Nothing Special   »   [go: up one dir, main page]

EmTech Module - Q1 by Grascia - 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Empowerment Technologies

Quarter 1 – Module 1:
Introduction to ICT and Online Safety

Module in Empowerment Technologies


Author: gRascia
School:
School Address:
For the learner:

Welcome to the Empowerment Technologies Alternative Delivery Mode (ADM) Module on


Introduction to ICT, Online Safety. This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or competencies
you are expected to learn in the module.

What I Know This part includes an activity that aims to check what
you already know about the lesson to take. If you get
all the answers correct (100%), you may decide to skip
this module.

What’s In This is a brief drill or review to help you link the current
lesson with the previous one.

What’s New In this portion, the new lesson will be introduced to you
in various ways such as a story, a song, a poem, a
problem opener, an activity or a situation.

What is It This section provides a brief discussion of the lesson.


This aims to help you discover and understand new
concepts and skills.

What’s More This comprises activities for independent practice to


solidify your understanding and skills of the topic.

What I Have Learned This includes questions or blank sentence/paragraph to


be filled in to process what you learned from the lesson.

What I Can Do This section provides an activity which will help you
transfer your new knowledge or skill into real life
situations or concerns.

Assessment This is a task which aims to evaluate your level of


mastery in achieving the learning competency.

Additional Activities In this portion, another activity will be given to you to


enrich your knowledge or skill of the lesson learned.
This also tends retention of learned concepts.

Answer Key This contains answers to all activities in the module.

NOTE: please do not write ANYTHING on this MODULE, write your answers on your notebook.
Introductory Message
For the facilitator:

This will aid in teaching competencies that are essential in the Information Age, such as the state of
ICT Technologies; online safety, security, ethics and etiquette; productivity tools with advanced
application techniques; imaging and designing for online environment; multimedia tools; and powerful
tools to create a social change, which are aligned to the standards set by the Department of Education
for the senior high school level.

For the learner:

(This module contains information about: the massive world of Information and Communication
Technology (ICT) has continued to shape the world including the Philippines. This unit allows you to
discover the world of ICT in general and also helps you improve your skills in various applications. It
also creates several real-life scenarios where you can use these applications and resources properly.

What I Need to Know

This module was designed and written with you in mind. It is here to help you master the
Empowerment Technologies. The scope of this module permits it to be used in many different learning
situations. The language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.

The module covers:


• The nuances of varied online platforms, sites, and content, situational
challenges and online safety, security, ethics, and etiquette standards
and practice in the use of ICTs

After going through this module, you are expected to:


1. create a foundation of understanding of the world of ICT;
2. understand and demonstrate the proper etiquette in using ICT;
3. demonstrate appropriate skills in using several computer applications,
4. discover opportunities where one can use these skills in real-world scenarios; and
5. collaboratively create an online portal.
6. Consider one’s and others’ safety when sharing information using the Internet;
7. Consider one’s and others’ reputation when using the Internet;
8. Determine and avoid the dangers of the internet; and
9. Be responsible in the use of social networking sites.

10
What I Know

I. Directions: Choose the letter of the best answer. Write the chosen letter on a separate sheet of paper.
1. A web page that allows interaction from the user
a. static b. dynamic c. social d. comment

2. This refers to the feature where users are able to categorize and locate information through tagging.
a. hashtags b. folksonomy c. taxonomy d. rich user experience

3. A feature of a dynamic website that allows users to put their own content
a. rich user experience b. long tail c. user participation d. mass participation

4. It provides a common framework to allow data to be shared and reused across platform, enterprise,
and community boundaries.
a. W3C b. Semantic Web c. Web 1.0 d. Web 2.0
5. According to this magazine, two Philippine cities are part of the top 10 in their research about “The
Selfiest Cities around the World.”
a. People b. Time c. Reader’s Digest d. Candy

6. This is the operating system for blackberry phones.


a. Blackberry OS b. Symbian c. Window’s Mobile d. iOS

7. Pinterest is a social media website that can be classified as


a. Bookmarking site b. Media Sharing c. Microblogging d. Blogs and Forums

8. Currently, this is the fastest mobile network.


a. 2G b. 3G c. 4G d. 5G

9. This media is designed to help people who have visual and reading impairments.
a. assistive b. social c. bookmark d. accessibility

