You are on page 1of 11

Empowerment Technology 1

Saint Columban College


SENIOR HIGH SCHOOL DEPARTMENT
7016 Pagadian City

S T U D E N T ’ S L E A R N I N G M O D U L E

Student’s Name: ___________________________ Date: ____________________


Grade & Section:______________ Subject: _________________

Content Standard : The learners demonstrate an understanding of: ICT in the context of
global communication for specific professional track, The use of advanced tools and
techniques found in common productivity and software applications in developing ICT
content for specific professional tracks, how to manipulate text, graphics, and images to
create ICT content intended for an online environment, The principles and techniques of
design using online creation tools, platforms, and applications to develop ICT content for
specific professional tracks and how rich media content and interactivity affects and
changes the user experience in the delivery and consumption of ICT content.

Performance Standard: The learners shall be able to: independently apply advanced
productivity tools to create or develop ICT content for use in specific professional tracks
These may be in the form of, but not limited to: 1. Calculating spread sheet of athletic
statistics (Sports) 2. Layout of catalogue of creative works (Arts) 3. Materials/ ingredients
projections for batches of baked goods (Tech- Voc) 4. Letterhead/ business card design
(Business/ Academic). independently apply the techniques of image manipulation and
graphic design to create original or derivative ICT content from existing images, text and
graphic, independently apply the principles and techniques of design using online creation
tools, platforms, and applications to create original or derivative ICT content for use in
specific professional tracks.

Learning Competencies: Compare and contrast the nuances of varied online platforms,
sites, and content to best achieve specific class objectives or address situational
challenges, apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks, use the Internet as
a tool for credible research and information gathering to best achieve specific class
objectives or address situational.

Learning Contents: Information and Communication Technology Today and Productivity


Tools: Application Techniques

Learning Resources: Empowerment Technology Diwa 2nd Edition.

Core Values: Empowerment technology is important, especially to the millennials to


prepare, to teach the value and to introduce them/us to the proper world of ICT
(Information and Communication Technologies) and also, of course to teach us the proper
etiquette of using it and not the way where people use it in violence that could end up
someone else’s precious life.
Empowerment Technology 2

I. INTRODUCTION:

Dear Student,

Panagdait sa Diyos og sa tanang kabuhatan!

The success of this module lies in your hands. This was prepared
for you to learn diligently, intelligently, and independently. This
will be a great opportunity for you to equip yourself not only with
academic content but as well as some invaluable skills which you
will be very proud of as a responsible learner.

If you have inquiries, you may send a private message on my


Facebook account Delmar J Villegas or you may text me on this
cellphone number 09157601055.

I will be receiving messages during weekdays from 9am to 5pm


only.
Empowerment Technology 3

STUDY SCHEDULE AND HOUSE RULES


Course Title: Empowerment technology
Course Description: Empowerment Technologies is a specialized module designed to
provide students with the foundation of knowledge and skills needed to succeed in
environments that require the use of computer and the Internet. It covers topics for
building essential 21st century skills in working, collaborating, and creating contents
online.

Week Topic Date Time


Week 1 Lesson 1 – Information and Refer to your Refer to your
Communication Technology Schedule Schedule
Today
Week 2 Lesson 2 – Productivity Tools: Refer to your Refer to your
Application Techniques Schedule Schedule

PRELIM EXAMINATION
(February)

How to Use This Module


Set aside any forms of distractions that will disturb you during the lesson. Read the simple
instructions below to complete the module with a smile on your face. Have fun!

1.Follow carefully all the contents and instructions indicated in this module.
2.Take down notes on the concepts about the lessons. Compiling notes enhances
learning.
3.At the end of the month, remove the worksheets and submit them to your teacher.
4.Let your facilitator/ guardian assess your answers using the answer key card.
5.Practice the virtue of honesty in doing all your tasks activities in the module must be
done by you and not by others.
6.Your family and friends may support and guide you but you must not let them do the
work.
7.DO YOUR BEST AND GOD WILL DO THE REST Enjoy studying
Empowerment Technology 4

PARTS OF THE MODULE


• Objectives – These are what you will learn after completing this module.
• Entry Pass – A pre-test that will determine your prior knowledge and the concepts
to be mastered in the lesson.
• Introduction – This section will give you an overview of the lesson.
• Let’s Think & Acts – Activities that verifies how much you learned from the lesson
• Exit Pass – This will measure how much you have learned from the entire module.
• Scissor Icon - Worksheets has scissor icons means that you should cut and submit
the page to your teacher for checking at the end of the month.

SUBJECT REQUIREMENT

• Submit all the worksheets with scissor icons on or before the exam date
• Attach the worksheet in a long white folder
• Some activities in this module will require you to perform activities hence capture
a photo for each performance as documentation and attach it in the folder
• You can also submit your worksheets directly to your teachers Facebook Account
Empowerment Technology 5

LESSON 1 - Information and Communication Technology Today


LESSON OBJECTIVES
• Information and Communication Technology Today

EVOLUTION OF ICT: AGES

Premechanical
The premechanical age is the earliest age of information technology. It can be defined as the time
between 3000B.C. and 1450A.D. We are talking about a long time ago. When humans first started
communicating, they would try to use language or simple picture drawings known as petroglyphs
which were usually carved in rock. Early alphabets were developed such as the Phoenician
alphabet.

