You are on page 1of 6

St.

Mary’s College of Baliuag


Baliuag, Bulacan
SY 2021-2022

ISO 9001:2015 Certified


Certificate No. 01 100 1534708
PAASCU Level III Accredited

Subject: Empowerment Technologies Grade Level: 12 Quarter: First

Module No.: 1 Topic: ICT

I. INTRODUCTION
Philippines was dubbed as the ‘’ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers. ICT Department
in the Philippines is responsible for the planning, development and promotion of the country’s
Information and Communications Technology (ICT) agenda in support of national
development.
A connected world needs more than a network of computers and gadgets. It needs a
technology-enabled, confidently mindful, and compassionate digitally aware community of
lifelong learners.
This module will help you understand the importance of Information and Communication
Technology. Specifically, this will cover the following topics: Current State of ICT, Online
Safety, Security, Ethics, and Netiquette.

II. THIS LESSON WAS MADE FOR YOU TO:


1. compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges
2. apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to your specific track and strand
3. use the internet as a tool for credible research and information gathering to best achieve
specific class objectives

III. DISCUSSION
A. Presentation of the Lesson
1. The Current state of Technologies

Image Source: https://3.bp.blogspot.com/CR0EPSZGGaQ/WouLOhzSZjI/AAAAAAAADVo/R-


UtUmfWldUhU7FWhWoOoz0n9oEZbapxgCLcBGAs/s1600/information-technology-s-320x202.png

Information and Communication Technology refers to all the technology used


to handle telecommunications, broadcast media, intelligent building management
systems, audiovisual processing and transmission systems, and network-based control
and monitoring functions. The fusion of hardware and software and effective
communications network is the present composition of the ICT network.
The Internet, sometimes called simply "the Net," is a worldwide system of
computer networks -- a network of networks in which users at any one computer can,
if they have permission, get information from any other computer (and sometimes talk

1
directly to users at other computers). The World Wide Web (‘www’ or ‘web’ for short)
is a collection of webpages found on this network of computers. Your web browser uses
the internet to access the web. The World Wide Web has three versions:
• Web 1.0 – according to Berners-Lee, is the “read-only web.” In other words,
the early web allowed us to search for information and read it. There was very
little in the way of user interaction or content generation.
• Web 2.0 – can contribute content and interact with other web users or the
“read-and-write web”
• Web 3.0 – was envisioned to be a smarter access of hypertext files and a
version that would enable a wider range of search in a fast manner or the
“semantic and intelligent web”.

Static Web Page – is known as a flat page or stationary age in the sense that the
page is ‘’as is’’ and cannot be manipulated by the user. The content is also the same
for all users that are referred to as Web 1.0.
Dynamic Web Pages– is the evolution of web 1.0 by adding dynamic web pages. The
user can see website differently than others e.g. social networking sites, wikis, video
sharing sites.
There are number of different types of web 2.0 applications including wikis,
blogs, social networking, folksonomies, podcasting & content hosting services. Many
of the most popular websites are Web 2.0 sites such as Wikipedia, YouTube,
Facebook, Myspace, Flickr.
Wikis
A wiki is a collaborative website that anyone within the community of users can
contribute to or edit. A wiki can be open to a global audience or can be restricted to a
select network or community. Wikis can cover a specific topic or subject area.

Blogs
A blog is a contraction of the words web log. Blogs usually provide commentary or
information on an issue, event, or topic. In some cases, blogs can be about a person;
an online, public, personal diary. A blog is usually maintained by a single person or a
small group of contributors.

Social Networking
Social networking allows an individual to create a profile for themselves on the
service and share that profile with other users with similar interests to create a social
network. Users can choose to have public profiles which can be viewed by anyone or
private profiles which can only be viewed by people that the users allow. Users can
usually post photographs, music, and videos on their site.

Content Hosting Services


Content hosting or content sharing sites allow users to upload content that they
have created for others to view. Two of the most popular of these sites are YouTube
for videos and Flickr for photographs. Users can also create an individual profile and
list their favorite photos or videos.

Podcasting
Podcasting is a way of making audio or video files available on the internet that
can either be listened to or viewed on a PC or downloaded to a handheld device such
as an iPod or mp3 player. A podcast will be treated as a sound recording (audio
podcasts) or a film (video podcasts, as known as vodcasts). Podcasts may also include
images, including PowerPoint presentations.

