You are on page 1of 6

Empowerment Technologies

Accessible Teachers Materials


TEACHERS REFERENCE GUIDE

STUDENT LEARNING GUIDE

Headwaters College – Elizabeth Campus


Academic Department

APRIL 2021

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
1|P a g e
HEADWATERS COLLEGE INC.
Understanding Culture Society and Politics
(STUDENT LEARNING GUIDE)

FEBRUARY WEEK 9-10

TOPIC ICT as Platform for Change


SCOPE ICT as Medium for Advocacy and Development Communication

The Role of ICT in Recent History


     Throughout recent history, the Philippines have been one of a few nations that demonstrate unity for a call to action or social
change. These campaigns for social change would have not been successful if it were not for ICT.
1. EDSA (PEOPLE POWER REVOLUTION). The people power revolution lasted from 1083 to 1986. During a
radio broadcast of Radio Veritas, Cardinal Sin encouraged the Filipinos to help end the regime of then President
Ferdinand Marcos. A major protest took place along the EDSA from February 22 to 25, 1986 involving two million
Filipinos from different sectors. These included civilians, political parties, the military and religious groups.
2. EDSA DOS. This is also known as the 2001 EDSA Revolution, happened during January 17 to 21, 2001. It was
fueled after 11 prosecutors of the President Joseph Estrada walked out of the impeachment trial. As a result, the
crowd in EDSA grew over the course of a few days through text brigades. 
3. Million People March. This is a series pf protest that mainly took place in Luneta Park from august 22 to 26, 2013.
There were also several demonstrations that happened around key cities in the Philippines and some location
overseas. The organizers and promoters of the Million People March used Facebook and Change.org as their,
mediums.
4. Yolanda People Finder. Recent storms in Philippines history gave birth to the People finder database powered by
Google. During typhoon Yolanda, the people finder was a vital tool for people across the globe to track the situation
of their relatives. This proved to be successful and is now adapted by more organizations to help people track
relatives during calamities.
Change.org is dubbed as the “world’s platform for change” where anyone from the online community can create a petition and ask
others to sign in it. During the past times petitions are only done through signing a paper, usually done by a group asking for
signatures via travel. Change.org gives access to more people by allowing the online community to affix their digital signatures on
petition.
Signing an Online Petition
1. VisitChange.org
2. Change.org works this way. If this is your first time to use Change.org, click Sign up or log in with Facebook.
Otherwise, just input your log in details.
3. You can then start your own petition, but for now click on any petition you want under tending petitions.
4. Read the petitions description to see if this petition matters to you. If it is, sign the petition by filling up the
information on the right side of the screen.
5. Share the petition on Facebook to promote it.
     Alternatively, you can check out petitions of your friends on Facebook, and then click on those petitions to read about it and sign
it.
 ICT Project for Social Change
Before starting your project, your group should be able to do the necessary paperwork. This allows experts to see if your project is
doable over the time frame that was given and if it is significant enough to be made into reality.
Five elements of a concept paper
 Introduction-includes tour group’s mission and vision and a brief introduction of your project.
 Purpose-includes the reasons why this project is worth your group and your sponsor’s time, effort and money.
 Description-includes all the necessary information about the project. In ICT, it involves the sites you are going to produce
and the purpose of each and how they work in unison.
 Support-contains the budget needed for the project. Some concept papers do not specify any amount requested from the
sponsor.
 Contact information- includes information on how the group be contacted.
Simplified ICT Project Process Overview
1. Planning-Involves the following task (but not limited to):
2. Conceptualizing your project.
3. Researching on available data about your topic
4. Setting deadlines and meetings
5. Assigning people to various tasks
6. Finding a web or blog host
7. Creating a site map for tour website
8. Listing down all applications, that you need including web apps