Petroglyph
As alphabets became more popular and more people were writing information down, pens and
paper began to be developed. It started off as just marks in wet clay, but later paper was created
out of papyrus plant. The most popular kind of paper made was probably by the Chinese who
made paper from rags.

Now that people were writing a lot of information down, they needed ways to keep it all in
permanent storage. This is where the first books and libraries are developed. You’ve probably
heard of Egyptian scrolls which were popular ways of writing down information to save. Some
groups of people were actually binding paper together into a book-like form.

Also during this period were the first numbering systems. Around 100A.D. was when the first 1-
9 system was created by people from India. However, it wasn’t until 875A.D. (775 years later)
that the number 0 was invented. And yes, now that numbers were created, people wanted stuff
to do with them so they created calculators. A calculator was the very first sign of an information
processor. The popular model of that time was the abacus.
Empowerment Technology 6

Mechanical
The mechanical age is when we first start to see connections between our current technology
and its ancestors. The mechanical age can be defined as the time between 1450 and 1840. A lot
of new technologies are developed in this era as there is a large explosion in interest with this
area. Technologies like the slide rule (an analog computer used for multiplying and dividing) were
invented. Blaise Pascal invented the Pascaline which was a very popular mechanical computer.
Charles Babbage developed the difference engine which tabulated polynomial equations using
the method of finite differences.

Difference Engine
There were lots of different machines created during this era and while we have not yet gotten
to a machine that can do more than one type of calculation in one, like our modern-day
calculators, we are still learning about how all of our all-in-one machines started. Also, if you look
at the size of the machines invented in this time compared to the power behind them it seems
(to us) absolutely ridiculous to understand why anybody would want to use them, but to the
people living in that time ALL of these inventions were HUGE.

Electromechanical
Now we are finally getting close to some technologies that resemble our modern-day technology.
The electromechanical age can be defined as the time between 1840 and 1940. These are the
beginnings of telecommunication. The telegraph was created in the early 1800s. Morse code was
created by Samuel Morse in 1835. The telephone (one of the most popular forms of
communication ever) was created by Alexander Graham Bell in 1876.

The first radio developed by Guglielmo Marconi in 1894. All of these were extremely crucial
emerging technologies that led to big advances in the information technology field. The first
large-scale automatic digital computer in the United States was the Mark 1 created by Harvard
University around 1940. This computer was 8ft high, 50ft long, 2ft wide, and weighed 5 tons –
HUGE. It was programmed using punch cards. How does your PC match up to this hunk of metal?
Empowerment Technology 7

It was from huge machines like this that people began to look at downsizing all the parts to first
make them usable by businesses and eventually in your own home

Electronic
The electronic age is what we currently live in. It can be defined as the time between 1940 and
right now. The ENIAC was the first high-speed, digital computer capable of being reprogrammed
to solve a full range of computing problems. This computer was designed to be used by the U.S.
Army for artillery firing tables. This machine was even bigger than the Mark 1 taking up 680
square feet and weighing 30 tons – HUGE. It mainly used vacuum tubes to do its calculations.

There are 4 main sections of digital computing. The first was the era of vacuum tubes and punch
cards like the ENIAC and Mark 1. Rotating magnetic drums were used for internal storage. The
second generation replaced vacuum tubes with transistors, punch cards were replaced with
magnetic tape, and rotating magnetic drums were replaced by magnetic cores for internal
storage. Also, during this time high-level programming languages were created such as FORTRAN
and COBOL. The third generation replaced transistors with integrated circuits, magnetic tape was
used throughout all computers, and magnetic core turned into metal oxide semiconductors. An
actual operating system showed up around this time along with the advanced programming
language BASIC. The fourth and latest generation brought in CPUs (central processing units)
which contained memory, logic, and control circuits all on a single chip. The personal computer
was developed (Apple II). The graphical user interface (GUI) was developed.
Empowerment Technology 8

World Wide Web


World Wide Web (WWW), byname the Web, the leading information retrieval service of the
Internet (the worldwide computer network). The Web gives users access to a vast array of
documents that are connected to each other by means of hypertext or hypermedia links—i.e.,
hyperlinks, electronic connections that link related pieces of information in order to allow a user
easy access to them. Hypertext allows the user to select a word or phrase from text and thereby
access other documents that contain additional information pertaining to that word or phrase.
Hypermedia documents feature links to images, sounds, animations, and movies. The Web
operates within the Internet’s basic client-server format; servers are computer programs that
store and transmit documents to other computers on the network when asked to, while clients
are programs that request documents from a server as the user asks for them. Browser software
allows users to view the retrieved documents.

Research and Information Seeking


Research and Information Seeking is one of the ideal applications laid down for ICT and the world
wide web is for research and education. Since Web 1.0 the main Objectives of Internet sites cut
to share and disseminate information. This is also helps us to get some information to use
specially in school it serves also as our wide reference for having many meanings about the topic
that is needed for the education of the students. Information Seeking is the very casual thing that
students are doing specially in their research works that needs of deeper study about the topic
they seeking.

