E Tech Handouts 2024
E Tech Handouts 2024
E Tech Handouts 2024
First Quarter
Goal: You will produce a 5- minute news broadcast. In the process of planning
the segments, you will study news broadcasts; learn how to create a
script for your audio and visuals and utilize production and film techniques
such as setting, presentation, props, camera angles, and editing.
Situation: Most teenagers spend their time online. It is vital to consider what
information you share because the Internet is a public place. You are
tasked to research news and events related to cybercrime. Using your
cellular phone or any video-recording device, report it as if you were a
newscaster. Present a 5-7 minutes video recording. The output will show
several cybercrime and Internet threats include malwares, spam, and
phishing, ways to stay safe online and the essentiality of knowing and
applying them.
Product/
Performance: You need to create a cyber-news video report
Evidence clearly
presented. Evidence
Thorough, perhaps not quite Evidence, Lacks key
Knowledgeable, clearly separated assumptions, observations.
interesting, from and interpretation Evidence
Content logical. assumptions and difficult to unclear. Appears
Assumptions and interpretation of untangle from largely opinion-
interpretations evidence, but one another. based.
clear, and clearly story is logical.
identified.
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 3
Speakers spoke
Audience could Audience could Audience could to the screen or
see & hear see & hear mostly see & mostly to one
speakers clearly. speakers clearly, hear speakers. person in the
Style & Delivery Effective pauses Most pauses & Speakers show audience. Poorly
and verbal verbal intonation some hesitation timed. Appears
intonation. were effective. or uncertainty. to have not
practiced.
Conclusions
clearly stated. Conclusions Summary shown
Summary stated. Summary but poorly
Summary non-
integrated main perhaps not quite explained by
existent or very
Summary points and fully supported speaker.
abrupt. Lack of
brought the by evidence Audience has to
synthesis.
presentation to a shown, but main summarize for
logical & effective points clear. themselves.
closure.
Total
60 Points
.
As the saying goes, “Love makes the world go around.” But before you start your
quest for romance, consider this: the web has been spinning the world for quite some time
now. Just like in our warm-up activity, the Internet has likely played a central role in your
life. In this lesson, we'll explore how Information and Communication Technologies have
revolutionized our lives in such a short span of time.
Empowerment Technology helps us use tools like phones, computers, and other
devices to find, save, share information, and communicate. It's important because it makes
our daily lives easier and supports our country’s modernization. There are three main
reasons why Empowerment Technology is important: it helps with communication,
simplifies our lives, and contributes to national progress.
First, we have to define what ICT means. It stands for Information and
Communication Technology. It is the collection or set of tools which are used to
communicate, create, distribute, store and process information. Some of the technologies,
specifically telecommunications techniques involves in this set include computers,
internet, broad-casting, telephony and other technologies which can be used to handle
communication of information.
Many people consider it the same as with Information Technology or IT, but ICT is
on a bigger scope. It touches not only the principles of technology but science and
engineering as well with the aim to transmit information with men and machines.
Computers and the internet have been crucial in the global growth of Information
and Communication Technology (ICT). Today, computers are used in many ways,
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 4
including in different industries and sectors. They help implement ICT in various fields,
such as education, healthcare, business, and entertainment. This widespread use has
transformed how we work, learn, and connect with each other.
One of the main goals of ICT is to create a unified and efficient way to
communicate. This means having tools and systems that work well together and
streamline communication. In terms of economics, ICT has been very beneficial for
companies. By using modern communication technologies, businesses can save a lot of
time and money. For example, efficient email systems, video conferencing, and
collaborative tools help companies operate more smoothly and reduce costs associated
with traditional communication methods.
Similarly, ICT helps us save money. For example, sending a text message (SMS)
used to cost around a peso each time. With the internet, however, we can send many
messages through apps like WhatsApp or Facebook Messenger, often at a much lower
cost or even for free. This reduction in cost is due to the efficiency and affordability of
internet-based communication compared to traditional methods.
With computers, smartphones, and the internet, sharing information has become
much faster and easier. Instead of relying only on television or radio for news and updates,
we now have many online platforms where we can access this information. We are no
longer restricted to specific times or places to get updates; we can check news and
information anytime and anywhere thanks to the convenience of modern technology.
The easy exchange of information has significant effects on the Philippines. One
major benefit is that it helps the country stay up-to-date with global developments.
Information that other countries use for their governments and citizens is now also
accessible to people in the Philippines. This means that technology and knowledge are
more within reach for Filipinos thanks to ICT.
