Professional Documents
Culture Documents
Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to Information
and Communication
Technologies and
Rules of Netiquette
Quarter 1 - Module 1, Week 1
Introduction to Information and Communication
Technologies and Rules of Netiquette
___________________________________________________________________________
Learning Objectives:
1. Share knowledge on how ICT affects your everyday life
and the current state of our nation.
2. Compare and contrast the differences between online
platforms, sites and content and use these differences to
your advantage.
3. Determine and avoid the dangers in the use of internet.
4. Apply online safety, security, and ethics when sharing
information using the internet.
5. Create a campaign material which promotes “think
before you click”.
______________________________________________________________
What I Know
5
3. The following are features of a dynamic website. Which of them allows
users to put their own content?
A. Long tail C. Rich user experience
B. Mass participation D. User participation
4. Which provides a common framework to allow data to be shared and
reused across platform, enterprise, and community boundaries?
A. Semantic Web C. Web 1.0
B. W3C D. Web 2.0
5. What magazine declares that two Philippine cities are part of the top
10 in their research about “The Selfiest Cities around the World”?
A. Candy C. Reader’s Digest
B. People D. Time
6. Which of the following replicates and can transfer from one computer
to another?
A. Adware C. Rogue
B. Keylogger D. Virus
7. Which of the following tricks the user into posing that it is a security
software?
A. Adware C. Rogue
B. Private D. Spam
8. Which of the following used to record the keystrokes done by the
user?
A. Keylogger C. Phishing
B. Malware D. Spam
9. What has been designed to send you advertisements?
A. Adware C. Spyware
B. Malware D. Trojan
10. What do you call an unwanted email mostly from bots?
A. Adware C. Spam
B. Rogue D. Trojan
6
What’s In
1. How many times have you checked your phone this morning?
2. How many status updates have you posted in Facebook today?
3. Do you use the internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?
If you happen to check your phone and update your status in Facebook
most of the time and you have answered questions 3 and 4 with a “Yes”, a
great possibility that you are a digital native. Digital native is a person
familiar with digital technologies because he has grown up with them. If you
are a digital native, most likely, you were surrounded by technology the
moment you were born.
What’s New
How many of the items or icons in the image above are you familiar
with? Which ones are you unfamiliar with?
7
In this lesson, you will understand how Information and
Communication Technologies have improved our lives in such a short period
of time.
What is It
Types of Websites
Web 1.0. A static or stationary page wherein users cannot interact
with the page. Examples: Mp3.com, Ofoto, Aliweb, shopping carts, personal
websites, jekyll.com, brunch, metalsmith.com, Wikipedia, etc…
Web 2.0. A dynamic page wherein users can interact with the page.
Examples: social networking sites (Facebook, Instagram, Twitter, etc.),
video sharing sites (YouTube, Vimeo, TikTok, Twitch, DailyMotion, Facebook
Watch, etc.), wikis (Wikitravel, WikiBooks, WikiHow, Wiktionary, etc.), web
applications (Google Apps, Microsoft 0365, etc.), hosted services (Bluehost,
HostGator Cloud, Hostinger, GreenGeeks, DreamHost), and blogs.
8
Berners-Lee. It provides a common framework that allows data to be shared
and reused across application, enterprise, and community boundaries.
Trends in ICT
As the world of ICT continues to grow, the industry has focused on
several innovations which cater to the needs of the people who benefit most
out of it. The following trends are the current front runners in the innovation
of ICT.
1. Convergence. Technological convergence is the synergy of technological
advancements to work on a similar goal or task. It is the use of several
technologies to accomplish a task conveniently.
2. Social Media. Social media is a website, application, or online channel that
enables web users to create, co-create, discuss, modify, and exchange user-
generated content.
9
3. Mobile Technologies. The popularity of smartphones and tablets has taken
a major rise over the years because of the devices’ capability to do tasks that
were originally found in personal computers. Today, the latest mobile devices
use 5G Networking (LTE), which is currently the fastest mobile network.
What’s More
Example:
Community Problem: Severe flooding during rainy days due to
blocked drainages.
Vicinity: Guadalupe, Cebu City
Campaign Name: “Anti-flooding Movement”
Type of Social Media Used: Blogging
Website Used: WordPress
What will be the content of your social media site? It will contain
pictures of the flooded area during rainy days. It will also
contain pictures of the drainages that are blocked with
garbage. I also plan to update it occasionally. Anyone who
views the site will be able to comment on these updates.
