You are on page 1of 15

SHS

Empowerment
Technologies
Quarter 1 – Module 1:

Introduction to Information
and Communication
Technologies and
Rules of Netiquette
Quarter 1 - Module 1, Week 1
Introduction to Information and Communication
Technologies and Rules of Netiquette
___________________________________________________________________________

Content Standard : The learners demonstrate an understanding of ICT in


the context of global communication for specific
professional track.
Performance : The learners shall be able to independently compose an
Standard insightful reflection paper on the nature of ICT in the
context of their lives, society, and professional tracks
(Arts, Tech Voc, Sports, Academic).
Competencies : Compare and contrast the nuances of varied online
platforms, sites, and content to best achieve specific
class objectives or address situational challenges.
: Apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would
relate to their specific professional tracks.

Learning Objectives:
1. Share knowledge on how ICT affects your everyday life
and the current state of our nation.
2. Compare and contrast the differences between online
platforms, sites and content and use these differences to
your advantage.
3. Determine and avoid the dangers in the use of internet.
4. Apply online safety, security, and ethics when sharing
information using the internet.
5. Create a campaign material which promotes “think
before you click”.

______________________________________________________________

What I Know

Multiple Choice: Write the letter of your answer on a separate sheet of


paper.
1. Which of the following web pages allows interaction from the user?
A. Comment C. Social
B. Dynamic D. Static
2. Which of the following features where users can categorize and locate
information through tagging?
A. Folksonomy C. Rich user experience
B. Hashtags D. Taxonomy

5
3. The following are features of a dynamic website. Which of them allows
users to put their own content?
A. Long tail C. Rich user experience
B. Mass participation D. User participation
4. Which provides a common framework to allow data to be shared and
reused across platform, enterprise, and community boundaries?
A. Semantic Web C. Web 1.0
B. W3C D. Web 2.0
5. What magazine declares that two Philippine cities are part of the top
10 in their research about “The Selfiest Cities around the World”?
A. Candy C. Reader’s Digest
B. People D. Time
6. Which of the following replicates and can transfer from one computer
to another?
A. Adware C. Rogue
B. Keylogger D. Virus
7. Which of the following tricks the user into posing that it is a security
software?
A. Adware C. Rogue
B. Private D. Spam
8. Which of the following used to record the keystrokes done by the
user?
A. Keylogger C. Phishing
B. Malware D. Spam
9. What has been designed to send you advertisements?
A. Adware C. Spyware
B. Malware D. Trojan
10. What do you call an unwanted email mostly from bots?
A. Adware C. Spam
B. Rogue D. Trojan

Lesson Introduction to Information and


1 Communication Technologies

What I Need to Know

This lesson is designed to help you learn the concepts on Information


and Communication Technologies, its current state and the online systems,
functions, and platforms. As you continue learning this lesson, you will
realize that digital tools give you an idea of a wide range of possibilities to
discover; disclose; connect, and co-create in this technological world that we
live in.
So, are you now ready to explore our networked world? Come on and
enjoy learning this module and feel free to go over the discussion and
examples if you have not yet mastered a concept.

6
What’s In

Are you a Digital Native? To find out, answer the following


questions.

1. How many times have you checked your phone this morning?
2. How many status updates have you posted in Facebook today?
3. Do you use the internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?

If you happen to check your phone and update your status in Facebook
most of the time and you have answered questions 3 and 4 with a “Yes”, a
great possibility that you are a digital native. Digital native is a person
familiar with digital technologies because he has grown up with them. If you
are a digital native, most likely, you were surrounded by technology the
moment you were born.

What’s New

How many of the items or icons in the image above are you familiar
with? Which ones are you unfamiliar with?

Whatever your answers, take a closer look at the discussion below.


The list contains some key phrases that characterize the ICT tools that,
when used properly, can empower users to make positive social change.

7
In this lesson, you will understand how Information and
Communication Technologies have improved our lives in such a short period
of time.

What is It

Information and Communication Technologies (ICT) deals with the use


of different communication technologies such as mobile phones, telephone,
and internet to locate, save, send, and edit information.

