You are on page 1of 11

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region I
PANGASINAN DIVISION II

SAN QUINTIN NATIONAL HIGH SCHOOL


San Quintin, Pangasinan

SENIOR HIGH SCHOOL


School Year: 2020-2021

EMPOWERMENT TECHNOLOGIES
WEEK 1
(G11 STEM & HUMSS)

Prepared by:

MARCELO JOHN V. LAGONOY


Subject Teacher

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 1


I. Topic
INFORMATION AND COMMUNICATION TECHNOLOGY

II. Most Essential Learning Competencies (MELC)

• compare and contrast the nuances of varied online platforms, sites, and content to best achieve
specific class objectives or address situational challenges
o CS_ICT11/12-ICTPT-Ia-b- 1
• apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as
it would relate to their specific professional tracks
o CS_ICT11/12-ICTPT-Ia-b- 2
• use the Internet as a tool for credible research and information gathering to best achieve specific
class objectives or address situational
o CS_ICT11/12-ICTPT-Ia-b- 3

III. Content Discussion


Lesson 1- Information and Communication Technology (ICT)
Information and Communication Technology (ICT)
Information and Communication Technology (ICT) deals with the use of different communication technologies
such as Mobile Phone, Telephones, and Internet to locate, save, save, and edit information.

World Wide Web


The World Wide Web, commonly referred to as WWW, W3, or simply the Web is an interconnected system of
public webpages accessible through the Internet. It was invented Sir Tim Berners-Lee in 1989.
Web pages are what make up the world wide web and it can either be static or dynamic.

Web 1.0
Web 1.0 is a flat page or stationary page (Static) in the sense that the page is “as is” and cannot be manipulated
by the user.

Figure 1https://flatworldbusiness.files.wordpress.com/2010/11/dia84.jpg

Web 2.0
• Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages. Examples of Web 2.0 include social
networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.
• The user can see a website differently than others.
• Allows users to interact with the page
• The user may be able to comment or create a user account.
• Allows users to use web browsers instead of just using their operating system.
• Browsers can now be used for their user interface, application software, and even for file storage.

Features of Web 2.0


o Folksonomy - It allows users to categorize and classify/ arrange information using freely chosen keywords
(e.g., tagging). Uses tags that start with the pound sign (#) which is referred as hashtag.
o Rich User Experience - Content is dynamic and is responsive to user’s input.. In the case of social networking
sites, when logged on, your account is used to modify what you see in their website.

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 2


o User Participation - The owner of the website is not the only one who is able to put content. Others can also
place a content of their own by means of comment, reviews, and evaluation. Some websites allow readers to
comment on an article, participate in a poll, or review a specific product (e.g., Amazon.com, online stores).
o Software as a Service - Users will subscribe to a software only when needed rather than purchasing them. This
is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based
application that allows the user to create and edit word processing and spreadsheet documents online. When
you need a software, like a Word Processor, you can purchase it for a one-time huge amount and install it in
your computer and it is yours forever. Software as a service allows you to “rent” a software for a minimal fee.
o Mass Participation - It is a diverse information sharing through universal web access. Since most users can
use the Internet, Web 2.0’s content is based on people from various cultures.

Figure 2https://flatworldbusiness.files.wordpress.com/2010/11/dia84.jpg

Web 3.0
• It is also called as Semantic Web
• Semantics – ability of Web technologies to understand and interpret human-generated content
• The aim of Web 3.0 is to have machines understand the user’s preferences to be able to deliver web content
specifically targeting the user.
• The Internet is able to predict the best possible answers to your question by “learning from your previous
choices.

Several Problems in Web 3.0


1. Compatibility
HTML files and current web browsers could not support Web 3.0.
2. Security
The user’s security is also in question since the machine is saving his or her preferences.
3. Vastness
The World Wide Web already contains billions of web pages.
4. Vagueness
Certain words are imprecise. The words “old” and “small” would depend on the user.
5. Logic
Since machines use logic, there are certain limitations for a computer to be able to predict what the user
is referring to at a given time.

