You are on page 1of 34

SENIOR HIGH SCHOOL

EMPOWERMENT TECHNOLOGIES

SELF-LEARNING PACKAGE
Information and Communications Technology

Quarter 1

SHS—Empowerment Technology
Competency: ICT Applications, Online Research, Safety, Security and Ethics
(CS_ICT11/12-ICTPT-Ia-b-1 )

1
Empowerment Technology – SHS
Self-Learning Package
Information and Communications Technology
First Edition, 2020

Published in the Philippines


By the Department of Education
Schools Division of Iloilo
Luna Street, La Paz, Iloilo City
SCIENCE
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Quarter 1| Lesson 1
This Self-Learning Package is published to be utilized by the Schools Division of
Iloilo.

ALL RIGHTS RESERVED. No part of this learning resource may be reproduced or


transmitted in any form or by any means electronic or mechanical without written
permission from the Schools Division of Iloilo.

Development Team of Self-Learning Package

Writer: Joelyn M. Briaga


Illustrator: Armand Glenn S. Lapor

Layout Artists: Lilibeth E. Larupay, Armand Glenn S. Lapor, Zaldy M. Tondo


Emmanuel S. Sasi

Reviewer: Zaldy M. Tondo

Division Quality Assurance Team: Lilibeth E. Larupay, Zaldy M. Tondo


Armand Glenn S. Lapor

Management Team: Dr. Roel F. Bermejo, Dr. Nordy D. Siason


Dr. Lilibeth T. Estoque, Dr. Azucena T. Falales
Ruben S. Libutaque, Lilibeth E. Larupay
Zaldy M. Tondo

SHS—Empowerment Technology
Competency: ICT Applications, Online Research, Safety, Security and Ethics
(CS_ICT11/12-ICTPT-Ia-b-1 )
2
Introductory Message
Welcome!

The Self-Learning Package for Senior High School is developed to guide you
our dear learners to meet the standards set by the K to 12 Curriculum.

The Self-Learning Package aims to guide our learners in accomplishing activi-


ties at their own pace and time. This also aims to assist learners in developing and
SCIENCE
achieving the lifelong learning skills while considering their needs and situations.

For learning facilitator: Quarter 1| Lesson 1


The Self-Learning Package is developed to address the current needs of the
learner to continue learning in the comforts of their homes or learning centers. As the
learning facilitator, make sure that you give them clear instructions on how to study
and accomplish the given activities in the material. Learner’s progress must be
monitored.

For the learner:

The Self-Learning Package is developed to help you, dear learner, in your needs
to continue learning even if you are not in school. This learning material aims to
primarily provide you with meaningful and engaging activities for independent
learning. Being an active learner, carefully read and understand to follow the
instructions given.

REMEMBER ….
To answer the given exercises, questions and assessment, USE your Activity
Notebook or Answer Sheet. When you are DONE, wait for the teacher/volunteer to
collect your activity notebook/ answer sheet.

Good luck and God bless.

SHS—Empowerment Technology
Competency: ICT Applications, Online Research, Safety, Security and Ethics
(CS_ICT11/12-ICTPT-Ia-b-1 )
3
SELF-LEARNING PACKAGE IN
EMPOWERMENT TECHNOLOGY
ICT Applications, Online Research, Safety, Security and Ethics

Learning Competency:

Compare and contrast the nuances of varied online platforms, sites,


and content to best achieve specific class objectives
or address situational challenges
(CS_ICT11/12-ICTPT-Ia-b-1 )

Apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks
(CS_ICT11/12-ICTPT-Ia-b-2)

Use the Internet as a tool for credible research and information gathering to
best achieve specific class objectives or address situational challenges
(CS_ICT11/12-ICTPT-Ia-b-3)
4
Information and Communication Technology

Ready to Launch!

From the moment you were born as a Generation Z learners, you were
surrounded by technology. You are surrounded by ICT.
Information and Communication Technology (ICT) deals with the use of
different communication technologies such as mobile phones, telephone, In-
ternet etc.. To locate, save, send, and edit information.
ICT plays an integral part in our lives and in all aspects of our society,
that’s why it is essential for you to improve your knowledge on how ICT af-
fects your daily life and the state of the nation.

Aim at the Target!

At the end of this lesson, you should be able to:


• improve your knowledge on how ICT affects your everyday life and the
state of our nation;
• compare and contrast the differences between online platforms, sites,
and content;
• understand the features of Web 2.0;
• understand the future of the World Wide Web through Web 3.0; and
• learn the different trends in ICT and use them to their advantage.

Try This!

Multiple Choice: Choose the letter that corresponds to the correct answer.
Write it in your EmTech notebook or answer sheet.