10. This type of social media website focuses on short updates posted by the user.
a. blogging b. microblogging c. social media d. hashtagging

II. Directions: Write Yes if you agree with the statement and No if you disagree on the blank before
each number.
_______ 1. My computer has an antivirus so it is okay to open most email attachments like e-cards and
video files.
_______ 2. Your friend told you that his college application was rejected due to the fact that you posted
a video of him doing crazy stuff at a party. You posted the video several years ago but later
took it down to protect your friend's reputation. Can your friend be right that the college
found the video?
_______ 3. You and your best friend play a lot of video games. One time, she asked you for your
password so she can help you level up and get in-game money. She promised to keep your
password a secret. Is it okay to give away your password?
_______ 4. You received an email stating that your mother's bank account is going to be forfeited if
you do not respond to the email. Is it safe to' reply?
_______ 5. You forgot that your essay for English class is due tomorrow. While doing your research,
you found a website offering free essays. Is it okay to use the essays from this free essay
website?

10
_______ 6. A virus is a malware that multiplies and infects other computers through flash drives.
_______ 7. Keyloggers are software that show pop-up ads even if you are not using your browser.
_______ 8. Search engines scan websites for search results even if you have set your post to "private"
_______ 9. There is a danger in posting information about a future vacation.
_______ 10. Letting people know your birthday is probably a must if you want to get as many gifts as
possible. But having it in your profile makes you vulnerable to identity theft.

What’s In

ICT, Me and My Community


Directions: Read the given situation and answer the following questions using a separate sheet.

You own a thriving business until a pandemic hit your locality limiting its operation due to the
strict orders by the government. You thought of shifting your business into an “online” one.
1. What are the different ways for customers and suppliers to contact you?
________________________________________________________________
________________________________________________________________

2. How important is ICT in such a situation?


________________________________________________________________
________________________________________________________________

Unlocking of Difficulties
The following are the terms you will encounter with this module:
Key Terms

• Web 1.0- static website without interactivity


• Web 2.0- websites that contain dynamic content
• Web 3.0- a concept of the World Wide Web that is designed to
cater to the individual user
• Static-refers to the web that are the same regardless of the user
• Folksonomy- allows users to categorize and classify/ arrange
information
• Hashtag- used to categorize posts in website
• Convergence- the synergy of technological advancements to
work
on a similar goal or task
• Social media- websites, applications, or online channels that enable
users to create, co-create, discuss, modify, and exchange user generated content.

What’s New

Information and Communication Technologies

10
Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc to locate, save, send, and
edit information.

When we make a video call, we use the Internet. When we send a text or make a call, we use cellular
networks. When we run out of load or battery, we use payphones which use a telephone network. Having
a unified way to communicate is one of the goals of ICT. In terms of economics, ICT has saved
companies a lot of resources (time and money) with the kind of communication technology they use,
nowadays. In a similar way, we spend less because of ICT. As it normally costs us a peso to send a text
message or SMS, with the Internet, we can send multiple messages and only be charged by a fraction.

ICT in the Philippines

Several international companies dub the Philippines as


the "ICT Hub of Asia". It is no secret that there is a huge growth
of ICT-related jobs around the country, one of which is the call
center or BPO (Business Process Outsourcing) centers.
According to the 2013 edition of Measuring the
Information Society by the International Telecommunication
Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. That would mean that for every
100 Filipinos you meet, there is a high chance that they have a cellphone and approximately for the
seven of them, they have two.
In a data gathered by the Annual Survey of Philippine Business and Industries in 2010, the ICT
industry shares 19.3% of the total employment population here in the Philippines.
To add to these statistics, Time Magazine’s "The Selfiest Cities around the World” of 2013
places two cities from the Philippines in the top 1 and top 10 spots. The study was conducted using
Instagram, a popular photo sharing application.
With these numbers, there is no doubt that the Philippines is one of the countries that benefit
most out of ICT.
• Philippines is dubbed as the “ICT Hub of Asia” because of the huge growth of ICT-related jobs,
one of which is BPO, Business Process Outsourcing, or call centers
• ICT Department in the Philippines is responsible for the planning, development and promotion of
the country's information and communications technology (ICT) agenda in support of national
development.

