Professional Documents
Culture Documents
Module Grade 11 Empowerment Tech
Module Grade 11 Empowerment Tech
E-TECH 1S
Empowerment Technologies
UNIT 1
Technology
Etiquette
Research and
Research Skills
OBJECTIVES:
Skills,
Information and
Communications
Technology (ICT)
LESSON 1
website.
Key Features of Web 2.0
www.tumblr.com
Trends in ICT
Key Terms:
Web 1.0 – static websites without interactivity.
Web 2.0 – websites that contain dynamic
content.
Web 3.0 – a concept of the World Wide Web
that is designed to cater to the individual user.
Static – refers to the web that are the same
regardless of the user.
Dynamic – refers to the web pages that are
affected by user input or preference.
Folksonomy – allows user to categorize and
classify/arrange information.
Hashtag # – used to “categorize” posts in a
website.
Convergence – the synergy of technological
advancements to work a similar goal or task.
Social Media – websites, applications or online
channels that enable users to co-create,
discuss, modify, and exchange user-generated
content.
Online Safety, Security,
Ethics, and Etiquette
LESSON 2
ELECTRONIC LIBEL AND CYBERCRIME PREVENTION
ACT OF 2012
Libel is defined under the Revised Penal Code Section
355.
1930 – Art. 355. Libel means by writing or similar
means. – A libel committed by means of writing,
printing, lithography, engraving, radio, phonograph,
painting, theatrical exhibition, cinematographic
exhibition, or any similar means, shall be punished by
prison correctional in its minimum and medium
periods or a fine ranging from 200 to 6,000 pesos, or
both, in addition to the civil action which may be
brought by the offended party
ELECTRONIC LIBEL AND CYBERCRIME
PREVENTION ACT OF 2012
Decriminalizing libel requires amending the Revised
Penal Code
2000 – E-Commerce Law (Republic Act 8792)
Cell Phones
Additional resources:
- Raising digital citizens
- Privacy
- Understanding mobile apps
- When should you give your kid a cell
phone
- Cell phone resources for schools
Cyberbullying
Cyberbullying involves the use of
technologies to display behavior that
harms another. Through email, instant
messaging, text messaging, and social
networking sites, hurtful messages can be
posted and shared.
Do not respond or retaliate to inappropriate
communication.
Save the messages and note the date and time
Utilize the blocking features in social networking
sites, email, or instant messaging. This will keep
unwanted correspondence from occurring
again. You can also block numbers on your cell
phone or change your personal phone number.
Only give out your phone number to those you
trust.
Notify the provider of inappropriate
behavior by activating the “abuse” tool
available on many sites .
Contact a trusted adult, teacher, school
counselor, or parent.
Cyberbullying
Additional Resources:
- Signs Your child might be cyberbullied
- Cyberbullying unplugged
- Reducing bullying and cyberbullying
Ethics
Plagiarism is the use of another’s work
as your own. In the internet, all materials
are copyrighted unless stated otherwise.
Such materials, includes, but are not
limited to, images, music, text, and
videos.
The following tips will help
Fact-checking sites
Checkdesk
A verification tool designed to help curate usergenerated content during breaking news and
connect journalists to citizen sources on the
ground. “Checkdesk facilitates collaborative factchecking of unverified reports,” the developers
write. “Professional journalists can join forces with
citizen journalists in search of background
information and evidence to corroborate social
media reports.”
Fact-checking sites
Full Fact Finder
Fact-checking sites
Emergent.Info
The sites tagline is ”real-time rumor tracker”. For
example, on April 1, 2015, it checked whether a
man was wanted in England for slapping people
who sneeze in public(true) and a claim that
doctors had confirmed the first death due to
genetically modified food(false). The site is part of
a research project of the Tow Center for Digital
Journalism at Columbia University that focuses
on how unverified information and rumor are
reported in the media.
Fact-checking sites
Churnalism
From the Sunlight Foundation, Churnalism is
based on a U.K site and compares articles to a
database of press releases. It’s intended as a
public-accountability tool but could also useful
for journalists assessing blog posts and other
source material.
Fact-checking sites
LazyTruth
An inbox extension that recognizes emails full
of political myths, urban legends, or security
threats and debunks them in your mail
program. It currently works only in Chrome and
Gmail, but may be expanded to other
browsers.
Fact-checking sites
Is Twitter Wrong
A Tumblr(http://istwitterwrong.tumblr.com/)
and Twitter(http://twitter.com/IsTwitWrong)
account dedicated to debunking
misinformation on Twitter.