______1. How could Information and Communication Technology or ICT helps


in the field of Education?
A. Use of computerized fitness programs, gadgets, and equipment.
B. Shops and supermarkets use software which calculates the bills
and efficiently processes both cash and credit transactions.
C. Students use computers and cellphones for online learning at
their own pace.
D. None of the above

5
____2. Which webpage allows you to interact with other users?
A. Static
B. Dynamic
C. Semantic
D. None of the above

____3. Why is it that a smartphone is considered as an example of technologi-


cal convergence?
A. It provides functionality of various individual separate and different
devices now available in one gear.
B. It provides internet-based reading service for persons with visual and
reading impairments.
C. It has dominated sales growth of the digital world, outspacing laptops
and personal computers
D. None of the above

____4. Which of the following online platform or applications can you use to
create online presentation?
A. Facebook
B. MS PowerPoint
C. WordPress
D. None of the above

____5.How could Information and Communication Technology or ICT helps in


the field of Space Exploration?
A. Pilots are trained using software which simulates flying.
B. Computers on board spacecraft are equipped with camera, video, and
other sensors that send vital data back to earth.
C. Computers are used to guide weapon systems from any source and
pinpoint targets with precision and accuracy.
D. None of the above

____6.Which of the following is an example of Static Web page?


A. https://shopee.ph
B. https://www.facebook.com/
C. https://www.coca-colacompany.com/
D. None of the above

____7.Which of the following social media sites that allows users to microblog
or broadcast short messages called “tweets”?
A. Twitter
B. Instagram
C. Snapchat
6
_____8. Which of the following online platform or applications can you use to
edit photos?
A. Pinterest
B. Flickr
C. Adobe Photoshop
D. None of the above

_____9. Which of the following is an example of Dynamic Web page?


A. https://www.samsung.com/ph/
B. https://www.youtube.com/
C. https://www.coca-colacompany.com/
D. None of the above

_____10. Why do you think smartphones outpaced laptops and personal com-
puters?
A. It is an integration of various technologies rolled into one
B. It allows people to capture, write, share, and communicate to anyone
and anywhere as long as there is Internet connectivity or cellular sig-
nal.
C. It has also been used as game console, in watching videos, and in lis-
tening to music
D. All of the above

Keep This in Mind!


Activity

Answer the following honestly. Write your answers in your notebook/answer sheets.

1. Do you check your smartphone right after waking up?

2. How many status updates have you posted in Facebook and Instagram?

3. How many hours do you spend playing online computer games a day?

4. Do you follow a celebrity via his/her Youtube or Tiktok account?

If you happen to be “guilty as charged” in


most of these questions,
chances are, you are a DIGITAL NATIVE.
And chances are, from the moment you were born,
you were surrounded by technology.
You are surrounded by ICT.

7
Keep This in Mind!

Information and Communication Technology (ICT)


Those technologies which enable society to create, collect, consolidate,
communicate, manage, process information in multimedia and various digi-
tal formats for different purposes by using telecommunication techniques.
It is an umbrella term that includes any communication device, encom-
passing radio, television, cell phones, computer and network hardware, satel-
lite systems and so on, as well as the various services and appliance with
them such as video conferencing and distance learning.

ICT in the Context of Global Communication

ICT plays an important part in our lives and in all aspects in our socie-
ty. ICT has become the main method of communication, getting information
and education, attaining services from businesses, hospitals, utilities, gov-
ernment, purchasing products and services, doing personal and business
transactions, and expressing social advocacies and awareness.

EDUCATION
• Modern homes have computers for research and learning by students
and the family for school lessons.
• Computers in schools are used for fast, easy and effective instruction
and learning.
• Courses on the internet called Online Instructions are available to
learn various lessons.
• Libraries are now equipped with computers to organize books and to
expand references.
• Students use computers to type reports, do their assignments, and
communicate with teachers.

TELECOMMUNICATIONS
• Computers in homes, schools, private and government offices, hospi-
tals, and almost everywhere are used to get in touch with other peo-
ple. Everyone uses the computer to send messages and other infor-
mation all over the world, Computers are used to send letters, pic-
tures, video clips, and music.
• Computers are also in the mobile phone communications to control
calls and SMS (short message service) or text traffic.
• VoIP (Voice over Internet Protocol) is a voice communication applica-
tion via the internet, which costs less than traditional means.

8
COMMERCE
• Shops and supermarkets use software which calculates the bills and
efficiently processes both cash and credit transactions. Online shop-
ping continues to grow in popularity since it provides a lot of choices
for items and pricing from various sources, as well as the conven-
ience of doing everything at home or place where you would rather

SPORTS and RECREATION


• There are simulation software where athletes can practice their
skills, and the computer will identify the flaws in their techniques.
• Use of computerized fitness programs, gadgets, and equipment.
• Computers in television stations and movie outfits are used by Mov-
ie Directors to create special effects for TV and movies, to make
watching movies exciting and truly entertaining.
• Computers at home are used to play games, listen to music

ARTS, DESIGN, and MUSIC


• Image and graphics design, photo editing, and music arrangements.
• Music and videos are shared online by their creators and can be
downloaded for free or for a fee
MEDIA and VISUAL ARTS
• Architecture , interior design, and landscape architecture.
• Animation, web design, and mobile designs.
• Photography, film making, audio and video.

HEALTH SERVICES
• Computers in hospitals are used by doctors to store medical data,
patients’ records, research materials, and other information to effec-
tively diagnose and treat patients.
• Online health information and consultations are now available on
the internet .
• Computers in operating rooms assist doctors perform microsurgery
with accuracy and better chances of success.
• Computers are used in hospitals to monitor the patients’ condition.
These computers send out alarm signals whenever the patients’
condition becomes critical, so doctors and nurses can attend to
them immediately.
• Emails are used extensively to communicate with the doctors

SCIENCE and RESEARCH


• Modern laboratories have computers used by chemists to invent
materials, medicine, and products to improve life.
• Physicists look for new renewable, safe and affordable power sources
using computers.
• Mathematicians solve complex problems with the use of super fast
computers.
• Investors design and test their products in the computer

AGRICULTURE
• Computers are used in research, monitoring to improve agriculture,
crop, and animal production, care and management.
• Food processing and packaging.