The Internet

• It is the global system of interconnected computer networks that use the Internet protocol suite
(TCP/IP) to link billions of devices worldwide.
• It is a means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers.
• Sometimes called "the Net", is a worldwide system of computer networks - a network of
networks in which users at any one computer can get information from any other computer

World Wide Web

• an information system on the Internet that allows documents to be connected to other documents
by hypertext links, enabling the user to search for information by moving from one document to
another
• is an information space where documents and other web resources are identified by URLs,
interlinked by hypertext links, and can be accessed via the Internet

10
• Invented by Tim-Berners Lee

Web Pages

• Web page is a hypertext document connected to the World Wide Web.


• It is a document that is suitable for the World Wide Web

Web Sites

• a location connected to the Internet that maintains one or more pages on the World Wide Web.
• It is a related collection of World Wide Web (WWW) files that includes a beginning file called a
home page.

Web Browser

• It displays a web page on a monitor or mobile device.


• It is a software application for retrieving, presenting, and traversing information resources on the
World Wide Web.

Static vs. Dynamic Web Page

• “Static" means unchanged or constant, while "dynamic"


means changing or lively.
• A static site is one that is usually written in plain HTML and
what is in the code of the page is what is displayed to the
user. A dynamic site is one that is written using a server-side
scripting language such as PHP, ASP, JSP, or ColdFusion.

Static Web Pages

• Static is Web 1.0


• Static web page is known as flat page or stationary page in the sense that the page is “as is” and
cannot be manipulated by the user.
• The content is also the same for all users.

Dynamic Web Pages

• Includes Web 2.0 and Web 3.0


• Web 2.0 is the evolution of Web 1.0 by adding
dynamic web pages
• The user is able to see website differently than
others e.g social networking sites, wikis, video
sharing sites
• Web 2.0 allows users to interact with the page,
the user may be able to comment or create a user account. Most websites that we visit today
are Web 2.0

Features of Web 2.0

1. Folksonomy- allows user to categorize and classify information using freely chosen keywords
e.g tagging by Facebook, twitter, use tags that start with the pound sign #, referred to as hashtag
2. Rich User Experience- content is dynamic and is responsive to user’s input

10
3. User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews, and evaluation
e.g lazada.com, amazon.com
4. Long Tail- services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in
the Internet, or a data plan that charges you for the amount of bandwidth you used.
5. Software as a Service- users will be subscribe to a software only when needed rather than
purchasing them e.g Google docs used to create and edit word processing and spread sheet.
6. Mass Participation- diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.

Web 3.0 and Semantic Web

• Semantic Web is a movement led by the World Web Consortium (W3C).


• The W3C standard encourages web developers to include semantic content in their web pages.
• Semantic web is a component of Web 3.0
• Semantic web provides a common framework that allows data to be shared and reused across
application, enterprise, and community boundaries.
• The aim of Web 3.0 is to have is to have machines or servers understand the user’s preferences to
be able to deliver web content specifically targeting the user.

Web 3.0 is yet to be fully realized because of several problems:

1. Compatibility. HTML files and current web browsers could not support Web 3.0.
2. Security. The user's security is also in question since the machine is saving his or her
preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words "old" and "small would depend on the
user.
5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict
what the user is referring to at a given time.

Trends in ICT
1. Convergence- is the synergy of technological advancements to work on a similar goal or task
2. Social media- is a website, application, or online channel that enables web users to create, co-
create, discuss, modify, and exchange user-generated
content.
Six Types of Social Media:
a. Social Networks- These are sites that allow you to connect with other people with the same
interests or background.
b. Bookmarking Sites- These are sites that allow you to store and manage links to various
websites and resources.
c. Social news- These are sites that allow users to post their own news items or links to other
news sources. The users can also comment on the post and comments may also be ranked.
d. Media Sharing- These are sites that allow you to upload and share media content like
images, music, and video.
e. Microblogging- These are sites that focus on short updates from the user. Those subscribed
to the user will be able to receive these updates.
f. Blogs and Forums- These websites allow users to post their content. Other users are able to
comment on the said topic.

10
3. Mobile Technologies- There is an increasing popularity of smartphones and tablets nowadays.
Latest mobile devices use 4G Networking LTE, which is currently the fastest mobile network.
Mobile devices use different operating systems

• iOS • Windows Phone OS

• Symbian
• Android
• Web OS

• Blackberry OS
• Windows Mobile

4. Assertive Media- It is a non-profit service designed to help people who have visual and reading
impartments. A database of audio recordings is used to read to the user.

