You are on page 1of 27

MODULE 1

INTRODUCTION TO EMPOWERMENT
TECHNOLOGIES

What This Module is About


Through the power of ICT technologies like computer networks and gadgets made the
world connected in the cyber world. Though we can use these features effortlessly, every one
of us needs to be technology-enabled and be aware of the digital community.

In this module, you will learn how the World Wide Web evolves from a flat website to a
responsive website. Though this evolution will surely help you to be a part of the digital world
however you need to learn that their every action online you will be accountable for it.

What I Need to Know


At the end of this module, you should be able to:

1. Compare and contrast the nuances of varied online platforms, sites, and content
to best achieve specific class objectives or address situational challenges;
2. Apply online safety, security, ethics, and etiquette standards and practice in the
use of ICTs as it would relate to their specific professional tracks;
3. Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational challenges.

How to Learn from this Module


To achieve the objectives cited above, you are to do the following:

1. Carefully read all the lessons.


2. Take your time going thru each lesson.
3. If you have a hard time understanding the lessons and activities, please do take a
break. Having breaks between lessons and activities will give you some space
where you can absorb the lesson well.
4. You can use the internet if you need more information about the lesson.
Meaning of Icons in this Module

What I Need to Do – this icon is used to introduce the learning objectives


in this module.

What’s In – this icon is used to connect your previous learning with the
new lesson.

What’s New – this icon is used to introduce a new lesson through a


story, an activity, a poem, song, situation, or activity.

What is It – this icon will help you discover and understand


entrepreneurial concepts.

What’s More – this icon will help enrich your learning of entrepreneurial
concepts.

What I Have Learned – this icon will help you process what you have
learned in the lesson.
What I Can Do – this icon allows you to apply what you have learned to
real-life situations.

Assessment – this icon evaluates your level of mastery in achieving the


learning objectives.

Additional Activities – this icon enhances your learning and improves


your mastery of the lesson.
INTRODUCTION

Empowerment Technology or E-Tech often deals with the use of different technologies
such as mobile phones, telephone, computers, and other devices to locate, save, communicate,
and inform. Meaning you are empowering the technologies to do things for us, to make our
work easier with the help of these different technologies. These technologies are important for
their innovative uses are sufficient in our daily lives. To note, empowerment technology is
important for communication, to make our lives easier, and to help our county with its
modernization plans.

Empowerment Technology is important for it is used as a source of communication. As


years passed, lots of gadgets and other devices have improved their uses. Before, a cellular
phone is only used for texting, calling, and playing simple games. Now, due to technology
convergence or the way technology changes or evolves its system, a cellular phone is not just
used for texting, calling, and playing simple games. It is now used for communicating with
people from other places by the use of the internet and applications or software such as
Facebook, Messenger, Twitter, Viber, Kakao talk, etc. that is consistently been used by almost
every one of us. Communication with other people who are far from us will never be a problem
anymore. A friendship that has been broken by distance has now been rebuilt through the use
of technology.

Empowerment Technology is important since it makes our individual lives easier in


different aspects such as school matters, office or work matters, and our matters. Remember,
blackboards and whiteboards are some of the tools used in teaching students. Now, there are
already LCD Projectors that are being used by many institutions or schools that made the lives
of teachers/professors easier. And for office or work matters it can be used for presentation
for them to easily present their report.

Empowerment Technology is important for it also helping our country with its
modernization plans. You all knew that we are now living in a world where everyone is
upgrading its systems. It is called modernization. Empowering these technologies can help in
the modernization of our country because it can strengthen our plans to be competitive with
other countries by building up some new technologies for the betterment of our nation. The
Philippines has the potential onto being competitive in both hardware and Information since
we have good programmers and very innovative in hardware production.
LESSON 1

The Current State of ICT Technologies

What I Need to Know

Information and Communication Technology

It refers to the use of communication technology such as laptops, smartphones, tablets,


telephones, the internet, etc. to send, save, and edit information.

ICT in the Philippines

The use of communication technology spread in the entire country now a day even in
rural areas. According to the Rappler blog site, there are 119 million mobile phone
subscriptions from a total population of 101 million and 47 million active Facebook accounts.
The Philippines is the fastest growing app market in Southeast Asia and the highest digital
population in the world. The top online activities are social media, videos, online mobile games,
location-based search, and online shopping. Staying connected with loved ones, friends, and
relatives is a fundamental need for Filipinos.

What’s New

Activity L1.1: Visiting Website Part 1

Directions: List down three (3) websites that you have browsed. NOTE: This is found in Moodle,
kindly answer it there.

