You are on page 1of 14

Acknowledgement

I would like to express my special thanks to our teacher Ms. Mellisa


Bugtong for her time and efforts she provides throughout the whole quarter.
Your useful advice and suggestions were really helpful to us during the
project’s completion. In this aspect I am eternally grateful to you.
Also, I would like to take this opportunity to thank my family
members & groupmate, without them it could not have been done effectively
in such a short period of time. I cannot forget their love & support.
A project is a bridge between theoretical and practical learning and
with this thinking we worked on the project and made it successful due to
timely support and efforts of all who helped me.
TABLE OF CONTENTS
The Use and Importance of Empowerment
Technology……………………………………………………………..1
Meaning of ICT………………………………………………………...2
Meaning of Empowerment Technology...………………………3
Use and Importance of Empowerment Technology…………4
Importance of Internet/Social Media……………………………5
Dangers of Internet……………………………………………………6
10 Commandments of Computer………………………………….7
INTRODUCTION
Information and communication technology (ICT) are an umbrella
term that includes any communication device or application encompassing
mobile phones, computer network hardware, software, the internet the
satellite systems and so on. Information and Communication Technology
(ICT) in education is the mode of education and communication technology
to support, enhance, and optimize the delivery of information. Worldwide
research has shown that ICT can lead to an improved student learning and
better teaching methods. ICT also can permeate all aspects of life providing
newer, better, and quicker ways for people to interact, network, seek help,
gain access to information, and learn in new, better, and faster ways.
Meaning of ICT

Information and Communications Technology (ICT) is the use of computing


and telecommunication technologies, systems and tools to facilitate the way
information is created, collected, processed, transmitted and stored. It
includes computing technologies like servers, laptop computers and
software applications, as well as the wired and wireless communication
technologies that support telephones, the internet, the internet of things
(IoT) and the metaverse. The goal of ICT is to improve access to information
and make human-to-human, human-to-machine and machine-to-machine
(M2M) communication easier and more efficient.
Information and Communication Technologies (ICT) is defined as a diverse et
of technological tools and resources used to transmit, store, Create share or
Exchange information. This technological tools and resources include
computers, the internet (websites, blogs and emails), live broadcasting
technologies (radio, television and webcasting), recorded broadcasting
technologies (podcasting, audio and video players, and storage devices) and
telephony (fixed or mobile, satellite, vision/video conferencing etc.).

Meaning of Empowerment Technology


Empowerment- authority or power given to someone to do something.
Technology- from Greek word techne, “art, skill, cunning of hand”; and logia)
is the collection of techniques, skills, methods, and processes used in the
production of goods or services on in the accomplishments of objectives,
such as scientific investigation.
Empowerment Technology (ICT
Deals with the use of different technologies such as mobile phones,
telephone, computer and other devices to locate, save, communicate and to
inform. Empowerment Technology is important for its innovative uses is
sufficient in our daily lives.

Uses and Importance of Empowerment Technology?


1. Access to Information
Empowerment technology provides easy access to a vast
amount of information. This enables individuals to educate
themselves on various topics, learn skills, and stay updated with
current events.
2. Skill development
Technology offers platforms to acquire and enhance skills.
Online courses, tutorials, and educational apps provide opportunities
for self-improvement and skill development, which can lead to better
job prospects and economic empowerment.
3. Communication and networking:
Technology facilitates communication and networking among
individuals and communities. Social media, online forums, and
messaging apps enable people to connect, share ideas, collaborate,
and support each other’s initiatives.
4. Advocacy and activism:
Empowerment technology can be used to raise awareness about social
issues, advocate for change, and mobilize communities. Social media
platforms, blogs, and online campaigns have become powerful tools
for promoting social change.
5. Financial inclusion technology has revolutionized financial services
and expanded financial inclusion mobile banking, digital wallets, and
online payment systems allow individuals, including those in
underserved areas, to access and manage their finances more easily.
6. Civic engagement: empowerment technology encourages civic
engagement by providing platforms for participation, feedback, and
involvement in decision-making processes. Online petitions, survey
tools, and virtual town halls enable individuals to have their voices
heard and contribute to the development of their communities.
7. Entrepreneurship and economic empowerment:
Technology has opened up opportunities for entrepreneurship and
economic empowerment. E-commerce platforms, freelancing websites,
and online marketplaces enable individuals to start businesses,
expand their reach, and generate income.