CHECKPOINT!!!
Directions: Choose at least three social media types and identify their individual advantages and
disadvantages. Indicate an example for each. Write your answers on a separate sheet of paper.
Social Media
Advantage Disadvantage Example
Type

Online Safety and Security


Most of us use the Internet every day. Sometimes we do not pay attention on how
much information we share online. Below is a questionnaire about how much you have
shared so far. Put a check (✓) under Shared or Not Shared.

How Safe Are You?


Type of Information Shared Not Shared
1. First name
2. Last name
3. Middle name
4. Current and previous school(s)
5. Your cellphone number
6. The name of your mother and father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
How many checks did you have for Shared? You probably answered Shared in the first two
items. If that is the case, try using a search engine like Google then type your first and last name. Did
you get links to your profile page? Try switching to image search. Did your pictures appear? If you
have a unique name, chances are, it did. Do not feel bad if it did not appear though; in fact, it is probably
for your best interest not to have pictures of yourself in a search engine.

10
Your Online Safety
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment through games, online
communities and everything in between. But like most things in this world there is always the other
side of the coin.

The Internet is one of the most dangerous places especially if you do not know what you are
doing with it. But there is no need to worry -- it is never that late. Hopefully, by the end of this lesson,
you are able to consider how you go about your use of the Internet.

Let us go back to the "How Safe Are You?" test. Let us visit each item and see how risky it is
to share them. There is a risk in sharing your personal information.

First name There is a risk in sharing your first name. Chances


are, a hacker may already know plenty of stuff about
you even if you only give out your first name.
Likewise, you cannot just walk in a room and start
introducing yourself to everyone. You do not know
whom you can come across with.

Last name If sharing your first name is a small risk, having both your
first and last is riskier. You will be vulnerable to being
searched for using search engines, which include image
search. Matching a name with a face is modus to several
cybercrimes like identity theft.

Middle name
Sharing your middle name alone is probably not the
riskiest of this shared information, but sharing your full
name would be.

Current and
Previous
Schools Most people who steal identities study their subject. They
can use this information for verification purposes.

Your Your cellphone number should never be posted over the


cellphone Internet. The Internet number is a public place. It is the
numbers same as posting your number on a billboard. You would
not want random strangers to text or call you, or worse,
pretend that they are someone else.
Risky yet not as risky as posting their full names, especially
The name
your mother's maiden name. In fact, you may have already
of your
encountered many websites that require your mother's maiden
mother and
name as an answer to a secret question whenever you lose your
father.
password.

The name
Disclosing this is a huge risk. Strangers may pretend or
of your
use their identity to dupe you.
siblings.

Hopefully, you answered "no" to this one. Giving the Internet


Your your number is one thing; giving them your address is a
address whole other level. It would be much easier for criminals to
find you.

This shared information is riskier than sharing your


Your home personal phone number. Scams usually use this
phone information to deceive you, one of which is when a
number. stranger pretends to know your parents or pretends to be
you.

Letting people know your birthday is probably a must if you


Your
want to get as many gifts as possible. But having it in your
birthday
profile makes you vulnerable to identity theft.

TEN RULES OF NETIQUETTE


• Rule no. 1: Remember the human
• Rule no. 2: Adhere to the same standards online that you follow in real life.
• Rule no. 3: Know where you are in cyberspace.
• Rule no. 4: Respect other people’s time and bandwidth.
• Rule no. 5: Make yourself look good online.
• Rule no. 6: Share expert knowledge
• Rule no. 7: Help keep flame wars under control
• Rule no. 8: Respect other people’s privacy.
• Rule no. 9: Don’t abuse your power
• Rule no. 10: Be forgiving of other people’s mistake.
RULES OF NETIQUETTE
INTERNET THREATS

PROTECTING REPUTATIONS ONLINE


COPYRIGHT

What’s More
Directions: Answer the following questions in your own words on a separate sheet of paper.

1. Why is Internet safety important?


______________________________________________________________________
______________________________________________________________________
2. How can the misuse of social media create a negative digital footprint?
______________________________________________________________________
______________________________________________________________________

What I Have Learned

Directions: Complete the following statements in your own words and write them on a separate sheet
of paper.

