You are on page 1of 10

Republic of the Philippines

Department of Education
REGION III
SCHOOLS DIVISION OF TARLAC PROVINCE
BENIGNO S. AQUINO NATIONAL HIGH SCHOOL

EMPOWERMENT
TECHNOLOGY
LESSON I

Importance of Empowerment Technology

 Empowerment Technology, also known as E-Tech, is frequently concerned


with the use of various technologies such as mobile phones, telephones,
computers, and other devices to locate, save, communicate, and inform.
Empowerment Technology is important because of its innovative applications
in our daily lives. Empowerment Technology is important for three reasons:
communication, making our lives easier, and making our lives more
enjoyable.

 Empowerment Technology is important because it serves as a means of


communication. Many gadgets and other devices have improved their uses
over the years. Previously, a mobile phone was only used for texting, calling,
and playing simple games. Because of technological convergence or the way
technology changes or evolves its system, a cellular phone is now used for
more than just texting, calling, and playing games. It is now used for
communicating with people from other places via the internet and applications
or software’s such as Facebook, messenger, twitter, viber, kakao talk, and so
on, which are consistently used by the majority of us. Without these
applications or softwares, we would be unable to communicate with people
who live far away on a daily basis. Because Empowerment Technology is
well-known among all of us, communicating with people who live far away
will no longer be a problem. Friendships that had been shattered by distance
can now be repaired thanks to the use of Empowerment Technology.

 Empowerment Technology is important because it makes our lives easier in a


variety of ways, including school matters, office or work matters, and personal
matters. Previously, blackboards and whiteboards were among the tools used
in the classroom to teach students. There are now LCD projectors that are
widely used in many institutions and schools. We'd all be stuck with those
visual aid presentations if we didn't have these presentation softwares.
Empowerment Technology not only saves time, but it can also make our lives
easier.

What is Information and Communications Technology?

Information and Communications Technology (ICT) often deals with the use of
different technologies such as mobile phones, telephones, computer, Internet, and other
devices, as well as software and applications to locate, save, send, and manipulate information.
Empowering ICT is important for its innovative uses impacts our daily lives. It has affected
our ways of communicating, made our lives more convenient, and assisted countries towards
their modernization plans. Thus, there is a need to create a foundation of understanding in the
world of ICT. ICT has greatly contributed to how easy our lives have been today. Our gadgets
have become part of our necessity that we check on them after we wake up. It made
communication easier. We can use cellular phones that are designed for communicating with
other people even if they are miles away from us. It has also assisted us in our work since there
are Internet-based jobs. It has revolutionized our education and in the modernization of our
economy.

ICT in the Philippines


Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers. In a data gathered by
the Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares
19.3% of the total employment population.
When the internet was fully commercialized in 1995 , it has tremendously impacted
culture and commerce, including the rise of near instant communication by email, instant
messaging, telephony (Voice over Internet Protocol or VoIP), two-way interactive video calls,
and the World Wide Web with its discussion forums, blogs, social networking, and online
shopping sites. Internet is the global system of interconnected computer networks that uses the
Internet protocol suite (TCP/IP) to communicate between networks and devices.

The World Wide Web


The World Wide Web is an information system on the Internet that allows documents
to be connected to other documents by hypertext links, enabling the user to search for
information by moving from one document to another. It was invented by Tim-Berners Lee.
The World Wide Web browser software, such as Microsoft's Internet Explorer/Edge, Mozilla
Firefox, Opera, Apple's Safari, and Google Chrome, let users navigate from one web page to
another via the hyperlinks embedded in the documents. These documents may also contain any
combination of computer data, including graphics, sounds, text, video, multimedia and
interactive content that runs while the user is interacting with the page. The Web has enabled
individuals and organizations to publish ideas and information to a potentially large audience
online at greatly reduced expense and time delay.

Types of Web Pages

• Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat
or stationary page since it cannot be manipulated by the user.

• Web 2.0 or The Social Web allows users to interact with the page, the user may be
able to comment or create a user account. Most website that we visit today are Web 2.0.

• Web 3.0 or Semantic Web. The semantic web provides a framework that allows data
to be shared and reuse to deliver web content specifically targeting the user. Search
Engine will learn about you and your habits from each search you perform and will
gather details about you from your previous activities like likes and social postings and
present the answers as per your preferences.
Below is a comparison of Web 1.0, Web 2.0 and Web 3.0
CRITERIA WEB 1.0 WEB 2.0 WEB 3.0
Communication Broadcast Interactive Engaged/ Invested
Information Static/ Read-only Dynamic Portable & Personal
Focus Organization Community Individual
Content Ownership Sharing Immersion
Interaction Web Forms Web Application Smart Applications
Search Directories Tags/ Keywords Context/ Relevance
Metrics Page Views Cost per Click User Engagement
Advertising Banners Interactive Behavioral
Technologies HTML/ FTP Flash/ Java/ XML RDF/ RDFS/ OWL

Features of WEB 2.0

FEATURES WEB
2.0
allows users to collectively classify and find information using
FOLKSONOMY freely chosen keywords (e.g. "tagging" by facebook). Tagging uses
the pound sign #, often referred to as hastag.
dynamic content that is responsive to user input (e.g., a user can
RICH USER "click" on an image to enlarge it or find out more information)
EXPERIENCE
the owner of website is not the only one who is able to put content.
USER Others are able to place a content on their own by means of
PARTICIPATIO comments, reviews, and evaluation.
N
services that are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that
LONG TAIL charges you for the amount of time you spent in the Internet, or a
data plan that charges you for the amount of bandwidth you used.

