow to write better emails, no
matter who you're emailing. In some cases, it's okay to break these rules; for example, if you
email someone every day, your subject lines may not need to be that descriptive. You can use
these rules as a starting point, and then tailor each email based on the situation.
Email Do's:
Page 42
Do keep emails clear and concise. Make sure that your recipient can tell what the email
is about. Avoid rambling, but provide enough detail to make the point of the email clear.
Do use a relevant subject line. The subject line lets the recipient know what to expect in
the email. Make it clear and relevant.
Do add a greeting and closing line to your email. Just like a written letter, it's nice to
add a greeting such as "Dear Amelia," and a closing line such as "Sincerely" or "Thanks"
followed by your name.
Do be aware that your tone may not be obvious in an email. Your recipients may not
be able to recognize irony and sarcasm in your emails, and this can lead to
misinterpretation or confusion. It's best to phrase things in the clearest way possible.
Do resize large photos before attaching them. Large photos take longer to download,
especially if someone is viewing them on a mobile device. If you want to send a large
photo to someone, resize it before you attach it.
Do check over your email before you send it. Before sending your email, make sure it's
free of spelling and grammar errors. Also, for more important emails, take a moment to
check the content and wording, to make sure that your message is presented the way you
want. Remember, an email generally can't be unsent!
Do check your recipients. Before you send an email, double-check the To, Cc, and Bcc
fields to make sure you're sending the email to the right people. This is especially
important when you're replying to a message, since it may automatically add unwanted
recipients.
Email Don'ts
Don't use caps lock. Writing in all caps is equivalent to shouting. Your recipient may
mistakenly think that you're angry, which can backfire (especially in a business email).
Also, emails written in all caps are harder to read.
Don't use an overly long signature. It may be tempting to create an elaborate signature
that includes your name, title, address, multiple phone numbers, a Facebook or Twitter
link, a picture, a quote, and other information. However, this can quickly turn into a tenline signature, which may make it harder for your recipients to know how you prefer to
be contacted. Instead of including all of your contact info, it's better to focus on your
most important or preferred contact info.
Don't use hard-to-read fonts or colors. Your email service may have various text
formatting options, but you should be aware that some of them may make your emails
difficult to read. In many cases, too much text formatting can also look unprofessional or
annoying.
Don't overuse Reply to All. Ask yourself whether every person in the group needs to see
your reply. If you're only intending the message for one person, use Reply. On the other
hand, if you want to keep everybody in the group informed use Reply to All.
Don't try to cover too many topics. If you find that your email is covering several
unrelated topics, consider splitting it into separate emails.
Don't forward chain emails, even if they sound interesting. Chain emails can quickly
spread throughout the world because they are forwarded to large numbers of people, who
then forward them to even more people, and so on. Many of them are hoaxes, and even
the ones that aren't may irritate your recipients.
Page 43
Email Safety
It's important to protect yourself when using email. Email is not totally secure, so you
should avoid sending extremely sensitive information, such as credit card numbers,
passwords, or your Social Security Number. In addition, you may receive emails from
scammers and cybercriminals, and you'll need to know how to deal with those messages.
Here are a few things to watch out for:
Spam: Spam is another term for junk email or unwanted email advertisements.
Sometimes, these messages advertise legitimate products, but often they are actually
counterfeit goods or scams. It's best to ignore or delete these messages. Luckily, most
email services offer some protection, such as filtering messages into a spam folder so
they don't end up in your Inbox.
Phishing: Phishing is a type of scam where an email pretends to be from a bank or
another trusted source in order to trick you into handing over your personal
information, which a scammer can then use to steal money from you. It's easy for
someone to create an email that looks like it's from a specific bank or other business, and
the person can even include a logo to make the email look legitimate. If you receive an
email that sounds urgent, you should be extra wary.
Attachments: Some attachments can contain viruses and other malware. It's generally
safest not to open any attachment that you weren't expecting. If a friend sends you an
attachment, you may want to ask them if they meant to send it to you. It's also a good
idea to use antivirus software and a firewall.
