You are on page 1of 9

QUARTER 1 LEARNING ACTIVITY SHEET NO: Modules 1 and 2

EMPOWERMENT TECHNOLOGIES
Information and Communication Technologies

I. INTRODUCTION

Through the power of ICT technologies like computer networks and gadgets made the world
connected in the cyber world. Though we can use these features effortlessly, every one of us needs to be
technology enabled and be aware of the digital community.
On these modules, the learner will learn how the World Wide Web evolves from a flat website to
responsive website. Though this evolution will surely help the learners to be a part of digital world however
the learner needs to learn that their every action online they will be accountable for it.

II. OBJECTIVES
At the end of these modules, you should be able to:
a. Compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges (CS_ICT11/12ICTPT-Ia-
b-1);
b. Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs
(CS_ICT11/12ICTPT-Ia-b-2);

III. LEARNING CONCEPTS/ACTIVITIES

PRE-TEST
A. Multiple Choice: B. True or False
Directions: Read and answer the questions below. Select the Directions: Write “True” if the statement is
letter of the best answer from among the given choices. true and write “False” if the statement
1. A web application where a user can communicate, create is false.
and share content, and participate in online communities? 1. We are allowed to copy the works of
A. Convergence C. Mobile Technologies other people without asking permission.
B. Social Media D. Assistive Media 2. All Information from the internet are
2. What is the markup language for designing and developing free.
websites? 3. Search engine is an application used for
A. DNS C. HTTP searching the web.
B. URL D. HTML 4. All information from the internet are
3. What version of the world wide web that allows interactivity reliable.
between the users and the website? 5. Google is an example of search engine.
A. Web 1.0 C. Web 3.0 6. Child pornography is a form of
B. Web 2.0 D. Web 4.0 cybercrime.
4. A website that allows you to broadcast short message. 7. Committing crime on the internet is not
A. Social News C. Microblogging punishable by law
B. Bookmarking Sites D. Media Sharing 8. Do not open suspicious email.
5. A platform that assist person with disability. 9. Share your password with anyone.
A. Assistive Media C. Convergence 10. Think before you click.
B. Social Media D. Semantic Web

Module 1
The Current State of ICT Technologies

What Is Information and Communications Technology

This refers to the use of communication technology such as laptop, smart phones, tablet, telephone,
internet etc. to send, save, and edit information.
The Philippines is the fastest growing app market in Southeast Asia and the highest digital population
in the world. The top online activities are social media, videos, online mobile games, location-based search,
and online shopping. Staying connected with loved ones, friends, and relatives is a fundamental need for
Filipinos.
Activity 1: Visiting Websites Part 1. List down three (3) websites that you have browsed and indicate your
purpose for browsing them.

No. WEBSITE PURPOSE

Activity 1 shows the different websites in World Wide Web. The behavior and characteristics of a website
depends on what version of the development of WWW it was created.

World Wide Web


The World Wide Web is an information system on the internet that allows documents to be connected
to other documents by hypertext links, enabling the user to search for information by moving from one
document to another. It was invented by Tim-Bernes Lee. The World Wide Web browser software such as
Microsoft’s Internet Explorer/ Edge, Mozilla Firefox, Opera, Apple’s Safari and Google Chrome, let users
navigate from one web page to another via the hyperlinks embedded in the documents.

TYPES OF WEB PAGES


1. Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat or stationary page
since it cannot be manipulated by the user.
2. Web 2.0 or The Social Web. It allows user to interact with the page, the user may not be able to comment
or create a user account. Most website that we visit today are Web 2.0.

Features of Web 2.0


1. Folksonomy – users can classify and arrange information by adding tag or label. Pound sign (#) is
used in Facebook, Twitter, Instagram and other socialnetworking sites.
Example in tagging on Facebook: #TeamKawayan, #Single
2. Rich User Experience – user can have high interaction with the content of the page and
can achieve level of expertise.
3. User Participation – user can put content on their own in web page like comment, evaluation, etc.
4. Long Tail – A site that offers services and brings individual and businesses into selling different goods
and commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others.
5. Software as a service – users can subscribe to a software when they need it instead of purchasing
them.
6. Mass Participation – sharing of diverse information through universal web access.

3. Web 3.0 or Semantic Web. The semantic web provides a framework that allows data to be shared and
reuse to deliver web content specifically.

Below is a comparison of Web 1.0, Web 2.0, and Web 3.0:


CRITERIA WEB 1.0 WEB 2.0 WEB 3.0
Communication Broadcast Interactive Engaged/invested
Information Static/ read-only Dynamic Portable & Personal
Focus Organization Community Individual
Content Ownership Sharing Immersion
Interaction Web forms Web application Smart applications
Search Directories Tags/keywords Context/relevance
Metrics Page views Cost per click User engagement
Advertising Banners Interactive behavioral
Technologies HTML/FTP Flash/Java/XML RDF/RDFS/OWL

Activity 2: Using the internet, look for the webpages of the pages listed below. Evaluate whether they are
Web 1.0, Web 2.0 or Web 3.0.
1. Amazon.co.ko 6. Siri’s Apple Voice Recognition
2. WolframAlpha 7. Facebook
3. Inquirer.net 8. Encyclopedia Britannica
4. Youtube 9. Twitter
5. Instagram 10. The New York Times
Activity 3. Visiting Websites Part 2. Based on the list of websites you have written in activity 1, identify the
version of the web of each website and defend your answer by writing on the Reason column.

No. WEBSITE WEB VERSION REASON

Technology keeps rising and improving every time. The use of technology connects us to the people
around the globe and gives us current information on the trends in information and communication. As what
you have written in the activity above, it shows that social media is mostly used by people and one of the
current trends in information and communication technology.

TRENDS IN ICT
1. Convergence – it refers to fusing of technological advancement to work on a similar task.
Example. Using smartphone as camera in taking pictures instead of DSLR Camera
2. Social Media – an application and website where user can communicate, create and share content,
and participate in online communities.
TYPES OF SOCIAL MEDIA
A. Social Network. website where people with the same
come together to share information.
Examples: Twitter, Instagram, Facebook

B. Social News – A website where user can post stories


and are ranked based on the popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark
Photo Credit: https://www.pexels.com/photo/apps-blur-button-
close-up-267350
E. Microblogging – a website that allows you to
C. Bookmarking Sites – A website that broadcast short message. Examples: Twitter, Tumblr,
allows you to share and store internet Meetme
bookmarks, articles, posts, blogs, images
and others.
Examples: Pinterest, StumbleUpon,
Dribble

Image taken from https://www.tumblr.com/login


Image taken from https://www.pinterest.ph/autologin=true
F. Blogs and Forums- a discussion website that allows
D. Media Sharing – A website that allows user to ask questions and comments on a journal posted
you to share and store multimedia files by an individual or group.
such as video, photos and music. Examples: Wordpress, Blogger
Examples: Instagram, YouTube, Flickr
Image taken from https:/

Image taken from https://www.wordpress.com


Image taken from https:/ /www.youtube.com
3. Mobile Technologies – a technology used in cellular and other devices such as netbook, laptop,
tablet, smartphones etc.
4. Assistive Media - A platform that assist people with disability. It will guide the individual like a blind
person by using an audio recording.

Activity 4: Listed below are some of the trends/platforms in ICT. Complete the table below by providing
examples and a short description using the internet.

Platforms/Trends Examples Description


1. Convergence
2. Social Media
• Social Network
• Social News
• Bookmarking Sites
• Media Sharing
• Microblogging
• Blogs and Forums
3. Mobile Technologies
4. Assistive Media

Activity 5: Directions: Reflect on the following questions and answer them briefly.
1. How dependent are you on technology? _______________________________________________
_______________________________________________________________________________.
2. How do the different online platforms or trends help you as a student in your chosen track?
______________________________________________________________________________.

Module 2
Online Safety, Security, Ethics and Etiquette

The internet is the guiding technology of the Information technology Age just as the electrical
engine war of the Industrial age. In these times, more and more people are already engaged in the use of
technology. These people who are raised in digital, media-saturated world are called digital natives. No
doubt, the internet has been very useful to us but with the rise of instant messaging, chat rooms, emails and
social networking sites, it can also bring trouble-from cyberbullying to more serious internet dangers, including
exposure to sexual predators. Thus, internet safety is always our primary concern.

Activity 1: Read each item carefully and choose the letter of the correct answer.
1. What is netiquette? 4. What is a flame in cyberspace?
A. the proper use of manners and etiquette on the A. a person who follows the rules of Netiquette
internet B. an expert programmer
B. Using a net to catch fish C. an online chain letter
C. Being mean to other people on Facebook D. a post or email message that expresses a strong
D. Using proper manners at the dinner table opinion or criticism
2. What is considered shouting over the internet? 5. Knowledge and understanding of netiquette is
A. screaming at your computer useful because_____________.
B. writing in all CAPS A. it will help you create a positive impression on
C. Putting a lot of exclamation marks at the end of the those you meet in cyberspace
sentence. B. it explains some of the technical limitations of
D. Not answering a friend request on fb. online communications
3. It is OK to forward or post an email message that C. it explains the conventions already being used by
you received if ___________________. millions of cybernuts
A. the message is typed in all capitals D. All of the above
B. The author of the message has given you 6. What type of online threat happens when an
permission to forward or post it. attacker uses electronic devices to do unwanted
C. It does not contain any copyrighted material. surveillance against its victim?
D. The author of the message hasn’t marked it as A. cyberbullying C. scamming
confidential. B. phishing D. pharming
7. What type of online threat happens Activity 2: Shared or Not Shared? That is the Question
when the confidential.
attacker impersonates another Read and reflect each item carefully. Copy the table on your
individual or organization to gather answer sheets and check the space whether you have shared
personal or business information? or not shared these pieces of information in all your social
A. cyberstalking C. scamming media accounts.
B. spoofing D. pharming
8. What type of information should you Type of Information Shared Not shared
avoid giving when using the internet? First name
A. phone number C. shirt size Middle name
B. profile picture D. religion Last name
9. What is the golden rule of netiquette? Current & Previous Schools
A. Remember the human. Cellphone number
B. Put a smiley in every message. Complete name of father &
C. Use correct grammar. mother
D. Respect people’s time. Your parents’ cellphone
10. You get an email telling you that you numbers
won a hundred thousand without joining Name of siblings
in a competition. You Your birthday
should___________,
A. Claim the prize. 1. How many of these information have you shared? Not
B. Ignore the email. shared?
C. Return the email with response. 2. Based on your answers above, do you think you are safe
D. Send rude message as a revenge. when using the internet? Why?

Online safety refers to the practices and precautions that should be observed when using the internet
to ensure that the users as well as their computers and personal information are safe from crimes associated
with using the internet. There are numerous delinquencies that can be committed on the internet such as
stalking, identity theft, privacy violations, and harassment. To avoid these online crimes, follow the following
online safety measures:
• Never give any personal information out about yourself over the internet.
• Do not give any banking or sensitive
information unless you are sure that it is a
reputable business having a secure service.
To make sure that you are in a secured
network, the website address should begin
with “https://’ as opposed to “http://”. Never
access your accounts by following an email
link, instead type your URL by yourself.
• Never open messages or attachments from
someone you do not know.
• Regularly review your privacy settings in your
online accounts to make sure you are not sharing important personal information.
• When using a public computer terminal, be sure to delete your browsing data before leaving.
• Keep your software updated to avoid security holes.
• Do not download or install software or anything on your computer or cell phone that is unknown to
you.

KINDS OF ONLINE THREATS


Online threat is deemed any malicious act that attempts to gain access to a computer network without
authorization or permission from the owners. These are usually done by computer hackers who uses the
World Wide Web to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of which
utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as links in
email or Instant Messaging apps, or any malware attachments on servers that access the Web.
The following are the top kinds of online threats that you should be aware of:
1. Phishing happens when an email is sent from an internet criminal disguised as an email from a
legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or
confidential information.
2. Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead
of a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including
usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually
focus on websites in the financial sector, including banks, online payment platforms, or other e-
commerce destinations.
3. Internet Scam generally refers to someone using
internet services or software to defraud or take
advantage of victims, typically for financial gain.
Cybercriminals may contact potential victims through
personal or work email accounts, social networking
sites, dating apps, or other methods in attempts to
obtain financial or other valuable personal
information. Online scams may come in various forms
such as lottery scam, charity fraud scams, job offer
scams, and online dating scams to name a few.
4. Internet robots are also known as spiders, crawlers, and web bots. It is a software application that
is programmed to do certain tasks. Bots are automated, which means they run according to their
instructions without a human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots are "bad" and are programmed
to break into user accounts, scan the web for contact information for sending spam, or perform other
malicious activities. If it's connected to the Internet, a bot will have an associated IP address.
5. Malware or malicious software, is any program or file that is harmful to a computer user. Here are
the most common offenders in the rogues’ gallery of malware:
• Adware (advertising supported software) is unwanted software designed to throw
advertisements up on your screen. Example, pop-up ads and banner ads.
• Spyware is malware that secretly observes the computer user’s activities without permission
and reports it to the software’s author. Example is a keylogger.
• Virus and Worms are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and
infecting them with its own bits of code.
• Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents
itself as something useful in order to trick you. Once it’s on your system, the attackers behind
the Trojan gain unauthorized access to the affected computer. From there, Trojans can be
used to steal financial information or install threats like viruses and ransomware.
• Ransomware is a form of malware that locks you out of your device and/or encrypts your files,
then forces you to pay a ransom to get them back.
6. Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable
permission for the message to be sent. Spam messages can be damaging if you open or respond to
it.
7. Cyberstalking refers to the use of the internet or other electronic device to harass or stalk individuals
or organizations.
8. Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using the
internet.
9. Spoofing happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.

Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:
The Core Rules of Netiquette
Rule 1: Remember the Human.
Rule 2: Adhere to the same standards of behavior online that you follow in real life.
Rule 3: Know where you are in cyberspace.
Rule 4: Respect other people’s time and bandwidth.
Rule 5: Make yourself look good online.
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control.
Rule 8: Respect other people’s privacy.
Rule 9: Don’t abuse your power.
Rule 10: Be forgiving of other people’s mistakes.
Activity 3: Read each item carefully and choose the letter of the correct answer.

1. What type of malicious program is designed to replicate itself and transfer from one computer to another
either through the internet or local networks or data storage like flash drives and CDs?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
4. What is ransomware based on?
A. Fear of hackers B. Fear of the Internet C. Fear of spyware D. Fear of losing important files
5. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from
someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering
their login information.
C. Sending someone a text message looks like a notification that the person has won a contest.
D. Sending someone an email that records their keystroke activities while using their computers.
6. Which of the following must NOT be done if you received an embarrassing picture from your friend?
A. Tell your parents or teachers C. Talk to your friend about its negative outcomes.
B. Send the picture on to other friends D. Discourage your friend from sending pictures like that.
7. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette. C. An online chain letter.
B. An expert programmer. D. A post or email message that expresses a strong
opinion or criticism.
8. What is considered shouting over the Internet?
A. Screaming at your computer. C. Putting a lot of exclamation marks at the end of the
sentence
B. Writing in all CAPS. D. Not answering a friend request on Facebook.
9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
10. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay.
D. You are judged by how you look - your profile picture is important.

Activity 4: Imagine you encounter the following situations. What would you do secur
1. Someone sent you an email that discusses private information
_________________________________________________________________________________
________________________________________________________________________________.

2. You received a text message telling you to click the link which includes the link for the verification code.
_________________________________________________________________________________
________________________________________________________________________________.

Post-test:
A. Directions: Read and answer the questions below. Write the letter of the correct
answer.
1. An application and website where user can communicate, create and share content, and participate in
online communities?
A. Convergence B. Social Media C. Mobile Technologies D. Assistive Media
2. What do you call for the markup language used in World Wide Web?
A. DNS B. URL C. HTTP D. HTML
3. A web page that allows user to interact with web page?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0
4. A website that allows you to broadcast short message.
A. Social News B. Bookmarking Sites C. Microblogging D. Media Sharing
5. Platform that assist person with disability.
A. Assistive Media B. Social Media C. Convergence D. Semantic Web

B. Directions: Write “True” if the statement is true and write “False” if the statement is
false.

1. It is right to copy the works of other people without asking permission.


2. All Information from the internet are free.
3. Search engine is a tool used in internet research.
4. All information from the internet are reliable.
5. Google is an example of search engine.
6. Child pornography is a form of cybercrime.
7. Committing crime on the internet is not punishable by law
8. Do not share personal information to suspicious website or user.
9. Share your password with anyone.
10. Think before you click.

IV. References

Empowerment Technologies Quarter 1- Onlinr Safety, Security and Netiquette written by Edlyn Ramos
Dawis
Empowerment Technology Quarter 1- ICT in the Context of Global Communication by Sixie Rozz O.
Penaso
ANSWER KEY

MODULE 1 MODULE 2

Pre-test Activity 1
A. 1. B B. 1. False 6. True 1. A 6. D
2. D 2. False 7. False 2. B 7. B
3.C 3. True 8. True 3. B 8. A
4.C 4. False 9. False 4. D 9. A
5. A 5. True 10. True 5. D 10. B

Activity 1 Activity 2
Students’ answers may vary. Students’ answers may vary.

Activity 2 Activity 3
1. Web 3.0 6. Web 3.0 1. C 6. B
2. Web 3.0 7. Web 2.0 2. A 7. D
3. Web 1.0 8. Web 1.0 3. B 8. B
4. Web 2.0 9. Web 2.0 4. D 9. C
5. Web 2.0 10. Web 1.0 5. A 10. B

Activity 3 Activity 4
Students’ answers may vary. Students’ answers may vary.

Activity 4 Post-test
Students’ answers may vary. A. 1. B B. 1.FALSE 6. TRUE
2. D 2. FALSE 7. FALSE
Activity 5 3. C 3. TRUE 8. TRUE
Students’ answers may vary. 4. C 4. FALSE 9. FALSE
5. A 5. TRUE 10. TRUE

You might also like