Sei sulla pagina 1di 86

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region VII, Central Visayas

Division of Negros Oriental

CP-TLE II ICT MODULE

INTERNET AND EMAIL

FOURTH QUARTER

Compiled by:
Arlyn Q. Ramacho (Valencia NHS-Valencia)
Louelyn M. Lajot (Casiano Z. Napigkit NHS Manalongon, Santa Catalina)
Lou A. Rubio (Froilan A. Alanano Memorial HS Dauin)
Roziel P. Granaderos (San Miguel NHS San Miguel, Bacong)
DepEd NegOr ICT Year II

Page 1

Mary Jane A. Samson (Sta. Catalina NHS Santa Catalina)


Maria Fatima D. Mananquil (Tambo NHS Tambo, Ayungon)
Career Pathways Technology and Livelihood Education
INFORMATION AND COMMUNICATION TECHNOLOGY

INTERNET AND E-MAIL


General Standard: The learner demonstrates understanding of his/her Personal
Entrepreneurial Competencies (PECs), the environment and market as well as the
process/production and delivery of quality products/services in Internet and E-mail.
Quarter 4:
INTERNET & EMAIL

Topic:
Process and Delivery in
Internet & E-mail

Timeframe: 40 Days

STAGE 1
Content Standard:

Performance Standard:

The learner demonstrates understanding


of concepts and underlying principles
of process and delivery in Internet and
E-Mail
Essential Understanding:

The learner produces/provides high quality and


marketable products/services using the Internet and
E-mail.

Aligning ones PECs with the PECs of


successful practitioner/entrepreneur
helps ensure success in a chosen career.
Learners will know:

How does one ensure success in a chosen career?

4 Ms of production in using
Internet and E-mail
History/timeline, concepts and
terminologies used in the Internet
and E-mail
Technology used in Internet and Email Protocols and structure
Hardware requirement in setting
and connecting to the Internet
Software requirement in connecting
to the Internet
Search commands phrases when

DepEd NegOr ICT Year II

Essential Question/s:

Learners will be able to:

follow key processes, ways and procedures


when using Internet and E-mail
Surf / browse the Internet
Search information on the Internet
Search products and services
Create an E-mail account
Received and open E-mails
Compose and send E-mail messages
Attach files to E-mails
Chat / communicates with other people on the
Internet
Page 2

searching in the Internet


Data transfer to and from the
Internet
Sociology of the Internet/social
issues/impact using the Internet
Message format and Message fields
of E-mail
Composing writing the message
body of E-mail
Pros and cons of using E-mails
E-mail attachment

Visit /log-in to social groups or networking


sites.
Upload and download the following files on
the Internet;
- photos/pictures
- songs/music/MP3s
- videos
- electronic files
- office documents

STAGE 2
Product or
Performance
Task:
Production plan
in the use of
Internet and Email that
applies
the 4 Ms of
production and
application of
concepts in
Internet
and E-mail

Evidence at the level of


Understanding
Performance
The learner should be able to
demonstrate understanding of
Internet and E-mail by covering
the (6) facets of understanding:
Explain the importance of
adhering to the 4 Ms of
production.
Criteria:
Comprehensive
Clarity
Conciseness
Discuss the functions, application
and use of Internet and E-Mail
Criteria:
Validity
Significance
Objectivity

Assessment of the production plan


that applies the 4 Ms of production
and application of concept in photo
editing based on the following
criteria:
Adherence to the principles of 4
Ms of production
Practicality and profitability of
the product/service
Use of the features/application of
Internet and E-mail
Completeness/comprehensivenes
s of the output

Design new and effective ways to


strategize production process.
Criteria:
Appropriateness
Efficiency/effectiveness
Practicality
DepEd NegOr ICT Year II

Page 3

Express the importance of


following
the concepts and principles in
using the Internet and E-mail.
Criteria:
Validity
Relevance
Critical
Sensitivity
Describe your reaction when a
worker deviates from the process
flow.
Criteria:
Responsiveness
Openness
Objectiveness
Persuasiveness
Cite your reasons for buying
product/service of good quality.
Criteria:
Appropriateness
Depth
Objectivity
STAGE 3
Teaching-Learning sequence:
Internet is the most prominent technology used nowadays. It provides a variety of services
that everyone avail in business, education, government and other fields. The use of Internet
as the means of communication has become popular with E-mail as the most widely used
Internet application. For some people it is the most frequent form of communication, the
technology that can be accessed by anyone with a basic knowledge and skills using the
application made available in the Internet.
People who have the skill in using the Internet may find opportunity to work directly by
applying the technology in different types of business or even by just staying at home. Jobs
using the Internet are the fast growing careers nowadays that an individual may wish to
consider.
DepEd NegOr ICT Year II

Page 4

EXPLORE

Day 1

Orientation of the framework of CP-TLE II Quarter 4 (Internet and E-mail) and


agreement on the expected output at the end of the quarter.

Diagnostic Test.
Match Column A with Column B.
Column A
1. A system for sending and receiving messages online.
2. It allows a user to have telephone service through an
Internet connection.
3. A type of website that is usually updated frequently, often
with news articles or random thoughts.
4. A way to receive updates from favorite websites and blogs.
5. A system that allows users in real time.
6. It refers to online services that allow people to interact with
each other and stay connected with friends and family.
7. It is the largest computer network in the world.
8. A computer that "helps" many different computers in a
network by running specialized software and storing
information.
9. The project of the US Department of Defense which is the
foundation of the Internet.
10. A virtual network of web sites connected by hyperlinks.
11. The year when the foundation of the Internet began.
12. The year when the World Wide Web was invented.
13. Known as web address, that tells the browser where to find
the web page.
14. A software that is used to access the World Wide Web.
15. The markup language for creating web pages.
16. Amount of data that can move through the connection over
a given period of time.
17. A part of the browser window that shows the URL of a
page.
18. The term given to copying web contents to the computers
memory.

DepEd NegOr ICT Year II

Column B
a. E-mail
b. Voice over Internet
Protocol
c. Blog
d. Web Feed
e. Online Chat
f. Social Networking
g. Internet
h. Server
i. ARPAnet
j. World Wide Web
k. 1969
l. 1979
m. Uniform Resource
Locator
n. Web Browser
o. Hypertext Markup
Language
p. Bandwidth
q. Address Bar
r. Download
s. Plug-ins
t. Search Engines

Page 5

19. Programs that are installed in a browser that enables it to


play various types of media.
20. Specialized websites that help in finding information on the
web.
FIRM-UP
Topic 1: The Internet

Day 2

It's no secret that more and more the Internet is becoming an integral part of our
everyday lives. But if you are new to the online experience, it may be a bit overwhelming.
You may be wondering, "What exactly is the Internet, and how does it work?"
In this Topic, we will give a brief overview of the Internet, and we will talk about
some fundamental concepts such as networks, servers, and clients.
The Internet Today
In the early days, most people just used the Internet to search for information. Today's
Internet is a constantly evolving tool that not only contains an amazing variety of
information, but also provides new ways of accessing, interacting and connecting with
people and content.
As a result, new terms are constantly appearing as new technologies are introduced.
The interactive below contains a few common terms that you might encounter online.
What is the Internet?
The Internet is a large system of computer networks that are linked together by a
common language protocol called the TCP/IP (Transmission Control Protocol/Internet
Protocol).

DepEd NegOr ICT Year II

Page 6

The Internet is the largest computer network in the world, connecting millions of
computers. A network is a group of two or more computer systems linked together.
There are two main types of computer networks:
1. Local Area Network (LAN): A LAN is two or more
connected computers sharing certain resources in a
relatively small geographic location, often in the same
building. Examples include home networks and office
networks.
2. Wide Area Network (WAN): A WAN typically consists
of two or more LANs. The computers are farther apart
and are linked by telephone lines, dedicated telephone
lines, or radio waves. The Internet is the largest Wide
Area Network (WAN) in existence.

Servers and Clients


A server with multiple clients
You may have heard someone say something like "The
server is down" or "We're having problems with the e-mail
server." A server is a computer that "serves" many different
computers
in
a
network
by running
specialized
software and storing information. For example, web pages are
stored on servers.
When you access a web page, your computer is acting as a client. A client runs
familiar software such as web browsers or email software, and it communicates with the
server to get the information it requires.
In order for your browser to display a web page, it requests the data from the server
where the page is stored. The server processes the request, then sends the data to your
browser, where it is displayed.
In peer-to-peer (P2P) networks, each computer acts as both a server and a client.
Examples of P2P software include Skype and BitTorrent.

The foundation of the Internet began in 1969, when the US Department of Defence
created ARPAnet, a project to allow military personnel to communicate with each other
in an emergency.

DepEd NegOr ICT Year II

Page 7

By 2011, the number of Internet users worldwide reached 2 billionover one quarter of
the world's population.

What the Internet offers?


E-Mail (electronic mail)
enables us to exchange messages throughout the world
with people- friends, colleagues, relatives and even strangers.
Example: deped_cznnhs@yahoo.com
Information -

any information can be obtained easily on the Internet.


Example: www.inq7.net ; www.deped.gov.ph

Program

offers thousands of free programs. Some of these programs are games,


utility programs, freeware software, handouts, any tutorials, and
others. Example: www.download.com

Entertainment-

good browsing at current movies or listen to over thousands of sound


files
including
MP3
files
http://music.download.com/,
http://www.sonypictures.com/

Discussion groups

we can meet people with similar taste and preference as ours.


http://www.yahoo.com; http://www.friendster.com

On-line shopping

order goods and services on the Internet just sitting


comfortably. Example: www.pcworld.com, www.ebay.com

World Wide Web (WWW) - Also known as the Web; is all the users on the Internet that
are using the Hypertext Transfer Protocol (HTTP)
What are a website/ page/ homepage & hotspots?

A Web site is a collection of related Web pages that you can access electronically.
Web page is an electronic document on the Web.
The first page in a series of related documents or a site is called a home page
Hot spot is a portion of an image or a piece of text that changes the arrow to a hand
with a pointing finger, indicating the location of a hyperlink. You can click on a hot
spot to go to a linked Web page.
Web Browser - A browser is a computer program enabling you to use the computer to
view web pages and access the Internet

Anatomy of a URL

DepEd NegOr ICT Year II

Page 8

Different Domains on the Net


.com
.net
.edu
.org
.mil
.gov

commercial
network
educational
organization
military
government

Topic 2

TERMINOLOGIES USED FOR INTERNET

Day 3

The Top 30 Internet Terms for Beginners, 2012


1. The Web vs. the Internet
The Internet is a vast 'interconnection of computer networks' that spans the globe. It
is comprised of millions of computing devices that trade volumes of information. Desktop
computers, mainframes, GPS units, cell phones, car alarms, video game consoles, and even
soda pop machines are connected to the Net.
The Internet started in the late 1960's as an American military project, and has since
evolved into a massive public spider web. No single organization owns or controls the
Internet. The Net has grown into a spectacular mishmash of non-profit, private sector,
government, and entrepreneurial broadcasters.
The Internet houses many layers of information, with each layer dedicated to a
different kind of documentation. These different layers are called 'protocols'. The most
popular protocols are the World Wide Web, FTP, Telnet, Gopherspace, instant messaging, and
email.
The World Wide Web, or 'Web' for short, is the most popular portion of the Internet.
The Web is viewed through web browser software.
2. http and https
http is a technical acronym that means 'hypertext transfer protocol', the language of
web pages. When a web page has this prefix, then your links, text, and pictures should work
in your web browser.
https is 'hypertext transfer protocol SECURED'. This means that the web page has a
special layer of encryption added to hide your personal information and passwords.

