You are on page 1of 5

LEARNER’S PACKET (LeaP)

Learning Area EMPOWERMENT TECHNOLOGIES

11 Quarter
Learning Days
FIRST QUARTER
Monday & Wednesday, Friday
Week No.
Date Covered
1-2
August 22 – September 22, 2021
I. LESSON TITTLE Introduction to Information and Communication Technologies
• Compare and contrast the nuances of varied online platforms sites, and content
II. MOST ESSENTIAL to best achieve specific class objectives or address situational challenges
LEARNING • Apply online safety, security, ethics, and etiquette standards and practice in the
COMPETENCIES use of ICTs as it would relate to their specific professional tracks
(MELCs) • Use internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational challenges
III. CORE CONTENT Introduction To ICT / Netiquettes /Online Research Skills
IV. LEARNING PHASES AND LEARNING ACTIVITITES
A. Introduction
Observe the picture on the right. What does it tell you? What does
empowerment in technology means? Why is it important?

ICT Defined.
• ICT stands for Information and Communication Technology
• UNESCO has defined ICT as forms of technology that are used to
transmit, process, store, create, display, share or exchange
information by electronic means.

WEB 1.0 WEB 2.0 WEB 3.0


STATIC DYNAMIC SEMANTIC WEB
Characteristics Characteristics
• Stationary • Folksonomy – tagging , # A movement led by the World
• Flat page • Rich User Interface – Wide Web Consortium(W3C).
• Cannot be manipulated responsive to user’s input The semantic web provides a
by user • With User’s Participation framework that allows data to
(users can comment, be shared and reuse to deliver
review, evaluate contents) web content specifically
• Mass Participation – can targeting the user.
be shared through
universal web access

Trends in ICT
Activity 1:
A. Arrange the jumbled letters to identify the TRENDS in ICT being described to:
1. ECRVCGOENEN - ___________________
Technological ___________ is synergy of technological advancement to work on
a similar goal or task. Ex. Smartphones
2. AISLCO EIDMA - ___________________
It is a website, application or online channel that enables web user
to create, discuss, modify and exchange user generated content.
3. MBIOLE TECNOHLOIEGS - ___________________
These refer to smart phones and tablets that has taken a major rise
and popularities over the years.
4. SSAITIESV EMDAI - ___________________
It is a non- profit service designed to help people who have visual and Reading
impairments. A database of audio recordings is used to read to the user. Ex. Text
to speech, applications used for the deaf and the blind.
B. Given examples for the different ICT Trends identified above (part A)

B. Development

Online Safety, Security, Ethics, and Etiquette

◼ Netiquette – term used to describe proper etiquette and rules for online behavior on the internet. (Do’s and Don’ts
of online communication)
 The word netiquette is formed from the words etiquette and net.

1|Page
Internet Safety – It refers to online security or safety of people and their information when using internet.
Tips to Stay Safe Online

The internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using
the internet.

1. Be mindful of what you share online.


2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles
the information you share.
1. Know the security features of the social networking site you use.
2. Do not share your password with anyone.
3. Avoid logging in to public network/Wi-Fi.
4. Do not talk to strangers online.
5. Never post anything about future vacation.
6. Add friends you know in real life.
7. Avoid visiting untrusted websites.
8. Install and update an antivirus software on your computer.
9. Make your Wi-Fi at home private by adding a password.
10. Avoid downloading anything from untrusted websites.
11. Do not use pirated software.
12. Do not click links from suspicious emails

Internet Threats

Here are some of the threats you should be aware of when using the internet:
1. Malware– stands for malicious software
a. Virus-a malicious program designed to replicate itself and transfer from one computer to another either through
the internet and local networks or data storage like flash drives and CDs.
b. Worm-a malicious program that transfer from one computer to another by any type of means. Often, it uses a
computer network to spread itself.
c. Trojan-a malicious program that is disguised as a useful program but once downloaded or installed, leaves you PC
unprotected and allows hackers to get you information.
*Rogue security software-tricks the user into posing that it is a security software. It asks the user to pay to improve
his/her security but in reality, they are not protected at all.
d. Spyware-a program that runs in the background without you knowing it (thus called “spy”). It has the ability to
monitor what you are currently doing and typing through keylogging.
*Keyloggers-used the record the keystroke done by the users. This is done to
steal their password or any other sensitive information.
e. Adware-a program designed to send you advertisements, mostly as pop ups

2. Spam - unwanted emails mostly from bots or advertisers. It can be used to send malware
3. Phishing - Its goal is to acquire sensitive personal information like passwords and credit cards details. This is done by
sending you an email that will direct the user to visit a website and be asked to update his/her username, password,
credit card, or personal information.

