Professional Documents
Culture Documents
S T U D E N T ’ S L E A R N I N G M O D U L E
Content Standard : The learners demonstrate an understanding of: ICT in the context of
global communication for specific professional track, The use of advanced tools and
techniques found in common productivity and software applications in developing ICT
content for specific professional tracks, how to manipulate text, graphics, and images to
create ICT content intended for an online environment, The principles and techniques of
design using online creation tools, platforms, and applications to develop ICT content for
specific professional tracks and how rich media content and interactivity affects and
changes the user experience in the delivery and consumption of ICT content.
Performance Standard: The learners shall be able to: independently apply advanced
productivity tools to create or develop ICT content for use in specific professional tracks
These may be in the form of, but not limited to: 1. Calculating spread sheet of athletic
statistics (Sports) 2. Layout of catalogue of creative works (Arts) 3. Materials/ ingredients
projections for batches of baked goods (Tech- Voc) 4. Letterhead/ business card design
(Business/ Academic). independently apply the techniques of image manipulation and
graphic design to create original or derivative ICT content from existing images, text and
graphic, independently apply the principles and techniques of design using online creation
tools, platforms, and applications to create original or derivative ICT content for use in
specific professional tracks.
Learning Competencies: Compare and contrast the nuances of varied online platforms,
sites, and content to best achieve specific class objectives or address situational
challenges, apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks, use the Internet as
a tool for credible research and information gathering to best achieve specific class
objectives or address situational.
I. INTRODUCTION:
Dear Student,
The success of this module lies in your hands. This was prepared
for you to learn diligently, intelligently, and independently. This
will be a great opportunity for you to equip yourself not only with
academic content but as well as some invaluable skills which you
will be very proud of as a responsible learner.
PRELIM EXAMINATION
(February)
1.Follow carefully all the contents and instructions indicated in this module.
2.Take down notes on the concepts about the lessons. Compiling notes enhances
learning.
3.At the end of the month, remove the worksheets and submit them to your teacher.
4.Let your facilitator/ guardian assess your answers using the answer key card.
5.Practice the virtue of honesty in doing all your tasks activities in the module must be
done by you and not by others.
6.Your family and friends may support and guide you but you must not let them do the
work.
7.DO YOUR BEST AND GOD WILL DO THE REST Enjoy studying
Empowerment Technology 4
SUBJECT REQUIREMENT
• Submit all the worksheets with scissor icons on or before the exam date
• Attach the worksheet in a long white folder
• Some activities in this module will require you to perform activities hence capture
a photo for each performance as documentation and attach it in the folder
• You can also submit your worksheets directly to your teachers Facebook Account
Empowerment Technology 5
Premechanical
The premechanical age is the earliest age of information technology. It can be defined as the time
between 3000B.C. and 1450A.D. We are talking about a long time ago. When humans first started
communicating, they would try to use language or simple picture drawings known as petroglyphs
which were usually carved in rock. Early alphabets were developed such as the Phoenician
alphabet.
Petroglyph
As alphabets became more popular and more people were writing information down, pens and
paper began to be developed. It started off as just marks in wet clay, but later paper was created
out of papyrus plant. The most popular kind of paper made was probably by the Chinese who
made paper from rags.
Now that people were writing a lot of information down, they needed ways to keep it all in
permanent storage. This is where the first books and libraries are developed. You’ve probably
heard of Egyptian scrolls which were popular ways of writing down information to save. Some
groups of people were actually binding paper together into a book-like form.
Also during this period were the first numbering systems. Around 100A.D. was when the first 1-
9 system was created by people from India. However, it wasn’t until 875A.D. (775 years later)
that the number 0 was invented. And yes, now that numbers were created, people wanted stuff
to do with them so they created calculators. A calculator was the very first sign of an information
processor. The popular model of that time was the abacus.
Empowerment Technology 6
Mechanical
The mechanical age is when we first start to see connections between our current technology
and its ancestors. The mechanical age can be defined as the time between 1450 and 1840. A lot
of new technologies are developed in this era as there is a large explosion in interest with this
area. Technologies like the slide rule (an analog computer used for multiplying and dividing) were
invented. Blaise Pascal invented the Pascaline which was a very popular mechanical computer.
Charles Babbage developed the difference engine which tabulated polynomial equations using
the method of finite differences.
Difference Engine
There were lots of different machines created during this era and while we have not yet gotten
to a machine that can do more than one type of calculation in one, like our modern-day
calculators, we are still learning about how all of our all-in-one machines started. Also, if you look
at the size of the machines invented in this time compared to the power behind them it seems
(to us) absolutely ridiculous to understand why anybody would want to use them, but to the
people living in that time ALL of these inventions were HUGE.
Electromechanical
Now we are finally getting close to some technologies that resemble our modern-day technology.
