You are on page 1of 23

11

Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills
11

Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills

Module in Empowerment Technologies


Author: MARIA BUENASGRACIA O. NOBLETA

2
What I Need to Know

This module was designed and written with you in mind. It is here to help you
master the Empowerment Technologies. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.

The module is divided into Two lessons and five sub topics, namely:
• Lesson 1 – Information and Communication Technologies
▪ Lesson 1.1 – ICT in the Philippines
▪ Lesson 1.2 – ICT, Me, and my Community
▪ Lesson 1.3 - Web 2.0: Dynamic Web Pages
▪ Lesson 1.4 - Web 3.0 and the Semantic Web
▪ Lesson 1.5 - Trends in ICT
• Lesson 2 – Online security, safety, and ethics
▪ Lesson 2.1 – Internet Threats
▪ Lesson 2.2 – Protecting reputations online
▪ Lesson 2.3 – Copyright
• Lesson 3 – Contextualized Online Search and Research Skills

After going through this module, you are expected to:


1. create a foundation of understanding of the world of ICT;
2. understand and demonstrate the proper etiquette in using
ICT;
3. demonstrate appropriate skills in using several computer applications,
4. discover opportunities where one can use these skills in real-world scenarios;
and
5. collaboratively create an online portal.
6. Consider one’s and others’ safety when sharing information using the
Internet;
7. Consider one’s and others’ reputation when using the Internet;
8. Determine and avoid the dangers of the internet;
9. Be responsible in the use of social networking sites; and
10. Browse the internet efficiently and properly through proper referencing.

3
Unlocking of Difficulties

The following are the terms you will encounter with this module:

Key Terms

• Web 1.0- static website without interactivity


• Web 2.0- websites that contain dynamic content
• Web 3.0- a concept of the World Wide Web that is
designed to
cater to the individual user
• Static-refers to the web that are the same
regardless of the user
• Folksonomy- allows users to categorize and
classify/ arrange information
• Hashtag- used to categorize posts in website
• Convergence- the synergy of technological
advancements to work
on a similar goal or task
• Social media- websites, applications, or online channels that enable
users to create, co-create, discuss, modify, and exchange user
generated content.

4
Lesson
Information and
1 Communication Technologies

Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to
locate, save, send, and edit information.

When we make a video call, we use the Internet. When we send


a text or make a call, we use cellular networks. When we run out of
load or battery, we use payphones which use a telephone network.
Having a unified way to communicate is one of the goals of ICT.
In terms of economics, ICT has saved companies a lot of
resources (time and money) with the kind of communication
technology they use, nowadays. In a similar way, we spend less
because of ICT. As it normally costs us a peso to send a text
message or SMS, with the Internet, we can send multiple
messages and only be charged by a fraction.

What’s In

- It deals with the use of different communication technologies such as


mobile phones, telephone, Internet to locate, save, send and edit
information.

ICT in the Philippines

Several international companies dub the Philippines as the "ICT Hub of Asia"
It is no secret that there is a huge growth of ICT-related jobs around the country, one
of which is the call center or BPO (Business Process Outsourcing) centers.

According to the 2013 edition of Measuring the Information Society by the


International Telecommunication Union, there are 106.8 cellphones per 100
Filipinos in the year 2012. That would mean that for every 100 Filipinos you meet,
there is a high chance that they have a cellphone and approximately for the seven of
them, they have two.

In a data gathered by the Annual Survey of Philippine Business and Industries


in 2010, the ICT industry shares 19.3% of the total employment population here in
the Philippines.

5
To add to these statistics, Time Magazines "The Selfiest Cities around the
World” of 2013 places two cities from the Philippines in the top 1 and top 10 spots.
The study was conducted using Instagram, a popular photo sharing application.

With these numbers, there is no doubt that the Philippines is one of the
countries that benefits most out of ICT.

• Philippines is dub as the “ICT Hub of Asia”


because of huge growth of ICT-related jobs, one of
which is BPO, Business Process
Outsourcing, or call centers
• ICT Department in the Philippines
is responsible for the planning, development and
promotion of the country's information and
communications technology (ICT) agenda in
support of national development.

