You are on page 1of 26

11

Media and Information Literacy


Quarter 2

What I Know

Page | 1
Multiple Choice. Select the letter of the best answer from among the given choices.

1. It is a cybercrime in which the targets are contacted by email, telephone, or text message.
A. Phishing B. Cyberbullying
C. Cybercrime D. Hacking

2. It is the program which attach themselves to the computer or file and then circulate
themselves to other files and to other components on a network.
A. E-mail Spoofing C. Cyber Stalking
B. Virus D. Hacking

3. It is category of technology that can be worn by a consumer and often include tracking for
information.
A. Wearable technology C. Smart Watch
B. Smart phone D. MOOCs

4. It is an open access and interactive way to facilitate students’ online study.


A. Massive Open Online Course C. 4G
B. Holography D. Fitbit charge

5. A form of technology-mediated communication that enables the user of a mobile device to


communicate with someone in a different location.
A. Telephone C. Mobile Phone
B. Laptop D. Mobile Communication

6. It is online harassment and online abuse it involves following a person’s movement


across the internet by posting threatening messages to the victim.
A. Hacking C. Virus
B. Cyber Stalking D. E-mail Spoofing

7. A person who breaks in or trespasses a computer system and gaining unauthorized


access to the data.
A. Hacker B. TV Broadcaster
B. Call Center Agent D. Radio DJ

8. This is a mechanical robot having the characteristics that can-do things like humans.
A.5G C. Hologram
B. Smart Glass D. Avatar

9. It is a wireless handheld device that allows users to make and receive calls and to
send text messages, among other features.
A. Computer C. Mobile Phone
B. Telephone D. Laptop

10. A technology that will calculate and monitor your heart rate.
A. Misfit Phase Hybrid C. Fitbit Charge 2
B. Heart Rate Monitoring Device D. Avatar

Page | 2
Module

9
What’s New

Activity 9.1: Unlocking Words


Before we will discuss the opportunities and challenges, and power of media and
information let us begin our lesson with this activity. This activity will help you to understand
our topic today. Let us start!
The name of the activity is WORD CLOUD GUESSING! In this activity you need to
guess and arrange the scrambled letters to form a new word.

Process Questions
1. How do you find the activity?
2. What do you think is the connection of the activity in our lesson?

Page | 3
What Is It

Answering the activity, let us now discuss and explore the opportunities, challenges
and power of media and information. Let’s start!
In the world of media and information there are a lot of opportunities and challenges.
What is the meaning of the word’s opportunity and challenges? Below is the meaning of the
two words. Take a look!

Opportunity. A time or set of Challenge. A challenge is something


circumstances that makes it new and difficult which requires great
possible to do something. effort and determination.
Source: English Oxford living dictionaries Source: https://www.collinsdictionary.com/
2018. What Is opportunity? Acces at: http:// dictionary/english/challenge
www.en.oxforddictionaries.com

So, here are the opportunity and challenges in media and information. First, we will
take a look in the opportunity.

Television Broadcaster Mobile Communication


A television presenter A means of technology mediated
presents information relating to communication that allows the user of a mobile
subjects such as news and sports, device to connect with someone else at a different
and may also be responsible for location, such as texting from a cell phone and
planning the creative content of a sending email from a computer device equipped
series. Such experts will work with with WiFi (e.g. laptop, iPad).
news programs and help to A mobile phone
discuss important topics in is a wireless portable
reporting, as well as provide device that allows users,
comments on various events. to make and receive calls,
They might also formulate and send text messages.
interview questions, read scripts, The first mobile phone
and reveal details about the show, generation would only be
such as commercial breaks. able to make and receive
calls. Today’s mobile
Example: TV broadcaster
phones are packed with
many additional features
like web browsers,
games, cameras,
video players and even
navigation systems.

