You are on page 1of 15

ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS

URBIZTONDO CATHOLIC SCHOOL, INC.


URBIZTONDO, PANGASINAN
S.Y. 2021-2022

LEARNING MODULE
in
EMPOWERMENT
TECHNOLOGIES
MONTH of AUGUST

PREPARED BY:

GEMARD JEM P. GEÑEBRE


Subject Teacher

CHECKED BY:

JOE ANN V. DADUYA


SHS Coordinator

NOTED BY:

KIM ABIGAIL S. CAMACHO


SHS Principal
SUBJECT: EMPOWERMENT TECHNOLOGIES 1|Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

VISION STATEMENT

In communio, the ALDCS – Urbiztondo Catholic School, Inc. form Christian steward through
holistic Catholic Education and formation.

MISSION STATEMENT

To achieve the vision, ALDCS – Urbiztondo Catholic School, Inc. is committed to the
following mission:

Authenticity
To establish among member schools a Catholic identity rooted in Gospel values, centered on
the Eucharist and committed to faith formation, academic excellence and service.

Leadership
To ensure an efficient operation of the schools through effective governance which provides
direction, authority and leadership.

Dynamism
To provide a clearly articulated rigorous curriculum aligned with relevant standards, 21st
century skills, Gospel values implemented through effective instructions.

Community
To establish networking and linkages through communion with other schools, the church and
other social institutions.

System
To enact comprehensive organizational plans based on compelling mission for Institutional
advancement through academic instruction, promotion, enrolment management, technology
development and innovative stewardship.

CORE VALUES

Authentic Witnessing
Governance and Leadership
Excellence and Relevance
Responsible Stewardship
Communion / Community

SUBJECT: EMPOWERMENT TECHNOLOGIES 2|Page


SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

MODULE 1
EMPOWERMENT TECHNOLOGIES UNIT I
CONTENT STANDARD
• The learners demonstrate an understanding of: ICT in the context of global
communication for specific professional track.
PERFORMANCE STANDARD
• The learner shall be able to: Independently compose an insightful reflection
paper on the nature of ICT in the context of their lives, society, and professional
tracks (Arts, Tech-Voc, Sports, Academic).
TRANSFER GOAL
• At the end of this lesson, the students should be able to improve their knowledge
on how ICT affects their everyday lives and the state of our nation.

LESSON 1: Introduction to Information and Communication


Technologies

Information and Communication Technologies


Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to
locate, save, send, and edit information.

When we make a video call, we use the Internet. When we send a text or make a call,
we use cellular networks. When we run out of load or battery, we use payphones
which use a telephone network. Having a unified way to communicate is one of the
goals of ICT. In terms of economics, ICT has saved companies a lot of resources
(time and money) with the kind of communication technology they use, nowadays.
In a similar way, we spend less because of ICT. As it normally costs us a peso to send
a text message or SMS, with the Internet, we can send multiple messages and only be
charged by a fraction.

ICT in the Philippines


Several international companies dub the Philippines as the "ICT Hub of Asia." It is
no secret that there is a huge growth of ICT-related jobs around the country, one of
which is the call center or BPO (Business Process Outsourcing) centers.

SUBJECT: EMPOWERMENT TECHNOLOGIES 3|Page


SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

According to the 2013 edition of Measuring the Information Society by the


International Telecommunication Union, there are 106.8 cellphones per 100 Filipinos
in the year 2012. That would mean that for every 100 Filipinos you meet, there is a
high chance that they have a cellphone and approximately for the seven of them, they
have two.

Web 2.0: Dynamic Web Pages


When the World Wide Web was invented, most web pages were static Static (also
known as flat page or stationary page) in the sense that the page is and cannot be
manipulated by the user. The content is also the same for all users. This is referred to
as Web 1.0.
Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages-the user is able
to see a website differently than others. Examples of Web 2.0 include social
networking sites, blogs, wikis, video sharing sites, hosted services, and web
applications.
Web 2.0 allows users to interact with the page instead of just reading a page, the user
may be able to comment or create a user account. Web 2.0 also allows users to use
web browsers instead of just using their operating system

