You are on page 1of 143

-

ITE101
LIVING IN THE IT ERA

STUDENT Learning Module on ITE101


Name:
Student Number:
INSTRUCTIONS TO THE STUDENTS
At CCC-DCE you learn through self-instructional modules, otherwise known as DCE Self-
Learning modules of DCIModL such as the one that you are now reading. It is significant that
you observe the following instructions:

Learning Module on ITE101


1. Every student or course has a total of three (3) modules, each one might contain two or
more lessons. You must complete and satisfy the work prescribed by each module before
you can sit for the written examination that will determine if you pass or fail the course.
2. Make an effort to do some extra reading on any reference book on the subject (online or
offline) will do.
3. Test your own progress by performing the enrichment activities/application provided by
each lesson. Read the instructions very carefully and understand them well.
4. Consultation will be entertained by your professors through Facebook Messenger from
Monday to Friday (9-5pm). Strictly follow the schedule of consultations.
5. At the end of each module, perform the Assessment Test
6. Enrichment Activities/Application and Assessment Test with answers will be collected
periodically (sealed in long brown envelope signed across the flap and properly label it
with your name and year & section) and submit to the Office of the Director of the
Department of Computer Education (DCE), Baretto St., Brgy VII, Calamba City, Laguna,
for correction and grading. Corrected tests will be returned to you with the
corresponding grade or further instruction, if needed. While waiting, go on to the next
module and observe the same study procedure.
7. When you have accomplished all the modules of the course you are enrolled, you have to
come to CCC to take the written examination in person.

Learning Module on ITE101


LEARNING MODULE INFORMATION
I. Course Code ITE101
II. Course Title LIVING IN THE IT ERA
III. Module Number 1
IV. Module Title Introduction to the Digital Age
V. Overview of the Module This module identifies the terminologies and important
concepts about computers and digital literacy. It also helps the
students understand how the technologies enjoyed today
emerged through generations. It will also give insight on how
each technology shaped the generations.

VI. Module Outcomes After studying this module on the introduction to the digital
age, the students shall be able to:

1) Determine the basic terminologies used in


Information and Communications Technology.
2) Narrate the important key points in the history of
technology through each generation.
3) Identify the important components of a
Computer.
4) Understand the basics Information technology as
a whole.

Learning Module on ITE101


`

Lesson1. The Digital Age


Information technology (IT) is a technology which uses computers to gather, process, store, protect, and transfer
information. Today, it is common to use the term Information and communications technology (ICT) because it is
unimaginable to work on a computer which is not connected to the network.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Describe when the information age took place.


 Identify the important people and their contributions to the information age.
 Explain how the internet and the information age play an important role in our society today.

Getting Started:
Choose only one of these prominent social media influencers below by encircling their name and then answer the
following question.

Alex Gonzaga Anne Clutz Raffy Tulfo Cong Velasquez

How were you affected by your chosen influencer? __________________________________________________


________________________________________________________________________________________
________________________________________________________________________________________

Learning Module on ITE101


`

Discussion:
Imagine, what if we all live in a place where communications technology such as the Internet and phones are
nonexistent? What could life be?

In this very day and age where information and communication play a vital role, we can never get away with it.
The need for Information transfer and exchange gave rise to these so-called platforms, and these platforms have evolved
through the years from one simple idea, and that is communication. The Infographic below shows the evolution of how
people communicate information.

Sharing and Communication through the Ages


30,000 years before the common era, the most efficient form of communication for man was through cave
paintings and stone carvings. As the years progressed, however, man improved immensely. At 776 BCE, pigeons were
utilized by Ancient Greeks to deliver messages. From carrier pigeons to marathon men, it was the year 530 BCE when
Ancient Greeks ran all the way from Marathon to Athens, simply to announce the victory of Greek over Persia. More than
2000 years later, after the invention of paper came the first daily newspaper, the “Einkommende Zeitung” in 1650. In
1840, the telegraph was invented by Samuel Morse, making long-distance communication very much feasible.

            Little did the world know that the centuries to come were to be comprised of a vast variety of new
discoveries no one could have ever imagined. In 1876, Alexander Graham Bell created the electric telephone. A few years
later at 1902, Italian Guglielmo Marconi transmits the first radio signal; and this was followed by the transmission of the
first television signal by a Scottish man named John Baird in 1927. The year 1969 marked the beginning of a new age.
This year was the launch of the ARPANET (Advanced Research Projects Agency Network); what we commonly know
now as the Internet. Soon after at 1994, came the emergence of the world wide web; at 1997, the coming of instant

Learning Module on ITE101


`

messaging or internet chat, and at 1999, blogging. 2004 was when Harvard student Mark Zuckerberg created Facebook,
followed by the launch of Twitter in 2006.

What exactly is the Information age?


The Information Age, also called the Computer Age, the Digital Age and the New Media Age, is coupled tightly
with the advent of personal computers, but many computer historians trace its beginnings to the work of the American
mathematician Claude E. Shannon. At age 32 and as a researcher at Bell Laboratories, Shannon published a landmark
paper proposing that information can be quantitatively encoded as a series of ones and zeroes. Known as the "father of
Information Theory," Shannon showed how all information media, from telephone signals to radio waves to television,
could be transmitted without error using this single framework.

Companies whose businesses are built on digitized information have become valuable and powerful in a relatively
short period of time. In "The companies that define the Information Age are the ones that know consumers the best,"
author Larry Allen of Real Media Group points out that just as land owners held the wealth and wielded power in the
Agrarian Age and manufacturers such as Henry Ford and Cyrus McCormick accumulated fortunes in the Industrial Age,
the current Information Age has spawned its own breed of wealthy influential brokers, from Microsoft's Bill Gates to
Apple's Steve Jobs to Facebook's Mark Zuckerberg.

Key principles in the area of Effects of Technology on the World of Information and
Knowledge
 Information technology is evolving rapidly, enabling ever-increasing amounts of information and data to be stored,
managed, enhanced, analyzed, and accessed through a wide array of devices in various media formats.

 Information and Communication Technology (ICT) enables the creation and modification of information and
knowledge products by remotely connected individuals and teams.

 The emergence of intelligent information technologies and the development of sophisticated modeling and simulation
capabilities are transforming the world of information and knowledge, with potentially profound effects on society.

Inventions and Innovations of the Information Age


There were many different inventions that came about because of the Information Age, one of which was the
computer. The Internet allowed people to access information with the touch of a button.

The Internet has turned society into homebodies, individuals who do everything from the comfort of their homes
instead of venturing outdoors to complete tasks. People can do everything online; shopping, communicating, bill paying,
working, education, entertainment, even ordering food. This may be good, but it has also made us a very lazy and
uneducated society.

Learning Module on ITE101


`

Tim Berners-Lee, Steve Jobs and Bill Gates are several important people of the Information Age. Berners-Lee
created the World Wide Web. Jobs who was created the first effective personal computer called the Apple 1

The Apple 1 was a huge advancement in computer sciences and it carved the path for the computers we have now.
Apple has created iPhone, iPod, iPad, iMac, and Apple TV. Gates is also a huge force in the Information Age. He founded
Microsoft, which creates almost everything that has to do with computers. Microsoft develops programs like Microsoft
Office, Windows, and many other influential products.

Exercise
Based on what you have read so far, complete the table below.

Inventor Invention

1 Mark Zuckerberg

2 Apple Devices

3 Samuel Morse

4 Microsoft Software

5 Tim Berners-Lee

The Internet and the Information Age


The Internet has revolutionized communications, to the extent that it is now the preferred medium of everyday
communication. In almost everything people do; they use the Internet. Ordering a pizza, buying a television, sharing a
moment with a friend, sending a picture over instant messaging. Before the Internet, if you wanted to keep up with the
news, you had to walk down to the newsstand when it opened in the morning and buy a local edition reporting what had
happened the previous day. But today a click or two is enough to read your local paper and any news source from
anywhere in the world, updated up to the minute.

On a side note, it has made people lazier, but it also makes a large amount of the population smarter. People are
becoming more mature and more educated due to things like the computer and the Internet. This time period has reshaped
governments, with new technology being created every day. Because of things like the Internet, new laws had to be put in
place to stop hacking, piracy, and identity theft.

Learning Module on ITE101


`

Impacts of the Information Age


The Information Age brought about many new inventions and innovations. Many communication services like
texting, email, and social media developed and the world has not been the same since. However, the Information Age is
not all good. There are people in the world that believe they can live their entire life through the Internet. Also, huge
criminal organizations rely on hacking into government systems and obtaining confidential information to continue their
way of life.

Jobs have also become easier, and some jobs can even be done from the comfort of your own home. The
Information Age is also known as the Age of Entrepreneurship. Now entrepreneurs can start and run a company easier
than ever before. It also impacts the work ethics by distracting people and causing them to lose interest in the task they are
doing. This time period has also created a shortage of jobs and making many jobs obsolete because machines are now
being used to do the work humans once did.

Summary

 The Information Age has changed people, technology, science, economies, culture, and even the way people think.
 The Internet is arguably the most prominent innovation of the Information Age. The Internet changed the way people
do everything.
 The Information Age has made industrial countries stronger. With online companies being some of the most
successful and economically stimulating businesses out there, economies receive more from them and keep our
world turning.

Learning Module on ITE101


`

M1:L1 - Enrichment Activity


Name: ________________________________ Score: __________________

Year and Section: ______________________ Professor: _______________

Directions: As an individual who is aware and is using the internet, think of a concurrent problem in our society and
create your very own solution to address the said problem. State how Internet and the Information Age will play an
important role in your solution. Write your answer on the spaces provided.

Problem:

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_________________________________________

Solution:

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
____________________________________________________________________________________

How will the Internet and the Information age play an important role in your solution?
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_________________________________________________________

Learning Module on ITE101


`

Lesson 2. Technology through the Generations:


Baby Boomers
Each generation has its own distinct characteristics, one of such is how they use technology. With technology
rapidly innovating at a breakneck speed, the gap between each generation also impacts the way each age group uses
various technological platforms to make their life much easier – both in life and at the workplace.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Define who belong to the Baby Boomers.


 Identify the important contributions of the Baby Boomers in the society.
 Describe the important points in the history of technology through the generation.
 Analyze the phases of how the baby boomers coped with the growing demand in technology.

Getting Started:
Do you know this person? Write what you know about on the specified photo below.
Clue: He is one of the iconic Baby Boomers who contributed to our technology today.

Name: _______________________________________

Company Founded: ___________________________


Contribution to our technology:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

Learning Module on ITE101


`

Discussion
Baby Boomers – Born 1946 to 1964
Members of this group are considered as ‘baby boomers’ because during this period of time, there was a
statistically significant surge in the number of births that occurred. Baby boomers emerged after the end of World War II,
when birth rates across the world spiked. The explosion of new infants became known as the baby boom. During the
boom, almost 77 million babies were born in the United States alone, comprising nearly 40% of the American population.
Most historians say the baby boomer phenomenon most likely involved a combination of factors: people wanting
to start the families that they put off during World War II and the Great Depression, and a sense of confidence that the
coming era would be safe and prosperous. Indeed, the late 1940s and 1950s generally saw increases in wages, thriving
businesses, and an increase in the variety and quantity of products for consumers.
Characteristics / Core Values Defining Technological Product

 Strong work ethic  Television


 Self-reliant  Telephone
 Competitive
 Goal-oriented Media Consumption
 Self-actualization  Highest consumers of traditional media
 Good communication skills

Learning Module on ITE101


`

Important Events that happened during the Baby Boomers Generation

Learning Module on ITE101


`

10

This generation introduced the Rock and Roll, Elvis, Beatles, Woodstock, Miniskirts, and Barbie. The first two-
income household generation, the first TV generation, the first divorce generation, where divorce was beginning to be
accepted as a tolerable reality. The first tolerant generation. Envision technology and innovation as requiring a learning
process.

Exercise
Based on what you have read so far, what do you think are the important contributions of the baby boomers that led to the
technology we are currently using today?

Learning Module on ITE101


`

11

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
____________________________________

Pressure of learning new technologies


A common misconception of Boomers is that they lack understanding of and/or fail to effectively utilize
technology. The expansion of radio, television, mobile phones, personal computers, and the Internet all have been
pioneered by Boomers; however, the relationship between technology and Boomers is vastly different in comparison to
other generations. The digital age occurred well into the midpoint of the Boomers’ life cycle. The digital age is the time
in which rapid changes and advancements in technology and technology’s nationwide affordability occurred.
Boomers’ values and perspectives on technology were formed prior to the insurgence of and dependency on
technology in daily life. Boomers, unlike other generations, utilize technology to help create their desired lifestyle as
opposed to allowing technology to shape their existence. As an example, Boomers’ “social networks” were formed prior
to the digital age, and as a result, personal and physical contact is more important to Boomers than digital connections and
the use of technology to interact with others.
Missing from the dialogue on Boomers is their use of technology and how technology is used as a tool to support
learning for Boomers. Technology that is used for sharing information, such as mobile devices, online chat environments
and media, represent the perfect platform for learning. Research exploring how Boomers use current technology and how
these information-sharing technologies support their individual learning as a generational cohort is in need of further
examination.

Summary
 Baby boomers emerged after the end of World War II, when birth rates across the world spiked.
 In the late 1940s and 1950s generally saw increases in wages, thriving businesses, and an increase in the variety and
quantity of products for consumers.
 A common misconception of Boomers is that they lack understanding of and/or fail to effectively utilize technology.
 This generation introduced the Rock and Roll, Elvis, Beatles, Woodstock, Miniskirts, and Barbie.
 The Boomers are known to be self-reliant, competitive, goal-oriented, and individuals with a strong work ethic.

M1:L2 - Enrichment Activity


Name: ________________________________ Score: __________________

Learning Module on ITE101


`

12

Year and Section: ______________________ Professor: _______________

Directions: Based on what you have learned, create your own representation or illustration which depicts the Baby
Boomers and their contributions.

Lesson 3. Technology through the Generations:


Generation X

Learning Module on ITE101


`

13

The generation that is quickly occupying the majority of business leadership roles is one that’s grown up playing
video games, spends the most time shopping online, and uses social media more habitually than any other generation.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Define who belong to the Gen X.


 Identify the important contributions of the Gen Xers in the society.
 Describe the important points in the history of technology through the generation.
 Analyze the phases of how the Gen X coped with the growing demand in technology.

Getting Started:
Do you know this person? Write what you know about on the specified photo below.
Clue: He is one of the iconic GEN Xers who contributed greatly to our technology today, one of his companies named
SpaceX aims to reduce space travel costs for the colonization of planet Mars.

Name: ____________________________________________________

Company Founded: ________________________________________


Contribution to our technology: ______________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________

Discussion
Generation X – Born 1965 to 1976

Learning Module on ITE101


`

14

Also known as Baby Bust, members of this group were sometimes called the “latchkey generation”, due to the
reduced adult supervision and to the increased divorce rates and increased maternal participation in the workforce.
Sometimes referred to as the “lost” generation, this was the first generation of “latchkey” kids, exposed to lots of daycare
and divorce. Known also as the generation with the lowest voting participation rate of any generation, Gen Xers were
quoted by Newsweek as “the generation that dropped out without ever turning on the news or tuning in to the social issues
around them.” Gen X is often characterized by high levels of skepticism, “what’s in it for
me” attitudes.
Gen Xers are arguably the best educated generation with 29% obtaining a bachelor’s degree or higher (6% higher
than the previous cohort). And, with that education and a growing maturity they are starting to form families with a higher
level of caution and pragmatism than their parents demonstrated. Concerns run high over avoiding broken homes, kids
growing up without a parent around and financial planning.
Characteristics / Core values Defining Technological Product

 Adaptable  Personal Computer


 Entrepreneurial  Email & Telephone
 ‘Thinkers’ of the workforce
 Independent Media Consumption
 Seek work-life balance  Heavy TV and Facebook Users
 Skeptic and Pragmatic

Learning Module on ITE101


`

15

Important Events that happened during the Generation X


Gen Xers were the first cohort to come of age with MTV. They were the first generation to experience the
emergence of music videos as teenagers and are sometimes called the MTV Generation. Gen Xers were responsible for

Learning Module on ITE101


`

16

the alternative rock movement of the 1990s and 2000s, including the grunge subgenre. Hip hop has also been described as
defining music of the generation, particularly artists such as Tupac Shakur, N.W.A., and The Notorious B.I.G.