Protecting Reputation Online

Make no mistake, you and your family's online reputation is a big deal. There are myriad individuals, including business
associates, neighbors, other family members, and yes, even potential identity thieves searching for you on a regular
basis. Do not share your personal information such as name, address, phone number, bank details, security
passwords, PIN, etc. in different websites without thinking and reviewing the authenticity and security of the websites.

Think Before You Click

'Think Before You Click' encourages internet users to say 'no' when asked to carry out something on the internet and not to
feel bad or intimidated to stop a chat thread or refuse a friend request from someone unknown. Thinking before you post
can also spare you some embarrassment and future backlash.

Here are things you might want to consider before posting something over the Internet:
1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to
see it?
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
3. Set your post to private. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as
inappropriate.

2|Page
Copyright Infringement

Copyright infringement pertains to the violation of someone's intellectual property (IP). It is another term for piracy or the
theft of someone’s original creation, especially if the one who stole recoups the benefits and not the creator of the
material.

Here are some tips that could help you avoid copyright infringement:
1. Copyright laws are designed to protect the creator of original works, which are creative expressions from others using and
profiting their work, without permission.
2. Use Caution If It's Not Your Original Work.
3. Read, Read, Read.
4. Don't Believe the Urban Legends.
5. Look for Fair Use

Contextualized Online Research and Research Skills


Internet research - Internet research is the practice of using Internet information, especially free information on the World
Wide Web, or Internet-based resources in research. Internet research has had a profound impact on the way ideas are
formed and knowledge is created.

Internet Research Strengths


• Researching is faster than other mediums
• Online research is cheaper
• Online surveys are easier for respondents
• Quality of information, Speed, and immediacy
• Online research will save user’s physical distance

Internet Research Weaknesses


• Limited access to certain portals, others are paid.
• Information overload, researcher might get confused with it.
• There are so many incorrect and unverified information online
• Online security (leak of personal information)

Online Research Skills refer to an individual's ability to find and evaluate useful information related to a specific topic online
by performing investigations, using critical analysis, and by using different search engines and search techniques to define
the information you need. The following summarizes the skills you need to perform better in Online Research.

1. Critical Thinking Skills - It is your ability to analyze, reflect and conclude the search results you have made. Before you
believe, evaluate first. Check the following points:
a. Accuracy – check if it is grammatically correct, verifiable and cite.
b. Author – check the credentials/expertise of the information provider.
c. Currency – the data must be updated.
d. Fairness – the content must show all the sides and different points of view.
e. Relevance – the content must be related to the topic.

2. Analytical Skills and Problem Solving Skills - refer to the ability to collect and analyze information, problem-solve, and
make decisions.
Barron and Ivers (1996) outlined the following cycle for online research projects.
Step 1: Questioning --- Before going on the Internet, you should structure their questions.
Step 2: Planning --- Develop a search strategy with a list of sites to investigate.
Step 3: Gathering --- Use the Web to collect and gather information.
Step 4: Sorting & Sifting --- Analyze and categorize the data they gathered on the Web.
Step 5: Synthesizing --- Integrate the information into the lesson, and draw conclusions.

3. Computer Literacy / Online Searching Skills - Just Google it! Google has transcended from being just another search
engine. It has become ubiquitous, often used as a transitive verb. With its ever-evolving algorithms, a dominant online
advertising platform, and personalized user experience, Google has amassed a global market share of 87%. No one serves
up better search results than Google. At least that’s the common perception. There are some other platforms available
online for your specific search needs, there are a number of Google alternatives that offer a better search experience as
follows:
a. Bing - Microsoft Bing is a web search engine owned and operated by Microsoft. The service has its origins in
Microsoft's previous search engines: MSN Search, Windows Live Search and later Live Search. Just like Google, Bing
provides a variety of search services, including web, video, image and map search products.
b. Yandex - It is owned by Yandex, based in Russia. In January 2015, Yandex Search generated 51.2% of all of the
search traffic in Russia according to LiveInternet. Yandex is an overall easy-to-use search engine. As an added bonus,
it offers a suite of some pretty cool tools
c. CC Search - CC Search should be your first stop on the hunt for nearly any type of copyright-free content. This search
engine is perfect if you need music for a video, an image for a blog post, or anything else without worrying about an

3|Page
angry artist coming after you for ripping off their work. The way CC Search works is simple – it draws in results from
platforms such as Sound cloud, Wikimedia, and Flickr and displays results labeled as Creative Commons material.
d. Google Scholar - a freely accessible web search engine that indexes the full text or metadata of scholarly literature
across an array of publishing formats and disciplines.
e. Other social media platforms – Social Networks (Twitter, FB, IG); Bookmarking Sites (Pinterest, Stumble upon); Social
News; Media Sharing (Youtube, Flickr); Microblogging Sites; blogs and forums.