However, there are still some challenges. Despite the increased access to
information, the Philippines sometimes lags behind in fully utilizing advanced technology
compared to first-world countries. This is often due to differences in the availability of high-
end resources and infrastructure. While ICT has made significant strides, there is still a
gap in how effectively these technologies are used compared to more developed nations.
Source: https://dict.gov.ph/ph-internet-speed-rankings-continue-to-climb-upward-in-may-2021/
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 5
Based on the data from the International Telecommunication Union (ITU), ICT
access in the country is much more advanced in mobile cellular phones than in fixed
telephones and the Internet.
Fixed telephone line subscriptions actually declined from a high of 4.51 per 100
persons in 2008 to 3.09 per 100 persons in 2014. Meanwhile, the number of Internet
users jumped by 387.6% from an average of 5.13 users per 100 persons in 2000-2009
to 25 per 100 persons in 2010.
In 2014, the number of Internet users increased by 7.3% to 39.7 per 100 persons
from 37 per 100 persons in 2013.
Several international companies refer to the Philippines as the “ICT hub of Asia”
because of its growing prominence in the field of Information and Communication
Technology. This reputation is based on several factors:
These factors combined have contributed to the Philippines being recognized as a major
hub for ICT in Asia, where technology and digital services thrive.
A part of the Manila metropolitan area that’s generally known as the financial
center of Manila, ended up on top- Makati City.
Makati City and Pasig had 258 selfie-takers per 100,000 people according to
TIME’s analysis.
1. Makati City
2. New York City
3. Miami
4. Anaheim and Santa Ana, Calif.
5. Petaling Jaya, Malaysia
6. Tel Aviv, Israel
7. Manchester, England
8. Milan, Italy
9. Cebu City, Phil.
10. George Town, Malaysia
Technology has definitely changed the way we lived and enjoy life for many
years already. ICT as part of the general idea of technology played a significant role not
only to first word countries but also to developing countries like the Philippines. This only
shows that investment in devices related to ICT like smartphones, desktop computers
and laptops have lots of benefits of offer.
FEATURES OF WEB
“The internet has been vital tool to our modern lives that is why it is also
important to make the best of the internet.”
Tim Berners-Lee, a British scientist at CERN, invented the World Wide Web
(WWW) in 1989. The web was originally conceived and developed to meet the demand
for automatic information-sharing between scientists in universities and institutes around
the world.
Web 1.0
Web 1.0 refers to the first stage in the World Wide Web, which was entirely made
up of web pages connected by hyperlinks. Although the exact definition of Web 1.0 is a
source of debate, it is generally believed to refer to the web when it was a set of static
websites that were not yet providing interactive content.
The World Wide Web was invented, most pages were static.
Examples:
www.jekyllrb.com
www.middlemanapp.com
www.gitbook.com
Web 2.0
Web 2.0 is the name used to describe the second generation of the World Wide
Web, where it moved static HTML pages to a more interactive and dynamic web
experience. Web 2.0 is focused on the ability for people to collaborate and share
information online via social media, blogging and Web-based communities. Most
websites that we visit today are Web 2.0.
Dynamic – the user is able to see the website differently than others.
Allows users to interact with the page and use web browsers instead of just using
their OS. Browsers can be used as user interface, application software and file storage.
Examples:
Social networking sites
Blogs
Wikis
Video sharing sited
Hosted services
Web applications
3. User Participation – the owner of the website is not only one who is able to put
content. Others are able to place a content of their own by means of comments,
reviews, and evaluation. Some websites allow readers to comment on the article,
participate in a poll, or review a specific product. (e.g., Amazon.com, online stores)
4. Long Tail – services that are offered on demand rather than on a one-time
purchase. In certain cases, time-based pricing is better than file size-based pricing or
vice versa. This is synonymous to subscribing to a data plan that charges for the
amount of time spent in the internet, or a data plan that charges for the amount of
bandwidth used by user.
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 8
5. Software as a Service – users will subscribe to a software only when needed rather
than purchasing them. This is a cheaper option if the user do not always need to use
a software. For instance, Google Docs is a free web-based application that allows
user to create and edit word processing and spreadsheet documents online. When
user need a software, like word processor, the user can purchase it for a one-time
huge amount and install it in their computer and it is forever. Software as a service
allows you to “rent” software for a minimal fee.
“The Semantic Web is an extension of the current web in which information is given
well-defined meaning, better enabling computers and people to work in cooperation."