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
2|P a g e
9. Funding (If applicable)
2. Development-involves the actual creation of the website(s), involves the production of images, infographics, etc.
3. Release and Promotion-involves the actual release of the website for public view and promoting it. Promotion typically starts
before the actual release.
4. Maintenance-involves responding to feedback of your site visitors and continuing to improve your website.
ICT Project Publication and Statistics
Monitoring Site Statistics on Different Platforms
1. WordPress
Once you log in to your WordPress account, you are on the Reader tab by default. Simply click on My Sites and from there you will
see the statistics for your blog.
2. Facebook
 In your Facebook page, a summary of the statistics will appear on the right side of your cover photo: Hovering your mouse pointer
over “Post Reach” will give you more insights on which recent post reached the most people: Clicking on the Insights tab will give
more in-depth statistics:
1. Overview– contains the summary of statistics about your page
Definition of terms on your Facebook statistics:
Reach: Organic – your posts seen through the page’s wall, shares by users, and the news feed
Reach: Paid – your posts seen through paid ads
Post Clicks – number of clicks done to your posts
Likes, Comments, and Shares – actual interaction done by your audience either through liking the post, commenting on it, or sharing
it on their walls.
1. Likes– contains the statistics about the trend of page likes
2. Reach– contains information about the number of people who was reached by your post
3. Visits– contains data of the number of times your page tabs (like the Timeline) are visited
4. Post– contains data showing when (day and time) you site visitors visit your site
5. People– contains statistics about your audience’s demographics (age, location, gender, language, and country). It is
also includes demographics about the people you have reached and engaged with.
Demographics refers to the statistics characterizing human population usually divided by age, gender, income, location, and
language.

WEEK 11-12
TOPIC ICT Project Maintenance

SCOPE Nature and Purpose of Online Platforms and Application

Creating online surveys feedbacks forms.

The Internet will give you a lot of options in gathering your audience’s feedback. The only difference that you and your group may
notice is how these services are presented. Some of them, because they are free to use, may have too many ads or some features are
lacking. In any case, it’s your group’s choice which of these services is t cumbersome to reach your objective.

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
3|P a g e
Google offers one of the easiest ways to gather user’s feedback. Google forms allow your audience to answer a set of questions you
have set. These can be used for surveys, feedback, online registrations, and customer care support.

4. You will be taken to Google Form’s interface:


Next is !
Lets move on to !
6. Once you are done editing the question, click Done.
7. To add a new question or item, click on Add Item, clicking on the drop down arrow at the right side of the Add Item button will
bring up other options for layout:
a. Section Header – adds a header for a specific a part of your survey.
b. Page break- adds a page break which means that the items at the button of the page will be added to the next page: necessarily if
your survey is too long.
c. Image- adds an image to your survey
d. Video- adds a video to your survey

iii. Multiple Choice – can be answered by only one answer in a set of options
Creating feedback forms using Google forms
Lesson objectives
• Evaluate the effectiveness of their online campaign through user feedback;
• Improve the online campaign using various tools; and
• Check the impact of their online campaign.

Steps !

1) Open your browser and go to drive.google.com


2) Sign in or create an account.
3) On the left hand hair of your My Drive page,
click New> More> Google Forms
Steps !
5. You may now fill out the form questions:
A. Question Title- Includes the question that will be answered by your audience.
B. Help Text- Creates a subtext under the question to give more information about a question.
C. Question Type- changes the type question according to your preference. These questions include:
i. Text – can be answered in a short text.
ii. Paragraph Text – can be answered in a long text.
iv. Checkboxes – a question that can be answered with multiple answers in a set of options.
v. Choose from a list- similar to a multiple-choice question but options are revealed in a drop-down list.
vi. Scale- a question that can be answered with a numerical range.
vii. Grid- a question that contains sub questions with similar options as shown;
• Date- a question that can be answered with a specified date
• Time- a question that can be answered with a specified time
d. Advanced Settings: Contains more options for the specified question type.
8. Edit the Confirmation Page option at the bottom as you see fit.
A. Show link to submit another response- allows the user to answer the same form again.
B. Publish and show a public link to form results- allows users to see the summarized results for your survey.
C. Allow responders to edits responses after submitting- allows users to back and edit their answers
9. Click the Send Form button. The Send Form dialog box will appear these options as you see fit.a. Link to share- contains the URL
that you can share on your website.
b. Embed- contains an embed code to attach to your HTML.
c. Short URL- generates a shorter URL necessary for limited spaces like sharing on twitter.
d. Share link via- allows you to share the link to Google+, Facebook, and Twitter.
e. Send form via email- allows you to share the form via email.
f. Add collaborators- Allows others to edit your form, necessary when working on groups.