Figure 3https://flatworldbusiness.files.wordpress.com/2010/11/dia84.jpg

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 3


TRENDS in ICT
1. Convergence
Technological convergence is the synergy of technological advancements to work on a similar goal or
task.
2. Social Media
Social media is a website, application, or online channels that enable web users to create, co-create,
discuss, modify, and exchange user-generated content.
Types of Social Media
a. Social Networks. These are sites that allow you to connect with other people with the same interests or
background.
b. Bookmarking Sites. These are sites that allow you to store and manage links to various websites and
resources.
c. Social News. These are sites that allow users to post their own news items or links to other news sources.
d. Media Sharing. These are sites that allow you to upload and share media content like images, music,
and video.
e. Microblogging. These are sites that focus on short updates from the user.
f. Blogs and Forums. These websites allow users to post their content.
3. Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because
of the devices’ capability to do tasks that were originally found in personal computers.

Different types of mobile operating systems:


a. iOS – used in Apple devices such as the iPhone and iPad
b. Android – an open source operating system developed by Google. Being open source means several
mobile phone companies use this OS for free.
c. Blackberry OS – used in blackberry devices
d. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft
e. Symbian – the original smartphone OS used by Nokia devices
f. WebOS – originally used for smartphones; now used for smartTVs
g. Windows Mobile – developed by Microsoft for smartphones and pocket PCs.

4. Assistive Media
Assistive media is a nonprofit service designed to help people who have visual and reading impairments.
A database of audio recordings is used to read to the user.

ACTIVITY 1: ESSAY
Compare and contrast the Web 1.0, Web 2.0, and Web 3.0 in your own words. Use this rubric as a guide when
writing your essay and check it again before you submit your essay. Use a separate sheet of paper for your
answers.

RUBRICS FOR ESSAY


Traits 5 3 1 Score
Focus & The essay is focused, The essay is focused on topic The essay poorly addresses
Details purposeful, and reflects clear and includes few loosely topic and includes irrelevant
insight and ideas related ideas ideas
Organization Effectively organizes ideas to Some organization of ideas to Little or no organization of
& Format build a logical, coherent build an argument ideas to build an argument
argument

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 4


Language Effective and creative use of Some use of elements of Little or no use of elements of
Use, Style & elements of style to enhance style. style.
Conventions meaning. Contains frequent errors in Many errors in grammar,
Uses correct grammar, spelling, grammar, spelling, and spelling, and punctuation,
punctuation throughout with punctuation makes reader’s
very few errors comprehension difficult
Originality Distinctive experimentation Very little experimentation to No experimentation nor
with language and usage to enhance concepts. enhancement of concepts.
enhance concepts. Does not exhibit creativity No adherence to the theme
Applies higher order thinking
and creative skills to relay
complex ideas
TOTAL SCORE

Lesson 2- Online Safety, Security, Ethics, and Etiquette


Online Safety, Security
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in
touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another
side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.

TYPES of INFORMATION RISKS


First Name Risky cause hackers may already know plenty of stuff about you.
Last Name Small Risk: because there are too many similar last name in the world wide web
Middle Name Not the riskiest, sharing your full name would be.
Current and Previous School Risky for a stolen identity
Cellphone Number Risky for some reason; Random strangers to text or call you; Pretend they are
someone else
Name of Your Mother and Father Risky, yet not risky cause mother’s maiden name usually used for security
question
Name of Your Siblings A huge risk: may pretend to use their identity to dupe you
Address Risky for some criminals may easier to find you
Home Phone Number Riskier than sharing your personal number. Scam may usually use this to
deceive you.
Birthday You may post it to have as much as gift as possible nut having it in your profile
makes you vulnerable to theft.

Tips to Stay Safe Online


The Internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe
when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By keeping your profile private, search engines
will not be able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT protect you
from hackers.
6. Do not talk to strangers whether online or face-to-face/
7. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date.”
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 5


10. Install and update an antivirus software on your computer. Use only one anti-virus software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. But the software, do not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites

INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware – or malicious software, is any program or file that is harmful to a computer user.
Types of Malware:
a. Virus - designed to replicate itself and transfer from one computer to another. (internet, local networks,
FDs, CDs, etc.)
b. Worm - a program that transfers from one computer to another by any type of means.
c. Trojan - a program disguised as a useful program. Rogue Security Software tricks the user that it is a
security software.
d. Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the
ability to monitor what you are currently doing and typing through keylogging. Keylogger is used to
record the keystroke done by the user.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware - or ransom software is a type of malicious software from crypto virology that threatens
to publish the victim's data or perpetually block access to it unless a ransom is paid.
2. Spam - an unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing - its goal is to acquire sensitive personal information like passwords and credit card details. This is done
by sending you an e-mail that will direct the user to visit a fake website and be asked to update his/her username,
password, credit card or personal information. Pharming a more complicated ay of Phishing where it exploits the
DNS system.