ICT in the Philippines. Several international companies dub the


Philippines as the “ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is the rise of Business Process Outsourcing (BPO) centers.
According to the 2013 edition of Measuring the Information Society by the
International Telecommunication Union, there are 106.8 cellphones per 100
Filipinos in the year 2012. In a data gathered by the Annual Survey of
Philippine Business and Industries, NSO in 2010, the ICT industry shares
19.3% of the total employment population here in the Philippines. Time
Magazine’s “The Selfiest Cities around the World” of 2013 places two cities
from the Philippines in the top 1 and top 10 spots. This study was
conducted using Instagram, a popular photo sharing application.

Types of Websites
Web 1.0. A static or stationary page wherein users cannot interact
with the page. Examples: Mp3.com, Ofoto, Aliweb, shopping carts, personal
websites, jekyll.com, brunch, metalsmith.com, Wikipedia, etc…
Web 2.0. A dynamic page wherein users can interact with the page.
Examples: social networking sites (Facebook, Instagram, Twitter, etc.),
video sharing sites (YouTube, Vimeo, TikTok, Twitch, DailyMotion, Facebook
Watch, etc.), wikis (Wikitravel, WikiBooks, WikiHow, Wiktionary, etc.), web
applications (Google Apps, Microsoft 0365, etc.), hosted services (Bluehost,
HostGator Cloud, Hostinger, GreenGeeks, DreamHost), and blogs.

Features of Web 2.0


1. Folksonomy -allows users to categorize and classify or arrange
information using freely chosen keywords (e.g., tagging). Popular social
networking sites such as Twitter, Instagram, Facebook, etc. use tags
with the pound sign (#). This is also referred to as hashtag.
2. Rich User Experience -content is dynamic and is responsive to user’s
input.
3. User Participation -the owner of the website is not the only one who
is able to put content.
4. Long Tail -services that are offered on demand rather than on a one-
time purchase.
5. Software as a Service -users will subscribe to a software only when
needed rather than purchasing them.
6. Mass Participation -diverse information sharing through universal
web access.

Web 3.0 and the Semantic Web


Semantic Web -is a movement led by the World Wide Web Consortium
(W3C). The term was coined by the inventor of the World Wide Web, Tim

8
Berners-Lee. It provides a common framework that allows data to be shared
and reused across application, enterprise, and community boundaries.

Several Problems in using Web 3.0


1. Compatibility -HTML files and current web browsers could not
support Web 3.0.
2. Security -the user’s security is also in question since the machine is
saving his or her preferences.
3. Vastness -the World Wide Web already contains billions of web
pages.
4. Vagueness -certain words are imprecise.
5. Logic -since machines use logic, there are certain limitations for a
computer to be able to predict what the user is referring to at a given
time.

Trends in ICT
As the world of ICT continues to grow, the industry has focused on
several innovations which cater to the needs of the people who benefit most
out of it. The following trends are the current front runners in the innovation
of ICT.
1. Convergence. Technological convergence is the synergy of technological
advancements to work on a similar goal or task. It is the use of several
technologies to accomplish a task conveniently.
2. Social Media. Social media is a website, application, or online channel that
enables web users to create, co-create, discuss, modify, and exchange user-
generated content.

Six Types of Social Media


Names Definition Examples
a. Social Networks - sites that allow you to • Facebook and
connect with other Google+
people with the same
interests or background.
b. Bookmarking -sites that allow you to • StumbleUpon
Sites store and manage links and Pinterest
to various websites and
resources and create a
tag to easily search or
share them.
c. Social News -sites that allow users to • reddit and Digg
post their own news
items or links to other
new sources.
d. Media sharing -sites that allow you to • Flicker,
upload and share media YouTube, and
content like images, Instagram
music, and video.
e. Microblogging -sites that focus on short • Twitter and
updates from the user. Plurk
f. Blogs and -websites that allow • Blogger,
Forums users to post their WordPress, and
content. Tumblr

9
3. Mobile Technologies. The popularity of smartphones and tablets has taken
a major rise over the years because of the devices’ capability to do tasks that
were originally found in personal computers. Today, the latest mobile devices
use 5G Networking (LTE), which is currently the fastest mobile network.