Topic 9
Days 12-13
ACTIVITY SHEET
CREATING AN EMAIL ACCOUNT
A. Creating Personal E-Mail Address
Personal electronic mail can be created into different sites who offered same services.
For practical purposes, YAHOO site is the best place to create e-mail address due to its userfriendliness and popular services. The steps are given below:
1. Open the site http://www.yahoo.com
Page 44
2. Click mail. Since you dont have personal yahoo ID and password, choose sign-up to
create your own.
3. Yahoo mail registration form will appear and supply your personal information. This
includes first name, last name, gender, prepared yahoo ID and your password.
Remember: Password is sensitive and be careful in using numbers, capitalization and
others. Complete all basic information needed and click I Agree button at the bottom.
4. In case of lack of information, another form will appear saying to correct entries
highlighted in yellow. Give the needed data and information then after completion
click submit this form securely.
5. After successful registration, confirmation page will appear specifying your new
yahoo ID and password. Dont give to anyone your password for your protection.
This ID and password will be used in all your transaction in yahoo services.
B. Signing-In to Yahoo using personal E-Mail Address
1. Open the site http://www.yahoo.com
2. Click mail.
3. Enter your yahoo ID and password then click Sign-In.
4. After successful logging in the, Yahoo mail environment will appear.
5. You may open your mail by double clicking the subject of your mail. In addition, you
may send your mail by clicking compose button and others.
6. Click sign-out every time you log-off from the yahoo mail.
SELF CHECK CREATING AN EMAIL ACCOUNT
Modified True or False. Directions: Write TRUE if the statement is correct and FALSE if it
is not then change the underlined word to make the statement correct. Write your answer on a
separate sheet of paper.
1. Snail mail is a medium of interpersonal communications. Millions of people who use the
Internet have their own specific e-mail address. This has been used for faster transaction and
communication.
2. Snail mail is delivered quickly. It is fast and available 24 hours each day.
3. Email stands for electronic mail.
4. In order to access email, anyone should have an account with user ID and password.
5. Email can be done if there is an Internet access.
ANSWER KEY
1. False
Email
2. False
Email
Topic 10
3. True
4. True
5. True
Day 14
Page 45
provider, these windows may look and feel different, but the way they function is essentially
the same.
Below are some samples of email windows from the top email providers: Gmail,
Hotmail and Yahoo. Review the images in order to become familiar with how the various
email windows work.
Inbox Window
The Inbox is where you can view all of the incoming emails you have received. Emails are
listed with the name of the sender, the subject of the message and the date received with the
most recent at the top.
Page 46
Topic 11
Days 15-16
An email signature is a word or phrase that is added to the bottom of your outgoing
email messages. A signature can be as simple as J. Smith, for example, or as complicated as a
lengthy quote from a Shakespeare play.
This is not necessarily meant that you will include your handwritten signature but
some text you want to appear at the end of your outgoing email messages.
Just like any other mail, signature is the best
way to give details on the email sender. You may
include your complete name, your home or business
address, your telephone numbers and other important
information.
Signature
Page 47
Using signature at the end of every email may give complete details and facilitate your sent
email.
OPERATION SHEET
SENDING EMAIL WITH SIGNATURE
Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:
Procedure:
The following equipment, tools and materials are needed to meet the
target purpose: 1. Personal Computer
2. Mouse
3. Keyboard
4. Internet Connection
1. Open the Internet Explorer (or available web browser).
a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs will
appear).
c. Click on the Internet Explorer. (The Internet explorer will
open).
2. Access the desired search engine by entering its URL on the
address line (e.g. yahoo.com).
Address
Line
Page 48
Signature
Save
Signature
Page 49
Precautions:
Evaluation:
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Create an email account.
Include signature at the end of every email messages.
Materials and equipment:
Personal Computer
Mouse
Keyboard
Internet Connection
show if evidence is
to
demonstrated
During the demonstration of skills, did the
student
Yes
No
1. created an email account?
messages?