Features of Web 2.0


The key features of Web 2.0 include:
1. Folksonomy-allows users to categorize and classify/arrange information
using freely chosen keywords (eg. tagging). Popular social networking sites such as
Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is
also referred to as hashtag.
2. Rich User -Experience content is dynamic and is responsive to user's
input. An example would be a website that shows local content. In the case of social
networking sites, when logged on, your account is used to modify what you see in
their website.
3. User Participation - the owner of the website is not the only one who is
able to put content. Others are able to place a content of their own by means of
comments, reviews, and evaluation. Some websites allow readers to comment on an
article, participate in a poll, or review a specific product (e.g. Amazon.com,online
stores).
4. Long Tail - services that are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that charges you for the
SUBJECT: EMPOWERMENT TECHNOLOGIES 4|Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

amount of time you spent in the Internet, or a data plan that charges you for the
amount of bandwidth you used.
5. Software as a Service -users will subscribe to a software only when needed
rather than purchasing them. This is a cheaper option if you do not always need to
use a software.
6. Mass Participation - diverse information sharing through universal web
access. Since most users can use the Internet, Web 2.0's content is based on people
from various cultures.

Web 3.0 and the Semantic Web


The Semantic Web is a movement led by the World Wide Web Consortium (W3C).
The W3C standard encourages web developers to include semantic content in their
web pages. The term was coined by the inventor of the World Wide Web, Tim
Berners-Lee Lee also noted that the Semantic Web is a component for Web 3.0.
According to the W3C, "The Semantic Web provides a common framework that
allows data to be shared and reused across application, enterprise, and community
boundaries" The aim of Web 3.0 is to have machines (or servers) understand the user's
preferences to be able to deliver web content specifically targeting the user.

Web 3.0 is yet to be fully realized because of several problems:


1. Compatibility. HTML files and current web browsers could not support Web 3.0
2. Security. The user's security is also in question since the machine is saving her
preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4.Vagueness. Certain words are imprecise. The words "old" and "small" would
depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer to be
able to predict what the user is referring to at a given time.

Trends in ICT
As the world of ICT continues to grow, the industry has focused on several
innovations. These innovations cater to the needs of the people that benefit most out
of ICT.
1.Convergence - Technological convergence is the synergy of technological
advancements to work on a similar goal or task. For example, besides using your
personal computer to create word documents, you can now use your smartphone.
SUBJECT: EMPOWERMENT TECHNOLOGIES 5|Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

2.Social Media - Social media is a website, application, or online channel that enables
web users to create, co-create, discuss, modify, and exchange user-generated content.
There are six types of social media:
a. Social Networks. These are sites that allow you to connect with other
people with the same interests or background. Once a user creates his or her account
he or she can set up a profile, add people, create groups, and share content. Examples:
Facebook and Google+
b. Bookmarking Sites. These are sites that allow you to store and manage
links to various websites and resources. Most of these sites allow you to create a tag
that allows you and others to easily search or share them. Examples: StumbleUpon
and Pinterest
c. Social News. These are sites that allow users to post their own news items
or
links to other news sources. The users can also comment on the post and comments
may also be ranked.
d. Media Sharing. These are sites that allow you to upload and share media
content like images, music, and video. Most of these sites have additional social
features like liking, commenting, and having user profiles. Examples: Flicker,
YouTube, and Instagram
e. Microblogging These are sites that focus on short updates from the user.
Those subscribed to the user will be able to receive these updates. Examples: Twitter
and Plurk
f. Blogs and Forums These websites allow users to post their content. Other
users are able to comment on the said topic. There are several free blogging platforms
like Blogger, WordPress, and Tumblr. On the other hand, forums are typically part of
a certain website or web service

3. Mobile Technologies - The popularity of smartphones and tablets has taken a major
rise over the years. This is largely because of the devices' capability to do tasks that
were originally found in personal computers. Several of these devices are capable of
using high-speed Internet. Today, the latest mobile devices use 4G Networking
(LTE), which is currently the fastest mobile network. Also, mobile devices use
different operating systems:
a. iOS used in Apple devices such as the iPhone and iPad
b. Android - an open source operating system developed by Google. Being
open
SUBJECT: EMPOWERMENT TECHNOLOGIES 6|Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

source means several mobile phone companies use this OS for free.
c. Blackberry OS used in Blackberry devices
d. Windows Phone OS a closed source and proprietary operating system
developed by Microsoft"
e. Symbian the original smartphone OS; used by Nokia devices
f. WebOS-originally used for smartphones; now used for smart TVs
g. Windows Mobile -developed by Microsoft" for smartphones and pocket 4.
Assistive Media - is a nonprofit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to
read to the user.