Source: https://www.freepik.com/ https://www.freepik.com/free-vector/instagram-concept-


free-vector/podcast-concept- with-smartphone_2584202.htm#page=1&query=mobile
illustration_6203440.htm#page=1& communication&position=37
query=broadcaster&position=5

Page | 4
So, we have two opportunities in media and information, first television broadcaster
and mobile communication. But have you wondered, what makes television broadcaster and
mobile communication an opportunity in media and information.?
Let me share it to you, media plays a big role in sharing and disseminating
information. Through media, people now a day’s can easily catch-up news and be updated
because of television broadcaster. In the other side, mobile communication can make our
life easier. No need to write a letter if you want to ask allowance to your mom instead just
text and call. How amazing isn’t?
Now, take a pause for a while, think in your own understanding, what is the reason
why television broadcaster and mobile communication is an opportunity and don’t forget to
share it to your friends. Share it!
And now let’s move on to the next topic. The next topic is the challenges in media
and information. Here are the two challenges, look!

Cybercrime
Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography,
hate crimes). Cybercriminals may use computer technology to access personal information,
business trade secrets or use the internet for exploitative or malicious purposes.
Source: Technopedia . 2018. Cybercrime Access at: https://www.techopedia.com/definition/2387/cybercrime

https://www.freepik.com/free-vector/anonymous- https://www.freepik.com/premium-
hacker-concept-with-flat-design_2785043. vector/cyber-thief_4717043.
htm#page=1&query=cybercrime&position=0 htm#page=1&query=cybercrime&position=10

Do you know there are four different types of cybercrime? Here are the four types of cybercrime.
Source: LinkedIn. June 22, 2017. Different Types of Cybercrime Access at:
https://www.linkedin.com/pulse/ different-types-cyber-crime-avanzo-net

Hacking is the most common type of Cyber stalking is use of internet or other
cybercrime committed across the world. electronic means to stalk someone. It is
Hacking is a crime which entails cracking online harassment and online abuse.
systems and gaining unauthorized access to Mostly cyber stalking involves following a
the data stored in them. Hacker is a person person’s movement across the internet by
who breaks in to a computer system. posting threatening messages to the victim
or by entering the chat rooms frequented
by the victim or by constantly bombarding
Virus dissemination. Virus is the programs the victim with the e-mails etc.
which attach themselves to the computer or
file and then circulate themselves to other
files and to other components on a network. E-mail Spoofing. An e-mail that appears
They usually affect the data on the computer, to originate from one source but actually
either by altering or deleting it. has been sent from another source. This
can also be termed as e-mail forging.
3

Page | 5
Phishing
Phishing is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to lure individuals
into providing sensitive data such as personally identifiable information, banking and credit
card details, and passwords.
Source: Phishing.org. 2018. What Is Phishing? Accessed at: http://www.phishing.org/what-is-phishing

https://www.freepik.com/premium-vector/phishing-banner-set-isometric-set-phishing-vector-banner-
web-design_4341984.htm#page=1&query=phishing&position=1
After you read about the two How about cybercrime? Cybercrime is
challenges, let us dig deeper what makes another problem that we are facing today.
phishing and cybercrime a challenge in Like phishing, the hacker can access your
media and information. Here is the answer. information’s over the internet. You should
Phishing is an illegal action or always remember your personal information’s
crime. Where in the hacker will hack or get are considered confidential.
all your information’s over the internet. For Always remember, your personal
example, your bank account details, your information’s are always confidential. No
personal information’s and even your credit sharing and posting personal information’s
card details. So, for you to be safe in over the internet.
phishing avoid posting your personal For the last topic, let me show you the
information’s over the internet. examples of the power of media and
information to affect change.

The Power of Media and Information

Student Business Society


The power of media While in business, the The power of media
and information in the power of media and and information in
side of the students is information is very our society is huge.
that, now a days the strong. Using media, Through media, the
information is easy to the business owner society can easily get
get. Example, if you can easily market their and understand the
have assignments you products. For example, information related to
can use your phone to posting your products what is happening.
search information. over the internet like in
social media.

Page | 6
Now, you have already knowledge about Opportunities, Challenges, and Power of
Media and Information. Please don’t forget to share to your friends and family about our topic
for the day. Share it!