3. encoded the desired signature format to be
N/A
Page 50
Satisfactory
Not Satisfactory
SELF CHECK
SENDING EMAIL WITH SIGNATURE
True or False. Directions: Write TRUE if the statement is correct, if it is NOT write
False. Write your answer on a separate sheet of paper.
1. An email signature is a handwritten signature.
2. An email signature is a word or phrase that is added to the bottom of your
outgoing email messages.
3. Email stands for electronic mail.
4. Procedure in creating email signature varies and depends on the available
web site used.
5. Email signature is the same as name that appears on the Inbox window.
ANSWER KEY
SENDING EMAIL WITH SIGNATURE
True or False
1. False
2. True
3. True
4. True
5. False
Topic 12
REPLYING AND FORWARDING MESSAGES
Days 17-18
Reply is the term used to response on the received email. Most received email is in
the form of text or attachment. Anyone can give comments on the received email by clicking
the reply button. If anyone doesnt feel to respond and needs more time before giving reply,
s/he can give the received email to the others by using the forward button. Forward is the
term used to pass the received email to the other email. You can pass or forward text, video,
images or any received email. To reply, follow these steps:
a. To reply to the sender of the email message only, press the Reply button. To reply
to the sender of an email message, and to all other recipients, select the email
message and press the Reply All button.
b. Type your reply at the top of the page as you normally would and click Send.
When you reply to an email message, the message you're replying to is normally
quoted at the bottom of your reply. If you don't want to include originals when you reply, you
can turn off this function in the Web Mail Options. To forward message, follow these steps:
a. Open the email message to be forwardedselect it in the email folder message
list, or open it a new windowthen click Forward. The Forwarding window will
appear.
b. Type the email address you want to forward the message to in the Forward To box
and then type any additional message you want to include above the forwarded
text.
DepEd NegOr ICT Year II
Page 51
c. Click Send.
Remember:
In forwarding messages, you need to select active email
account where to forward email messages.
Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:
OPERATION SHEET
REPLYING AND FORWARDING MESSAGES
Replying and forwarding messages
Reply and forward received email messages.
Make sure that there is someone who sends you an email and the
Internet is properly connected.
The following equipment, tools and materials are needed to meet the
target purpose:
1.
2.
3.
4.
Procedure:
Computer
Mouse
Keyboard
Internet Connection
Address
Line
Received
email
4. Click your received email and you will see its content (figure
below is an example).
5.
You will see the reply and forward button at the top of
received email.
Reply
button
Forward
button
Reply
dialog box
Page 53
Forward
dialog box
Precautions:
Evaluation:
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Open the received email.
Reply the received email.
DepEd NegOr ICT Year II
Page 54
Yes
No
N/A
Not Satisfactory
SELF CHECK
REPLYING AND FORWARDING MESSAGES
Identification. Directions: Identify the following statements. Write your answer on a
separate sheet of paper.
1. Forward is the term used to pass the received email to the other email.
2. Reply is the term used to response or answer the received email.
3. RE in email means it will forward the received email.
____________ 4. FW in email means it will reply or respond on the received email.
5. An active email account is needed to be able to deliver the email message
to the recipient.
ANSWER KEY
REPLYING AND FORWARDING MESSAGES
True or False
1. True
2. True
3. False
4. False
5. True
Topic 13
EMAIL ATTACHMENT
Days 19-20
This is the name given to a file that is sent along with an email.
An email attachment can be any type of file, including images (photos), videos, mp3s,
documents, zipped files/folders, and more. Most email providers have a limit on the size of
the attachment that can be sent. Also, you can usually only send up to a certain amount of
attachments with each email.
Page 55
Bear these file size limits in mind when sending attachments, the size of the
attachment you are sending may be acceptable by your email provider, but may be too big for
the recipient's email account.
Attaching a file to an email
To send a file (photo, document, etc.) with an email you have to attach it in a special
way to the email.