10
Why did you choose that type of social media? People in my
community are avid readers of blogs. Most of them follow
several blogs that concern the community.
Why did you choose that website? WordPress, unlike other blogging
platforms, has a more “serious feel” to it. It also contains
professional-looking templates that will fit the serious tone
of my campaign.
Advantages of
ICT
11
Lesson
Rules of Netiquette
2
What’s In
What’s New
What information you have shared so far online? To check, write Yes if
the following information was being shared and No, if not.
How many “Yes” you have answered? Probably, you have answered
“Yes” in the first two items. If that is the case, try to type your first and
last name in Google and search if you have access to internet. Did you
get links to your profile page? Try to switch to image search. Did your
pictures appear? If you have a unique name, chances are, it did. But do
not feel bad if it did not appear, in fact, it is probably for your best
interest not to have pictures of yourself in a search engine.
So, how do you think these things happen? How can search engine
like Google locates you? Is there any danger of being found by search
engines?
What is It
12
Online Safety and Security
Internet is a powerful tool used to promote business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment
through games, online communities, and everything in between. But there is
always the “other side of the coin”. Internet is one of the most dangerous
places especially if you are unaware of what you are doing with it.
How safe are you? See how risky it is to share the following information
online.
Type of Risks
Information
13
information. Therefore, everyone is a prospect to cybercrime threats. We may
not experience it now but whatever information we share today could affect
our future. With this reason, social networking sites like Facebook continue
to improve their security features.
Internet Threats
Here are some of the threats you should be aware of when using the
internet.
1.Malware – stands for malicious software.
a. Virus – a malicious program designed to replicate itself and
transfer from one computer to another either through the internet
and local networks or data storage like flash drives and CDs.
b. Worm – a malicious program that transfers from one computer to
another by any type of means. Often, it uses a computer network
to spread itself. For example, the ILOVEYOU worm (Love Bug
Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
o Rogue security software – tricks the user into posing
that it is a security software. It asks the user to pay
to improve his/her security but, they are not
protected at all.
d. Spyware – a program that runs in the background without you
knowing it (thus called “spy”). It can monitor what you are
currently doing and typing through keylogging.
o Keyloggers - used to record the keystroke done by the
users. This is done to steal their password or any
other sensitive information. It can record email,
messages, or any information you type using your
keyboard.
e. Adware – a program designed to send you advertisements, mostly
as pop-ups
2. Spam – unwanted email mostly from bots or advertisers. It can be used to
send malware.
14
3. Phishing – its goal is to acquire sensitive personal information like
passwords and credit card details.
Pharming – a more complicated way of phishing where it exploits the
DNS (Domain Name Service) system.
Copyright Infringement
If you create something like an idea, an invention, a form of literary
work, or a research, you have the right as to how it should be used by
others. This is called “intellectual property. The copyright law includes your
rights over your work, and anyone who uses it without your consent is
punishable by law.
What’s More
15
2. How would you feel if someone posted something embarrassing
about you? What would you do?
3. Make your own three (3) Do’s and Don’ts in a table form when
using social networking site like Facebook.
What I Can Do
A. Campaign Material
Assessment
16
2. Pinterest is a social media website. Which of the following is its
classification?
A. blogs and forums C. media sharing
B. bookmarking site D. microblogging
3. What is the fastest mobile network currently used by the latest mobile
devices?
A. 2G C. 4G
B. 3G D. 5G
4. Which media is designed to help people who have visual and reading
impairments?
A. accessibility C. bookmark
B. assistive D. social
5. Which type of social media website focuses on short updates posted
by the user?
A. blogging C. microblogging
B. hashtagging D. social media
6. When using the internet, there are some threats you should be aware
of. Which of the following threats sends an official-looking email and
is designed to steal sensitive personal information?
A. copyright C. phishing
B. pharming D. private
7. What provision that allows you to use copyrighted work without
consent with certain limitations.
A. copyright C. incognito
B. fair use D. private
8. Which of the following threats runs in the background and monitors
what you are doing?
A. Adware C. spam
B. malware D. spyware
9. What option enables user to hide a post so that search engines could
not scan it?
A. fair use C. private
B. incognito D. rogue
10. Which of the following is a malicious software.
A. adware C. spam
B. malware D. virus
17
Answer Key
References
Books:
Online Sources:
Image/logo Source
https://globalearlyed.wordpress.com/global-tools/teacher-tools/
18