9
TRAVEL and HOTEL BOOKINGS
• Airline fares and tickets are now paid online; hotel and housing are
also reserved using the internet, and even ship travels are also booked
online.
• Travel routes and maps can be downloaded to your PDAs or print
maps to ensure you will travel faster and not get lost on your trip.
• Computers in airports are used by air traffic controllers to control and
schedule take-off and landing of planes, to ensure safety.
• Cars, boats, and other gadgets are equipped with navigational aids

BUSINESS and ACCOUNTING


• Computers in groceries are used by cashiers to store prices of goods,
determine inventory of goods, and locate the goods in the store.
• Computers in the offices are used to store daily business deals and
transactions.
• Call centers use computers to record received or transmitted large
volume of requests by telephone to administer incoming product sup-
port or information inquiries from consumers or telemarketing.
• Accounting process is done using computers

MANUFACTURING INDUSTRIES
• Automobiles and other vehicles are manufactured using computer-
aided machineries and robots; this is called computer-aided manufac-
turing (CAM). CAM is a programming tool that helps produce better
products faster and cheaper with precision and accuracy.
• Computers in manufacturing also manage raw materials, suppliers,
costs, and inventory.
• Computers in industry are also used to design new and better ma-
chines, test them in the computer before they are manufactured.
• Some industries are fully automated, meaning all the processes are
being done by robots under computer control such as in car manufac-
turing, book publishing, and in some electronic fabrication.

BANKING
• Almost all of our financial transactions are done by computer soft-
ware . They provide ease, security, speed, and convenience.
• Banks use computers so that people can get and deposit money at any
time of the day. They can also use computers to record customers’
account information. Computers help banks do business away from
their location, example of which is the ATM.

MATHEMATICS
• Computerized calculations in the creation of buildings, machines,
bridges, airplane, and radio communications.
• Solve differential equations and advanced numerical algorithms to
solve the equations on high performance computers.
• Software can help simulate data and demonstrate it using stat graphs.

WEATHER ANALYSIS
• There are supercomputers used to analyze and predict the weather of
the day. Data gathered from weather satellites will be calculated by
these computers to give the wind direction, wind velocity, volume of
rainfall, and other important weather information.

10
ENGINEERING and ARCHITECT
• Architects design houses, buildings and bridges using Computer
Aided Design (CAD) programs which is a lot faster and presentable.
• Civil Engineers use computers to calculate the strength of footing
and foundations of a building.
• Electrical Engineers design and determine electrical power require-
ments of buildings and houses.
• Mechanical Engineers use computer in their work to design and
build machineries and vehicles such as cars, boats and airplanes

SPACE EXPLORATION

• The national Aerotics and Space Administration (NASA) in the


U.S.A. uses computers in spacecraft to explore planets and other
heavenly bodies.
• Computers are likewise used in Earth control stations for the space-
craft and satellite on mission.
• Computers are also used on satellites and control stations to moni-
tor weather, transmit voice and data, and other applications around
the world.

MILITARY APPLICATIONS
• Computers are used to guide weapon systems from any source and
pinpoint targets with precision and accuracy .
• Computers on board mechanical vehicles are used to locate and
diffuse bombs.
• Computers control unmanned airplanes, or drones to locate enemy
locations, and deliver firepower when necessary.
• Computers use software embedded in many modern weapons to
ensure accuracy and precision. Computers also process valuable
information or intelligence especially impending terrorist attacks

Stages of the World Wide Web (WWW)

Web 1.0: Static Web Pages

The first stage of the World Wide Web (WWW) in comparison with the present stage of
the internet technology. Static (also known as flat page or stationary page) in the sense
that the page is “as is” and cannot be manipulated by the user. The content is also the
same for all users.

Web 2.0: Dynamic Web Pages

This was the beginning of the wide use as popularity of the social media such as Twit-
ter, Facebook and Youtube. The users can now interact, contribute and create their
own internet space and content resulting in the explosion of information available for
everyone on the net.

11
Web 3.0: Semantic Web Pages
The aim of 3.0 is to have machines (or servers) understand the user’s prefer-
ences to be able to deliver web content specifically targeting the user. This is through
studying personal preferences of an individual user and showing results based on
those preferences. The Internet is able to predict the best possible answer to your
question by “learning” from your previous choices.
For example, you have purchased several shoes online, the Internet will give you
results on the best place with the highest rated shoes around your vicinity.

Trends in ICT
As the world of ICT continues to grow, the industry has fo-
cused on several innovations. These innovations cater to the
needs of the people the benefit most out of ICT. Whether it is for
business or personal use, these trends are the current front run-
ners in the innovation of ICT.

Technological Convergence
An evolution of technological developments that merge into a new system bring-
ing together different types of applications and media. The smartphone is an example
of technological convergence as it provides functionality of various individual separate
and different devices now available in one gear. The smartphone can function as a tel-
ephone, camera, radio, TV, and gaming console. All of these tasks were once only
available and useable on a singular and different gadget.