DepEd NegOr ICT Year II

Page 9

Whenever you log into your online bank or your web email account, you should see https at
the front of the page address.
:// is the strange expression for 'this is a computer protocol'. We add these 3
characters in a Web address to denote which set of computer language rules affect the
document you are viewing.
3. Browser
A browser is a free software package that lets you view web pages, graphics, and
most online content. Browser software is specifically designed to convert HTML and XML
into readable documents.
The most popular web browsers in 2010 are: Firefox, Google Chrome, Internet
Explorer, and Safari.
4. HTML and XML
Hypertext Markup Language is the programmatic language that web pages are based
on. HTML commands your web browser to display text and graphics in orderly fashion.
HTML uses commands called 'HTML tags'.
XML is eXtensible Markup Language, a cousin to HTML. XML focuses on
cataloguing and databasing the text content of a web page.
XHTML is a combination of HTML and XML.
5. URL
URL's, or 'uniform resource locators', are the web browser addresses of Internet pages
and files. A URL works together with IP addresses to help us name, locate, and
bookmark specific pages and files for our web browsers.
URL's commonly use three parts to address a page or file: the protocol (which is the
portion ending in '//:'); the host computer (which sometimes ends in .com); and the
filename/pagename itself. For example:
https://personal.bankofamerica.com/login/password.htm
http://forums.about.com/ab-guitar/?msg61989.1
ftp://files.microsoft.com/public/eBookreader.msi
telnet://freenet.edmonton.ca/main
6. IP Address
Your computer's 'internet protocol' address is a four-part electronic serial number. An
IP address looks something like '202.3.104.55', complete with dot separators. Every
computer, cell phone, and device that accesses the Internet is assigned at least one IP address
for tracking purposes. Wherever you browse, whenever you send an email or instant
message, and whenever you download a file, your IP address acts like a type of automobile
licence plate to enforce accountability and traceability.
7. Email

DepEd NegOr ICT Year II

Page 10

Email (formerly spelled e-mail with a hyphen) is electronic mail. It is the sending
and receiving of typewritten messages from one screen to another. Email is usually handled
by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g.
Microsoft Outlook).
Email has many cousins: text messaging, instant messaging, live chat, videomail (vmail), Google Waving.
8. Blogs and Blogging
A blog ('web log') is a modern online writer's column. Amateur and professional
writers publish their blogs on most every kind of topic: their hobby interest in paintball and
tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of
favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and
some people actually make reasonable incomes by selling advertising on their blog pages.
Web logs are usually arranged chronologically, and with less formality than a full
website. Blogs vary in quality from very amateurish to very professional. It costs nothing to
start your own personal blog.
9. Social Media and Social Bookmarking
Social media is the broad term for any online tool that enables users to interact with
thousands of other users. Instant messaging and chatting are common forms of social media,
as are blogs with comments, discussion forums, video-sharing and photo-sharing websites.
Facebook.com and MySpace.com are very large social media sites, as are YouTube.com and
Digg.com.
Social bookmarking is a specific form of social media. Social bookmarking is where
users interact by recommending websites to each other ('tagging sites').
10. ISP
ISP is Internet Service Provider. That is the private company or government
organization that plugs you into the vast Internet around the world. Your ISP will offer
varying services for varying prices: web page access, email, hosting your own web page,
hosting your own blog, and so on. ISP's will also offer various Internet connection speeds
for a monthly fee. (e.g. ultra high speed Internet vs economy Internet).
Today, you will also hear about WISP's, which are Wireless Internet Service
Providers. They cater to laptop users who travel regularly.
11. Download
Downloading is a broad term that describes when you make a personal copy of
something you find on the Internet or World Wide Web. Commonly, downloading is
associated with songs, music, and software files (e.g. "I want to download a new musical
ringtone for my cell phone", "I want to download a trial copy of Microsoft Office 2010").
The larger the file you are copying, the longer the download will take to transfer to your
computer. Some downloads will take 12 to 15 hours, depending on your Internet speed.
Be warned: downloading itself is fully legal, as long as you are careful not to
download pirated movies and music.
12. Malware

DepEd NegOr ICT Year II

Page 11

Malware is the broad term to describe any malicious software designed by hackers.
Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other
software that seeks to do one of four things:
1. vandalize your computer in some way
2. steal your private information
3. take remote control of your computer ('zombie' your computer) for other ends
4. manipulate you into purchasing something
Malware programs are the time bombs and wicked minions of dishonest
programmers.
13. Router (aka 'Network Router')
A router, or in many cases, a router-modem combination, is the hardware device that
acts as the traffic cop for network signals into your home. A router can be wired or wireless
or both. Your router provides both a defense against hackers, and the redirection service of
deciding which specific computer or printer should get which signals in your home. If your
router or router-modem is configured correctly, your Internet speed will be fast, and hackers
will be locked out. If your router is poorly configured, you will experience network
sluggishness
and
possible
hacker
intrusions.
14. Keywords and Tags/Labels
Keywords are search terms used to locate documents. Keywords are anywhere from
one to five words long, separated by spaces or commas: e.g. "horseback riding calgary" e.g.
"ipad purchasing advice" e.g. "ebay tips selling". Keywords are the foundation for
cataloging the Web, and the primary means by which you and I will find anything on the
Web.
Tags (sometimes called 'labels') are recommendation keywords. Tags and labels focus
on crosslinking you to related content... they are the modern evolution of 'suggestions for
further reading'.
15. Texting/Chatting
Texting is the short way to say 'text messaging', the sending of short electronic notes
usually from a cell phone or handheld electronic device. Texting is popular with people who
are mobile and away from their desk computers. Texting is something like the pagers of old,
but has the file attachment ability of email.
To send a text message, you will usually need a keyboard-enabled cellphone and a
text message service through your cellphone provider. You address your text messages using
the recipient's phone number.
In 2010, texting has spawned a controversial habit called 'sexting', which is when
young people send sexual photos of themselves to other cell phone users.
16. I.M.
I.M. (usually spelled 'IM' without the periods) is instant messaging, a form of modern
online chatting. IM is somewhat like texting, somewhat like email, and very much like
DepEd NegOr ICT Year II

Page 12

sending notes in a classroom. IM uses specialized no-cost software that you install on your
computer. That IM software in turn connects you to potentially thousands of other IM users
through the Internet. You locate existing friends and make new friends by searching for their
IM nicknames.
Once the software and your friends list is in place, you can send instantaneous short
messages to each other, with the option of including file attachments and links. While the
recipient sees your message instantly, they can choose to reply at their leisure.
17. P2P
P2P file sharing ('peer-to-peer') is the most voluminous Internet activity today. P2P is
the cooperative trading of files amongst thousands of individual users. P2P participants
install special software on their computers, and then voluntarily share their music, movies,
ebooks, and software files with each other.
Through 'uploading' and 'downloading', users trade files that are anywhere from 1
megabyte to 5 gigabytes large. This activity, while in itself a fully legal past time, is very
controversial because thousands of copyrighted songs and movies trade hands through P2P.
18. E-commerce
E-commerce is 'electronic commerce': the transacting of business selling and buying
online. Every day, billions of dollars exchange hands through the Internet and World Wide
Web. Sometimes, the e-commerce is your company buying office products from another
company (business-to-business 'B2B' e-commerce). Sometimes, the e-ecommerce is when
you make a private purchase as a retail customer from an online vendor (business-toconsumer 'B2C' e-commerce).
E-commerce works because reasonable privacy can be assured through technical
means (e.g. https secure web pages), and because modern business values the Internet as a
transaction medium.
19. Bookmark
A bookmark (aka "favorite") is a marker that you can place on web pages and files.
You would bookmark something because:
1. You want to return to the page or file later
2. You want to recommend the page or file to someone else
Bookmarks/Favorites can be made using your right mouse click menu, or the
menus/toolbars at the top of your web browser. Bookmarks/Favorites can also be made on
your Mac or Windows computer files.
20. Social Engineering
Social engineering is the conman art of talking directly to people to trick them into
divulging passwords and their private information. All social engineering attacks are some
form of a masquerade or phishing attack, designed to convince you that the attacker is
trustworthy as a friend or as a legitimate authority figure. The attacker might use an email,
phone call, or even face-time interview to deceive you. Common social engineering attacks

DepEd NegOr ICT Year II

Page 13

include greeting cards, bogus lottery winnings, stock investment scams, warnings from an
alleged banker that you've been hacked, credit card companies pretending to protect you.
21. Phishing and Whaling
'Phishing' is what modern-day con men do to defraud you of your personal accounts.
Phishing is the use of convincing-looking emails and web pages to lure you into typing your
account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake
PayPal warning messages, and fake bank login screens, phishing attacks can be very
convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users
distrust any email link that says "you should login and confirm this".
22. Addons and Plugins
Addons are custom software modifications. User optionally install addons to improve
the power of their Web browsers or office software. Examples include: a custom eBay
toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons
are free, and can be found and downloaded from the Web.
Plugins are a special kind of web browser addon. Plugins are essentially required
addons, if you wish to view very specialized web pages. Examples include: Adobe Flash or
Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.
23. Trojan
A trojan is a special kind of hacker program that relies on the user to welcome it and
activate it. Named after the famous Trojan horse tale, a trojan program masquerades as a
legitimate file or software program. Sometimes it will be an innocent-looking movie file, or
an installer that pretends to be actual anti-hacker software. The power of the trojan attack
comes from users naively downloading and running the trojan file.
24. Spamming and Filtering
'Spam' has two meanings. 1) Spam can mean 'the rapid repetition of a keyboard
command'. But more commonly, 2) spam is the jargon name of 'unwanted/unsolicited email'.
Spam email is usually comprised of two sub-categories: high-volume advertising, and
hackers attempting to lure you into divulging your passwords.
Filtering is the popular-but-imperfect defense against spam. Filtering uses software that
reads your incoming email for keyword combinations, and then either deletes or quarantines
messages that appear to be spam. Look for a 'spam' or 'junk' folder in your mailbox to see
your quarantine of filtered email.
25. Cloud Computing and Software-as-a-Service (SaaS)
Cloud computing is a fancy term to describe that your software is online and
'borrowed', instead of purchased and actually installed on your computer. Web-based email is
the most prevalent example of cloud computing: the users' email is all stored and accessed 'in
the cloud' of the Internet, and not actually on their own computers. This is the modern
version of the 1970's mainframe computing model. As part of the cloud computing model,
'Software as a Service' is the business model that claims people would rather rent software

DepEd NegOr ICT Year II

Page 14

than actually own it. With their web browsers, users access the cloud of the Internet, and log
into their online rented copies of their SaaS software.
26. Apps and Applets
Apps and applets are small software applications. They are designed to be much
smaller than regular computer software, but still provide very useful functions. Lately, apps
are very popular with cellphone and mobile platforms; specifically: with the Apple
iPhone and the Google Android phone.
Examples of apps: rangefinder GPS for golfing, song identification software,
restaurant reviews, pocket video games, language translators for traveling.
27. Encryption and Authentication
Encryption is the mathematical scrambling of data so that it is hidden from
eavesdroppers. Encryption uses complex math formulas ('ciphers') to turn private data into
meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis
for how we use the public Internet as a pipeline to conduct trusted business, like online
banking and online credit card purchasing. On the provision that reliable encryption is in
place, your banking information and credit card numbers are kept private.
Authentication is directly related to encryption. Authentication is the complex way
that computer systems verify that you are who you say you are.
28. Ports and Port Forwarding
'Network ports' are thousands of tiny electronic 'lanes' that comprise your network
connection. Every computer has 65,536 tiny ports, through which Internetworking data
travels in and out. By using port management tools like a hardware router, users can control
port access to better safeguard themselves against hackers.
'Port forwarding' is the semi-complex technique of opening specific network ports.
You would port-forward to speed up your downloading and speed up your online connections
for gaming and teleconferencing.
29. Firewall
Firewall is a generic term to describe 'a barrier against destruction'. It comes from the
building term of a protective wall to prevent the spreading of house fires or engine
compartment fires. In the case of computing, 'firewall' means to have software and/or
hardware protecting you from hackers and viruses.
Computing firewalls range from small antivirus software packages, to very complex
and expensive software + hardware solutions. All the many kinds of computer firewalls offer
some kind of safeguard against hackers vandalizing or taking over your computer system.
30. Archives and Archiving

DepEd NegOr ICT Year II

Page 15

A computer 'archive' is one of two things: a compressed container of multiple smaller


data files, or a purposeful long-term storage of files that are not going to be used often. In
some cases, an archive can be both.
The act of 'archiving', similarly, is one of two things: to combine and squeeze
multiple files into a larger single file (for easier emailing); or, archiving is when you will
retire data and documents to be put into long-term storage (e.g. your thousands of old emails
in your inbox).
http://netforbeginners.about.com/od/internet101/Internet_101_the_Fundamentals_Every_Inte
rnet_User_Should_Know.htm
Topic 3: Internet History Timeline
Day 4
Year
1822
1848
1880
1895
1923
1924
1931
1937

Event

1959

1963
1965
1971
1973

1974

1975

1976
1977

Charles Babbage designs his first mechanical computer


Boolean algebra is invented by George Boole
Alexander Graham Bell invents the telephone called the Photophone
Radio signals were invented by Guglielmo Marconi
Television Electronic was invented by Philo Farnsworth
Electro Mechanical television system was invented by John Logie Baird
Kurt Godel publishes a paper on the use of a universal formal language
Alan Turing develops the concept of a theoretical computing machine
Paul Baran theorises on the "survivability of communication systems
under nuclear attack", digital technology and symbiosis between humans
and machines
Douglas Engelbart invents and patents the first computer mouse
(nicknamed the mouse because the tail came out the end) The American
Standard Code for Information Interchange (ASCII) is developed to
standardize data exchange among computers.
Andries van Dam and Ted Nelson coin the term "hypertext"
E-mail was invented by Ray Tomlinson
Liquid Crystal Display ( LCD ) was invented by James Fergason
The minicomputer Xerox Alto (1973) was a landmark step in the
development of personal computers
Vint Cerf and Bob Kahn develop gateway routing computers to negotiate
between the various national networks
IBM develops SEQUEL (Structured English Query Language ) now
known as SQL
Charles Simonyi coins the term WYSIWYG (What You See Is What You
Get) to describe the ability of being able to display a file or document
exactly how it is going to be printed or viewed
Altair produces the first portable computer
The Microsoft Corporation was founded April 4, 1975 by Bill Gates and
Paul Allen to develop and sell BASIC interpreters for the Altair 8800
Apple Computers was founded Steve Wozniak and Steve Jobs
Apple Computers Apple II, the first personal computer with color

DepEd NegOr ICT Year II

Page 16


1978
1979

1980
1981
1982

1983

1984
1986
1988

1990
1991
1993

1994

1995
1996
1997
1998
2001
2002
2005
2006

graphics, is demonstrated
Ward Christensen writes the programme "MODEM" allowing two
microcomputers to exchange files with each other over a phone line
The first magnetic tape is developed in the US
Over half a million computers are in use in the United States.
IBM hires Paul Allen and Bill Gates to create an operating system for a
new PC. They buy the rights to a simple operating system manufactured
by Seattle Computer Products and use it as a template to develop DOS.
MS-DOS Computer Operating System increases its success
SMTP (Simple Mail Transfer Protocol) is introduced
More than 10 million computers are in use in the United States
Domain Name System (DNS) pioneered by Jon Postel, Paul Mockapetris
and Craig Partridge. Seven 'top-level' domain names are initially
introduced: edu, com, gov, mil, net, org and int.
Microsoft Windows introduced eliminating the need for a user to have to
type each command, like MS-DOS, by using a mouse to navigate through
drop-down menus, tabs and icons
William Gibson coins the word cyberspace when he publishes
Neuromancer
More than 30 million computers are in use in the United States.
Over 45 million PCs are in use in the United States.
The Internet, World Wide Web & Tim Berners-Lee
Tim Berners-Lee and Robert Cailliau propose a 'hypertext' system
starting the modern Internet
The World Wide Web: The World Wide Web is launched to the public
on August 6, 1991
At the beginning of the year only 50 World Wide Web servers are known
to exist
The World Wide Web Consortium is founded by Tim Berners-Lee to help
with the development of common protocols for the evolution of the World
Wide Web
YAHOO is created in April, 1994.
Java is introduced
Amazon.com is founded by Jeff Bezos
EBay is founded by Pierre Omidyar
Hotmail is started by Jack Smith and Sabeer Bhatia.
WebTV is introduced
Altavista introduces its free online translator Babel Fish
Microsoft acquires Hotmail
Google is founded by Sergey Brin and Larry Page on September 7, 1998
PayPal is founded by Peter Thiel and Max Levchin
Bill Gates introduces the Xbox on January 7th 2001.
Approximately 1 billion PCs been sold
PayPal is acquired by eBay
September 12: eBay acquires Skype
Skype announces that it has over 100 million registered users.

