Professional Documents
Culture Documents
VISION MODULE 1
A center of human
development committed to the I. COURSE CODE/TITLE: PEC 104 ‖ TECHNOLOGY FOR
pursuit of wisdom, truth, justice, TEACHING AND LEARNING 1
pride, dignity, and local/global II. SUBJECT MATTER
competitiveness via a quality but
affordable education for all
qualified clients. Topic Time – Frame
Introduction to Technology for Teaching and February 14 -24, 2022
MISSION Learning
Establish and maintain an (Basic Concepts and Roles of ICT in Teaching
academic environment promoting for Learning)
the pursuit of excellence and the
Policies and Safety Issues in Teaching and
total development of its students
as human beings, with fear of God Learning
and love of country and Safety Issues in ICT
fellowmen.
GOALS
Kolehiyo ng Lungsod ng Lipa
aims to:
1. foster the spiritual, intellectual, I. COURSE OUTCOME
social, moral, and creative life of
1. Create a foundation of understanding of the world of technology;
its client via affordable but quality
tertiary education; 2. Understand the basic concepts and roles of ICT in teaching for learning;
3. Learn to act responsibly when carrying out relationship over digital
2. provide the clients with reach media;
and substantial, relevant, wide 4. Discover opportunities where one can use these skills in real – world
range of academic disciplines,
expose them to varied curricular scenarios.
and co-curricular experiences
which nurture and enhance their IV. ENGAGEMENT:
personal dedications and
DIRECTIONS: Read and analyze the following.
commitments to social, moral,
cultural, and economic A. ICT in the Philippines (See Attached Document A.)
transformations.
B. Static and Dynamic web pages (See Attached Document B.)
3. work with the government and C. Rules of Netiquette to stay safe online (See Attached Document C.)
the community and the pursuit of
achieving national developmental
goals; and
CTE
DOCUMENT A
ICT in the Philippines
Stands for "Information and Communication Technologies." ICT refers to technologies that provide access to
information through telecommunications. It is similar to Information Technology (IT), but focuses primarily on
communication technologies. This includes the Internet, wireless networks, cell phones, and other
communication mediums.
In the past few decades, information and communication technologies have provided society with a vast array
of new communication capabilities. For example, people can communicate in real-time with others in different
countries using technologies such as instant messaging, voice over IP (VoIP), and video-conferencing. Social
networking websites like Facebook allow users from all over the world to remain in contact and communicate
on a regular basis.
Modern information and communication technologies have created a "global village," in which people can
communicate with others across the world as if they were living next door. For this reason, ICT is often studied
in the context of how modern communication technologies affect society.
To define professional skill levels for its ICT professional education products, the IEEE Computer Society has
adopted, for example, the Skills Framework for the Information Age (SFIA). The value of ICT strategies as a
means of bridging the digital divide and as a powerful tool for economic and social development around the
world should not be underestimated in agricultural and related sectors. Improving extension of ICT services to
farmers would effectively improve the transmission of global open data for agriculture and nutrition for
development of sensible solutions addressing food security, nutrition and sustainable agriculture issues.
By using ICTs, there have already “been diverse types of innovations taking place in the agriculture sector,
which include commodity and stock market price information and analysis, meteorological data collection,
advisory services to farmers for agricultural extension, early warning systems for disaster prevention and
control, financial services, traceability of agricultural products, agricultural statistical data gathering, etc.
DOCUMENT B
Static and Dynamic web pages
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that is suitable
for the World Wide Web.
The different online platforms of World Wide Web:
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web
pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others.
– Allows users to interact with the page; instead of just reading the page, the user may be able to
comment or create user account.
3. Web 3.0 – this platform is all about semantic web.
– Aims to have machines (or servers) understand the user’s preferences to be able to deliver web
content.
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be
manipulated by the user. The content is also the same for all users that is referred to as Web 1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see
website differently than others e.g. social networking sites, wikis, video sharing sites.
CTE
FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g.
tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
visit us at: www.facebook.com/College-of-Teacher-Education
Republic of the Philippines
Commission on Higher Education
Region IV – A CALABARZON
Municipality of Lipa
KOLEHIYO NG LUNGSOD NG LIPA
DOCUMENT C
Rules of Netiquette to stay safe online
INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
Going through other people’s things could cost you, your job or you could even go to jail.
Not respecting other people’s privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.
Do not take advantage of other people just because you have more knowledge or power than them.
Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
Do not point out mistakes to people online.
Remember that you were once the new kid on the block.
You still need to have a good manner even though you are online and cannot see the person face to face.
Internet security
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another and also
transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to monitor what you
are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries,
criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive
information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads users into believing
there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.
CTE