Social Media

A collection of inter-based communication tools and computer-assisted channels


dedicated to allow users to interact, communicate, and share information in a virtual
community and network.
There are six (6) types of social media:
a. SOCIAL NETWORKS. These are sites that allow you to connect with other people
with the same interests or background. Once a user creates his or her account, he
or she can set up a profile, add people, create groups, and share content. Exam-
ples: Facebook and Google+
b. BOOKMARKING SITES. These are sites that allow you to store and manage links
to various websites and resources. Most of these sites allow you to create a tag
that allows you and others to easily search or share them. Examples: StumbleUpon
and Pinterest
c. SOCIAL NEWS. These are sites that allow users to post their own news items or
links to other news sources. The users can also comment on the post and com-
ments may also be ranked. They are also capable of voting on these news articles
of the website.
12
Those who get the most amount of votes are shown prominently. Example: red-
dit and Digg
d. MEDIA SHARING. These are sites that allow you to upload and share me-
dia content like images, music, and video. Most of these sites have addi-
tional social features like liking, commenting, and having user profiles.
Examples: Flicker, Youtube, and Instagram.
e. MICROBLOGGING. These are sites that focus on short updates from the
user. Those subscribed to the user will be able to receive these updates.
Examples: Twitter and Plurk
f. BLOGS AND FORUMS. These websites allow users to post their content.
Other users are able to comment on thes said topic. There are several free
blogging platforms like Blogger, Wordpress, and Tumblr. On the other
hand, forums are typically part of a certain website or web service.
Mobile Technologies
With the growing mobile media, the smartphone has dominated sales
growth of the digital world, outspacing laptops and personal computers.
Smartphone is an integration of various technologies rolled into one, such as
the cellular phone, PDA (portable digital assistant), photo, and video camera.
The inherent portability and reduced size of the smartphone allow people to
capture, write, share, and communicate to anyone anywhere as long as there
is an Internet connectivity or cellular signal.

Assistive Media

A nonprofit service designed to help people who have visual and reading
impairments. A database of audio recordings is used to read to the user. You
may visit http://www.assistivemedia.org./ for several of their audio record-
ings.
Analysis
Answer the following in your answer sheets:

1. Define ICT.
2. What are the roles of ICT in our community?
3. Differentiate Static Web page from Dynamic Web page.
Give atleast two (2) examples of Static websites and two (2)
examples of Dynamic websites.
4. List down and explain the use of the different trends in ICT.
5. List down and explain the use of the different types of Social Media. Give one
example for each type of social media.

13
Abstraction and Generalization

The online platform in the use of ICT makes it easier for the users to interact, to
collect, and use data from the users’ interactions for their own particular needs.

PHOTO
PRESENTA-
NEWSLETTER, PHOTO UPLOADING & ONLINE
ICT CONTENT EDITING COLLABORA-
TION TOOLS PLATFORMS HOSTING
TOOLS TOOLS TIVE TOOLS

• Prezi • Dropbox • Picasa • DropBox, • Google Drive


• Zoho Show • Tumblr • Adobe Pho- • Flickr • Viber
• MS Power- • Wix toshop • Facebook
point • MS Paint

CLOUD BLOG TOOLS MAPPING MUSIC SURVEY &


COMPUTING TOOLS PRODUCTION FORMS

• DropBox • Blogger • Google Maps • Sibelius • Google Forms


• Google Drive • WordPress • Wikimapia
• MS One Drive • LiveJournal

ICT PROJECTS & CONTENT


CONTENTS
MANAGEMENT FILE CURATING WEB
PUBLISHING & MANAGEMENT TOOLS DESIGN
UPLOADING SYSTEMS
PLATFORMS PLATFORMS
PLATFORMS PLATFORMS

• WordPress • Wordpress • Zamzar • Pinterest • Wix


• MS Office • Drupal • Word2pdf • Storify • Weebly
Project Server • Joomla • Trapit • Adobe
• File Manager Dreamweaver

14
Application

Look for ten websites and classify them as static or dynamic.


What makes each website static or dynamic?
Use the table below. Do this in your answer sheet.

Website URL Static Dynamic Reason

Reflect
Compose an insightful reflection paper on the nature of
ICT in the context of your life, society, and professional tracks
(Arts, Tech-Voc, Sports, or Academic).
Write your answers in your answer sheet.

15
Reinforcement and Enrichment
Identifying the Correct Web Platform for Social Change
 Identify a problem in your community (e.g., littering, garbage disposal,
blocked drainages, etc.)
 Imagine that you are going to create a website to persuade both commu-
nity leaders and members to solve this problem.
 Fill-out the form below. You may refer to the sample provided after the
form.

Do this activity in your answer sheet


Community Problem:
Vicinity:
Campaign Name:
Type of Social Media Used:
Website Used:

What will be the content of your social media?

Why did you choose that type of social media?

Why did you choose that website?

16
Sample

Community Problem: Severe flooding during rainy days due to blocked drainages
Vicinity: J.P Laurel St., Poblacion North, Oton, Iloilo
Campaign Name: “Anti-flooding Movement”
Type of Social Media Used: Blogging
Website Used: WordPress

What will be the content of your social media?


It will contain pictures of the flooded are during rainy days. It will also contain pictures of
the drainages that are blocked with garbage. I also plan to update it every once in a while.
Anyone who views the site will be able to comment on these updates.

