Вы находитесь на странице: 1из 21

11

Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to Information
and Communication
Technologies and
Rules of Netiquette
Empowerment Technologies – G11
Quarter 1 – Module 1: Introduction to Information and Communication
Technologies and Rules of Netiquette
First Edition, 2020
Republic Act 8293, section 176 states that no copyright shall
subsist in any work of the Government of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e. pictures, photos, brand names, trademarks,


etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors
do not represent nor claim ownership over them.

Published by the Department of Education

Development Team of the Module


Compilers/Contextualizers: Wilfredo R. Tura Jr.
MT-1, Ramon Duterte MNHS
Mary Ann G. Landero,
T-1, Pit-os NHS

Editors/Reviewers:
Alice Ganar, Roy Guarin, John Paul Lesondato,
Marilou dela Cuesta, Daisy Von Dy,
and Florinda Geyrogaza
Management Team:
Dr. Rhea Mar A. Angtud
Schools Division Superintendent

Dr. Grecia Bataluna


Chief, Curriculum Instruction Division

Dr. Luis Derasin Jr.


EPS-Araling Panlipunan/SHS Coordinator

Mrs. Vanessa Harayo, LLB


EPS In-Charge of LRMS

Department of Education – Cebu City Division

Office Address: Imus Road, Brgy. Day-as, Cebu City


Telefax: ____________________________________________
E-mail Address: ____________________________________________
SHS

Empowerment
Technologies
Quarter 1 – Module 1:

Introduction to Information
and Communication
Technologies and
Rules of Netiquette
Introductory Message
For the facilitator:

Welcome to the Empowerment Technologies, Module 1 on Introduction to


Information and Communication Technologies and Rules of Netiquette!

This module was collaboratively designed, developed and reviewed by


educators both from public institutions to assist you, the teacher or
facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social, and economic
constraints in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore,
this also aims to help learners acquire the needed 21st century skills while
taking into consideration their needs and circumstances.

As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the
module.

For the learner:

Welcome to the Empowerment Technologies G11 Module on Introduction to


Information and Communication Technologies and Rules of Netiquette.

Empowerment Technologies is one of the contextualized subjects of the


Senior High School Curriculum. It is a tool for curating, collaborating, and
creating content and experiences for learning in the professional tracks. It
provides you with the foundation of knowledge and skills desired to succeed
in the networked world environments. It covers topics that build your
essential 21st century skills in working, collaborating, and creating contents
online.

The hand is one of the most symbolized part of the human body. It is often
used to depict skill, action and purpose. Through our hands we may learn,
create and accomplish. Hence, the hand in this learning resource signifies
that you as a learner is capable and empowered to successfully achieve the
relevant competencies and skills at your own pace and time. Your academic
success lies in your own hands!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and

2
time. You will be enabled to process the contents of the learning resource
while being an active learner.

This module has the following parts and corresponding icons:

What I Need to This will give you an idea of the skills or


Know competencies you are expected to learn
in the module.

What I Know This part includes an activity that aims


to check what you already know about
the lesson to take. If you get all the
answers correct (100%), you may decide
to skip this module.

What’s In This is a brief drill or review to help you


link the current lesson with the previous
one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such
as a story, a song, a poem, a problem
opener, an activity or a situation.

What is It This section provides a brief discussion of


the lesson. This aims to help you discover
and understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding
and skills of the topic. You may check the
answers to the exercises using the
Answer Key at the end of the module.

What I Have This includes questions or blank


Learned sentence/paragraph to be filled in to
process what you learned from the
lesson.

What I Can Do This section provides an activity which


will help you transfer your new
knowledge or skill into real life situations
or concerns.

3
Assessment This is a task which aims to evaluate
your level of mastery in achieving the
learning competency.

Additional In this portion, another activity will be


Activities given to you to enrich your knowledge or
skill of the lesson learned. This also
tends retention of learned concepts.

Answer Key This contains answers to all activities in


the module.