- May 2001 Scientific American article "The Semantic Web" (Berners-Lee et al.)
Semantic Web – is a movement led by the World Wide Web Consortium (W3C).
– The term was coined by the inventor of the World Wide Web,
Tim Berners-Lee.
– One of the components of Web 3.0.
According to the W3C, “The Semantic Web provides a common framework that
allows data to be shared and reused across application, enterprise, and community
boundaries.”
The aim of Web 3.0 is to have machines (or servers) understand the user’s
preferences to be able to deliver web content specifically targeting the target.
2. Security – the user’s security is also in question since the machine is saving his or her
preferences.
3. Vastness – The World Wide Web already contains billions of web pages.
4. Vagueness – Certain words are imprecise. The words “old” and “small” would depend
on the user.
5. Logic – Since machines use logic, there are certain limitations for a computer to be
able to predict what the user is referring to at a given time.
TRENDS IN ICT
1. CONVERGENCE
2. SOCIAL MEDIA
Rather than define the term using a bunch of boring jargon that would probably only
complicate things further, perhaps the best way to get a clearer understanding of it is to
break it down into simpler terms. To start, let's look at each word individually.
*The "social" part: refers to interacting with other people by sharing information with
them and receiving information from them.
*The "media" part: refers to an instrument of communication, like the internet (while
TV, radio, and newspapers are examples of more traditional forms of media).
From these two separate terms, we can pull a basic definition together:
Social media are web-based communication tools that enable people to interact with
each other by both sharing and consuming information. Social Media also is a website,
application, or online channel that enables web users to create, co-create, discuss,
modify and exchange user-generated content.
Internet users spend more time in social media sites that in any other type
of site. -Nielsen (a global information and measurement company)
A. Social Networks – these are sites that allow users to connect with other people
with the same interests or background. Once a user creates an account, the user can
set up a profile, add people, create groups and share content.
Examples: Facebook and Google+
B. Bookmarking Sites – These are sites that allow users to store and manage links
to various websites and resources. Most of these sites allow user to create a tag that
allows user and others to easily search or share them.
Examples: StumbleUpon and Pinterest
C. Social News – These are sites that allow users to post their own news items or
links to other news sources. The users can also comment on the post and comments
may also be ranked. They are also capable of voting on these news articles of the
websites. Those who get the most amount of votes are shown most prominently.
Examples: Reddit and Digg
D. Media Sharing – These are sites that allow users to upload and share media
content like images, music, and video. Most of these sites have additional social
features like liking, commenting, and having user profiles.
Examples: Flicker, Youtube and Instagram
E. Microblogging – These are sites that focus on short updates from the user.
Those subscribed to the user will be able to receive these updates.
Examples: Twitter and Plurk
F. Blogs and Forums – These websites allow users to post their content. Other
users are able to comment on the said topic. There are several free blogging platforms
like Blogger, Wordpress, and Tumblr. On the other hand, forums are typically part of a
certain website or web service.
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 10
3. MOBILE TECHNOLOGIES
Nowadays, the global network type includes GSM (Global System for Mobile
Communication), CDMA , 3G, 4G, 5G. Ever since the inception of mobile phone, network
type has gone through the first generation analog cellular networks (1G), the second
generation GSM, TDMA digital mobile phones (2G), the 2.5 generation mobile
communication technology CDMA, and the third generation mobile communication
technology 3G. 4G is wildly used, 5G is on the way quickly.
The popularity of smartphones and tablets has taken a major rise over the years. This
is largely because of the device’s capability to do tasks that were originally found in
personal computer. Today, the latest mobile devices use 4G Networking (LTE), which is
currently the fastest mobile networks.
GSM stands for Global System for Mobile Communication, is a standard developed by
the European Telecommunications Standards Institute (ETSI) to describe the protocols
for second-generation (2G) digital cellular networks used by mobile phones, first
deployed in Finland in July 1991. Is is developed based on cellular system and it has
several frequency bands, including GSM900MHz, GSM1800MHz, and GSM1900MHz,
etc.
As of 2014, it has become the de facto global standard for mobile communications, and
it is widely used by over 200 countries and territories and over 1 billion people all over
the world.
3G is short for 3GPP, with its full name is the 3rd Generation Partner Project, so it is
also referred to as the third generation. 3G refers to a set of standards used for mobile
devices and mobile telecommunications use services and networks that comply with the
International Mobile Telecommunications-2000 (IMT-2000) specifications. The third
generation, as the name suggests, follows two earlier generations.