DepEd NegOr ICT Year II

Page 17

Topic 4: Requirements in Setting and Connecting to the Internet

Days 5-6

Equipment Needed
Computer

An IBM compatible, Macintosh or UNIX computer can be used for an


Internet connection
Programs
We require special programs to use the Internet. These programs are
given free of charge.
Modem
A modem serves as a medium to exchange information between a
computer and the Internet.
Telephone
All Internet information travels over the telephone lines.
ISP (Internet Service Provider)
it is a company which gives us the facility to
gain access to the Internet against a fee.
The variety of options for home networking can make buying decisions difficult.
Before you decide what hardware to get, you should decide what type of network technology
(the way computers in a network connect to or communicate with one another) to use. This
article describes and compares the most common network technologies and lists hardware
requirements for each.
Common Types of Network Technologies
The most common types of network technology are wireless, Ethernet, and
HomePNA (home phone line), and Powerline. When choosing a network technology,
consider the location of your computers and the desired speed of your network. The costs of
these technologies are similar. The sections below compare these four technologies.
Wireless
Wireless networks use radio waves to send information between computers. The three
most common wireless network standards are 802.11b, 802.11g, and 802.11a. A new
standard, 802.11n, is expected to grow in popularity.
Speed

802.11b: transfers data at a maximum rate of 11 megabits per second


(Mbps). Downloading a 10 megabyte (MB) photo from the Internet under
optimal conditions takes about 7 seconds.
802.11g: transfers data at a maximum rate of 54 Mbps. Downloading a 10

DepEd NegOr ICT Year II

Page 18

megabyte (MB) photo from the Internet under optimal conditions takes about
1.5 seconds.
802.11a: transfers data at a maximum rate of 54 Mbps. Downloading a 10
megabyte (MB) photo from the Internet under optimal conditions takes about
1.5 seconds.
802.11n: depending upon the number of data streams the hardware supports,
802.11n can theoretically transmit data at up to 150 Mbps, 300 Mbps, 450
Mbps, or 600 Mbps.
Note
The transfer times listed are under ideal conditions. They aren't
necessarily achievable under normal circumstances because of
differences in hardware, web servers, network traffic conditions,
and so on.

Pros

Cons

It's easy to move computers around because there are no cables.


Wireless networks are usually easier to install than Ethernet.
Wireless is often slower than the other three technologies.
Wireless can be affected by interference from things such as walls, large
metal objects, and pipes. Also, many cordless phones and microwave ovens
can interfere with wireless networks when they're in use.
Wireless networks are typically about half as fast as their rated speed under
all but ideal conditions.

Ethernet networks use Ethernet cables to send information between computers.


Speed Ethernet transfers data at either 10, 100, or 1000 Mbps, depending on the type of
cables used. Gigabit Ethernet is the fastest, with a transfer rate of 1 gigabit per
second (or 1000 Mbps).
(For example, downloading a 10 megabyte [MB] photo from the Internet under
optimal conditions takes about 8 seconds on a 10 Mbps network, about 1 second on
a 100 Mbps network, and less than a second on a 1000 Mbps network.)
Pros

Cons

Ethernet networks are inexpensive and fast.


Ethernet cables must be run between each computer and to a hub, switch, or
router, which can be time-consuming and difficult when the computers are in
different rooms.

Home PNA networks use existing home telephone wires to send information between
computers.
DepEd NegOr ICT Year II

Page 19

Speed HomePNA 2.0 transfers data at 10 Mbps. HomePNA 3.0 transfers data at 128
Mbps.
(For example, downloading a 10 megabyte [MB] photo from the Internet under
optimal conditions takes about 8 seconds on a HomePNA 2.0 network and about 1
second on a HomePNA 3.0 network.)
Pros

HomePNA uses the existing telephone wiring in your home.


You don't need hubs or switches to connect more than two computers in a
HomePNA network.

Cons

You need a phone jack in each room where you want to have a computer,
and all jacks must be on the same phone line.

Powerline networks use existing home electrical wiring to send information between
computers.
Speed A Powerline network can transfer data at up to 200 Mbps.
For example, downloading a 10 megabyte (MB) photo from the Internet under
optimal conditions can take less than a second on a Powerline network.
Pros

Powerline uses the existing electrical wiring in your home.


You don't need hubs or switches to connect more than two computers in a
Powerline network.

Cons

You need an electrical outlet in each room where you want to have a
computer.
Powerline networks can be affected by interference and "noise" on the line.

Hardware requirements
There are several kinds of hardware used in home networks.

Network adapters: These adapters (also called


network interface cards or NICs) connect
computers to a network so that they
can communicate. A network
adapter can be connected to the USB
port on your computer or installed inside your
computer in an available Peripheral Component
Interconnect (PCI) expansion slot.
Wireless, Ethernet, and HomePNA
network adapters

Network hubs and switches: Hubs and


switches connect two or more computers to
DepEd NegOr ICT Year II

Page 20

an Ethernet network. A switch costs a little more than a hub, but it speeds up the
transfer rate of information.

Ethernet hub
Routers and access points: Routers connect computers and networks to each other (for
example, a router can connect your home network to the Internet). Routers also enable
you to share a single Internet connection among several computers. Routers can be wired
or wireless. You don't need to use a
router for a wired network but we
recommend it if you want to share
an Internet connection. Access
points turn wired Ethernet
networks into wireless networks. If
you want to share an Internet
connection over a wireless
network, you will need a wireless
router or an access point.
AAccess point (left); wired router (center);
wireless router (right)

Modems: Computers use modems to send and receive information over telephone or
cable lines. You will need a modem if you want to connect to the Internet.

Cable modem

DepEd NegOr ICT Year II

Page 21

Network cables (Ethernet and HomePNA only): Network cables connect computers to
each other and to other related hardware, such as hubs and routers.

Ethernet and HomePNA cables


The table below shows the hardware that you need for each type of network technology.
Technology

Hardware

How many

Wireless

Wireless network adapter

One for each computer on


your network (laptops
almost always have these
built in)

Wireless access point or router


(recommended)

One

Ethernet network adapter

One for each computer on


your network

Ethernet

Ethernet hub or switch (only needed if One (a 10/100 hub or


you want to connect more than two
switch is best and should
DepEd NegOr ICT Year II

Page 22

Technology

Hardware

How many

computers)

have enough ports to


accommodate all computers
on your network)

Ethernet router (only needed if you


want to connect more than two
computers and share an Internet
connection)

One (you don't need a hub


or switch if you have a
router because it has ports
on it for your computers)

Ethernet cables

One for each computer


connected to the network
hub or switch (10/100 Cat
5e cables are best)

Crossover cable (only needed if you


One
want to connect two computers directly
to each other and not use a hub, switch,
or router)
HomePNA

Powerline

Home phoneline network adapter


(HomePNA)

One for each computer on


your network (USB-tophoneline network adapters
are best)

Ethernet router

One, if you want to share


an Internet connection

Telephone cables

One for each computer on


your network (use a
standard telephone cable to
plug each computer into a
phone jack)

Powerline network adapter

One for each computer on


your network

Ethernet router

One, if you want to share


an Internet connection

Electrical wiring in the home

One electrical outlet for


each computer on your
network

DepEd NegOr ICT Year II

Page 23

It's a good idea to find out what kind of network adapters your computers have, if any.
You might decide to go with a certain technology because you already have most of the
hardware, or you might decide to upgrade your hardware. A combination of technologies
might work best for your environment. For example, many people use a wireless router,
which accommodates both wired Ethernet connections for desktop computers and wireless
connections for laptops. For recommended layouts and information about assembling your
network, see Setting up a home network.
To connect to the Internet, follow the steps below.
Make sure you have a computer and a modem.
Connect the computer to the modem.
Install your browser software (and e-mail etc. if these are separate).
Install your software that allows you to access your ISP. How complicated or easy
this is depends on what software the ISP is using to give access. The information you
need to type into your access software is listed below.
Start your browser, enter your user name and password and you're on the net!
Information You Need To Connect To Your ISP
Domain Name: This is the name of your ISP's domain. Example: tech2u.com.au
Communications Port: The communications port on your computer that your modem
is attached to. It is usually called COM1 or COM2. This information is only needed
by PC users (not by Mac users).
Modem Speed: The slower speed of your modem and your ISP's modem. This is
measured in Kbps - Kilo (or thousand) bits per second.
Modem: The type of modem you have.
Phone Number: The number you call to connect to your ISP. This is entered exactly
as you would call it, including any area codes. Example: (02) 1122 3344
Username or login name: The name of your account with your ISP. Example emary
User password: This is the password for your account, given to you by your ISP. As
for all passwords, keep this secure.
Start Up Command: This is the command that says connect your computer to the ISP.
You can get this command from your ISP. You may not need a startup command,
most providers start communications straight away when you log in. Example: PPP
Domain Name Server address (DNS): The domain name server is a computer that
works on all addresses in the domain. It translates these English addresses into their
number addresses, and vice versa. The address of this computer is the DNS address,
and it is a string of numbers. Example:123.45.67.89
Interface Type: The interface your ISP provides between you and the Internet. You
have a choice of PPP, CSLIP and SLIP.
Your Own Numeric Internet Address: You get this address from your ISP. Some ISP's
use dynamic addressing, in which they allocate you an Internet address every time
you log in. This address is not a permanent number.
DepEd NegOr ICT Year II

Page 24

Your Own Host Name: Some ISP's will give your computer a name. Example: ryan /

Topic 5: Search Commands and Phrases When Searching the Internet

Days 7-8

Browser Basics
A web browser is the tool that you use to access the World Wide Web. In order to
get the most out of the Web, it's important to understand the various features of a browser.

Common Web Browsers


Today, Internet Explorer is the most popular web browser. Other browsers include
Firefox, Chrome, Safari, and Opera. Each one has its own look and feel, but they have the
same goal: to display web pages correctly. For most web pages, any well-known browser will
work.

Like most modern programs, browsers use a Graphical User Interface (GUI), which
means you can navigate by pointing and clicking with a mouse instead of just typing. Some
DepEd NegOr ICT Year II

Page 25

devices such as mobile phones use different types of GUIs, such as touchscreens. However,
many of the principles remain the same.
Navigating to a Web Site
To get the most out of your web browser, there are some basic concepts that you need
to be familiar with.

Address Bar
Browsers have an address bar that shows the web address (also called a URL) of the
page you are on. To go to a different page, you can type an address in the address bar and
then press Enter (or Return).

Links
Most of the time, you will get to a different page by clicking on a link. A link can be
text or an image, and it's usually formatted to stand out so you know to click on it. Many
text links are blue, and they may also be underlined.
A link may lead to another web page, or it could lead to a document, video, or any
other type of file. If you're not sure if something's a link, hover the mouse over it. The
pointer should change to a hand symbol.

Navigation Buttons
Sometimes, after you click on a link, you might want to go back to the previous page.
You can do this using your browser's Back button. Once you've pressed the Back button,
you can press the Forward button to follow the link again.

When you use the Back and Forward buttons, your browser may use its web cache to
display the page. The web cache stores recently-viewed web pages so that they don't need
to be downloaded again. That's usually good because it speeds up your web browsing, but

DepEd NegOr ICT Year II

Page 26

sometimes you want to see the most up-to-date information on the page. You can use the
Refresh button (sometimes called Reload) to tell the browser to load the page again.
If a page is taking too long to load, or if you've typed in the wrong URL, you use the
Stop button to stop the page from loading.

! There are some instances where you don't want to use the navigation buttons. For
example, in some online stores, you shouldn't refresh the page after purchasing an
item, as it could cause you to purchase the item twice.

Search Bar
Most browsers have a built-in search bar for performing web searches. We'll talk
more about those in the next Topic.

Tabbed Browsing
Many browsers allow you to open a link in a new tab. This allows you to keep the
current page open instead of going directly to the new page. For example, if you're reading
an article that has a link in it, you can open the link in a new tab so that you can finish
reading the article. Then, you can go to the new tab to view the link.

Tabs are designed to make browsing more convenient. You can open as many links
as you want, and they'll stay in the same browser window instead of cluttering up your
desktop with multiple windows.
DepEd NegOr ICT Year II

Page 27

To open a link in a new tab, right-click the link and click Open in New Tab (the
wording may vary from browser to browser). To close a tab, click the "X" on the
tab.