What’s More

Activity 9.2: Matching Type


Match the column A to column B. Choose the best answer.

Column A Column B
1. It is a cybercrime in which a target or targets are A. Cyberstalking
contacted by email, telephone or text message by B. Cybercriminals
someone.
C. Hacker
2. A type of cybercrime that is the most common type
of cybercrime committed across the world. D. Hacking
3. It is the program which attach themselves to the E. Cyberbullying
computer or file and then circulate themselves to F. Virus
other files and to other components on a network.
G. E-mail Forging
4. These professionals may work for news programs
and help research important stories to discuss as H. Mobile Phone
well as provide commentary about different events. I. Phishing
5. It is online harassment and online abuse it involves J. Mobile
following a person’s movement across the internet
by posting threatening messages to the victim.
6. It is a wireless handheld device that allows users to
make and receive c It is a wireless handheld
device that allows users to make and receive calls
and to send text messages, among other features.
7. A form of technology-mediated communication that
enables the user of a mobile device to
communicate with someone in a different location
messages, among other features.
8. They use computer technology to access personal
information, business trade secrets or use the
internet for exploitative or malicious purposes.
9. A person who breaks in or trespasses a computer
system and gaining unauthorized access to the data.
10. The other name for e-mail spoofing.

Page | 7
What’s More

Activity 9.3: For Pics One Word


Directions:
1. You will be shown four photographs. These four photographs each have
something in common.
2. Below the pictures, you will see blank spaces indicating how many letters are in
the answer.
3. Guess what the word is and write your answer in the blank space.
4. Enjoy the activity!

Images from https://www.freepik.com

—————————————

Page | 8
Images from https://www.freepik.com

———————————

Images from https://www.freepik.com

————————————

Page | 9
Images from https://www.freepik.com

————————

Images from https://www.freepik.com

————————

Page | 10
What’s More

Activity 9.4: Puzzle Jargon


Instructions: Search up, down, forward, backward, and on the diagonal to find the
hidden words. Hidden words to find hacking, mobile phone, phishing, opportunity, challenge,
TV broadcaster, cybercrime, cyberstalking, cybercriminal, hacker, virus, e-mail forging,
mobile communication, internet, and media.

Page | 11
What I Have Learned

Evaluation of Learning: Case Analysis


For your performance task. Make a mind mapping about our topic of the day. A mind
map is a diagram used to visually organized information and it shows relationship to the
topic. So, are you ready? Good luck!

Opportunities, Challenges, and Power of Media and Information

Opportunities and Power of media and information


Challenges to affect change

Page | 12
Module

10
What’s New

Activity 10.1: Unlocking Words


Hi there! How are you today? We are now in lesson 9, in this lesson we will talk
about the current and future trends of media and information.
But just hold on first, before we will discuss I want you to answer our motivational
activity. This is to help you discover and understand our topic. Are you ready? Let’s rock it!
The name of the activity is WORD RIDDLE. Riddle is something like puzzle, in that
clues properly put together create a mental picture that gives the answer to the riddle. You
only must understand the statement and guess. Here is the example. Take a look!

For example:
I am a small animal. I am grey. I like cheese. I rhyme with house. I’m a______.
The answer of this riddle is mouse. Now let’s start! Analyze the statement very well.
You can do it!

1. Look at the numbers on my face you won’t find 13 in any place. What am I?
2. You can play with it at night. It can give you text and call even information that you
want. Who am I?
3. I am a word. My name starts in letter I and ends in letter T. I am useful in opening
website like google, yahoo and Facebook. Can you guess me?
4. You can take me wherever you go. I can take all your precious moments with your
friends and family. I can take video too. Who am I?
5. I am something in your house in the living room I am seen. When you sit on the sofa,
you can watch things on my widescreen. Can you guess me?

Thank you for answering the first activity, for that give yourself 5 claps for a job well
done! Now let’s process the activity. I want you to answer the following process questions.

Process Questions:
1. How do you find the activity?
2. What do you think is the connection of this activity to our lesson?
3. Aside from your answer, can you enumerate other example of technology?