Exercise
Based on what you have read so far, what do you think are the important contributions of the Gen Xers that led to the
technology we are currently using today?

Learning Module on ITE101


`

17

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_____

Challenges for the Generation X


The advantage Gen X have is that they understand a lot more than they’re given credit for. Possessing the best
characteristics of both the Boomers and Millennials, Gen Xers can take a middle ground and use their knowledge
productively. As new technologies begin to overtake the workplace, Boomers don’t understand the lingo whilst
Millennials have become obsessed with social media.
Gen Xers created the internet, acknowledging the changes that needed to be made, learning from their mistakes all
whilst reshaping the future of technology into something great. Although their struggle to reach new heights in the
workplace is noticeable, Generation X certainly know how to knuckle down and push themselves further, resistant to give
up. Instead of wallowing in self-pity, Gen Xers work with what they’ve got and continuously look for ways to improve.
Some research revealed that, although they aren’t typically considered digital natives to the extent that millennials are,
Gen Xers are just as likely to be comfortable leveraging technology in the workplace: Some 54 percent of Gen X and 56
percent of millennials reported that they are digitally savvy. That finding is backed up by research by Nielsen, which
revealed that Gen X is the most connected generation. Nielsen found that Gen Xers use social media 40 minutes more
each week than millennials. They were also more likely than millennials to stay on their phones at the dinner table and
spend more time on every type of device — phone, computer, or tablet. And, as it turns out, Gen X is bringing this
connectivity to work.

Summary
 Gen X, referred to as the “lost” generation, this was the first generation of “latchkey” kids, exposed to lots of daycare
and divorce.
 Possessing the best characteristics of both the Boomers and Millennials, Gen Xers can take a middle ground and use
their knowledge productively.
 Gen Xers are just as likely to be comfortable leveraging technology in the workplace.
 Gen X is the most connected generation.

M1:L3 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Learning Module on ITE101


`

18

Directions: One of the characteristics of Gen Xers is entrepreneurial. Imagine yourself as one of the said
generations and think of the possible business that you want to own. Explain what your business is all about and
why did you choose it.

__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
____________

Lesson 4. Technology through the Generations:


Generation Y

Learning Module on ITE101


`

19

The term ‘Millennials’ for this generation apply to individuals who reached adulthood around the turn of the 21st
century. They grew up in a technology-filled and online-driven society.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Define who belong to the Millennials.


 Identify the important contributions of the Millennials in the society.
 Describe the important points in the history of technology through the generation.
 Analyze the phases of how the Millennials coped with the growing demand in technology.

Getting Started:
Do you know this person? Write what you know about on the specified photo below.
Clue: He is one of the iconic Millennials who contributed greatly to our communications technology today.

Name: ________________________________________________________

Company Founded: ____________________________________________


Contribution to our technology: __________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

Discussion
Generation Y – Born 1977 to 1995

Learning Module on ITE101


`

20

The term ‘Millennials’ apply to individuals who reached adulthood around the turn of the 21 st century. They grew
up in a technology-filled and online-driven society. The members of this generation also hope to be the next great
generation and to turn around all the “wrong” they see in the world today. A majority of generation Y are spenders
instead of savers. Most of Millennials are already working, however some are still studying and will join the workforce in
the short future. Although they are partly supported by their parents, they value their independency. They are optimistic
towards their own careers as well as the environment, furthermore they are looking forward to networking and teamwork.
This generation is also known to be “online 24h”. They are also very concerned about their health and are taking
measures to improve it. For this generation, Google Search takes the lead in being the most used source to inform oneself
about health. Even though there has been some misconception about Millennials, they were initially labeled lazy and
entitled, they have proved themselves to be hardworking, ambitious and willing to think outside the box to pursue
opportunities related to their professional life.
Characteristics / Core Values Defining Technological Product

 Tech-savvy  Tablet & Smartphone


 Diversity  Text and Social Media
 Creative, innovative and
flexible in the workplace Media Consumption
 Confident
 Mass/Multiple Streaming Options
 Highly Tolerant
 Street Smarts

Learning Module on ITE101


`

21

Learning Module on ITE101


`

22

Important Events that happened during the Generation Y


Gen Y members are much more racially and ethnically diverse and they are much more segmented as an audience
aided by the rapid expansion in Cable TV channels, satellite radio, the Internet, e-zines, etc. Gen Y are less brand loyal
and the speed of the Internet has led the cohort to be similarly flexible and changing in its fashion, style consciousness and
where and how it is communicated with. Gen Y kids often raised in dual income or single parent families have been more

Learning Module on ITE101


`

23

involved in family purchases…everything from groceries to new cars. One in nine Millennials has a credit card co-signed
by a parent.

Exercise
Based on what you have read so far, what do you think are the important contributions of the Millennials that led to the
technology we are currently using today?
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________

Learning Module on ITE101


`

24

__________________________________________________________________________________________________
_____

Challenges for the Generation Y


One way to think of millennials is as a modern pre-Copernican generation; online, their social universe really
does revolve around them. They are the first generation in history in which anyone can tell the story of himself or herself,
in words, pictures and videos, to an audience of one or ten or a hundred or (if their content goes viral) a million. Why do
they take and post so many selfies? Because they can. Call them narcissists if you like. Their smartphone is their gateway
to infinity and immortality. It has imbued their generation with a sense of wonder and possibility. It remains to be seen if
the digital revolution will also improve their economic circumstances and enhance their overall well- being.
Millennials’ hyperactive online social lives have helped to coax them away from conventional offline social
institutions. They are less inclined than their elders to be affiliated with political parties, civic groups, or organized
religion. And they’re wary of hierarchies even within the social movement of their own creation, such as Occupy Wall
Street to Black Lives Matter. But it’s not just institutions that millennials distrust; it’s also their fellow human beings. Just
19 percent of millennials say most people can be trusted; by far the lowest share of any generation. This wariness may be
a byproduct of spending so much time online, where it takes a nano-second to figure out that not all your friends are who
they say they are. It may be because they’ve come of age at a time when then that moody kid next door might be a
terrorist. And it could be the result of the record share of millennials who are poor or racial minorities. People who feel
marginalized for whatever reason tend to be low on social trust because they aren’t well fortified to deal with the
consequences of misplaced trust.

Summary
 The term ‘Millennials’ apply to individuals who reached adulthood around the turn of the 21st century.
 They are optimistic towards their own careers as well as the environment, furthermore they are looking forward to
networking and teamwork.
 They are the first generation in which anyone can tell the story of himself or herself, in words, pictures and videos, to
an audience of one or ten or a hundred or a million.

M1:L4 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Learning Module on ITE101


`

25

Directions: Make a list of the different social media sites that you use. State how often do you use it and explain your
purpose in using that sites.

Social Media Sites Explanation

Lesson 5. Technology through the Generations:


Generation Z

Learning Module on ITE101


`

26

Following the technology-driven generation of Millennials is the Gen Z, iGen, the Digital Natives or simply
Centennials. The defining historical moment that separates them from the Millennials siblings was the 9/11 attack.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Define who belong to the Centennials.


 Identify the important contributions of the Centennials in the society.
 Describe the important points in the history of technology through the generation.
 Analyze the phases of how the Centennials coped with the growing demand in technology.

Getting Started:
Do you know this person? Write what you know about on the specified photo below.
Clue: This Filipino vlogger is one of the iconic Centennials who accidentally became famous because of her viral video
“Dalagang Filipina”.

Name: ____________________________________________________

Type of Vlogs: ____________________________________________


Primary influence to the Filipino Centennials:
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________

Discussion:
Generation Z – Born 1996 to 2010

Learning Module on ITE101


`

27

Generation Z are born after 1995 and they are considered the future of global economy. By 2020 this generation
will be the largest group of consumers worldwide. In the U.S., Europe and the BRIC states they will make up to 40% of
the consumers and 10% in the rest of the world. Even now they are enormously important for the economy and marketers,
as already 93% of household purchases are influenced by generation Z, especially services and goods regarding travel,
food, household goods and furniture. The members of this generation are still largely kids and adolescents, so their adult
characteristics are yet to be examined.

Furthermore, they believe in diversity, equality and non-discrimination, not only in society, but also in
broadcasted advertisement. This generation is rather optimistic and very driven about their personal ambitions. For the
digital natives, self-actualization is of high priority, as well as a fulfilling job and a good working climate.
This generation grew up with diverse family structures, a more varied mix of ethnic groups and blurred gender
roles. Before they go shopping, they look for inspiration online, on platforms like Pinterest, Instagram, Facebook and
YouTube. Whenever they are shopping in-store, they are getting real-time feedback from their friends via WhatsApp.

Characteristics / Core Values Defining Technological Product

 Self-Aware  Virtual Reality (VR) and Augmented Reality (AR)


 Self-Reliant  Headsets and Components, Nano-Computing, 3D Printing, Electric and
Driverless Cars
 Innovative
 Handheld communication devices, Accessories such as Smartwatches
 Highly Educated
 Want to make a difference
 More diverse than Millennials Media Consumption
 YouTube, Vlogging, Informative Videos, Snapchat, and TikTok

The buying process of the generations before was simple: see and buy. With these new insights into the
purchasing behavior of the digital natives, new opportunities evolve. When they are shopping (online), companies can

Learning Module on ITE101


`

28

provide product inspiration, e.g. scrapbooks that are themed around the product can be shown. Additionally, potential
future purchases can be displayed on the website. This has already been implemented by Amazon, where on the website,
products under the title ‚You might also like … ‘can be seen. Ratings on the internet, reviews on Yelp and rankings
become more and more important for this generation, underlining the tendency of digital natives to trust their peers more
than the marketers.

As digital natives consider social media influencers as their peers, social media influencing offers a lot of
opportunities for marketing. However, this way of marketing has become more and more expensive as the influencers
know their worth and effect on their followers. The best way to implement this tool into a company’s marketing strategy
is to find influencers who represent the company’s values. Additionally, creators who release content regularly and have a
dedicated following (quality over quantity) are especially valuable for a successful (social media) marketing campaign.

Learning Module on ITE101


`

29

Important Events that happened during the Generation Z


Their mastery of technologies may make them neglect their interpersonal relationships to a greater
extent, but they are the ones who give more of a voice to social causes on the Internet. They like to get
everything they want immediately, a fact fostered by the digital world in which they are immersed, and their
lifestyle is also influenced by youtubers.

Learning Module on ITE101


`

30

Exercise
Based on what you have read so far, what do you think are the important contributions of the Centennials that led to the
technology we are currently using today?
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_____

Learning Module on ITE101


`

31

Bridging the Gap: Adaptations of other Generations for the Centennials


In an age of access, digital fluency and the desire to make an impact make Gen Z impatient, they expect things to
happen instantly. Generation Z is the first generation born into the world of technology. Understanding this characteristic
is a key factor to successfully adapt to their behavior. Rapid technological shifts mean that technology plays an intrinsic
role in all aspects of life and work for Gen Z.
Other generations need to embrace this trend and leverage the technological fluency of Gen Z. Communication
tools and new ways of interaction, including instant messaging and collaborative platforms, form part of the work routines
of Millennials.
Generations are shaped by the behavioral characteristics of their parents, which is why clumping Millennials and
Generation Z together is a mistake. In fact, when it comes to each generation’s behavioral traits, Millennials are most
similar to their parents—the Baby Boomers. Both are large, idealistic cohorts with influences that will shape consumer
and workplace behavior for decades.  
Members of Generation Z, on the other hand, are more akin to their parents from Generation X—a smaller group
with a skeptical, individualistic focus—than they are to Millennials. That’s why many generational traits are cyclical. Just
because Millennials and members of Generation Z are closer in age does not necessarily mean they share the same belief
systems.

Summary
 Generation Z are born after 1995 and they are considered the future of global economy.
 They believe in diversity, equality and non-discrimination, not only in society, but also in broadcasted advertisement.
 This generation grew up with diverse family structures, a more varied mix of ethnic groups and blurred gender roles.
 As digital natives consider social media influencers as their peers, social media influencing offers a lot of
opportunities for marketing.

M1:L5 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Directions: Based on what you have learned about Centennials, create a short TikTok video. Make it educational by
discussing some of the prevalent technologies used at the time and its importance for all the Centennials.
Note: The Professor will provide a link for you to pass the video requirement.

Learning Module on ITE101


`

32

Lesson 6. The Information Technology

Prototype Specifications

Learning Module on ITE101


`

33

Information technology (IT) is the use of any computers, storage, networking and other physical devices,
infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. Typically, IT is
used in the context of enterprise operations as opposed to personal or entertainment technologies. The commercial use of
IT encompasses both computer technology and telephony.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Define what Information technology is.


 Identify the computer and its parts.
 Enumerate the moral challenges currently faced by information technology.
 Differentiate the relationship of IT on some of the Domain of the society.
 Discuss wide-ranging effects of IT across numerous domains of society.

Getting Started:
Prototyping. Do you have an imaginary gadget or a new technology in mind? Draw Its prototype and write its
specifications in the space provided.
Discussion
What is Information Technology?

Learning Module on ITE101


`

34

Information Technology (IT) is a general term that describes any technology that helps to produce,
manipulate, store, communicate, and/or disseminate information. IT merges computing with high-speed communication
links carrying data, sound, and video. Examples of these are Telephones, Televisions, Appliances, Handheld devices, and
Computers. There are two different parts of Information Technology namely:
Computer Technology Communication Technology

 Programmable, multi-use machine  Also called telecommunications


that accepts data (raw facts and technology, consists of electromagnetic
figures) and processes, or devices and systems for communicating
manipulates it into information we over long distances.
can use.

Common Applications of Information Technology

Education Government and Politics

 E-mail  Voter Connections


 Course Management Software  Electronic Polling
 Distance Learning
 Three Step Balloting
 Blended Learning
 Online Public Complaints
 Avatars

Health and Medicine

 Health monitoring and diagnosis


 Medical treatment and patient care
 Pharmaceutical research and development
 Clinic performance optimization

Financial Matters

 Online Banking
 Virtual Money
 Micro-Credits
 Micro-Payments

The Computer

Learning Module on ITE101


`

35

A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and
process data. You may already know that you can use a computer to type documents, send email, play games, and browse
the Web. You can also use it to edit or create spreadsheets, presentations, and even videos. The Computer consists of the
following:
Hardware Software

 These are all the tangible, physical  is any set of instructions that tells the
computer parts. In simpler terms, it is hardware what to do and how to do it.
any part of the computer that has a Examples of software include web
physical structure, such as the keyboard browsers, games, and word processors
or mouse. It also includes all of the
computer's internal parts.

What are the different types of computers?


When most people hear the word computer, they think of a personal computer such as a desktop or laptop.
However, computers come in many shapes and sizes, and they perform many different functions in our daily lives. When
you withdraw cash from an ATM, scan groceries at the store, or use a calculator, you're using a type of computer.

Learning Module on ITE101


`

36

Desktop computers
 Many people use desktop computers at work, home,
and school. Desktop computers are designed to be
placed on a desk, and they're typically made up of a
few different parts, including the computer
case, monitor, keyboard, and mouse.

Laptop computers
 The second type of computer you may be familiar
with is a laptop computer, commonly called a laptop.
Laptops are battery-powered computers that are more
portable than desktops, allowing you to use them
almost anywhere.

Tablet computers

 Tablet computers—or tablets—are handheld


computers that are even more portable than laptops.
Instead of a keyboard and mouse, tablets use a touch-
sensitive screen for typing and navigation. The iPad
is an example of a tablet.

Servers
 A server is a computer that serves up information to
other computers on a network. For example,
whenever you use the Internet, you're looking at
something that's stored on a server. Many businesses
also use local file servers to store and share files
internally.