At the end of this module you will also find:

References This is a list of all sources used in


developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any
part of the module. Use a separate sheet of paper in answering the
exercises.
2. Don’t forget to answer What I Know before moving on to the other
activities included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through
with it.
If you encounter any difficulty in answering the tasks in this module, do
not hesitate to consult your teacher or facilitator. Always bear in mind
that you are not alone.

We hope that through this material, you will experience meaningful


learning and gain deep understanding of the relevant competencies. You
can do it!

4
Quarter 1 - Module 1, Week 1
Introduction to Information and Communication
Technologies and Rules of Netiquette
___________________________________________________________________________

Content Standard : The learners demonstrate an understanding of ICT in


the context of global communication for specific
professional track.
Performance : The learners shall be able to independently compose an
insightful reflection paper on the nature of ICT in the
Standard
context of their lives, society, and professional tracks
(Arts, Tech Voc, Sports, Academic).
Competencies/ : Compare and contrast the nuances of varied online
platforms, sites, and content to best achieve specific
Code
class objectives or address situational challenges.
: Apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would
relate to their specific professional tracks.
:CS_ICT 11/12-ICTPT-1a-b-1, CS_ICT 11/12-ICTPT-1a-b-2
Learning Objectives:
1. Share knowledge on how ICT affects your everyday life
and the current state of our nation.
2. Compare and contrast the differences between online
platforms, sites and content and use these differences to
your advantage.
3. Determine and avoid the dangers in the use of internet.
4. Write a summary on how this social networking site
addresses own personal information.
5. Apply online safety, security, and ethics when sharing
information using the internet.
6. Create a campaign material which promotes “think
before you click”.
______________________________________________________________

What I Know

Multiple Choice: Write the letter of your answer on a separate sheet of


paper.
1. A web page that allows interaction from the user.
A. Comment C. Social
B. Dynamic D. Static
2. This refers to the feature where users are able to categorize and locate
information through tagging.
A. Folksonomy C. Rich user experience
B. Hashtags D. Taxonomy

5
3. A feature of a dynamic website that allows users to put their own
content.
A. Long tail C. Rich user experience
B. mass participation D. user participation
4. It provides a common framework to allow data to be shared and
reused across platform, enterprise, and community boundaries.
A. Semantic Web C. Web 1.0
B. W3C D. Web 2.0
5. According to this magazine, two Philippine cities are part of the top 10
in their research about “The Selfiest Cities around the World”.
A. Candy C. Reader’s Digest
B. People D. Time
6. It replicates and can transfer from one computer to another.
A. adware C. rogue
B. keylogger D. Virus
7. It tricks the user into posing that it is a security software.
A. Adware C. rogue
B. private D. spam
8. It is used to record the keystrokes done by the user.
A. keylogger C. phishing
B. malware D. spam
9. It is designed to send you advertisements.
A. Adware C. spyware
B. malware D. trojan
10.An unwanted email mostly from bots.
A. Adware C. spam
B. rogue D. trojan

Lesson Introduction to Information and


1 Communication Technologies

What I Need to Know

This lesson is designed to help you learn the concepts on Information


and Communication Technologies, its current state and the online systems,
functions, and platforms. As you continue learning this lesson, you will
realize that digital tools give you an idea of a wide range of possibilities to
discover; disclose; connect, and co-create in this technological world that we
live in.
So, are you now ready to explore our networked world? Come on and
enjoy learning this module and feel free to go over the discussion and
examples if you have not yet mastered a concept.

6
What’s In

Answer the following questions.

1. How many times have you checked your phone this morning?
2. How many status updates have you posted in Facebook today?
3. Do you use the internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?
If you happen to check your phone and update your status in Facebook
most of the time and you have answered questions 3 and 4 with a “Yes”, a
great possibility that you are a digital native. Digital native is a person
familiar with digital technologies because he has grown up with them. If you
are a digital native, most likely, you were surrounded by technology the
moment you were born.

What’s New

How many of the items or icons in the image above are you familiar
with? Which ones are you unfamiliar with?