Page | 13
What Is It

Today, we will discuss about the current and future trends of media and information. I
will show you some examples of current technologies and even in the future.
Before we will start, I want you to think a technology that will help you in the future
and write it in the piece of paper. Describe what is the uses of that technology and how it
works. Just keep the paper.
Now, let’s move on to our discussion. We will evaluate current trends in media and
information and how it will affect/how they affect individuals and the society.
So, here are the examples of current trends in media and information. Let’s start!

Wearable technology (also called wearable gadgets) is a category of technology


devices that can be worn by a consumer and often include tracking information related to
health and fitness. Other wearable tech gadgets include devices that have small motion
sensors to take photos and sync with your mobile devices.
Source: Webopedia . 2018. Wearable Technology Access at:
https://www.webopedia.com/TERM/W/wearable_ technology.html

Smartwatch is a wearable Pratical Uses of Smartwatch


computing device that closely resembles a
1. Notifications. One of the main
wristwatch or other time-keeping device. In
reasons you would buy one is a
addition to telling time, many smartwatches Smartwatch displaying notifications.
are Bluetooth-capable. The watch becomes, It’s invaluableto have messages
in effect, a wireless Bluetooth adaptor sent to your wrist and to be able to
capable of extending the capabilities of the recognize their significance without
wearer’s smartphone to the watch removing your phone from a pocket
Source: Techtarget 2018. Smart Watch Access or bag. It makes your life simpler,
at:
and saves time.
https://internetofthingsagenda.techtarget.com/
definition/smartwatch 2. Battery Life. A huge, highresolution
monitor is often one of the biggest
drains in battery life for your
smartphone. Use smartwatch this
reduces the amount of time, and it
can have a significant impact on
battery life.
3. Music. Most smartwatches come with
a music player feature in them,
enabling you to listen to music in your
pocket on the phone. For example, if
a music track comes on that you don
not particularly like, then you can
https://www.freepik.com/free-vector/four-flat- simply hit ‘next’ on your smartwatch.
watches_900835.
htm#page=1&query=smartwatch&position=5

Smartwatch is not only for checking time and date. Today, you can use smartwatch
for checking your email, if you have a text message or even a call. Let us dig deeper, the
following are some examples of wearable technology.

Page | 14
A Smartphone is a cellular phone with an embedded computer and other non-
telephone-related features such as an operating system, web browsing, and the ability to run
software applications.
Cellphone versus Smart Phone
Source: Techtarget 2018. Smart Phones Access
at: https://searchmobilecomputing.techtarget.com/definition/smartphone

Cellphone is simply a A smartphone has more


telephone that doesn’t need a landline advanced features, including web
connection. It enables the user to make browsing, software applications and a
and receive phone calls. Some mobile OS. In turn, a smartphone also
cellphones also offer text messaging. offers capabilities such as support for
biometrics, video chatting, digital
assistants and much more.

Mind Mapping

Page | 15
The third wearable technology is fitness tracker. This technology will tell you how fit
you are. Take a look!
Fitness tracker is the best way to monitor your movement and health with unrivaled
accuracy and effortlessness. A wrist-worn device that can detect some combination of
walking steps, running distance, heart rate, sleep patterns and swimming laps. Fitness
bands interact via Bluetooth with an app in a mobile device that configures the device and
downloads the wearer’s activity data. Below are the list of the best fitness tracker.
Source: PC 2018. Fitness Tracker Access at: https://www.pcmag.com/encyclopedia/term/67469/fitness-tracker

Heart Rate Monitoring Device. A Misfit Phase Hybrid. This watch


technology that will calculate and monitor can count your steps and your heart rate.
your heart rate.

https://www.freepik.com/premium-photo/young- https://www.freepik.com/free-vector/flat-
cientific-caucasian-man-isolated-pointing-temple- smartwatchset_841814.htm#page=1&query=sports
with-finger-thinking-focused-task_6557919. watch&position=10
htm#page=2&query=smart+glass&position=7

Fitbit Charge. This watch is good Smartglass. This smart glass can
for exercise. It can count your running time collect information’s from external and
and the distance. internal. You can listen to music too while
searching informations.

https://www.freepik.com/premium-vector/ https://www.freepik.com/free-vector/flat-
fitness-counter-phone-run-app-wrist-band- smartwatchset_841814.htm#page=1&query=sports
bracelet_5599335.htm watch&position=10

Page | 16
Now, let us explore the future technologies. Here are the following future
technologies, let’s take a look!