ACTIVITY 2.1
WORD BANK EXPLORATION. Find the following information you have shared online (FACEBOOK).
Write your answer on a separate sheet of paper and answer the following questions below.

Middle Name First Name Last Name Mothers Name


Address Fathers Name Name of your Siblings Birthday
cellphone number Home Phone number Boyfriend Vacation

• How many information you have shared?


• So how did these things happen?
• From the listed shared information shared, Rate how risky you are online. 1 is the safest and 5 as riskiest and
explain why.

ACTIVITY 2.2
Share an experience that you often do but later you discover that it is not a standard of ONLINE SAFETY,
SECURITY, ETHICS, AND ETIQUETTE. Use a separate sheet of paper for your answer.

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 6


Lesson 3- Contextualized Online Search and Research Skills

Online Research
Online research is the process of interactively searching for and retrieving requested information via a computer
from databases that are online.

Advantages:
• Ability to obtain a large sample, which increases statistical power.
• Data is automatically coded so no data entry errors
• Reduced cost of conducting research

Disadvantages:
• Online is not totally secure and theft is one of the numerous dangers it poses, researchers’ personal
information is at risk of being access by rogue persons.
• Some of the materials on the internet have not been evaluated by experts or thoroughly screened
• Lack of accreditation and low quality

Search Engines
A Web Search Engine is a software system that is designed to search for information on the World Wide Web.
The information may be a mix of web pages, images, and other types of files.

Copyright issues
Everyone has a somewhat flexible, but not unlimited, copyright privilege under the "fair use clause" of the U.S.
Copyright Act.

Fair use
Fair use is how educators of non-profit educational institutions may use copyrighted works without seeking
permission or making payment to the author or publisher.

Copyright Infringement
If you create something - an idea, an invention, a form of literary work, or a research, you have the right of how
it should be used by others. This is called intellectual property.

Copyrightable works include the following categories:


• literary works
• musical works, including any accompanying words
• dramatic works, including any accompanying music, pantomimes, and choreographic works
• pictorial, graphic, and sculptural works
• motion pictures and other audiovisual works
• sound recordings
• architectural works

THINK BEFORE YOU CLICK


1. Before you post something on the web, ask these questions to yourself: Would you want your parents or
grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you
have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious
responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 7


5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it
as inappropriate.

ACTIVITY 3
CREATING: Create a simple infographic about THINK BEFORE YOU CLICK. Use this rubric as a guide when
making your infographics. Use any materials you have in your house (i.e. bond papers, magazines, posters, etc.).

https://i.poweredtemplates.com/p/dg/04/403/ppt_slide_h_1.png

RUBRICS FOR ARTWORK


Criteria 5 3 1 Score
Craftmanship Demonstrates strong skills Demonstrates some skills No evidence of skill
with the media, technically with the media; development in the media;
accomplished technically proficient little technical competency
Formal Composition is cohesively Composition lacking a Composition lacking a
Qualities unified cohesive appearance cohesive appearance
Strong integration of Some integration of
elements and principles of elements and principles of
design design
Creativity Exhibits distinct Exhibits innovative
Does not exhibit
experimentation and thinking - sufficient
innovative thinking - very
innovation to enhance experimentation to
little experimentation to
creative concepts enhance concepts enhance concepts
Strong apparent Some visible connection to
Does not exhibit creative
connection to the theme the theme thinking skills -uses
unoriginal or over-used
images and/or approach
Interpretation Excellent interpretation Adequate interpretation Poor interpretation and
of Topic and communication of and communication of communication of
thematic concepts thematic concepts thematic concepts due to
inappropriate or
inadequate images or
thoughts
TOTAL SCORE

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 8


IV. Final Activity

MULTIPLE CHOICE: Read the statements or questions carefully and select the best answer. Use a separate
sheet of paper for your answer.