Microblogging
Microblogging is also called as a mobile social networking and a form of blog that
limit the size of its content posted online. Twitter is the most popular micro blogging

2
service and usually used to announce offers or events, promote new blog posts, or
keep your readers in the know with links to important news and stories.

Folksonomy
Folksonomy allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as
hashtag.

2. Online Safety, Security, Ethics, and Etiquette

Image Source:
https://www.change.org/p/rankingz-incognito-online-safety-and-security-campaign

Republic Act No. 10175 is AN ACT DEFINING CYBERCRIME, PROVIDING FOR


THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF
PENALTIES THEREFOR AND FOR OTHER PURPOSES,
http://www.gov.ph/2012/09/12/republic-act-no-10175/. It is a useful reference for
determining what is legal or illegal activity in the online context. The law has been in
force since 2012 and the Supreme Court in a decision in 2014, SC ruled that
imposition of cyber libel on the “original author of the post” (on Facebook) is
constitutional but clarified the same is unconstitutional insofar as it penalizes those
who simply receive the post and react to it.
Online Safety is one of the biggest concerns every parent has for their children
and it is to keep them safe, whether online or offline (At home, at school, at play).
Some new developments are making online safety easier and improving offline safety
as well.
What is Online Safety?
- It is also called cyber safety or digital safety which refers to practices and
precautions one should observe when using the Internet.

There is no doubt that you need to be vigilant online. As the World Wide Web has
evolved over the years, many internet nasties have been playing on vulnerabilities to
attack computers and retrieve sensitive data from individuals. Half the time, we are not
even aware it is happening until it is too late. Whilst the internet is a fantastic place for
communication and information, there are many malicious threats you need to dodge
along the way.

Spam – The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder
insinuates that spam emails are a huge issue, with more than 50% of emails being
syphoned into these folders. Aside from being an annoyance, spam emails are not a
direct threat. However, many can contain malware.

Adware –is a type of malware software that displays unwanted ads when a user is
surfing the internet. The ads often redirect your searches to advertising websites and
collect marketing-type data about you, behind your back, which is considered
malicious.

3
Trojan – leave your computer completely unprotected, which can mean that hackers
can steal any data from your system. Trojans often present themselves as harmless
computer programmers so that hackers can penetrate your computer without being
detected.
Virus – one of the most talked-about internet threats is a virus. Viruses usually attach
themselves covertly to downloads as they are designed to spread at an alarming rate.
Viruses are often attached to files for download, shared via CDs, DVDs, and USB
sticks, or loaded on to computers by opening infected email attachments.
Worms – usually make their way onto a computer via a malicious email attachment or
USB stick. Once your computer has been infected by a worm, it will likely send itself
to every email address logged in your system. To the receiver, your email will appear
harmless, until they open it and are infected by the same worm.
Phishing – is a form of fraudulent activity. Often, official-looking emails are sent
impersonating a well-known provider, such as a bank. These emails are sent to
acquire people’s passwords and credit card details.
Spyware – Another form of malware is spyware. Spyware is an all-encompassing
internet nasty and is usually attached to pop-ups of downloadable files. Once installed
on your computer, spyware can monitor your keystrokes, read, and delete your files,
reformat your hard drive, and access your applications. Whoever is controlling the
spyware has access to your details without you even knowing.
Keyloggers – Similar to a part of spyware, keyloggers record a user’s keyboard
actions. Most keyloggers will be looking for distinguishable key entries, such as bank
card details and passwords. Keylogging is often linked to identity and intellectual
property theft.
Pharming – is a more complex version of phishing that exploits the DNS system.
Pharmers often create web pages mimicking that of a trustworthy business, such as
an online banking log-in page. Users will then enter their details, thinking they are
logging in to their usual service, and their details will be stolen by the pharmer.
Rogue Security Software – If you are ever downloading antivirus or antispyware
programmers, make sure you have purchased it from a legitimate source. Rogue
security software will often ask you to pay for extra protection, which is a huge con.
The security software is completely useless, and criminals have robbed you of your
money.
What is Ethics?
It refers to a set of moral principles that govern an individual or a group on what is
considered as acceptable behavior while using a computer.