Website
1.
2.
3.
What Is It
Activity 1 shows the different websites on World Wide Web. The behavior and characteristics
of a website depend on what version of the development of WWW it was created.

World Wide Web

It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different


pages that are formatted in a markup language called HTML (Hypertext Markup Language) and
linked to each other that contain text, graphics, multimedia files, hyperlinks, etc.

Web 1.0

The first development of the World Wide Web where web pages are static. It is also
known as a flat or stationary page and it cannot be manipulated by users.
Web 2.0

It is a dynamic web page where users can interact with the page like creating a user
account, posting comments, uploading files and images, and others. Example: Blog sites,
Facebook, Twitter, Instagram, YouTube Features of Web 2.0

Features of Web 2.0


Folksonomy – users can classify and arrange information by adding tags or labels. The
pound sign (#) is used in Facebook, Twitter, Instagram, and other social networking
sites. Example in tagging on Facebook: #TeamKawayan, #Single

Rich User Experience – users can have high interaction with the content of the page and
can achieve a level of expertise.

User Participation – users can put content on their own on a web page like comment,
evaluation, etc.

Long Tail – A site that offers services and brings individuals and businesses into selling
different goods and commodities such as shopping sites like OLX, Lazada, Shopee,
Zalora, and others.
Software as a service – users can subscribe to software when they need it instead of
purchasing them.

Mass Participation – sharing of diverse information through universal web access.

Web 3.0 The Semantic Web

A new paradigm in web interaction extension led by World Wide Web Consortium
(W3C) where it provides a framework that allows data to be shared and reuse.

What’s More
Activity L1.2: Visiting Websites Part 2

Directions: Based on the list of websites you have written in activity 1,


identify the version of the web of each website and defend your answer by writing on the
Reason column. NOTE: This is found in Moodle, kindly answer it there.

Website Web Version Reason


1.
2.
3.
What’s New
Activity L1.3: Social Media

Directions: List down five (5) social media that you have been used.

Social Media Used


1.
2.
3.
4.
5.

What Is It
Technology keeps rising and improving every time. The use of technology
connects us to the people around the globe and gives us current information on the trends in
information and communication. As you have written in the activity above, it shows that social
media is mostly used by people and one of the current trends in information and
communication technology.

Trends in ICT
Convergence – it refers to the fusing of technological advancement to work on a similar
task. Example: Using a smartphone as a camera in taking pictures instead of a DSLR
camera.

Social Media – an application and website where users can communicate, create and
share content, and participate in online communities.

.
Type of Social Media

 Social Network – A website where people with the same come together to share
information.
Examples: Twitter, Instagram, Facebook

Image is taken from https://www.facebook.com

 Social News – A website where users can post stories and are ranked based on
popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark

The image is taken from https://www.reddit.com


 Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images, and others.
Examples: Pinterest, StumbleUpon, Dribble

Image is taken from https://www.pinterest.ph/autologin=true

 Media Sharing – A website that allows you to share and store multimedia files
such as video, photos, and music.
Examples: Instagram, YouTube, Flickr

Image is taken from https://www.youtube.com


 Microblogging – a website that allows you to broadcast short messages.
Examples: Twitter, Tumblr, Meetme

Image is taken from https://www.tumblr.com/login

 Blogs and Forums – a discussion website that allows users to ask questions and
comments on a journal posted by an individual or group.
Examples: WordPress, Blogger

Image is taken from https://www.wordpress.com


Mobile Technologies – a technology used in cellular and other devices such as a
netbook, laptop, tablet, smartphones, etc.

Assistive Media - A platform that assists people with disabilities. It will guide the
individual like a blind person by using an audio recording.

What I Have Learned


Activity L1. 4: Generalization

In what way is ICT very useful in your studies? NOTE: This is found in Moodle, kindly answer it
there.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
___________________________________________________.
LESSON 2
Online Safety,
Security, Ethics, and Etiquette

What’s In
You have learned in lesson 1 about the current state of Information and
Communication Technology in a global setting. There are various online
platforms and sites that people used today as their medium of communication and source of
information. This communication technology spread fast to the people and even controls their
lives. Despite the good benefits given to us by technology, there are stills things that we must
be aware of. In this lesson, we will discuss and give importance to online safety, security, ethics,
and etiquette.