Why did you choose that type of social media?


People in my community are avid readers of blogs. Most of them follow several blogs that
concern the community.

Why did you choose that website?


Wordpress, unlike other blogging platforms, has a more “serious feel” to it. It also contains
professional-looking templates that will fit the serious tone of my campaign.

Assess Your Learning

I. Pick Me Up! Match the terms inside the box with their descriptions below.
Write your answers in your answer sheet.

a. STATIC e. SOCIAL MEDIA


b. DYNAMIC f. MOBILE TECHNOLOGIES
c. SEMANTIC g. ASSISTIVE MEDIA
d. TECHNOLOGICAL CONVERGENCE h. ONLINE PLATFORMS

17
1. A web page that allows interaction from the user.
2. This media is designed to help people who have visual and reading
impairments.
3. An evolution of technological developments that merge into a new system
bringing together different types of applications and media.
4. Makes easier for the users to interact, to collect, and use data from the
user’s
5. A collection of Internet-based communication tools and computer assisted
channels dedicated to allow users to interact, communicate, and share infor-
mation in a virtual community network.

II. Multiple Choice: Circle the letter that corresponds to the correct answer.

6.How could Information and Communication Technology or ICT helps in the


field of Military applications?
A. Pilots are trained using software which simulates flying.
B. Computers on board spacecraft are equipped with camera, video, and other
sensors that send vital data back to earth.
C. Computers are used to guide weapon systems from any source and pinpoint
targets with precision and accuracy.
D. All of the above

7. Which of the following types of social media that allow you to upload and
share media content like images, music, and video?
A. Microblogging C. Media Sharing
B. Bookmarking Sites D. All of the above

8. Which of the following online platform or applications can you use to collab-
orate online with your classmates and teachers?
A. Picasa C. Google classroom
B. Google Maps D. All of the above

9. Why do you think more and more advertisers use social media to promote
their product?
A. It allow you to create specific target audiences.
B. Internet users spend more time in social media sites than any other types of
sites.
C. Advertisers need the platforms to be able to raise awareness about their
product, service and company
D. All of the above

10. Is Web 1.0 (Static web pages) obsolete?


A. YES because Web 2.0 (Dynamic web pages) came to the picture.
B. NO because there are some websites that sell specialized products that may
not have any business need to interact with the users.
C. Maybe because of Web 3.0 (Semantic web pages)
18
Safety, Security, and Ethics
Ready to Launch!

The Internet, truly, is a powerful tool. It can be used to promote your business,
gain new friends, and stay in touch with the old ones. It is also a source of entertain-
ment through games, online communities, and everything in between.
The Internet is defined as the information superhighway. This means that
anyone has access to this highway, can place information, and can grab that infor-
mation. Any information, even things that you have set privately, can be accessed one
way or another.
This is why the Internet is one of the most dangerous places, especially if you
do not know what you are doing with it. But there is no need to worry; hopefully, by
the end of this lesson, you are able to consider how you go about your use of the In-
ternet.

Aim at the Target!


At the end of this lesson, you should be able to:
• consider one’s and others’ safety when sharing information using the
Internet; and
• consider one’s and others’ reputation when using the Internet;

Try This!

PRE-ASSESSMENT
Write Yes if you agree with the statement and No if you disagree. Write
your answers in your answer sheet.

______1. My computer has an antivirus so it is okay to open most email at-


tachments like e-cards and video files.

______2. Your friend told you that his college application was rejected due to
the fact that you posted a video of him doing crazy stuff at a party.
You posted the video several years ago but later took it down to pro-
tect your friend’s reputation. Can your friend be right that the
college found the video?
19
______3. You and your best friend play a lot of video games. One time, she ask
you for your password so she can help you level up and get in a
game money. She promises to keep your password a secret. Is it
okay to give away your password?

______4. You received an email stating that your mother’s bank account is go-
ing to be forfeited if you do not respond to the email. Is it safe to re-
ply?

______5. You forgot that your essay for English class is due tomorrow. While
doing your research, you found a website offering free essays. Is it
okay to use the essays from this free essay website?

______6. Email Spoofing has the ability to monitor what you are currently do-
ing and typing through keylogging.

______7. Spyware is a person who is able to enter and control other people’s
computer without authorization.

______8. Firewall helps in protecting your computer from unauthorized en-


tries, viruses, or worms from the internet or network.

______9. There is a danger in posting information about a future vacation.

______10. Letting people know your birthday is probably a must if you want to
get as many gifts as possible. But having it in your profile makes you
vulnerable to identity theft.

Keep This in Mind!

How many hours do you spend on the Internet


per day? Can you live without the Internet?

As Gen Z learners, you are all exposed to many


things powered by the Internet. Whether it is social-
izing, playing games, reading sports news, shopping,
etc. Because of this, do you not think that it is also
important to wield this powerful tool properly?

To maximize the Internet’s merits, both its ad-


vantages and disadvantages should be paid atten-
tion to.

20
Dangers on the Internet

Email Spam • Also known as junk email, it is usually unsolicited commercial


email sent from one source with identical message sent to multiple
recipients.
• Spamming is projected to continue because it is a cheap means of
advertising.
Email This refers to deceitful email practice in which the sender address is
Spoofing changed, so that it would appear to have come from a different source
usually someone you know.