Different Operating Systems use by Mobile Devices


a. iOS -used in Apple devices such as the iPhone and iPad
b. Android -an open-source operating system developed by Google
c. Blackberry -used in Blackberry devices
d. Windows Phone OS -a closed source and proprietary operating system
developed by Microsoft
e. Symbian -the original smartphone OS; used by Nokia devices
f. WebOS -originally used for smartphones; now used for smart TVs
g. Windows Mobile - developed by Microsoft for smartphones and pocket
PCs.
5. Assistive Media -is a nonprofit service designed to help people who
have visual and reading impairments. A database of audio recordings
is used to read to the user.

What’s More

A. Identifying the Correct Web Platform for Social Change

1. Identify a problem in your community, example: littering, garbage


disposal, blocked drainages, water shortage, teenage pregnancy,
cyber bullying, the increasing number of COVID19 cases, etc.
2. Imagine that you are going to create a website to convince both
community leaders and members to solve this problem.
3. Fill out the form below.
Community Problem:
Vicinity:
Campaign Name:
Type of Social Media Used:
Website Used:
What will be the content of your social media site?
Why did you choose that type of social media?
Why did you choose that website?

Example:
Community Problem: Severe flooding during rainy days due to
blocked drainages.
Vicinity: Guadalupe, Cebu City
Campaign Name: “Anti-flooding Movement”
Type of Social Media Used: Blogging
Website Used: WordPress
What will be the content of your social media site? It will contain
pictures of the flooded area during rainy days. It will also
contain pictures of the drainages that are blocked with
garbage. I also plan to update it occasionally. Anyone who
views the site will be able to comment on these updates.

10
Why did you choose that type of social media? People in my
community are avid readers of blogs. Most of them follow
several blogs that concern the community.
Why did you choose that website? WordPress, unlike other blogging
platforms, has a more “serious feel” to it. It also contains
professional-looking templates that will fit the serious tone
of my campaign.

What I Have Learned

Complete the bubble map below on the advantages of ICT in your


everyday life as a Senior High School (SHS) learner. Write your answer on a
separate sheet of paper.

Advantages of
ICT

11
Lesson
Rules of Netiquette
2

What I Need to Know

This lesson discusses the appropriate and inappropriate online behavior


that you as users need to know and appreciate. It helps you understand the
social nature of digital media and later you discover the status of your own
digital life. Moreover, this lesson gives emphasis on the importance to act
properly and responsibly to possible consequences on engaging these digital
tools.

What’s In

Cite situations where Information and Communication Technologies


have improved the lives of people.

What’s New

What information you have shared so far online? To check, write Yes if
the following information was being shared and No, if not.

1. First name 6. Name of your mother and father


2. Last name 7. Name of your siblings
3. Middle name 8. Your address
4. Current and previous school/s 9. Your home phone number
5. Your cellphone number 10. Your birthday

How many “Yes” you have answered? Probably, you have answered
“Yes” in the first two items. If that is the case, try to type your first and
last name in Google and search if you have access to internet. Did you
get links to your profile page? Try to switch to image search. Did your
pictures appear? If you have a unique name, chances are, it did. But do
not feel bad if it did not appear, in fact, it is probably for your best
interest not to have pictures of yourself in a search engine.
So, how do you think these things happen? How can search engine
like Google locates you? Is there any danger of being found by search
engines?

What is It

Teenagers like you are exposed to many things powered by the


internet because they are mostly into socializing, playing games, reading
sports news, shopping, etc. The internet has given you the most powerful
tools that your parents did not enjoy during their early days. For this reason,
you must observe proper internet usage.

12
Online Safety and Security
Internet is a powerful tool used to promote business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment
through games, online communities, and everything in between. But there is
always the “other side of the coin”. Internet is one of the most dangerous
places especially if you are unaware of what you are doing with it.
How safe are you? See how risky it is to share the following information
online.
Type of Risks
Information

