You are on page 1of 7

Subject: Empowerment Technologies

Teacher:
Week: 1

LESSON 1: INTRODUCTION TO ICT

LESSON OBJECTIVES
At the end of the lesson, you should be able to:
1. Recognize different online platforms and sites.
2. Compare and contrast the nuances of varied online platforms, sites, and content to achieve
specific class objectives best or address situational challenges.
Activity 1.1
Directions: Read and reflect each item carefully. State whether you agree or disagree to each of the
statements by drawing a happy face ( ) if you agree and a sad face (☹) if you disagree. There are no right or
wrong answers for this activity. Write your answers on your notebook.

What is it?

ICT– Information and Communication. Deals with the use of different communication technologies such as
mobile phones, telephone, internet to locate, save, send and edit information. It is a study of computers as
data processing tools. It introduces students to the fundamental of using computer systems in an internet
environment.
ICT in the Philippines. Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related
jobs, BPO, Business Process Outsourcing, or call centers. ICT Department in the Philippines is responsible for
planning, developing, and promoting the country’s information and communications technology (ICT) agenda
in support of national development.
Computer– is an electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that use the internet protocol suite
(TCIP/IP) to link billions of devices worldwide. A means of connecting a computer to any other computer
anywhere in the world via dedicated routers and servers. It is sometimes called simply ‘’the Net’’ and is a
worldwide computer network system- a network of networks in which the users at any one computer can get
information from any other computer.
World Wide Web
An information system on the internet that allows documents to be connected to other documents by
hypertext links, enabling the user to search for information by moving from one document to another. It Is an
information space where documents and other web resources are identified by URLs, interlinked by
hypertext links, and can be accessed via the internet. Invented by Tim-Berners Lee
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that is suitable for
the World Wide Web.
The different online platforms of World Wide Web:

1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web
pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others. Also allows users to interact with the page; instead of just reading the page,
the user may be able to comment or create user account.
3. Web 3.0 – this platform is all about semantic web. It aims to have machines (or servers) understand
the user’s preferences to be able to deliver web content.

Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be
manipulated by the user. The content is also the same for all users that is referred to as Web 1.0

Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to
see website differently than others e.g. social networking sites, wikis, video sharing sites.

Activity 1.2 STATIC VS DYNAMIC


Look for ten websites and classify them as static or dynamic. What makes each website static or dynamic? Use
the table below.
Website URL Static Dynamic Reason

FEATURES OF WEB 2.0

1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g.
tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put content. Others
are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada,
Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in the
internet.
5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s content is
based on people from various cultures.

TRENDS IN ICT

1. Convergence– is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now use your
smartphone.
2. Social Media– is a website, application, or online channel that enables web users web users to create
, co-create, discuss modify, and exchange user generated content.

Six types of Social Media:

1. Social Networks – These are sites that allows you to connect with other people with the same
interests or background. Once the user creates his/her account, he/she can set up a profile, add
people, share content, etc.
Example: Facebook and Google+
2. Bookmarking Sites – Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
Examples: StumbleUpon, Pinterest
3. Social News – Sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be rank.
Examples: reddit and Digg
4. Media Sharing – sites that allow you to upload and share media content like images, music and
video.
Examples: Flickr, YouTube and Instagram
5. Microblogging – focus on short updates from the user. Those that subscribed to the user will be
able to receive these updates.
Examples: Twitter and Plurk
6. Blogs and Forums – allow user to post their content. Other users can comment on the said topic.
Examples: Blogger, WordPress and Tumblr

3. Mobile Technologies– The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices' capability to do the tasks that were originally found in
PCs. Several of these devices are capable of using a high-speed internet. Today the latest model
devices use 4G Networking (LTE), which is currently the fastest.

MOBILE OS

a) iOS – use in apple devices such as iPhone and iPad


b) Android – an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.
c) Blackberry OS – use in blackberry devices
d) Windows phone OS – A closed source and proprietary operating system developed by
Microsoft.
e) Symbian – the original smartphone OS. Used by Nokia devices
f) WebOS- originally used in smartphone; now in smart TVs.
g) Windows Mobile – developed by Microsoft for smartphones and pocket PCs

4. Assistive Media– is a non- profit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user. e.g. Yahoo!, Gmail,
HotmailCloud computing-distributed computing on internet or delivery of computing service over
the internet.