Phishing It is usually done by email or other similar means using a popular


entity such as Microsoft, Yahoo, Google, Amazon, and financial insti-
tution to lure you to their website. Internet users would think that
they are accessing a genuine website through this way, a phisher
would be able to gather sensitive information from internet account
user.
Pharming • This is a dangerous hacker attack on a website which directs all
traffic to that web site to another fictitious website
• A more complicated way of phishing where it exploits the DNS
(Domain Name Service) system.

Spyware •This is a computer program that is installed convertly on a personal


computer to collect information or even take control over the com-
puter without the knowledge of the user.
•It has the ability to monitor what you are currently doing and typing
through keylogging.

Computer This is a dangerous computer program that replicates itself through a


Worm network. Some worms delete files, others disrupt the network func-
tion and still, others send junk mail from infected computer.

Trojan •This is a form of a malicious software (malware) fronting to perform a


Horse good task, but convertly performs undesirable function with the in-
tention of entering the computer without the user’s content.

Computer This is a program that duplicates itself and then infects the comput-
virus er. It spreads like a real biological virus, wherein it attaches itself to a
host program and infect other computers if it is received by a comput-
er through the internet.

Hacker • This is a person who is able to enter and control other people’s com-
puter without authorization.
• Firewall are able to prevent entry by hackers.

21
Microsoft Windows has security features that
determine who can use and have access to
your computer.

1. Changing and Adding User Accounts


- Windows operating system provides
user accounts in your operating system
to determine and manage the different
kinds of users in one computer. This is to
ensure the security and privacy of each
user who will use the computer.

To open the user accounts:


1. Go to Control Panel
2. Look for “User Accounts” icon
3. In the User Accounts window, you
will see tasks that you can do with
your account.

2. Creating a Secure Password


- The password that you create should be at least eight characters which could
be a combination of uppercase and lowercase letters, symbols, and numbers. A secure
password ideally should not be a real word that anyone can easily guess. Make sure to
remember the password by writing it and keeping it in a safe place or creating a pass-
word hint

3. Screen Saver Security


- Most operating systems has a feature that allows you to lock the computer
even when the computer is in a screen saver mode. This means that, even if your com-
puter is open, no one will be able to access your computer account from screen saver
mode.

22
4. Security Center
- Is the place where you can set additional protection from threat to
your computer, especially when using the Internet. The following are the
three important security settings available:
1. Firewall Helps in protecting your computer from unauthorized entries, vi-
ruses, or worms from the internet or network. It is recommended
that you keep this setting turned on.
2. Automatic It is another feature of windows which when turned on will auto-
Updates matically download updates from Microsoft Windows website.
Many of the updates coming from Microsoft are usually meant to
update some Windows feature, secure areas of vulnerability, fix
any bugs in the operating system, and others.

3. Virus It is usually about the current antivirus software installed in your


Protection computer; this option is recommended to be turned on always.
Antivirus software is meant to locate, find, and remove virus
threats that are already in your computer.

Online Ethics and Etiquette


Unlocking the power of the Internet is an awe-
some responsibility. In exchange for the keys to cy-
berspace, netizens or cyber citizens have responsibili-
ties.
Here are some netiquettes (net + etiquette) or
proper behavior to be observed in cyberspace:
1. Be mindful of what you share online and what site you
share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the websites handles
the information you share.
4. Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/WIFI.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, “Rob my
house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.

23
Analysis
Answer the following. Write it in your answer sheets.

1. Why is it Internet was defined as the information


superhighway?

2. How could you say that Internet is a powerful tool?

3. What are the risks if the Internet was not wield


properly ?

4. How can you protect your reputation online?

Abstraction and Generalization

Cybercrime
- a crime committed or assisted through the use

A digital footprint is a trail of data you create while using


the Internet. It includes the websites you visit, emails you
send, and information you submit to online services.

Application

Visit a social networking site and look for the


site’s privacy policy. The link is typically found at the
bottom of the page and sometimes labeled only as
“Privacy.” Write a summary on how the website han-
dles both your private and public information.

Write it in your answer sheet.

24
Reflect

Through social media (Facebook, Messenger, Twitter), interview at least


ten students on why software piracy continues to exist in the Philippines.
After the interview, tally the answers and present the result to your teacher
in the form of an essay. Do this in your answer sheet

Reinforcement & Enrichment

Create a campaign material promoting “Think Before You Click.” It could


be in a form of poster, infographic, song, or poem that can be post on social
media like Facebook and Youtube. This campaign is an awareness program
for the younger program for the younger batches of your school.
“Think Before You Click” are the things you might want to consider be-
fore posting something over the Internet.
Please make sure to create on your own and not to copy from the Inter-
net.

Assess Your Learning

Right or Wrong?
Direction: Read and understand each question carefully. Put a check
mark if the statement is right and a wrong mark (X) if the statement is
not right. Write your answers in your answer sheet.

_____1. Cybercrime refers to online or Internet-based illegal acts.


_____2. The use of passwords can allow unauthorized access.
_____3. Large companies use firewalls to deny network access to outsiders.
_____4. Hackers are computer intruders.
_____5. When online, express yourself carefully so that you will not be misin-
terpreted.
_____6. You do not need to cite your Internet sources since the chance of get-
ting caught is very slim.
_____7. If somebody disagrees with you and sends you an angry message,
the best defense is to attack back.
_____8. Never give out personal details about yourself, like your home ad-
dress or phone number.
_____9. Point out the error in spelling and grammar of everyone on the Inter-
net.
_____10. There is a danger in posting information about a future vacation.
25
Online Research
Ready to Launch!