1. First Name A big possibility that a hacker may already know


plenty of stuff about you even if you only give out your
first name.
2. Last Name If sharing your first name is a small risk, having both
your first and last is riskier. You will be vulnerable to
being searched for using search engines, which
include image search. Matching a name with a face is
modus to several cybercrimes like identity theft.
3. Middle Name Sharing your middle name alone is probably not the
riskiest of this shared information but sharing your
full name would be.
4. Current and Most people who steal identities study their subject.
previous school(s) They can use this information for verification
purposes.
5. Your cell phone This should never be posted because internet is a
number public place. It is the same as posting your number on
a billboard. You would not want random strangers to
text or call you, or worse, pretend that they are
someone else.
6. The name of Risky, yet not as risky as posting their full names,
your mother and esp. your mother’s maiden name. In fact, you may
father have already encountered many websites that require
your mother’s maiden name as an answer to a secret
question whenever you lose your password.
7. The name of This is a huge risk. Strangers may pretend or use
your siblings their identity to fool you.
8. Your address Hopefully, you answered “no” to this one. Giving the
internet your number is one thing; giving them your
address is a whole other level. It would be much easier
for criminals to find you.
9. Your home This shared information is riskier than sharing your
phone number personal phone number. Scams usually use this
information to deceive you, one of which is when a
stranger pretends to know your parents or pretends to
be you.
10. Your birthday Letting people know your birthday is probably a must
if you want to get as many gifts as possible. But
having it in your profile makes you vulnerable to
identity theft.

Internet is defined as the information superhighway means that


anyone has access to this highway, can place information, and can grab that

13
information. Therefore, everyone is a prospect to cybercrime threats. We may
not experience it now but whatever information we share today could affect
our future. With this reason, social networking sites like Facebook continue
to improve their security features.

Tips to Stay Safe Online


1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the
website handles the information you share.
4. Know the security features of the social networking site you use.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by adding a
password.
13. Avoid downloading anything from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

Internet Threats
Here are some of the threats you should be aware of when using the
internet.
1.Malware – stands for malicious software.
a. Virus – a malicious program designed to replicate itself and
transfer from one computer to another either through the internet
and local networks or data storage like flash drives and CDs.
b. Worm – a malicious program that transfers from one computer to
another by any type of means. Often, it uses a computer network
to spread itself. For example, the ILOVEYOU worm (Love Bug
Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
o Rogue security software – tricks the user into posing
that it is a security software. It asks the user to pay
to improve his/her security but, they are not
protected at all.
d. Spyware – a program that runs in the background without you
knowing it (thus called “spy”). It can monitor what you are
currently doing and typing through keylogging.
o Keyloggers - used to record the keystroke done by the
users. This is done to steal their password or any
other sensitive information. It can record email,
messages, or any information you type using your
keyboard.
e. Adware – a program designed to send you advertisements, mostly
as pop-ups
2. Spam – unwanted email mostly from bots or advertisers. It can be used to
send malware.

14
3. Phishing – its goal is to acquire sensitive personal information like
passwords and credit card details.
Pharming – a more complicated way of phishing where it exploits the
DNS (Domain Name Service) system.

Protecting Reputations Online


Embarrassing moments nowadays can be captured using any device
you could imagine. Unlike the old days, doing something embarrassing was
not much a big deal. Worst is that anyone can easily upload it over the
internet and cannot be undone. This puts you in a traumatic situation and
risk the lives of your family. So, before posting something over the internet,
think first before you click.

Think Before You Click


Things you might want to consider before internet posting.
1. Once you post something on the web, you have no control of who sees
your posts.
2. Your friends depend on you to protect their reputation online.
3. Set your post to “private”.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one
who posted it to pull it down or report it as inappropriate.

Copyright Infringement
If you create something like an idea, an invention, a form of literary
work, or a research, you have the right as to how it should be used by
others. This is called “intellectual property. The copyright law includes your
rights over your work, and anyone who uses it without your consent is
punishable by law.

Tips to avoid copyright infringement


1. Understand. Copyright protects literary works, photographs,
paintings, drawings, films, music (and lyrics), choreography, and
sculptures, but it does not protect underlying ideas and facts.
2. Be responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is something
that came from you, or something made from somebody else’s
creativity. It is important to add your own creative genius in
everything that will be credited to you.
4. Know the law. There are limitations to copyright laws. For instance, in
the Philippines, copyrights only last a lifetime (of the author) plus 50
years. There are also provisions for “fair use” which mean that an
intellectual property may be used without a consent as long as it is
used in commentaries, criticisms, search engines, parodies, news
reports, research, library archiving, teaching, and education.