The electromechanical age can be defined as the time between 1840 and 1940. These are the
beginnings of telecommunication. The telegraph was created in the early 1800s. Morse code was
created by Samuel Morse in 1835. The telephone (one of the most popular forms of
communication ever) was created by Alexander Graham Bell in 1876.
The first radio developed by Guglielmo Marconi in 1894. All of these were extremely crucial
emerging technologies that led to big advances in the information technology field. The first
large-scale automatic digital computer in the United States was the Mark 1 created by Harvard
University around 1940. This computer was 8ft high, 50ft long, 2ft wide, and weighed 5 tons –
HUGE. It was programmed using punch cards. How does your PC match up to this hunk of metal?
Empowerment Technology 7
It was from huge machines like this that people began to look at downsizing all the parts to first
make them usable by businesses and eventually in your own home
Electronic
The electronic age is what we currently live in. It can be defined as the time between 1940 and
right now. The ENIAC was the first high-speed, digital computer capable of being reprogrammed
to solve a full range of computing problems. This computer was designed to be used by the U.S.
Army for artillery firing tables. This machine was even bigger than the Mark 1 taking up 680
square feet and weighing 30 tons – HUGE. It mainly used vacuum tubes to do its calculations.
There are 4 main sections of digital computing. The first was the era of vacuum tubes and punch
cards like the ENIAC and Mark 1. Rotating magnetic drums were used for internal storage. The
second generation replaced vacuum tubes with transistors, punch cards were replaced with
magnetic tape, and rotating magnetic drums were replaced by magnetic cores for internal
storage. Also, during this time high-level programming languages were created such as FORTRAN
and COBOL. The third generation replaced transistors with integrated circuits, magnetic tape was
used throughout all computers, and magnetic core turned into metal oxide semiconductors. An
actual operating system showed up around this time along with the advanced programming
language BASIC. The fourth and latest generation brought in CPUs (central processing units)
which contained memory, logic, and control circuits all on a single chip. The personal computer
was developed (Apple II). The graphical user interface (GUI) was developed.
Empowerment Technology 8
Spam is any kind of unwanted, unsolicited digital communication, often an email, that gets sent
out in bulk. Spam is a huge waste of time and resources. The Internet service providers (ISP) carry
and store the data. When hackers can’t steal data bandwidth from the ISPs, they steal it from
individual users, hacking computers and enslaving them in a zombie botnet. Software providers
invest resources creating email applications that try to filter most of the spam out. Consumers
waste time sifting through whatever makes it past the spam filters. According to Oracle Dyn the
total cost of spam, in terms of productivity, energy and technology, adds up to $130 billion. It’s
an annoying and endless cycle.
If there’s an inbox, spammers will find a way to clog it. Spam can also be found on Internet
forums, text messages, blog comments, and social media. Email spam, however, is by far the
most prevalent, and often the most threatening to consumers.
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text
message by someone posing as a legitimate institution to lure individuals into providing sensitive
data such as personally identifiable information, banking and credit card details, and passwords.
The information is then used to access important accounts and can result in identity theft and
financial loss.
Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other
harmful computer programs hackers use to wreak destruction and gain access to sensitive
information. As Microsoft puts it, "[malware] is a catch-all term to refer to any software designed
to cause damage to a single computer, server, or computer network." In other words, software
is identified as malware based on its intended use, rather than a particular technique or
technology used to build it.
This means that the question of, say, what the difference is between malware and a virus misses
the point a bit: a virus is a type of malware, so all viruses are malware (but not every piece of
malware is a virus).
Empowerment Technology 10
For example, in a form letter, you might include instructions to insert the name of each recipient
in a certain place; the mail merge would combine this letter with a list of recipients to produce
one letter for each person in the list.
You can also print a set of mailing labels or envelopes by doing a mail merge. For labels, for
example, you would construct a source document containing the addresses of the people you
wish to print labels for and a main document that controls where each person's name, address,
city, state, and zip code will go on the label. The main document would also contain information
about how many labels are on a page, the size of each label, the size of the sheet of paper the
labels are attached to, and the type of printer you will use to print the labels. Running a mail
merge with the two files results in a set of labels, one for each entry in the source document,
with each label formatted according to the information in the main document.
Hyperlink
A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new
section within the current document. Hyperlinks are found in nearly all Web pages, allowing users
to click their way from page to page. Text hyperlinks are often blue and underlined, but don't
have to be. When you move the cursor over a hyperlink, whether it is text or an image, the arrow
should change to a small hand pointing at the link. When you click it, a new page or place in the
current page will open.
Hyperlinks, often referred to as just "links," are common in Web pages, but can be found in other
hypertext documents. These include certain encyclopedias, glossaries, dictionaries, and other
references that use hyperlinks. The links act the same way as they do on the Web, allowing the
user to jump from page to page. Basically, hyperlinks allow people to browse information at
hyper speed.
Empowerment Technology 11
Great job! We are finally done with the module! I hope you
enjoyed learning the topic! See you in our next journey!