Search Engines and Strategies


With billions of web pages on the World Wide Web, how can you find exactly what
you're looking for? By using a search engine.
Search engines are specialized web sites that help you find what you're looking for on
the Web. All you have to do is type in one or more keywords, and the search engine will
look for matching web sites from all over the Web.
Performing a Search
There are numerous search engines out there, but the most popular ones are Google,
Yahoo, and Bing. Each one has its own unique features, but the process of doing a search is
very similar on each.

Using the Search Bar

Many browsers have a built-in search bar, located to the right of the address bar. To
do a search, just type what you're looking for (known as the search terms) in the search bar,
and then press Enter. Your browser will then take you to the search engine's web site to
show you the search results, which is a list of all of the web sites that contain your search
terms.

DepEd NegOr ICT Year II

Page 28

Many browsers allow you to add to or change the search engines used by the search
bar.
Assessing the Search Results
After you do a search, glance over the first page of search results. Did it return what
you are looking for, or is it just a lot of unnecessary "junk"?
If your search results don't seem very good, you may need to try different search
terms. Remember, the search engine can't read your mind; it just looks for matching words.
For example, if you just search for the word polish, the search engine doesn't know whether
you're looking for shoe polish or a history of the Polish language!
You could improve your search results by searching for shoe polish. However, that
still may return a wide variety of web sites, such as:
Stores that sell shoe polish
Guides on how to polish shoes
The history of shoe polish
And probably much more
To get the best results, ask yourself: What exactly am I looking for? Specific terms
usually return better results.
Related Searches
A search engine will often recommend related searches that may be more specific
than the search terms you used. Related searches are usually listed at the bottom of the page.
Bing also lists them to the left of the search results.

Advertisements
DepEd NegOr ICT Year II

Page 29

Search engines may include advertisements along with the search results. These ads
are picked by the search engine based on your search terms, and they look a lot like the
actual search results. While they may be useful in some cases, it's usually more effective to
focus on the "regular" search results.

Google puts its ads (which it calls Sponsored Links) at the top and to the right of the
search results.
Improving Your Searches
As you gain experience with search engines, you'll be able to do better and better
searches, which means it will become quicker and easier to find what you are looking for.
Here are a few tips for improving your searches:
Take suggestions. As you're typing your search terms, the search engine will try
to guess what you're searching for, and it will show a list of search suggestions
(which are similar to related searches, except they happen while you're typing).
These can give you ideas for search terms that you may not have thought of.

Search phrases. Put quotes around a phrase so each word in the phrase isn't
searched for separately. For example, if you put quotes around "free online
games", the search engine searches for that entire phrase in a web page. However,

DepEd NegOr ICT Year II

Page 30

if you simply type free online games, the search engine searches for each of the
words individually which may not give you the results you desire.
Exclude words. Use a hyphen (-) at the beginning of a word to exclude search
results containing it. For example, macaroni -cheese. In many search engines the
word NOT (in all caps) is used, as in macaroni NOT cheese.
Use OR. You can use OR (all caps) to include either of two search words. For
example, soup recipe tofu OR fish should return recipes for soup that contain
tofu or fish (or both). You could also search for soup recipe tofu OR fish OR
chicken OR beef.
Get Help. Go to your search engine's Help page for more tips.
Quick Tips
Use nouns as query keywords. Never use articles ("a," "the"), pronouns ("he," "it"),
conjunctions ("and," "or") or prepositions ("to," "from") in your queries
Use 6 to 8 keywords per query
Where possible, combine keywords into phrases by using quotation marks, as in
"solar system"
Spell carefully, and consider alternate spellings
Avoid redundant terms
Check the "Help" function of the particular search engine you're using, since they all
have their own quirks and preferences
A successful Internet search can take several tries. But remember: it's estimated that
there are between 200 and 800 million documents online - with no master system for
organizing this information! No wonder effective searches take knowhow, patience and
ingenuity.
Specialized Searches
Are you looking for news articles, images, videos, or online stores? You can use a
specialized search to search for a specific type of content. For example, if you do an
image search, the search will find and display images for you, instead of finding
links to pages that may or may not have relevant images.
Generally, a search engine will include links at the top of the page to go to the
specialized searches.

DepEd NegOr ICT Year II

Page 31

Topic 6: Sociology of the Internet/Social Issues/Impact Using the Internet

Day 9

Sociology of internet
The internet has created a new and interesting concept of sociology and how applied
sociology can be used which wasnt quite perceptible to begin with. When the internet was
first conceived it was seen as more of a tool for research and learning. And it has been just
that, greatly so for the field of sociology.
However, as advancements were made with internet technology and more people
began using it the landscape changed. No longer is the internet just a creation for
calculations, it is also a place for mass communication. It is a place for people to gather, to
find like-minded and not so like-minded people that they can interact with. Eventually the
groups that formed began to be organized into the internet communities that they are today.
This burgeoning world of societies is an amusement park for the science of sociology.
Its a whole new way to look at how we group ourselves and what it is that forms and
regulates these groups. It is even more interesting considering that location isnt one of the
boundaries for internet societies and rarely does actual physical interaction occur.
In these new societies we must act as applied sociologists to understand how we are
to interact within those communities that are cropping up every day as the internet expands.
Analysis is also needed to understand how these internet communities of the virtual world
intertwine and affect us in real world societies.
One of the most widely used methods of applied sociology is observation. It is a
quick, effective way to gather information about the behavior of a particular society,
including those of the internet. Because you wont be physically gathering behavior cues it is
DepEd NegOr ICT Year II

Page 32

key to concentrate on what is being said and how it is delivered. This is what is known as
content analysis in applied sociology. You should have a good idea of the type of community
to expect if you know the subject or topic thats at the core of a website.
However, not until you observe the interaction within the internet community will
you understand the norms of the internet society, whats appropriate opposed to whats not.
This couldnt be truer for social networking sites like MySpace. These internet phenomenons
interlace thousands of people at once, however the rules of stratification that can be found in
regular societies still hold true in internet communities.
Within MySpace alone there are dozens of ways to categorize yourself which
automatically leads to division within the larger group. This takes the internet society from
macro level to meso level which in and of itself changes the social structure. The more you
break it down the more significant the changes become between the internet communities
leading to different sets of behavioral rules.
Beyond the giants like MySpace there are millions of micro level internet
communities that are even more concentrated in the types of people that form the society and
the guidelines theyve created for interacting within it. Asking questions like what influences
have brought them together or if there is a common cause will help you better understand the
culture behind the internet community. What people share is part of the creation of a society.
Socialization is the term for the creation of these shared symbols and beliefs.
Another interesting area of study of sociology on the internet is concerning online
poker, and the government's role in censorship. There is an intriguing article about
the improper role of government censorship posted at the Northwestern law review. The
legislation, signed into law on October 13th, 2006 by President Bush, is highly controversial
amongst political pundits and poker advocates alike.
The purpose for the internet community will also direct the behavior of its members
greatly.
Was the community formed as a purely social network or one for education, building
business relations, politics, sharing do it yourself projects? If youre unsure, the applied
sociology method of archival research could help you dig up when the internet community
began, what its original mission was, past forum discussions and more.
Perhaps the best way to understand and get a feeling for an internet community is by
the applied sociology method of participant observation. By actually getting on the site and
interacting with others youll get a first-hand experience as to what the internet community is
like and how the members interact. And today this isnt limited to text communication. We
can now stream voice and pictures over the internet instantly allowing us to not only speak
and see each other but also instantly share video and audio files as well to help us
communicate our ideas and share them with one another.

DepEd NegOr ICT Year II

Page 33

The internet has changed how we communicate in general. There are functions for
filtering content, for excluding foul language and even to block a person from
communicating all together. We are learning to communicate within new confines as well as
societies with few boundaries. As weve become more comfortable with these changes in
communication theyve begun stretching beyond the computer into the real world.
Sociologists are just now gaining the ability to measure how communication through
the internet alters the way we communicate in person. The lack of physical interaction and
anonymity of communicating online had become a growing concern. This is especially true
for the younger generation who has never known life without these internet communities and
news ways of communicating.
Regardless of whether the affects internet communities have on real life societies are
positive or negative the one thing thats certain is it has forever altered our perception of what
a society is.
http://www.appliedsoc.org/internet
Topic 7: The Impact of the Internet

Day 10

The Impact of the Internet


There has been a huge, worldwide explosion in the use of the Internet. It is already
changing the way we work, shop, bank and also the way we live.
1. Why the Internet has grown
The PC is becoming commonplace in many homes and there is a general acceptance
that this is a way forward.
Analogue phone lines are being replaced by faster digital lines (ISDN).
Even faster high-speed digital connections will soon be delivered to households,
offering a whole day connection to the Net.
Many countries around the world are developing in communication technology via
satellite, wireless and cable to enhance worldwide Internet access.
Access to the Internet and its services has already become available through the use
of digital TVs and mobile phones.
The use of the Internet by many businesses, organisations and the general public has
led to a rapid increase in the number of sites.
Clearly all these developments are going to change the way we work, live and
experience life.
2. The Internet and the way we work
Information technology has had an impact on the way we work for quite some time,
but the Internet has now added electronic mail (email), teleworking and video conferencing
to the workplace.
Teleworking

DepEd NegOr ICT Year II

Page 34

The ability to work from home by means of a PC or laptop and since some communications
link is increasing, and there are a number of benefits to the employer:
Office running costs and overheads (rates, electricity, heating etc.) can be reduced,
which in turn may reduce the need for office space.
Travel-related problems may be reduced.
It may tempt better staff to come and work for the company.
However, employers need to be able to trust their staff and be prepared to have less
direct control over them.
Benefits for the employee include:
You can work from the comfort of your own home.
There is no time wasted travelling and no travel costs.
It enables you to work around the needs of your family and/or children, giving you
greater flexibility.
It is more convenient - you can plan the working day to suit you, which could help
reduce stress levels.
Drawbacks include:
There is less opportunity to meet up with people and share ideas therefore teamwork
is more difficult.
There may be more temptation to spend time on non-work-related activities.
Video Conferencing
Video conferencing means using computers to provide a video-link between two or more
people. Instead of just talking to someone by telephone, you are able to see them as well.
Benefits include:
Meetings can take place without leaving the office.
Travel costs and the time taken to travel can be reduced significantly.
Meetings can be called instantly worldwide with little notice.
Delegates can still attend meetings even if they are physically unable to.
Drawbacks include:
May not be as productive as a discussion around a table.
Confidential documents may need to be viewed and signed in person.
There will always be times when you need to be able to meet face to face with
another person.
3. How the Internet is changing our lifestyle
Home Shopping
Home shopping options are many and varied and changing all the time. Most major
supermarkets are now on-line, offering home delivery of goods and increasingly, the major

DepEd NegOr ICT Year II

Page 35

high street stores are also competing for on-line trading. The Internet lends itself to shops
selling goods which are easily portable, such as CDs and books.
The benefits of home shopping to the customer include:
You can avoid long queues, save time and shop from the comfort of your own home.
You do not have to travel into city centres or pay for car parking costs.
You can shop around for the best prices and shop abroad for cheaper goods.
It can offer the customer a wider range of shopping, 24 hours a day all year round.
People who are house-bound have the ability to shop and have goods delivered.
The possible drawbacks of home shopping include:
Security worries about payment by credit card over the Internet.
You do not get to see the goods before purchase which may be defective.
You may worry that the goods will never arrive!
There may be concerns over retailers collecting details about the buying habits of
customers.
Benefits to the company include:
It opens the market to customers nationally and internationally.
It enables smaller companies to compete with larger companies.
There may be a possible reduction in staffing and/or shopping outlets, thereby
reducing costs.
You can offer 24 hour shopping at minimum cost.
Home Banking
Most major banks now offer online banking and some are offering only Internet banking.
Without the overheads of running and staffing the high street branches they can offer higher
rates of interest to customers.
Services offered include:
You can pay your bills from the comfort of your home or the workplace.
It is possible to transfer money immediately to high interest accounts.
You can check balances and daily transactions on line anytime.
It is possible to set up direct debits and order stationery on line.
Benefits to the customer include:
All services are from the comfort of your home or workplace, 24 hrs. a day, 365 days
a year.
Higher interest rates are available to Internet bankers.
It is easy to shop around on line for the best interest rates and switch funds
automatically.
Concerns include:
Small branches are closing or having opening hours reduced.
Reductions in staffing at the major banks.
DepEd NegOr ICT Year II

Page 36

The move towards banking from your PC, digital TV or mobile phone will only
increase these concerns.
Some customers have worries about security because of possible credit card fraud.
4. Concerns about the Internet
The Internet and freedom of speech
No-one owns the Internet so anybody can post anything on it.
The Internet is a great source of information but it has also become the home of
political propaganda, racism, pornography and other controversial or illegal
material.
Apart from physically restricting access the only control is through some form of
filtering software.
Increasingly individuals and authorities are recommending some sort of control.
Arguments for control
To prevent illegal material being readily available, e.g. political propaganda, racism
and pornography.
To prevent young children accessing unsuitable material.
To make the Web more efficient - at present there is too much useless information.
To ensure copyright laws are maintained.
Arguments against control
The aim of the Internet is to be a free source of information.
Unsuitable material is easily available in other ways.
Control would cost money and users would have to pay.
Control would be very difficult to enforce.
Internet Crime
New technology brings with it new crimes and as a result some governments are setting up
special units to deal with Internet crime. Concerns surround:
the interception of credit card details and transactions online.
hacking into personal, private files with criminal intent.
fraudulent web sites taking credit card details from customers.
the spreading of viruses through the Internet.
Internet security
A number of steps are being taken to reassure the general public that the Internet is safe:
Data is encoded before transmission using encryption techniques which scramble
the data. The data is then decoded at the receiving end (decryption).
The use of passwords and access level restrictions.
The use of firewalls (servers that filter incoming messages to protect LANs from
viruses and hacking).
Tough penalties for offenders under the Computer Misuse Act.

