You are on page 1of 9

Home Economics

and Livelihood Education


^ Kfo12 EDITION

The Basics
of Better Family Living
Ruth A. Arsenue ■ Yolanda L.Quiambao ■ Gloria A. Peralta, Ed.D.
Grace B. Azarcon ■ John E. Mora Author-Coordinator
C a t a lin a R. In n la n ■ D n n H n n M P a n u in

Property of: JAIFE E. MACARAEG


FREE TO USE & NOT FOR SALE
nformation and communications technology has provided
I society with a huge range of new communication
capabilities, competence, and experiences. It allows people
in different locations to communicate in real-time through
the use of technologies such as instant messaging, blogging,
chatting, and audio-video conferencing and the like. ICT has
also transformed how people do business nowadays through
online shops. It allows small businesses to earn profit and at
OBJECTIVES
• Dlfe the same time empower individuals including many women to
safety «Jtes w im i using generate income for their family. Although ICT has brought
thi Internet many benefits and conveniences, there are many things to be
• Kxilnptets the dang&s considered and special precautions that need to be followed.
internet and && ways These include safety rules to protect individuals interest.
on !«*«I©awkf Jtw, This lesson will be focusing on the responsible, safe, and
• tel nil shut ethical use of different technologies such as wikis, blogs, social
mattcs^te; using Megs
and i*$w resourass media, email, and audio-video conferencing. It will discuss how
online 'm a s#fe and business industries have benefitted and how they have made
t£3$&ns$»leway< operations easier and more efficient.
• J#» to i ^kte© and
audio conferencing In
a and m$mM§ SQMETH1MG.IQ.IHMK.ABQti.1 ____ ________ _____ _____ _________
mm. » How can you utilise ICT skills and knowledge effectively and
responsibly to help you meet your daily needs?

Property of: JAIFE E. MACARAEG


FREE TO USE & NOT FOR SALE
Hie realm of business has changed since the advent of ICT.The ENDYOU KNOW?
following are some benefits that technology can provide to en­ • Usefet Tjte- x
terprises: dc;r* u
» Efficient Management and Increased: Productivity f j r
I $ iKlstti
Technology can improve management efficiency in terms of t e l cm fee tasigf
se-w m tewsts
monitoring, planning, accountancy, stock control, inventory, and, T"*
thereby, increase productivity. ’'ft *
» Increased Collaboration tat '-3t~ r c- cus
Technology facilitates the exchange of ideas and designs, saves itessst w
time, energy, and resources, and allows increased collaboration F§r&
among people in business resulting in greater output.
* Increased Communication
s
Technology allows real time communication across continents •$mmm wsmUm
and time zones. It facilitates better communication and ex­ ‘vuvs '
change of information between clients and providers with the
use of email, social media, blogs, and websites.
» Better Customer Satisfaction
Technology allows for better management, recovery, recording,
and reporting of clientele data and information. Information
technology helps build and maintain a system for managing
customer data.
Some of the popular online tools that can be used for business
today include the following:
» Wiki
A wiki is a website that allows Internet users to contribute, delete,
make changes, or correct information on the content by signing up.
*
A blog site is a kind of website that contains online personal
reflections, comments, and hyperlinks provided by the writer or
contributor. A user can create a blog by making a page from a
website that supports blogging and update it. A blogger is the
person who maintains a blog site.
» Email
Email is short for electronic mail. It is an electronic message
sent from one device to another. Through email, a person can
15
Property of: JAIFE E. MACARAEG
FREE TO USE & NOT FOR SALE
send and receive personal and business-related messages with
attachments, such as images and documents.
» Teleconference
Teleconference is a type of meeting involving three or more
people in different locations by using computer networks capable
of transmitting audio and video data.
Internet Safety
The Internet is a quick and convenient way to learn and
communicate with friends and other people. It is also very
helpful in doing business but it is important to be safe online.
It is a resource of information but it is important to ensure that
one goes to trusted sites sources. There are may unscrupulous
individuals who put up false information or use other people’s
personal information for illegal activities.
The following are some safety tips a person can follow when
going online:
• Make sure all personal information and passwords are kept
private. Never put any contact details online and ensure pass­
words are difficult to guess.
• Never meet up with people you only know online. Meeting
someone from chat rooms and social networking sites could
be dangerous.
• Do not open emails from strangers and unknown sources.
Email and attachments may contain viruses or threats that
can harm your computer.
• Not all information online is reliable. There are lots of
information on the Internet that are not true. Always check
or verify all information and data. The best way to do this
is to check the website and make sure it is a reliable source.
Example of such are educational institutions, government
offices, established business institutions, and the like.
• Tell a trusted adult if anything online makes you feel
uncomfortable or threatened.