Web Search Engine


These are programs designed to search or mine the world wide web based on key words provided
by the user. They return search results such as web site files, photos or other media files. This
also can give you many references because it is very easy to find the meanings of the topic just
type the key word and all the references that is connected to the key word you've entered will
appear everything on the screen and you can open the web sites that has a right or fitted to the
topic that you are needed.

Research Indexing Sites


These are web sites dedicated to compile and index researches done by academic researches,
engines social scientist and so on. And this is also collecting researches and file that is needed.

Massive Online Open Course (MOOC)


These are web sites dedicated to teach and inform users focused on different areas. The delivery
or information is similar to classroom lecture setup wherein lectures and assignments are
delivered and submitted respectively online. In open short this is a Tutorial sites also and this is
to find an open course that is fitted to your skills. This is also having an online enrollment.

Employment Web Sites


These are the web site that enable companies to post job vacancies and also accommodate job
seekers by providing a resume submission facility. Web sites is the ability to match the
qualification of the applicant the required qualification in a certain job vacancy. Employment
Web Sites is an advantage also for the person who is seeking job that is fitted also for their skills
and this is the best way also for the companies to find an employee that is very willing for the job
that is Fitted on them.

Electronic Commerce (E-Commerce)


This is a technology that uses electronic means to trade products and currencies. It is also
including any technology that introduces base in business management and customer
convenience. This is to advertise products to be more known by other people who is not familiar
about this product.
Empowerment Technology 9

Spam is any kind of unwanted, unsolicited digital communication, often an email, that gets sent
out in bulk. Spam is a huge waste of time and resources. The Internet service providers (ISP) carry
and store the data. When hackers can’t steal data bandwidth from the ISPs, they steal it from
individual users, hacking computers and enslaving them in a zombie botnet. Software providers
invest resources creating email applications that try to filter most of the spam out. Consumers
waste time sifting through whatever makes it past the spam filters. According to Oracle Dyn the
total cost of spam, in terms of productivity, energy and technology, adds up to $130 billion. It’s
an annoying and endless cycle.
If there’s an inbox, spammers will find a way to clog it. Spam can also be found on Internet
forums, text messages, blog comments, and social media. Email spam, however, is by far the
most prevalent, and often the most threatening to consumers.

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text
message by someone posing as a legitimate institution to lure individuals into providing sensitive
data such as personally identifiable information, banking and credit card details, and passwords.
The information is then used to access important accounts and can result in identity theft and
financial loss.

Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other
harmful computer programs hackers use to wreak destruction and gain access to sensitive
information. As Microsoft puts it, "[malware] is a catch-all term to refer to any software designed
to cause damage to a single computer, server, or computer network." In other words, software
is identified as malware based on its intended use, rather than a particular technique or
technology used to build it.

This means that the question of, say, what the difference is between malware and a virus misses
the point a bit: a virus is a type of malware, so all viruses are malware (but not every piece of
malware is a virus).
Empowerment Technology 10

LESSON 2 Productivity Tools: Application Techniques


LESSON OBJECTIVES
• Learn what is Productivity Tools: Application Techniques

Mail Merge Utilization: What is a mail merge?


A mail merge is a method of taking data from a database, spreadsheet, or other form of
structured data, and inserting it into documents such as letters, mailing labels, and name tags. It
usually requires two files, one storing the variable data to be inserted, and the other containing
both the instructions for formatting the variable data and the information that will be identical
across each result of the mail merge.

For example, in a form letter, you might include instructions to insert the name of each recipient
in a certain place; the mail merge would combine this letter with a list of recipients to produce
one letter for each person in the list.

You can also print a set of mailing labels or envelopes by doing a mail merge. For labels, for
example, you would construct a source document containing the addresses of the people you
wish to print labels for and a main document that controls where each person's name, address,
city, state, and zip code will go on the label. The main document would also contain information
about how many labels are on a page, the size of each label, the size of the sheet of paper the
labels are attached to, and the type of printer you will use to print the labels. Running a mail
merge with the two files results in a set of labels, one for each entry in the source document,
with each label formatted according to the information in the main document.

Hyperlink
A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new
section within the current document. Hyperlinks are found in nearly all Web pages, allowing users
to click their way from page to page. Text hyperlinks are often blue and underlined, but don't
have to be. When you move the cursor over a hyperlink, whether it is text or an image, the arrow
should change to a small hand pointing at the link. When you click it, a new page or place in the
current page will open.

Hyperlinks, often referred to as just "links," are common in Web pages, but can be found in other
hypertext documents. These include certain encyclopedias, glossaries, dictionaries, and other
references that use hyperlinks. The links act the same way as they do on the Web, allowing the
user to jump from page to page. Basically, hyperlinks allow people to browse information at
hyper speed.
Empowerment Technology 11

Great job! We are finally done with the module! I hope you
enjoyed learning the topic! See you in our next journey!

Prepared by: Delmar Villegas

You might also like