Professional Documents
Culture Documents
DEPARTMENT OF EDUCATION
Region I
PANGASINAN DIVISION II
EMPOWERMENT TECHNOLOGIES
WEEK 1
(G11 STEM & HUMSS)
Prepared by:
• compare and contrast the nuances of varied online platforms, sites, and content to best achieve
specific class objectives or address situational challenges
o CS_ICT11/12-ICTPT-Ia-b- 1
• apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as
it would relate to their specific professional tracks
o CS_ICT11/12-ICTPT-Ia-b- 2
• use the Internet as a tool for credible research and information gathering to best achieve specific
class objectives or address situational
o CS_ICT11/12-ICTPT-Ia-b- 3
Web 1.0
Web 1.0 is a flat page or stationary page (Static) in the sense that the page is “as is” and cannot be manipulated
by the user.
Figure 1https://flatworldbusiness.files.wordpress.com/2010/11/dia84.jpg
Web 2.0
• Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages. Examples of Web 2.0 include social
networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.
• The user can see a website differently than others.
• Allows users to interact with the page
• The user may be able to comment or create a user account.
• Allows users to use web browsers instead of just using their operating system.
• Browsers can now be used for their user interface, application software, and even for file storage.
Figure 2https://flatworldbusiness.files.wordpress.com/2010/11/dia84.jpg
Web 3.0
• It is also called as Semantic Web
• Semantics – ability of Web technologies to understand and interpret human-generated content
• The aim of Web 3.0 is to have machines understand the user’s preferences to be able to deliver web content
specifically targeting the user.
• The Internet is able to predict the best possible answers to your question by “learning from your previous
choices.
Figure 3https://flatworldbusiness.files.wordpress.com/2010/11/dia84.jpg
4. Assistive Media
Assistive media is a nonprofit service designed to help people who have visual and reading impairments.
A database of audio recordings is used to read to the user.
ACTIVITY 1: ESSAY
Compare and contrast the Web 1.0, Web 2.0, and Web 3.0 in your own words. Use this rubric as a guide when
writing your essay and check it again before you submit your essay. Use a separate sheet of paper for your
answers.
INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware – or malicious software, is any program or file that is harmful to a computer user.
Types of Malware:
a. Virus - designed to replicate itself and transfer from one computer to another. (internet, local networks,
FDs, CDs, etc.)
b. Worm - a program that transfers from one computer to another by any type of means.
c. Trojan - a program disguised as a useful program. Rogue Security Software tricks the user that it is a
security software.
d. Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the
ability to monitor what you are currently doing and typing through keylogging. Keylogger is used to
record the keystroke done by the user.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware - or ransom software is a type of malicious software from crypto virology that threatens
to publish the victim's data or perpetually block access to it unless a ransom is paid.
2. Spam - an unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing - its goal is to acquire sensitive personal information like passwords and credit card details. This is done
by sending you an e-mail that will direct the user to visit a fake website and be asked to update his/her username,
password, credit card or personal information. Pharming a more complicated ay of Phishing where it exploits the
DNS system.
ACTIVITY 2.1
WORD BANK EXPLORATION. Find the following information you have shared online (FACEBOOK).
Write your answer on a separate sheet of paper and answer the following questions below.
ACTIVITY 2.2
Share an experience that you often do but later you discover that it is not a standard of ONLINE SAFETY,
SECURITY, ETHICS, AND ETIQUETTE. Use a separate sheet of paper for your answer.
Online Research
Online research is the process of interactively searching for and retrieving requested information via a computer
from databases that are online.
Advantages:
• Ability to obtain a large sample, which increases statistical power.
• Data is automatically coded so no data entry errors
• Reduced cost of conducting research
Disadvantages:
• Online is not totally secure and theft is one of the numerous dangers it poses, researchers’ personal
information is at risk of being access by rogue persons.