What’s More

1. Do you agree or disagree with the provisions of the copyright law?


Defend your answer.

15
2. How would you feel if someone posted something embarrassing
about you? What would you do?
3. Make your own three (3) Do’s and Don’ts in a table form when
using social networking site like Facebook.

What I Have Learned

I have learned that:

1. To stay safe online, I must _________________________________________.


2. There are several internet threats which include ____________________.
3. Malwares could be in the form of a _________________________________.
4. It is our responsibility to protect other’s reputation online so we
should be ___________.
5. It is important for everyone to understand the laws particularly on
Copyright Infringement in order to _________________.

What I Can Do

A. Campaign Material

Create a campaign material promoting “Think before you click”. It could


be in the form of small poster using 1 long size bondpaper. Once graded,
post it anywhere in your place as an awareness campaign for internet users.
Your teacher shall grade your output using the rubric below.

Category Exemplary Accomplished Developing Beginning


4 3 2 1
Content The output The output is The output is The output is
exceeds the complete. somewhat incomplete.
expectations complete.
Attractiveness The flow chart is The flow chart is The flow chart is The flow chart is
exceptionally attractive in acceptably distractingly
attractive in terms of design, attractive messy or very
terms of design, layout, and though it may be poorly designed.
layout, and neatness. a bit messy. It is not
neatness. attractive.

Assessment

Multiple Choice: Write the letter of your answer on a separate paper.

1. What operating system is used for blackberry phones?


A. Blackberry OS C. Symbian
B. iOS D. Windows Mobile

16
2. Pinterest is a social media website. Which of the following is its
classification?
A. blogs and forums C. media sharing
B. bookmarking site D. microblogging
3. What is the fastest mobile network currently used by the latest mobile
devices?
A. 2G C. 4G
B. 3G D. 5G
4. Which media is designed to help people who have visual and reading
impairments?
A. accessibility C. bookmark
B. assistive D. social
5. Which type of social media website focuses on short updates posted
by the user?
A. blogging C. microblogging
B. hashtagging D. social media
6. When using the internet, there are some threats you should be aware
of. Which of the following threats sends an official-looking email and
is designed to steal sensitive personal information?
A. copyright C. phishing
B. pharming D. private
7. What provision that allows you to use copyrighted work without
consent with certain limitations.
A. copyright C. incognito
B. fair use D. private
8. Which of the following threats runs in the background and monitors
what you are doing?
A. Adware C. spam
B. malware D. spyware
9. What option enables user to hide a post so that search engines could
not scan it?
A. fair use C. private
B. incognito D. rogue
10. Which of the following is a malicious software.
A. adware C. spam
B. malware D. virus

17
Answer Key

References

Books:

Empowerment Technologies: Rex Book Store, Inc. and Innovative Training


Works, Inc., 2016
Empowerment Technologies Student Reader: Department of Education,
2016
Empowerment Technologies Teacher’s Guide: Department of Education,
2016
Abejo, Patricia May M. 2013. “The Philippine ICT Industry: Contributions
to Inclusive Growth”. The Philippine ICT Industry: n.pag.Web.

Online Sources:

“Assistive Media”. Assistive Media. AssistiveMedia.org, n.d.Web. 22 June


2015.
courses.com.ph/senior-high-school-contextualized-subject-empowerment-
technologies/
Grahl, Tim. “The 6 Types of Social Media.” Web log post. Common Insights,
n.d. Web 22 June 2015.
“How to Avoid Copyright Infringement.” WikiHow. N.p., n.d. Web. 27 Sept.
2015. http://www.wikihow.com/Avoid-Copyright-Infringement
Lukasiewicz, Thomas and Umberto Straccia. “Web Semantics: Science,
Service and Agents on the World Wide Web.” Science Direct. N.p., n.d. Web.
May 2015.
“McAfee Teen Safety Test: How Safe Is Your Surfing?” McAfee, n.d. Web. 22
June 2015
Norman AS. “Top 10 Internet Threats.” Norman.com, n.d. Web 22 June 2015

Image/logo Source

https://globalearlyed.wordpress.com/global-tools/teacher-tools/

18

You might also like