5G Smartphone and Network. 5G Avatars, Surrogates, Robotic.


is the fifth generation of internet speed. This is a mechanical robot. It is having the
This is the new fastest speed of internet characteristics of a robot. They can do
connection. The successor of 4G. things like humans.

https://www.freepik.com/free-psd/5g-wifi- https://www.freepik.com/free-vector/futuristic-
network-connection-mock-up_6310422. holographic-infographic-element-collection_4798373.
htm#page=1&query=5G htm#page=1&query=hologram &position=1
Network&position=1

Now you already know the different


Hologram. It is a pattern of examples of current and future trends of
interference produced by a split coherent media and information. Always remember
beam. that the goal of these technologies is to
have an easy understanding of information.
Example, if you want to know your heart
rate you use heart rate monitoring device.
How amazing isn’t?
Before we will continue our
discussion, I want you to pause for a while.
Get some coffee or juice for you to feel
more relax as we discuss about the MOOC
or the Massive Open Online Course. Are
you ready? Let’s start.

So, what is MOOC or Massive


Open Online Course?

https://unsplash.com/photos/DcKkpYS8nC8

Page | 17
What Is It

What is Massive Open Online


Course (MOOC)?

It is an open access and an interactive way to facilitate students’ online study. It can provide
participants with course materials such as videos, lectures and study materials.

Massive Open Online course can cater a large mass of


participants. Where the participants can interact over the internet.

Mind Mapping: Advantages of MOOC

Explanation:
An e-learning program intended to cater students coming from different parts of the
world. The word MOOC was coined in 2008 by Dave Cormier. A MOOC may be patterned
on a college or university course or may be less structured. Not all MOOCs offer academic
credits when you finish a course such as diploma or certificate although it may be patterned
on a college or university course. With easier access to media like streaming and blogging
sites, most MOOCs are less structured, but they provide education that will help students
acquire certification, employment or proceed to other studies.
Now, are you ready to answer our activities? Let us do it!

Page | 18
What’s More

Activity 10.2: Complete Me


Below is a mind map with corresponding topic about key features of smart phone.
Supply the missing features of smart phone. Enjoy!

Mind Map Rubrics


Very Good (4 pts) Good (3 pts) Needs
Improvement
(1-2 pts)
Arrangement The main idea is The main idea is supported There is no
supported by details, the by details, but some recognizable
categories have sense, categories do not make pattern to the
and the reader is able to sense, and the reader ideas. The
follow and understand is able to follow and ideas are not
what is written. understand what is written. organized.
Depth It composes at least It composes at least 3 The map is
4 subtopics and a subtopics and a minimum of missing with
minimum of 2 ideas 1 ideas under each subtopic ideas
under each subtopic
Design The map is well layed The map is layed out fine, The layout is
out , the letter size is a the letter size is a good use poor and difficult
good use and easy to and can be read. to read.
read.
Creativeness The map is interesting The map is interesting to the It is not
to the eye and the eye. interesting to the
combination of colors eye.
works well together

Page | 19
Activity 10.3: Modified True or False
Write MIL if the statement is TRUE. Otherwise, change the underline word/s with the
correct answer and choose your answer in the box.

_____1. Wearable technology also called wearable gadgets is a category of technology


devices that can be worn by a consumer and often include tracking information
related to health and fitness.

_____2. A smartwatch is a wearable computing device that closely resembles a


wristwatch or another time-keeping device.

_____3. A smartwatch is a wearable computing device that closely resembles a


wristwatch or another time-keeping device.