What I Need to Know


Online Safety

The importance of the internet plays a crucial part in human development. Life becomes
easy and comfortable because of this technology. Most of us are connected to the internet via
laptop, mobile phone, tablet, personal computer, and other electronic gadgets. Behind this
technology, there is a risk that everyone should be aware of. You could be at risk of scams,
bullying, and illegal activities if you will not take precautions in using the internet. We need to
keep ourselves safe and secure whenever we use the internet. That is why it is very important
to know and learn the ways on how to be safe and secured online.
What’s New
Activity L2.1: Self-Check on Online Habits

Directions: Reflect and assess yourself on your online habits. Check “Yes” or “No” on the table
below. NOTE: This is found in Moodle, kindly answer it there.

Online Habits Yes No


I always talk to strangers on social media.
Giving your password to your friends.
Posting about future your vacations.
Visiting unsecured websites.
Ranting on social media.
Posting image or video without asking permission from the owner.

What Is It

In the activity above you assessed yourself in online habits. Those habits might
be good or bad that you must be aware of. If you keep practicing those bad habits it might bring
you danger. Safety is the first thing you must consider in using the internet.

Tips on how to be safe online

 Do not share your password with anyone.


 Add friends you know in real life.
 Do not visit untrusted websites.
 Add password to your WIFI at home to make it private.
 Install and update the antivirus on your computer.
 Do not give your personal information to anyone.
 Think before you click.
 Never post about your future vacation.
Internet Risk
Cyberbullying

It happens when someone intentionally abused, harass, and is mistreated by


another person using electronic communication.

Identity Theft

It is a crime of stealing personal information to assume that person’s name or


identity to make any form of transaction.

Cyber Stalking

A criminal practice where electronic communication is used to stalk or harass an


individual or group.

Sexting

The act of sending sexually explicit text messages, images, and videos.

Internet Threats
Malware – also known as Malicious Software.

Types of Malware

 Virus – a malicious program that replicates itself by copying itself to another program.
 Trojan Horse – a malicious program that disguised as a legitimate program that user will
accept and use but take control of your computer.
 Worm – malicious program that copy’s itself and spreads to other computers.
 Spyware – A malicious program that gathers information from a victim’s computer and
sends it back to the hacker.
 Adware – An unwanted advertisement that will pop up several times on the victim’s
computer then behave abnormally and tedious to close them.
 Keylogger – A program that runs in the background and steals user credentials and
confidential information and sends it back to hack by recording every keystroke that a
user makes on their computer or device.
 Botnet – A collection of infected internet-connected devices such as PC and mobile
phones that are controlled by a common type of malware.
 Rootkit – A software tool used by hackers to gain control over a computer on a network
without being exposed.
 Ransomware – A ransom virus that blocks the user from accessing the programs or files
and demands to pay the ransom through an online method for the removal of the virus.

Spam

Also known as junk email or unwanted email send by advertiser or bot. It can be used to
send malware.

Phishing

A cyberattack method using deceptive emails and websites to acquiring sensitive


personal information.

Cybercrime

A crime in which computer is used as object and tool in committing a crime such
hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

Cybercrime Law

A law that deals with all forms of cybercrime.

What’s New

Activity L2.2: #Wall

Suppose you have read a post like this “Strong men don’t cry” on social media. How would you
react? Post your reaction in the comment section on our #Wall. (NOTE: Instead of writing your
comment here, write it in the FORUM in Moodle)

#Wall

“Strong Men don’t cry”


Comment:
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
What Is It
The activity above shows how we react to a post by expressing our opinions
and feelings through comments, likes, and emoticons. There are times that
netizens will give compliments and positive reactions to your post but there are also times that
netizens will criticize or give negative reactions to your post. Conflicts and misunderstandings
occur in social media because netizens are not behaving well. Ethics and etiquette should be
practice by people whenever they are on social media.

Netiquette

It is a word that came from the two words “net” and “etiquette”. It is an etiquette
applied online that shows proper manners and behavior. If you are a member of an online
society through social media you are called a netizen. And in interacting with other netizens
online, we need to maintain good behavior which is acceptable to others in an online
community.

The Core Rules of Netiquette by Seth T. Ross

1. Remember the human.


2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.

What I Have Learned


Activity L2.3: Generalization

Directions: Answer the following questions below. NOTE: This is found in


Moodle, kindly answer it there.
1. How do you keep yourself safe and secure online?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
2. Why is it important to observe netiquette online?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

What I Can do
Activity 4: Shout Your Mind

Directions: Make a poster with the theme “think before you click”. Use a ½ illustration board or
Carolina. NOTE: Kindly screenshot your poster and send/post it by attached file in our FB
group.