Internet

• It is the global system of


interconnected computer
networks that use the Internet
protocol suite TCP/IP) to link
billions of devices worldwide.
• means of connecting a computer
to any other computer anywhere
in the world via dedicated routers
and servers.
• sometimes called simply "the Net," is a worldwide system of computer
networks - a network of networks in which users at any one computer
can get information from any other computer

World Wide Web


• an information system on the Internet that allows documents to be connected to
other documents by hypertext links, enabling the user to search for information
by moving from one document to another.
• is an information space where documents and other web resources are
identified by URLs, interlinked by hypertext links, and can be accessed via
the Internet.
• Invented by Tim-Berners Lee

Web Pages

• Web page is a hypertext document connected to the World Wide Web.


• It is a document that is suitable for the World Wide Web

6
Web Sites
• a location connected to the
Internet that maintains one or
more pages on the World Wide
Web.
• It is a related collection of
World Wide Web (WWW) files
that includes a beginning file
called a home page.

Web Browser
• It displays a web page on a monitor or mobile device
• is a software application for retrieving, presenting,
and traversing information resources on the World
Wide Web.

Static Web Pages

• Static is Web 1.0


• Dynamic is Web 2.0, 3.0
• Static web page is known as flat page or stationary page in the sense that
the page is “as is” and cannot be manipulated by the user.
• The content is also the same for all users that is referred to as Web 1.0

7
Dynamic Web Pages
• web 2.0 is the evolution of Web 1.0 by adding
dynamic web pages
• The user is able to see website differently than
others e.g social networking sites, wikis, video
sharing sites
• Web 2.0 allows users to interact with the page,
the user may be able to comment or create a
user account
• Most website the we visit today are Web 2.0

Static vs. Dynamic Web Page


• Static" means unchanged or constant, while "dynamic" means changing or
lively.
• A static site is one that is usually written in plain HTML and what is in the
code of the page is what is displayed to the user. A dynamic site is one that
is written using a server-side scripting language such as PHP, ASP, JSP, or
ColdFusion.

Features of Web 2.0


1. Folksonomy- allows user to categorize and classify information using freely
chosen keywords e.g tagging by Facebook, twitter, use tags that start with the
pound sign #, referred to as hashtag
2. Rich User Experience- content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able
to put content. Others are able to place a content of their own by means of
comments, reviews, and evaluation e.g lazada.com, amazon.com
4. Long Tail- services that are offered on demand rather than on a one-
time purchase. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spent in the Internet, or a data
plan that charges you for the amount of bandwidth you used.
5. Software as a Service- users will be subscribe to a software only when
needed rather than purchasing them e.g Google docs used to create and
edit word processing and spread sheet.
6. Mass Participation- diverse information sharing through universal
web access. Web 2.0’s content is based on people from various cultures.

Web 3.0 and Semantic Web


• Semantic Web is a movement led by the World Web Consortium (W3C).

8
• The W3C standard encourages web developers to include semantic content
in their web pages.
• Semantic web is a component of Web 3.0
• Semantic web provides a common framework that allows data to be shared
and reused across application, enterprise, and community boundaries.
• The aim of web 3.0 is to have is to have machines or servers understand the
user’s preferences to be able to deliver web content specifically targeting the
user.

Web 3.0 is yet to be fully realized because of several problems:

1. Compatibility. HTML files and current web browsers could not support Web
3.0.
2. Security. The user's security is also in question since the machine is saving
his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words "old" and "small would
depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer
to be able to predict what the user is referring to at a given time.

Trends in ICT

2. Convergence- is the synergy of technological advancements to work on a


similar goal or task
3. Social media- is a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange user-generated
content.

Six Types of Social Media:

a. Social Networks- these are sites that allow you to connect with other
people with the same interests or background.
b. Bookmarking Sites- these are sites that allow you to store and manage
links to various websites and resources.
c. Social news- these are sites that allow users to post their own news
items or links to other news sources. The users can also comment on the
post and comments may also be ranked.
d. Media Sharing- these are sites that allow you to upload and share media
content like images, music, and video.
e. Mircoblogging- these are sites that focus on short updates from the
user. Those subscribed to the user will be able to receive these updates.
f. Blogs and Forums- these websites allow users to post their content.
Other users are able to comment on the said topic.
4. Mobile Technologies- popularity of smartphones and tablets. Latest
mobile devices use 4G Networking LTE, which is currently the fastest
mobile network. Mobile devices use different operating systems

9
• iOS
• Windows Phone OS

• Symbian
• Android

• Web OS
• Blackberry OS
• Windows Mobile

5. Assertive Media- is a nonprofit service designed to help people who


have visual and reading impartments. A database of audio recordings
is used to read to the user.

