You are on page 1of 11

GR.

11 ICT EMPOWERMENT TECHNOLOGIES– 1st Quarter Week 3 & 4

Name of Learner: _______________________________________________Date: _____________________


Grade Level/ Section: _______________________School: _________________________________________
MELC: Online Safety and Security
MELC No. 1
The learner compares the nuances of varied online platforms, sites, and content to best achieve specific
class objectives or address situational challenges. (CS_ICT11/12-ICTPT-Ia-b1)
MELC No. 2
The learner applies online safety, security, ethics, and etiquette standards and practice in the use of ICTs
as it would relate to their specific professional tracks. (CS_ICT11/12-ICTPT-Ia-b2)
Enabling Competencies: None

OBJECTIVES: Upon successful completion of this module, you are expected to:
a. Describe and explain how ICT affects everyday lives and the state of our nation;
b. Identify what constitutes appropriate and inappropriate online behavior; and
c. Understand the importance of making judgment calls on possible implications and consequences of making
certain information public.

Activity 1. Let’s Look Back!


Directions: Identify the following digital tools and answer the guide questions that follow.

1. 2. 3. 4. 5.

6. 7. 8. 9. 10.

Guide Questions:
1. How many of the digital tools above did you know?
2. Which tools do you usually use?
3. Do you agree that social media applications are digital tools? Explain your answer.

Activity 2. Ride and Roll!


Directions: Consider the image below. Give three (3) examples of how ICT is being used in each area.
Write your answers on the space provided.
Science Healthcare Education

Government Business Banking

Guide Questions:
1. Explain how ICT affects your everyday life as a student.
2. Describe the relevance of ICT in the development of your own community, for example, in your
barangay.

Current Trends in ICT

World Wide Web is the primary tool used by billions of people to share, read, and write information to interact
with other people via internet. World Wide Web made much progress since its advent, in this article I will be
sharing a brief idea of the evolution happened in web from web 1.0 to 2.0 and to web 3.0.

The first version of web Web 1.0 also referred as Syntactic web or read only web is the era(1990–2000) where
the role of a user is limited to reading information provided by the content producers. There is no option given
for user or consumer to communicate back the information to the content producers. Example of Web 1.0 are
static web sites and personal sites.

The Web 2.0 also referred as Social Web or read-write web is the era(2000–2010 and continues even now)
which facilitates interaction between web users and sites which intern allows users to communicate with other
users. In this era every user can be a content producers and content is distributed and shared between sites.
Some of the famous Web 2.0 applications are Facebook, Youtube, Flickr, Twitter etc., The web technologies like
HTML5, CSS3 and Javascript frameworks like ReactJs, AngularJs, VueJs etc., enables startups to innovate new
ideas which enables users to contribute more in this Social Web. Web 2.0 is build around the users, producer
just need build a way to enable and engage them.

The Web 3.0 also referred as Semantic Web or read-write-execute is the era(2010 and above) which refers to
the future of web. In this era computers can interpret information like humans via Artificial Intelligence and
Machine Learning. Which help to intelligently generate and distribute useful content tailored to a need of a
user.

The Web 2.5 is the concept to address the practical and real evolution which we are currently seeing in our era
2010–2020 between Web 2.0 and 3.0. On our way to Web 3.0 some of player like Amazon, Google, Salesforce,
KiSSFLOW etc., provides a service model in Cloud computing for developers to create web applications for their
users to connect them on any devices, anytime and anywhere.
Web 2.5 is majorly focusing on mobile computing and evolution in mobile technologies. As we all know mobile
computing plays a major role in engaging larger audience via native apps as well as mobile web apps, we can
find more and more apps getting into mobile market to establish their presence by addressing mobile users.
Some of the technologies which got introduced in this era where Progressive Web Apps(PWA), Accelerated
Mobile Pages(AMP) etc., To make in conceptually clear we can call Web 2.5 as the convergence between Social
and Semantic web.

Digital Native - a person born or brought up during the age of digital technology and therefore familiar with
computers and the internet from an early age.

