Professional Documents
Culture Documents
BUILDING AND ENHANCING NEW LITERACIES ACROSS THE CURRICULUM (ProfEd - PCK6)
First Semester S.Y. 2020-2021
Module 14
G. Mobile devices
What is a Mobile Device?
A mobile device is a general term for any type of handheld computer. These devices are designed to be
extremely portable, and they can often fit in your hand. Some mobile devices—like tablets, e-readers, and
smartphones—are powerful enough to do many of the same things you can do with a desktop or laptop
computer.
Types of Mobile Devices
1. Smartphones
With the rise of Android and iOS, smartphones are the most popular mobile device right now, and for a
good reason. These devices are handheld, can fit in a pocket, have a million and one uses, and help keep
us connected at all times thanks to a constant network connection from a wireless carrier. There are
many different device choices, so it should be easy to find a one that meets all of you needs.
2. Tablets
Similarly to smartphones, tablets share many of the same benefits but in a larger form factor. A tablet
really shines when performing tasks that would be more suitable for a larger display with more battery
life. Some examples include work presentations, heavy gaming, or even live streaming of shows in high
definition on Netflix.
3. Laptop Computers
These devices have always been popular because they give us the functionality of a desktop computer
that we can take anywhere. We can use the same operating system with the same programs, which
means there is no device learning curve. Having a full-sized keyboard, the same input/output ports and
the ability to connect an external display are some added benefits as well.
4. Smartwatches
These devices are relatively new and play in somewhat of a niche market at this point in time. The main
benefits a smartwatch can provide us with are the ability to get notifications and necessary information
on our wrist without having to pick up another device. With some of the new standalone models, we can
even take and receive phone calls just like our smartphones can.
5. E-readers
We have had these devices around for many years, and they share some commonalities with a tablet, but
their primary purpose is for reading. The Amazon Kindle and Barnes & Noble Nook have made the e-
reader a popular choice for people who enjoy reading books in a digital format. These devices changed
the whole concept of reading and helped to bring books into a new era.
6. Handheld Gaming Consoles
These devices go way back to Nintendo's Gameboy, and have forever changed how we think about
mobile gaming. Some of the most well known mobile gaming devices we have today include the
Nintendo Switch and the Nintendo 3DS. Gaming is now one of the most popular forms of entertainment,
and there will always be a need for such devices.
IV- Self- Test
1. With the rise of Android and IOS, These are the most popular mobile device right now, and for a good reason.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
2. These devices are handheld, can fit in a pocket, have a million and one uses, and help keep us connected at
all times thanks to a constant network connection from a wireless carrier.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
3. These devices have always been popular because they give us the functionality of a desktop computer that we
can take anywhere.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
4. Similarly to smartphones, tablets share many of the same benefits but in a larger form factor. A tablet really
shines when performing tasks that would be more suitable for a larger display with more battery life.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
5. It can provide us with are the ability to get notifications and necessary information on our wrist without
having to pick up another device.
a. Smartphones b. Tablets
c. Laptop Computers d. Smart-watches
H. Digital traits
What is Cyber Traits?
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices,
programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as
information technology security.
1. Modest. Those that tend to excel in cybersecurity typically prefer to avoid the spotlight. A successful
cybersecurity agenda is not egotistical or fame hungry and instead favours a more low-key lifestyle. After all,
most of the well-known names in cybersecurity are notorious cyber-criminals.
2. Altruistic. Cybersecurity professionals should want to help people. While they are working all day with
systems and programming, protecting and helping people is at the core of this profession. They should work
well with others and avoid isolating themselves. Fighting threats will require cooperation and trust between
colleagues as they are striving together towards the same security goals.
3. Composed. The enterprise systems they are protecting from attacks are always under threat. Cybersecurity
agents naturally need to have a sense of urgency, but it is crucial that they stay composed handling cyber threats.
Unnecessary outbursts when the pressure is rising can be counterproductive and shift their attention away from
what is at stake.