The World Wide Web is a wonderful resource for young researchers like
you, but there are new skills to be learned about how and when to use it. This
is where your research planning will be important.

Aim at the Target!

At the end of this lesson, you should be able to:


• search the web for information
• evaluate information you get from the web;
• browse the Internet efficiently; and
• Copyright law

Try This!

Instruction:
Copy the word search
and encircle the answers
in your answer sheet.

Find the following words:


Online
Research
Satire
Copyright
Google
Bing
Computer
FairUse

26
Keep This in Mind!
Practice makes perfect is also applicable in en-
hancing your research skills. The more you do it, the
better you will be able in doing research work. Enhanc-
ing research skills is important as a student for your as-
signments and papers as it is when you graduate and
work for a company. Good researchers are valuable in
enhancing academic excellence, as well as work skills in
the future.

Online Research
- is a research method that involves the collection of
information from the internet.

Using Search Engines


There are millions of documents on the web, published by specialists,
scientists, teachers, and students. Some information on the web are relevant
to your search, while others are not. Luckily there are search engines you can
use to locate the information you want.
A search engine is a program that helps
you find web pages about certain topics or lo-
cate specific web pages. List of the 10 best
search engines in 2020, ranked by popularity:
1. Google 6. DuckDuckGo
2. Bing 7. Ask.com
3. Yahoo 8. Ecosia
4. Baidu 9. Aol.com
5. Yandex 10. Internet Archive

The information that we need is more likely already in the Internet. It


is just a matter of how to look for it and how to use information from the
most credible source. Here are some skills that are important in advancing
one’s ability to obtain vital information on the Internet:

1. Critical The ability to digest, reflect, and conclude from the infor-
mation researched.
Thinking
2. Analytical The ability to look, verbalize, conceptualize, and gather data
Skill attuned to the context of the subject.
3. Problem The ability to present solutions or solve problems by pre-
senting a decision based on the given information.
Solving

27
4. Organized It is a well-planned design of the database of all the re-
Data Mining search materials either inside the computer or hard cop-
ies.
5. Research Part of a good research is writing skills, the ability to pre-
Presentation sent the ideas and draw conclusions from the research, be
able to explain in writing the purpose, steps, goals, and
objective of the research.
6. Creativity It is the ability to look for alternative solutions to the prob-
and Devel- lems needed to solve in the research and thinking not only
oped within the context but also beyond the usual approaches
Imagination to the research objectives.

7. Computer Knowledge of the various computer applications and tools


Literacy when working with large amount of data helps the re-
searcher manage these information.

Advanced Search. The best way to filter information you get from search en-
gines is by using the advanced search. This will allow you to filter out infor-
mation you do not need.

Steps in Using Advance Search:


1.Open the Google site, on the upper right side of the window,
click the Google Apps icon and click Search

2. On the lower right part of the window, click Settings and the Google Search
Settings pop- up list will appear.

3. Click Advanced search and the Advanced Search window will appear.

28
4. Type the keywords that you would like to search and click the Advanced Search
Button.

Identifying Good Source from Satirical Source

Satirical sites are websites that report untrue or false stories meant to amuse or en-
tertain. These sites take their cue from TV shows that report exaggerated news that
are untrue but intriguing and funny.

How to detect satirical news?

1 2 3
If it is too good to be If they are from known If the news did not
true, then it must be so. satirical sites. emanate from reliable news site.

Example of satire news:

adobochronicles.com One of their most famous articles: “the United


States exempting
Filipinos from getting visas to enter the country.”
The article became viral, prompting the US Embassy in
Manila to issue an official statement denying the "news."
29
As a responsible user of the Internet, you have to
consider that not everything out there is free for you to
use. Just like your own, contents that you see from
websites have their respective copyrights. There are
several instances where employees or business owners
face copyright infringement and are sentenced to a
huge fine due to reckless copying of materials.

Copyright Infringement

If you create something—an idea, an invention, a form of literary work, or


a research, you have the right as to how it should be used by others. This is
called intellectual property.
The copyright law includes your rights over your work, and anyone who
uses it without your consent is punishable by law.
Here are some tips that could help you avoid copyright infringement:
1. Understand Copyright protects literary works, photographs, paintings, draw-
ings, films, music (and lyrics), choreography, and sculptures, but
it generally does NOT protect underlying ideas and facts.

2. Be responsi- Even if a material does not say that is copyrighted, it is not a valid
ble defense against copyright. Be responsible enough to know if
something has a copyright.

3. Be creative Ask yourself whether what you are making is something that
came from you or something made from somebody else’s creativi-
ty. It is important to add your own creative genius in everything
that will credited to you.
4. Know the law There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of the author) plus 50
years. There also provisions for “fair use” which mean that
an intellectual property may be used without a consent as long as
it is used in commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching, and educa-
tion.

