You are on page 1of 12

FIAT LUX ACADEME

CAVITE
Columnar Lesson Plan in Empowerment Technologies
Week 1-September11-15, 2023

Subject Matter Objectives Activities Evaluation/Assessment Remarks


Introduction to Information Day 1, September 11-15, 2023
and Communication G11STEM Raffinaan
Technology M 9:00-11:00/ W 10:00-11:00/F 2:00-3:00
G11 STEM Curie
 History of Web 2.0 and M 4:10-5:10/TTHF 10:00-11:00
Web 3.0 G11 STEM Copernicus
 Features of Web 2.0 TTH 7:00-9:00
 Static Vs Dynamic Web G11 Del mundo 20 Item Quiz Via MS Teams
Page M 7:00-8:00/TTH 9:00-10:00/T 4:10-5:10
 Different Trends in ICT
Motivation:
 SELECT AND COLLAB! Assignment: Essay Via MS
References: The students will be divided into 5 groups Teams;
and each group will choose a number to 1-5 “ICT, Me, and My
Empowerment Technologies each number contain a web page/website. Community”
Innovative Training Works, The students will ask to collaborate and
Inc.2019, Page 1-4. give descriptions pertaining to their chosen Criteria % Score
webpage/website. Creativity 20
Content 50
Ideas 30
‘Organizati
1. 2. on
3. 4. .

5.

Lesson Proper:
 Improve their  Ask the students on their prior
Knowledge on how knowledge about ICT.
ICT the everyday  Explain Information,
lives and the state of Communication and Technology.
our Nation;  Discuss the Difference between
Web 2.0 and Web 3.0
 Discuss the Web 2.0 and its
Features.
 Compare and  Discuss the different trends in ICT
Contrast the
Differences between Insights
Online Platforms,
Sites, and content; Information and Communication
Technology

 ICT is technology that is used to


 Understand the handle communications processes
features of Web 2.0; such as telecommunications,
broadcast media, intelligent
building management systems,
audiovisual processing and
transmission systems, and network-
based control and monitoring
functions.

Web 1.0: Static vs Web 2.0: Dynamic


Web Pages.

 Web 1.0 like this: it was designed


to help people better find
information. This web version dealt
was dedicated to users searching
for data. This web version is
sometimes called “the read-only
Web” because it lacks the
necessary forms, visuals, controls,
and interactivity we enjoy on
today’s Internet.

 If Web 1.0 was made up of a small


number of people generating
content for a larger audience, then
Web 2.0 is many people creating
even more content for a growing
audience. Web 1.0 focused on
reading; Web 2.0 focused on
participating and contributing.

Features of Web 2.0


 Folksonomy allow user to
categorize and classify/arrange
information using freely chosen
keywords. E.g., tagging

 Rich User Experience content is


dynamic and is responsive to user’s
input.
 User Participation the owner of
the website is not the only one who
is able to put content.

 Long Tail service that is offered on


demand rather than on a one- time
purchase.

 Software as a service The user will


subscribe to a software only when
needed rather than purchasing
them.

 Mass Participation It’s a webpage


that has a diverse information
sharing through universal web
access.

Different Trends in ICT

1. CONVERGENCE is the synergy


of technological achievements to
work on a similar goal or task

2. SOCIAL MEDIA is a website,


application, or online channel that
enables web user to create, co-
create, discuss, modify and
exchange user-generated content.

TYPE OF SOCIAL MEDIA


 SOCIAL NETWORKS This are
the sites that allow you to connect
with other people with the same
interest and background. Example:
Facebook.
 BOOKMARKING SITES These
are the sites that allow you to store
and manage links websites and
resources. Most of these sites allow
you to create a tag that allows you
and others to easily search or share
them. Example. Pinterest

 SOCIAL NEWS These are sites


that allow users to post their own
news sources.

 MEDIA SHARING These are


sites that allow you to upload and
share media content like images,
music, and video. Most of these
sites have additional social features
like liking commenting, and having
user profiles. Example: Flicker,
YouTube, and Instagram

 MICROBLOGGING These sites


that focus on short updates from the
user. Those subscribed to the user
will be able to receive these
updates.

 BLOGS These websites allow


users to post their content.
Example: Blogger, WordPress, and
Tumblr.
 FORUMS are typically part of a
certain website or web service

3. MOBILE TECHNOLOGIES
A. iOS is a mobile operating
system created and developed
by Apple Inc. and distributed
exclusively for Apple
hardware.