Code Division Multiple Access (CDMA) is a digital technology for transmitting data. It
is a new and mature wireless communication technology developed from spread
spectrum technology.
4G is the short name for fourth-generation wireless, the stage of broadband mobile
communications that will supercede the third generation (3G).
5G networks are the next generation of mobile internet connectivity, offering faster speeds and
more reliable connections on smartphones and other devices than ever before.
Combining cutting-edge network technology and the very latest research, 5G should offer
connections that are multitudes faster than current connections, with average download speeds
of around 1GBps expected to soon be the norm.
The networks will help power a huge rise in Internet of Things technology, providing the
infrastructure needed to carry huge amounts of data, allowing for a smarter and more
connected world.
With development well underway, 5G networks are expected to launch across the world by
2020, working alongside existing 3G and 4G technology to provide speedier connections that
stay online no matter where you are.
Source: https://www.gearbest.com/blog/how-to/global-network-types-2g-3g-4g-5g-2843
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 11
Mobile Devices
A mobile operating system, also called a mobile OS, is an operating system that is
specifically designed to run on mobile devices such as mobile phones, smartphones,
PDAs, tablet computers and other handheld devices.
4. Symbian OS (Nokia)
Symbian is a mobile operating system designed for mobile phones, featuring
strong integration with communication and personal information management (PIM)
functions. It combines middleware with wireless communication through an integrated
mailbox and supports Java and PIM features such as calendars and contacts. Nokia has
offered Symbian under an alternative model, collaborating with OEMs and a small group
of developers, but does not manage it as an open-source project.
5. webOS (Palm/HP)
WebOS is a mobile operating system that runs on the Linux kernel. WebOS was
initially developed by Palm as the successor to its Palm OS mobile operating system.
It is a proprietary Mobile OS which was eventually acquired by HP and now referred to
as webOS (lower-case w) in HP literature. HP uses webOS in a number of devices
including several smartphones and HP TouchPads. HP has pushed its webOS into the
enterprise mobile market by focusing on improving security features and management
with the release of webOS 3.x. HP has also announced plans for a version of webOS
to run within the Microsoft Windows operating system and to be installed on all HP
desktop and notebook computers in 2012.
Southeast Asia – Rank of Countries with Fastest (and Slowest) Internet in The World 2019 | Seasia.co
4. ASSISTIVE MEDIA
Assistive Media is an internet delivered audio reading service for people with visual
or perceptual reading impairments. Assistive Media also was the first internet-based
audio reading service for persons with print reading barriers thereby opening a unique
avenue of accessibility for many individuals with cognitive, physical, and
communication disabilities. The mission of this media is to heighten educational,
cultural, and quality-of-living standards through the pure enjoyment of reading via the
good and useful of not-for-profit service.
Rules of Netiquette
How many hours do you spend on the Internet per day? Can you live without the
Internet for a week? How many aspects of your life depend on the Internet? How many
times have you complained about your Internet connected speed?
As teenagers, you are all exposed to many things powered by the Internet.
Whether it is socializing, playing games, reading sports news, shopping, etc., the
Internet has given you one of the most powerful tools that your parents, during their
teenage years, did not have. Because of this, do you not think that it is also important to
wield this powerful tool properly? Without proper training, a swordsman can easily injure
himself when wielding a sword; the same could be said for you whenever you use the
Internet.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain
new friends, and stay in touch with the old ones. It is also a source of entertainment through
games, online communities, and everything in between. But like most things in the world, there
is always the “other side of the coin.” The internet is one of the most dangerous places,
especially if you do not know what you are doing with it.
Let us go back to the “How Safe Are You?” test. Let us visit each item and see how
risky it is to share them.
Type of Information Risks
There is a risk in sharing your first name. Chances are, a hacker may already
1. First name know plenty of stuff about you even if you only give out your first name. Likewise,
you cannot just walk in a room and start introducing yourself to everyone. You do
not know whom you can come across with.
If sharing your first name is a small risk, having both your first and last is more
2. Last name risky. You will be vulnerable to being searched for using search engines, which
include image search. Matching a name with a face is a modus to several
cybercrimes like identity theft.
Sharing your middle name alone is probably not the most risky of these shared
3. Middle name information, but sharing your full name would be.
Most people who steal identities study their subject. They can use this
4. Current and previous information for verification purposes.
school(s)
Your cellular phone number should never be posted over the Internet. The
5. Your cellphone number / Internet is a public place. It is the same as posting your number on a billboard.
cellphone number You would not want random strangers to text or call you, or worse, pretend that
they are someone else.