DepEd NegOr ICT Year II

Page 37

5. The future
Increased speed of access combined with digital, satellite and wireless technologies will see
Internet use and the resources on offer continue to expand.
In the home digital TV offering Internet access will enable home viewers to shop, bank, play
games and send email.
At work digital phone lines will offer companies high-speed communication enabling
business to be conducted quickly, efficiently and with reduced costs. Access to video
conference links will become commonplace.
Wireless technology (WAP) will support mobile phones offering hand-held Internet access.
Pocket-sized units will link email to weather, news, travel, entertainment listings and holiday
information. As connection speeds improve, banking, shopping and video conferencing will
take place on the move, in the car on the bus, train or plane.
On the road new systems will be able to pinpoint your car on an onboard computer which
will provide access to road and traffic information. Car phones will link to the Internet
allowing drivers to check their email.
The Advantages & Disadvantages of The Internet:
The Internet or the World Wide Web is indeed a wonderful and amazing addition in
our lives. The Internet can be known as a kind of global meeting place where people from all
parts of the world can come together. It is a service available on the computer, through which
everything under the sun is now at the fingertips of anyone who has access to the Internet.
Advantages of the Internet
The Internet provides opportunities galore, and can be used for a variety of things. Some of
the things that you can do via the Internet are:
E-mail: E-mail is an online correspondence system. With e-mail you can send and
receive instant electronic messages, which works like writing letters. Your messages
are delivered instantly to people anywhere in the world, unlike traditional mail that
takes a lot of time.
Access Information: The Internet is a virtual treasure trove of information. Any kind
of information on any topic under the sun is available on the Internet. The search
engines on the Internet can help you to find data on any subject that you need.
Shopping: Along with getting information on the Internet, you can also shop online.
There are many online stores and sites that can be used to look for products as well as
buy them using your credit card. You do not need to leave your house and can do all
your shopping from the convenience of your home.
Online Chat: There are many chat rooms on the web that can be accessed to meet
new people, make new friends, as well as to stay in touch with old friends.
DepEd NegOr ICT Year II

Page 38

Downloading Software: This is one of the most happening and fun things to do via
the Internet. You can download innumerable, games, music, videos, movies, and a
host of other entertainment software from the Internet, most of which are free.

Disadvantages of the Internet


There are certain cons and dangers relating to the use of Internet that can be summarized as:
Personal Information: If you use the Internet, your personal information such as
your name, address, etc. can be accessed by other people. If you use a credit card to
shop online, then your credit card information can also be stolen which could be
akin to giving someone a blank check.
Pornography: This is a very serious issue concerning the Internet, especially when it
comes to young children. There are thousands of pornographic sites on the Internet
that can be easily found and can be a detriment to letting children use the Internet.
Spamming: This refers to sending unsolicited e-mails in bulk, which serve no
purpose and unnecessarily clog up the entire system.
If you come across any illegal activity on the Internet, such as child pornography or even
spammers, then you should report these people and their activities so that they can be
controlled and other people deterred from carrying them out. Child pornography can be
reported to:
Your Internet service provider
Local police station
Cyber Angels (program to report cybercrime)
Such illegal activities are frustrating for all Internet users, and so instead of just ignoring it,
we should make an effort to try and stop these activities so that using the Internet can become
that much safer. That said, the advantages of the Internet far outweigh the disadvantages, and
millions of people each day benefit from using the Internet for work and for pleasure.
Topic 8: Introduction to Email

Day 11

Do you ever feel like the only person who doesn't use email? You don't have to feel
left out. More than ever, email is easy to understand and use. In this Topic, you will learn
what email is, how it compares to traditional mail and what advantages it offers. You
will also see how email addresses are written. Then you will get to know the various types
of email providers and what kinds of features and tools they provide with an email account.
Getting to Know Email
You may know that email (electronic mail) is a way to send and receive messages
and contents across the internet, but do you know how individual emails are sent or what are
the costs for email or how email compares to traditional "snail" mail? To get a better idea of
what email is all about, review the infographic below and consider how you might benefit
from its use.
DepEd NegOr ICT Year II

Page 39

Snail Mail vs. Email


Address
Delivery

Louelyn M. Lajot
Manalongon, Sta. Catalina
6220 Negros Oriental
Your envelope or package
delivered by a mail carrier

Time
Contents

Costs

lowelane79@yahoo.com

is Your digital message is delivered


electronically across the internet
through various servers
Received in a home mail box or post Received online in the inbox of
office box
your email service provider
(Gmail, Yahoo, Hotmail, etc.)
Average of 2 days for letters
Instantly or within a few minutes
Average of 3-10 days for packages
if servers are busy
May include packets with documents May include attachments for
or packages with larger items
digital documents, files, images,
videos and more
The price of stamps or
Free with internet connection
Shipping for larger items

Email Advantages

Productivity Tools Email is usually packaged with a calendar, address book, instant
messaging and more for convenience and productivity.
Access to Web Services If you want to sign up for accounts like Facebook, or order
products from services like Amazon, you will need an email address, so you can be safely
identified and contacted.
Easy Mail Management Email service providers have tools that allow you to file,
label, prioritize, find, group, and filter your emails for easy management. You can even
easily control spam or junk email.
Private Your email is delivered to your own personal and private account with a
password required for accessing and viewing emails.
Communicate with Multiple People You can send an email to multiple people at once
allowing you the option of having a conversation with several people or sending out a
message to a hundred.
Access Anywhere at Anytime You dont have to be at home to get your email. You can
access it from any computer or mobile device that gets an internet connection.

About Email Addresses


To receive emails, you will need an email account and an email address. Also, if you
want to send emails to other people, you will need to obtain their email addresses. It's
important to learn how to write email addresses correctly, because if you do not enter them
DepEd NegOr ICT Year II

Page 40

exactly right, your emails will not be delivered or they might be delivered to the wrong
person.
Email addresses are always written in a standard format that includes a username, the
@ (at) symbol and the email provider's domain. The username is the name you choose to
identify yourself and the email provider is the website that hosts your email account.

About Email Providers


In the past, people often got their email from the same companies they purchased
internet access from. For instance, if AOL provided your internet connection, you'd have an
AOL email address. While this is still true for some people, today it's increasingly common
to use a free web-based email, or webmail, service. Anyone can use these services, no matter
who they get their internet access from.
Webmail Providers
Today, the top three webmail
providers are Yahoo, Microsoft's Hotmail,
and Google's Gmail. These providers are
popular because they allow you to access
your email account at anytime through their
website at yahoo.com, hotmail.com or
gmail.com.
Other Email Providers
Many people also get an email address that is hosted by their company, school, or
organization. These email addresses are usually used for professional purposes. For example,
the people who work for this website all have email addresses that end with
@gcflearnfree.org. If you are a part of an organization that provides its own email addresses,
they will likely show you how to access it.
DepEd NegOr ICT Year II

Page 41

Many hosted web domains end with a suffix other than .com. Depending on the
organization, your provider's domain might end with a suffix like .gov (for government
websites), .edu (for schools), .mil (for military) or .org (for non-profit organizations).
Email Productivity Features
In addition to email access, email providers also provide other tools and features.
These features are part of a productivity suite, which is what we call a set of applications
and tools that help you work, communicate, and keep organized. The contents of the
providers' productivity suites vary, but the major three providers all offer the following
features:

Instant messaging, or chat, which lets you have informal text-based conversations with
other users.
An online address book, to store contact information for the people you email frequently.
An online calendar to help you keep track of your tasks and schedule, and share that
schedule with others.
A public profile, if desired, that contains your name and basic contact information. Think
of this as an online version of a business card or directory listing.

In addition, each provider offers some unique features. For instance, when you sign up
for Gmail, you get access to a full range of Google services, including Google Docs, Google
Reader, Picasa Web Albums and more. Hotmail, on the other hand, offers connectivity with
Windows Live and Microsoft Office Web Apps for Word, Excel and PowerPoint.
Email Etiquette & Safety
Like any form of online communication, it's important to practice good etiquette and
safety when using email. Etiquette is a set of rules or guidelines that people use to
communicate better and aid in other social interactions. Using good email etiquette can help
you get your point across and show that you are considerate of the person that you are talking
to. You should also be aware of important safety tips that you can use to protect yourself
from things like malware or phishing.
Email Do's and Don'ts
Here are some basic Do's and Don'ts that you can follow to write better emails, no
matter who you're emailing. In some cases, it's okay to break these rules; for example, if you
email someone every day, your subject lines may not need to be that descriptive. You can use
these rules as a starting point, and then tailor each email based on the situation.
Email Do's:

DepEd NegOr ICT Year II

Page 42

Do keep emails clear and concise. Make sure that your recipient can tell what the email
is about. Avoid rambling, but provide enough detail to make the point of the email clear.
Do use a relevant subject line. The subject line lets the recipient know what to expect in
the email. Make it clear and relevant.
Do add a greeting and closing line to your email. Just like a written letter, it's nice to
add a greeting such as "Dear Amelia," and a closing line such as "Sincerely" or "Thanks"
followed by your name.
Do be aware that your tone may not be obvious in an email. Your recipients may not
be able to recognize irony and sarcasm in your emails, and this can lead to
misinterpretation or confusion. It's best to phrase things in the clearest way possible.
Do resize large photos before attaching them. Large photos take longer to download,
especially if someone is viewing them on a mobile device. If you want to send a large
photo to someone, resize it before you attach it.
Do check over your email before you send it. Before sending your email, make sure it's
free of spelling and grammar errors. Also, for more important emails, take a moment to
check the content and wording, to make sure that your message is presented the way you
want. Remember, an email generally can't be unsent!
Do check your recipients. Before you send an email, double-check the To, Cc, and Bcc
fields to make sure you're sending the email to the right people. This is especially
important when you're replying to a message, since it may automatically add unwanted
recipients.
Email Don'ts
Don't use caps lock. Writing in all caps is equivalent to shouting. Your recipient may
mistakenly think that you're angry, which can backfire (especially in a business email).
Also, emails written in all caps are harder to read.
Don't use an overly long signature. It may be tempting to create an elaborate signature
that includes your name, title, address, multiple phone numbers, a Facebook or Twitter
link, a picture, a quote, and other information. However, this can quickly turn into a tenline signature, which may make it harder for your recipients to know how you prefer to
be contacted. Instead of including all of your contact info, it's better to focus on your
most important or preferred contact info.
Don't use hard-to-read fonts or colors. Your email service may have various text
formatting options, but you should be aware that some of them may make your emails
difficult to read. In many cases, too much text formatting can also look unprofessional or
annoying.
Don't overuse Reply to All. Ask yourself whether every person in the group needs to see
your reply. If you're only intending the message for one person, use Reply. On the other
hand, if you want to keep everybody in the group informed use Reply to All.
Don't try to cover too many topics. If you find that your email is covering several
unrelated topics, consider splitting it into separate emails.
Don't forward chain emails, even if they sound interesting. Chain emails can quickly
spread throughout the world because they are forwarded to large numbers of people, who
then forward them to even more people, and so on. Many of them are hoaxes, and even
the ones that aren't may irritate your recipients.

DepEd NegOr ICT Year II

Page 43

Email Safety
It's important to protect yourself when using email. Email is not totally secure, so you
should avoid sending extremely sensitive information, such as credit card numbers,
passwords, or your Social Security Number. In addition, you may receive emails from
scammers and cybercriminals, and you'll need to know how to deal with those messages.
Here are a few things to watch out for:
Spam: Spam is another term for junk email or unwanted email advertisements.
Sometimes, these messages advertise legitimate products, but often they are actually
counterfeit goods or scams. It's best to ignore or delete these messages. Luckily, most
email services offer some protection, such as filtering messages into a spam folder so
they don't end up in your Inbox.
Phishing: Phishing is a type of scam where an email pretends to be from a bank or
another trusted source in order to trick you into handing over your personal
information, which a scammer can then use to steal money from you. It's easy for
someone to create an email that looks like it's from a specific bank or other business, and
the person can even include a logo to make the email look legitimate. If you receive an
email that sounds urgent, you should be extra wary.
Attachments: Some attachments can contain viruses and other malware. It's generally
safest not to open any attachment that you weren't expecting. If a friend sends you an
attachment, you may want to ask them if they meant to send it to you. It's also a good
idea to use antivirus software and a firewall.
Topic 9

CREATING AN EMAIL ACCOUNT

Days 12-13

Email, e-mail or electronic mail is the transmission of messages over electronic


networks like the internet. Email has a wide variety of benefits when compared to regular
mail delivered by the post office (often called "snail mail").
Remember:
For your security, store your email password in a safe place.
In creating your password, you may use some important
event so that you cant forget it.