Analysis
1. Aside from Google, what are the other search engines
you can use for your online research?
2. How can you identify if the information from the Inter-
net is a fact or a satirical?
3. Why is it necessary to be careful in copying materials
from the Internet?
30
Abstraction and Generalization
In Microsoft search engine, Bing, you can use certain keywords and
symbols for your advanced search:

Symbol Function

+ Finds web pages that contain all the terms that are preceded by the +
symbol; allows you to include terms that are usually ignored

““ Finds the exact words in a phrase

() Finds or excludes web pages that contain a group of words

AND or & Finds web pages that contain all the terms or phrases

NOT or - Excludes web pages that contain a term or phrase

OR or / Finds web pages that contain either of the terms or phrases

Application

Make a research about any topic you are interested


in and apply the research skill that you have learned.
Do this in your answer sheet.

Reflect

Do you agree or disagree with the provisions of the


copyright law? Defend your answer. Minimum of five
sentences. Write it in your answer sheet.

31
Reinforcement & Enrichment

Research for several news and events related to


cybercrime. Using your cellphone or any video-
recording device, report it as if you were a newscaster.
Present in 1-2 minutes recording.

Assess Your Learning

Matching Type: Match Column A with Column B. Write the letter of the cor-
rect answer on the space before each number. Write your an-
swers in your answer sheet.

A B

1. Intellectual a. A research method that involves the


property collection of information from the
internet
2. Copyright b. Websites that report untrue or false
stories meant to amuse or entertain.

3. Online Research c. A program that helps you find web


pages about certain topics or locate
specific web pages.
4. Satirical Sites d. Advanced Search

5. Search Engine e. A part of the law, wherein you have


the rights to your work, and anyone
who uses it without your consent is
punishable by law
f. Intangible creations of the human
intellect

32
References and Photo Credits

REX Book Store Empowerment Technologies ©2016


Empowerment Technology by Jemma Development Group ©2017
The Amazing World of Computers by Clifford P. Esteban
www.google.com
https://australianfintech.com.au/wp-content/uploads/2018/08/digital-age.jpg
https://www.piqsels.com/en/public-domain-photo-zbxwl
https://www.piqsels.com/en/public-domain-photo-jtzqh
https://gamingcentral.in/wp-content/uploads/2018/06/best-mobile-games-june-2018-2100x1200.jpg
https://www.digitalartsonline.co.uk/cmsdata/slideshow/3514561/adobe-fresco-recents.jpg
https://www.piqsels.com/en/public-domain-photo-fawsy
https://www.elsevier.com/__data/assets/image/0019/32077/Dr.-Jeane-Rimber-Indy.jpg
https://www.hashmicro.com/blog/wp-content/uploads/2018/01/2.5.jpg
https://www.ictsystems.com.pk/wp-content/uploads/2018/02/ICT-Information-Systems-LLC-
Accounting-Software-in-Dubai.jpg
https://encrypted-tbn0.gstatic.com/images?q=tbn%3AANd9GcRm-
lGmrElk2ye3vLg3eW86x0A6r33ew7gXpQ&usqp=CAU
https://chemonics.com/wp-content/uploads/2017/09/2017.08.09_Parrilla_ICT_1.jpg
https://pbs.twimg.com/media/DC-NglUUAAIqCY_.jpg
https://recruitingsocial.com/wp-content/uploads/2015/11/recruiting-veterans-feature.jpg
https://study.com/cimages/videopreview/videopreview-full/screen_shot_2016-03-
28_at_3.04.10_pm_113511.jpg
https://www.theschoolrun.com/sites/theschoolrun.com/files/u9/a_journey_through_space.jpg
https://worldairlinenews.files.wordpress.com/2019/10/shutterstock_1402142708-650x400.jpg?
w=625&h=385
https://s3.amazonaws.com/fuzu.com-carrierwave/course_images/display_b47a933c-9d7a-4d81-9ce3-
857498b00dc6.PNG
https://images.app.goo.gl/PCL6DSggtGLs62b36
https://i1.wp.com/3dadept.com/wp-content/uploads/2018/08/cec9ed6fe187c012b5e1bc677b3b.png?
resize=696%2C376&ssl=1
https://www.piqsels.com/en/public-domain-photo-jrxnu
https://www.needpix.com/photo/download/57767/google-search-engine-magnifying-glass-browser-search-internet-www-http-
web
http://www.psychwiki.com/wiki/What_are_the_advantages/disadvantages_of_doing_internet_research%3F
https://www.piqsels.com/en/public-domain-photo-jrxnu
https://www.needpix.com/photo/download/57767/google-search-engine-magnifying-glass-browser-search-internet-www-http-
web
http://www.psychwiki.com/wiki/What_are_the_advantages/disadvantages_of_doing_internet_research%3F

33
34
Answer Key
Information and Communications Technology
Try This! Assess your Learning
1) C I.
2) B 1) Dynamic Web page
3) A 2) Assistive Media
4) B 3) Technological Convergence
5) B 4) Online Platform
6) C 5) Social Media
7) A II.
8) C 6) C
9) B 7) C
10)D 8) C
9) D
10) B
Safety, Security, and Ethics
Try This! Assess your Learning
1) No 1) √
2) Yes 2) x
3) No 3) √
4) No 4) √
5) No 5) √
6) No 6) x
7) No 7) x
8) Yes 8) √
9) Yes 9) x
10) Yes 10) √
Online Research
Try This! Assess your Learning
Online 1) F
Research 2) E
Satire 3) A
4) B
Copyright
5) C
Google
Bing
Computer
FairUse

You might also like