Category 4 3 2 1
Graphics All graphics are All graphics are Some graphics Many graphics
Relevance related to the related to the are not related are not related
topic/theme and topic except 1. to the topic. to the topic.
make it easier to
understand.
Attractiveness The poster is The poster is The topic is The poster is not
exceptionally attractive, neat, acceptably attractive and
attractive, neat, and clean. attractive but has many
and clean. has few erasures.
erasures.
LESSON 3
Contextualized Online
Search and Research Skills

What’s In
In the previous lesson, we discussed online safety, security, ethics, and
etiquette that we must take into consideration in using the internet.
Technology such as mobile phones, laptops, computers, and other electronic
gadgets connect us to the world through different online platforms. Security and safety have
been taught to us so that we can avoid risk and danger online. An individual who is part of the
online community must maintain good social behavior. We need to adhere to the same
standard behavior online that we follow in real life. Now that you are ready to enter and
explore the online world, this lesson will teach you online search and research skills.

What I Need to Know


Internet Research is a research method in collecting and gathering information
via the internet by using a search engine such as Google.

Search Engine is a program that allows users to search for content on the internet.

Examples of Search Engine


Google Aol Search Wow Baidu
Web Crawler Yahoo! Search MyWebSearch Wolframalpha
Bing Info Dogpile DuckDuckGo
Ask Infospace Contenko Internet Archive
Searching the Web

Getting the correct and reliable information is our goal in internet research. We may
rely on the capability of a search engine but sometimes it may not give us the correct
information because of the keywords we entered into a search engine. There are techniques in
searching information that can be applied in the search engine to get a better result. Some
search engines allow a combination of words and logic connectors of AND, OR, and NOT.

Tips for Effective Internet Research by George Mathews

1. Know what kind of research you want to do.


2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.

Online Research Skills by Hannah Trierweiler Hudson

1. Check Your Sources


2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks

Copyright Issues

There are millions of information that we can get from the internet. Some of this
information is free but others are not. They are protected by copyright law.

What is Copyright?

Copyright is a protection given to the owner of the rights in an original work such as
books, musical works, films, paintings, and other works, and computer programs. This original
work is called intellectual property which is protected under Republic Act 8293 known as the
“Intellectual Property Code of the Philippines”.
Copyright Infringement

This happens when the copyrighted work is used by another person without the
permission of the author or copyright holder. Any person who is infringing the right protected
work would be liable under the law. An example of this is the case of M.Y. Intercontinental
Trading Corporation (MITC), Tedwin T. Uy, Allianz Marketing and Publishing Corp. (Allianz), and
Fujian New Technology Color Making and Printing Company, LTD (Fujian) against St. Mary’s
Publishing Corporation (SMPC). Manila regional trial court ordered Fujian and its partners to
pay P24.7 million for the damages and cost of litigation for copyright infringement to SMPC.
Fujian and its three local partners were guilty of printing, copying, reproducing, importing,
distributing, and selling original and revised textbooks that they have illegally sold to the
Department of Education in Zamboanga, Municipality of Cabuyao in Laguna, and Municipality
of Matnog in Sorsogon without the approval of SMPC, the copyright owner of the textbooks.

Fair Use

Research is important to the students and other people. Most of them rely on the
information that they can get online. Although this information is protected by copyright law
we can still use this information without permission in a limited way under certain conditions
and purposes.

Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and another similar purpose is not an infringement of
copyright.

An example of this is when you post a quote from a person on your Facebook wall.
Include the name of the person who owns the quote in your post. Another example is when
you copy an image from the internet, give credit to the creator of the image. The copied image
should be used for educational purposes not for commercial use.

In fair use, 5% of the content of reference can only be copied. If 20% or less of reference
is copied, there must be a secondary use agreement and fee. And if 20% or more of the
reference is copied, it requires purchasing of creative work.

Guidelines for Fair Use

1. The majority of the content created must be yours.


2. Give credit to the owner.
3. Don’t make a profit from the copyrighted work.
What I Have Learned
Activity L3.1: Generalization

Directions: Answer the following questions below. NOTE: This is found in Moodle, kindly
answer it there.

1. Is research online reliable? Why or Why not?


______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
___________________________.

2. How can you show respect for other’s intellectual property?


______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
________________________________.

What I Can do
Activity L3.2: Facts and Opinion Chart

Directions: Fill in the chart correctly by checking the correct column and defend your answer by
writing on the Reason column. NOTE: This is found in Moodle, kindly answer it there.

