Nothing Special   »   [go: up one dir, main page]

APPLIED 1112 EmTech Q1 M1 V2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

NAME:__________________________________________

GRADE/SECTION:______________________________ 11/12
APPLIED
Empowerment Technology
Quarter I/III – Week 1
ICT in the Context of Global
Communication

CONTEXTUALIZED LEARNING ACTIVITY SHEETS


SCHOOLS DIVISION OF PUERTO PRINCESA CITY
APPLIED – Empowerment Technologies - Grade 11/12
Contextualized Learning Activity Sheets (CLAS)
Quarter I/III – Week 1: ICT in the Context of Global Communication
First Edition, 2021

Republic Act 8293, Section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for the
exploitation of such work for a profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this CLAS are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission to
use these materials from their respective copyright owners. The publisher and
authors do not represent nor claim ownership over them.

Published by the Schools Division of Puerto Princesa City

Development Team of the Contextualized Learning Activity Sheets


Writer: Napthalie M. Andre-e
Content Editor: Alexis D. Diosaban
Language Editor: Hazel Joyce A. Aquino
Reviewers: Dennis M. Lucas, PhD, EPS – EPP/TLE/TVL
Illustrator: Napthalie M. Andre-e
Layout Artist: Napthalie M. Andre-e
Management Team:
Servillano A. Arzaga, CESO V, SDS
Loida P. Adornado, PhD, ASDS
Cyril C. Serador, PhD, CID Chief
Ronald S. Brillantes, EPS-LRMS Manager
Dennis M. Lucas, PhD, EPS-EPP/TLE/TVL
Eva Joyce C. Presto, PDO II
Rhea Ann A. Navilla, Librarian II

Division LR Evaluators: Ronald S. Brillantes, Mary Jane J. Parcon, Rhea D. Romero,


Belgado, Cynthea H. Cabanero, Rosario T. Gonzales,
Liezl O. Arosio, Karl Gabriel G. Buenafe

Division of Puerto Princesa City-Learning Resource Management Section (LRMS)


Sta. Monica Heights, Brgy. Sta. Monica, Puerto Princesa City
Telephone No.: (048) 434 9438
Email Address: puertoprincesa@deped.gov.ph
Lesson 1
ICT in the Context Of Global Communication

Learning Competencies:

Compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.
(CS_ICT11/12ICTPT-Ia-b-1)

Apply online safety, security, ethics, and etiquette standards and practice in the use
of ICTs as it would relate to their specific professional tracks.
(CS_ICT11/12ICTPT-Ia-b-2)

Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational challenges.
(CS_ICT11/12ICTPT-Ia-b-3)
Objectives: 1. Compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational
challenges;

2. Apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks; and

3. Use the Internet as a tool for credible research and information gathering to
best achieve specific class objectives or address situational challenges.

Let’s Try
I. Multiple Choice
Directions: Read and answer the questions below carefully. Circle the letter of
your choice.

1. Which of the following website and applications where a user can communicate,
create, share content, and participate in an online community?
A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media
2. Which of the following is used to develop a web document?
A. DNS C. HTTP
B. URL D. HTML
3. Which version of the web allows users to interact with another web page?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
4. Which of the following emerging trends in ICT allows the broadcasting of short
messages.
A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media
5. It is a platform that assists a person with a disability.
A. Assistive Media C. Convergence
B. Social Media D. Semantic Web
1
II. True or False
Directions: Write “True” if the statement is true and write “False” if the statement is
false. Write your answer in the space provided before the number.

______ 1. It is right to copy the works of other people without asking permission.
______ 2. All information from the internet is free.
______ 3. A search engine is a tool used in internet research.
______ 4. All information from the internet is reliable.
______ 5. Google is an example of a search engine.
______ 6. Child pornography is a form of cybercrime.
______ 7. Committing a crime on the internet is not punishable by law.
______ 8. Do not share personal information with suspicious websites or users.
______ 9. Share your password with anyone.
______10. Think before you click.