Fact-correction tools
MediaBugs
A service for reporting specific, correctable
errors, and problems in media coverage. “We’ll
provide a neutral, civil, moderated discussion
space,” they state. “We’ll try to alert the
journalists or new organization involved about
your report and bring them into a conversation.
As a result of this dialogue between journalists
and the public, some errors may get into
corrected; others won’t. Either way, the
discussion will leave a useful public record.
Fact-correction tools
Retwact
A tool that automates the process of notifying
anyone who retweeted an inaccurate tweet
from your account ; the goal is to help slow the
spread of misinformation by making it easier to
correct tweets.
Fact-correction tools
Report an Error Alliance
This is an ad-hoc group of individuals and
organizations who endorse the idea that
websites should always have an easy-to-find
and-use “report an error” button. It’s a way of
saying to users that you care about accuracy,
you want to know when you make errors, and
you’re conscientious about fixing them.
Image tools
TinEye
A reverse-image search engine, TinEye
allows you to find out where an image came
from, how it is being used, if modified versions
exist, or to find higher-resolution versions.
TinEye is the first image search engine to use
image-identification technology rather than
keywords, metadata or watermarks. It is free to
use for non-commercial searching.
Image tools
Google Images
With Google Images “Search by Image”
Image tools
FourAndSix
An extension for Adobe Photoshop,
FourMatch analyzes open JPEG images to
determine whether they are untouched
originals from a digital camera. As of April
2015, the service has been discontinued and
one called Izitru was recommended.
ACTIVITY
DOWNLOAD and Watch the movie title “THE HACKER”. Give the disadvantages and advantages of
technology. Summarize the story in 1 whole paper what values or moral lesson you’ve learned about the
movie… At least minimum of 80 words for 100 points.
THANK YOU
There is no doubt that you need to be vigilant online. As the World Wide Web has evolved over
the years, many internet nasties have been playing on vulnerabilities to attack computers and
retrieve sensitive data from individuals. Half the time, we aren’t even aware it is happening
until it is too late.
Whilst the internet is a fantastic place for communication and information, there are many
malicious threats you need to dodge along the way.
Spam
The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder insinuates that spam emails are a
huge issue, with more than 50% of emails being syphoned into these folders. Aside from being an annoyance, spam
emails are not a direct threat. However, many can contain malware.
Adware
Adware is a type of malware software that displays unwanted ads when a user is surfing the internet. The ads often
redirect your searches to advertising websites and collect marketing-type data about you, behind your back, which is
considered malicious.
Adware is often included in many shareware or freeware downloads as a legitimate way of generating advertising
revenues that help fund development. However, some websites are infected with malicious adware that us
automatically downloaded to your computer. When this has been completed, Trojans can be used.
Trojan
Trojans leave your computer completely unprotected, which can mean that hackers can steal any data from your
system. Trojans often present themselves as harmless computer programmes so that hackers can penetrate your
computer without being detected.
Virus
One of the most talked about internet threats is a virus. Viruses usually attach themselves covertly to downloads as
they are designed to spread at an alarming rate. Viruses are often attached to files for download, shared via CDs,
DVDs, and USB sticks, or loaded on to computers by opening infected email attachments.
Worms
Worms usually make their way on to a computer via a malicious email attachment or USB stick. Once your
computer has been infected by a worm, it will likely send itself to every email address logged in your system. To the
receiver, your email will appear harmless, until they open it and are infected by the same worm.
Phishing
In its simplest terms, phishing is a form of fraudulent activity. More often than not, official-looking emails are sent
impersonating a well-known provider, such as a bank. These emails are sent to acquire people’s passwords and
credit card details.
Spyware
Another form of malware is spyware. Spyware is an all-encompassing internet nasty and is usually attached to pop-
ups of downloadable files. Once installed on your computer, spyware can monitor your keystrokes, read and delete
your files, reformat your hard drive, and access your applications. Whoever is controlling the spyware has access to
your personal details without you even knowing.
Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard actions. Most keyloggers will be looking for
distinguishable key entries, such as bank card details and passwords. Keylogging is often linked to identity and
intellectual property theft.
Pharming
Pharming is a more complex version of phishing that exploits the DNS system. Pharmers often create web pages
mimicking that of a trustworthy business, such as an online banking log-in page. Users will then enter their details,
thinking they are logging in to their usual service, and their details will be stolen by the pharmer.