_____4. 5G is the fourth generation of cellular mobile communications.

_____5. smartphone has more advanced features, including web browsing, hardware
applications and a mobile OS.

_____6. A massive open online course (MOOC) is an offline course that has open
access and interactive participation by mean of the Web.

_____7. Smart glasses may collect information from internal or external sensors.

_____8. A fitness tracker is the perfect way to monitor your activity and health effortlessly.
and with unmatched accuracy.

_____9. Fitness trackers interact via Bluetooth with an app in a mobile device that
configures the device and downloads the wearer’s activity data.

_____10. A smartphone has more advanced features, including web browsing, software
applications and a mobile OS.

Page | 20
Activity 10.4: Performance Task
My Future Technology Prototype.
Produce a prototype about the future media
innovation. In this activity you need to draw your
own future technology prototype or model. A
technology that will help you in the future.
For example, agricultural robot a robot
that will help the farmers to harvest, planting
seeds, weed control and even soil analysis.
Now, it’s your turn to create your own
prototype. Don’t forget to write a short
Image Sourece: https://en.wikipedia.org/wiki/
description and the uses of your prototype Agricultural_robot
model and use the format below. Think a
better and useful future technology.

My Future Prototype

My Future Prototype Rubrics

Creativity (10 points) Clarity (20 points) Relevance (20 points)

Page | 21
Summary
2 Opportunities in Media 2 Challenges in media
1. Television Broadcaster 1. Cybercrime
2. Mobile Communication • Hacking
• Cyber Stalking
2. Phishing
• Virus Dissemination
• E-mail Spoofing

Wearable Techonologies is also called wearable gadgets is a category of technology


devices that can be worn by a consumer and often include tracking information related to
health and fitness. Below are the types of wearable technologies:
1. A smartwatch is a wearable computing device that closely resembles a wristwatch or
other time-keeping device. In addition to telling time, many smartwatches are
Bluetooth-capable. The watch becomes, in effect, a wireless Bluetooth adaptor
capable of extending the capabilities of the wearer’s smartphone to the watch.
2. A smartphone is a cellular telephone with an integrated computer and other features
not originally associated with telephones, such as an operating system, web browsing
and the ability to run software applications.
3. Smart glasses may collect information from internal or external sensors. It may
control or retrieve data from other instruments or computers. It may support wireless
technologies like Bluetooth, Wi-Fi, and GPS
4. A fitness tracker is the perfect way to monitor your activity and health effortlessly
and with unmatched accuracy.
• Heart Rate Monitoring Device is a technology that will calculate and monitor
your heart rate.
• Misfit Phase Hybrid counts steps and calories burned, tracks sleep, and
periodically vibrates to prompt you to move.
• Fitbit Charge 2 calculates steps taken, calories burned, elevation climbed, and
distance traveled, giving you a clear picture of how much you’re moving every day.

Future Technologies
1. 5G Smart Phone and Network. 5G is the fifth generation of cellular mobile
communications. It succeeds the 4G (LTE/WiMax), 3G (UMTS) and 2G (GSM)
systems. 5G performance targets high data rate, reduced latency, energy saving,
cost reduction, higher system capacity, and massive device connectivity.
2. Avatars, Surrogates, and Robotics. While avatars (like this one from the game
Second Life) and surrogates were once just the stuff of games, virtual reality and
computer interfacing, now they’re taking on more active roles as replacements for
living, breathing humans.
3. Hologram in Retail Store. Stores of the future will offer increasingly immersive and
ultimately more reward experiences, rather than just being a place that customers come
to meet their material needs. This could include technology such as holography.

Page | 22
Summary

A Massive Open Online Course (MOOC) is an online course that has open access and
interactive participation by means of the Web. MOOCs provide participants with course
materials that are normally used in a conventional education setting - such as examples,
lectures, videos, study materials and problem sets.