Let’s Explore and Discover

Unlocking of
Difficulties Information and Communications Technology refers
to the use of communication technology such as laptops,
• ICT (Information smartphones, tablets, telephone, internet, and others to send,
and save, and edit information.
Communications The Philippines is the fastest-growing app market in
Technology) Southeast Asia and the highest digital population in the world.
The top online activities are social media, videos, online mobile
• WWW (World Wide games, location-based searches, and online shopping. Staying
Web) connected with loved ones, friends, and relatives is a
• Netiquette - a fundamental need for Filipinos.
combination of the According to Statistica.com in 2017, there are 74 million
words network and Facebook users in the Philippines alone and expected to reach
etiquette and is around 88.5 million by the year 2025. In 2017, 34.5 million
defined as a set of people accessed the internet through their mobile phones.
rules for acceptable
online behavior

By 2023, this figure is projected to amount to 50.8 million mobile phone internet
users. As of June 2019, the internet penetration among the population in the Philippines
was 62 percent. A total of 47 million users accessed social media via mobile monthly,
making the country the second-largest Facebook market in the Southeast Asian region. The
average internet connection speed in the Philippines is 3.5 Mbps, less than an eighth of
market leaders’, South Korea’s, an average speed of 29 Mbps. The Philippines also ranked
third in terms of internet freedom in Asia according to the Freedom House Index in 2019.
(Sanchez 2020)
World Wide Web is also known as WWW or W3 introduce by Tim Berners-Lee. It
consists of different pages that are formatted in a markup language called HTML (Hypertext
Markup Language) and linked to each other that contains text, graphics, multimedia files,
hyperlinks, etc.

Web 1.0
The first development of the World Wide Web where web pages are static. It is also
known as a flat or stationary page and it cannot be manipulated by users.
2
Web 2.0

It is a dynamic web page where users can interact with a page like creating a user
account, posting comments, uploading files and images, and others.
Example: Blog sites, Facebook, Twitter, Instagram, YouTube Features of Web 2.0

1. Folksonomy – users can classify and arrange information by adding tags or labels.
The pound sign (#) is used on Facebook, Twitter, Instagram, and other social
networking sites. Example in tagging on Facebook: #TeamKawayan, #Single

2. Rich User Experience – users can have high interaction with the content of the page
and can achieve a level of expertise.

3. User Participation – user can put content on their own on a web page like
comment, evaluation, etc.

4. Long Tail – A site that offers services and brings individuals and businesses into
selling different goods and commodities such as shopping sites like OLX, Lazada,
Shopee, Zalora, and others.

5. Software as a service – users can subscribe to software when they need it instead
of purchasing them.

6. Mass Participation – sharing of diverse information through universal web access.

Web 3.0 The Semantic Web

A new paradigm in web interaction extension led by the World Wide Web Consortium
(W3C) where it provides a framework that allows data to be shared and reuse.

Trends in ICT
1. Convergence –refers to the fusing of
technological advancement to work on a similar
task. Example: Using a smartphone as a camera
in taking pictures instead of a DSLR camera.

2. Social Media – an application and website where


users can communicate, create and share
content and participate in an online community.

Types of Social Media

A. Social Network – A website


where people come together to share
information. Examples: Twitter,
Instagram, Facebook

3
B. Social News – A website where users can post stories and ranked based on
popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark.

Image taken from www.news.google.com

C. Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images, and others. Examples: Pinterest,
StumbleUpon, Dribble.

Image taken from www.pinterest.ph

D. Media Sharing – A website that allows you to share and store multimedia files
such as videos, photos, and music. Examples: Instagram, YouTube, Flickr.
E. Microblogging – a website that allows you to broadcast short messages.
Examples: Twitter, Tumblr, Meetme
F. Blogs and Forums – a discussion website that allows users to ask questions and
comments on a journal posted by an individual or group. Examples: WordPress,
Blogger, Wix.

Image taken from www.wix.com

4
3. Mobile Technologies – a technology used in cellular and other devices such as
netbooks, laptops, tablets, smartphones, etc.

4. Assistive Media - A platform that assists people with disabilities. It will guide the
individual like a blind person by using an audio recording.

Online Safety

The importance of the internet plays a crucial part in human development. Life
becomes easy and comfortable because of this technology. Most of us are connected to the
internet via laptop, mobile phone, tablet, personal computer, and other electronic gadgets.
Behind this technology, there is a risk that everyone should be aware of. You could be at
risk of scams, bullying, and illegal activities if you will not take precautions in using the
internet. We need to keep ourselves safe and secure whenever we use the internet. That is
why it is very important to know and learn the ways on how to be safe and secured online.

Tips on how to be safe online.

➢ Do not share your password with anyone.


➢ Add friends you know in real life.
➢ Do not visit untrusted websites.
➢ Add a password to your WIFI at home to make it private.
➢ Install and update the antivirus on your computer.
➢ Do not give your personal information to anyone.
➢ Think before you click.
➢ Never post about your future vacation.

Internet Risk

Cyberbullying
It happens when someone intentionally is abused, harassed, and mistreated by
another person using electronic communication.

Identity Theft
It is a crime of stealing personal information to assume that person’s name or identity
to make any form of transaction.

Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass an
individual or group.

Sexting
The act of sending sexually explicit text messages, images, and videos.