References

For educational purposes only; All rights reserved for rightful owners

• Empowerment Technologies by Innovative Training Works, Inc. and Rex


Bookstore ISBN 978-971-23-7830-0; Published, Copyright 2016 and
distributed by rex Book Store, Inc. (RSBI)
• Reygie Fabro-College Instructor at Divine Word College of Laoag; Published
on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology

2
Lesson

2 Rules of Netiquette

What’s In

How many hours do you spend on the Internet per day? Can you live without
the Internet for a week? How many aspects of your life depend on the Internet? How
many times have you complained about your Internet connection
speed? As teenagers, you are all exposed to many things powered by
the Internet. Whether it is socializing, playing games, reading sports
news, shopping, etc., the Internet has given you one of the most
powerful tools that your parents, during their teenage years,
did not have. Because of this, do you not think that it is also
important to wield this powerful tool properly? Without proper
training, a swordsman can easily injure himself when
wielding a swordsman, the same could be said for you
whenever you use the Internet.

What’s New

• Lesson 2 – Online security, safety, and ethics


• Lesson 2.1 – Internet Threats
• Lesson 2.2 – Protecting reputations online
• Lesson 2.3 – Copyright

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to promote your business, gain
Online Safety and Security new friends, and stay in touch with the old ones. It is also
a source of entertainment through games, online communities, and everything in
between. But like most things in this world there is always the 'other side of the coin

The Internet is one of the most dangerous places especially if you do not know what
you are doing with it. But there is no need to worry: it is never that late. Hopefully,
by the end of this lesson, you are able to consider how you go about your use of the
Internet.
Let us go back to the "How Safe Are You?" test.

Let us visit each item and see how risky it is to share them. pe of information Risks
There is a risk in sharing your

The Internet, truly, is a powerful tool. It can be used to promote your business, gain
Online Safety and Security new friends, and stay in touch with the old ones. It is also
a source of entertainment through games, online communities, and everything in
between. But like most things in this world there is always the 'other side of the coin

The Internet is one of the most dangerous places especially if you do not know what
you are doing with it. But there is no need to worry: it is never that late. Hopefully,
by the end of this lesson, you are able to consider how you go about your use of the
Internet.
Let us go back to the "How Safe Are You?" test.

Let us visit each item and see how risky it is to share them. pe of information Risks
There is a risk in sharing your

First name There is a risk in sharing your first name.


Chances are, a hacker may already know
plenty of stuff about you even if you only
give out your first name. Likewise, you
cannot just walk in a room and start
introducing yourself to everyone. You do
not know whom you can come across with.

Last name If sharing your first name is a small risk, having


both your first and last is riskier. You will be
vulnerable to being searched for using search
engines, which include image search. Matching
a name with a face is modus to several
cybercrimes like identity theft.

Middle name
Sharing your middle name alone is probably
not the riskiest of this shared information,
but sharing your full name would be.

Current
and
Previous Most people who steal identities study their
Schools subject. They can use this information for
verification purposes.
Your Your cellphone number should never be posted
cellphone over the Internet. The Internet number is a
numbers public place. It is the same as posting your
number on a billboard. You would not want
random strangers to text or call you, or worse,
pretend that they are someone else.

The name Risky yet not as risky as posting their full names,
of your especially your mother's maiden name. In fact, you
mother and may have already encountered many websites that
father. require your mother's maiden name as an answer
to a secret question whenever you lose your
password.

The name
Disclosing this is a huge risk. Strangers may
of your
pretend or use their identity to dupe you.
siblings.

Your Hopefully, you answered "no" to this one. Giving


address the Internet your number is one thing; giving them
your address is a whole other level. It would be
much easier for criminals to find you.

Your home This shared information is riskier than sharing


phone your personal phone number. Scams usually
number. use this information to deceive you, one of
which is when a stranger pretends to know your
parents or pretends to be you.