ACTIVITY SHEET
CREATING AN EMAIL ACCOUNT
A. Creating Personal E-Mail Address
Personal electronic mail can be created into different sites who offered same services.
For practical purposes, YAHOO site is the best place to create e-mail address due to its userfriendliness and popular services. The steps are given below:
1. Open the site http://www.yahoo.com

DepEd NegOr ICT Year II

Page 44

2. Click mail. Since you dont have personal yahoo ID and password, choose sign-up to
create your own.
3. Yahoo mail registration form will appear and supply your personal information. This
includes first name, last name, gender, prepared yahoo ID and your password.
Remember: Password is sensitive and be careful in using numbers, capitalization and
others. Complete all basic information needed and click I Agree button at the bottom.
4. In case of lack of information, another form will appear saying to correct entries
highlighted in yellow. Give the needed data and information then after completion
click submit this form securely.
5. After successful registration, confirmation page will appear specifying your new
yahoo ID and password. Dont give to anyone your password for your protection.
This ID and password will be used in all your transaction in yahoo services.
B. Signing-In to Yahoo using personal E-Mail Address
1. Open the site http://www.yahoo.com
2. Click mail.
3. Enter your yahoo ID and password then click Sign-In.
4. After successful logging in the, Yahoo mail environment will appear.
5. You may open your mail by double clicking the subject of your mail. In addition, you
may send your mail by clicking compose button and others.
6. Click sign-out every time you log-off from the yahoo mail.
SELF CHECK CREATING AN EMAIL ACCOUNT
Modified True or False. Directions: Write TRUE if the statement is correct and FALSE if it
is not then change the underlined word to make the statement correct. Write your answer on a
separate sheet of paper.
1. Snail mail is a medium of interpersonal communications. Millions of people who use the
Internet have their own specific e-mail address. This has been used for faster transaction and
communication.
2. Snail mail is delivered quickly. It is fast and available 24 hours each day.
3. Email stands for electronic mail.
4. In order to access email, anyone should have an account with user ID and password.
5. Email can be done if there is an Internet access.
ANSWER KEY
1. False
Email

2. False
Email

Topic 10

THE EMAIL WINDOW

3. True
4. True

5. True

Day 14

The Email Window


Sometimes it helps to get to know a program's interface before you start using it.
When using email, you will interact with several windows, including the Inbox window, the
Email Message window and the Compose Message window. Depending on the email
DepEd NegOr ICT Year II

Page 45

provider, these windows may look and feel different, but the way they function is essentially
the same.
Below are some samples of email windows from the top email providers: Gmail,
Hotmail and Yahoo. Review the images in order to become familiar with how the various
email windows work.
Inbox Window
The Inbox is where you can view all of the incoming emails you have received. Emails are
listed with the name of the sender, the subject of the message and the date received with the
most recent at the top.

Email Message Window


When you select an email in the Inbox, it will open in the Email Message window. You can
read the message and determine how you want to respond to it with a variety of commands.

DepEd NegOr ICT Year II

Page 46

Compose Message Window


You can click the Compose Message or New command from your Inbox to create an email
message of your own. You will need to enter the recipient's email address and a subject.
You also have options for uploading digital files (photos, documents, etc.) and formatting
the text in your message.

Topic 11

SENDING EMAIL WITH SIGNATURE

Days 15-16

An email signature is a word or phrase that is added to the bottom of your outgoing
email messages. A signature can be as simple as J. Smith, for example, or as complicated as a
lengthy quote from a Shakespeare play.
This is not necessarily meant that you will include your handwritten signature but
some text you want to appear at the end of your outgoing email messages.
Just like any other mail, signature is the best
way to give details on the email sender. You may
include your complete name, your home or business
address, your telephone numbers and other important
information.
Signature

Usually, the name of the sender automatically


appears on the Inbox dialog box of a receiver. This
name is the same on the registered name when the
email account is created. Sometimes, a correct name is
not properly done during an email account registration.

DepEd NegOr ICT Year II

Page 47

Using signature at the end of every email may give complete details and facilitate your sent
email.

OPERATION SHEET
SENDING EMAIL WITH SIGNATURE
Operations Title:

Sending Emails with Signature

Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:

Include signature at the end of every email messages.


Make sure that computer is accurately working and the Internet is
properly connected.

Procedure:

The following equipment, tools and materials are needed to meet the
target purpose: 1. Personal Computer
2. Mouse
3. Keyboard
4. Internet Connection
1. Open the Internet Explorer (or available web browser).
a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs will
appear).
c. Click on the Internet Explorer. (The Internet explorer will
open).
2. Access the desired search engine by entering its URL on the
address line (e.g. yahoo.com).

Address
Line

3. Open your registered email account (The welcome window will


appear).

DepEd NegOr ICT Year II

Page 48

4. On the right side of the window, click options.

5. In the mail option, click signature.

Signature
Save

6. In the dialog box, type the desired signature to be displayed at


the end of your email.

Signature

DepEd NegOr ICT Year II

Page 49

Precautions:
Evaluation:

7. Click save button.


Procedure in creating signature depends on the web site selected.
This activity shows procedure in yahoo account and may vary with
the other type of account.
The student will be evaluated based on demonstration of skills in
opening an email account and creating signature (see checklist).
CHECKLIST
SENDING EMAIL WITH SIGNATURE

Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Create an email account.
Include signature at the end of every email messages.
Materials and equipment:
Personal Computer
Mouse
Keyboard
Internet Connection
show if evidence is
to
demonstrated
During the demonstration of skills, did the
student
Yes
No
1. created an email account?

2. attached signature at the end of email

messages?
3. encoded the desired signature format to be

appeared at the end of email?

N/A

The students demonstration was:


DepEd NegOr ICT Year II

Page 50

Satisfactory

Not Satisfactory

SELF CHECK
SENDING EMAIL WITH SIGNATURE
True or False. Directions: Write TRUE if the statement is correct, if it is NOT write
False. Write your answer on a separate sheet of paper.
1. An email signature is a handwritten signature.
2. An email signature is a word or phrase that is added to the bottom of your
outgoing email messages.
3. Email stands for electronic mail.
4. Procedure in creating email signature varies and depends on the available
web site used.
5. Email signature is the same as name that appears on the Inbox window.
ANSWER KEY
SENDING EMAIL WITH SIGNATURE
True or False
1. False
2. True
3. True
4. True
5. False
Topic 12
REPLYING AND FORWARDING MESSAGES

Days 17-18

Reply is the term used to response on the received email. Most received email is in
the form of text or attachment. Anyone can give comments on the received email by clicking
the reply button. If anyone doesnt feel to respond and needs more time before giving reply,
s/he can give the received email to the others by using the forward button. Forward is the
term used to pass the received email to the other email. You can pass or forward text, video,
images or any received email. To reply, follow these steps:
a. To reply to the sender of the email message only, press the Reply button. To reply
to the sender of an email message, and to all other recipients, select the email
message and press the Reply All button.
b. Type your reply at the top of the page as you normally would and click Send.
When you reply to an email message, the message you're replying to is normally
quoted at the bottom of your reply. If you don't want to include originals when you reply, you
can turn off this function in the Web Mail Options. To forward message, follow these steps:
a. Open the email message to be forwardedselect it in the email folder message
list, or open it a new windowthen click Forward. The Forwarding window will
appear.
b. Type the email address you want to forward the message to in the Forward To box
and then type any additional message you want to include above the forwarded
text.
DepEd NegOr ICT Year II

Page 51

c. Click Send.
Remember:
In forwarding messages, you need to select active email
account where to forward email messages.

Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:

OPERATION SHEET
REPLYING AND FORWARDING MESSAGES
Replying and forwarding messages
Reply and forward received email messages.
Make sure that there is someone who sends you an email and the
Internet is properly connected.
The following equipment, tools and materials are needed to meet the
target purpose:
1.
2.
3.
4.

Procedure:

Computer
Mouse
Keyboard
Internet Connection

1. Open the Internet Explorer (or available web browser).


a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs will
appear).
c. Click on Internet Explorer. (Internet explorer will open).
2. Access the desired search engine by entering its URL in
address line (e.g. yahoo.com).

Address
Line

Received
email

DepEd NegOr ICT Year II

3. Open your registered email account (welcome window will


appear). Click Inbox where you received your new email
message.
Page 52

4. Click your received email and you will see its content (figure
below is an example).

5.

You will see the reply and forward button at the top of
received email.

Reply
button

Forward
button

6. You can reply or forward the received email.


a. To reply, click reply button. (You will see RE letter in
subject dialog box. This means that you will reply to
the received email).

Reply
dialog box

DepEd NegOr ICT Year II

Page 53

b. To forward, click forward button. (You will see FW

letter in subject dialog box. This means that you will


forward to the received email to the other email).

Forward
dialog box

Precautions:
Evaluation:

7. Type your message and check the recipient email address.


Click send.
You should check the correct recipient email to deliver the
reply/forward message effectively.
The student will be evaluated based on demonstration of skills in
replying to an email messages and forwarding email messages (see
checklist).
CHECKLIST
REPLYING AND FORWARDING MESSAGES

Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Open the received email.
Reply the received email.
DepEd NegOr ICT Year II

Page 54

Forward the received message.


Materials and equipment:
Personal Computer
Mouse
keyboard
Internet Connection
show if evidence is
to
demonstrated
During the demonstration of skills, did the
student
1. open received email?
2. reply received email?
3. forward received email?
The students demonstration was:
Satisfactory

Yes

No

N/A

Not Satisfactory

SELF CHECK
REPLYING AND FORWARDING MESSAGES
Identification. Directions: Identify the following statements. Write your answer on a
separate sheet of paper.
1. Forward is the term used to pass the received email to the other email.
2. Reply is the term used to response or answer the received email.
3. RE in email means it will forward the received email.
____________ 4. FW in email means it will reply or respond on the received email.
5. An active email account is needed to be able to deliver the email message
to the recipient.
ANSWER KEY
REPLYING AND FORWARDING MESSAGES
True or False
1. True
2. True
3. False
4. False
5. True
Topic 13

EMAIL ATTACHMENT

Days 19-20

This is the name given to a file that is sent along with an email.
An email attachment can be any type of file, including images (photos), videos, mp3s,
documents, zipped files/folders, and more. Most email providers have a limit on the size of
the attachment that can be sent. Also, you can usually only send up to a certain amount of
attachments with each email.

DepEd NegOr ICT Year II

Page 55

Bear these file size limits in mind when sending attachments, the size of the
attachment you are sending may be acceptable by your email provider, but may be too big for
the recipient's email account.
Attaching a file to an email
To send a file (photo, document, etc.) with an email you have to attach it in a special
way to the email.
The process for attaching a file to your emails will vary depending on which email
provider you use, or which program you use to compose your emails. Generally, look for a
button or link when you are composing the email that says attach, attachments, attach file or
edit attachments.
Usually you will be presented with a browse button, click on this button, navigate to
the folder with the file in that you want to send, and then select the file.
To finish attaching the file will depend on the email provider's interface. If you are
using an email client such as Outlook then the file will be attached automatically. If you are
using a website such as Yahoo!, Gmail or Hotmail to send your attachments, then follow the
instructions on the screen.
INFORMATION SHEET
ATTACHING FILE/S
An e-mail attachment (or email attachment) is a computer file that is sent along
with an e-mail message. The file may be sent as a separate message but now it is almost
universally sent as part of the message to which it is attached.
Some mail services and software filter out potentially dangerous attachments such as
executables and scripts, although more expert users may find this limitation a nuisance.
Viruses in attachments to or the body of e-mail may be scanned for and dealt with by
anti-virus software running on the host computer, mail client software, and mail and Internet
service providers, although non-detection of a virus does not guarantee a message to be safe.

Attachment

Mail services have a limit on the size of messages which may be sent and received.
This limit may restrict the size of files to be attached. Messages of excessive size will usually

DepEd NegOr ICT Year II

Page 56

be returned to the sender as undeliverable. This usually happens to attachments with a total
size of over 30 MB.
Remember:
Paper clip symbol in email message shows that there is an
attachment attached to the message.

Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:

Procedure:

OPERATION SHEET
ATTACHING FILE/S
Attaching Files
Attach file to an email message.
Make sure that file to be attached is saved in your computer and the
Internet is properly connected.
The following equipment, tools and materials are needed to meet the
target purpose:
1. Computer
2. Mouse
3. Keyboard
4. Internet Connection
1. Open the Internet Explorer (or available web browser).
a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs
will appear).
c. Click on the Internet Explorer. (The Internet explorer
will open).
2. Access the desired search engine by entering its URL in
address line (e.g. yahoo.com).

Address

3. Open your registered email account (welcome window will


appear). Click compose button.

DepEd NegOr ICT Year II

Page 57

4. In the compose window, click attach files.

Attach
files

5.

In the attach files window, click browse to attach File 1. You


may attach up to 5 files.

6. In the dialog box, browse the file to be attached to your


email.

DepEd NegOr ICT Year II

Page 58

7. After selecting file to be attached, click attach files button.

Attach
files

8. Successful attachment will appear to your email compose


window.

Attached
files

Precautions:
Evaluation:

9. You may now proceed in creating your email then click send.
There is a limit capacity in attaching file/s so, make sure that file is
small enough and will meet the requirements of your browser.
The student will be evaluated based on demonstration of skills in
opening email account and attaching file/s (see checklist).

DepEd NegOr ICT Year II

Page 59

CHECKLIST
ATTACHING FILE/S
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Open the received email.
Attached files to an email.
Send email message.
Materials and equipment:
Personal Computer
Mouse
keyboard
Internet Connection
show if evidence is
to
demonstrated
During the demonstration of skills, did the
student
Yes
No
1.
2.
3.
4.

open the received email?


attach files in the compose window?
browse file/s to be attached to email?
successfully attach files by clicking attach
files button?
5. send an email message?
The students demonstration was:
Satisfactory

N/A

Not Satisfactory

SELF-CHECK
ATTACHING FILE/S
True or False. Directions: Write TRUE if the statement is correct, if it is NOT write
False. Write your answer on a separate sheet of paper.
1. An email attachment is a computer file which is sent along with an email message.
2. Paper clip symbols show that there is an attachment attached to the email.
3. There is no limit in attaching files.
4. In yahoo account, you can attach up to five (5) files.
5. Anyone can attach file in form of document, spreadsheet, picture or images, presentation
and others.
DepEd NegOr ICT Year II

Page 60

1.