Statements Facts Opinion Reason


1. All information from the internet is reliable.
2. Giving credit to the owner of the copied work is
optional.
3. All the information can be found on the internet.
Summary
The community online never stops upgrading. Before, users of Web 1.0 can only read
through the content of the website but now with the presence of Web 3.0, we can create our
profile and communicate online. However, you need to be careful while you are online since
there are possibilities that your identity or personal information might be stolen or your files
might be deleted by malicious software. So always bear in your mind that you need to "Think
Before You Click".

Assessment
NOTE: Answer this assessment in Moodle.

References
rappler.com, “A Profile of Internet Users in the Philippines”, Accessed April 21, 2021,
https://www.rappler.com/brandrap/profile-internet-users-ph.

Computerhope.com, “WWW”, Accessed April 21, 2021,


https://www.computerhope.com/jargon/w/www.htm

Margaret Rouse, “Semantic Web”, Accessed April 25, 2021,


https://searchmicroservices.techtarget.com/definition/Semantic-Web

ontotext.com, “What is the Semantic Web?”, Accessed April 25, 2021,


https://www.ontotext.com/knowledgehub/fundamentals/what-is-the-semanticweb/

Margaret Rouse, “Social Network” Accessed April 26, 2021,


https://searchcio.techtarget.com/definition/social-network

Hatem Mahmoud, “Web 3.0 The Semantic Web”, Accessed April 25, 2021,
https://www.slideshare.net/HatemMahmoud/web-30-the-semantic-web/48-
Available_optionsRDFa_and_microformats

Technopedia,” Web 3.0”, Accessed April 25, 2021,


https://www.techopedia.com/definition/4923/web-30

Antony Maina, “20 Popular Social Media Sites Right Now”, Accessed April 26, 2021,
https://smallbiztrends.com/2016/05/popular-social-media-sites.html

Sophie Eagan, “10 Most Popular Social Bookmarking Websites”, Accessed


April 27, 2021, https://www.brandwatch.com/blog/10-popular-socialbookmarking-
websites/

Shrivastava, S.(2014). List of top nine Microblogging sites. Retrieved April 27, 2021 from
https://www.pensitdown.com/list-of-top-nine-microblogging-sites/

Jeremiah Owyang, “Understanding the difference between Forums, Blogs, and


Social Networks”, Accessed April 27, 2021, http://www.web
strategist.com/blog/2008/01/28/understanding-the-difference-between-forumsblogs-
and-social-networks/

Comodo Antivirus, ”What is a Computer Virus and its Types”, Accessed


April 27, 2021,
https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-itsdefinition/

Margaret Rouse, “Botnet”, Accessed April 27, 2021,


https://searchsecurity.techtarget.com/definition/botnet

Josh Fruhlinger, “What is phishing? How this cyber attack works and how to
prevent it.”, Access April 27, 2021,
https://www.csoonline.com/article/2117843/phishing/what-is-phishing-how-thiscyber-
attack-works-and-how-to-prevent-it.html

techopedia, “Cyberstalking”, Accessed April 28, 2021,


https://www.techopedia.com/definition/14326/cyberstalking

Seth T. Ross, “The Core Rules of Netiquette — Summary”, Accessed April 28, 2021,
http://www.albion.com/bookNetiquette/0963702513p32.html

George Matthew, “8 Killer Tips for Effective Internet Research”, Accessed


April 27, 2021, https://webwriterspotlight.com/tips-to-nail-online-research

Hannah Trierweiler Hudson, “The 6 Online Research Skills Your Students


Need”, Accessed April 27, 2021,
https://www.scholastic.com/teachers/articles/teaching-content/6-onlineresearch-
skills-your-students-need/

WebWise “What is netiquette?”, Accessed April 28, 2021,


http://www.bbc.co.uk/webwise/guides/about-netiquette

officialgazette.gov.ph,” Republic Act No. 8293”, Accessed April 28, 2021


https://www.officialgazette.gov.ph/1997/06/06/republic-act-no-8293/

officialgazette.gov.ph,” Republic Act No. 10175”, Accessed April 28, 2021,


https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/

officialgazette.gov.ph,” Republic Act No. 10372”, Accessed April 27, 2021,


https://www.officialgazette.gov.ph/2013/02/28/republic-act-no-10372/

Rey Panaligan, “Publisher awarded P24.7 M in damages for copyright


infringement”, Accessed April 30, 2021,
https://news.mb.com.ph/2017/12/10/publisher-awarded-p24-7-m-in-damagesfor-
copyright-infringement/

Pexels.com, ”Image”, Accessed April 30, 2021,


https://www.pexels.com/photo/apps-blur-button-close-up-267350

You might also like