LESSON 2: Rules of Netiquette

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to promote your business, gain
new friends, and stay in touch with the old ones. It is also a source of entertainment
through games, online communities, and everything in between. But like most things
in this world, there is always the "other side of the coin”
The Internet is defined as the information superhighway. This means that anyone has
access to this highway, can place information, and can grab that information. Any
information, even things that you have set privately, can be accessed one way or
another. This is why social networking sites like Facebook continue to improve their
security features The threat of cybercrime is very real. While you may not experience
the threat now, whatever information we share today could affect our future.

Tips to Stay Safe Online

The Internet is a public place and it is up to you to protect yourself. Here are some
tips to help you stay safe when using the Internet.
1 Be mindful of what you share online and what site you share it to 2.Do not
just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles
the information you share.

SUBJECT: EMPOWERMENT TECHNOLOGIES 7|Page


SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
35. Do not share your password with anyone,
6. Avoid logging in to public networks/Wi-Fi. Browsing in "incognito (or private)
mode, a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face to face.
8. Never post anything about a future vacation. It is similar to posting. "Rob my house
at this date."
9. Add friends you know in real life.
10 Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one anti virus
software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable
in peer-to-peer downloads (torrents) as the download is most likely not monitored
by the site owner.
14. Buy the software, do not use pirated ones.
15. Do not reply or click links from suspicious emails.

Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware- stands for malicious software
a. Virus-a malicious program designed to replicate itself and transfer from
one
computer to another either through the Internet and local networks or data storage
like flash drives and CDs
b. Worm - a malicious program that transfers from one computer to another
by

SUBJECT: EMPOWERMENT TECHNOLOGIES 8|Page


SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

any type of means. Often, it uses a computer network to spread itself. For
example, the ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c. Trojan-a malicious program that is disguised as a useful
program but once
downloaded or installed, leaves your PC unprotected and allows hackers
to get your information
*Rogue security software - tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality,
they are not protected at all.
d. Spyware-a program that runs in the background without you
knowing it (thus called "spy). It has the ability to monitor what you are
currently doing and typing through keylogging.
*Keyloggers - used to record the keystroke done by the users. This is done
to steal their password or any other sensitive information. It can record
email messages, or any information you type using your keyboard.
e. Adware a program designed to send you advertisements,
mostly as pop ups 2. Spam- unwanted email mostly from bots or
advertisers. It can be used to send malware
3. Phishing-Its goal is to acquire sensitive personal information like
passwords and credit card details. This is done by sending you an email
that will direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information
*Pharming - a more complicated way of phishing where it exploits the
DNS (Domain Name Service) system

SUBJECT: EMPOWERMENT TECHNOLOGIES 9|P


age
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

Think Before You Click


Here are things you might want to consider before posting something over
the
Internet:
1. Before you post something on the web, ask these questions to
yourself: Would you want your parents or grandparents to see it? Would
you want your future boss to see it? Once you post something on the web,
you have no control of who sees your posts.
2 Your friends depend on you to protect their reputation online Talk
to your friends about this serious responsibility.
3. Set your post to "private" In this way, search engines will not
be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5.If you feel that a post can affect you or other's reputation, ask the
one who posted it to pull it down or report it as inappropriate

Copyright Infringement
If you create something-an idea, an invention, a form of literary work, or
a research, you have the right as to how it should be used by others. This
is called intellectual property. In other words, the copyright law includes
your rights over your work, and anyone who uses it without your consent
is punishable by law. Try grabbing any book then browse its first few
pages and you will find a page with a disclaimer with the words "No part
of this book may be copied, reproduced. That is a copyright page.

Here are some tips that could help you avoid copyright infringement:
SUBJECT: EMPOWERMENT TECHNOLOGIES 10 |
Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

1. Understand. Copyright protects literary works, photographs,


paintings, drawings. films, music (and lyrics), choreography, and
sculptures, but it generally does NOT protect underlying ideas and facts.
This means that you can express something using your own words, but
you should give credit to the source.
2. Be responsible. Even if a material does not say that it is
copyrighted, it is not a valid defense against copyright. Be responsible
enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is
something that came from you or something made from somebody else's
creativity. It is important to add your own creative genius in everything
that will be credited to you.

What's In?

This lesson provides information about Netiquette it will serve as your


guide on how to behave appropriately entire. It is vital to use Netiquette
because communication online is non-verbal Mast often online demission
consists of reading something someone else's has typed.

Core Rules of Netiquette


Netiquette, or network etiquette, is concerned with the "proper" manner
of communication in the online environment. Whenever you
communicate in the virtual world, consider the following "rules," adapted
from Virginia Shea's Core Rules of Netiquette.