1. The easiest way to view the result is viewing a summary of the responses. Click on Responses> Summary of Responses.
2. You will be taken to a Summary of Responses page. This is particularly useful for viewing your results from time to time.

However, after a set amount of time, you may want to use this data in a spreadsheet and eventually create your own charts.
3. To use the data collected through responses, click View Responses button found on the upper part of the page.

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
4|P a g e
Analyzing your Google Forms Result
4. Choose if you want to create a new Google Sheet as the destination of your response results or if you want to put it on an existing
Google Sheet.
Cybercrimes are illegal acts done through the use of the internet. People all over the world use the Internet to commit a host of
crimes, some of which the public doesn’t even know are capable of being done electronically.
1. Phishing and Spoofing

Spoofing attack is when a malicious party impersonates another device or user on a network in


order to launch attacks against network hosts, steal data, spread malware or bypass access
controls. There are several different types of spoofing attacks that malicious parties can use to
accomplish this.
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit
card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a
trustworthy entity in an electronic communication.
2. Blackmail/Extortion
  Extortion (also called blackmail, shakedown, out wresting, and exaction) is a criminal offence of
unlawfully obtaining money, property, or services from a person, entity, or institution, through
coercion. Refraining from doing harm is sometimes euphemistically called protection. Using the
Internet to threaten to cause damage with the intent to extort from any person any money or other
thing of value. 

3. Accessing Stored Communications 


Accessing Stored Communications or hacking; Intentionally accessing, without authorization, a
facility through which an electronic communication service is provided. The act of obtaining
unauthorized access to data from computer network. This is typically done to commercial and
government sites to threaten its owner. In late 2015, a group of Anonymous Philippines  hacked the
Twitter account of actress Maine Mendoza, who plays the famous character Yaya Dub of the
popular AlDub tandem and posted links and messages on the account
4. Sports Betting
Sports Beating is engaging in the business of betting or wagering on any sporting event or
contest over the Internet. In some countries, gambling (including sports betting) is illegal even if
you are doing it over the Internet.
5. Non-Delivery of Merchandise
Devising any scheme to defraud, or for obtaining money or
property by means of false or fraudulent pretenses, or
promises, and using the Internet for the purpose of executing
the scheme. The non-delivery scam occurs when the scammer places an item up for sale when
there is actually no item at all. The item is subsequently never delivered to the buyer after they
purchase the item.
6. Electronic/ Cyber Harassment
Cyber harassment refers to online harassment. Cyber harassment or bullying is the use of email,
instant messaging, and derogatory websites to bully or otherwise harass an individual or group
through personal attacks. Cyber harassment can be in the form of flames, comments made in chat
rooms, sending of offensive or cruel e-mail, or even harassing others by posting on blogs or
social networking sites. Cyber harassment is often difficult to track as the person responsible for
the acts of cyber harassment remains anonymous while threatening others online. This usually
applies to school-age children.
7. Child Pornography
Using the Internet to transmit child pornography. Child pornography is distributed nowadays mainly
through the Internet. Child pornography are produced not only on a professional scale by commercial
providers, but also privately using victims from the producer’s own environment, from the exploitation
of children by clients of child prostitutes. Child pornography is sold over commercial websites and also
exchanged in closed groups or via peer-to-peer networks. Criminal groups also use the Internet to make
big money selling child pornography.
8. Prostitution
Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage in  prostitution. The internet has
become one of the preferred methods of communication for prostitution, as clients and prostitutes are less vulnerable to arrest or
assault and for its convenience
9. Drug Trafficking
Delivering, distributing, or dispensing a controlled substance by means of the Internet. Darknet markets are used to buy and sell
recreational drugs online. Some drug traffickers use encrypted messaging tools to communicate with drug mules. The dark web site

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
5|P a g e
Silk Road was a major online marketplace for drugs before it was shut down by law enforcement (then reopened under new
management, and then shut down by law enforcement again)
10. Criminal Copyright Infringement
Criminal Copyright Infringement, the act of piracy mainly for financial gain. In late 2014, the number one pirate website, The Pirate
Bay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of
websites earn money through advertising.

REFERENC https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/
E:

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
6|P a g e

You might also like