True

Topic 14

2.

True

ANSWER KEY
ATTACHING FILE/S
3.
False
4.

True

OPENING AND SAVING EMAIL ATTACHMENTS

5.

True

Days 21-22

Downloading the attachment from a received email


To download or view the attachment will again depend on your email provider or the
program you use to retrieve your email.
WARNING: downloading attachments can be dangerous, always scan any attachments for
viruses before opening them with up-to-date anti-virus software.
If using a mail client such as Outlook then there is normally an option under the FILE
menu, such as save attachments (in outlook), select this and then choose where you want to
save the file.
If you get your email via webmail (a website such as Yahoo, Gmail or Hotmail) then the
process is usually straight forward. Look for a button or link such as save attachment,
download attachment, get attachment, or something similar.
Your browser (if using webmail) may ask you whether you want to open or save the file, to
download the file choose save/download and then navigate to the folder where you want to
store the attachment.
INFORMATION SHEET
OPENING AND SAVING EMAIL ATTACHMENTS
As we all know, an email attachment is a computer file which is sent along with an
e-mail message. The paper clip symbols show that there is an attached file to the received
email (see the figure below).

Attachment

DepEd NegOr ICT Year II

Page 61

Just like other application program, open command is used to unlock or open the file
to see and save in your computer. Other application program used ctrl+o to open file or by
clicking open command in file menu.

Meanwhile, save command is used to


store or save the file in your computer. This is a
practical way of accessing the file on next day
or other day when the need arises. This is also a
way of preserving the file for future references.

OPERATION SHEET
OPENING AND SAVING EMAIL ATTACHMENTS
Operations Title:
Opening and saving email attachment.
Purpose:
Open and save received email attachment.
Conditions or
Make sure that there is someone who sends you an email with
Situations for the
attachment and the Internet is properly connected.
Operations:
Equipment, Tools
The following equipment, tools and materials are needed to meet the
and Materials:
target purpose:
1. Computer
2. Mouse
3. Keyboard
4. Internet Connection
Procedure:
1. Open the Internet Explorer (or available web browser).
a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs
will appear).
c. Click on the Internet Explorer. (The Internet explorer
will open).
2. Access the desired search engine by entering its URL on the
address line (e.g. yahoo.com).
Address
Line

DepEd NegOr ICT Year II


Received
attachment

Page 62

3. Open your registered email account (welcome window will


appear). Click Inbox where you received your new email
message with attachment.

4. Click your received email and you will see its attachment
(figure below is an example).

Received
attachment

5.

DepEd NegOr ICT Year II

Click the attachment to download. In a dialog box, click


open or save.
a. To open the attachment, select open then click ok
button.

Page 63

b. To save the attachment, select save then click ok


button.

b.1. Select the place where the attachment to be saved.


Press save button.

Precautions:
Evaluation:

6. You now have your received email attachment.


Do not open or save suspicious attachment. This may contain viruses
or other program that may harm your personal computer.
The student will be evaluated based on demonstration of skills in
1. Opening email attachment.
2. Saving email attachment (see checklist 3.5)

DepEd NegOr ICT Year II

Page 64

CHECKLIST
OPENING AND SAVING EMAIL ATTACHMENTS
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Open the received email attachment.
Save the received email attachment.
Materials and equipment:
Personal Computer
Mouse
keyboard
Internet Connection
show if evidence is
to
demonstrated
During the demonstration of skills, did the
student
Yes
No
N/A
1. open the received email attachment?

2. save the received email attachment?

The students demonstration was:


Satisfactory
Not Satisfactory
Topic 15
PRIORITIZING AND SORTING EMAILS
Day 23
INFORMATION SHEET
PRIORITIZING AND SORTING EMAILS
When you sign in to Web Mail, you will first see the contents of your Inbox. The
Inbox is a folder where all new incoming messages are stored. When you open a folder, a list
of its contents are displayed, this is called the message list.
In the message list, email messages are listed in the order they were received, with the
most recent at the top. You can change the order by clicking one of the column titles at the
top of the message list.
For each email message, the following information is displayed: who it is from, the
subject of the email, when it was received, and its size. (This is the emails information line.)
At the top of the email list in the Inbox are the following clickable buttons: Delete,
This is spam, a pull-down menu, and Move. To use one of these functions on a particular
email message, select the email message by checking the box to the left of its information
DepEd NegOr ICT Year II

Page 65

line in the display list, then click the intended function button. You can select all the
messages on the page by checking the box at the very top of the pile of checkboxes.

Deletesends the selected messages to the Trash folder.


This is spamopens a page where you can report the checked messages as spam,
and block the addresses they were sent from.
Movechooses a folder and click the Move button to send all the selected messages
to that folder.

On the other hand, you can sort or arrange your received email by clicking the from,
subject, date and size button at the top of your email.
Remember:

You can select all the messages in a folder by checking


the box above all the other boxes next to the column
titles.

Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:

Procedure:

OPERATION SHEET
PRIORITIZING AND SORTING EMAILS
Prioritizing and sorting emails
Prioritize and sort received emails
Make sure that there is someone who sends you an email and the
Internet is properly connected.
The following equipment, tools and materials are needed to meet the
target purpose:
1. Computer
2. Mouse
3. Keyboard
4. Internet Connection
1. Open the Internet Explorer (or available web browser).
a. Click the Start button. (Start menu will appear).
b. Choose All Programs. (Different available programs
will appear).
c. Click on the Internet Explorer. (The Internet explorer
will open).
2. Access the desired search engine by entering its URL on the
address line (e.g. yahoo.com).

Address
Line

DepEd NegOr ICT Year II

Page 66

3. Open your registered email account (welcome window will


appear). Click Inbox to show your email messages.

Precautions:
Evaluation:

4. Sort your email by clicking the following found at the top of


the received email:
a. Click FROM to arrange the email alphabetically.
b. Click SUBJECT to arrange the email subject alphabetically.
c. Click DATE to arrange to received email according to date
received.
d. Click SIZE to arrange received email according to capacity.
5. Priority set or delete email message as necessary:
a. Select the email to be deleted by checking the square button
before message.
b. After selecting, click delete button.
Point out carefully where you want to sort your received email as
you may accidentally click other button in the window.
The student will be evaluated based on demonstration of skills in
sorting and deleting (if necessary) an email (see checklist).
CHECKLIST
PRIORITIZING AND SORTING EMAILS

Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Send and Organize Messages
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Sort emails.

DepEd NegOr ICT Year II

Page 67

Materials and equipment:


Personal Computer
Mouse
keyboard
Internet Connection
show if evidence is
to
demonstrated
During the demonstration of skills, did the
student
1. sort email according to sender alphabetically?
2. sort email according to subject alphabetically?
3. sort email according to date received?
4. sort email according to capacity?
The students demonstration was:
Satisfactory

Yes

No

N/A

Not Satisfactory

SELF CHECK
PRIORITIZING AND SORTING EMAILS
Identification. Directions: Identify the following statements. Write your answer on a
separate sheet of paper.
1. This is the process of arranging the received email alphabetically in sender, date, subject
and size format.
2. This sends the selected messages to the trash folder.
3. This shift or go the selected messages to the selected folder or location.
4. A folder where all new incoming messages are stored.
5. A page where you can report the checked messages as spam, and block the addresses they
were sent from.
ANSWER KEY
PRIORITIZING AND SORTING EMAILS
1.
Sorting
2.
Delete
3.
Move
4.
Inbox
5.
Spam

Topic 16

SAVING E-MAIL ADDRESS TO AN ADDRESS BOOKDay 24

Email, e-mail or electronic mail is the transmission of messages over electronic


networks like the Internet. Email brings a lot of benefits when compared to a regular mail
delivered by the post office (often called "snail mail").
An address book stores email addresses for people you correspond with. You can
have multiple address books, which will allow you to group similar entries together.
These address books are folders that contain contacts and groups. Entries in these
address books are best entered by opening the address book folder (see the Figure below).
DepEd NegOr ICT Year II

Page 68

As you notice, complete name and other information are entered in this folder as an
address book.
OPERATION SHEET
SAVING E-MAIL ADDRESS TO AN ADDRESS BOOK
Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:

Procedure:

Address

Saving email address to an address book


Store email address to address book effectively
Make sure that you have email address to save and the Internet
connection is properly working.
The following equipment, tools and materials are needed to meet the
target purpose:
1. Personal Computer
2. Mouse
3. Keyboard
4. Internet Connection
Open the Internet Explorer (or available web browser).
Click the Start button. (Start menu will appear).
Choose All Programs. (Different available programs will appear).
Click on the Internet Explorer. (The Internet explorer will open).
Access the desired search engine by entering its URL on the address
line (e.g. yahoo.com).

Line

Contacts

DepEd NegOr ICT Year II

Page 69

Open your registered email account (welcome window will appear).

Click contacts folder to add contact in address book. Click add


contact.

In add contact folder, type the appropriate information (In this


example, juandelacruz@yahoo.com was used for Juan Bautista Dela
Cruz).

Complete the desired information and click save button to store


email in your address book.

DepEd NegOr ICT Year II


Save

Page 70

Click done button to accept the new contact in your address book.

When you access again the contact folder, you will see the saved
contact information in this address book.

Precautions:
Evaluation:

Save only the accurate and active email account to your address
book. This will effectively manage your contact lists.
The student will be evaluated based on demonstration of skills in
saving email address to address book (see checklist 4.1). .
CHECKLIST
SAVING E-MAIL ADDRESS TO AN ADDRESS BOOK

Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Creating Address Book
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
DepEd NegOr ICT Year II

Page 71

Save email address to address book


Materials and equipment:
Computer
Mouse
Keyboard

Internet Connection
to show if evidence is

demonstrated

During the demonstration of skills, did the


student
Yes
No
add email address by clicking contact folder?

successfully save email address by completing the


necessary information in contact address window?

The students demonstration was:


Satisfactory
Not Satisfactory

Topic 17

N/A

Day 25
SAVING CONTACT INFORMATION FROM RECEIVED EMAILS
INFORMATION SHEET
SAVING CONTACT INFORMATION FROM RECEIVED EMAILS

Storing contact information from your received emails makes your contacts organized and
easy to locate. But what is save command? Save command is used to store or save file,
contact, etc. into your computer and retrieve it when you need it.
On the other hand, there are several ways to save documents in any application program. You
can save the active file you are working on, whether it is new or existed previously, all open
documents at the same time and a copy of the active document with a different name or in a
different location.
You can save contact information into your address book by using your previous Operations.
These address books are folders that contain contacts and groups. Entries in these address
books are best entered by opening the address book folder (see the Figure below).

DepEd NegOr ICT Year II

Page 72

Just like your previous operations, you may also save contact list from your received
email (please do the Operations sheet).
OPERATION SHEET 4.2
SAVING CONTACT INFORMATION FROM RECEIVED EMAILS
Operations Title:
Purpose:
Conditions or
Situations for the
Operations:
Equipment, Tools
and Materials:

Procedure:

Saving contact information from received email


Store contact information to address book from received email
effectively
Make sure that you have received email to save its contact
information to address book and the Internet connection is properly
working.
The following equipment, tools and materials are needed to meet the
target purpose:
Computer
Mouse
keyboard
Internet Connection
Open the Internet Explorer (or available web browser).
Click the Start button. (Start menu will appear).
Choose All Programs. (Different available programs will appear).
Click on the Internet Explorer. (The Internet explorer will open).

Access the desired search engine by entering its URL on the address
line (e.g. yahoo.com).
Address
Line

Open your registered email account (welcome window will appear).

DepEd NegOr ICT Year II

Page 73

Open your inbox (the content of your inbox will appear).

Open your email where you want to save its contact list. Click save
contact information to address book.

Save to
contact list

In add to address book window, you will observe that the contact list
email and the sender name automatically appear in the window.
Click add to address book button to confirm.

DepEd NegOr ICT Year II

Page 74

Precautions:
Evaluation:

Click done button to accept the new contact in your address book.
Double check all information before clicking the done button.
The student will be evaluated based on demonstration of skills in
saving contact information from received email (see checklist).

CHECKLIST
SAVING CONTACT INFORMATION FROM RECEIVED EMAILS
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Creating Address Book
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Store contact information to address book from received email effectively
Materials and equipment:
Computer
Mouse
Keyboard
Internet Connection
to show if evidence is

demonstrated
During the demonstration of skills, did the
student
Yes
No
N/A
open the received email?

successfully save email address from received email?

The students demonstration was:


Satisfactory
Not Satisfactory
Topic 18

Day 26
INFORMATION SHEET
CREATING DISTRIBUTION LIST

DepEd NegOr ICT Year II

Page 75

A distribution list allows email to be sent to multiple recipients at the same time.
You can send an email to members of the list. Lists are used like an email address so you can
send an email to many recipients who have valid email addresses. In using the distribution
list, follow the following steps:
Open your active email account
Click compose button (compose window will appear)

Insert
address

Click insert address to apply distribution list (the figure below will appear).
Check the multiple recipients you want to send your message.

Checked contact address will appear to the window (see figure below).

You may now start typing your messages to send multiple recipients. Click send.
Sending email messages from the distribution list save time and effort in
communication; however, one message sent to one person will be the same to the other
person who received the same message.
DepEd NegOr ICT Year II

Page 76

Remember:
All checked contact address will appear to the recipient
send dialog box so be careful on selecting address as they
will receive your send email.