• Some of the materials on the internet have not been evaluated by experts or thoroughly screened
• Lack of accreditation and low quality
Search Engines
A Web Search Engine is a software system that is designed to search for information on the World Wide Web.
The information may be a mix of web pages, images, and other types of files.
Copyright issues
Everyone has a somewhat flexible, but not unlimited, copyright privilege under the "fair use clause" of the U.S.
Copyright Act.
Fair use
Fair use is how educators of non-profit educational institutions may use copyrighted works without seeking
permission or making payment to the author or publisher.
Copyright Infringement
If you create something - an idea, an invention, a form of literary work, or a research, you have the right of how
it should be used by others. This is called intellectual property.
ACTIVITY 3
CREATING: Create a simple infographic about THINK BEFORE YOU CLICK. Use this rubric as a guide when
making your infographics. Use any materials you have in your house (i.e. bond papers, magazines, posters, etc.).
https://i.poweredtemplates.com/p/dg/04/403/ppt_slide_h_1.png
MULTIPLE CHOICE: Read the statements or questions carefully and select the best answer. Use a separate
sheet of paper for your answer.
______ 1. These are sites that allow you to connect with other people with the same interests or background.
A. Social Networks C. Social Medias
B. Internet Medias D. Internet Networks
______ 2. It is designed to replicate itself and transfer from one computer to another.
A. Trojan C. Virus
B. Adware D. Worms
______ 3. These are sites that allow users to post their own news items or links to other news sources.
A. Social News C. Social Network
B. Social Media Sites D. Social Networking Sites
______ 4. An open source operating system developed by Google.
A. Web OS C. iOS
B. Windows Phone OS D. Android
______ 5. Risky, yet not risky cause mother’s maiden name usually used for security question.
A. Name of Mother and Father C. Name of Niece and Nephew
B. Name of Sister and Brother D. Name of Auntie and Uncle
______ 6. It developed by Microsoft for smartphones and pocket PCs.
A. Windows Mobile C. Windows Operating System
B. Windows Mobile Legend D. Windows Developers
______ 7. These are sites that allow you to store and manage links to various websites and resources.
A. Media Sharing C. Social News
B. Social Media D. Bookmarking Sites
______ 8. Not the riskiest, sharing your full name would be.
A. Middle Name C. Last Name
B. First Name D. Extension Name
______ 9. It is the synergy of technological advancements to work on a similar goal or task.
A. Social Media C. Assistive Media
B. Technological Convergence D. Mobile Phones
______ 10. A Rogue Security Software tricks the user that it is a security software.
A. Trojan C. Worm
B. Virus D. Adware
______ 11. These are sites that focus on short updates from the user.
A. Vlogging C. Microblogging.
B. Logging D. Blogging
______ 12. Riskier than sharing your personal number. Scam may usually use this to deceive you.
A. Current Phone Number C. Personal Phone Number
B. Company Phone Number D. Home Phone Number
______ 13. This is a nonprofit service designed to help people who have visual and reading impairments. A database of
audio recordings is used to read to the user.
A. Social Media C. Visual Media
B. Assistive media D. Arts Media
______ 14. Any program or file that is harmful to a computer user is called _________.
A. Adware C. Spyware
B. Malware D. Ransomware
V. References
▪ https://flatworldbusiness.files.wordpress.com/2010/11/dia84.jpg
▪ https://prezi.com/p/c9p66rqmfbov/grade-11-lesson-3-contextualized-online-search-and-research-skills/
▪ https://enelsonbalneg.weebly.com/uploads/8/5/5/6/85567274/unit_3_lesson_5__43_-
_52__third_week.pdf
▪ https://www.kpu.ca/sites/default/files/NEVR/High%20School%20Rubrics.pdf
Checked by:
Recommending Approval:
Approved:
EMELDA T. HERNANDEZ
Principal III
DEPARTMENT OF EDUCATION
Region I
PANGASINAN DIVISION II
EMPOWERMENT TECHNOLOGIES
Week 1 – Quarter I
ANSWER KEY