SUBJECT: EMPOWERMENT TECHNOLOGIES 11 |


Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

Rule 1: Remember the Human


When communicating electronically, whether through email, instant
message. discussion post, text, or another method, practice the Golden
Rule: Do unto others as you would have others do unto you. Remember,
your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit." ask yourself,
"Would I be okay with this if someone else had written it?
Rule 2: Adhere to the same standards of behavior online that you follow
in real
life
While it can be argued that standards of behavior may be different in the
virtual world, they certainly should not be lower. You should do your best
to act within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-to-face? On
most occasions, no. Neither should you behave this way in the virtual
world.
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea, 1994) Depending on
where you are in the virtual world, the same written communication can
be acceptable in one area, where it might be considered inappropriate in
another. What you text to a friend may not be appropriate in an email to a
classmate or colleague. Can you think of another example?
Rule 4: Respect other people's time and hand width
Electronic communication takes time to read and time in which to
respond. Most people today lead busy lives, just like you do, and don't
have time to read or respond to frivolous emails or discussion posts As a
SUBJECT: EMPOWERMENT TECHNOLOGIES 12 |
Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

virtual world communicator it is your responsibility to make sure that the


time spent reading your words isn't wasted Make your written
communication meaningful and to the point, without extraneous test or
superfluous graphics or attachments that may take forever to download.
Rule 5: Make yourself look good online
One of the virtual world's best things is the lack of judgment associated
with your physical appearance, the sound of your voice, or the clothes you
wear (unless you post a video of yourself singing Karaoke in a clown
outfit.) The quality of your writing will judge you so keep the following
tips in mind:
-Always check for spelling and grammar errors
-Know what you're talking about and state it clearly
-Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many benefits: one is the ease in which
Information can be shared or accessed, and in fact, this "information
sharing" capability is one of the reasons the Internet was founded. So in
the spirit of the Internet's "founding fathers," share what you know! When
you post a question and receive intelligent answers, share the results with
others. Are you an expert at something? Post resources and references for
your subject matter. You have recently expanded your knowledge about
a subject that might be of interest to others? Share that as well. Rule 7:
Help keep flame wars under control
What is meant by "flaming" and "flame wars?" "Flaming is what people
do when they express a strongly held opinion without holding back any
emotion." (Shea,

SUBJECT: EMPOWERMENT TECHNOLOGIES 13 |


Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

1994). As an example, think of the kinds of passionate comments you


might read on a sports blog. While "flaming" is not necessarily forbidden
in virtual communication, "flame wars," when two or three people
exchange angry posts between one another. must be controlled, or the
camaraderie of the group could be compromised. Don't feed the flames;
extinguish them by guiding the discussion back to a more productive
direction.
Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world, be it an online
class discussion forum, Facebook page, or an email, you may be exposed
to some private or personal information that needs to be handled with care.
Perhaps someone is sharing some medical news about a loved one or
discussing a situation at work What do you think would happen if this
information "got into the wrong hands Embarrassment? Hurt feelings?
Loss of a job? Just as you expect others to respect. your privacy, so should
you respect the privacy of others. Be sure to err on the side of caution
when deciding to discuss or not to discuss virtual communication Rule 9:
Don't abuse your power
Like in face to face situations, there are people in cyberspace who have
more "power" than others. They have more expertise in technology or
have years of experience in a particular skill or subject matter Maybe it is
you who possesses all of this knowledge and power lust remember
knowing more than others do or having more power than others may have
does not give you the right to take advantage of anyone Think of Rule 1.
Remember the human.
Rule 10: De forgiving of other people's mistakes

SUBJECT: EMPOWERMENT TECHNOLOGIES 14 |


Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022

Not everyone has the same amount of experience working in the virtual
world. And not everyone knows the rules of Netiquette. At some point,
you will see a stupid question, read an unnecessarily long response, or
encounter misspelled words; when this happens, practice kindness and
forgiveness as you would hope someone would do if you had committed
the same offense. If it's a minor "offense." you might want to let it slide.
If you feel compelled to respond to a mistake, do so in a private email
rather than a public forum.

References:
Shea, V. (1994). Core Rules of Netiquette.
Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html

Empowerment Technologies, Innovative Training Works, Inc. (Student’s


Resource Manual) 2016, REX Book Store

Empowerment Technologies, Innovative Training Works, Inc. (Teacher’s


Resource Manual) 2016, REX Book Store

SUBJECT: EMPOWERMENT TECHNOLOGIES 15 |


Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150

You might also like