ACTIVITY SHEET
CREATING DISTRIBUTION LIST
Create an email to be sent to multiple recipients at the same time. The steps are given below:
Open your active email account.
Click compose button (compose window will appear).
Click insert address to apply distribution list. Check the multiple recipients you
want to send your message.
Checked contact address will appear to the recipient dialog box.
Type your messages to send multiple recipients.
Click send.
CHECKLIST
CREATING DISTRIBUTION LIST
Students Name:
Assessors Name:
Unit of Competency:
Use E-Mail and Search the Web
Competency Standards:
Learning Outcome:
Creating Address Book
Date of assessment:
Time of assessment:
Instructions for demonstration:
Given the necessary materials the student must be able to:
Create distribution list
Materials and equipment:
Computer
Mouse
Keyboard
Internet Connection
to show if evidence is

demonstrated
During the demonstration of skills, did the student
Yes
No
N/A
1. click the compose button?

2. insert multiple email address in recipient line?

3. send the email message?

The students demonstration was:


Satisfactory
Not Satisfactory
SELF CHECK
CREATING DISTRIBUTION LIST
DepEd NegOr ICT Year II

Page 77

Synchronization. Directions: Arrange the following procedure on applying distribution list


in chronological order. Write the corresponding number on a separate sheet of paper.
1. Click compose button.
2. Open your active email account.
3. Click insert address to apply distribution list.
4. Check the box for the multiple recipients you want to send your message.
5. Type your message then press send.

1.

Topic 19

ANSWER KEY
CREATING DISTRIBUTION LIST
2
3.
3
4.
4

2.

Chat & Instant Messaging

5.

Day 27

Chat and Instant Messaging


What if you could send someone a short email and get a response almost instantly?
That's basically what chat and Instant Messaging (IM) are: short messages that are sent and
read in real time, allowing you to converse much more easily and quickly than with email.
Chat and IM are generally used when both (or all) people are online, so your
message can be read right after you send it. With email, your message won't be seen until the
recipient checks their email. That means chat and IM are better for quick messages and
conversations.
If someone isn't online, you may need to send your message by email or some other
method (although some programs let you send offline messages that the person will receive
as soon as they log in).
Chat vs. IM
The terms chat and IM are sometimes used interchangeably. However, they can have
slightly different meanings:
Chat often occurs in a virtual chat room, which can include
many different people who may or may not know each other.
Many chat rooms focus on a particular topic or interest.
IM usually includes a list of your contacts, called a Buddy List
or Friend List, which allows you to see who is online. IM is
especially suited for one-on-one communication, but it's
possible to send messages to multiple people at once. IM is
technically a kind of chat, and some IM services use the term
'chat' instead.
Pros & Cons
Will chat or IM work for your needs? Review some of the pros and cons to help you decide.
DepEd NegOr ICT Year II

Page 78

Pros:
It's instantaneous; you don't need to wait for the other person to check their email.
It's great for quick messages, questions, or notifications.
Compared to email, it's easier to carry on a conversation (or even multiple
conversations).
You can stay logged in while you're doing other things on your computer, which
allows your friends to see that you're available to talk.
Cons:
If someone is not online, you may have to contact them some other way.
It's not as good as email for lengthy or complicated messages.
It's not always instantaneous: If someone is busy or has just stepped away from their
computer, it may take a while for them to respond, which can be confusing or
frustrating.
Since people may type quickly or use abbreviations, messages could be hard to
understand. Also, as with email, it's possible to misinterpret someone's tone.
You may not be able to chat with friends who use a different service, although there
are some exceptions: For example, Yahoo! Messenger and Windows Live Messenger
are able to communicate with each other.
Where to Find Chat and IM Services
There are numerous chat and IM programs that you can
download, including Yahoo!Messenger, Windows Live Messenger,
and Skype (all three of these can also do voice and video chat). In
addition, there are many browser-based services that don't require
downloading. For example, Facebook has a built-in chat feature, and
Gmail allows you to chat with your contacts whenever you're logged
in to your Gmail account.
If you have a smartphone or other mobile device, it's possible to use chat or IM
when you're away from your computer. Depending on which service you use, you'll either
need to download an app or use your device's browser to navigate to a specific chat site.
Popular mobile services include Google Talk, Meebo, and eBuddy.
Topic 20

Social Groups or Networking Sites

Day 28

Social Posts, Status Updates and Tweets


Imagine that you're at a party. You might be talking to one person, or a small group of
people, but other people can hear what you're saying and can join the conversation if they
want to. This is basically how social networking sites work. Since conversations are more
open and public, many people find them to be a richer social experience than simply
emailing or instant messaging their friends.
DepEd NegOr ICT Year II

Page 79

There are many different social networking websites, but here are some of the most
popular ones:
Facebook is the most popular social networking site in the world. Chances are,
many of your friends are already on it. Many people use it to stay in touch with
friends and family or to connect with people with similar interests.
Twitter allows you to post short messages (140 characters or fewer). Depending
on your settings, these messages can be viewable by anyone in the world, or only
by your "followers." Twitter is a great tool for staying up-to-date with current
events and discovering new things that relate to your interests.
LinkedIn focuses more on career networking. People use it to gain new business
contacts, apply for jobs, and discuss topics related to their job fields.
Meetup takes a different approach: You can join groups based on your interests,
and those groups actually have meetings (in person). You can also communicate
online with other members and create a profile, just like other social networking
sites.
Communicating in a Social Network
In order to start communicating on a social networking site, you'll first need to create
an account and start finding your friends or contacts who already use the site. Then, you
can start posting random thoughts, questions, pictures, links, videos, or anything else
you'd like to share. These are called social posts because they are viewable by other people,
unlike direct messages, which are private. Your posts will appear on your activity stream,
which shows all of your recent activities, and they'll also be sent out to your friends, so they
can see what you're up to.
There are other terms that can be used to refer to social posts. One common term is
status updates. You can use status updates to let your friends know what you're up to or to
say what's on your mind. Also, some social networking sites have unique names for their
social posts. For instance, on Twitter, a social post is called a tweet.
(For tips on communicating in social networks, check out GCFs lesson on Smart
Social Networking and Communication Tips from the Internet Safety tutorial.)
Pros and Cons
Will social posts work for your needs? Review some of the pros and cons to help you decide.
Pros:
You can communicate with lots of people at the same time.
It's easy to post your thoughts, pictures, links, and more.
It provides a richer social experience than email or instant messaging.
DepEd NegOr ICT Year II

Page 80

You can stay in touch with people who live far away or who you don't see often.
Cons:
If you have friends who use a different social networking site (or don't use any at
all), they won't see your social posts.
You can accidentally post sensitive information that will be seen by many different
people.
Things that you post may be permanent, so you have to be careful not to post things
that could harm your reputation in the future.
Some sites have numerous privacy options that you'll need to set, which may be a bit
time consuming or confusing.
Some people find social networking websites to be addictive, and it can be tempting
to use the websites as a replacement for "real-life" communication.
Where to Find Social Posts
There are many websites that include social posting features, including:
Facebook
Twitter
Linkedin
Meetup
YouTube

LIKES, COMMENTS AND SHARING


One of the great things about the internet today is that anybody can be a part of the
conversation. Instead of just reading web pages, you can engage with them and share things
you find with your friends and connections. Whether you're reading a news article, watching
a YouTube video, or shopping for a great deal, there's a good chance you'll be able to add a
comment or use a social plugin to post it to your social networks.
Giving Feedback with Social Plugins
If you're viewing a web page, you may notice that there are buttons with the
Facebook or Twitter logos (the Facebook buttons may say "Like" or "Recommend.")
These are called social plugins, and they're designed to let you easily give feedback on a web
page, which will then be posted on your Facebook or Twitter profile. To use these social
plugins, you'll need to already have a Facebook or Twitter account.
When you Like, Recommend, or Tweet a web page, a couple of things happen. The
link (and an optional comment) is posted on your profile, and the number next to the button
will increase by one. When somebody views the web page, they'll be able to see how many
people have clicked the button, which is a good indication of how popular a web page is.
Although the Facebook and Twitter buttons tend to be the most common social
plugins, there are many others that you can use. There is often a "Share" button that you can
DepEd NegOr ICT Year II

Page 81

click to see more options. Depending on which website you're viewing, you may be able to
share content in the following ways:
Reddit, Digg, Delicious and StumbleUpon allow you to post and "vote" for
websites you like, which is similar to Liking or Recommending a page on
Facebook. You can also use these sites to find interesting or relevant sites that
other people have found.
Some sites have a +1 button, which is Google's version of the Like button.
You can post the link on your MySpace or LinkedIn stream.
You can email an article or link to someone.
Adding Comments
People use comments to give feedback, ask questions, or just to continue the
conversation. Comments sections often appear at the bottom of the page or article, but
sometimes there will be a link to go to the comments section. Not all web pages have
comments, but they're very common on blogs, news sites, video sites like YouTube, and
image hosting sites like Flickr. You may be required to register before you can post
comments on a website.
When viewing or posting comments, you should be aware that some people
intentionally try to start arguments (often called flame wars) by posting outrageous or
offensive comments. These people are known as trolls or cyber-bullies. While it may be
tempting to respond to these comments, it's usually best to ignore them.
(For more tips on communicating safely, check the GCF lessons Smart Social Networking
and Communication Tips and Cyber-Harassment, Stalking and Addiction from the Internet
Safety tutorial.)
In addition to comments, some websites allow you to rate content or products, either
by giving it one to five stars or by Liking/Disliking it (often shown as Thumbs up/Thumbs
down icons).
Pros and Cons
Wondering if you should start adding comments and using social plugins? Review
some of the pros and cons to help you decide.
Pros:
Interacting with the things you see on the web provides a better online experience

than just reading web pages.


You can easily provide feedback on a page -- telling the author what you think, or

adding information that may be useful to other people.


When you find something that you like, you can share it with your friends, whether

it's a product, article, video, or other website.


Cons:
Trolls and cyber-bullies may add negative or offensive comments.
DepEd NegOr ICT Year II

Page 82

Things that you post may be permanent, so you have to be careful not to post things
that could harm your reputation in the future.
With social plugins, it's possible for companies to track your browsing to collect data
about your preferences.

Topic 21

Downloading/Uploading Files

Day 29

Downloading Files
Your browser can display many different types of documents, media, and other files.
But there are times when you'll want to access a file outside your browser. Downloading
enables you to do this by putting the file on your computer in a place where you can access it.
For example, suppose you needed to complete and print a form that you found online.
You could download it to your desktop, then open it with the appropriate program (such as
Microsoft Word) to edit it.
How to Download a File
If you click on a link to a file, it may download automatically, but sometimes it just
opens within your browser instead of downloading. To prevent it from opening in the
browser, you can right-click the link and select Save Target As... (different browsers may use
slightly different wording). You'll be able to choose the folder where the file is saved.
Since the process of downloading a file varies from site to site, it may require some
trial and error.
Downloading a file
For various reasons, many sites do not allow you to download content. For example,
YouTube does not directly offer a way to download its videos. You need a software called
YouTube downloader to download YouTube videos. There are lots of YouTube downloaders
for free.
Saving Images
Sometimes you might want to save an image to your computer. To do this, right-click
the image and select Save Picture As....
Some sites do not allow images to be saved to your computer.

DepEd NegOr ICT Year II

Page 83

Upload
While downloading is receiving a file from another computer, uploading is the exact
opposite. It is sending a file from your computer to another system. Pretty straight forward. It
is possible to upload and download at the same time, but it may cause slower transfer speeds,
especially if you have a low bandwidth connection. Because most files are located on
Internet servers, people generally do a lot more downloading than uploading.
Note: Uploading files depends on the type of content and site.

DEEPEN

Days 30 34

Guide the students and let them perform the following suggested activities:
Download Skype or Yahoo Messenger (YM)
Chat or IM using Skype or Yahoo Messenger (YM)
Create Facebook account or Twitter account
Upload/Download the following files:
o Documents
o Pictures
o Music
o Videos

TRANSFER

Days 35 40

Suggested Activities:
Using the created email addresses, create a Facebook account promoting a product or
service in the locality. Select appropriate contents from the World Wide Web to be
downloaded and to be used to enhance the FB account. Upload documents, pictures,
music and videos to the FB account. Original contents can also be used in the FB
page.
Exhibit/Present to class using LCD projector the created FB account. Students will be
given the chance to defend and explain the contents of their FB page. Critiquing will
DepEd NegOr ICT Year II

Page 84

be done based on: quality, appropriateness, objectivity, relevance, social and ethical
responsibility, etc.
Take a picture or video of their presentation and upload in Facebook or YouTube.

- End -

Resources (Website,software, etc)


1. ICT practitioners
2. Internet access
3. Computer laboratory
4. Interactive video
Materials/ Equipment Needed:
1. Desktop with printer
2. Laptop, LCD
3. Textbooks and other web references
4. Internet facilities
REFERENCES:
DepEd NegOr ICT Year II

Page 85

http://library.thinkquest.org/C0124364/impact_of_the_internet.htm
http://netforbeginners.about.com/od/internet101/Internet_101_the_Fundamentals_Every_Inte
rnet_User_Should_Know.htm
http://windows.microsoft.com/en-US/windows-vista/What-you-need-to-set-up-a-homenetwork
http://www.appliedsoc.org/internet
http://www.gcflearnfree.org/
http://www.mediaawareness.ca/english/resources/special_initiatives/wa_resources/wa_teachers/tipsheets/searc
h_internet_effectively.cfm
http://www.pondered.org/the_internet.html
http://www.techterms.com/definition/upload
TESDA Activity Sheets

DepEd NegOr ICT Year II

Page 86

Potrebbero piacerti anche