Here are some other techniques you can try to look further and deeper on the topic you need.
Using of Symbols and Words
– Dash or Minus Symbol to remove specific words from Google search results
For example “free ebooks -site:ebay.com” searches for the free ebook sites
excluding ebay.com.
$ Dollar Symbol to get products with the price in $. Search “LG $1000” to get all products from LG
with the having price tag of $1000.
+ Plus Symbol to search Google+ pages. For example, searching for “+webnots” will return the
Google+ page belongs to this site. Example: donors ab+ blood.
@ At Symbol to find relevant social tags mainly from Twitter and other social platforms having
usernames starting with @. Searching “@webnots” will show the first result from Twitter
user profile along with other results from social sites.
# Hash Symbol Number symbol or hashtag is mainly used by social media sites to group together all
relevant posts containing a particular word prefixed by #. For example, searching
“#storytime” will display all related articles having the hashtag “#storytime”.
_ Underscore Symbol Underscore is the symbol in Google search used to connect two words. When you
search “get_start” Google will return related pages having either “get_start” as it is
or connected as “getstart” without the underscore.
” ” Double Quotes Symbol to force Google searching the exact words or phrase mentioned within the quotes.
For example, “fox and crane” will results all pages containing this phrase.
* Asterisk Symbol Asterisk symbol is used for wild card searches in Google. It can be used multiple times
in a single query and used within quotes. Searching “Fortune * the bold” with quotes
will show pages containing the exact phrase in the same sequence replacing * with
any other word like “favors”.
Range or Double Dots (..) Want to search for the TVs from $1000 to $2000? The double dots will do the trick in
Google search. It is used as a range operator to find all relevant results within the
specified range. Example “TV $1000..$2000” to get all the TV products between this
price range.
Tilde Symbol (~) The tilde symbol informs Google to search similar keywords withe same synonyms.
You need to just add ~ symbol before the search keyword. For example, giving
~tutorial also display results for the synonyms like guide, manual, reference etc.
Use OR in Google Search OR is a Boolean value to indicate disjunction. In simple terms using OR operator in
Google search with two keywords will return either one or both of the keywords in the
results. For example. searching “DHTML OR Java” will return all pages with the
keywords either DHTML or Java or both.
Search Operator Info: Search Operator - provides all relevant information of the searched URL
Site: Search Operator - find all relevant URLs indexed in Google search engine
database for the specified site or domain.
Link: Search Operator - link: search operator is a tool to find the inbound links pointing
to your site. For example searching “link:webnots.com” will display all web pages
that link to webnots.com.
Related: Search Operator - This will show all related pages matching the site in your
search query. For example, the search query “related:cnn.com” will show all other
news sites similar to CNN.

Understanding and using the different search engines combined with the searching skills will save your time to get quicker
results and relevant results to save your time and effort.

E. Engagement

Activity 2: Discuss the evolution of ICT using a graphic organizer / infographics (i.e. timeline, mindmap, table,
pictograph)

4|Page
Activity 2: Create campaign materials promoting “Netiquettes” It could be in a form of posters, collage, or cartoon
analysis.

F. Assimilation

Activity 3: Use the different searching techniques and major search engines on the web to find the best idea about the
Municipality of Cainta. Fill out and record your observation on the chart below.

Search Engine Search Technique Result of Search Observations


Ex. Google Cainta + SHS The plus sign defines and
gives all the schools
offering SHS in the
Municipality of Cainta

V. ASSESSMENT

Activity 4
Multiple choice. Choose the letter of the correct answer and write your answer in the space provided before the number.
_____1. ICT deals with the use of different communication technologies that locates, saves, send, and edit
information. This acronym stands for?
A. Information and Communications Technology B. Inform and Communicate Technology
C. Information and Computing Technologies D. Informing and Computing Technologies.
_____2. It allows you to use copyrighted work without consent with certain limitations.
A. Adware B. Fair use C. Virust D. Netiquettes
_____3. It refers to online security or safety of people and their information when using internet
A. Ethics B. Internet Safety C. Internet Threats D. Etiquettes
_____4. One of the key features of Web 2.0 refers to diverse of information sharing through universal web access.
A. Vagueness B. Long tail C. Mass Participation D. Static
_____5. It is a website, application or online channel that enables web user to create, discuss, modify and exchange
user generated content.
A. Technological Convergence B. Social Media C. Mobile Technologies D. Assistive Media

VI. REFLECTION
The learners, in their notebook, journal or portfolio will write their personal insights about the lesson using the prompts
below.
I understand that _________________________________________________________________________________________________.

I realized that _____________________________________________________ ________________________________________________.

VII. REFERENCES
Empowerment-Technologies-Module1-1-3.pdf First Edition, 2020 Department of Education Division Rizal

Checked By: Evelyn Felicia


Prepared By:
Niche T. Lazona Noted By: Victorino V. Butron

5|Page

You might also like