ICT (Information and Communication Technology) - Deals with the use of different communication
technologies such as mobile phones, telephones, internet, etc. to locate, save, send and edit information

Infobits about Philippines in terms of ICT


• Philippines, dubbed as the “ICT Hub of Asia” because of the huge growth of ICT-related jobs around the
country
• Time Magazine’s “The Selfiest Cities around the World” for 2013 placed two cities from the Philippines
in the top 1 and 9 spots Makati City – Ranked 1st and Cebu – Ranked 9th
• Philippines is one of the largest countries which houses BPO centers
• There are 106.8 cellphones for every 100 Filipinos in the year 2012
• Annual Survey of the Philippine Business and Industries, NSO in 2010, the ICT industry shares 19.3% of
the total employment population here in the Philippines

WEB 2.0
• The second stage of development of the World Wide Web, characterized especially by the change from
static web pages to dynamic or user-generated content and the growth of social media.
• Starts 2000 – 2010

Examples of Web 2.0

YouTube Instagram
Wikipedia Tumblr
Twitter E-How
Flickr Photobucket

Features of Web 2.0


• Folksonomy – allows user to categorize and classify/arrange information using freely chosen keywords (e.g.,
tagging)
• Rich User Participation – content is dynamic and is responsive to user’s input
• User Participation – The owner of the website is not the only one who is able to put content. Others are able to
place a content of their own by means of comment, reviews and evaluation.
• Long Tail – services that are offered on demand rather than on one time purchase. In certain cases, time-based
pricing is better that file-size based pricing or vice versa.
• Software as a service – users will subscribe to a software only when needed rather than purchasing them. This
is a cheaper option if you do not always need to use a software.
• Mass Participation- diverse information sharing through universal web access. WEB 3.0
WEB 3.0
• Also known as Semantic Web
• Creation of Web content but not using Natural Language but in the form of script that could be understood by
software agents
• Computer scientists and Internet experts believe that this new paradigm in Web interaction will further make
people's online lives easier and more intuitive as smarter applications such as better search functions give users
exactly what they are looking for, since it will be similar to an artificial intelligence which understands context
rather than simply comparing keywords, as is currently the case.

Examples of Web 3.0

• Amazon
• del.icio.us
• dapper

Online Safety and Security


Each individual when accessing the World Wide Web is concerned with the safety of his or her terminal or
computer and the information that will be transmitted or received.

Terminologies

Spam - refers to the transmission of unsolicited messages from various origins using electronic messaging
systems such as e-mail and chat messengers
• A tool for advertisement
• Unsolicited bulk e-mail (UBE)

Phishing – defined as a software or a program used by an attacker to obtain personal information


• Commonly target user passwords to hack and take control of a user account
Malware – short term for malicious software
• A computer software sent by attackers to inflict chaos on a computer’s operation and processes

How to avoid these threats?

A very effective way of avoiding these threats is verifying the authenticity and credibility of the Web source.
The methods are similar to the methods of verifying the authenticity of information from the World Wide Web.

Government Provisions for Online Courtesy and Etiquette


The Philippine government ensures the welfare of its people in their ICT experience by enacting various laws
and regulations. There are incidents of theft, scam, phishing and other activities that victimize Filipino people.

Republic Act 10627 or Anti-Bullying Act of 2013


What is Bullying? It is defined as “severe or repeated use by one or more students of a written, verbal or
electronic expression, or a physical gesture, or any combination thereof, directed to another student that has
the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage
to his property.”

This law includes protection of individuals from bullying through electronic means. Bullying invades an
individual’s privacy by using photos and other information meant to disgrace that individual.