B. ANDROID an open source


operating system developed by
Google.

C. BLACKBERRY OS is a
proprietary mobile operating
system developed by
BlackBerry Ltd for its
BlackBerry line of smartphone
handheld devices.

D. WINDOWS PHONE OS a
closed source and proprietary
operating system developed by
Microsoft.

E. SYMBIAN The ORIGINAL


smartphone Operating system
used by NOKIA devices.

F. Web OS Originally used for


smartphones now used for
smart TVs.
G. WINDOWS MOBILE
developed by Microsoft for
smartphones and pocket PCs

4. ASSISTIVE MEDIA is a
nonprofit service designed to help
people who have visual and reading
impairments as well as cognitive,
physical, and communication
disabilities.
 Consider one’s and
other’s safety when
Online safety, security, ethics, sharing information
and etiquette using the internet
Day 2, September 11 -15, 2023
G11STEM Raffinaan
 Consider one’s and M 9:00-11:00/ W 10:00-11:00/F 2:00-3:00
other’s reputation G11 STEM Curie
when using the M 4:10-5:10/TTHF 10:00-11:00
internet G11 STEM Copernicus
References; TTH 7:00-9:00
G11 Del mundo
Yuvienco,J.C.(2021).  Determine and avoid M 7:00-8:00/TTH 9:00-10:00/T 4:10-5:10
Empowerment Technologies the dangers of the
Making small shifts towards a internet
BIG Difference. C&E Publishing
Inc. Motivation:

https://www.youtube.com/watch?  STATE YOUR STAND! 20 Items Quiz Via MS


v=u0lk3tremKM&list=PPSV  Be responsible in the Consider this statement from Alana Teams
use of social Fawcett’s online presentation titled “Anti-
networking sites; and Social Networking”: “Instead of
promoting social behavior, social media
promotes disengagement, self-absorption,
loneliness, and sadness.
Assignment: Infographics to
 Browse the internet be submitted via MS teams.
efficiently and
properly through  WATCHED AND LEARN! Topic: “Responsible
proper referencing Watch a short video clip about Netiquette Internet User!”
and share what they have learned, in class. Criteria % Score
Creativity 30
Content 50
Originality 20

Lesson Proper:

 Discuss an overview of Netiquette.


 Explain the online safety, security,
ethics and etiquette
 Explain the dangers from internet.
 Discuss the copyright infringement.

Insight

What is internet?
“The information superhighway” This
means that anyone has access to this
highway, can place information, and can
grab that information. The INTERNET,
sometimes called simply "the Net," is a
worldwide system of computer networks - a
network of networks in which users at any
one computer can, if they have permission,
get information from any other computer.
What is Netiquette?
The word NETIQUETTE is a combination
of ’net’ (from internet) and ’etiquette’. It
means respecting other users’ views and
displaying common courtesy when posting
your views to online discussion groups.

Online Safety and Security


The knowledge of maximizing the user's
personal safety and security risks to private
information and property associated with
using the internet, and the self- protection
from computer crime in general.

Tips to Stay Safe Online


1. Be mindful of what you share online and
what site you share it to.
2. Do not just accept terms and conditions;
read it
3. Check out the privacy policy page of a
website to learn how the website handles
the information you share.
4. Know the security features of the social
networking site you use. By keeping your
profile private, search engines will not be
able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-
Fi. Browsing in “Incognito mode”, a feature
of the browser will not protect you from the
hackers.
7. Do not talk to stranger’s weather online
or face to face.

Internet Threats
A web threat is any threat that uses the
World Wide Web to facilitate cybercrime.

MALWARE A computer virus is a type of


malicious software program ("malware")
that, when executed, replicates itself by
modifying other computer programs and
inserting its own code. Infected computer
programs can include as well, data files, or
the "boot" sector of the hard drive.

Types of Malware
Copyright Infringement?

Is a form of protection for an author’s


original piece of work (a.ka. Intellectual
Property Rights) - This protection gives the
owner of the copyright the “exclusive right”
to decide who can sell or reproduce their
work.

Any form of intellectual property can have


a copyright. - Some copyrighted material:
Music, Art, Literary works, photographs/
images and printed music Can you use
copyrighted material at all? YES. To an
extent. It’s called “FAIR USE”

You might also like