Other types of computers


 Smartphones: Many cell phones can do a lot of things computers can do, including browsing the Internet and playing
games. They are often called smartphones.
 Wearables: Wearable technology is a general term for a group of devices—including fitness
trackers and smartwatches—that are designed to be worn throughout the day. These devices are often
called wearables for short.
 Game consoles: A game console is a specialized type of computer that is used for playing video games on your TV.
 TVs: Many TVs now include applications—or apps—that let you access various types of online content. For example,
you can stream video from the Internet directly onto your TV.
Basic Concepts of a Computer

Learning Module on ITE101


`

37

Data enters the computer through one or more input devices. The computer then processes the data and transmits
the resulting data to output devices. Output devices can be human interfaces such as a screen or another electronic device
such as a storage device or computer network. The system unit consists of the following components:
• Motherboard - a computer "backbone" responsible for communication between components and transmission of
information.
• Central Processing Unit (CPU) – functions as command execution, data transmission, computer function control.
• Random Access Memory (RAM) - a memory container for programs that are currently running and data that is being
processed.
• Hard Disk Drive (HDD) - used for permanent data storage. The data is stored on magnetic platters; electromagnetic
heads are used for reading and recording data.
• Solid State Drive (SSD)
• Floppy Disk Drive (FDD)
• Optical Disks - CD, DVD
• Graphics Processing Units (GPU) - processes and displaying image on the monitor. It consists of a graphics processor
and its own working RAM memory.
• Ports – it contains the Parallel Port, Serial Port, Universal Serial Bus (USB).

Input and output devices


Input devices: Output devices:
 Keyboard
 Scanner  Monitor
 Touchpad  Projector
 Mouse  Printer
 Trackball  Plotter
 Joystick  Speakers
 Microphone  Earphones
 Stylus
 Camera (Web, Digital)

Common devices and media for storing and transferring data:


o hard disk
o USB flash drive
o diskette and ZIP diskette
o CD and DVD discs
o memory cards
o internal hard disk

Learning Module on ITE101


`

38

o external hard disk


o network disk drive
o online storage device

Software - a computer program which, as opposed to hardware, is an intangible part of the computer, written to perform a
single or multiple task on computer using the built-in hardware.

Software types:
 Operating Systems (OS) - the basic program on your computer that is automatically loaded when computer is started
up:
o Linux (Debian, Ubuntu, Fedora…)
o Microsoft Windows (XP, Vista, 7...)
o Mac OS X (Cheetah, Panther, Snow…)

 Application Software – some types of software that can be used on an installed operating system:
o Office programs - OpenOffice.org, LibreOffice, Microsoft Office.
o Antivirus Program – Avira, Sophos, Kaspersky etc.
o Web Browser - Mozilla Firefox, Microsoft Internet Explorer, Opera, Safari.

E-accessibility options:
 voice recognition software,
 screen reader,
 magnifying tool,
 on-screen keyboard

Data Vs. Information


There is a subtle difference between data and information. Data are the facts or details from
which information is derived. Individual pieces of data are rarely useful alone. For data to become information, data
needs to be put into context.
Key Difference
 Data is a raw and unorganized fact that is required to be processed to make it meaningful whereas Information
is a set of data that is processed in a meaningful way according to the given requirement.
 Data does not have any specific purpose whereas Information carries a meaning that has been assigned by
interpreting data.
 Data alone has no significance while Information is significant by itself.
 Data never depends on Information while Information is dependent on Data.
 Data measured in bits and bytes, on the other hand, Information is measured in meaningful units like time,
quantity, etc.
 Data can be structured, tabular data, graph, data tree whereas Information is language, ideas, and thoughts
based on the given data.
Data Information

Learning Module on ITE101


`

39

Meaning Data is raw, unorganized facts that need to be When data is processed, organized, structured or
processed. Data can be something simple and presented in a given context so as to make it useful, it is
seemingly random and useless until it is called information.
organized.
Example Each student's test score is one piece of data. The average score of a class or of the entire school is
information that can be derived from the given data.
Etymolog "Data" comes from a singular Latin word, "Information" is an older word that dates back to the
y datum, which originally meant "something 1300s and has Old French and Middle English origins. It
given." Its early usage dates back to the has always referred to "the act of informing, " usually in
1600s. Over time "data" has become the regard to education, instruction, or other knowledge
plural of datum. communication.

Data vs. Information - Differences in Meaning


Data are simply facts or figures — bits of information, but not information itself. When data are processed,
interpreted, organized, structured or presented so as to make them meaningful or useful, they are called information.
Information provides context for data. For example, a list of dates — data — is meaningless without the information that
makes the dates relevant (dates of holiday). "Data" and "information" are intricately tied together, whether one is
recognizing them as two separate words or using them interchangeably, as is common today. Whether they are used
interchangeably depends somewhat on the usage of "data" — its context and grammar.
Misleading Data
Because data needs to be interpreted and analyzed, it is quite possible — indeed, very probable — that it will be
interpreted incorrectly. When this leads to erroneous conclusions, it is said that the data are misleading.

Information Technology as a Science


What is information technology? Many definitions have been put forward. The British Computer Society has
defined information technology as: "the application of appropriate technologies to information processing, current interest
centers on computing, telecommunications and digital electronics. " or, to put it another way, information technology
involves "the electrical acquisition, storage and dissemination of vocal, pictorial, (textual) and numerical information."
From these statements we can see that a major component of information technology or information studies (as it is
probably more correctly known) involves not only a knowledge of the hardware and software in use but also a knowledge
of the methods and means of using the available technology to acquire, store and disseminate information.
So, what is this "information" with which we are concerned? It states that: "Information is the organized useful
knowledge derived from processed data" and that "data refers to raw material or unorganized facts". Information can be
either verbal, pictorial, textual or numeric and this is critical to the argument - only a small proportion of information is
numeric. Increasingly textual and pictorial (or graphical) information is forming a larger proportion of "information" as a
whole. It is also likely that as technological advances occur information transmitted by voice will become increasingly
important.

Learning Module on ITE101


`

40

Moral Challenges of IT
Information Technology (IT) has a central role in commerce, industry, government, medicine, education,
entertainment and society at large. Its economic and social benefits hardly need explanation. But like any other
technologies, IT also has problematic implications, and some negative impacts on our society. It poses and creates some
problems related to ethics, and contains in general three main types of ethical issues: personal privacy, access right, and
harmful actions. In terms of personal privacy, IT enables data exchange of information on a large scale from anybody, on
any locations or parts of the world, at any times. In this situation, there is increased potential for disclosing information
and violating the privacy of any individuals and groups of people due to its widespread disseminations worldwide. It is
our challenge and responsibility to maintain the privacy and integrity of data regarding individuals. This also includes
taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental
disclosure to inappropriate individuals.
The second aspect of ethical issues in computing systems is access right. Due to the current popularity of
international commerce on the Internet, the topic of computer security and access right has moved quickly from being a
low priority for corporations and government agencies to a high priority. This interest has been heightened by computer
break-ins at places like Los Alamos National Laboratories and NASA in the US. Many attempts of such illegal access to
United States government and military computers by computer hackers have been widely reported. Without
implementation of proper computer security policies and strategies, network connections on the Internet can’t be made
secure from illegal accesses. In computer ethics, harmful action means injury or negative consequences, such as
undesirable loss of information, loss of property, property damage, or unwanted environmental impacts. This principle
prohibits use of computing technology in ways that result in harm to any of users, the general public, employees, and
employers. Harmful actions include intentional destruction or modification of files and programs leading to serious loss of
resources or unnecessary expenditure of human resources such as the time and effort required to purge systems from
"computer viruses”. Another issue is Plagiarism, where the work of others is copied, but the author presents it as his or her
own work. This is a highly unethical practice, but happens quite frequently, and with all the information that is now
available on the Internet it is much easier to do and is happening more often. Lastly, Piracy, the illegal copying of
software, is a very serious problem, and it is estimated that approximately 50% of all programs on PCs are pirated copies.
Programmers spend hours and hours designing programs, using elaborate code, and surely need to be protected. Although
some might argue that some pirating at least should be permitted as it can help to lead to a more computer literate
population. But, for corporations, in particular, this is a very serious issue, and can significantly damage profit margins

Summary
 Information Technology (IT) is a general term that describes any technology that helps to produce, manipulate, store,
communicate, and/or disseminate information.
 Computers come in many shapes and sizes, and they perform many different functions in our daily lives.
 A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and
process data.
 IT merges computing with high-speed communication links carrying data, sound, and video.
 Data are simply facts or figures — bits of information, but not information itself. When data are processed,
interpreted, organized, structured or presented so as to make them meaningful or useful, they are called information.

Learning Module on ITE101


`

41

M1:L6 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Directions: Read and analyze the case then make a short reflection about the issue.

________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________

Learning Module on ITE101


`

42

Module #1: Assessment


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________
Direction: Choose the letter of your answer in the box.

A. Baby Boomers C. Generation Y (Millennials)


B. Generation X (Gen Xers) D. Generation Z (Centennials)

____1. Strong work ethic


____2. Innovative
____3. Tech-savvy
____4. Adaptable
____5. Mass/Multiple streaming options
____6. Goal oriented
____7. Self-aware
____8. Vlogging
____9. Heavy TV and Facebook users
____10. Diversity
____11. Highly tolerant
____12. Competitive
____13. Independent
____14. More diverse
____15. Good communication skills
____16. Highly educated
____17. Seek work-life balance
____18. Confident

Learning Module on ITE101


`

43

____19. Highly consumers of traditional media


____20. Skeptic and pragmatic
____21. Creative, innovative and flexible in the workplace
____22. Entrepreneurial
____23. TikTok
____24. Self-actualization
____25. Snapchat
____26. Smartwatches
____27. Street smart
____28. Want to make a difference
____29. YouTube
____30. Thinkers of the workforce

Identification
_____________1. General term that helps to produce, manipulate, store, communicate, and/or disseminate
information.
_____________2. Consists of electromagnetic devices and systems for communicating over long distances.
_____________3. It refers to an electronic device that manipulates information, or data.
_____________4. These are tangible, physical computer parts.
_____________5. Any set of instructions that tells the hardware what to do and how to do it.
_____________6. Memory container for programs that are currently running and data that is being processed
_____________7. A specialized type of computer that is used for playing video games on your TV.
_____________8. General term for a group of devices that are designed to be worn throughout the day.
_____________9. It is raw, unorganized facts that needs to be processed.
_____________10. Data is processed, organized, structured or presented in a given context to make it useful.

Learning Module on ITE101


`

44

LEARNING MODULE INFORMATION


I. Course Code ITE101
II. Course Title LIVING IN THE IT ERA
III. Module Number 2
IV. Module Title The Next Big thing in Technology
V. Overview of the Module This module identifies the important concepts about the Internet and Social
Media. It will also help the students understand the new growing trends
online such as social networking, e-commerce, and gaming. This will give
further ideas and support for some of the future technologies that will be
discussed later on in this second module.

VI. Module Outcomes After studying this module, the students shall be able to:
1) Understand the origin of the Internet and its evolution.
2) Use online community to share information.
3) Understand how simulated environment works through
the incorporation of the auditory and visual sensory
feedbacks.
4) Identify the effects and results of innovation in society
5) Know the overview of Artificial Intelligence and its uses.

Learning Module on ITE101


`

45

Lesson 1. The Internet and World Wide Web

The bottomless pit of information we call the internet is a mixed blessing. As much as the internet spreads
knowledge and understanding around the world, it also provides endless opportunities to waste time and develop
unhealthy habits, such as obsessively checking social media.

Lesson Objectives:
At the end of this lesson, you will be able to:
 Discuss the use of Internet and how the world wide web works.
 State the applications of the Internet.
 Distinguish the threats in using the Internet.
 Demonstrate understanding of the Internet through a video presentation.

Getting Started
Crossword Puzzle: Using the Internet, find the answer on the following using the clues provided.

Down

1 2 3 4 5 6 7 8 1. A citizen of the country Iberia

2. Largest city and Capital of Kenya

3. Smaller than Broadsheet Newspaper

4. Thrifty Management

5. Shining or Glowing Brightly

6. Capital of Jiangsu Province in China

7. MDMA drug

8. Capable of being drawn-out or

Learning Module on ITE101


`

46

Stretched.

Discussion
The Internet and the World wide web

Internet, a system architecture that has revolutionized communications and methods of commerce by allowing
various computer networks around the world to interconnect. Sometimes referred to as a “network of networks,” the
Internet is the wider network that allows computer networks around the world run by companies, governments,
universities and other organizations to talk to one another. The result is a mass of cables, computers, data centers, routers,
servers, repeaters, satellites and Wi-Fi towers that allows digital information to travel around the world. It is that
infrastructure that lets the users like you order in Lazada or Shopee, share your life on Facebook, stream KDramas on
Netflix, email your friend and search the web for the world’s tiniest cat.

Brief History of the Internet

February 7, 1958 was the day Secretary of Defense Neil McElroy signed Department of Defense Directive
5105.15. His signature launched the Advanced Research Projects Agency (ARPA), now known as the Defense Advanced
Research Projects Agency (DARPA They innovated a network came to be known as the ARPA Network, or ARPAnet.
Packet switching made data transmission possible in 1965, and by 1969, military contractor Bolt, Beranek, and Newman
(BBN) developed an early form of routing devices known as interface message processors (IMPs), which revolutionized
data transmission. In 1981, the NSF expanded ARPAnet to national computer science researchers when it funded the
Computer Science Network (CSNET). 1989 saw a major step forward in internet communications. 

Tim Berners-Lee of the European Organization for Nuclear Research (CERN) created the hypertext transfer
protocol (http), a standardization that gave diverse computer platforms the ability to access the same internet sites. For this
reason, Berners-Lee is widely regarded as the father of the world wide web (www).

The Mosaic web browser, created in 1993 at the National Center for Supercomputing Applications (NCSA) at the
University of Illinois Urbana-Champaign, was a key development that emerged from the NSFNET. Mosaic was the first
to show images in line with text, and it offered many other graphical user interface norms we’ve come to expect today.
Eventually the NSFNET modified its acceptable use policy for commercial use, and by 1995, it was decommissioned.
Soon, the internet provider model created network access points that allowed the for-profit, commercial side of the
internet to be developed. The internet went from being an obscure research idea to a technology that is used by over 3.2
billion people in less than sixty years.

Learning Module on ITE101


`

47

Growth of the Internet

Learning Module on ITE101


`

48

The figure below from TeleGeography represents the World wide web and how big the Internet is. One measure
is the amount of information that courses through it: about five exabytes a day. That’s equivalent to 40,000 two-hour
standard definition movies per second. It takes some wiring up. Hundreds of thousands of miles of cables crisscross
countries, and more are laid along sea floors to connect islands and continents. About 300 submarine cables, the deep-sea
variant only as thick as a garden hose, underpin the modern internet. Most are bundles of hair-thin fiber optics that carry
data at the speed of light.

What is World Wide Web


The web is a way to view and share information over the internet. That information, be it text, music, photos or
videos or whatever, is written on web pages served up by a web browser. Google handles more than 40,000 searches per
second, and has 60% of the global browser market through Chrome. There are nearly 2bn websites in existence but most
are hardly visited. The top 0.1% of websites (roughly 5m) attract more than half of the world’s web traffic.
Among them are Google, YouTube, Facebook, the Chinese site Baidu, Instagram, Yahoo, Twitter, the Russian
social network VK.com, Wikipedia, Amazon and a smattering of porn sites. The rise of apps means that for many people,
being on the internet today is less about browsing the open web than getting more focused information: news, messages,
weather forecasts, videos and the like.
Internet Applications

Learning Module on ITE101


`

49

 Sending and receiving email


 Searching and browsing information archives
 Copying files between computers
 Conducting financial transactions
 Navigating (in your car, smart scooter, smart bike, or other)
 Playing interactive games
 Video and music streaming
 Chat or voice communication (direct messaging, video conferencing)

Internet Threats
 Malware. Software that performs a malicious task on a target device or network, e.g. corrupting data or taking over a
system.
 Phishing. An email-borne attack that involves tricking the email recipient into disclosing confidential information or
downloading malware by clicking on a hyperlink in the message.
 Spear Phishing. A more sophisticated form of phishing where the attacker learns about the victim and impersonates
someone he or she knows and trusts.
 “Man in the Middle” (MitM) attack. Where an attacker establishes a position between the sender and recipient of
electronic messages and intercepts them, perhaps changing them in transit. The sender and recipient believe they are
communicating directly with one another.
 Trojans. Named after the Trojan Horse of ancient Greek history, the Trojan is a type of malware that enters a target
system looking like one thing, e.g. a standard piece of software, but then lets out the malicious code once inside the
host system.
 Ransomware. An attack that involves encrypting data on the target system and demanding a ransom in exchange for
letting the user have access to the data again.
 Denial of Service attack or Distributed Denial of Service Attack (DDoS). Where an attacker takes over many of
devices and uses them to invoke the functions of a target system, e.g. a website, causing it to crash from an overload
of demand.
 Attacks on IoT Devices. IoT devices like industrial sensors are vulnerable to multiple types of cyber threats. These
include hackers taking over the device to make it part of a DDoS attack and unauthorized access to data being
collected by the device.
 Data Breaches. A data breach is a theft of data by a malicious actor. Motives for data breaches include crime (i.e.
identity theft), a desire to embarrass an institution (e.g. Edward Snowden or the DNC hack) and espionage.
 Malware on Mobile Apps. Mobile devices are vulnerable to malware attacks just like other computing hardware.
Attackers may embed malware in app downloads, mobile websites or phishing emails and text messages. Once
compromised, a mobile device can give the malicious actor access to personal information, location data, financial
accounts and more.