Your Letting people know your birthday is probably a


birthday must if you want to get as many gifts as possible.
But having it in your profile makes you vulnerable
to identity theft.
What is It

TEN RULES OF NETIQUETTE

Rule no. 1: Remember the human


Rule no. 2: Adhere to the same standards online that you follow in real life.
Rule no. 3: Know where you are in cyberspace.
Rule no. 4: Respect other people’s time and bandwidth.
Rule no. 5: Make yourself look good online.
Rule no. 6: Share expert knowledge
Rule no. 7: Help keep flame wars under control
Rule no. 8: Respect other people’s privacy.
Rule no. 9: Don’t abuse your power
Rule no. 10: Be forgiving of other people’s mistake.

RULES OF NETIQUETTE
What is It

• Lesson 2 – Online security, safety, and ethics


• Lesson 2.1 – Internet Threats
• Lesson 2.2 – Protecting reputations online
• Lesson 2.3 – Copyright
• Lesson 2.4 – Contextualized online research skills
What is It

• Lesson 2 – Online security, safety, and ethics


• Lesson 2.1 – Internet Threats
• Lesson 2.2 – Protecting reputations online
• Lesson 2.3 – Copyright
What is It

• Lesson 2 – Online security, safety, and ethics


• Lesson 2.1 – Internet Threats
• Lesson 2.2 – Protecting reputations online
• Lesson 2.3 – Copyright
• Lesson 2.4 – Contextualized online research skills
Lesson
Contextualized Online Search
3 and Research Skills

Being a vast sea of information is one of the key features of the


Internet. it is such a big repository of data that is believed that one could
find out something about anything on the internet. Developing the
necessary knowledge and skills in online searching, however, is the
key to maximizing its use.i

What’s New

“Googling”

Indeed, Google might be our “friend” but using search


engines for the sake of plain information could actually lead
you misinformed.
In order to stay meaningfully informed, you should start appreciating the use of the
right combination of words or key phrases.

SEARCH ENGINE

A search engine is a software system designed to search the Internet for documents
related to the keyword or search word used or entered into the system. Users are
able to maximize the potential of search engines by learning the proper searching
protocols.ii

TYPES OF SEARCH ENGINES

❑ Crawler-based search engine - It uses


a spider or a crawler to search the
Internet. The crawler digs through
individual web pages, pulls out
keywords, and then adds the pages to
the search engine's database. Google
and Yahoo are its examples.
❑ Directories - depend on human editors to create their listings or database.
There are two types of directories: (1) academic and professional directories
which are often created and
maintained by subject experts to
support the needs of researchers;
and (2) commercial and portal
directories that cater to the general
public and are competing for
Internet traffic.
❑ Hybrid search engine uses both
crawler based searches and
directory searches to obtain their
results.
❑ Meta search engines - transmit user supplied keywords simultaneously
to several individual search engines to carry out the search. In this type of
search engine, duplicates can be eliminated and clustering by subjects
within search is implemented.iii

ONLINE RESEARCH

In the Philippines, copyrights only last a lifetime (of the author) plus 50 years.
There are also provisions for “fair use”.

❑ Have a question in mind- Focus on a question you want answered.


❑ Narrow it down- Search engines like Google, Bing, or Yahoo use several
filters to determine the most appropriate result for you.
❑ Advanced Search- The best way to filter information you get from
search engines is by using the advanced search.
❑ Look for a credible source- Some wikis, filled with
updated information, are not a credible source. When
using wikis, check out
the link of the cited texts.
❑ Give credit- Give credit to the original author of the
page or information. To properly site a reference, you
may use the format below

Symbol Function
Finds web pages that contain all the terms that are preceded by
+ the + symbol; allows you to include terms that are usually
ignored
““ Finds the exact words in a phrase
() Finds or excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases
NOT or - Excludes web pages that contain a term or phrase
References

For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN
978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Patronage of Mary Development School (PMDS), Published on May 6, 2020;
https://www.slideshare.net/arias201625/empowerment-technologies-lesson-
2?qid=45c533b4-a83e-4e70-ae13-92c5b3b8b650&v=&b=&from_search=3
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 1.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 2.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 3.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 367,
paragraph 3.

i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.

You might also like