Activity 1.3 Your turn to shine


Answer the following:

1. Why do you think microblogging platforms have become popular when regular blogging platforms
already exits?
2. What do you think of web 3.0? Do you think it will be realized someday in the future?

Assessment
True or False: Write T if the sentence is correct; otherwise write F.

1. Tim Burners-Lee created the world wide web.


2. People Magazine conducted the research on “The Selfiest Cities in the World”.
3. Web 2.0 intruduce static web pages that allow users to interact with the web page.
4. Folksonomy allows users to categorize and locate information
5. Technological convergence is the synergy of technological advancements to work on similar goal or
task.
6. According to Nielsen, users who use the internet spend more time in social media sites than in any
other type of site.
7. Blogging sites are sites that focus on short updates from users.
8. Android is a mobile operating system for Apple devices.
9. Assistive media is a nonprofit service designed to help people who have visual and reading
impairments.
10. Information and Communication Technology (ICT) deals with the use of different communications
technology to locate, save, send, and edit data.
LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

LESSON OBJECTIVES
At the end of the lesson, you should be able to:
1. Identify what constitutes appropriate and inappropriate online behavior
2. Apply online internet safety, security ethics and etiquette standards and practice in the use of
ICTs
3. Discern possible deceptive information and wrongly evaluated data.

Activity 2.1 How safe are you?


Directions: Most of us use the Internet every day. Sometimes, we do not pay attention on how much
information we share online. Below is a questionnaire about how much information you have shared so far.
Put a check (✓) under Shared or Not Shared.

Type of information Shared Not Shared


1. First Name
2. Last name
3. Middle Name
4. Current and Previous
5. Cellphone Number
6. The name of your
Mother and Father
7. The name of your
siblings
8. Your Address
9. Your home phone
number
10. Your birthday

What Is It?
INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.

TEN RULES OF NETIQUETTE


Rule No. 1: Remember the human.
You need to remember that you are talking to a real person when you are online. The
internet brings people together who would otherwise never meet. Remember this saying when
sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life. You need to remember that
you can get caught doing things you should not be doing online just like you can in real life. You are
still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
Always take a look around when you enter a new domain when surfing the web. Get a sense
of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
Remember people have other things to do besides read your email. You are not the center of
their world. Keep your post and emails to minimum by saying what you want to say. Remember
everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
Be polite and pleasant to everyone. Always check your spelling and grammar before posting.
Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge.
Ask questions online; Share what you know online; Post the answers to your questions
online because someone may have the same question you do.
Rule no. 7: Help keep flame wars under control
Netiquette does not forgive flaming. Netiquette does however forbid people who are flaming
to hurt discussion groups by putting the group down.
Rule no. 8: Respect other people’s privacy.
Do not read other people’s mail without their permission. Going through other people’s
things could cost you, your job or you could even go to jail. Not respecting other people’s privacy is a
bad netiquette.
Rule no. 9: Don’t abuse your power.
Do not take advantage of other people just because you have more knowledge or power than
them. Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
Do not point out mistakes to people online. Remember that you were once the new kid on
the block. You still need to have a good manners even though you are online and cannot see the
person face to face.

INTERNET SECURITY

Security Requirement Triad

Confidentiality. Data confidentiality and Privacy


Integrity. Data integrity and System integrity
Availability.

Threat Consequence Threat Action (Attack)


