Professional Documents
Culture Documents
LEARNING MODULE
in
EMPOWERMENT
TECHNOLOGIES
MONTH of AUGUST
PREPARED BY:
CHECKED BY:
NOTED BY:
VISION STATEMENT
In communio, the ALDCS – Urbiztondo Catholic School, Inc. form Christian steward through
holistic Catholic Education and formation.
MISSION STATEMENT
To achieve the vision, ALDCS – Urbiztondo Catholic School, Inc. is committed to the
following mission:
Authenticity
To establish among member schools a Catholic identity rooted in Gospel values, centered on
the Eucharist and committed to faith formation, academic excellence and service.
Leadership
To ensure an efficient operation of the schools through effective governance which provides
direction, authority and leadership.
Dynamism
To provide a clearly articulated rigorous curriculum aligned with relevant standards, 21st
century skills, Gospel values implemented through effective instructions.
Community
To establish networking and linkages through communion with other schools, the church and
other social institutions.
System
To enact comprehensive organizational plans based on compelling mission for Institutional
advancement through academic instruction, promotion, enrolment management, technology
development and innovative stewardship.
CORE VALUES
Authentic Witnessing
Governance and Leadership
Excellence and Relevance
Responsible Stewardship
Communion / Community
MODULE 1
EMPOWERMENT TECHNOLOGIES UNIT I
CONTENT STANDARD
• The learners demonstrate an understanding of: ICT in the context of global
communication for specific professional track.
PERFORMANCE STANDARD
• The learner shall be able to: Independently compose an insightful reflection
paper on the nature of ICT in the context of their lives, society, and professional
tracks (Arts, Tech-Voc, Sports, Academic).
TRANSFER GOAL
• At the end of this lesson, the students should be able to improve their knowledge
on how ICT affects their everyday lives and the state of our nation.
When we make a video call, we use the Internet. When we send a text or make a call,
we use cellular networks. When we run out of load or battery, we use payphones
which use a telephone network. Having a unified way to communicate is one of the
goals of ICT. In terms of economics, ICT has saved companies a lot of resources
(time and money) with the kind of communication technology they use, nowadays.
In a similar way, we spend less because of ICT. As it normally costs us a peso to send
a text message or SMS, with the Internet, we can send multiple messages and only be
charged by a fraction.
amount of time you spent in the Internet, or a data plan that charges you for the
amount of bandwidth you used.
5. Software as a Service -users will subscribe to a software only when needed
rather than purchasing them. This is a cheaper option if you do not always need to
use a software.
6. Mass Participation - diverse information sharing through universal web
access. Since most users can use the Internet, Web 2.0's content is based on people
from various cultures.
Trends in ICT
As the world of ICT continues to grow, the industry has focused on several
innovations. These innovations cater to the needs of the people that benefit most out
of ICT.
1.Convergence - Technological convergence is the synergy of technological
advancements to work on a similar goal or task. For example, besides using your
personal computer to create word documents, you can now use your smartphone.
SUBJECT: EMPOWERMENT TECHNOLOGIES 5|Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022
2.Social Media - Social media is a website, application, or online channel that enables
web users to create, co-create, discuss, modify, and exchange user-generated content.
There are six types of social media:
a. Social Networks. These are sites that allow you to connect with other
people with the same interests or background. Once a user creates his or her account
he or she can set up a profile, add people, create groups, and share content. Examples:
Facebook and Google+
b. Bookmarking Sites. These are sites that allow you to store and manage
links to various websites and resources. Most of these sites allow you to create a tag
that allows you and others to easily search or share them. Examples: StumbleUpon
and Pinterest
c. Social News. These are sites that allow users to post their own news items
or
links to other news sources. The users can also comment on the post and comments
may also be ranked.
d. Media Sharing. These are sites that allow you to upload and share media
content like images, music, and video. Most of these sites have additional social
features like liking, commenting, and having user profiles. Examples: Flicker,
YouTube, and Instagram
e. Microblogging These are sites that focus on short updates from the user.