Risky, yet not as risky as posting their full names, especially your mother's
6. The name of your maiden name. In fact, you may have already encountered many websites that
mother and father require your mother's maiden name as an answer to a secret question whenever
you lose your password.
Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe
7. The name of your you.
siblings
Hopefully, you answered "no" to this one. Giving the Internet your number is one
8. Your address thing; giving them your address is a whole other level. It would be much easier
for criminals to find you.
This shared information is more risky than sharing your personal phone number.
9. Your home phone Scams usually use this information to deceive you, one of which is when a
number stranger pretends to know your parents or pretends to be you.
Letting people know your birthday is probably a must if you want to get as many
10. Your birthday gifts as possible. But having it in your profile makes you vulnerable to identity
theft.
The Internet is defined as the information superhighway. This means that anyone has
access to this highway, can place information, and can grab that information. Any information,
even things that you have set privately, can be accessed one way or another. This is why social
networking sites like Facebook continue to improve their security features. The treat of cybercrime
is very real. While you may not experience the threat now, whether information we share today
could affect our future.
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 14
Most people would dispute that there is no such thing as private over the internet and
they may be right. There are hackers who can find a backdoor even of you profile is already set
to private. You have no control of whoever is looking at your friend’s screen whenever they
open your profile or chat with you. You have no control over the people getting access to your
friend’s account and seeing your private stuff.
INTERNET THREATS
When using the internet, it’s important to be aware of several potential threats. Here are some of
the threats you should be aware of when using the internet:
Types of Malware
a. Virus – a malicious program designed to replicate itself and transfer from one computer
to another either through the Internet and local networks or data storage like flash drives
and CDs
b. Worm – a malicious program that transfers from one computer to another by any type
of means. Often, it uses a computer network to spread itself. For example the
ILOVEYOU worm (Love Bug Worm) created by a Filipino.
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 15
d. Spyware – a program that runs in the background without you knowing it (thus called
“spy”). It has the ability to monitor what you are currently doing and typing through
keylogging.
o Keyloggers – used to record the keystroke done by the users. This is done to
steal their password or any other sensitive information. It can record email,
messages, or any information you type using your keyboard.
2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing – its goal is to acquire sensitive personal information like passwords and credit
card details. This is done be sending you an email that will direct the user to visit a website
and be asked to update his/her username, password, credit card, or personal information.
Pharming – a more complicated way of phishing where it exploits the DNS (Domain
Name Service) system.
Before hiring, companies do a background check on the applicant, and the easiest
way to check your background is to visit pages that are related to you. Thus, if they find
disreputable information about you, it may harm your reputation even if this information has
been discarded.
1. Before you post something on the web, ask these questions your yourself:
A. Would you want your parents or grandparents to see it?
B. Would you want your future boss to see it?
Once you post something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about
this serious responsibility.
3. Set your post to “private”. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 16
COPYRIGHT INFRINGEMENT
Copyright infringement involves any violation of the exclusive rights of the
copyright owner. It may be unintentional or intentional. When unintentional, it is called
innocent infringement.
Copyright is distinct from other forms of creator protection such as Patents, which
give inventors exclusive rights over use of their inventions, and Trademarks, which are
legally protected words or symbols or certain other distinguishing features that represent
products or services. Similarly, whereas a patent protects the application of an idea, and
a trademark protects a device that indicates the provider of particular services or goods,
copyright protects the expression of an idea. Whereas the operative notion in patents is
novelty, so that a patent represents some invention that is new and has never been
made before, the basic concept behind copyright is originality, so that a copyright
represents something that has originated from a particular author and not from another.
Copyrights, patents, and trademarks are all examples of what is known in the law as
Intellectual Property.
As the media on which artistic and intellectual works are recorded have changed
with time, copyright protection has been extended from the printing of text to many other
means of recording original expressions. Besides books, stories, periodicals, poems,
and other printed literary works, copyright may protect computer programs; musical
compositions; song lyrics; dramas; dramatico-musical compositions; pictorial, graphic,
and sculptural works; architectural works; written directions for pantomimes and
choreographic works; motion pictures and other audiovisual works; and sound
recordings.
INTELLECTUAL PROPERTY
If you create something --- an idea, an invention, a form of literary work, or a
research, you have the right as to how it should be used by others.