Republic Act 10175 or Cybercrime Prevention Act of 2012


This law protects an individual from various unwanted online and cyber acts that may harm or evade
one’s privacy and integrity.
Cybercime offenses include, but are not limited to:
• Integrity and availability of data
• Illegal access of computers through remote means without permission
• Interception of one’s information from a private conversation or correspondence
• Acquisition of passwords and other vital information from an individual
• Computer forgery
• Libel

THE CORE RULES OF NETIQUETTE


Netiquette is described as the rules of etiquette that apply when communicating over computer
networks, especially the Internet.
As a daily user of the internet, It is important to know the 10 main core rules of netiquette so that you
will have the basic knowledge on how you’ll act, post and talk in a certain way since you’re dealing with different
kinds of people on the internet.

RULE #1: REMEMBER THE HUMAN.


REMEMBER AND NEVER EVER FORGET that the person reading your mail or posting is, indeed, a person,
with feelings that can be hurt. It is not nice to hurt other person’s feelings, Never mail or post anything you
wouldn’t say to your reader’s face, be always mindful of what you’re posting because the readers may be
affected by it and it’s easy to be misinterpreted online by your correspondent if things aren’t said in a proper
way and lastly notify your readers when flaming.

RULE #2: ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE.
Standards of behavior may be different in some areas of cyberspace, but they are not lower than in real
life. It is important to follow rules and have a proper behavior online. It doesn’t mean that even if you’re just a
human being on the other side of the internet you can act in an improper way (Like Plagiarizing, Bashing, Hating
and bullying etc.). Most people think that the chances of getting caught sometimes seem slim and they also
think that a lower standard of ethics or personal behavior is acceptable in cyberspace. Always be ethical and
follow certain rules (never break the law! you wouldn’t want to be in jail for an act that you’ve committed
online!) Always be careful!

RULE #3: KNOW WHERE YOU ARE IN CYBERSPACE.


What’s perfectly acceptable in one area may be dreadfully rude in another. Always know where you are
online and always be mindful of your thoughts before making decisions and posts. Lurk before you leap, when
you enter a domain of cyberspace that’s new to you, take a look around. Spend a while listening to the chat or
reading the archives. Get a sense of how the people who are already their act. Then go ahead and participate!

RULE #4: RESPECT OTHER PEOPLE’S TIMES AND BANDWIDTH.


Time is gold they say not just in real life but also in the web.
When you send email or post to a discussion group, you’re taking up another people’s time (or hoping to). It’s
your responsibility to ensure that the time they spend reading your posting isn’t wasted and it’s very important
to carry an information that has sense and its useful to the correspondent so that no time is wasted reading an
article that is irrelevant. Wake up! You are not the center of cyberspace., it’s easy to forget that other people
have concerns other than yours. So, don’t expect instant responses to all your questions, and don’t assume that
all readers will agree with or care about your passionate arguments and lastly never forget the rules of a
discussion group.

RULE #5: MAKE YOURSELF LOOK GOOD ONLINE.


Take advantage of your anonymity. This means that in the world at large, most people who communicate
online just want to be liked. Social Networks, discussion groups and etc let you reach out to people you’d
otherwise never meet in real life face to face. And none of them can see you. You won’t be judged by the color
of your skin, eyes, or hair, your weight, your age, or your clothing and always know what you’re talking about
and it should make sense of course. Bad information spreads like wildfire on the net. And once it’s been through
two or three iterations, you get the same distortion effect. Whatever you originally said may be unrecognizable
since it can be edited into something way worse.
So, always just be yourself and produce quality posts! always speak with your heart and mind even if it’s hard!

RULE #6: SHARE EXPERT KNOWLEDGE.


The reason asking questions online works is that a lot of knowledgeable people are reading the questions.
The internet itself grew because the creators of it wanted to share information.
Do your part, share what you know and never be afraid to speak your mind because you’ll never know how
much help you can give to the other correspondents or readers of your post.

RULE #7: HELP KEEP FLAME WARS UNDER CONTROL.


Flaming can be defined as what people do when they express a strongly held opinion without holding
back any emotion.
It’s the kind of message that makes people respond. Netiquette does forbid the perpetuation of flame wars.
Series of angry letters, most of them from two or three people directed toward each other, that can dominate
the tone and destroy the camaraderie of a discussion group. It’s unfair to the other members of the group. And
while flame wars can initially be amusing, they get boring very quickly to people who aren’t involved in them.

