Professional Documents
Culture Documents
Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills
11
Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills
What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in the
module.
This will aid in teaching competencies that are essential in the Information Age, such
as the state of ICT Technologies; online safety, security, ethics and etiquette;
productivity tools with advanced application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change,
which are aligned to the standards set by the Department of Education for the senior
high school level.
(This module contains information about: the massive world of Information and
Communication Technology (ICT) has continued to shape the world including the
Philippines. This unit allows you to discover the world of ICT in general and also helps
you improve your skills in various applications. It also creates several real-life
scenarios where you can use these applications and resources properly.
2
What I Need to Know
This module was designed and written with you in mind. It is here to help you
master the Empowerment Technologies. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.
The module is divided into Two lessons and five sub topics, namely:
• Lesson 1 – Information and Communication Technologies
▪ Lesson 1.1 – ICT in the Philippines
▪ Lesson 1.2 – ICT, Me, and my Community
▪ Lesson 1.3 - Web 2.0: Dynamic Web Pages
▪ Lesson 1.4 - Web 3.0 and the Semantic Web
▪ Lesson 1.5 - Trends in ICT
• Lesson 2 – Online security, safety, and ethics
▪ Lesson 2.1 – Internet Threats
▪ Lesson 2.2 – Protecting reputations online
▪ Lesson 2.3 – Copyright
• Lesson 3 – Contextualized Online Search and Research Skills
3
What’s New
Did you use the internet after you woke up this morning?
On your activity sheet, answer the questions.
1. How many times have you checked your phone this
morning?
2. How many status updates have you posted in FB
or Twitter today?
3. Did you use internet for an hour after you woke
up this morning?
4. Do you follow a celebrity via his/her social media
account?
Unlocking of Difficulties
The following are the terms you will encounter with this module:
Key Terms
4
What I Know
Choose the letter of the best answer. Write the chosen letter on a separate sheet of
paper.
1. A web page that allows interaction from the user
a. static c. social
b. dynamic d. comment
2. This refers to the feature where users are able to categorize and locate
information through tagging.
a. hashtags c. taxonomy
b. folksonomy d. rich user experience
3. A feature of a dynamic website that allows users to put their own content
a. rich user experience c. user participation
b. long tail d. mass participation
5. According to this magazine, two Philippine cities are part of the top 10 in their
research about “The Selfiest Cities around the World.”
a. People c. Reader’s Digest
b. Time d. Candy
9. This media is designed to help people who have visual and reading
impairments.
a. assistive c. bookmark
b. social d. accessibility
10. This type of social media website focuses on short updates posted by the user.
a. blogging c. social media
b. microblogging d. hashtagging
5
Lesson
Information and
1 Communication Technologies
Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to
locate, save, send, and edit information.
What’s In
Several international companies dub the Philippines as the "ICT Hub of Asia"
It is no secret that there is a huge growth of ICT-related jobs around the country, one
of which is the call center or BPO (Business Process Outsourcing) centers.
6
To add to these statistics, Time Magazines "The Selfiest Cities around the
World” of 2013 places two cities from the Philippines in the top 1 and top 10 spots.
The study was conducted using Instagram, a popular photo sharing application.
With these numbers, there is no doubt that the Philippines is one of the
countries that benefits most out of ICT.
What is It
To fully understand the importance of ICT, let us first look at our community. Look
for a small business around your community.
Conduct a short interview (via messenger) of the business owner using the
following guide:
Company/Establishment Name:
Address:
Nature of Business:
Guide Questions:
1. What are the different ways for customers and/or suppliers to contact you?
2. How often do you use a phone or cellular phone for business? Estimate
only.
3. Does your establishment have Internet connection? If yes, what is its
purpose? If no, would you consider having it in the future? Why or why
not?
4. Does your business have a website? if yes, how does it help the company?
If no, would you consider having one in the future? Why or why not?
5. If applicable) Would you consider giving free Wi-Fi access in the future?
If you already have it, does it help boost sales?
7
Internet
Web Pages
Web Sites
• a location connected to the
Internet that maintains one or
more pages on the World Wide
Web.
• It is a related collection of
World Wide Web (WWW) files
that includes a beginning file
called a home page.
8
Web Browser
• It displays a web page on a monitor or mobile device
• is a software application for retrieving, presenting,
and traversing information resources on the World
Wide Web.
9
Static vs. Dynamic Web Page
• Static" means unchanged or constant, while "dynamic" means changing or
lively.
• A static site is one that is usually written in plain HTML and what is in the
code of the page is what is displayed to the user. A dynamic site is one that
is written using a server-side scripting language such as PHP, ASP, JSP, or
ColdFusion.
1. Compatibility. HTML files and current web browsers could not support Web
3.0.
2. Security. The user's security is also in question since the machine is saving
his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
10
4. Vagueness. Certain words are imprecise. The words "old" and "small would
depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer
to be able to predict what the user is referring to at a given time.
Trends in ICT
a. Social Networks- these are sites that allow you to connect with other
people with the same interests or background.
b. Bookmarking Sites- these are sites that allow you to store and manage
links to various websites and resources.
c. Social news- these are sites that allow users to post their own news
items or links to other news sources. The users can also comment on the
post and comments may also be ranked.
d. Media Sharing- these are sites that allow you to upload and share media
content like images, music, and video.
e. Mircoblogging- these are sites that focus on short updates from the
user. Those subscribed to the user will be able to receive these updates.
f. Blogs and Forums- these websites allow users to post their content.