Exercise

Learning Module on ITE101


`

50

Case Scenario. Suppose you were a victim of Phishing, what would you do if someone made a fake Facebook account
with your name, photos, and posing as you? Another problem arises when that same account was used to post and share
malicious content which may potentially victimize others.

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_________________________________________________________________________________________________

The Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in society, netiquette is a
code of good behavior on the Internet. This includes several aspects of the Internet, such as email, social media, online
chat, web forums, website comments, multiplayer gaming, and other types of online communication. While there is no
official list of netiquette rules or guidelines, the general idea is to respect others online. Below are ten examples of rules to
follow for good netiquette:
1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).
2. Respect others' privacy by not sharing personal information, photos, or videos that another person may not want
published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or annoying them.
6. Stick to the topic when posting in online forums or when commenting on photos or videos, such
as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break the cycle with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.

Summary
 Referred to as a “network of networks,” the Internet is the wider network that allows computer networks around the
world run by companies, governments, universities and other organizations to talk to one another.
 Tim Berners-Lee of the European Organization for Nuclear Research (CERN) is widely regarded as the father of the
world wide web (www).
 The web is a way to view and share information over the internet. That information, be it text, music, photos or videos
or whatever, is written on web pages served up by a web browser.

Learning Module on ITE101


`

51

M2:L1 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Video Compilation Part 1


This is the first part of the video you will be creating. The theme for this Enrichment Activity is “Digital
Natives: Making a Difference through the Internet”.
Your task is to create a one (1) minute video of yourself talking about your views on the said theme. The
required amount of time for the video is as is and must be followed strictly, take caution by making preparations
before and after recording.
Start your video with an introduction containing the following:
o Your Name and Section
o The video part you will be featuring
o The Theme

Things to consider for the content:


o Netiquette
o Internet Threats
o Social Issues and Concerns in the Internet

Learning Module on ITE101


`

52

Lesson 2. The Social Media and Networking

Social media refers to websites and applications that are designed to allow people to share content quickly,
efficiently, and in real-time. While many people access social media through smartphone apps, this communication tool
started with computers, and social media can refer to any internet communication tool that allows users to broadly share
content and engage with the public.

Lesson Objectives:
At the end of this lesson, you will be able to:
 Explain the use of Social Media and how the world wide web works.
 Identify the difference between Social Media and Social Networking sites.
 Distinguish the threats in using Social Media.
 Demonstrate understanding of the Social Media through a video presentation.

Getting Started
4 Pics 1 Word: Guess or use the Internet, find the answer on the following using the clues provided.

Answer:

___________________

Learning Module on ITE101


`

53

Discussion
What is Social Media?

Social media is any digital tool that allows users to quickly create and share content with the public. Social media
encompasses a wide range of websites and apps. Some, like Twitter, specialize in sharing links and short written
messages. Others, like Instagram and TikTok, are built to optimize the sharing of photos and videos.

What makes social media unique is that it is both broad and relatively uncensored. While many social media
companies impose some limitations—such as taking down images that display violence or nudity—there are much fewer
limitations on what someone can share than there with other means of mass communication like newspapers, radio
stations, and television channels.

Anyone with internet access can sign up for a social media account. They can use that account to share whatever
content they choose to, and the content they share reaches anyone who visits their page or profile.

How Social Media Works

Since social media covers so many different kinds of websites and applications, the function of these tools also
varies. However, most social media sites start with a user creating a profile, usually by providing a name and an email
address. Once a profile has been created, users can create and share content. For instance, an Instagram user with a new
account can take a picture and share it on their profile with a caption.

In addition to creating content for their profile, social media users can find other
users whose content they want to follow or comment on. Depending on the type of social media, a user may "follow"
another user, add them as a "friend," or they may "subscribe" to another user's page.

Social media often uses "feeds" that allow users to scroll through content. Social media companies use algorithms,
based on a user's profile data, to determine the content that appears and the order that it appears in. The feed will include
content from "followed" users, as well as from entities that pay to promote their content.

Types of Social Media

 Social Networks (Facebook, Twitter, LinkedIn)


 Media Networks (Instagram, YouTube)
 Discussion Networks (WordPress, Reddit)
 Review Networks (Yelp, TripAdvisor)

Learning Module on ITE101


`

54

Learning Module on ITE101


`

55

Learning Module on ITE101


`

56

What is a Social Network?

Alternatively referred to as a virtual community or profile site, a social network is a website that brings people
together to talk, share ideas and interests, or make new friends. This type of collaboration and sharing is known as social
media. Unlike traditional media that is created by no more than ten people, social media sites contain content created by
hundreds or even millions of different people.

Different Social Networking Sites

Learning Module on ITE101


`

57

 Classmates (http://www.classmates.com ) - One of the largest websites for connecting high school friends and
keeping in touch with them and future reunions.
 DeviantArt ( https://www.deviantart.com ) - A social media platform for sharing original artwork.
 Facebook ( https://www.facebook.com ) - The most popular social networking websites on the Internet. Facebook is a
popular destination for users to set up personal space and connect with friends, share pictures, share movies, talk
about what you're doing, etc.
 Google+ (https://plus.google.com ) - The latest social networking service from Google.
 Mastodon ( https://joinmastodon.org ) - A free, federated, social microblogging service with over two million users.
Any Mastodon user can operate a node (social subdomain) with its own theme and set of rules.
 Mix ( https://mix.com ) - Another very popular community of Internet user who vote for web pages they like and
dislike. Mix also allows users to create personal pages of interesting sites they come across.
 MySpace ( https://myspace.com ) - Once one of the most popular social networks and viewed website on the Internet.

Exercise
Case Scenario. Suppose someone edited a photo or video deliberately to put you to shame, what would you do if you
were wrongfully involved in an online viral photo or video which was scandalous? What’s worst is that you are
continuously receiving negative comments online and in the real world.

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_______________________________________________________________________________________________

Learning Module on ITE101


`

58

Learning Module on ITE101


`

59

5 Common Problems in using Social Media

1. Number of Likes/Comments

The question that you have to ask yourself is, am I posting to show everyone what is going on in my life or am I
just posting to get a lot of likes? People, especially teens, have become obsessed with the idea of receiving “likes" on their
pictures. Even Twitter, which used to have a “favorite" button, has now switched over to the word "like." To be honest, it
is a pretty strange concept if you think about it. The first step is posting. You put filters on your pictures, or decide to just
leave them as they are. You crop it to make sure it is perfect, maybe add a border for Instagram, and then you leave it out
there for your friends/followers to see. Then, next is the waiting stage. You are either someone who constantly checks
their phone to see the number of likes, or you turn off notifications and check your phone once a significant amount of
people has liked it. Either way, the last step is gratification. However, even though countless likes might make you happy,
it is only short term. That instant gratification might satisfy your “social media need," but it is kind of sad to think that we
all rely on "likes" to make us feel good about ourselves.

2. Fake Identities

Learning Module on ITE101


`

60

This is a huge problem that we witness every single day on social media. The show on MTV called “Catfish" has
made this issue more public, but it does not mean we can say goodbye to fake profiles and upsetting stories. The show
deals with people creating fake identities on social media or dating websites. After researching the person to see if they
are the real deal, the hosts of the show then will contact them to meet up with the person they have been talking to online.
More often than not, the person has a completely different appearance than they put out onto the internet, and they might
even have a different name. These stories are real, but they are not just limited to the Facebook and dating apps like
Tinder and OkCupid. People will use fake pictures to make themselves look better, creating a false representation of who
they really are. It can help with a person's self-esteem on a social media site, but it will do nothing for them in real life,
and it certainly will not help others. The victims in this situation are the ones who think that they are talking to a specific
person, and then find out it is a complete lie. Overall, there is nothing to get out of it.

3. Elimination of Face to Face Conversations

Something else to think about is the change in methods of communication. After phones came out, people tended
to stay inside their homes, hiding behind a screen. There were fewer coffee dates, less group gatherings, and not as many
words spoken in person. Instead, we resorted to texting conversations, chat rooms/group texts, and a lot of fighting. Since
people are not in contact with another, they tend to lash out more. People feel empowered when they are online. Their
confidence in making a post or sending a message increases because they do not have to see the person's reactions. All
they have to do is type a few words and hit send. This method of communication has essentially led to cyberbullying.
Nasty comments are exchanged between internet-goers daily because they are not able to see the damage that they have
done. There are no emotions exchanged, only words.

4. It Promotes Procrastination

As a student, my life is consumed with studying, homework, and projects. However, in the modern technology
era, my life is also consumed with Twitter, Instagram, and countless other social media sites. It might seem a bit crazy,
but it is hard to resist the daily scroll on Instagram. Leaving my phone on does not help when I am trying to get my work
done, but it is quite the addiction. Even when I am focused, most work is completed online. Being online while doing
homework is difficult because you are surrounded by tempting sites on the internet. It seems like a simple option to just
turn off your phone, but it is not that simple.

5. No More Privacy

This may seem a bit ironic, but, with this new technological advancement, there is nowhere to hide. Although a
bit contradictory to what I was saying before about hiding behind a screen, being on social media makes us more prone to
being found in the real world. Even with privacy settings on and everything, the internet makes it easily accessible to find
out personal information about others. Now, you may be thinking, what if I am not even on the internet? Well, news flash,
you are. You may not have five social media accounts and a million followers, but you can definitely be found with the
click of a button.

Summary

Learning Module on ITE101


`

61

 Social media is any digital tool that allows users to quickly create and share content with the public.
 A social network is a website that brings people together to talk, share ideas and interests, or make new friends.
 Social media companies use algorithms, based on a user's profile data, to determine the content that appears and the
order that it appears in.
 Unlike traditional media that is created by no more than ten people, social media sites contain content created by
hundreds or even millions of different people.
 Anyone with internet access can sign up for a social media account.

M2:L2 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Video Compilation Part 2


This is the first part of the video you will be creating. The theme for this Enrichment Activity is “Is using Social
Media really worth it?”.
Your task is to create a one (1) minute video of yourself talking about your views on the said theme. The required amount
of time for the video is as is and must be followed strictly, take caution by making preparations before and after recording.
Start your video with an introduction containing the following:
o Your Name and Section
o The video part you will be featuring

Learning Module on ITE101


`

62

o The Theme

Things to consider for the content:


o Personal Experience in using Social Media
o Advantages and Disadvantages of using Social Media
o Social Issues

Lesson 3. Online and Virtual Games

Online gaming is hugely popular with children and young people. Annual research conducted by OFCOM (Office
of Communications) in United Kingdom shows that gaming is still one of the top activities enjoyed by 5-16-year old
online, with many of them gaming via mobile devices and going online using their games console. From sport related
games to mission-based games and quests inspiring users to complete challenges, interactive games cater for a wide range
of interests, and can enable users to link up and play together.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Discuss the use of Online and Virtual games.


 Identify the difference between Online, Virtual, and Augmented Reality Games.

Learning Module on ITE101


`

63

 Distinguish the threats in using Online Games.


 Demonstrate understanding of the Online Gaming through a video presentation.

Getting Started
4 Pics 1 Word: Guess or use the Internet, find the answer on the following using the clues provided.

Answer:

__________________

Discussion
Games can provide a fun and social form of entertainment often encouraging teamwork and cooperation when
played with others. Just like offline games, they can have educational benefits, and be used, for example, to develop skills
and understanding. Traditionally, games could be bought from shops, often in the form of a disk for use on a PC or
console. Now, games can also be downloaded online. Internet connectivity in a game adds a new opportunity for gamers
as it allows players to find and play against, or with, other players from around the world (in a multi-player game).

Online Gaming: Where and How?

There are many ways for users to play games online. This includes free games found on the internet, games on
mobile phones and handheld consoles, as well as downloadable and boxed games on PCs and consoles such as the
PlayStation, Nintendo Wii or Xbox.

Learning Module on ITE101


`

64

 Consoles: These games are played on home entertainment consoles designed to work with a TV. Games for consoles
are mostly boxed products bought in shops and also online, containing a game disc and usually a manual. Consoles
like these are capable of connecting to the internet via a home network just like other computers.
 PC Games: These games are played on a personal computer the same way as other software programs. They can be
bought from shops or purchased and downloaded directly from the internet. Many PC games make use of the internet,
and many ‘Massively Multiplayer Online’ (MMO) games, where gamers interact together in virtual spaces, are PC
games.
 Web Games and Applications (apps): Many of these games are free of charge online, although some may have
paid-for components. Applications can be accessed through, and downloaded to, social networking profiles which
allow users to play games on their profile as well as enabling them to play games with their friends, generally for free.
Smart phones with internet connectivity also enable users to download games to play, some free, some charged for.
 Mobile Games: Mobile games can be free or chargeable. There may be costs associated with mobile gaming, as
within some games, even free ones, there are opportunities to purchase added functionality such as ‘in-app’ purchases.
These functions however can be deactivated, usually through the phone settings.
 Handheld Games: Handheld games are played on small consoles. Two of the current popular handheld consoles are
the Nintendo DSi and the Sony PlayStation Portable (PSP). Handheld games can also be played on other devices like
the iPod Touch or iPad. These devices can also access the internet wirelessly, and allow for playing games with others
online.

Learning Module on ITE101


`

65

The Risks of Online Gaming

 Content: inappropriate material is available to children online. The quality of graphics in many games is very high.
Some games might not be suitable for your child’s age – they might contain violent or sexually-explicit content.
 Contact: potential contact from someone online who may wish to bully or abuse them. If your child takes part in
multi-player games on the internet (where they play against other people, potentially from all around the world) they
might be at risk of hearing offensive language from other players, being bullied, or making themselves vulnerable to
contact by those with a sexual interest in children if they give out their personal details.
 Conduct: children may be at risk because of their own and others’ online behavior, such as the personal information
they make public. Specific conduct risks for gamers include excessive use to the detriment of other aspects of their
lives. This is sometimes referred to as ‘addiction’.
 Commercialism: young people’s privacy can be invaded by aggressive advertising and marketing schemes. Children
and young people can get themselves into difficulty by inadvertently running up bills when playing games online.
Some online games, advergames, are designed to promote particular products.

Learning Module on ITE101


`

66

Learning Module on ITE101


`

67

What is Virtual Reality gaming?

VR gaming is the term used to describe a new generation of computer games with virtual reality (VR) technology
that gives players a truly immersive, first-person perspective of game action. Participants both experience and influence
the game environment through a variety of VR gaming devices and accessories, including VR headsets, sensor-equipped
gloves, hand controllers, and more.

Virtual reality games can be played on standalone systems, specialized game consoles, or using advanced laptops
and PCs that can power the leading VR headsets such as Oculus Rift, HTC Vive, and Lenovo Mirage Solo.

There are subsets of virtual reality gaming that use related technologies called augmented reality (AR) and mixed
reality (MR), where virtual elements are placed into the player's real world as viewed through a headset or camera.
Lenovo Explorer uses the Windows Mixed Reality platform which, though still quite VR-focused, introduces new AR and
MR experiences.