Empowerment technology encompass various tools, platforms, and


applications designed to empower individuals and communities by providing
access to information, resources, and opportunities for personal and
collective development. Trough digital empowerment initiatives, people can
gain education, skills, and access to essential services, ultimately enabling
them to participate more fully in economic, social, and political spheres.
Empowerment technology plays a crucial role in digital divides, promoting
inclusivity, and fostering empowerment among marginalized groups, such as
women, youth, and underserved communities. By leveraging technology for

empowerment, individuals can enhance their ability economic prospects,


advocate for their rights, amplify their voices, and contribute to positive
social change. Overall, the use of empowerment technology has the potential
to create more equitable societies and improve the well-being of individuals
and communities around the world.

IMPORTANCE OF INTERNET/SOCIAL MEDIA

The internet and social media provide Young people with a range of benefits,
and opportunities to empower themselves in a variety of ways. Young people
can maintain social connections and support networks that otherwise
wouldn’t be possible, and can access more information than ever before. The
communities and social interactions young people form online can be
invaluable for bolstering and developing young people’s self-confidence and
social skills.

This will help you to:


 Understand some of the benefits of internet and social media
 Understand why technology is so attractive to Young people
 Understand the positive uses of social media and online spaces
 Talk to Young people about what they use technology for.

The use of social media and networking services such as Facebook, Twitter,
Instagram and Snapchat have become an integral part of Australians daily
lives. While many associate social media with a degradation of Young
people’s social networks and communication skills, a literature review
published by the Young and well Cooperative Research Centre found that
social networking services actually play a vital role for in Young people’s
lives – delivering educational outcomes; facilitating supportive relationships;
identity formation; and promoting a sense of belonging and self-esteem.

Young people as social participants and active citizens


Social networking services can provide an accessible and powerful
toolkit for highlighting and acting on issues causes that affect and
interest Young people. Social networking services can be used for
organizing activities, events, or groups to showcase issues and
opinions and make a wider audience aware of them. E.g. Coordinating
band activities, fundraisers, and creating awareness of various
causes.
Young people developing a voice and building trust
Social networking services can be used to hone debating and helps
users develop public ways of presenting themselves. Personal skills
are very important in this context: to make, develop and keep
friendships, and to be regarded as a trusted connection within a
network. Social networking services can provide young people with
opportunities to learn how to function successfully in a community,
navigating a public social space and developing social norms and
skills as participants in peer groups.
Young people developing key and real-world skills
Managing an online presence and being able to interact effectively
online is becoming an increasingly important skill in the workplace.
Being able to quickly adapt to new technologies, services and
environments is already regarded as a highly valuable skill by
employers, and can facilitate both formal and informal learning. Most
services are text based, which encourages literacy skills, including
interpretation, evaluation and contextualization.
Young people as collaborators and team player
Social networking services are designed to support users working,
thinking and acting together. They also require listening and
compromising skills. Young people may need to ask others for help
and advice in using services, or understand how platforms work by
observing others, particularly in complex gaming virtual
environments. Once users have developed confidence in a new
environment, they will also have gained the experience to help others.

Young people becoming independent and building resilience


Online spaces are social spaces, and social networking services offer
similar opportunities to those of offline social spaces: places for Young
people to be with friends or to export alone, building independence
and developing skills they need to recognize and manage risk to learn
judge and evaluate situations, and to deal effectively with world that
can sometimes be dangerous or hostile. However, such skills can’t be
built in isolation, and more likely to develop if supported. Going to a
social networking service for the first time as a Young person alone
can be compared to a Young person’s first solo trip to a city center,
and thus it is important for a Young person to know how to stay safe
in this new environment.
Young people as explorers and learners
Social networks encourage discovery. If someone is interested in
certain books, bands, recipes, ideas, it’s likely that their interest will
be catered for by a social networking service or group within a service.
If users are looking for something more specific or unusual then they
could create their own groups or social networking sites. Social
networking services can help young people develop their interests and
find other people who share the same interests. They can also help
broaden users’ horizons by helping them discover how other people
live and think in all parts of the world.

Dangers on the Internet


1. Email Spam
2. Email Spoofing
3. Phishing
4. Pharming
5. Spyware
6. Computer Worm
7. Trojan Horse
8. Computer Virus
9. Hacker

1. Email Spam – Also known as junk email, it is usually unsolicited


commercial email sent from one source with identical message sent
multiple recipients. Although some of them are not harmful, deleting
them one by one will eat up your time and can clog tour email.
Example: Email messages you did not ask for from senders you don’t
know.
In FB, Gmail, there will be link that is sent to you don’t open because
they are considered as a virus.
2. Email Spoofing – This refers to a deceitful email practice in which the
sender address is changed so that it would appear to have come from
a different source usually someone you know.
Example: Message tells the user that their account will be
suspended.
3. Phishing – Attackers will commonly use phishing emails to distribute
malicious links or attachment that can perform a variety of function.
Example: Applicable in SIM Card when they text your Sim won
100000000….