SOFTWARE AS users will subscribe to a software only when needed rather than
A SERVICE purchasing them.
LESSON II

Technology keeps rising and improving every time. The use of technology connects us to
the people around the globe and gives us current information on the trends in information and
communication. As what you have written in the activity above, it shows that social media is
mostly used by people and one of the current trends in information and communication
technology.

Trends in ICT
1. Convergence – it refers to fusing of technological advancement to work on a similar
task. Example. Using smartphone as camera in taking pictures instead of DSLR camera.

2. Social Media – an application and website where user can communicate, create and
share content, and participate in online communities.

Type of Social Media


A. Social Network – A website where people with the same come together to
share information.
Examples: Twitter, Instagram, Facebook
B. Social News – A website where user can post stories and are ranked based
on the popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark

C. Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images and others.
Examples: Pinterest, StumbleUpon, Dribble

D. Media Sharing – A website that allows you to share and store multimedia
files such as video, photos and music.
Examples: Instagram, YouTube, Flickr
E. Microblogging – a website that allows you to broadcast short message.
Examples: Twitter, Tumblr, Meetme

F. Blogs and Forums – a discussion website that allows user to ask questions
and comments on a journal posted by an individual or group. Examples:
Wordpress, Blogger

3. Mobile Technologies – a technology used in cellular and other devices such netbook,
laptop, tablet, smartphones etc.

4. Assistive Media - A platform that assist people with disability. It will guide the
individual like a blind person by using an audio recording.
LESSON III

ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE

We have learned about the current state of Information and Communication Technology
in global setting. There are various online platforms and sites that people used today as their
medium of communication and source of information. This communication technology spread
fast to the people and even controls their lives. Despite of the good benefits given to us by the
technology there are stills things that we must be aware of. In this lesson, we will discuss and give
importance in online safety, security, ethics and etiquette.

Online Safety
The importance of internet plays a crucial part in human development. Life becomes easy
and comfortable because of this technology. Most of us are connected to the internet via laptop,
mobile phone, tablet, personal computer and other electronic gadgets. Behind this technology,
there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and illegal
activities if you will not take precautions in using internet. We need to keep ourselves safe and
secure whenever we use the internet. That is why it is very important to know and learn the ways
on how to be safe and secured online.

Tips on how to be safe online


 Do not share your password with anyone.
 Add friends you know in real life.
 Do not visit untrusted websites.
 Add a password to your WIFI at home to make it private.
 Install and update the antivirus on your computer.
 Do not give your personal information to anyone
 Think before you click.
 Never post about your future vacation.

Internet Risk
 Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by other person
using electronic communication.

 Identity Theft
It is a crime of stealing personal information for assuming that person’s name or identity
to make any form of transactions.

 Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass individual
or group.

 Sexting
The act of sending sexually explicit text messages, images, and videos.
Internet Threats

 Malware – also known as Malicious Software.

Types of Malware

1. Virus – a malicious program that replicate itself by copying itself to another


program.
2. Trojan Horse – a malicious program that disguised as legitimate program that
user will accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other computers.
4. Spyware – A malicious program that gathers information from victim’s
computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user credentials
and confidential information and send back to hack by recording every
keystroke that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as PC and
mobile phone that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a computer on
a network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the programs
or files and demands to pay the ransom through online method for the removal
of the virus.

 Spam
Also known as, junk email or unwanted email send by advertiser or bot. It can be used to send
malware.

 Phishing
A cyberattack method using deceptive emails and websites to acquire sensitive personal
information.

 Cybercrime
A crime in which computer is used as object and tool in committing a crime such hacking,
phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

 Cybercrime Law
A law that deals with all forms of cybercrime.

There are times that netizens will give compliments and positive reactions on your post
but there are also times that netizens will criticize or give negative reactions on your post.
Conflicts and misunderstanding occur in social media because netizens are not behaving well.
Ethics and etiquette should be practice by people whenever they are in social media.

Netiquette
A word came from the two words “net” and “etiquette”. It is an etiquette applied online
that shows proper manner and behavior. If you are a member of an online society through social
media, you are called netizen. In addition, in interacting with other netizen online, we need to maintain
good behavior, which is acceptable to others in online community.
The Core Rules of Netiquette by Seth T. Ross

 Remember the human.


 Adhere to the same standards of behavior online that you follow in real life.
 Know where you are in cyberspace.
 Respect other people's time and bandwidth.
 Make yourself look good online.
 Share expert knowledge.
 Help keep flame wars under control.
 Respect other people's privacy.
 Do not abuse your power.
 Be forgiving of other people's mistakes.

You might also like