Different types of VR games

There are individual virtual reality games and multi-player, online virtual reality games. Some VR games place
players in physical combat environments, while others involve less confrontational pursuits, such as auto racing and
acrobatic flying. Other VR games challenge players – either alone or with others – to solve problems, move objects, or

Learning Module on ITE101


`

68

explore new places. VR gaming laptops and VR-ready gaming towers are widely popular platforms, but there are different
kinds of VR gaming depending on the type of computing device being used:

VR Games on Pcs and Laptops: Games played on high-end computers provide the most detailed virtual environments
and game options. Popular VR headsets for PCs and laptops in late 2018 include Oculus Rift, HTC Vive, and our own
Lenovo VR headset, Lenovo Explorer.
VR Games on Game Consoles: These games are similar to those played on PCs but work only with game consoles from
specific manufacturers. A leading example is the PlayStation VR headset/platform.
VR Games on Smartphones: For mobile VR gaming, smartphone manufacturers are introducing their own headsets,
controllers and games (VR, AR, and MR). One such headset/platform is the Gear VR.
There are also standalone VR products like the Mirage Solo, which provides less detailed, but still entertaining VR
gaming experiences.

Learning Module on ITE101


`

69

Learning Module on ITE101


`

70

Learning Module on ITE101


`

71

Exercise
Case Scenario. “Trash talk” is a form of strategy in online competitive games wherein it is used to belittle and undermine
the capability of the opposing player to lessen their effectiveness in gaming and in team play. Supposedly you were

Learning Module on ITE101


`

72

playing Mobile Legends, PUBG, or RoS, and someone is using that very same strategy towards you. What would you do
if that opposing player involved undermining and cursing your parents or your loved ones? How will you address this
situation?

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_______________________________________________________________________________________________

Learning Module on ITE101


`

73

Learning Module on ITE101


`

74

Augmented Reality

AR overlays digital information on real-world elements. Pokémon GO* is among the best-known examples.
Augmented reality keeps the real world central but enhances it with other digital details, layering new strata of perception,
and supplementing your reality or environment.

Mixed Reality

MR brings together real world and digital elements. In mixed reality, you interact with and manipulate both
physical and virtual items and environments, using next-generation sensing and imaging technologies. Mixed Reality
allows you to see and immerse yourself in the world around you even as you interact with a virtual environment using
your own hands—all without ever removing your headset. It provides the ability to have one foot (or hand) in the real
world, and the other in an imaginary place, breaking down basic concepts between real and imaginary, offering an
experience that can change the way you game and work today.

Applications of Virtual Reality Technologies

From gaming, to movies, to medicine, the uses for Virtual Reality, Augmented Reality, and Mixed Reality are expanding.

 Healthcare - For training, such as for surgical simulations


 Film and TV - For movies and shows to create unique experiences
 Virtual travel - For virtual trips to an art museum—or another planet—all from home
 Professional sports - For training programs like STRIVR to help pro and amateur athletes
 Gaming - For over 1,000 games already available, from first-person shooters to strategy games to role-playing
adventures

Summary
 Games can provide a fun and social form of entertainment often encouraging teamwork and cooperation when played
with others.
 Online games ranges from sport related games to mission-based games and quests inspiring users to complete
challenges, interactive games cater for a wide range of interests, and can enable users to link up and play together.

Learning Module on ITE101


`

75

 Some VR games place players in physical combat environments, while others involve less confrontational pursuits,
such as auto racing and acrobatic flying. Other VR games challenge players – either alone or with others – to solve
problems, move objects, or explore new places.

M2:L3 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Video Compilation Part 3


This is the third part of the video you will be creating. The theme for this Enrichment Activity is “The possible
implications of Online Gaming and Virtual Reality to the future Generation”.
Your task is to create a one (1) minute video of yourself talking about your views on the said theme. The required
amount of time for the video is as is and must be followed strictly, take caution by making preparations before and after
recording.
Start your video with an introduction containing the following:
o Your Name and Section
o The video part you will be featuring
o The Theme

Things to consider for the content:


o Positive and Negative Outlooks on using Online games.
o Important uses of Virtual, Augmented, and Mixed Realities.
o The Future for Online Gaming and Virtual Reality.

Learning Module on ITE101


`

76

Lesson 4. Artificial Intelligence

Artificial intelligence (AI) is wide-ranging branch of computer science concerned with building smart machines
capable of performing tasks that typically require human intelligence. AI is an interdisciplinary science with multiple
approaches, but advancements in machine learning and deep learning are creating a paradigm shift in virtually every
sector of the tech industry.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Discuss the applications of Artificial Intelligence.


 Identify the difference between types of Artificial intelligence
 Evaluate the impacts of AI on various industries
 Demonstrate understanding of Artificial Intelligence and its implication to the Internet, Social Media, and Online
Gaming through a video presentation.

Getting Started
4 Pics 1 Word: Guess or use the Internet, find the answer on the following using the clues provided.

Answer:

__________________

Learning Module on ITE101


`

77

Discussion
Less than a decade after breaking the Nazi encryption machine Enigma and helping the Allied Forces win World
War II, mathematician Alan Turing changed history a second time with a simple question: "Can machines think?"
Turing's paper "Computing Machinery and Intelligence" (1950), and its subsequent Turing Test, established the
fundamental goal and vision of artificial intelligence.

At its core, AI is the branch of


computer science that aims to answer
Turing's question in the affirmative. It is the
endeavor to replicate or simulate human
intelligence in machines.

The expansive goal of artificial intelligence


has given rise to many questions and
debates. So much so, that no singular
definition of the field is universally
accepted.

What is AI?

The major limitation in defining AI as simply "building machines that are intelligent" is that it doesn't actually
explain what artificial intelligence is? What makes a machine intelligent? In their groundbreaking textbook Artificial
Intelligence: A Modern Approach, authors Stuart Russell and Peter Norvig approach the question by unifying their work
around the theme of intelligent agents in machines. With this in mind, AI is "the study of agents that receive percepts from
the environment and perform actions."

Norvig and Russell go on to explore four different approaches that have historically defined the field of AI:

 Acting humanly
 Acting rationally

Learning Module on ITE101


`

78

 Thinking humanly
 Thinking rationally

The first two ideas concern thought processes and reasoning, while the others deal with behavior. Norvig and Russell
focus particularly on rational agents that act to achieve the best outcome, noting "all the skills needed for the Turing Test
also allow an agent to act rationally."

Patrick Winston, the Ford professor of artificial intelligence and computer science at MIT, defines AI as "algorithms
enabled by constraints, exposed by representations that support models targeted at loops that tie thinking, perception and
action together."

Learning Module on ITE101


`

79

Learning Module on ITE101


`

80

Learning Module on ITE101


`

81

Types of AI

 Strong AI – Also known as artificial general intelligence, an AI system with generalized human cognitive abilities.
When Presented with an unfamiliar task, it has enough intelligence to find a solution.
 Weak AI – Also known as narrow AI, an AI system that is designed and trained for a particular task. Example: a
virtual personal assistant, such as Apple’s Siri.

Other classifications of AI

 Reactive Machines – Example of this type is Deep Blue, which can identify pieces on the chess board and make
predictions, but it has no memory and cannot use past experiences to inform future ones.
 Limited Memory – Example of this are autonomous vehicles that can use past experiences to inform future decisions.
 Theory of Mind – This refers to the understanding that others have their own beliefs, desires, and intentions that
impact the decisions they make. This kind of Ai does not exist yet.
 Self-Awareness - This refers to machines with self-awareness that understand their current state and can use the
information to infer what others are feeling. This type of Ai does not exist yet.

Applications of AI Technology

 Robotic Process Automation – Machines programmed to perform high-volume, repeatable tasks normally performed
by humans that can also adapt to changing circumstances.
 Machine Vision – The science of making computers see. Machine vision captures and analyzes visual information
using a camera, analog-to-digital conversion, and digital processing.
 Machine Learning – The science of getting a computer to act without programming. Deep learning, a subset of this,
can be thought of as the automation predictive analytics.
 Natural Language Processing – The processing of human language by a computer program. Examples include spam
detection, text translation, sentiment analysis, and speech recognition.
 Robotics – The field of engineering focused on the design and manufacturing of robots. Robots are often used to
perform tasks that are difficult for humans to perform or perform consistently.

Learning Module on ITE101


`

82

Learning Module on ITE101


`

83

Learning Module on ITE101


`

84

Learning Module on ITE101


`

85

Learning Module on ITE101


`

86

Learning Module on ITE101


`

87

Summary
 Artificial Intelligence or AI is the study of agents that receive percepts from the environment and perform actions.
 According to Patrick Winston, “Artificial Intelligence is algorithms enabled by constraints, exposed by
representations that support models targeted at loops that tie thinking, perception and action together."
 There are two (2) types of artificial Intelligence the Strong and the Weak AI. The Strong AI works as when presented
with an unfamiliar task, it has enough intelligence to find a solution. The Weak AI on the other hand is designed and
trained only for a particular task.
 Applications of AI technology include Machine Learning, Robotic Process Automation, Machine Vision, Natural
language Processing, and Robotics.
 Alan Turing changed history a second time with a simple question: "Can machines think?" Turing's paper
"Computing Machinery and Intelligence" (1950), and its subsequent Turing Test, established the fundamental goal
and vision of artificial intelligence.

M2:L4 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Video Compilation Part 4

Learning Module on ITE101


`

88

This is the fourth and last part of the video you will be creating. The theme for this Enrichment Activity is “The
Role of AI in Future Technology”.
Your task is to create a three (3) minute long video of yourself talking about your views on the said theme. The required
amount of time for the video is as is and must be followed strictly, take caution by making preparations before and after
recording.
Start your video with an introduction containing the following:
o Your Name and Section
o The video part you will be featuring
o The Theme

Things to consider for the content:


o Positive and Negative impacts of relying in Artificial Intelligence.
o How will AI grow further as being an emerging technology right now?
o How will AI help in promoting and improving the following:

 The Internet and the World Wide Web


 The Social Media and networking
 Online and Virtual Games

Module #2: Assessment


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________
Identification
_____________1. A way to view and share information over the internet.

Learning Module on ITE101


`

89

_____________2. An email-borne attack that involves tricking the email recipient into disclosing confidential
information.
_____________3. A type of malware that enters a target system looking one thing.
_____________4. Software that performs a malicious task on a target device or network.
_____________5. The attacker learns about the victim and impersonates someone he or she knows and trusts.
_____________6. Involves encrypting data on the target system and demanding a ransom.
_____________7. A theft of data by a malicious actor.
_____________8. An attacker establishes a position between the sender and recipient of electronic messages and
intercepts them.
_____________9. Code of good behavior on the internet.
_____________10. He is regarded as the father of the world wide web.
_____________11. Any digital tool that allows the users to quickly create and share content with the public.
_____________12. A website that brings people together to talk, share ideas and interests, or make new friends.
_____________13. A free, federated, social microblogging service.
_____________14. A social media platform for sharing original artwork.
_____________15. The latest social networking service from google.
_____________16. One of the largest websites for connecting high school friends.
_____________17. One of the most popular social networks and viewed website on the internet.
_____________18. Popular destination for users to set up personal space and connect with friends, share pictures, share
movies, talk about what you’re doing, etc.
_____________19. It allows users to create personal pages of interesting sites they come across.
_____________20. It can provide a fun and social form of entertainment often encouraging teamwork and cooperation
when played with others.
_____________21. These games are played on a personal computer the same way as other software programs.
_____________22. These games are played on small consoles.
_____________23. These games are played on home entertainment consoles designed to work with a TV consoles.
______________24. The term used to describe a new generation of computer games with virtual reality technology.
______________25. It overlays digital information on real-world elements.

Learning Module on ITE101


`

90

______________26. It brings together real world and digital elements.


______________27. Refers to a wide-ranging branch of computer science concerned with building smart machines
capable of performing tasks that typically require human intelligence.
______________28. He defines AI as “Algorithms enabled by constraints, exposed by representations that support
models targeted at loops that tie thinking, perception and action together.
______________29. He coined the term “artificial intelligence”.
______________30. The first commercially successful robot for the home.
______________31. A classification of AI that can use past experiences to inform future decisions.
______________32. It captures and analyzes visual information using a camera, analog-to-digital conversion, and digital
processing.
______________33. A type of AI that is designed and trained for a particular task.
_____________34. Refers to machines that understand their current state and can use the information to infer what others
are feeling.
_____________35. The field of engineering focused on the design and manufacturing of robots.
_____________36. The science of getting a computer to act without programming.
_____________37. It is also known as artificial general intelligence, an AI system with generalized human cognitive
abilities.
_____________38. This refers to the understanding that others have their own beliefs, desires, and intentions that impact
the decisions they make.
_____________39. The processing of human language by a computer program.
_____________40. It can identify pieces on the chess board and make predictions, but it has no memory and cannot use
past experiences to inform future ones.

LEARNING MODULE INFORMATION


I. Course Code ITE101
II. Course Title LIVING IN THE IT ERA
III. Module Number 3
IV. Module Title The Internet of Things and Cyber-Security
V. Overview of the Module This module identifies the important concepts and real-world applications
of Internet of things. The cybercrime and cybersecurity contain the threats

Learning Module on ITE101


`

91

and risks which will be discussed further in this module as well as some
basic ways to protect the user from such dangers by also considering the
digital rights and responsibilities.

VI. Module Outcomes After studying this module, the students shall be able to:
1) Explain Internet of things and its ideas.
2) Distinguish IoT based on its real-world applications.
3) Classify the concepts, and applications of Cybersecurity.
4) Organize the threats and risk-factors of Cybercrime.
5) Define an individual’s Digital rights, Freedoms and Responsibilities.
6) Apply the Digital rights in real-world scenarios.

Lesson 1. The Internet of Things (Part 1)

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines,
objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network
without requiring human-to-human or human-to-computer interaction.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Define the Internet of things.

Learning Module on ITE101


`

92

 describe the difference between types of Artificial intelligence


 Evaluate the impacts of AI on various industries
 Demonstrate understanding of Artificial Intelligence and its implication to the Internet, Social Media, and Online
Gaming through a video presentation.

Getting Started
Prototyping. Suppose you are in front of a great engineer and a great computer scientist from the future that can invent
and materialize anything. They have given you a chance to wish for any home appliance or any futuristic device, what
would it be? Draw Its prototype and write its specifications in the space provided.
Prototype Specifications

Discussion
A thing in the internet of things can be a person with a heart monitor implant, a farm animal with a biochip
transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or
man-made object that can be assigned an Internet Protocol (IP) address and is able to transfer data over a network.
Increasingly, organizations in a variety of industries are using IoT to operate more efficiently, better understand customers
to deliver enhanced customer service, improve decision-making and increase the value of the business.
How IoT works
An IoT system consists of web-enabled smart devices that use embedded systems, such as processors, sensors and
communication hardware, to collect, send and act on data they acquire from their environments. IoT devices share the
sensor data they collect by connecting to an IoT gateway or other edge device where data is either sent to the cloud to be
analyzed or analyzed locally. Sometimes, these devices communicate with other related devices and act on the
information they get from one another. The devices do most of the work without human intervention, although people can

Learning Module on ITE101


`

93

interact with the devices -- for instance, to set them up, give them instructions or access the data. The connectivity,
networking and communication protocols used with these web-enabled devices largely depend on the specific IoT
applications deployed. IoT can also make use of artificial intelligence (AI) and machine learning to aid in making data
collecting processes easier and more dynamic. Below is an example of an IoT system.

Learning Module on ITE101


`

94

Learning Module on ITE101


`

95

Learning Module on ITE101


`

96

IoT, big data, and artificial intelligence


Ongoing developments in the field of automated systems, such as self-driving cars, smart agriculture, and medical
robots, highlight the increasingly important interplay between the IoT, artificial intelligence (AI), and big data. AI, a field
that is developing extremely fast, acts as the ‘thinking machine’ for IoT devices. These devices, in turn, generate
significant amounts of data – sometimes labeled as big data. This data is analyzed and used for the verification of the
initial AI algorithms and for the identification of new cognitive patterns that could be integrated into new AI algorithms.
One of the most salient examples of this interplay can be found in smart cities: IoT sensors can collect data from
transportation systems, water supply networks, and waste management facilities, and after analysis, this data can be used
to improve the functioning of these systems.
While this interplay presents enormous business potential, it also brings new challenges in areas such as the labor
market, health, education, safety and security, privacy, ethics, and accountability. For example, while AI systems can
potentially lead to economic growth, they could also result in significant disruptions to the labor market.
Since AI systems involve computers taking decisions to some extent – replacing certain human processes – there
are concerns related to ethics, fairness, justice, transparency, and accountability. The risk of discrimination and bias in
decisions made by autonomous technologies is well-illustrated in the debate over Jigsaw’s Conversation AI tool. While it
could potentially address problems related to misuse of the Internet public space, the software also raises a major ethical
issue: How can machines determine what is and what is not appropriate language?

Learning Module on ITE101


`

97

Data-related issues
Being ‘connected’ to the Internet through so many devices on a daily basis – such as transportation, appliances,
city infrastructure, and medical and healthcare devices – gives the term ‘connected’ a much broader meaning. Every IoT
device is able to transfer large amounts of data to both manufacturers and to other devices. Even if the size of a single
piece of data can be quite small, the final sum is staggering due to the number of devices, estimated to reach between 20
and 100 billion by 2020. According to the International Data Corporation, the ‘digital universe’ will reach 44 zettabytes
(trillion gigabytes) by 2020, and 10% of this amount would come from IoT devices.
Since IoT devices generate massive amounts of data, issues related to privacy and data protection have come to
the forefront. Some IoT devices can collect and transmit personal data, raising concerns about how the devices themselves
are protected, as well as about how the data they collect is processed and analyzed. While information transmitted by an
IoT device might not cause privacy issues, when sets of data collected from multiple devices are put together, processed,
and analyzed, it may lead to sensitive information being disclosed and users de-anonymized.

IoT benefits to organizations


The internet of things offers several benefits to organizations. Some benefits are industry-specific, and some are
applicable across multiple industries. Some of the common benefits of IoT enable businesses to:

 monitor their overall


business processes;
 improve the customer
experience (CX);
 save time and money;
 enhance employee
productivity;
 integrate and adapt business
models;
 make better business
decisions; and
 generate more revenue.

IoT encourages companies


to rethink the ways they
approach their businesses and

Learning Module on ITE101


`

98

gives them the tools to improve their business strategies. Generally, IoT is most abundant in manufacturing, transportation
and utility organizations, making use of sensors and other IoT devices; IoT can also benefit farmers in agriculture by
making their job easier. Sensors can collect data on rainfall, humidity, temperature and soil content, as well as other
factors, that would help automate farming techniques.
The ability to monitor operations surrounding infrastructure is also a factor that IoT can help with. Sensors, for
example, could be used to monitor events or changes within structural buildings, bridges and other infrastructure. This
brings benefits with it, such as cost saving, saved time, quality-of-life workflow changes and paperless workflow. A home
automation business can utilize IoT to monitor and manipulate mechanical and electrical systems in a building. On a
broader scale, smart cities can help citizens reduce waste and energy consumption. IoT touches every industry, including
businesses within healthcare, finance, retail and manufacturing.
Advantages and Disadvantages of IoT
Some of the advantages of IoT include the following:

 ability to access information from anywhere at any time on any device;


 improved communication between connected electronic devices;
 transferring data packets over a connected network saving time and money; and
 automating tasks helping to improve the quality of a business's services and reducing the need for human intervention.

Some disadvantages of IoT include the following:

 As the number of connected devices increases and more information is shared between devices, the potential that a
hacker could steal confidential information also increases.
 Enterprises may eventually have to deal with massive numbers -- maybe even millions -- of IoT devices, and
collecting and managing the data from all those devices will be challenging.
 If there's a bug in the system, it's likely that every connected device will become corrupted.
 Since there's no international standard of compatibility for IoT, it's difficult for devices from different manufacturers
to communicate with each other.

Summary
 The internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects,
animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network
without requiring human-to-human or human-to-computer interaction.
 Even if the size of a single piece of data can be quite small, the final sum is staggering due to the number of devices,
estimated to reach between 20 and 100 billion by 2020.
 Since IoT devices generate massive amounts of data, issues related to privacy and data protection have come to the
forefront.
 IoT touches every industry, including businesses within healthcare, finance, retail and manufacturing.
 The internet of things offers several benefits to organizations. Some benefits are industry-specific, and some are
applicable across multiple industries.
 IoT encourages companies to rethink the ways they approach their businesses and gives them the tools to improve
their business strategies.

Learning Module on ITE101


`

99

 Since IoT devices generate massive amounts of data, issues related to privacy and data protection have come to the
forefront.
 Generally, IoT is most abundant in manufacturing, transportation and utility organizations, making use of sensors and
other IoT devices;
 IoT can also make use of artificial intelligence (AI) and machine learning to aid in making data collecting processes
easier and more dynamic. Below is an example of an IoT system.

M3:L1 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Essay. Answer the following questions below in 3-5 sentences.

1. Based on what you have learned so far, would you agree that the Internet of Things is another form of an emerging
Technology? Explain your answer.
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_____________________________
2. Is there any specific IoT device designed for studying? In what way can IoT help the students in studying?
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
_______________________________
3. As a student currently studying about IoT, what ideas can you suggest to help this technology grow further in the next
few years?

Learning Module on ITE101


`

100

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________

Lesson 2. The Internet of Things (Part 2)

IoT based technologies have a lot of different applications. The technologies are used in process automation,
home automation, smart cars, decision analytics, and smart grids. IoT-based solutions allow the automation of daily tasks
and enable effective monitoring and control of the connected devices. This results in improved efficiency and convenience
in performing tasks.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Understand further the components of Internet of things.


 Classify the difference between applications of Internet of Things
 Evaluate the impacts of applications of IoT in real world
 Demonstrate understanding of IoT through an essay

Getting Started
Write your 3-sentence reflection about the quote.
“The IoT is a big news because it ups the ante:
‘Reach out and touch somebody’ is becoming ‘Reach out and touch everything’.” – Parker Trewin

1. _______________________________________________________________________________________

Learning Module on ITE101


`

101

_________________________________________________________________________________________
2. _______________________________________________________________________________________
_________________________________________________________________________________________
3. _______________________________________________________________________________________
_________________________________________________________________________________________

Discussion
The concept of IoT technology may be simple, but the implications are huge enough. The technology is leading a
revolutionary change in health care, manufacturing, retail, energy, and agriculture industries. New applications of IoT
technologies allow organizations to design and implement more robust risk management strategies.
IoT Applications in the Real World
Companies are leveraging from technology in the form of improved operational performance. IoT devices support
advanced functions like task automation and remote control of devices. As a result, firms can maintain an optimized
balance between energy usage and conservation. By becoming more energy-efficient, companies will be able to reduce
the carbon footprint on the environment.

Learning Module on ITE101


`

102

 IOT Sensors - IoT sensors consist of manual or digital sensors connected to circuit boards such as Arduino Uno or
Raspberry Pi 2. The circuit boards can be programmed to measure a range of data collected from a sensor device such
as carbon monoxide, temperature, humidity, pressure, vibration, and motion. What differentiates IoT sensors from
simple sensors is that they can not only gather data at different physical environments but also send data to the
connected devices. The IoT sensors allow seamless control of data through automation delivering actionable insights.
They can be used by businesses for predictive maintenance, enhanced efficiency, and reduced costs.
 IOT Data Analytics - Businesses are increasingly using IoT data analytics to determine trends and patterns by
analyzing big and small data. IoT data analytics apps can analyze structured, unstructured, and semi-structured data to
extract meaningful insights. IoT can be applied to data analytics to investigate different types of data including motion
data sets, geographical data, and health care data. It can be used by businesses for predictive and descriptive analysis
to improve customer knowledge, enhance operational efficiency, and create business value.

 IOT Tracking and Monitoring Systems - A lot of businesses are using IoT systems for asset tracking. IoT asset
tracking devices use GPS or radio frequency (RF) to track and monitor properties. The smart devices can be used for
long-range identification and verification of assets.

Learning Module on ITE101


`

103

 IOT Connected Factory - Businesses can also use IoT connected factory solution such as Azure IoT for management
of industrial IoT devices. The connected cloud software can be populated with different resources that allow control
of a range of devices. The connected factory solution can report key metrics data including equipment efficiency and
telemetry data. The data can be gathered of assets located at different geographical locations. You can use the
connected factory solution for connecting, monitoring, and to control of remote industrial devices.

Learning Module on ITE101


`

104

 Smart Supply Chain Management - Supply chain managers can make improved predictions through smart routing
and rerouting algorithms. Smart IoT devices connected to packages can provide instant after-the-incident facts via
GPS and RFID signals that can help to make informed supply chain decisions. IoT applications can help in mitigating
uncertainty risks in supply chain management. Supply chain managers can make use of smart supply chain
management programs for minimizing variance, reducing costs, and improving profitability. The programs can help in
inventory management, vendor relationship, fleet management, and scheduled maintenance.

 Smart Barcode Readers - IoT barcode readers can help in better inventory management for retailers. The readers
support AI-based digital signal processing. These devices can optimize the operations of many sectors including
retail, logistics, warehouse, and much more. IoT based bar card readers feature cloud data connections to connect with
other systems. Using the connected bar code reader will ease the process of managing inventory. IoT barcode readers
can be incorporated into shopping carts. The readers use AI-based sensor to detect products as they are dropped or
removed from the cart. The reader can transfer data to the computer automatically, and that can save a lot of time in
checkout resulting in an improved experience for the customers.

Learning Module on ITE101


`

105

 Smart Grid - The smart grid is another industrial application of IoT. The grid allows real-time monitoring of data
regarding supply and demand of electricity. It involves the application of computer intelligence for the efficient
management of resources. Utility companies can use IoT smart grid technologies for more efficient outage
management. They can use the technology to identify load distribution and improve reliability. The technology can
also assist in fault detection and repairs. With the smart grid, utilities can interconnect all their assets including meters
and substations. Applying IoT technologies to the grid ecosystem allows utility companies to exercise greater control
over the power infrastructure and resources. Moreover, they allow consumers with better quality access to energy.

 Connected HealthCare System - IoT has numerous applications in the healthcare industry. The technology can be
used to provide high-quality medical services using smart medical devices. Also called the Internet of Medical Things
(IoMT), the technology can help in monitoring and supporting vital data which can help in making clinical decisions.
With IoT medical devices, medical services can be made more accessible by the populace. IoT medical devices can
help in real-time monitoring of patients remotely. The devices can report an emergency like an asthma attack, heart
failure, etc., immediately to a physician. This can help in potentially saving the lives of many individuals. IoT devices

Learning Module on ITE101


`

106

can collect health care data including blood pressure, sugar levels, oxygen, and weight. Data is stored online and can
be accessed anytime by a physician. IoT automates the workflow by allowing the provision of effective health care
services to the patients.

Learning Module on ITE101


`

107

Current Issues and Problems in using IOT


The idea behind IoT is to create a system that stores all data required by human beings without having a direct hand
in collecting it. Research suggests that the impact of IoT on the world will be monumental in upcoming years. The growth
in its influence and application can be assessed from consumer patterns for entertainment and media, infrastructure and
energy management, agriculture, transportation and even medical care. Given the current trends, the impact of IoT on
human life is increasing exponentially and will only continue to rise.
However, questions have emerged simultaneously on the dangers and potential risks of inculcating the IoT into all
aspects of human life. Here are some of the problems with the IoT:

 Security - One of the greatest threats to the IoT comes from the strain put on the global system of information
exchange that the IoT relies upon. The Global Risks Report of 2018 highlights the menace of cyber-attacks and the
danger to all interconnected enterprises if the IoT is compromised as a result of internal weaknesses. Clouds will be
the first to be compromised as security regulations are still not fully developed given how severe the issue. The recent
rise in ransom-ware is expected to pose a serious security threat, for cloud vendors and service providers will be the
prime targets. The nature of cloud activity is known for being complex given the numerous clienteles and the
variations of enterprises it caters to. Therefore, interconnectivity can also serve as a disadvantage to various
enterprises if the cloud is compromised.

Security threats also encompass Artificial Intelligence-based devices and services. Experts suggest that malware
is now becoming better at evading detection via AI. At a contrast, some argue that AI is limited due to the lack of
human intervention in its activities, which also affects its performance when it comes to identifying cause and effect
in an investigation. Thus, AI might not be equipped enough yet to deal with the rapidly increasing problems that are
facing the cloud and IoT in the face of cyber-attacks.

Learning Module on ITE101


`

108

 Privacy - Another pressing issue with the IoT is that of user privacy. Not only is hacking a security breach, but also a
violation of consumer privacy. A recent study at the University of Glasgow shows that consumers are largely
unsatisfied with the lack of privacy the IoT allows them. As users have grown more aware of the extent of cyber-
surveillance, they have begun taking their privacy more seriously and thus demand that the ultimate control over their
data should remain with them. An increased corporate transparency is needed to ensure that user data is not vulnerable
to others.

 Internet Walls - The risk of losing important data via hacks is a dangerous proposition not just for corporations, but
also for nations via cross-border attacks. The World Economic Forum predicts that these attacks will propel nations to
create internet walls that will limit the activity of the IoT to particular regions. Moreover, nations will eventually be
motivated to protect their economic interests as governments cannot operate freely in a global system of online
companies and enterprises. This ultimately compromises the very idea of the IoT as barriers prevent the unregulated
exchange of data that many corporations demand. Regulations such as this will also serve as an obstacle to
technological advancement by substantially slowing it down.

 Cloud attacks - Observing the traces of this digital war, it is highly likely that the next potential threats to IoT would
be cloud networks. This is because cloud networks have the biggest data stocks to run the IoT. According to recent
statistics, the annual economic cost of cybercrime was estimated around $1 trillion in 2017, which is a multiple of
2017’s record-year aggregate cost of almost $300 billion from natural disasters. To comprehend the magnitude of the
problem, the World Economic Forum report quotes a study that put forward the takedown of just one cloud provider
could cause $50 billion to $120 billion of financial damage.
 Understanding IoT - Rapid growth in technology has resulted in a limited understanding of the IoT. For consumers
to make use of the internet and all that the IoT has to offer, it is essential to work upon their awareness of the changes
taking place within IoT to make it more efficient. Not only will the comprehension empower them, it will prepare
them mentally and they will possibly be able to find solutions on how to take caution from any of the mentioned
problems.

 Lack of Confidence - According to the latest research report shared by the State of IoT Security, which was released
at the end of October, showed the following information:
96 percent of companies and 90 percent of consumers believe there should be IoT security code of practice.
54 percent of consumers possess an average of four IoT devices, but then again only 14 percent consider that they are
familiar with IoT device security.
65 percent of consumers are petrified about a hacker monitoring their IoT device, whereas around 60 percent are fretful
of their personal or professional data being leaked.

Summary
 Internet of Things (IoT) offers endless opportunities for businesses. The technology has already caused
disruptions in a lot of different industries. The business landscape is slowly changing with the evolution of
IoT technology.
 Competition in the next decade will be largely defined by how companies leverage from innovative technologies. IoT
will be the foremost technology that is expected to determine the fate of many businesses.
 Despite IOT’s many advantages, it also poses a lot of risks and dangers so it must be handled carefully while doing
proper research first.

Learning Module on ITE101


`

109

M3:L2 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________
Essay
1. In your own opinion, how does IoT affect our daily lives?
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
____________________________________

2. Make your own list of the advantages and disadvantages of IoT in our life.

Advantages Disadvantages

Learning Module on ITE101


`

110

Lesson 3. Cybersecurity (Part 1)

As with any technological advance throughout history, whenever new opportunities are created, there will always
be those that exploit them for their own gain. Awareness of the security and sanctity of data with computer systems didn’t
gain traction until the explosive growth of the internet, whereby the exposure of so many machines on the web provided a
veritable playground for hackers to test their skills – bringing down websites, stealing data, or committing fraud.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Describe what is cybersecurity.


 Enumerate the categories of cybersecurity.
 Discuss the reasons for commission of cybercrimes.
 Create an editorial cartoon that portrays cybercrime.

Getting Started
Matching. Based on your own understanding about security, match the photos based on the levels of Security by
connecting the dots through drawing lines.

Discussion
Level 1 – Minimal Security Level 0 – No Security Level 3 – Maximal Security Level 2 – Advanced Security

Learning Module on ITE101


`

111

Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and
data from malicious attacks. It's also known as information technology security or electronic information security. The
term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common
categories:

Categories of Cybersecurity

 Network security - is the practice of securing a computer network from intruders, whether targeted attackers or
opportunistic malware.
 Application security - focuses on keeping software and devices free of threats. A compromised application could
provide access to the data its designed to protect. Successful security begins in the design stage, well before a program
or device is deployed.
 Information security - protects the integrity and privacy of data, both in storage and in transit.
 Operational security - includes the processes and decisions for handling and protecting data assets. The permissions
users have when accessing a network and the procedures that determine how and where data may be stored or shared
all fall under this umbrella.
 Disaster recovery and business continuity - define how an organization responds to a cyber-security incident or any
other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores
its operations and information to return to the same operating capacity as before the event. Business continuity is the
plan the organization falls back on while trying to operate without certain resources.
 End-user education - addresses the most unpredictable cyber-security factor: people. Anyone can accidentally
introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete
suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the
security of any organization.

Sample Cybersecurity Framework

Cyber Crime

Learning Module on ITE101


`

112

The term cyber-crime is used to describe an unlawful activity in which computer or computing devices such as
smartphones, tablets, Personal Digital Assistants (PDAs), etc. which are stand alone or a part of a network are used as a
tool or/and target of criminal activity. It is often committed by the people of destructive and criminal mindset either for
revenge, greed or adventure.

Classifications of Cyber Crimes


The cyber-criminal could be internal or external to the organization facing the cyber-attack. Based on this fact, the cyber-
crime could be categorized into two types:

 Insider Attack: An attack to the network or the computer system by some person with authorized system access is
known as insider attack. It is generally performed by dissatisfied or unhappy inside employees or contractors. The
motive of the insider attack could be revenge or greed. It is comparatively easy for an insider to perform a cyber-
attack as he is well aware of the policies, processes, IT architecture and weakness of the security system. Moreover,
the attacker have an access to the network. Therefore, it is comparatively easy for an insider attacker to steel sensitive
information, crash the network, etc. In most of the cases the reason for insider attack is when an employee is fired or
assigned new roles in an organization, and the role is not reflected in the IT policies. This opens a vulnerability
window for the attacker. The insider attack could be prevented by planning and installing an Internal intrusion
detection systems (IDS) in the organization.

 External Attack: When the attacker is either hired by an insider or an external entity to the organization, it is known
as external attack. The organization which is a victim of cyber-attack not only faces financial loss but also the loss of

Learning Module on ITE101


`

113

reputation. Since the attacker is external to the organization, so these attackers usually scan and gathering information.
An experienced network/security administrator keeps regular eye on the log generated by the firewalls as external
attacks can be traced out by carefully analyzing these firewall logs. Also, Intrusion Detection Systems are installed to
keep an eye on external attacks.

The cyber-attacks can also be classified as structure attacks and unstructured attacks based on the level of maturity of the
attacker.

 Unstructured Attacks: These attacks are generally performed by amateurs who do not have any predefined motives
to perform the cyber-attack. Usually these amateurs try to test a tool readily available over the internet on the network
of a random company.

 Structured Attacks: These types of attacks are performed by highly skilled and experienced people and the motives
of these attacks are clear in their mind. They have access to sophisticated tools and technologies to gain access to
other networks without being noticed by their Intrusion Detection Systems (IDSs). Moreover, these attackers have the
necessary expertise to develop or modify the existing tools to satisfy their purpose. These types of attacks are usually
performed by professional criminals, by a country on other rival countries, politicians to damage the image of the rival
person or the country, terrorists, rival companies, etc.

Reasons for Commission of Cyber Crimes


There are many reasons which act as a catalyst in the growth of cyber-crime. Some of the prominent reasons are:

 Money: People are motivated towards committing cyber-crime is to make quick and easy money.
 Revenge: Some people try to take revenge with other person/organization/society/ caste or religion by defaming its
reputation or bringing economical or physical loss. This comes under the category of cyber terrorism.
 Fun: The amateur does cyber-crime for fun. They just want to test the latest tool they have encountered.
 Recognition: It is considered to be a sense of pride if someone hack the highly secured networks like defense sites or
networks.
 Anonymity: Many times, the anonymity that a cyber space provide motivates the person to commit cyber-crime as it
is much easy to commit a cyber-crime over the cyber space and remain anonymous as compared to real world. It is
much easier to get away with criminal activity in a cyber world than in the real world. There is a strong sense of
anonymity than can draw otherwise respectable citizens to abandon their ethics in pursuit personal gain.
 Cyber Espionage: At times the government itself is involved in cyber trespassing to keep eye on other
person/network/country. The reason could be politically, economically socially motivated.

Types of Cyber Crimes


 Cyber Stalking - It is an act of stalking, harassing or threatening someone using Internet/computer as a medium. This
is often done to defame a person and use email, social network, instant messenger, web-posting, etc. as a using
Internet as a medium as it offers anonymity. The behavior includes false accusations, threats, sexual exploitation to
minors, monitoring, etc.
 Child Pornography - It is an act of possessing image or video of a minor (under 18), engaged in sexual conduct.

Learning Module on ITE101


`

114

 Forgery and Counterfeiting - It is a use of computer to forgery and counterfeiting is a document. With the
advancement in the hardware and the software, it is possible to produce counterfeit which matches the original
document to such an extent that it is not possible to judge the authenticity of the document without expert judgement.
 Software Piracy and Crime related to IPRs Software piracy - is an illegal reproduction and distribution for
personal use or business. It comes under crime related to IPR infringement. Some of the other crimes under IPR
infringement are: download of songs, downloading movies, etc.
 Cyber Terrorism - It is defined as the use of computer resources to intimidate or coerce government, the civilian
population or any segment thereof in furtherance of political or social objectives.
 Phishing - It is a process of acquiring personal and sensitive information of an individual via email by disguising as a
trustworthy entity in an electronic communication. The purpose of phishing is identity theft and the personal
information like username, password, and credit card number etc. may be used to steal money from user account. If a
telephone is used as a medium for identity theft, it is known as Vishing (voice phishing). Another form of phishing is
Smishing, in which SMS is used to lure customers.
 Computer Vandalism - It is an act of physical destroying computing resources using physical force or malicious
code.
 Computer Hacking - It is a practice of modifying computer hardware and software to accomplish a goal outside the
creator’s original purpose. The purpose of hacking a computer system may vary from simply demonstrations of the
technical ability, to sealing, modifying or destroying information for social, economic or political reasons. Now the
corporate is hiring hackers, a person who is engaged in hacking computers, to intentionally hack the computer of an
organization to find and fix security vulnerabilities.
 White Hat: white hat hackers are the persons who hack the system to find the security vulnerabilities of a system
and notify to the organizations so that a preventive action can be taken to protect the system from outside hackers.
White hat hackers may be paid employee of an organization who is employed to find the security loop-holes, or
may be a freelancer who just wants to prove his mantle in this field. They are popular known as ethical hackers.
 Black Hat: in contrast to the white hat, the black hat hacks the system with ill intentions. They may hack the
system for social, political or economically motivated intentions. They find the security loopholes the system, and
keep the information themselves and exploit the system for personal or organizational benefits till organization
whose system is compromised is aware of this, and apply security patches. They are popularly known as crackers.
 Grey Hat: Grey hat hackers find out the security vulnerabilities and report to the site administrators and offer the
fix of the security bug for a consultancy fee.
 Blue hat: A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a
system prior to its launch, looking for exploits so they can be closed.
 Creating and distributing viruses over internet - The spreading of a virus can cause business and financial loss to
an organization. The loss includes the cost of repairing the system, cost associated with the loss of business during
downtime and cost of loss of opportunity. The organization can sue the hacker, if found, for the sum of more than or
equivalent to the loss borne by the organization.
 Spamming - Sending of unsolicited and commercial bulk message over the internet is known as spamming. An email
can be classified as spam, if it meets following criteria:
 Mass mailing: the email is not targeted to one particular person but to a large number of peoples.
 Anonymity: The real identify of the person not known
 Unsolicited: the email is neither expected nor requested for the recipient. These spams not only irritate the
recipients and overload the network but also waste the time and occupy the valuable memory space of the
mailbox.

Learning Module on ITE101


`

115

 Cross Site Scripting - It is an activity which involves injecting a malicious client-side script into a trusted website.
As soon as the browser executes the malicious script, the malicious script gets access to the cookies and other
sensitive information and sent to remote servers. Now this information can be used to gain financial benefit or
physical access to a system for personal interest.
 Online Auction Fraud - There are many genuine websites who offers online auction over internet. Taking the
advantage of the reputation of these websites, some of the cyber criminals lure the customers to online auction fraud
schemes which often lead to either overpayment of the product or the item is never delivered once the payment is
made.
 Cyber Squatting - It is an act of reserving the domain names of someone else’s trademark with intent to sell it
afterwards to the organization who is the owner of the trademark at a higher price.
 Logic Bombs - These are malicious code inserted into legitimate software. The malicious action is triggered by some
specific condition. If the conditions hold true in future, the malicious action begins and based on the action defined in
the malicious code, they either destroy the information stored in the system or make system unusable.
 Web Jacking - The hacker gain access to a website of an organization and either blocks it or modify it to serve
political, economic or social interest. The recent examples of web jacking are some of the websites of the educational
institutes were hacked by Pakistani hackers and an animation which contains Pakistani flags were flashed in the
homepage of these websites. Another example is Indian hackers hacked website of Pakistani railways and flashed
Indian flag in the homepage for several hours on the occasion of Independence Day of India in 2014.
 Internet Time Thefts - Hacking the username and password of ISP of an individual and surfing the internet at his
cost is Internet Time Theft.
 Denial of Service Attack - It is a cyber-attack in which the network is chocked and often collapsed by flooding it
with useless traffic and thus preventing the legitimate network traffic.
 Salami Attack - It is an attack which proceeds with small increments and final add up to lead to a major attack. The
increments are so small that they remain unnoticed. An example of salami attack is gaining access to online banking
of an individual and withdrawing amount in such a small amount that it remains unnoticed by the owner. Often there
is default trigger set in the banking website and transactions below say, Rs. 1000 withdrawal are not reported to the
owner of the account. Withdrawing amount of Rs. 1000 over a period of time will lead to total withdrawal of a large
sum.
 Data Diddling - It is a practice of changing the data before its entry into the computer system. Often, the original data
is retained after the execution on the data is done. For example, DA or the basic salary of the person is changed in the
payroll data of an individual for pay calculation. Once the salary is calculated and transferred to his account, the total
salary is replaced by his actual salary in the report.
 Email Spoofing - It is a process of changing the header information of an e-mail so that its original source is not
identified and it appears to an individual at the receiving end that the email has been originated from source other than
the original source.

Summary
 Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data
from malicious attacks.
 The term cyber-crime is used to describe an unlawful activity in which computer or computing devices such as
smartphones, tablets, Personal Digital Assistants (PDAs), etc.

Learning Module on ITE101


`

116

 There are two (2) known classifications of cybercrime namely: An Insider Attack and External Attack. It can also be
sub-classified as Structured and unstructured Attacks which depends on the maturity of the Hacker.
 There are six (6) categories of cybersecurity: Network Security, Application Security, Information Security,
operational Security, Disaster recovery and Business-continuity, and End-user education.

M3:L3 - Enrichment Activity


Name: ________________________________ Score: __________________

Learning Module on ITE101


`

117

Year and Section: ______________________ Professor: _______________

Direction: Choose one topic from the given types of cybercrimes in the module and create your own editorial cartoon
then explain how did you come up with the image that you draw.

____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
_______________________________________________________
Lesson 4. Cybersecurity (Part 2)

Learning Module on ITE101


`

118

Tools such as anti-virus software, biometrics and personal devices, e.g., the secure chip in a credit card or an
ePassport are digital security devices because they offer freedom to communicate, work, travel and shop using your digital
identity in a way that is secure. Digital security is an all-encompassing term, which includes the tools to secure
technology, assets and personal identity in the online and mobile world.

Several public locations like shopping malls and airports among others offer their customers free access to public
Wi-Fi. But public Wi-Fi networks also enable cyber criminals to spy on unwary customers, take advantage of this
convenience and intercept their data. They can access sensitive information of users’ banking credentials, account
passwords and other valuable information.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Understand further Cybersecurity on how users can stay safe.


 Explain the importance of Cybersecurity.
 Make a list on how to stay protected online.
 Identify the do’s and don’ts to ensure personal security.

Getting Started
Multiple Choice. Based on your own understanding about cybersafety, choose your best answer on the following below.

Discussion
Preventing and Countering Threats and Risks

Learning Module on ITE101


`

119

Install anti-virus software and ensure that is updated as regularly as possible. Some computers have built-in anti-virus
software too.
a) Regularly update software and operating systems
Web browsers, plugins (Java and Adobe Products) and even Office Suites. It is the most common way hackers and
malware try to gain access to devices and your information.
b) Use privacy settings on mobile phones, apps and browsers
Privacy settings on social media platforms enable you to select who can access your posts online. Try to restrict
access of your profile to your friends only. Remember what you post online remains there almost forever.
c) Verify if the Wi-Fi link is legitimate and safe
Treat all Wi-Fi links with suspicion. Public Wi-Fi is inherently insecure — so be cautious. The Wi-Fi link could also
be a bogus link set up by a cybercriminal trying to capture valuable, personal information from unsuspecting users.
Don’t connect to an unknown or unrecognized wireless access point. Try to use known Wi-Fi links, which are
password protected.
d) Learn to create VPN to avoid downloading of data through public Wi-Fi.
Use your mobile phone to create VPN If you need to access any websites that store or require the input of any
sensitive information consider accessing them via your mobile phone network, instead of the public Wi-Fi connection.
e) Verify if the website is legitimate/authentic
Avoid logging into websites where there’s a chance that your identity, passwords or personal information may be
compromised — for example, online banking services or any websites that store your credit card information.
f) Download apps from trusted sources like Google play, AppStore
g) Keep webcams private
These devices can sometimes be hacked and used to take pictures or videos of you without your consent. Put a sticker
over your webcam, laptop camera, or phone camera when they are not in use.
h) USB Storage Device Use
 Always eject the device clearly to clear the content from your computer and to avoid damaging your data.
 Always scan the USB device with latest antivirus before accessing.
 Protect your USB device with a password.
 Encrypt the files/folders stored on the device.
 Use USB security products to access or copy data on your USB.
 Do not accept a promotional USB from unknown persons.
 Do not keep sensitive information like username and passwords on the USB.
i) Disable Bluetooth when not in use
Leaving Bluetooth on while in public places can compromise your privacy. Bluetooth connectivity allows various
devices to communicate with each other, and a hacker can look for open Bluetooth signals to gain access to your
devices.

Passwords

Learning Module on ITE101


`

120

Strong, unique but easy to remember, and private passwords are essential for dealing with unauthorized access to
online accounts. The passwords, when shared with another person(s), can be misused. They may be stolen by
unauthorized users to collect and misuse your personal information. Learn how to create strong passwords and
passphrases. A password must be difficult to guess. But you should be able to remember it. Writing passwords somewhere
is not advisable. Memorize it. Your password is given to you to maintain your privacy.
Go for an extra layer of security by opting for two-factor authentication (2FA), also known as two-step
verification or dual factor authentication. This security process requires the user to provide two different authentication
factors to verify themselves to better protect both the user's credentials and the resources the user can access. Log out of
your account when you plan to be inactive even for a short while. Always keep your system locked whenever it is not in
use.