Intangible rights protecting the products of human intelligence and creation, such
as copyrightable works, patented inventions, Trademarks, and trade secrets. Although
largely governed by federal law, state law also governs some aspects of intellectual
property.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid
defense against copyright. Be responsible enough to know if something has a copyright.
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 17
3. Be creative. Ask yourself whether what you are making is something that came from
you or something made from somebody else’s creativity. It is important to add your own
creative genius in everything that will be credited to you.
4. Know the law. There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also
provisions for "fair use" which mean that an intellectual property may be used without a
consent as long as it is used in commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching, and education. If you have doubts
that what you are doing does not fall under the policy of fair use, seek permission first.
ONLINE RESEARCH
The purpose of doing an online survey is to collect data, as with any traditional
survey. If you stumble across a topic that you want to do research on — whether it's market
research for your product or survey, or research into industry trends — you've found an
opportunity to conduct a survey.
Have you ever searched the Internet for certain information where the search
engine returned a different result? For example, if you were to search for "The Madonna"
as the representation of Mary in the form of an art, you would probably use the keyword
“Madonna" to search for it on the net. But if you use that same keyword nowadays, you
are more likely to stumble upon "Madonna, “the music artist instead. And if you used "The
Madonna “to search for "The Madonna" in the first place, you will be directed in the right
place.
Figure 2. Google Search results when you use “Madonna” as the keyword
Figure 3. Google Search results when you use “The Madonna” as the keyword
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 18
The information that we need is more likely already in the Internet. It is just a matter of how to
look for it and how to use information from the most credible source.
1. Have a question in mind. Focus on a single question first. If you have multiple
questions, handle them one at a time rather than searching for everything all at once.
2. Narrow it down. Search engines like Google, Bing, and Yahoo use various filters to
provide the most relevant results based on your search history and geographic location.
For example, if you search for "weather," most search engines will show the weather
conditions for your current location. If these filters don’t give you the desired results, try
refining your search. For instance, if you’re looking for the animation series *Tom
Sawyer*, use the keywords "Tom Sawyer animation" instead of just "Tom Sawyer."
Similarly, if you need information on science research experiments, specify the branch of
science or the type of study to get more accurate results.
3. Advanced Search. The best way to filter information you get from search engines is by
using the advanced search. This will allow you to filter out information you do not need.
In Google, simply search a word like you would normally do, then click the advanced
search option on the options button located at the upper right corner of the page.
In Microsoft® search engine, Bing, you can use certain keywords and symbols for your
advanced search:
SYMBOLS FUNCTIONS
+ Finds web pages that contain all the terms that are preceded by
the + symbol; allows you to include terms that are usually
ignored
““ Finds the exact words in a phrase
() Finds or excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases
NOT or - Excludes web pages that contain a term or phrase
OR or | Finds web pages that contain either of the terms or phrases
• You must capitalize the NOT and OR functions. Otherwise, Bing will ignore them as
stop words, which are commonly occurring words and numbers that are omitted to
speed a full-text search.
• Stop words and all punctuation marks, except for the symbols noted in this topic, are
ignored unless they are surrounded by quotation marks or preceded by the ± symbol.
• Only the first ten terms are used to get search results.
LEARNING PACK: EMPOWERMENT TECHNOLOGIES 19
• Similar to the MDAS, whenever you solve an arithmetic problem (where multiplication
is computed first over division, addition, and subtraction), term grouping and Boolean
functions are supported in the following preferred order.
1. parentheses ( )
2. quotation marks"
3. NOT
4. AND &
5. OR
Source: Miaosoft.com
4. Look for a credible source. While wikis can provide updated information, they may lack
credibility since anyone can edit their content. Always check the links to cited sources (marked
by superscript numbers) to verify their reliability. Click on these sources to assess their credibility.
Reliable sources typically include scientific journals, reputable news and magazine websites,
online encyclopedias, and scholarly databases.
You can also assess a website's reliability by its domain suffix: .org, .gov, and .edu are generally
more trustworthy, while .com sites may be commercial and potentially biased. However, be
aware that some sites may misuse these suffixes, so not all .edu sites are necessarily credible.
To ensure the information is accurate, compare it across multiple reputable sources. If several
trusted sources provide the same information, it is more likely to be reliable.
5. Give Credit. If you are going to use the information from a source for educational purposes,
give credit to the original author of the page or information. To properly cite a reference, you
may use the format below:
Example: