Professional Documents
Culture Documents
EMPOWERMENT TECHNOLOGIES
Information and Communication Technologies
I. INTRODUCTION
Through the power of ICT technologies like computer networks and gadgets made the world
connected in the cyber world. Though we can use these features effortlessly, every one of us needs to be
technology enabled and be aware of the digital community.
On these modules, the learner will learn how the World Wide Web evolves from a flat website to
responsive website. Though this evolution will surely help the learners to be a part of digital world however
the learner needs to learn that their every action online they will be accountable for it.
II. OBJECTIVES
At the end of these modules, you should be able to:
a. Compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges (CS_ICT11/12ICTPT-Ia-
b-1);
b. Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs
(CS_ICT11/12ICTPT-Ia-b-2);
PRE-TEST
A. Multiple Choice: B. True or False
Directions: Read and answer the questions below. Select the Directions: Write “True” if the statement is
letter of the best answer from among the given choices. true and write “False” if the statement
1. A web application where a user can communicate, create is false.
and share content, and participate in online communities? 1. We are allowed to copy the works of
A. Convergence C. Mobile Technologies other people without asking permission.
B. Social Media D. Assistive Media 2. All Information from the internet are
2. What is the markup language for designing and developing free.
websites? 3. Search engine is an application used for
A. DNS C. HTTP searching the web.
B. URL D. HTML 4. All information from the internet are
3. What version of the world wide web that allows interactivity reliable.
between the users and the website? 5. Google is an example of search engine.
A. Web 1.0 C. Web 3.0 6. Child pornography is a form of
B. Web 2.0 D. Web 4.0 cybercrime.
4. A website that allows you to broadcast short message. 7. Committing crime on the internet is not
A. Social News C. Microblogging punishable by law
B. Bookmarking Sites D. Media Sharing 8. Do not open suspicious email.
5. A platform that assist person with disability. 9. Share your password with anyone.
A. Assistive Media C. Convergence 10. Think before you click.
B. Social Media D. Semantic Web
Module 1
The Current State of ICT Technologies
This refers to the use of communication technology such as laptop, smart phones, tablet, telephone,
internet etc. to send, save, and edit information.
The Philippines is the fastest growing app market in Southeast Asia and the highest digital population
in the world. The top online activities are social media, videos, online mobile games, location-based search,
and online shopping. Staying connected with loved ones, friends, and relatives is a fundamental need for
Filipinos.
Activity 1: Visiting Websites Part 1. List down three (3) websites that you have browsed and indicate your
purpose for browsing them.
Activity 1 shows the different websites in World Wide Web. The behavior and characteristics of a website
depends on what version of the development of WWW it was created.
3. Web 3.0 or Semantic Web. The semantic web provides a framework that allows data to be shared and
reuse to deliver web content specifically.
Activity 2: Using the internet, look for the webpages of the pages listed below. Evaluate whether they are
Web 1.0, Web 2.0 or Web 3.0.
1. Amazon.co.ko 6. Siri’s Apple Voice Recognition
2. WolframAlpha 7. Facebook
3. Inquirer.net 8. Encyclopedia Britannica
4. Youtube 9. Twitter
5. Instagram 10. The New York Times
Activity 3. Visiting Websites Part 2. Based on the list of websites you have written in activity 1, identify the
version of the web of each website and defend your answer by writing on the Reason column.
Technology keeps rising and improving every time. The use of technology connects us to the people
around the globe and gives us current information on the trends in information and communication. As what
you have written in the activity above, it shows that social media is mostly used by people and one of the
current trends in information and communication technology.
TRENDS IN ICT
1. Convergence – it refers to fusing of technological advancement to work on a similar task.
Example. Using smartphone as camera in taking pictures instead of DSLR Camera
2. Social Media – an application and website where user can communicate, create and share content,
and participate in online communities.
TYPES OF SOCIAL MEDIA
A. Social Network. website where people with the same
come together to share information.
Examples: Twitter, Instagram, Facebook
Activity 4: Listed below are some of the trends/platforms in ICT. Complete the table below by providing
examples and a short description using the internet.
Activity 5: Directions: Reflect on the following questions and answer them briefly.
1. How dependent are you on technology? _______________________________________________
_______________________________________________________________________________.
2. How do the different online platforms or trends help you as a student in your chosen track?
______________________________________________________________________________.
Module 2
Online Safety, Security, Ethics and Etiquette
The internet is the guiding technology of the Information technology Age just as the electrical
engine war of the Industrial age. In these times, more and more people are already engaged in the use of
technology. These people who are raised in digital, media-saturated world are called digital natives. No
doubt, the internet has been very useful to us but with the rise of instant messaging, chat rooms, emails and
social networking sites, it can also bring trouble-from cyberbullying to more serious internet dangers, including
exposure to sexual predators. Thus, internet safety is always our primary concern.
Activity 1: Read each item carefully and choose the letter of the correct answer.
1. What is netiquette? 4. What is a flame in cyberspace?
A. the proper use of manners and etiquette on the A. a person who follows the rules of Netiquette
internet B. an expert programmer
B. Using a net to catch fish C. an online chain letter
C. Being mean to other people on Facebook D. a post or email message that expresses a strong
D. Using proper manners at the dinner table opinion or criticism
2. What is considered shouting over the internet? 5. Knowledge and understanding of netiquette is
A. screaming at your computer useful because_____________.
B. writing in all CAPS A. it will help you create a positive impression on
C. Putting a lot of exclamation marks at the end of the those you meet in cyberspace
sentence. B. it explains some of the technical limitations of
D. Not answering a friend request on fb. online communications
3. It is OK to forward or post an email message that C. it explains the conventions already being used by
you received if ___________________. millions of cybernuts
A. the message is typed in all capitals D. All of the above
B. The author of the message has given you 6. What type of online threat happens when an
permission to forward or post it. attacker uses electronic devices to do unwanted
C. It does not contain any copyrighted material. surveillance against its victim?
D. The author of the message hasn’t marked it as A. cyberbullying C. scamming
confidential. B. phishing D. pharming
7. What type of online threat happens Activity 2: Shared or Not Shared? That is the Question
when the confidential.
attacker impersonates another Read and reflect each item carefully. Copy the table on your
individual or organization to gather answer sheets and check the space whether you have shared
personal or business information? or not shared these pieces of information in all your social
A. cyberstalking C. scamming media accounts.
B. spoofing D. pharming
8. What type of information should you Type of Information Shared Not shared
avoid giving when using the internet? First name
A. phone number C. shirt size Middle name
B. profile picture D. religion Last name
9. What is the golden rule of netiquette? Current & Previous Schools
A. Remember the human. Cellphone number
B. Put a smiley in every message. Complete name of father &
C. Use correct grammar. mother
D. Respect people’s time. Your parents’ cellphone
10. You get an email telling you that you numbers
won a hundred thousand without joining Name of siblings
in a competition. You Your birthday
should___________,
A. Claim the prize. 1. How many of these information have you shared? Not
B. Ignore the email. shared?
C. Return the email with response. 2. Based on your answers above, do you think you are safe
D. Send rude message as a revenge. when using the internet? Why?
Online safety refers to the practices and precautions that should be observed when using the internet
to ensure that the users as well as their computers and personal information are safe from crimes associated
with using the internet. There are numerous delinquencies that can be committed on the internet such as
stalking, identity theft, privacy violations, and harassment. To avoid these online crimes, follow the following
online safety measures:
• Never give any personal information out about yourself over the internet.
• Do not give any banking or sensitive
information unless you are sure that it is a
reputable business having a secure service.
To make sure that you are in a secured
network, the website address should begin
with “https://’ as opposed to “http://”. Never
access your accounts by following an email
link, instead type your URL by yourself.
• Never open messages or attachments from
someone you do not know.
• Regularly review your privacy settings in your
online accounts to make sure you are not sharing important personal information.
• When using a public computer terminal, be sure to delete your browsing data before leaving.
• Keep your software updated to avoid security holes.
• Do not download or install software or anything on your computer or cell phone that is unknown to
you.
Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:
The Core Rules of Netiquette
Rule 1: Remember the Human.
Rule 2: Adhere to the same standards of behavior online that you follow in real life.
Rule 3: Know where you are in cyberspace.
Rule 4: Respect other people’s time and bandwidth.
Rule 5: Make yourself look good online.
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control.
Rule 8: Respect other people’s privacy.
Rule 9: Don’t abuse your power.
Rule 10: Be forgiving of other people’s mistakes.
Activity 3: Read each item carefully and choose the letter of the correct answer.
1. What type of malicious program is designed to replicate itself and transfer from one computer to another
either through the internet or local networks or data storage like flash drives and CDs?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
4. What is ransomware based on?
A. Fear of hackers B. Fear of the Internet C. Fear of spyware D. Fear of losing important files
5. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from
someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering
their login information.
C. Sending someone a text message looks like a notification that the person has won a contest.
D. Sending someone an email that records their keystroke activities while using their computers.
6. Which of the following must NOT be done if you received an embarrassing picture from your friend?
A. Tell your parents or teachers C. Talk to your friend about its negative outcomes.
B. Send the picture on to other friends D. Discourage your friend from sending pictures like that.
7. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette. C. An online chain letter.
B. An expert programmer. D. A post or email message that expresses a strong
opinion or criticism.
8. What is considered shouting over the Internet?
A. Screaming at your computer. C. Putting a lot of exclamation marks at the end of the
sentence
B. Writing in all CAPS. D. Not answering a friend request on Facebook.
9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
10. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay.
D. You are judged by how you look - your profile picture is important.
Activity 4: Imagine you encounter the following situations. What would you do secur
1. Someone sent you an email that discusses private information
_________________________________________________________________________________
________________________________________________________________________________.
2. You received a text message telling you to click the link which includes the link for the verification code.
_________________________________________________________________________________
________________________________________________________________________________.
Post-test:
A. Directions: Read and answer the questions below. Write the letter of the correct
answer.
1. An application and website where user can communicate, create and share content, and participate in
online communities?
A. Convergence B. Social Media C. Mobile Technologies D. Assistive Media
2. What do you call for the markup language used in World Wide Web?
A. DNS B. URL C. HTTP D. HTML
3. A web page that allows user to interact with web page?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0
4. A website that allows you to broadcast short message.
A. Social News B. Bookmarking Sites C. Microblogging D. Media Sharing
5. Platform that assist person with disability.
A. Assistive Media B. Social Media C. Convergence D. Semantic Web
B. Directions: Write “True” if the statement is true and write “False” if the statement is
false.
IV. References
Empowerment Technologies Quarter 1- Onlinr Safety, Security and Netiquette written by Edlyn Ramos
Dawis
Empowerment Technology Quarter 1- ICT in the Context of Global Communication by Sixie Rozz O.
Penaso
ANSWER KEY
MODULE 1 MODULE 2
Pre-test Activity 1
A. 1. B B. 1. False 6. True 1. A 6. D
2. D 2. False 7. False 2. B 7. B
3.C 3. True 8. True 3. B 8. A
4.C 4. False 9. False 4. D 9. A
5. A 5. True 10. True 5. D 10. B
Activity 1 Activity 2
Students’ answers may vary. Students’ answers may vary.
Activity 2 Activity 3
1. Web 3.0 6. Web 3.0 1. C 6. B
2. Web 3.0 7. Web 2.0 2. A 7. D
3. Web 1.0 8. Web 1.0 3. B 8. B
4. Web 2.0 9. Web 2.0 4. D 9. C
5. Web 2.0 10. Web 1.0 5. A 10. B
Activity 3 Activity 4
Students’ answers may vary. Students’ answers may vary.
Activity 4 Post-test
Students’ answers may vary. A. 1. B B. 1.FALSE 6. TRUE
2. D 2. FALSE 7. FALSE
Activity 5 3. C 3. TRUE 8. TRUE
Students’ answers may vary. 4. C 4. FALSE 9. FALSE
5. A 5. TRUE 10. TRUE