What is Netiquette?
It is a combination of the words network and etiquette and is defined as a set of
rules for acceptable online behavior.
Both phrases are frequently interchanged and are often combined with the concept
of a ’netizen’ which itself is a contraction of the words internet and citizen and refers
to both a person who uses the internet to participate in society and an individual who
has accepted the responsibility of using the internet in productive and socially
responsible ways.
The Core Rules of Netiquette:
Rule 1: Remember the human
• You need to remember that you are talking to a real person when you are
online. The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s
face.

4
Rule No. 2: Adhere to the same standards online that you follow in real life.
• You need to behave the same way online that you do in real life. You need to
remember that you can get caught doing things you should not be doing online
just like you can in real life. You are still talking to a real person with feelings
even though you can’t see them.

Rule no. 3: Know where you are in cyberspace.


• Always look around when you enter a new domain when surfing the web. Get
a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.


• Remember people have other things to do besides read your email. You are
not the center of their world. Keep your post and emails to a minimum by saying
what you want to say. Remember everyone will not answer your questions.

Rule no. 5: Make yourself look good online.


• Be polite and pleasant to everyone. Always check your spelling and grammar
before posting. Know what you are talking about and make sense of saying it.

Rule no. 6: Share expert knowledge


• Ask questions online. Share what you know online. Post the answers to your
questions online because someone may have the same question you do.

Rule no. 7: Help keep flame wars under control


• Netiquette does not forgive flaming. Netiquette does however forbid people
who are flaming to hurt discussion groups by putting the group down.

Rule no. 8: Respect other people’s privacy.


• Do not read other people’s mail without their permission. Going through other
people’s things could cost you, your job or you could even go to jail. Not
respecting other people’s privacy is bad netiquette.

Rule no. 9: Do not abuse your power.


• Do not take advantage of other people just because you have more knowledge
or power than them. Treat others as you would want them to treat you if the
roles were reversed.

Rule no. 10: Be forgiving of other people’s mistakes.


• Do not point out mistakes to people online. Remember that you were once the
new kid on the block. You still need to have a good manner even though you
are online and cannot see the person face to face.

IV. REFERENCES

BBC Bitesize. (2020). What is the world wide web?. BBC.co.


https://www.bbc.co.uk/bitesize/topics/zkcqn39/articles/z2nbgk7

Berkman Center for Internet and Society. (2003). Introduction: Readiness for the
Networked World. Cyber Law. http://cyber.law.harvard.edu/readinessguide/intro.html
Choudhury, N. (2014). World Wide Web and Its Journey from Web 1.0 to Web 4.0. IJCSIT.
http://ijcsit.com/docs/Volume%205/vol5issue06/ijcsit20140506265.pdf

Cybersecurity Resources. (2004). What is Netiquette? A Guide to Online Ethics and


Etiquette. Webroot. https://www.webroot.com/nz/en/resources/tips-articles/netiquette-
and-online-ethics-what-are-they

5
Getting, B. (2007). Basic Definitions: Web 1.0, Web 2.0, Web 3.0. Practical Commerce.
https://www.practicalecommerce.com/Basic-Definitions-Web-1-0-Web-2-0-Web-3-0
Luminet.co. (2020). The Top 10 Most Common Internet Threats. Luminet.
https://luminet.co.uk/top-10-common-internet-threats/
Regis J. (2018). Empowerment Technologies Lesson 1-15. WordPress.com.
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-
lessons-1-15/
Officialgazette.gov.ph. (2012). Republic Act No. 10175. Official Gazette.
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
Rouse, M. (2000). Internet. Search Windevelopment.
https://searchwindevelopment.techtarget.com/definition/Internet
Shea, V. (1994). The Core Rules of Netiquette. Albion.
http://www.albion.com/netiquette/introduction.html
TechoPedia.com. (2019). Information and Communication Technology. Techopedia.
https://www.techopedia.com/definition/24152/information-and-communications-
technology-ict

The University of Melbourne. (2008). Wikis, Blogs, & Web 2.0 technology. Copyright
Unimelb.
https://copyright.unimelb.edu.au/__data/assets/pdf_file/0011/1773830/wikisblogsweb
2blue.pdf

Yuvienco, J. (2016). Empowerment Technologies Supplement: Additional Resources.


Google Docs. https://docs.google.com/document/d/1-LQ3NCNQrofxivo2bHO7GbT-
dF-oKjopKUPW5MkBu1o/edit?ts=5ef2fc7f

Change.org. (2018). Incognito: Online Safety and Security Campaign. Change.org.


https://www.change.org/p/rankingz-incognito-online-safety-and-security-campaign

You might also like