4. Scientific. The perfect cybersecurity professional wants to solve problems using data and analytic skills.
Cybercriminals are increasingly sophisticated in their attacks and this requires individuals who are highly
technical and value evidence-based decision making.
5. Inquisitive. The world of cybersecurity is ever changing. When threats are prevented, new ones emerge
which can require a completely different set of skills than the ones needed previously. A successful
cybersecurity candidate is imaginative, curious and creative. They need to figure things out quickly, show the
motivation to learn and be open to new ideas.
6. Sceptical. ‘Trust no one’ would be a useful motto for a cybersecurity worker. To get ahead of the game and
prevent attacks means sometimes having to think like a hacker. This means maintaining suspicion about what’s
going on around you because in a world of constant threats, naivety can be a dangerous thing.
7. Responsive. In cybersecurity, things can go wrong quickly, and you might be blamed for breaches that
weren’t your fault. If someone in the company opens a phishing email and exposes sensitive information, you
might be held accountable. It is thus very important for a cybersecurity worker to be open and responsive to
criticisms and avoid being passive-aggressive.
8. Diligent. In a pressured environment with a firm’s security at stake, a successful candidate needs to be detail-
oriented and constantly pushing projects to completion. One small oversight could lead to attacks, so
cybersecurity specialists need to scrutinise every detail. They also need to value achievement and making an
impact.
IV- Self- Test
1. The enterprise systems they are protecting from attacks are always under threat. Cybersecurity agents
naturally need to have a sense of urgency, but it is crucial that they stay composed handling cyber threats.
a. Modest b. Altruistic
c. Composed d. Scientific
2. Cybersecurity professionals should want to help people. While they are working all day with systems and
programming, protecting and helping people is at the core of this profession. They should work well with others
and avoid isolating themselves.
a. Modest b. Altruistic
c. Composed d. Scientific
3. Those that tend to excel in cybersecurity typically prefer to avoid the spotlight. A successful cybersecurity
agenda is not egotistical or fame hungry and instead favours a more low-key lifestyle.
a. Modest b. Altruistic
c. Composed d. Scientific
4. The perfect cybersecurity professional wants to solve problems using data and analytic skills. Cybercriminals
are increasingly sophisticated in their attacks and this requires individuals who are highly technical and value
evidence-based decision making.
a. Modest b. Altruistic
c. Composed d. Scientific
5. The world of cybersecurity is ever changing. When threats are prevented, new ones emerge which can require
a completely different set of skills than the ones needed previously. They need to figure things out quickly,
show the motivation to learn and be open to new ideas.
a. Modest b. Altruistic
c. Composed d. Inquisitive
V- Learning Activity
INSTRUCTION: (Group work) Present teaching strategies showcasing the positive use of ICT to
promote learners’ digital literacy.
Output: Group project
a. Avoid Over-Sharing
b. Build a Legacy for the Future
c. Don’t Misrepresent Yourself
d. Don’t Drink and Tweet
20. Ramp up the privacy settings on your personal accounts so your posts aren’t visible to non-contacts.
Remove and un-tag morally or legally questionable photos.
a. Avoid Over-Sharing
b. Build a Legacy for the Future
c. Don’t Misrepresent Yourself
d. Don’t Drink and Tweet
IX- Referrences:
https://www.techopedia.com/definition/5411/website
http://frimmerclass.weebly.com/exploring-the-internet-researching-and-evaluating-the-web.html
https://whatis.techtarget.com/definition/social-media
https://www.moneycrashers.com/social-media-etiquette-tips-personal-business/
https://edu.gcfglobal.org/en/computerbasics/mobile-devices/1/
https://www.computerhope.com/jargon/m/mobile.htm
https://study.com/academy/lesson/mobile-devices-examples-impact-trends.html
https://edu.gcfglobal.org/en/computerbasics/mobile-devices/1/
https://www.computerhope.com/jargon/m/mobile.htm
https://irishtechnews.ie/the-8-personality-traits-to-succeed-in-cybersecurity/
https://digitalguardian.com/blog/what-cyber-security