Phishing – Type of scam trough digital communication in order to


obtain personal information such as usernames, passwords, credit
details, or other confidential information.

4. Pharming – This is a dangerous hacker attack on a website which


directs all traffic to that website to another fictitious website. The
main object of pharming is to obtain username and passwords, as well
as credit card and financial information, and use these to steal their
money electronically or use the credit cards of the victims.

5. Spyware – This is computer program that is installed covertly on a


personal computer to collect information or even take control over the
computer without the knowledge of the user.
-It affects the performance and settings of the computer.
6. Computer Worm – this is a dangerous computer program that
replicates itself trough a network.
-Some worms delete files, other disrupt the networks function and
still, other send junk mails from infected computer.
-Anti-virus should be updated to protect your system.
7. Trojan Horse – This is a form of a malicious software (malware)
fronting to perform a good task, but covertly performs undesirable
function with the intention of entering the computer without the users
consent. Once the malware is installed in the computer, the Trojan
Horse can disable the computers defenses opening it to unauthorized
entry.
8. Computer Virus – This is a program that replicates it self and then
infects the computer.
It spread like a real biological virus where in it affects another
computer.
This virus can be transferred by the use removable storage media
such as diskette, CD, Flash drives, memory card.
9. Hacker – This is the person who able to enter and control other
people’s computer without authorization.
A hacker is able to enter another’s computer, to steals personal
information, obtains intellectual property.
10 Commandments of Computer
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with people’s computer work.
3. Thou shall not snoop around in other people’s files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not use a copy software for which you have not paid.
7. Thou shall not use other people’s computer resources without
authorization.
8. Thou shall not appropriate other people’s intellectual output.
9. Thou shall think about the social consequences of the program you
write.
10. Thou shall use a computer in a way that show consideration
and respect.

The empowerment technology project has successfully leveraged digital tools


and resources to enable individuals and communities to access information,
acquire skills, and engage in opportunities for personal collective
development. Through innovative initiatives and strategic partnerships, the
project has contributed to bridging digital divides, promoting inclusivity, and
fostering empowerment among marginalized groups. As a result,
participants have gained increased economic prospects, amplified their
voices, and contributed positive social change. Moving forward, it is
imperative to sustain and expand the impact of the empowerment
technology project, ensuring that its benefits continue to reach those in
need and that digital empowerment remains a catalyst for creating more
equitable and inclusive societies.

To our wonderful teacher, I want to say thank you or teaching me all about
how technology can empower us. Your guidance and patience have helped
us learn so much, and I appreciate all the knowledge and skills you’ve
shared with us. You’re an amazing teacher and mentor, and I’m grateful for
all you’ve done to inspire and empower us. Thank u so much!
https://www.techopedia.com/definition/24152/information-and-
communication-technology-ict
https://app-of.readspeaker.com/cgi-bin/rsent?
customerid=8452&lang=en_au&readid=main&url=https%3a
%2fschools.au.reachout.com%2farticles%2fbenefits-of-internet-and-social-
media
https://pin.it/M3tsaTu
https://www.google.com/imgres?imgurl=https%3A%2F %2 Fwww . investopedia . com
%2 Fth mb% 2 FweGsBJccy4 Nk8 B 0 TqguF0 p 6 NYUc% 3 D % 2 F 1 5 0 0 x 0 % 2 Ffilters
% 3 Ano_ upscale( ) % 3 Amax_bytes(150000)%3Astrip_icc()
%2FNetflishphishingscamemail 2 f 6 3 4 e 8 5 9 6 b 1 4 a 6 4 8 8 2 a 4 6 d 1 4 5 7 7 ed1 3 . jpg& tbnid= 7 f
npuWWpC1 JquM& vet= 1 & imgrefurl= https %3A%2F%2 Fwww . investopedia . com
%2 Farticles %2 Fp ersonal finance%2F040115%2Fwatc - out - these - top - internet -
scams. asp& docid= loSsB6 cUYTn8 rM& w = 6 4 8 & h = 7 5 8 & hl= en- US& gl= US& source= sh
%2 Fx%2 Fim%2 Fm1%2F2& kgs=d1382 5c4b2a306 fe

https://www.spot.ph/newsfeature/humor/63240/10-snoopy-replies-to-
text-scams
Jeric F. Bartolome
Caren Mae B. Domingo
Grade/Section: 11-Everlasting
Grade/Section: 11-Everlasting
Address: Gulon, Poblacion,
Address: Lower Duli,
Ambaguio, Nueva Vizcaya
Camandag, Asipulo, Ifugao
Moto: “You don’t play against the
Moto: In the End We Only Regret opponents, you play against the
game of basketball” Bobby Knight
the Chances We Didn’t Take

You might also like