Property of: JAIFE E. MACARAEG


FREE TO USE & NOT FOR SALE
Dangers and Threats on the Internet
When you connect to the Internet, you may encounter threats
and viruses that can harm your computer, destroy files, and cause
the loss of data that are saved into it. The following are some of
the dangers and threats on the Internet that need to be avoided.
» Spam Email
This is also known as junk email, which involve unsolicited com­
mercial correspondence flooding your account.
» Spyware
This is a computer program installed secretly on a personal
computer to collect information or even take control over the
computer without the owner’s knowledge.
» Pharming
This is a dangerous hacker attack on a website which leads all
traffic intended for that website to another dummy website.
» Computer Virus
This is a malicious program that infects and destroys a computer
system.
» Hacker
This is a person who is entering and controlling other people’s
computer system without permission to sabotage a person’s
website or steal personal information.
Some of the safety and responsible practices in using wikis,
blogs, and audio-video conferences are:
• Use the computer or mobile device for learning, studying,
and researching for information.
• Keep your password safe.
• Follow age restrictions and policies. Participants usually need
to be older than 13 years of age.
• Show respect for others online and their work.
• Do not copy other people’s work. If you want to use material
from someone else, make sure to ask permission and cite the
author or source.

Property of: JAIFE E. MACARAEG


FREE TO USE & NOT FOR SALE
• When posting your own materials and pictures make sure
to use a watermark to show ownership. Indicate your own
policies regarding use of these materials by others.
• Do not make untrue and/or damaging remarks that embar­
rass others.
• Do not use other people’s accounts.
• Do not share another person’s full name or send his or her
photo without permission.
• Be careful in sharing your personal information.
• If you are the moderator, post the rules for the participants; if
you are a participant, follow the rules or prescribed netiquette.
• Use your time wisely; if you are finished, log out, and turn off
the computer. Avoid playing unnecessary games.
More guidelines for budding entrepreneurs:
• For computer security, install and use a good anti-virus or
protection system especially for users who are always online.
You can download for free or purchase propriety anti-virus
software that is suitable for your needs.
• Be aware of the rules and regulations, laws, and accounting
standards of your country and other countries where you
intend to conduct your business. Remember, with ICT, you
can also do e-commerce.
• Be cautious of the messages that you receive. Some of them
may be scam or fake companies wanting to obtain money
from unsuspecting clients.
• Make sure employees are well-trained in the use of ICT and
practice responsible usage.
Remember
» Use ICT tools wisely and s

Property of: JAIFE E. MACARAEG


FREE TO USE & NOT FOR SALE
REVIEW
A. Form a group of six members. Write a short five-minute script and role-play an audio-video
conference in the business arena. For example, show a business owner communicating
with a supplier, or a manager communicating with the sales force, etc. Set up an audio­
video conference with your groupmates. You may search for and use a free software such
as Messenger to conduct an online collaboration and discuss your group work. Ask you
teacher's help and guidance as necessary.

B. Demonstrate online collaboration and communication using wikis and blogs.

RUBRICS
Score
Criteria
4 3 2 1

1. Participation

2. Presentation

3. Creativity

Total Score

C. Answer the following questions.


1. How will you use the computer safely when you are online?

2. How can one use the computer or mobile devices for business?

19
Property of: JAIFE E. MACARAEG
FREE TO USE & NOT FOR SALE
3. What are you supposed to do if you encounter unsafe and questionable content or
messages?

4. What dangers and threats can infect your computer and destroy files and data?

5. What are the rules and policies that you should follow to become a responsible digital
citizen?

6. What benefits do businesses enjoy from the use of ICT?

D. Choose and circle the correct answer.


1. A website that allows visitors to make changes, contributions, or corrections to content.
a. wiki c. blog
b. audio conference d. chat
2. A website that contains online personal reflections, comments, and hyperlinks provided by
the writer.
a. wiki c. blog
b. audio conference d. chat

20
Property of: JAIFE E. MACARAEG
FREE TO USE & NOT FOR SALE
3. A type of meeting involving three or more persons in different locations.
a. wiki c. blog
b. teleconference d. chat
4. What is the usual age limit for participants in most online messaging tools?
a. no age limit c. 13 years old and above
b. 10 years old and above d. 12 years old and above
5. Which one is not an example of a blog?
a. Blogger c. Weebly
b. Twiddla d. WordPress
6. Which of the following is an example of an application used to create a blog?
a. Blogger c. WordPress
b. Weebly d. a, b, and c.
7. It is the person who owns and maintains a blog site.
a. admin c. sender
b. blogger d. user
8. Which of the following can be sent by email?
a. documents c. videos
b. pictures d. a, b, and c.
9. What type of software can protect your computer from harmful attacks?
a. anti-virus c. spam
b. password d. spyware
10. Which of the following is not applicable to use in creating a blog?
a. blog.com c. livejournal.com
b. blogger.com d. webpress.com

E. Match the items in Column A with their equivalent in Column B. Write the letter of the
correct answer on the space provided.
Column A Column B
1. Junk Mail a. Email spam
2. Electronic Mail b. Pharming
3. Malicious program c. Computer virus
4. Dangerous hacker attack d. Email
5. Blog site activity e. Schemes
f. Blogging
g- Blogger

21
Property of: JAIFE E. MACARAEG
FREE TO USE & NOT FOR SALE

You might also like