Those subscribed to the user will be able to receive these updates. Examples: Twitter
and Plurk
f. Blogs and Forums These websites allow users to post their content. Other
users are able to comment on the said topic. There are several free blogging platforms
like Blogger, WordPress, and Tumblr. On the other hand, forums are typically part of
a certain website or web service
3. Mobile Technologies - The popularity of smartphones and tablets has taken a major
rise over the years. This is largely because of the devices' capability to do tasks that
were originally found in personal computers. Several of these devices are capable of
using high-speed Internet. Today, the latest mobile devices use 4G Networking
(LTE), which is currently the fastest mobile network. Also, mobile devices use
different operating systems:
a. iOS used in Apple devices such as the iPhone and iPad
b. Android - an open source operating system developed by Google. Being
open
SUBJECT: EMPOWERMENT TECHNOLOGIES 6|Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022
source means several mobile phone companies use this OS for free.
c. Blackberry OS used in Blackberry devices
d. Windows Phone OS a closed source and proprietary operating system
developed by Microsoft"
e. Symbian the original smartphone OS; used by Nokia devices
f. WebOS-originally used for smartphones; now used for smart TVs
g. Windows Mobile -developed by Microsoft" for smartphones and pocket 4.
Assistive Media - is a nonprofit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to
read to the user.
The Internet is a public place and it is up to you to protect yourself. Here are some
tips to help you stay safe when using the Internet.
1 Be mindful of what you share online and what site you share it to 2.Do not
just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles
the information you share.
4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
35. Do not share your password with anyone,
6. Avoid logging in to public networks/Wi-Fi. Browsing in "incognito (or private)
mode, a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face to face.
8. Never post anything about a future vacation. It is similar to posting. "Rob my house
at this date."
9. Add friends you know in real life.
10 Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one anti virus
software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable
in peer-to-peer downloads (torrents) as the download is most likely not monitored
by the site owner.
14. Buy the software, do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware- stands for malicious software
a. Virus-a malicious program designed to replicate itself and transfer from
one
computer to another either through the Internet and local networks or data storage
like flash drives and CDs
b. Worm - a malicious program that transfers from one computer to another
by
any type of means. Often, it uses a computer network to spread itself. For
example, the ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c. Trojan-a malicious program that is disguised as a useful
program but once
downloaded or installed, leaves your PC unprotected and allows hackers
to get your information
*Rogue security software - tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality,
they are not protected at all.
d. Spyware-a program that runs in the background without you
knowing it (thus called "spy). It has the ability to monitor what you are
currently doing and typing through keylogging.
*Keyloggers - used to record the keystroke done by the users. This is done
to steal their password or any other sensitive information. It can record
email messages, or any information you type using your keyboard.
e. Adware a program designed to send you advertisements,
mostly as pop ups 2. Spam- unwanted email mostly from bots or
advertisers. It can be used to send malware
3. Phishing-Its goal is to acquire sensitive personal information like
passwords and credit card details. This is done by sending you an email
that will direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information
*Pharming - a more complicated way of phishing where it exploits the
DNS (Domain Name Service) system
Copyright Infringement
If you create something-an idea, an invention, a form of literary work, or
a research, you have the right as to how it should be used by others. This
is called intellectual property. In other words, the copyright law includes
your rights over your work, and anyone who uses it without your consent
is punishable by law. Try grabbing any book then browse its first few
pages and you will find a page with a disclaimer with the words "No part
of this book may be copied, reproduced. That is a copyright page.
Here are some tips that could help you avoid copyright infringement:
SUBJECT: EMPOWERMENT TECHNOLOGIES 10 |
Page
SUBJECT TECHER: Gemard Jem P. Geñebre
FB ACCT: Gemard Jem Geñebre
CONTACT NO.: 0915-098-8150
ARCHDIOCESE OF LINGAYEN-DAGUPAN CATHOLIC SCHOOLS
URBIZTONDO CATHOLIC SCHOOL, INC.
URBIZTONDO, PANGASINAN
S.Y. 2021-2022
What's In?
Not everyone has the same amount of experience working in the virtual
world. And not everyone knows the rules of Netiquette. At some point,
you will see a stupid question, read an unnecessarily long response, or
encounter misspelled words; when this happens, practice kindness and
forgiveness as you would hope someone would do if you had committed
the same offense. If it's a minor "offense." you might want to let it slide.
If you feel compelled to respond to a mistake, do so in a private email
rather than a public forum.
References:
Shea, V. (1994). Core Rules of Netiquette.
Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html