Page | 23
Assessment: (Post-Test)

Multiple Choice. Answer the question that follows. Choose the best answer from
among the given choices.
1. This is a mechanical robot having the characteristics that do can things like humans.
A.5G C. Hologram
B. Smart Glass D. Avatar
2. It is category of technology that can be worn by a consumer and often include
tracking for information.
A. Wearable technology C. Smart Watch
B. Smart phone D. MOOCs
3. A technology that will calculate and monitor your heart rate.
A. Misfit Phase Hybrid C. Fitbit Charge 2
B. Heart Rate Monitoring Device D. Avatar
4. A form of technology-mediated communication that enables the user of a mobile
device to communicate with someone in a different location.
A. Telephone C. Mobile Phone
B. Laptop D. Mobile Communication
5. It is an open access and interactive way to facilitate students’ online study.
A. Massive Open Online Course C. 4G
B. Holography D. Fitbit charge
6. It is a cybercrime in which a target or targets are contacted by email, telephone or
text message by someone.
A. Phishing C. Cybercrime
B. Cyberbullying D. Hacking
7. It is the program which attach themselves to the computer or file and then circulate
themselves to other files and to other components on a network.
A. E-mail Spoofing C. Cyber Stalking
B. Virus D. Hacking
8. It is online harassment and online abuse it involves following a person’s movement
across the internet by posting threatening messages to the victim.
A. Hacking C. Virus
B. Cyber Stalking D. E-mail Spoofing
9. A person who breaks in or trespasses a computer system and gaining unauthorized
access to the data.
A. Hacker C. TV Broadcaster
B. Call Center Agent D. Radio DJ
10. It is a wireless handheld device that allows users to make and receive calls and to
send text messages, among other features.
A. Computer C. Mobile Phone
B. Telephone D. Laptop

Page | 24
References

Learn.org. “How Can I Become a TV Broadcaster”. Accessed at January 17, 2020,


https://learn.org/articles/How_Can_I_Become_a_TV_Broadcaster.html

igi-global.” Mobile Communication”. Accessed at January 17, 2020, https://www.igi-


global.com/dictionary/communicame/34130

techopedia.” What does Mobile Phone mean?” Accesed at January 17,2020,https://


www.techopedia.com/definition/2955/mobile-phone

techopedia. “ What does Cybercrime mean?” Accessed at January 17,2020, https://


www.techopedia.com/definition/2387/cybercrime

Phishing.org.” What is Phishing”. Accessed at January 17,2020, http://www.phishing.


org/what-is-phishing

Vangie, Beal. “Wearable Technology”. Access at January 17,2020, https://www.


webopedia.com/TERM/W/wearable_technology.html

Margareth , Rouse . “Smart Watch”. Access at January 16, 2020, https://


internetofthingsagenda.techtarget.com/definition/smartwatch

Margareth , Rouse . “Smartphone”. Access at January 16, 2020, https://


searchmobilecomputing.techtarget.com/definition/smartphone

James, Peckman. “ Best fitness tracker 2020:the top 10 activity bands on the planet”.
Accessed at January 17, 2020.https://www.techradar.com/news/wearables/10-
best-fitness-trackers-1277905

PC encyclopedia. “fitness tracker”. Accesed at January 16, 2020 ,


https://www.pcmag. com/encyclopedia/term/67469/fitness-tracker

Adam, Birkett. “fitbit”. Acceseed at January 17, 2020, https://unsplash.com/photos/


QRWAdBCqysc

Rozalynn S. Frazier. “17 Best Fitness Tracker” . Accessed at January 17, 2020.
https:// www.health.com/health/gallery/0,,20929976,00.html?slide=407559#40755

Wikipedia.”Smartglasses”. Accessed at January 17, 2020, https://en.wikipedia.org/


wiki/Smartglasses

Terri, Briseno. “10 Futurist Predixtions in the world of Technology”. Accessed at


January 17, 2020. https://electronics.howstuffworks.com/future-tech/10-futurist-
predictions-in-the-world-of-technology10.htm

techopedia.” Massive Open Online Course”. Accessed at January 17, 2020, https://
www.techopedia.com/definition/29260/massive-open-online-course-

Page | 25

You might also like