RULE #8: RESPECT ANOTHER PEOPLE’S PRIVACY.


Failing to respect another people’s privacy is a very bad Netiquette. We (Internet users) should know
how to respect other people’s private lives. There’s always a reason why it is private, we should all learn how
to respect each other’s privacy.

RULE #9: DON’T ABUSE YOUR POWER


Some people in the cyberspace have more power than others. Knowing more than others, or having
more power than they do, does not give you the right to take advantage of them.

RULE #10: BE FORGIVING OF OTHER PEOPLE’S MISTAKES.


Nobody is perfect. When someone makes a mistake whether it’s a spelling error or a spelling flame, a stupid
question or an unnecessarily long answer — be kind about it. If it’s a minor error, you may not need to say
anything. Even if you feel strongly about it, think twice before reacting. Having good manners, yourself doesn’t
give you license to correct everyone else. If you do decide to inform someone of a mistake, point it out politely,
and preferably by private email rather than in public. Give people the benefit of the doubt; assume they just
don’t know any better. And never be arrogant or self-righteous about it.
Activity 3. Fill Me Up!
Directions: Refer to the table below. Put a check (/) mark under “shared” if you put the information
anywhere in the internet including your social media. Likewise, put a under “not shared” if you haven’t
yet.

Guide Questions:
1. Did you think that this information you shared of yours can cause you to be unsafe especially
using internet? Why or why not?
2. How can search engine locates you?
3. Is there any danger of being found by search engines? Explain your answer.

Activity 4. Let’s Wrap It Up!


Directions: Answer the following questions. Give your complete solutions or explanations.

1. Define Information and Communications Technology in your words.


2. Briefly discuss how you think ICT affects our everyday lives.
3. Enumerate tips on how you can stay safe online.
4. What are the proper online etiquettes that you are already practicing?

Activity 5. What Am I?
Directions: Write at least 5 websites and classify them as static or dynamic.

WEBSITE STATIC or DYNAMIC REASON

Guide Questions:
1. How did you come up with the websites that you listed?
2. How did you classify these websites as static or dynamic?
3. Why do you think it is important to know whether a website is static or dynamic?
Activity 6: Poster Making
Directions: Create a campaign material promoting “Think Before You Click”. It could be in a form of
posters that can be posted along the campus. You can use a short bond paper for this activity. See the
example output below.

CRITERIA POINTS
Content/Mastery 50
Clarity 25
Presentation 25
Total 100

Activity 7: Bring It On!


Directions: Using the Venn diagram provided by the teacher, the students will differentiate the
following concepts.

a. Functions; Web 2.0, Web 3.0

Web 2.0 Similarities Web 3.0

b. Platforms; Web Based, Mobile Based

Web-based Similarities Mobile-based

Guide Questions:
1. What is the major difference between Web 2.0 and Web 3.0? Between web-based and mobile-
based?
2. What do you think is the advantage of Web 2.0 to Web 3.0?
3. What would you choose between web based and mobile based? Why?
Additional Activities

 The learners, in their notebook, journal or portfolio will write their personal insights about the
lesson using the prompts below.
I know that __________________.
I understand that _____________.
I realize that __________________.

Prepared by: Checked by:

JOANNA MARIE T. JAVIER MYRA G. FLORES


T-III MT
References
1. K to 12 Curriculum Guide (Dec, 2013), p.1
2. Empowerment Technologies (Rex Bookstore) p. 5-13
3. Empowerment Technologies Teacher’s Guide (Empowerment Technologies for the Technical-Vocational-
Livelihood Track, First Edition 2016)
4. Picture: Google Images

10
For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

Ground Floor, Bonifacio Bldg., DepEd Complex


Meralco Avenue, Pasig City, Philippines 1600

Telefax: (632) 8634-1072; 8634-1054; 8631-4985

Email Address: blr.lrqad@deped.gov.ph * blr.lrpd@deped.gov.ph

You might also like