Unauthorized Disclosure. A circumstance or event Exposure: Sensitive data are directly released to an
whereby an entity gains access to data for which unauthorized entity.
the entity is not authorized. Interception: An unauthorized entity directly
accesses sensitive data traveling between
authorized sources and destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses sensitive
data by reasoning from characteristics or
byproducts of communications.
Intrusion: an unauthorized entity gains access to
sensitive data by circumventing a system’s security
protections.
Disruption. A circumstances or even that Incapacitation: prevents or interrupts system
interrupts or prevents the correct operation of operation by disabling a system component.
system services and functions. Corruption: Undesirably alters system operation
Deception. A circumstance or event that may result by adversely modifying system functions or data.
in an authorized entity receiving false data and Obstruction: A threat action that interrupts
believing it to be true. delivery of system services by hindering system
operation.
Masquerade: An unauthorized entity gains access
to a system or performs a malicious act by posing as
an authorized entity.
Falsification: False data deceive an authorized
entity.
Repudiation: An entity deceives another by falsely
denying responsibility for an act.
Usurpation. A circumstances or event that results Misappropriation: An entity assumes
in control of system services or functions by an unauthorized logical or physical control of a
unauthorized entity. system resource.
Misuse: Causes a system component to perform a
function or service that is detrimental to system
security.
Types of System Intruders
Masquerader
Hackers
Clandestine user

Parts of Virus
Infection mechanism
Trigger
Payload

Virus stages
Dormant phase: Virus is idle.
Propagation phase: Virus places an identical copy of itself into other programs or into
certain system areas on to the disk.
Triggering phase: Virus is activated to perform the function for which it was intended.
Caused by a variety of system events
Execution phase: Function is performed

KEY TERMS

 Cyber crime- a crime committed or assisted through the use of the Internet.
 Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
 Malware- stands for malicious software.
 Virus- a malicious program designed to transfer from one computer to another in any means
possible.
 Worms– a malicious program designed to replicate itself and transfer from one file folder to another
and also transfer to other computers.
 Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
 Spyware– a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
 Adware- a program designed to send you advertisement, mostly pop-ups.
 Spam– unwanted email mostly from bots or advertisers.
 Phishing- acquires sensitive personal information like passwords and credits card details.
 Pharming- a more complicated way of phishing where it exploits the DNS system.
 Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent
is punishable by law.
 Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
 Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any
other sensitive information.
 Rogue security softwares– is a form of malicious software and internet fraud that misleads users
into believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.

Four search strategies

1. Keyword searching
Enter terms to search

Use quotation marks to search as a phrase and keep the words linked together

Common words are ignored (That, to, which, a, the …)

+ and – can be used to include or exclude a word

2. Boolean
AND – enter words connect with AND- it will include sites where both words and found.
Uses: joining different topics (i.e. global warming AND California)
OR - requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)

3. Question. A question may be entered in the search field of search engine.

4. Advanced. Features are offered on many engines by going to an “Advanced search” page and making
selections. Effective in narrowing search returns to a specific topic or phrase.

Activity 2.2 Your time to Shine


1. Do you think that the internet is safe? Why or why not?
2. How do you feel if someone posted something embarrassing about you?What would you do?

ASSESSMENT

Matching Type: Match Column A with Column B. Write the letter of the correct answer.

A a. Designed to send you advertisements


b. Sends an official-looking email and is designed to steal sensitive
1. Virus personal information
2. Rogue c. A provision that allows you to use copyrighted work without
3. Keylogger consent with certain limitations
4. Adware d. A browser feature that is synonymous to “private” browsing
5. Spam e. Replicates and can transfer from one computer to another
6. Phishing f. Exploits the DNS system
7. Fair use g. States that anyone who uses your work without your consent is
8. Spyware punishable by law
9. Private h. Runs in the background and monitors what you are doing
10. Malware i. Unwanted email mostly from bots
11. Incognito j. Disguised as a useful program but is not
12. Internet k. The information superhighway
13. Trojan l. Tricks the user into posing that it is a security software
14. Copyright m. A malicious software
15. Pharming n. An option to hide a post so that search engines could not scan it
o. Used to record the keystroke done by the user
Resources:

Regisjoyce. (2018, April 01).


Empowerment Technologies
LESSONS 1-15. Retrieved October 01, 2020, from https://ictcom444251764.wordpress.com/2018/03/31/empowerment-
technologies-lessons-1-15/

Introduction to Information and Communication Technologies. (2016). In Empowerment Technologies (First ed., pp. 5-15).
Manila: Rex Book Store.

Rules of Netiquette. (n.d.). In Empowerment Technologies (First ed., pp. 31-33). Manila: Rex Book Store.

You might also like