______ 1. These are sites that allow you to connect with other people with the same interests or background.
A. Social Networks C. Social Medias
B. Internet Medias D. Internet Networks
______ 2. It is designed to replicate itself and transfer from one computer to another.
A. Trojan C. Virus
B. Adware D. Worms
______ 3. These are sites that allow users to post their own news items or links to other news sources.
A. Social News C. Social Network
B. Social Media Sites D. Social Networking Sites
______ 4. An open source operating system developed by Google.
A. Web OS C. iOS
B. Windows Phone OS D. Android
______ 5. Risky, yet not risky cause mother’s maiden name usually used for security question.
A. Name of Mother and Father C. Name of Niece and Nephew
B. Name of Sister and Brother D. Name of Auntie and Uncle
______ 6. It developed by Microsoft for smartphones and pocket PCs.
A. Windows Mobile C. Windows Operating System
B. Windows Mobile Legend D. Windows Developers
______ 7. These are sites that allow you to store and manage links to various websites and resources.
A. Media Sharing C. Social News
B. Social Media D. Bookmarking Sites
______ 8. Not the riskiest, sharing your full name would be.
A. Middle Name C. Last Name
B. First Name D. Extension Name
______ 9. It is the synergy of technological advancements to work on a similar goal or task.
A. Social Media C. Assistive Media
B. Technological Convergence D. Mobile Phones
______ 10. A Rogue Security Software tricks the user that it is a security software.
A. Trojan C. Worm
B. Virus D. Adware
______ 11. These are sites that focus on short updates from the user.
A. Vlogging C. Microblogging.
B. Logging D. Blogging
______ 12. Riskier than sharing your personal number. Scam may usually use this to deceive you.
A. Current Phone Number C. Personal Phone Number
B. Company Phone Number D. Home Phone Number
______ 13. This is a nonprofit service designed to help people who have visual and reading impairments. A database of
audio recordings is used to read to the user.
A. Social Media C. Visual Media
B. Assistive media D. Arts Media
______ 14. Any program or file that is harmful to a computer user is called _________.
A. Adware C. Spyware
B. Malware D. Ransomware

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 9


______ 15. If you create something or an idea, an invention, a form of literary work, or a research, you have the right
of how it should be used by others.
A. Intellectual Property C. Intelligence Property
B. Private Property D. Personal
______ 16. It is used as an operating system of Apple devices such as the iPhone and iPad.
A. Android C. blackberry OS
B. iOS D. Symbian
______ 17. This is a process of interactively searching for and retrieving requested information via a computer from
databases that are online.
A. Practical Research C. Online Research
B. Qualitative Research D. Quantitative Research
______ 18. It is how educators of non-profit educational institutions may use copyrighted works without seeking
permission or making payment to the author or publisher.
A. Intellectual Property C. Copyright Law
B. Fair Use D. Copyright Infringement
______ 19. A program designed to send you advertisements, mostly as pop-ups.
A. Ransomware C. Spyware
B. Malware D. Adware
______ 20. An unwanted email mostly from bots or advertisers. It can be used to send malware.
A. Trojan C. Bot
B. Spam D. Virus

V. References
▪ https://flatworldbusiness.files.wordpress.com/2010/11/dia84.jpg
▪ https://prezi.com/p/c9p66rqmfbov/grade-11-lesson-3-contextualized-online-search-and-research-skills/
▪ https://enelsonbalneg.weebly.com/uploads/8/5/5/6/85567274/unit_3_lesson_5__43_-
_52__third_week.pdf
▪ https://www.kpu.ca/sites/default/files/NEVR/High%20School%20Rubrics.pdf

Checked by:

BEVERLY L. GARCIA DAPHNE M. MAGNO JUNELYN J. SAPITULA


Checking Committee Chairman Checking Committee Member Checking Committee Member
Grade 12 Curriculum Chairman Grade 12 Adviser Grade 11 Curriculum Chairman

Recommending Approval:

DOMINGO T. DISMAYA II, EdD


SHS Assistant Principal II

Approved:

EMELDA T. HERNANDEZ
Principal III

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 10


Republic of the Philippines

DEPARTMENT OF EDUCATION
Region I
PANGASINAN DIVISION II

SAN QUINTIN NATIONAL HIGH SCHOOL


San Quintin, Pangasinan

SENIOR HIGH SCHOOL


School Year: 2020-2021

EMPOWERMENT TECHNOLOGIES
Week 1 – Quarter I

ANSWER KEY

B 20. A 15. A 10. A 5.


D 19. B 14. B 9. D 4.
B 18. B 13. A 8. A 3.
C 17. D 12. D 7. C 2.
B 16. C 11. A 6. A 1.
Final Activity:

SQNHS -SHS_HANDOUTS_SY2021 IstSem Page | 11

You might also like