1. Netiquette is_______________________________________________________________
___________________________________________________________________________

2. I can protect myself from online threats by________________________________________


___________________________________________________________________________

3. I can be responsible in citing online sources by ____________________________________


___________________________________________________________________________
What I Can Do
Suppose that you are to create an original ICT tool that will help alleviate a pandemic situation.
It may be an application, a social media platform, technological gadget, etc. Describe your ICT tool in
terms of: its function, how it is used and its supposed benefits. Use the following format and write your
answers on a separate sheet of paper.

ICT Tool Name: Logo:


Function:
How to Use:
Benefit/s:

To evaluate your output, the following rubrics will be used.


1 2 (Needs 3 (Meets 4 (Exceeds
ICT Tool is…
(Not Evident) Improvement) Expectations) Expectations)
original
applicable to given
situation
adequately explained

Assessment

I. Directions: True or False: Write T if the sentence is correct; otherwise, write F on the blank before
each item. (NOTE: please do not write ANYTHING on this MODULE, write your answers on
your notebook)
___ 1. Tim Berners-Lee created the World Wide Web.
___ 2. People Magazine conducted the research on "The Selfiest Cities in the World"
___ 3. Web 2.0 introduced static web pages that allow users to interact with the web page.
___ 4. Folksonomy allows users to categorize and locate information.
___ 5. Technological convergence is the synergy of technological advancements to work on
a similar goal or task.
___ 6. According to Nielsen, users who use the Internet spend more time in social media
sites than in any other type of site.
___ 7. Blogging sites are sites that focus on short updates from the user.
___ 8. Android is a mobile operating system for Apple devices.
___ 9. Assistive media is a nonprofit service designed to help people who have visual and
reading impairments.
___ 10. Information and Communication Technology (ICT) deals with the use of different
communications technology to locate, save, send, and edit information
II. Directions: Write SO if the social media website is a social network, BS for bookmarking site, SN
for social news, MS for media sharing, MI for microblogging, and BF for blogs and forums.
___ 1. Facebook ___ 6. Google+
___ 2. Plurk ___ 7. Instagram
___ 3. Twitter ___ 8. Pinterest
___ 4. Tumblr ___ 9. Blogger
___ 5. reddit ___ 10. StumbleUpon

III. Directions: Matching Type. Match items in Column A with those in Column B. Write the letter of
the correct answer on a separate sheet of paper.
A B
___ 1. virus a) designed to send you advertisements
___ 2. rogue b) sends an official-looking email and is designed to steal
provision that allows you to use copyrighted work sensitive
personal information
___ 3. keylogger c) without consent with certain limitations
___ 4. adware d) a browser feature that is synonymous to "private" browsing
___ 5. spam e) replicates and can transfer from one computer to another
___ 6. phishing f) exploits the DNS system
___ 7. fair use g) states that anyone who uses your work without your consent is
punishable by law
___ 8. spyware h) runs in the background and monitors what you are doing
___ 9. private i) unwanted email mostly from bots
___ 10. malware j) disguised as a useful program but is not
___ 11. incognito k) the information superhighway
___ 12. internet l) tricks the user into posing that it is a security software
___ 13. trojan m) a malicious software
___ 14. copyright n) an option to hide a post so that search engines could not scan it
___ 15. pharming o) used to record the keystrokes done by the user

Reflection
Directions: In your notebook, journal or portfolio, write your personal insights about
the lesson by completing the following statements.

✓ I understand that
________________________________________________________________
________________________________________________

✓ I need to improve on
________________________________________________________________
________________________________________________

✓ I realize that
________________________________________________________________
_____________________________________________________

Answer Key
10. Yes 5. No 10. a 5. b
9. Yes 4. No 9. a 4. b
8. No 3. No 8. a 3. c
7. Yes 2. Yes 7. b 2. a
6. Yes II. 1. No 6. d I. 1. b
What I Know
References:
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0; Published,
Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Reygie Fabro-College Instructor at Divine Word College of Laoag; Published on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Patronage of Mary Development School (PMDS), Published on May 6, 2020;
https://www.slideshare.net/arias201625/empowerment-technologies-lesson-2?qid=45c533b4-a83e-4e70-ae13-
92c5b3b8b650&v=&b=&from_search=3
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta
Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta
Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta
Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta
Ave., cor Ma. Clara St., Quezon City. Page 367, paragraph 3.

You might also like