The process for attaching a file to your emails will vary depending on which email
provider you use, or which program you use to compose your emails. Generally, look for a
button or link when you are composing the email that says attach, attachments, attach file or
edit attachments.
Usually you will be presented with a browse button, click on this button, navigate to
the folder with the file in that you want to send, and then select the file.
To finish attaching the file will depend on the email provider's interface. If you are
using an email client such as Outlook then the file will be attached automatically. If you are
using a website such as Yahoo!, Gmail or Hotmail to send your attachments, then follow the
instructions on the screen.
INFORMATION SHEET
ATTACHING FILE/S
An e-mail attachment (or email attachment) is a computer file that is sent along
with an e-mail message. The file may be sent as a separate message but now it is almost
universally sent as part of the message to which it is attached.
Some mail services and software filter out potentially dangerous attachments such as
executables and scripts, although more expert users may find this limitation a nuisance.
Viruses in attachments to or the body of e-mail may be scanned for and dealt with by
anti-virus software running on the host computer, mail client software, and mail and Internet
service providers, although non-detection of a virus does not guarantee a message to be safe.
Attachment
Mail services have a limit on the size of messages which may be sent and received.
This limit may restrict the size of files to be attached. Messages of excessive size will usually
Page 56
be returned to the sender as undeliverable. This usually happens to attachments with a total
size of over 30 MB.
Remember:
Paper clip symbol in email message shows that there is an
attachment attached to the message.
Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:
Procedure:
OPERATION SHEET
ATTACHING FILE/S
Attaching Files
Attach file to an email message.
Make sure that file to be attached is saved in your computer and the
Internet is properly connected.
The following equipment, tools and materials are needed to meet the
target purpose:
1. Computer
2. Mouse
3. Keyboard
4. Internet Connection
1. Open the Internet Explorer (or available web browser).
a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs
will appear).
c. Click on the Internet Explorer. (The Internet explorer
will open).
2. Access the desired search engine by entering its URL in
address line (e.g. yahoo.com).
Address
Page 57
Attach
files
5.
Page 58
Attach
files
Attached
files
Precautions:
Evaluation:
9. You may now proceed in creating your email then click send.
There is a limit capacity in attaching file/s so, make sure that file is
small enough and will meet the requirements of your browser.
The student will be evaluated based on demonstration of skills in
opening email account and attaching file/s (see checklist).
Page 59
CHECKLIST
ATTACHING FILE/S
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Open the received email.
Attached files to an email.
Send email message.
Materials and equipment:
Personal Computer
Mouse
keyboard
Internet Connection
show if evidence is
to
demonstrated
During the demonstration of skills, did the
student
Yes
No
1.
2.
3.
4.
N/A
Not Satisfactory
SELF-CHECK
ATTACHING FILE/S
True or False. Directions: Write TRUE if the statement is correct, if it is NOT write
False. Write your answer on a separate sheet of paper.
1. An email attachment is a computer file which is sent along with an email message.
2. Paper clip symbols show that there is an attachment attached to the email.
3. There is no limit in attaching files.
4. In yahoo account, you can attach up to five (5) files.
5. Anyone can attach file in form of document, spreadsheet, picture or images, presentation
and others.
DepEd NegOr ICT Year II
Page 60
1.
True
Topic 14
2.
True
ANSWER KEY
ATTACHING FILE/S
3.
False
4.
True
5.
True
Days 21-22
Attachment
Page 61
Just like other application program, open command is used to unlock or open the file
to see and save in your computer. Other application program used ctrl+o to open file or by
clicking open command in file menu.
OPERATION SHEET
OPENING AND SAVING EMAIL ATTACHMENTS
Operations Title:
Opening and saving email attachment.
Purpose:
Open and save received email attachment.
Conditions or
Make sure that there is someone who sends you an email with
Situations for the
attachment and the Internet is properly connected.
Operations:
Equipment, Tools
The following equipment, tools and materials are needed to meet the
and Materials:
target purpose:
1. Computer
2. Mouse
3. Keyboard
4. Internet Connection
Procedure:
1. Open the Internet Explorer (or available web browser).
a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs
will appear).
c. Click on the Internet Explorer. (The Internet explorer
will open).
2. Access the desired search engine by entering its URL on the
address line (e.g. yahoo.com).
Address
Line
Page 62
4. Click your received email and you will see its attachment
(figure below is an example).
Received
attachment
5.
Page 63
Precautions:
Evaluation:
Page 64
CHECKLIST
OPENING AND SAVING EMAIL ATTACHMENTS
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Open the received email attachment.
Save the received email attachment.
Materials and equipment:
Personal Computer
Mouse
keyboard
Internet Connection
show if evidence is
to
demonstrated
During the demonstration of skills, did the
student
Yes
No
N/A
1. open the received email attachment?
Page 65
line in the display list, then click the intended function button. You can select all the
messages on the page by checking the box at the very top of the pile of checkboxes.
On the other hand, you can sort or arrange your received email by clicking the from,
subject, date and size button at the top of your email.
Remember:
Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:
Procedure:
OPERATION SHEET
PRIORITIZING AND SORTING EMAILS
Prioritizing and sorting emails
Prioritize and sort received emails
Make sure that there is someone who sends you an email and the
Internet is properly connected.
The following equipment, tools and materials are needed to meet the
target purpose:
1. Computer
2. Mouse
3. Keyboard
4. Internet Connection
1. Open the Internet Explorer (or available web browser).
a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs
will appear).
c. Click on the Internet Explorer. (The Internet explorer
will open).
2. Access the desired search engine by entering its URL on the
address line (e.g. yahoo.com).
Address
Line
Page 66
Precautions:
Evaluation:
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Sort emails.
Page 67
Yes
No
N/A
Not Satisfactory
SELF CHECK
PRIORITIZING AND SORTING EMAILS
Identification. Directions: Identify the following statements. Write your answer on a
separate sheet of paper.
1. This is the process of arranging the received email alphabetically in sender, date, subject
and size format.
2. This sends the selected messages to the trash folder.
3. This shift or go the selected messages to the selected folder or location.
4. A folder where all new incoming messages are stored.
5. A page where you can report the checked messages as spam, and block the addresses they
were sent from.
ANSWER KEY
PRIORITIZING AND SORTING EMAILS
1.
Sorting
2.
Delete
3.
Move
4.
Inbox
5.
Spam
Topic 16
Page 68
As you notice, complete name and other information are entered in this folder as an
address book.
OPERATION SHEET
SAVING E-MAIL ADDRESS TO AN ADDRESS BOOK
Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:
Procedure:
Address
Line
Contacts
Page 69
Page 70
Click done button to accept the new contact in your address book.
When you access again the contact folder, you will see the saved
contact information in this address book.
Precautions:
Evaluation:
Save only the accurate and active email account to your address
book. This will effectively manage your contact lists.
The student will be evaluated based on demonstration of skills in
saving email address to address book (see checklist 4.1). .
CHECKLIST
SAVING E-MAIL ADDRESS TO AN ADDRESS BOOK
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Creating Address Book
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
DepEd NegOr ICT Year II
Page 71
Internet Connection
to show if evidence is
demonstrated
Topic 17
N/A
Day 25
SAVING CONTACT INFORMATION FROM RECEIVED EMAILS
INFORMATION SHEET
SAVING CONTACT INFORMATION FROM RECEIVED EMAILS
Storing contact information from your received emails makes your contacts organized and
easy to locate. But what is save command? Save command is used to store or save file,
contact, etc. into your computer and retrieve it when you need it.
On the other hand, there are several ways to save documents in any application program. You
can save the active file you are working on, whether it is new or existed previously, all open
documents at the same time and a copy of the active document with a different name or in a
different location.
You can save contact information into your address book by using your previous Operations.
These address books are folders that contain contacts and groups. Entries in these address
books are best entered by opening the address book folder (see the Figure below).
Page 72
Just like your previous operations, you may also save contact list from your received
email (please do the Operations sheet).
OPERATION SHEET 4.2
SAVING CONTACT INFORMATION FROM RECEIVED EMAILS
Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:
Procedure:
Access the desired search engine by entering its URL on the address
line (e.g. yahoo.com).
Address
Line
Page 73
Open your email where you want to save its contact list. Click save
contact information to address book.
Save to
contact list
In add to address book window, you will observe that the contact list
email and the sender name automatically appear in the window.
Click add to address book button to confirm.
Page 74
Precautions:
Evaluation:
Click done button to accept the new contact in your address book.
Double check all information before clicking the done button.
The student will be evaluated based on demonstration of skills in
saving contact information from received email (see checklist).
CHECKLIST
SAVING CONTACT INFORMATION FROM RECEIVED EMAILS
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Creating Address Book
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Store contact information to address book from received email effectively
Materials and equipment:
Computer
Mouse
Keyboard
Internet Connection
to show if evidence is
demonstrated
During the demonstration of skills, did the
student
Yes
No
N/A
open the received email?
Day 26
INFORMATION SHEET
CREATING DISTRIBUTION LIST
Page 75
A distribution list allows email to be sent to multiple recipients at the same time.
You can send an email to members of the list. Lists are used like an email address so you can
send an email to many recipients who have valid email addresses. In using the distribution
list, follow the following steps:
Open your active email account
Click compose button (compose window will appear)
Insert
address
Click insert address to apply distribution list (the figure below will appear).
Check the multiple recipients you want to send your message.
Checked contact address will appear to the window (see figure below).
You may now start typing your messages to send multiple recipients. Click send.
Sending email messages from the distribution list save time and effort in
communication; however, one message sent to one person will be the same to the other
person who received the same message.
DepEd NegOr ICT Year II
Page 76
Remember:
All checked contact address will appear to the recipient
send dialog box so be careful on selecting address as they
will receive your send email.
ACTIVITY SHEET
CREATING DISTRIBUTION LIST
Create an email to be sent to multiple recipients at the same time. The steps are given below:
Open your active email account.
Click compose button (compose window will appear).
Click insert address to apply distribution list. Check the multiple recipients you
want to send your message.
Checked contact address will appear to the recipient dialog box.
Type your messages to send multiple recipients.
Click send.
CHECKLIST
CREATING DISTRIBUTION LIST
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Creating Address Book
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Create distribution list
Materials and equipment:
Computer
Mouse
Keyboard
Internet Connection
to show if evidence is
demonstrated
During the demonstration of skills, did the student
Yes
No
N/A
1. click the compose button?
Page 77
1.
Topic 19
ANSWER KEY
CREATING DISTRIBUTION LIST
2
3.
3
4.
4
2.
5.
Day 27
Page 78
Pros:
It's instantaneous; you don't need to wait for the other person to check their email.
It's great for quick messages, questions, or notifications.
Compared to email, it's easier to carry on a conversation (or even multiple
conversations).
You can stay logged in while you're doing other things on your computer, which
allows your friends to see that you're available to talk.
Cons:
If someone is not online, you may have to contact them some other way.
It's not as good as email for lengthy or complicated messages.
It's not always instantaneous: If someone is busy or has just stepped away from their
computer, it may take a while for them to respond, which can be confusing or
frustrating.
Since people may type quickly or use abbreviations, messages could be hard to
understand. Also, as with email, it's possible to misinterpret someone's tone.
You may not be able to chat with friends who use a different service, although there
are some exceptions: For example, Yahoo! Messenger and Windows Live Messenger
are able to communicate with each other.
Where to Find Chat and IM Services
There are numerous chat and IM programs that you can
download, including Yahoo!Messenger, Windows Live Messenger,
and Skype (all three of these can also do voice and video chat). In
addition, there are many browser-based services that don't require
downloading. For example, Facebook has a built-in chat feature, and
Gmail allows you to chat with your contacts whenever you're logged
in to your Gmail account.
If you have a smartphone or other mobile device, it's possible to use chat or IM
when you're away from your computer. Depending on which service you use, you'll either
need to download an app or use your device's browser to navigate to a specific chat site.
Popular mobile services include Google Talk, Meebo, and eBuddy.
Topic 20
Day 28
Page 79
There are many different social networking websites, but here are some of the most
popular ones:
Facebook is the most popular social networking site in the world. Chances are,
many of your friends are already on it. Many people use it to stay in touch with
friends and family or to connect with people with similar interests.
Twitter allows you to post short messages (140 characters or fewer). Depending
on your settings, these messages can be viewable by anyone in the world, or only
by your "followers." Twitter is a great tool for staying up-to-date with current
events and discovering new things that relate to your interests.
LinkedIn focuses more on career networking. People use it to gain new business
contacts, apply for jobs, and discuss topics related to their job fields.
Meetup takes a different approach: You can join groups based on your interests,
and those groups actually have meetings (in person). You can also communicate
online with other members and create a profile, just like other social networking
sites.
Communicating in a Social Network
In order to start communicating on a social networking site, you'll first need to create
an account and start finding your friends or contacts who already use the site. Then, you
can start posting random thoughts, questions, pictures, links, videos, or anything else
you'd like to share. These are called social posts because they are viewable by other people,
unlike direct messages, which are private. Your posts will appear on your activity stream,
which shows all of your recent activities, and they'll also be sent out to your friends, so they
can see what you're up to.
There are other terms that can be used to refer to social posts. One common term is
status updates. You can use status updates to let your friends know what you're up to or to
say what's on your mind. Also, some social networking sites have unique names for their
social posts. For instance, on Twitter, a social post is called a tweet.
(For tips on communicating in social networks, check out GCFs lesson on Smart
Social Networking and Communication Tips from the Internet Safety tutorial.)
Pros and Cons
Will social posts work for your needs? Review some of the pros and cons to help you decide.
Pros:
You can communicate with lots of people at the same time.
It's easy to post your thoughts, pictures, links, and more.
It provides a richer social experience than email or instant messaging.
DepEd NegOr ICT Year II
Page 80
You can stay in touch with people who live far away or who you don't see often.
Cons:
If you have friends who use a different social networking site (or don't use any at
all), they won't see your social posts.
You can accidentally post sensitive information that will be seen by many different
people.
Things that you post may be permanent, so you have to be careful not to post things
that could harm your reputation in the future.
Some sites have numerous privacy options that you'll need to set, which may be a bit
time consuming or confusing.
Some people find social networking websites to be addictive, and it can be tempting
to use the websites as a replacement for "real-life" communication.
Where to Find Social Posts
There are many websites that include social posting features, including:
Facebook
Twitter
Linkedin
Meetup
YouTube
Page 81
click to see more options. Depending on which website you're viewing, you may be able to
share content in the following ways:
Reddit, Digg, Delicious and StumbleUpon allow you to post and "vote" for
websites you like, which is similar to Liking or Recommending a page on
Facebook. You can also use these sites to find interesting or relevant sites that
other people have found.
Some sites have a +1 button, which is Google's version of the Like button.
You can post the link on your MySpace or LinkedIn stream.
You can email an article or link to someone.
Adding Comments
People use comments to give feedback, ask questions, or just to continue the
conversation. Comments sections often appear at the bottom of the page or article, but
sometimes there will be a link to go to the comments section. Not all web pages have
comments, but they're very common on blogs, news sites, video sites like YouTube, and
image hosting sites like Flickr. You may be required to register before you can post
comments on a website.
When viewing or posting comments, you should be aware that some people
intentionally try to start arguments (often called flame wars) by posting outrageous or
offensive comments. These people are known as trolls or cyber-bullies. While it may be
tempting to respond to these comments, it's usually best to ignore them.
(For more tips on communicating safely, check the GCF lessons Smart Social Networking
and Communication Tips and Cyber-Harassment, Stalking and Addiction from the Internet
Safety tutorial.)
In addition to comments, some websites allow you to rate content or products, either
by giving it one to five stars or by Liking/Disliking it (often shown as Thumbs up/Thumbs
down icons).
Pros and Cons
Wondering if you should start adding comments and using social plugins? Review
some of the pros and cons to help you decide.
Pros:
Interacting with the things you see on the web provides a better online experience
Page 82
Things that you post may be permanent, so you have to be careful not to post things
that could harm your reputation in the future.
With social plugins, it's possible for companies to track your browsing to collect data
about your preferences.
Topic 21
Downloading/Uploading Files
Day 29
Downloading Files
Your browser can display many different types of documents, media, and other files.
But there are times when you'll want to access a file outside your browser. Downloading
enables you to do this by putting the file on your computer in a place where you can access it.
For example, suppose you needed to complete and print a form that you found online.
You could download it to your desktop, then open it with the appropriate program (such as
Microsoft Word) to edit it.
How to Download a File
If you click on a link to a file, it may download automatically, but sometimes it just
opens within your browser instead of downloading. To prevent it from opening in the
browser, you can right-click the link and select Save Target As... (different browsers may use
slightly different wording). You'll be able to choose the folder where the file is saved.
Since the process of downloading a file varies from site to site, it may require some
trial and error.
Downloading a file
For various reasons, many sites do not allow you to download content. For example,
YouTube does not directly offer a way to download its videos. You need a software called
YouTube downloader to download YouTube videos. There are lots of YouTube downloaders
for free.
Saving Images
Sometimes you might want to save an image to your computer. To do this, right-click
the image and select Save Picture As....
Some sites do not allow images to be saved to your computer.
Page 83
Upload
While downloading is receiving a file from another computer, uploading is the exact
opposite. It is sending a file from your computer to another system. Pretty straight forward. It
is possible to upload and download at the same time, but it may cause slower transfer speeds,
especially if you have a low bandwidth connection. Because most files are located on
Internet servers, people generally do a lot more downloading than uploading.
Note: Uploading files depends on the type of content and site.
DEEPEN
Days 30 34
Guide the students and let them perform the following suggested activities:
Download Skype or Yahoo Messenger (YM)
Chat or IM using Skype or Yahoo Messenger (YM)
Create Facebook account or Twitter account
Upload/Download the following files:
o Documents
o Pictures
o Music
o Videos
TRANSFER
Days 35 40
Suggested Activities:
Using the created email addresses, create a Facebook account promoting a product or
service in the locality. Select appropriate contents from the World Wide Web to be
downloaded and to be used to enhance the FB account. Upload documents, pictures,
music and videos to the FB account. Original contents can also be used in the FB
page.
Exhibit/Present to class using LCD projector the created FB account. Students will be
given the chance to defend and explain the contents of their FB page. Critiquing will
DepEd NegOr ICT Year II
Page 84
be done based on: quality, appropriateness, objectivity, relevance, social and ethical
responsibility, etc.
Take a picture or video of their presentation and upload in Facebook or YouTube.
- End -
Page 85
http://library.thinkquest.org/C0124364/impact_of_the_internet.htm
http://netforbeginners.about.com/od/internet101/Internet_101_the_Fundamentals_Every_Inte
rnet_User_Should_Know.htm
http://windows.microsoft.com/en-US/windows-vista/What-you-need-to-set-up-a-homenetwork
http://www.appliedsoc.org/internet
http://www.gcflearnfree.org/
http://www.mediaawareness.ca/english/resources/special_initiatives/wa_resources/wa_teachers/tipsheets/searc
h_internet_effectively.cfm
http://www.pondered.org/the_internet.html
http://www.techterms.com/definition/upload
TESDA Activity Sheets
Page 86