Professional Documents
Culture Documents
Teacher:
Week: 1
LESSON OBJECTIVES
At the end of the lesson, you should be able to:
1. Recognize different online platforms and sites.
2. Compare and contrast the nuances of varied online platforms, sites, and content to achieve
specific class objectives best or address situational challenges.
Activity 1.1
Directions: Read and reflect each item carefully. State whether you agree or disagree to each of the
statements by drawing a happy face ( ) if you agree and a sad face (☹) if you disagree. There are no right or
wrong answers for this activity. Write your answers on your notebook.
What is it?
ICT– Information and Communication. Deals with the use of different communication technologies such as
mobile phones, telephone, internet to locate, save, send and edit information. It is a study of computers as
data processing tools. It introduces students to the fundamental of using computer systems in an internet
environment.
ICT in the Philippines. Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related
jobs, BPO, Business Process Outsourcing, or call centers. ICT Department in the Philippines is responsible for
planning, developing, and promoting the country’s information and communications technology (ICT) agenda
in support of national development.
Computer– is an electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that use the internet protocol suite
(TCIP/IP) to link billions of devices worldwide. A means of connecting a computer to any other computer
anywhere in the world via dedicated routers and servers. It is sometimes called simply ‘’the Net’’ and is a
worldwide computer network system- a network of networks in which the users at any one computer can get
information from any other computer.
World Wide Web
An information system on the internet that allows documents to be connected to other documents by
hypertext links, enabling the user to search for information by moving from one document to another. It Is an
information space where documents and other web resources are identified by URLs, interlinked by
hypertext links, and can be accessed via the internet. Invented by Tim-Berners Lee
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that is suitable for
the World Wide Web.
The different online platforms of World Wide Web:
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web
pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others. Also allows users to interact with the page; instead of just reading the page,
the user may be able to comment or create user account.
3. Web 3.0 – this platform is all about semantic web. It aims to have machines (or servers) understand
the user’s preferences to be able to deliver web content.
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be
manipulated by the user. The content is also the same for all users that is referred to as Web 1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to
see website differently than others e.g. social networking sites, wikis, video sharing sites.
1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g.
tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put content. Others
are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada,
Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in the
internet.
5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s content is
based on people from various cultures.
TRENDS IN ICT
1. Convergence– is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now use your
smartphone.
2. Social Media– is a website, application, or online channel that enables web users web users to create
, co-create, discuss modify, and exchange user generated content.
1. Social Networks – These are sites that allows you to connect with other people with the same
interests or background. Once the user creates his/her account, he/she can set up a profile, add
people, share content, etc.
Example: Facebook and Google+
2. Bookmarking Sites – Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
Examples: StumbleUpon, Pinterest
3. Social News – Sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be rank.
Examples: reddit and Digg
4. Media Sharing – sites that allow you to upload and share media content like images, music and
video.
Examples: Flickr, YouTube and Instagram
5. Microblogging – focus on short updates from the user. Those that subscribed to the user will be
able to receive these updates.
Examples: Twitter and Plurk
6. Blogs and Forums – allow user to post their content. Other users can comment on the said topic.
Examples: Blogger, WordPress and Tumblr
3. Mobile Technologies– The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices' capability to do the tasks that were originally found in
PCs. Several of these devices are capable of using a high-speed internet. Today the latest model
devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS
4. Assistive Media– is a non- profit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user. e.g. Yahoo!, Gmail,
HotmailCloud computing-distributed computing on internet or delivery of computing service over
the internet.
1. Why do you think microblogging platforms have become popular when regular blogging platforms
already exits?
2. What do you think of web 3.0? Do you think it will be realized someday in the future?
Assessment
True or False: Write T if the sentence is correct; otherwise write F.
LESSON OBJECTIVES
At the end of the lesson, you should be able to:
1. Identify what constitutes appropriate and inappropriate online behavior
2. Apply online internet safety, security ethics and etiquette standards and practice in the use of
ICTs
3. Discern possible deceptive information and wrongly evaluated data.
What Is It?
INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
INTERNET SECURITY
Parts of Virus
Infection mechanism
Trigger
Payload
Virus stages
Dormant phase: Virus is idle.
Propagation phase: Virus places an identical copy of itself into other programs or into
certain system areas on to the disk.
Triggering phase: Virus is activated to perform the function for which it was intended.
Caused by a variety of system events
Execution phase: Function is performed
KEY TERMS
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means
possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another
and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent
is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any
other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads users
into believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
1. Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
2. Boolean
AND – enter words connect with AND- it will include sites where both words and found.
Uses: joining different topics (i.e. global warming AND California)
OR - requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
4. Advanced. Features are offered on many engines by going to an “Advanced search” page and making
selections. Effective in narrowing search returns to a specific topic or phrase.
ASSESSMENT
Matching Type: Match Column A with Column B. Write the letter of the correct answer.
Introduction to Information and Communication Technologies. (2016). In Empowerment Technologies (First ed., pp. 5-15).
Manila: Rex Book Store.
Rules of Netiquette. (n.d.). In Empowerment Technologies (First ed., pp. 31-33). Manila: Rex Book Store.