Security Settings on the Browser


 Update anti-virus software regularly.
 Adjust the settings in the web-browser. It may limit
some functionality but can provide the best protection
from malicious content.
 Enable email accounts for multi-factor authentication.
Email is the gateway to almost every other account a
user may have. When someone loses or forgets an
account password, the reset is sent to his or her email.
 Gauge the credibility of the website by checking the
URL, lock.

Learning Module on ITE101


`

121

 Look out for warning signals given by web browsers about exposure to a malicious website or content. Such warnings
can protect the user from malware, phishing and identity theft. These warnings given by most of the commonly used
browsers like Chrome, Internet Explorer, etc. Remember to update your browsers regularly to avoid missing out on
such updates.
 Exercise caution while giving details about personal
information when registering for access to email
accounts, social networks and chat rooms, and free
game downloads.

Learning Module on ITE101


`

122

Learning Module on ITE101


`

123

Exercise
List five (5) other ways by which you protect from threats and risks on digital devices.

Learning Module on ITE101


`

124

Learning Module on ITE101


`

125

M3:L4 - Enrichment Activity


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

Direction: Write the practices that you should Start Doing and Stop Doing to ensure your personal security.

Start Doing Stop Doing

Learning Module on ITE101


`

126

Lesson 5. Digital Rights, Freedoms, and responsibilities


Digital rights are basically human rights in the digital era, when internet is increasingly being regarded as a right
rather than a luxury.

Lesson Objectives:
At the end of this lesson, you will be able to:

 Tell or share a real-life situation which illustrate realization or violation of digital rights.
 Discuss freedoms and responsibilities in using digital technologies.
 Create an online banner that shows good practices while using any social media flatforms.

Getting Started
Matching Type. If you find yourself in the following situations, which right would you exercise. Match the following:

Learning Module on ITE101


`

127

Discussion
The rights to online privacy and freedom of expression are really extensions of the equal rights laid out in the
United Nations Universal Declaration of Human Rights. According to the United Nations, disconnecting people from the
internet violates these rights and goes against international law. Digital rights include access and participation, free
speech, community, privacy, physical and psychological safety, safety of identity and of material and intellectual
property. But as Uncle Ben said in the Spider Man, “with great power comes great responsibility.” The responsibilities
include knowing and respecting the community standards and guidelines of all social media, video platforms and online
groups being used and staying within the parameters of these guidelines.
If any activity violates the community guidelines of a social media platform, the post, comment, photo, video or
even the account can be deleted.

Learning Module on ITE101


`

128

Learning Module on ITE101


`

129

Learning Module on ITE101


`

130

Learning Module on ITE101


`

131

Exercise
Case Scenario. Think of real-life examples, which illustrate realization or violation of your specific rights.
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
___________________________

Digital Law
Digital law can be defined as the legal rights and restrictions governing technology use. Most users are unaware
of the possible consequences of their online activities thereby need to be made aware of the rules and legal implications of
using the internet. The following are some actions that are unethical or illegal:
a) Software or systems piracy.
b) Downloading music and films without authorization or payment.
c) Stealing other people’s work (plagiarism and copyright infringement), personal data (identity theft).
d) Illegal file sharing.
e) Hacking into others’ systems or networks.
f) Creating destructive viruses or worms that causes damage to other people’s data and devices.
g) Sending spam.

Illegal Activities Using Digital Technologies


Plagiarism is an act of using or closely rewording the language and thoughts of another author without seeking
their permission or representing another author’s work as yours without giving credit to the author. Stealing other people’s
work in the form of words, ideas, images or data with permission is both illegal and unethical. When using online
resources for school projects, assignments, essays, give credit or acknowledge the author(s) of the resource.
Copyright infringement: Involves using someone else’s work but not paying them for it. For example, using a
photograph found online without seeking the photographer’s permission or not paying for using it is a copyright violation.
Plagiarism can affect academic and professional reputations while copyright infringement is a violation of the law and
penalties can be imposed.
Fair use is an exception to the restrictions imposed by copyright law. Quoting a few lines from a copyrighted work in an
academic paper with proper citation generally qualifies as “fair use”.

Learning Module on ITE101


`

132

Good Practices
What you write is clearly your prerogative. But do remember that any production, consumption and distribution
of content which involves sexual imagery of children is illegal.
Facebook

 Choose friends wisely. Everything is not about the number of friends you have. Select your friends wisely as they
can access your information.
 Learn to delete/block unwanted friends. Think before saying anything. Be mindful of what you post/update on
Facebook.
 Ask if you will regret it five years later. Do not become a part of hate-groups.
 Manage privacy settings. Your posts are publicly shared unless you go to settings and change your Security and
Privacy to Only Friends.

Learning Module on ITE101


`

133

 Keep in mind the dangers of sharing. Be careful of what information you put out on Facebook. Check your posts
and images for indicators of your whereabouts or anything that may invite unwanted users.
 Create friends lists to manage your posts. Create separate lists for your acquaintances, friends, family etc. This will
make it easy to regulate or control who can see your posts. Look out for suspicious activities. Do not click on
suspicious links.
 Beware of fake Facebook pages that steal your password. If your account is hacked, change your password or
report to Facebook.

Instagram

 Consider the whole image. Ask yourself if the image or the background giving an indication where you were or what
you were doing at the time of taking the picture. If yes, then reconsider posting it.
 Manage your visibility. Photos you are tagged in are visible to everyone. To make it secure you can make your
account private by going to the menu on the (top right side) on your profile.
 Accepting followers. If your account is private you can approve who follows you. Do not accept requests from
strangers. Also be mindful of who you are following.
 Block/report unwanted contacts. Go to their profile and tap menu (top right side) to report and block. You can also
report images by going to menu option at the top of each image.
 “Untag” yourself. You can untag yourself by tapping on your username in the post, provided the post is public or you
follow the person who tagged you. Other tips.
 Switch off geotagging and location feature. Delete your post if you are not sure about it. Posts are easy to embed in
other websites. It may go viral.

Snapchat
 Screen capture is possible even on Snapchat, which does not save images. Screen shots are an easy way to save
images, and many third-party apps auto-save images.
 Notification is not guaranteed. Snapchat tells you when your snap was viewed or screenshot. But this function is not
always reliable.
 Manage your privacy settings. Tap on the ghost icon on the top of your camera screen-> Settings (gear icon)-> ’who
can’ section-> change settings from Everyone to My Friends.
 Threat of unknown users. Tap and hold the user and select gear icon to Block unwanted users.’ Add Nearby’ may
seem cool but keep in mind it can be risky.
 Sexting concern. Avoid sharing snap stories that you do not want others to access. Do not share sexually explicit
pictures as these may easily go viral.
 Keep your User ID Private. Do not post your username on social media as it may attract unwanted attention. Also do
not share your password with anyone.

Legal Regime in The Field of Cyber Security in the Philippines


The government has to have laws instituted to help protect companies and consumers from abuses and to address
internet security in a global context. The Philippines is governed by the following legislations pertaining to the utilization,
development and protection of the Philippine cyberspace:

Learning Module on ITE101


`

134

 Republic Act 7935 or the Philippine Public Telecommunications Policy Act enacted on March 1, 1995 which
regulated the telecommunications industry in the country;
 Republic Act 8484 entitled Access Devices Regulation Act of 1998 dated February 11, 1998 which regulated the
issuance and use of certain access devices. It defined access device fraud as a criminal offense;
 Executive Order No 467 dated March 17 1998 which set forth guidelines that will govern the operation and use of
satellite telecommunications facilities and services in the country;
 Republic Act 8747 or the Philippine Year 2000 Readiness and Disclosure Act which was approved on June 01, 1999,
setting the necessary guidelines to ensure the readiness of Philippine computer systems, products and services against
the Y2K bug;
 Executive Order 269 dated January 12 2004 which created the Commission on Information and Communications
Technology as the governing body in all ICT-related activities in the country.

One of the most important cybersecurity legislations in the Philippines at present is Republic Act 8792 or the E-
Commerce Act which was enacted on June 14, 2000. While Section 33 of RA 8792 now lays out how hacking, cracking
and piracy should be punished, the government still need to pass another law on cybercrime, cyber fraud and similar
offenses.
At present Congress still has to pass the consolidated version of four cybercrime bills (House Bill Nos. 1310, 3241,
4083 and 5560) that were filed during the Twelfth Congress. The consolidated version “AN ACT DEFINING
CYBERCIME, PROVIDING FOR PREVENTION, SUPPRESSION AND IMPOSITION OF PENALTIES THEREFOR
AND FOR OTHER PURPOSES” OR THE CYBERCRIME PREVENTION ACT OF 2003 shall have to be re-submitted
to Congress for enactment.
The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in
the Philippines that was approved on September 12, 2012. It aims to address legal issues concerning online interactions
and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child
pornography, identity theft, illegal access to data and libel.

Summary
 The rights to online privacy and freedom of expression are really extensions of the equal rights laid out in the United
Nations Universal Declaration of Human Rights.
 Digital rights include access and participation, free speech, community, privacy, physical and psychological safety,
safety of identity and of material and intellectual property.

M3:L5 - Enrichment Activity

Learning Module on ITE101


`

135

Name: ________________________________ Score: __________________


Year and Section: ______________________ Professor: _______________

Direction: Create/Design an online infographic using any platform (such as MS Word, PowerPoint, Adobe
Photoshop/Illustrator, Windows paint, GIMP, Google SketchUp) that shows good practices while using any social media
platforms. Make sure to post it on your Facebook account and tag your professor with the hashtags #ITE101 and
#DigitalRightsAnd Responsibilities.

Example

Learning Module on ITE101


`

136

Module #3: Assessment


Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________
I. Identification
_____________1. It is often committed by the people of destructive and criminal mindset either for revenge, greed or
adventure.
______________2. The practice of defending computers, servers, mobile devices, electronic systems, networks, and data
from malicious attacks.
______________3. The email is not targeted to one particular person but to a large number of peoples.
______________4. It is an act of physical destroying computing resources using physical force or malicious code.
______________5. Attacks are performed by highly skilled and experienced people and the motives of these attacks are
clear in their mind.
______________6. Refers to a system of interrelated computing devices, mechanical and digital machines, objects,
animals or people that are provided with unique identifiers (UIDs).
______________7. Consist of manual or digital sensors connected to circuit boards.
______________8. Another industrial application of IoT. The grid allows real-time monitoring of data regarding supply
and demand of electricity.
_______________9. One of the greatest threats to the IoT comes from the strain put on the global system of information
exchange that the IoT relies upon.
_______________10. Sending of unsolicited and commercial bulk message over the internet.
_______________11. Involves injecting a malicious client-side script into a trusted website.
_______________12. Practice of changing the data before its entry into the computer system.
_______________13. It is a practice of modifying computer hardware and software to accomplish a goal outside the
creator’s original purpose.
_______________14. Focuses on keeping software and devices free of threats.
_______________15. The government itself is involved in cyber trespassing to keep eye on other
person/network/country.
_______________16. An attack to the network or the computer system by some person with authorized system access is
known as insider attack.

Learning Module on ITE101


`

137

_______________17. It is considered to be a sense of pride if someone hack the highly secured networks like defense
sites or networks.
_______________18. Hacking the username and password of ISP of an individual and surfing the internet at his cost is
Internet Time Theft.
_______________19. Attacks are generally performed by amateurs who do not have any predefined motives.
_______________20. Includes the processes and decisions for handling and protecting data assets.
_______________21. Defined as the legal rights and restrictions governing technology use.
_______________22. This is basically human rights in the digital era, when internet is increasingly being regarded as a
right rather than a luxury.
_______________23. It can affect academic and professional reputations while copyright infringement is a violation of
the law and penalties can be imposed.
_______________24. It is regarded as first condition of liberty.
_______________25. Set forth guidelines that will govern the operation and use of satellite telecommunications facilities
and services in the country.
_______________26. An exception to the restrictions imposed by copyright law.
_______________27. It is not a criminal offence but it is unethical and should be avoided.
_______________28. Involves using someone else’s work but not paying them for it.
_______________29. An all-encompassing term, which includes the tools to secure technology, assets and personal
identity in the online and mobile world.
_______________30. It aims to address legal issues concerning online interactions and the Internet in the Philippines.
II. Modified True or False
Write TRUE if the statement is correct and if false underline the word/words which makes it incorrect.
_____1. Update anti-virus software sometimes.
_____2. One of the most important cybersecurity legislations in the Philippines at present is Republic Act 8729 or the E-
Commerce Act.
_____3. Uncle Ben said in the Spider Man, “with great power comes great life.”
_____4. Strong, unique but easy to remember, and private passwords are essential for dealing with authorized access to
online accounts.
_____5. Leaving Bluetooth on while in private places can compromise your privacy.
_____6. Gmail is the gateway to almost every other account a user may have.

Learning Module on ITE101


`

138

_____7. The rights to online privacy and freedom of expression are really extensions of the equal rights laid out in the
United States Universal Declaration of Human Rights.
_____8. Gauge the credibility of the website by observing the URL, lock.
_____9. Republic Act 7395 or the Philippine Public Telecommunications Policy Act regulated the telecommunications
industry in the country.
_____10. Stealing other people’s work in the form of words, ideas, images or data with permission is both illegal and
unethical.
_____11. Writing passwords somewhere is very advisable.
_____12. Always reject the device clearly to clear the content from your computer and to avoid damaging your data.
_____13. Install anti-virus software and ensure that is updated as soon as possible.
_____14. Logic bombs are malicious mode inserted into legitimate software.
_____15. Some of the reasons for Commission of Cyber Crimes include Money, Revenge, Fun, Recognition, Anonymity,
and Cyber Espionage.
_____16. Quoting a few lines from a copyrighted work in an academic paper with proper citation generally qualifies as
“fair use”.
_____17. There are many reasons which act as a way in the growth of cyber-crime.
_____18. Bluetooth connectivity allows various devices to connect with each other, and a hacker can look for open
Bluetooth signals to gain access to your devices.
_____19. Grey hat hackers find out the security vulnerabilities and report to the site administrators and offer the fix of the
security bug for a consultancy fee.
_____20. Republic Act 4848 entitled Access Devices Regulation Act of 1998 dated February 11, 1998 which regulated
the issuance and use of certain access devices.
III. Direction: Supply the meaning of the following abbreviation.
Abbreviation Meaning
1. IoT
2. AI
3. UIDs
4. RF
5. GPS
6. IoMT
7. PDAs
8. IDSs
9. ISP
10. IPR

Learning Module on ITE101


`

139

Web References
https://sci10sectionm.wordpress.com/2013/12/08/the-evolution-of-communicationeffects-on-the-world-of-science/
https://www.engarde.net/lessons-learned/#.Xvgo-Cgzbcs
https://www.pewresearch.org/fact-tank/2019/09/09/us-generations-technology-use/
https://www.iberdrola.com/talent/generation-x-y-z
https://www.ivyinvestments.com/advisor-resources/genlink/millennial
https://institutional.ivyinvestments.com/
https://www.kasasa.com/articles/generations/gen-x-gen-y-gen-z
https://www.technicalsymposium.com/computerscience_all.html
https://www.rswebsols.com/tutorials/technology/virtual-augmented-reality-shop infographic
https://newzoo.com/insights/infographics/the-filipino-gamer/
https://www.lenovo.com/us/en/faqs/gaming/what-is-virtual-reality-gaming/
https://www.childnet.com/ufiles/online-gaming.pdf
https://www.visualcapitalist.com/ai-revolution-infographic/
https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
https://www.internetsociety.org/resources/doc/2015/iotoverview?
gclid=Cj0KCQjwpZT5BRCdARIsAGEX0znNRPgGM4ywfBEzSVN_QB6aYYBxbWW2oxvQDcCM1ri__RGAjE9vpM
0aAhLLEALw_wcB
https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot
https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internetthings-that-anyone-can-understand/
#1433b83c1d09
https://www.zdnet.com/article/what-is-the-internet-of-things-everything-you-need-toknow-about-the-iot-right-now/
https://www.iiroc.ca/industry/Documents/CybersecurityBestPracticesGuide_en.pdf
http://ecesm.net/sites/default/files/Dev.2.4-v1_new.pdf
https://www.nist.gov/system/files/documents/2019/11/14/mepnn_cybersecurity_guide_10919-508.pdf

Learning Module on ITE101

You might also like