Other users are able to comment on the said topic.
4. Mobile Technologies- popularity of smartphones and tablets. Latest
mobile devices use 4G Networking LTE, which is currently the fastest
mobile network. Mobile devices use different operating systems
• iOS
• Windows Phone OS
• Symbian
• Android
• Web OS
• Blackberry OS
• Windows Mobile
11
What’s More
1. Why do you think microblogging platforms have become popular when regular
blogging becomes platforms already exist?
2. What do you think of Web 3.0? Do you think it will be realized someday in
the future?
Research on one momentous event in the Philippine history wherein ICT play
a huge role in making it a success.
3
Assessment
Post-Test
___ 1. Facebook
___ 2. Plurk
___ 3. Twitter
___ 4. Tumblr
___ 5. reddit
___ 6. Google+
___ 7. Instagram
___ 8. Pinterest
4
___ 9. Blogger
___ 10. StumbleUpon
3
Answer Key
References
For educational purposes only; All rights reserved for rightful owners
Name: Score:
Section: Date:
I. Pre-Test: Write Yes if you agree with the statement and No if you disagree
on the blank before each number.
2 Rules of Netiquette
Most of us use the Internet every day, Sometimes, we do not pay attention
on how much information we share online. Below is a questionnaire about
how much you have shared so far. Put a check (✓) under Shared or Not
Shared.
1. First name
2. Last name
3. Middle name
4. Current and previous school(s)
5. Your cellphone number
6. The name of your mother and
father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
How many checks did you have for Shared? You probably answered Shared in the
first two items. If that is the case, try using a search engine like Google then type
your first and last name. Did you get links to your profile page? Try switching to
image search. Did your pictures appear? If you have a unique name, chances are, it
did. Do not feel bad if it did not appear though; in fact, it is probably for your best
interest not to have pictures of yourself in a search engine.
So how did these things happen? How can search engines locate me? Is there any
danger of being found by search engines?
What’s In
How many hours do you spend on the Internet per day? Can you live without
the Internet for a week? How many aspects of your life depend on the Internet? How
many times have you complained about your Internet connection
speed? As teenagers, you are all exposed to many things powered by
the Internet. Whether it is socializing, playing games, reading sports
news, shopping, etc., the Internet has given you one of the most
powerful tools that your parents, during their teenage years,
did not have. Because of this, do you not think that it is also
important to wield this powerful tool properly? Without proper
training, a swordsman can easily injure himself when
wielding a swordsman, the same could be said for you
whenever you use the Internet.
What’s New
Middle name
Sharing your middle name alone is probably
not the riskiest of this shared information,
but sharing your full name would be.
Current
and
Previous Most people who steal identities study their
Schools subject. They can use this information for
verification purposes.
The name
Disclosing this is a huge risk. Strangers may
of your
pretend or use their identity to dupe you.
siblings.
What is It
RULES OF NETIQUETTE
Skill Exploration
Privacy Policies
Visit a social networking site and look for the site's privacy policy. The link is
typically found at the bottom of the page and sometimes labeled only as "Privacy:
Write a summary on how the website handles both your private and public
information.
What is It
What’s In
yourself challenge!!!
Guide Questions
“Googling”
SEARCH ENGINE
A search engine is a software system designed to search the Internet for documents
related to the keyword or search word used or entered into the system. Users are
able to maximize the potential of search engines by learning the proper searching
protocols.ii
In the Philippines, copyrights only last a lifetime (of the author) plus 50 years.
There are also provisions for “fair use”.
Symbol Function
Finds web pages that contain all the terms that are preceded by
+ the + symbol; allows you to include terms that are usually
ignored
AND or & Finds web pages that contain all the terms or phrases
What’s More
Self-Check 1.1.1
Each learner will create a Digital Poster that will show brief explanation in one
of the 10 Rules in Netiquette by Virginia Shea.
Assessment
Name: Score:
Section: Date:
Post-Test Matching Type: Match Column A with Column B. Write the letter of
the correct answer on the space before each number.
A B
___ 1. virus a) designed to send you advertisements
___ 2. rogue b) sends an official-looking email and is
designed to steal provision that allows you to
use copyrighted work sensitive personal
information
___ 3. keylogger c) without consent with certain limitations
___ 4. adware d) a browser feature that is synonymous to
"private" browsing
___ 5. spam e) replicates and can transfer from one
computer to another
___ 6. phishing f) exploits the DNS system
___ 7. fair use g) states that anyone who uses your work
without your consent is punishable by law
___ 8. spyware h) runs in the background and monitors what
you are doing
___ 9. private i) unwanted email mostly from bots
___ 10. malware j) disguised as a useful program but is not
___ 11. incognito k) the information superhighway
___ 12. internet l) tricks the user into posing that it is a
security software
___ 13. trojan m) a malicious software
___ 14. copyright n) an option to hide a post so that search
engines could not scan it
___ 15. pharming o) used to record the keystrokes done by the
user
Answer Key
References
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN
978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Patronage of Mary Development School (PMDS), Published on May 6, 2020;
https://www.slideshare.net/arias201625/empowerment-technologies-lesson-
2?qid=45c533b4-a83e-4e70-ae13-92c5b3b8b650&v=&b=&from_search=3
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 1.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 2.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36,
paragraph 3.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and
Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 367,
paragraph 3.
i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.
iv
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253
G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 367, paragraph 3.