Internet Threats

Malware – also known as Malicious Software.

Types of Malware
1. Virus – a malicious program that replicates itself by copying itself to another
program.
2. Trojan Horse – a malicious program that disguises as a legitimate program that user
will accept and use but takes control of your computer.

3. Worm – a malicious program that copies itself and spreads to other computers.
5
4. Spyware – A malicious program that gathers information from a victim’s computer
and sends it back to the hacker.

5. Adware – An unwanted advertisement that will pop up several times on the victim’s
computer then behaves abnormally and tedious to close them.

6. Keylogger – A program that runs in the background and steals user credentials and
confidential information and sends it back to hack by recording every keystroke that
a user makes on their computer or device.

7. Botnet – A collection of infected internets–connected devices such as PC and mobile


phones that are controlled by a common type of malware.

8. Rootkit – A software tool used by hackers to gain control over a computer on a


network without being exposed.

9. Ransomware – A ransom virus that blocks the user from accessing the programs or
files and demands to pay the ransom through an online method for the removal of
the virus.

Spam - also known as junk email or unwanted email send by advertiser or bot. It can be
used to send malware.

Phishing - a cyber-attack method using deceptive emails and websites to acquire sensitive
personal information.

Cybercrime - a crime in which a computer is used as an object and tool in committing a


crime such as hacking, phishing, spamming, child pornography, libel, hate crimes, identity
thief and others.

Cybercrime Law - a law that deals with all forms of cybercrime.

Netiquette - it is a word that came from two words “net” and “etiquette”. It is an etiquette
applied online that shows proper manners and behavior. If you are a member of an online
society through social media, you are called a netizen. And in interacting with another
netizen online, we need to maintain good behavior which is acceptable to others in an online
community.
Contextualized Online Search and Research Skills

Internet Research is a research method in collecting and gathering information via the
internet by using a search engine such as Google.

A search Engine is a program that allows users to search for content on the internet.

Examples of Search Engine


Google Aol Search Wow Baidu
Web Crawler Yahoo! Search MyWebSearch WolframAlpha
Bing Info Dogpile DuckDuckGo
Ask Infospace Contenko Internet Archive

Searching the Web

Getting the correct and reliable information is our goal in internet research. We may
rely on the capability of the search engine but sometimes it may not give us the correct
6
information because of the keywords we entered a search engine. There are techniques in
searching for information that can be applied in a search engine to get a better result. Some
search engines allow the combination of words and logic connectors of AND, OR, and NOT.

Tips for Effective Internet Research by George Mathews

1. Know what kind of research you want to do.


2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.

Online Research Skills by Hannah Trierweiler Hudson

1. Check Your Sources


2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks

Copyright Issues

There are millions of information that we can get from the internet. Some of this
information is free but others are not. They are protected by copyright law.

What is Copyright?

Copyright is a protection given to the owner of the rights in an original work such as
books, musical works, films, paintings, and other works, as well as computer programs.
This original work is called intellectual property which is protected under Republic Act 8293
known as the “Intellectual Property Code of the Philippines”.

Copyright Infringement

This happens when the copyrighted work is used by another person without the
permission of the author or copyright holder. Any person who is infringing the protected
work would be liable under the law. An example of this is the case of M.Y. intercontinental
Trading Corporation (MITC), Tedwin T. Uy, Allianz Marketing and Publishing Corp. (Allianz),
and Fujian New Technology Color Making and Printing Company, LTD (Fujian) against St.
Mary’s Publishing Corporation (SMPC). Manila regional trial court ordered Fujian and its
partners to pay P24.7 million for the damages and cost of litigation for copyright
infringement to SMPC. Fujian and its three local partners were guilty of printing, copying,
reproducing, importing, distributing, and selling original and revised textbooks that they
have illegally sold to the Department of Education in Zamboanga, Municipality of Cabuyao
in Laguna, and Municipality of Matnog in Sorsogon without the approval of SMPC, the
copyright owner of the textbooks.

7
Fair Use

Research is important to students and other people. Most of them rely on the
information that they can get online. Although this information is protected by copyright
law, we can still use this information without permission in a limited way under certain
conditions and purposes.

Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and another similar purpose that is not an infringement
of copyright.

An example of this is when you post a quote from a person on your Facebook wall.
Include the name of a person who owns the quote in your post. Another example is when
you copy an image from the internet, give credit to the creator of the image. The copied
image should be used for educational purposes and not for commercial use.

In fair use, 5% of the content of the reference can only be copied. If 20% or less of
the reference is copied, there must be a secondary use agreement and fee. And if 20% or
more of the reference is copied, it requires purchasing creative work.

