Professional Documents
Culture Documents
Department of Education
REGION III
SCHOOLS DIVISION OF TARLAC PROVINCE
BENIGNO S. AQUINO NATIONAL HIGH SCHOOL
EMPOWERMENT
TECHNOLOGY
LESSON I
Information and Communications Technology (ICT) often deals with the use of
different technologies such as mobile phones, telephones, computer, Internet, and other
devices, as well as software and applications to locate, save, send, and manipulate information.
Empowering ICT is important for its innovative uses impacts our daily lives. It has affected
our ways of communicating, made our lives more convenient, and assisted countries towards
their modernization plans. Thus, there is a need to create a foundation of understanding in the
world of ICT. ICT has greatly contributed to how easy our lives have been today. Our gadgets
have become part of our necessity that we check on them after we wake up. It made
communication easier. We can use cellular phones that are designed for communicating with
other people even if they are miles away from us. It has also assisted us in our work since there
are Internet-based jobs. It has revolutionized our education and in the modernization of our
economy.
• Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat
or stationary page since it cannot be manipulated by the user.
• Web 2.0 or The Social Web allows users to interact with the page, the user may be
able to comment or create a user account. Most website that we visit today are Web 2.0.
• Web 3.0 or Semantic Web. The semantic web provides a framework that allows data
to be shared and reuse to deliver web content specifically targeting the user. Search
Engine will learn about you and your habits from each search you perform and will
gather details about you from your previous activities like likes and social postings and
present the answers as per your preferences.
Below is a comparison of Web 1.0, Web 2.0 and Web 3.0
CRITERIA WEB 1.0 WEB 2.0 WEB 3.0
Communication Broadcast Interactive Engaged/ Invested
Information Static/ Read-only Dynamic Portable & Personal
Focus Organization Community Individual
Content Ownership Sharing Immersion
Interaction Web Forms Web Application Smart Applications
Search Directories Tags/ Keywords Context/ Relevance
Metrics Page Views Cost per Click User Engagement
Advertising Banners Interactive Behavioral
Technologies HTML/ FTP Flash/ Java/ XML RDF/ RDFS/ OWL
FEATURES WEB
2.0
allows users to collectively classify and find information using
FOLKSONOMY freely chosen keywords (e.g. "tagging" by facebook). Tagging uses
the pound sign #, often referred to as hastag.
dynamic content that is responsive to user input (e.g., a user can
RICH USER "click" on an image to enlarge it or find out more information)
EXPERIENCE
the owner of website is not the only one who is able to put content.
USER Others are able to place a content on their own by means of
PARTICIPATIO comments, reviews, and evaluation.
N
services that are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that
LONG TAIL charges you for the amount of time you spent in the Internet, or a
data plan that charges you for the amount of bandwidth you used.
SOFTWARE AS users will subscribe to a software only when needed rather than
A SERVICE purchasing them.
LESSON II
Technology keeps rising and improving every time. The use of technology connects us to
the people around the globe and gives us current information on the trends in information and
communication. As what you have written in the activity above, it shows that social media is
mostly used by people and one of the current trends in information and communication
technology.
Trends in ICT
1. Convergence – it refers to fusing of technological advancement to work on a similar
task. Example. Using smartphone as camera in taking pictures instead of DSLR camera.
2. Social Media – an application and website where user can communicate, create and
share content, and participate in online communities.
C. Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images and others.
Examples: Pinterest, StumbleUpon, Dribble
D. Media Sharing – A website that allows you to share and store multimedia
files such as video, photos and music.
Examples: Instagram, YouTube, Flickr
E. Microblogging – a website that allows you to broadcast short message.
Examples: Twitter, Tumblr, Meetme
F. Blogs and Forums – a discussion website that allows user to ask questions
and comments on a journal posted by an individual or group. Examples:
Wordpress, Blogger
3. Mobile Technologies – a technology used in cellular and other devices such netbook,
laptop, tablet, smartphones etc.
4. Assistive Media - A platform that assist people with disability. It will guide the
individual like a blind person by using an audio recording.
LESSON III
We have learned about the current state of Information and Communication Technology
in global setting. There are various online platforms and sites that people used today as their
medium of communication and source of information. This communication technology spread
fast to the people and even controls their lives. Despite of the good benefits given to us by the
technology there are stills things that we must be aware of. In this lesson, we will discuss and give
importance in online safety, security, ethics and etiquette.
Online Safety
The importance of internet plays a crucial part in human development. Life becomes easy
and comfortable because of this technology. Most of us are connected to the internet via laptop,
mobile phone, tablet, personal computer and other electronic gadgets. Behind this technology,
there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and illegal
activities if you will not take precautions in using internet. We need to keep ourselves safe and
secure whenever we use the internet. That is why it is very important to know and learn the ways
on how to be safe and secured online.
Internet Risk
Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by other person
using electronic communication.
Identity Theft
It is a crime of stealing personal information for assuming that person’s name or identity
to make any form of transactions.
Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass individual
or group.
Sexting
The act of sending sexually explicit text messages, images, and videos.
Internet Threats
Types of Malware
Spam
Also known as, junk email or unwanted email send by advertiser or bot. It can be used to send
malware.
Phishing
A cyberattack method using deceptive emails and websites to acquire sensitive personal
information.
Cybercrime
A crime in which computer is used as object and tool in committing a crime such hacking,
phishing, spamming, child pornography, libel, hate crimes, identity thief and others.
Cybercrime Law
A law that deals with all forms of cybercrime.
There are times that netizens will give compliments and positive reactions on your post
but there are also times that netizens will criticize or give negative reactions on your post.
Conflicts and misunderstanding occur in social media because netizens are not behaving well.
Ethics and etiquette should be practice by people whenever they are in social media.
Netiquette
A word came from the two words “net” and “etiquette”. It is an etiquette applied online
that shows proper manner and behavior. If you are a member of an online society through social
media, you are called netizen. In addition, in interacting with other netizen online, we need to maintain
good behavior, which is acceptable to others in online community.
The Core Rules of Netiquette by Seth T. Ross