Guidelines for Fair Use

1. Majority of the contents created must be yours.


2. Give credits to the owner.
3. Do not make a profit from copyrighted work.

Let’s Practice
ACTIVITY 1 Directions: Visit at least 5 websites and identify its version
weather it is Web 1.0, Web 2.0 or Web 3.0. Defend your answer
by writing on the Reason column.

No. Website Web Version Reason


1.
2.
3.
4.
5.

ACTIVITY 22 Directions List down five (5) social media that you have been used.
ACTIVITY

No. Social Media Used


1.
2.
3.
4.
5.

8
Let’s Do More

ACTIVITY 1 Directions: Suppose you have read a post like this “Increasing
COVID Cases in Puerto Princesa City” in social media account.
How would you react? Post your reaction in comment section
on our #Wall.

Wall:
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

ACTIVITY 2 Directions: Answer the following questions


below.

1. How do you keep yourself safe and secure online?


_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

2. Why is it important to observe netiquette online?


_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

9
Let’s Sum It Up

Activity 1 Direction: Answer the following questions below.

1. Is research done online reliable? Please expound your answer.


_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

2. How can you show respect of other’s intellectual property?


_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

Activity 2 Directions: Put a check mark on the table provided below


whether the following statement is a “fact” or “opinion”.
State the reason.

Statement Facts Opinion Reason


1. All information from the internet
are reliable.
2. Giving credit to the owner of the
copied work is optional.
3. All the information can be found
on the internet.

10
Let’s Assess
I. Multiple Choice:
Directions: Read and answer the questions below carefully. Circle the letter of
your choice.

1. Which of the following website and applications where a user can communicate,
create, and share content, and participate in online communities?
A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media
2. Which of the following is used to develop a web document?
A. DNS C. HTTP
B. URL D. HTML
3. Which version of the web allows users to interact with another web page?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
4. Which of the following emerging trends in ICT allows the broadcasting of short
messages.
A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media
5. It is a platform that assists a person with a disability.
A. Assistive Media C. Convergence
B. Social Media D. Semantic Web

II. True or False


Directions: Write “True” if the statement is true and write “False” if the statement
is false.

______ 1. It is right to copy the works of other people without asking permission.
______ 2. All Information from the internet is free.
______ 3. A search engine is a tool used in internet research.
______ 4. All information from the internet is reliable.
______ 5. Google is an example of a search engine.
______ 6. Child pornography is a form of cybercrime.
______ 7. Committing a crime on the internet is not punishable by law.
______ 8. Do not share personal information with suspicious websites or users.
______ 9. Share your password with anyone.
______10. Think before you click.

11
Answer Key
Let’s Practice Let’s Do More

*** Answers of the student may vary*** Answers of the student


*** Answers of the student may vary***
may vary

Reflective Question: Reflective Question:


*** Answers of the *** Answers of the
Answers of the student
student may vary*** student may vary***
may vary

Reflective Question:
*** Answers of the
student may vary***

*** Answers of the student may vary*** *** Answers of the student may vary***

Let’s Try / Let’s Assess


Test I. Test II. True or False

1. B 5.A 1. False 6. True


2. False 7. False
2. D
3. True 8. True
3. C 4. False 9. False
4. C 5. True 10. True

References
Website
Sanchez, Martha Jean. 2020. www.statistica.com. July 19. Accessed April 5, 2021.
https://www.statista.com/statistics/490455/number-of-philippines-facebook-
users/#:~:text=In%202018%2C%20the%20amount%20of%20Facebook%20users%20in,to%20grow%
20up%20to%2049.9%20million%20in%202023.

Module
Econg, Newlove N. 2020. Empowerment Technology, Quaerter 1 - Module 1 "Information and
Communication Technology". Zone 1, Upper Balulang, Cagayan de Oro City: Department of
Education - Region 10.
12
FEEDBACK SLIP
A. FOR THE LEARNER
Thank you very much for using this Module. This learner’s
material is aimed at ensuring your worthwhile learning through the
help of your family members. For feedback purposes, kindly answer YES NO
the following questions:

1. Are you happy and contented with your learning experiences


using this module?

2. Were you able to follow the processes and procedures that


were indicated in the different learning activities?

3. Were you guided by anybody from your family while using this
module?

4. Was there any part of this module that you found difficult? If
yes, please specify what it was and why.

B. FOR THE PARENTS / GUARDIANS


Do you have any suggestions or recommendations on how we
can make improvements to this module to better serve the learners?

Yes (Please indicate what this is/these are.)

None

Contact Number: __________________________________

NAME OF SCHOOL:

Teacher’s Name and Signature:

Parent’s / Guardian’s Name and Signature:

Date Received:

Date Returned:

13

You might also like