Whatever your answers, take a closer look at the discussion below.


The list contains some key phrases that characterize the ICT tools that,
when used properly, can empower users to make positive social change.
In this lesson, you will understand how Information and
Communication Technologies have improved our lives in such a short period
of time.

7
What is It

Information and Communication Technologies (ICT) deals with the use


of different communication technologies such as mobile phones, telephone,
internet to locate, save, send, and edit information.

ICT in the Philippines. Several international companies dub the


Philippines as the “ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is the rise of Business Process Outsourcing (BPO) centers.
According to the 2013 edition of Measuring the Information Society by the
International Telecommunication Union, there are 106.8 cellphones per 100
Filipinos in the year 2012. In a data gathered by the Annual Survey of
Philippine Business and Industries, NSO in 2010, the ICT industry shares
19.3% of the total employment population here in the Philippines. Time
Magazine’s “The Selfiest Cities around the World” of 2013 places two cities
from the Philippines in the top 1 and top 10 spots. This study was
conducted using Instagram, a popular photo sharing application.

Types of Websites
Web 1.0. A static or stationary page wherein users cannot interact
with the page. Examples: Mp3.com, Ofoto, Aliweb, shopping carts, personal
websites, jekyll.com, brunch, metalsmith.com, Wikipedia, etc…
Web 2.0. A dynamic page wherein users can interact with the page.
Examples: social networking sites (Facebook, Instagram, Twitter, etc.),
video sharing sites (YouTube, Vimeo, TikTok, Twitch, DailyMotion, Facebook
Watch, etc.), wikis (Wikitravel, WikiBooks, WikiHow, Wiktionary, etc.), web
applications (Google Apps, Microsoft 0365, etc.), hosted services (Bluehost,
HostGator Cloud, Hostinger, GreenGeeks, DreamHost), and blogs.

Features of Web 2.0


1. Folksonomy -allows users to categorize and classify or arrange
information using freely chosen keywords (e.g., tagging). Popular social
networking sites such as Twitter, Instagram, Facebook, etc. use tags
with the pound sign (#). This is also referred to as hashtag.
2. Rich User Experience -content is dynamic and is responsive to user’s
input.
3. User Participation -the owner of the website is not the only one who
is able to put content.
4. Long Tail -services that are offered on demand rather than on a one-
time purchase.
5. Software as a Service -users will subscribe to a software only when
needed rather than purchasing them.
6. Mass Participation -diverse information sharing through universal
web access.

Web 3.0 and the Semantic Web


Semantic Web -is a movement led by the World Wide Web Consortium
(W3C). The term was coined by the inventor of the World Wide Web, Tim
Berners-Lee. It provides a common framework that allows data to be shared
and reused across application, enterprise, and community boundaries.

8
Several Problems in using Web 3.0
1. Compatibility -HTML files and current web browsers could not
support Web 3.0.
2. Security -the user’s security is also in question since the machine is
saving his or her preferences.
3. Vastness -the World Wide Web already contains billions of web
pages.
4. Vagueness -certain words are imprecise.
5. Logic -since machines use logic, there are certain limitations for a
computer to be able to predict what the user is referring to at a given
time.

Trends in ICT
As the world of ICT continues to grow, the industry has focused on
several innovations which cater to the needs of the people who benefit most
out of it. The following trends are the current front runners in the innovation
of ICT.
1. Convergence. Technological convergence is the synergy of technological
advancements to work on a similar goal or task. It is the use of several
technologies to accomplish a task conveniently.
2. Social Media. Social media is a website, application, or online channel that
enables web users to create, co-create, discuss, modify, and exchange user-
generated content.

Six Types of Social Media


Names Definition Examples
a. Social Networks - sites that allow you to • Facebook and
connect with other Google+
people with the same
interests or background.
b. Bookmarking -sites that allow you to • StumbleUpon
Sites store and manage links and Pinterest
to various websites and
resources and create a
tag to easily search or
share them.
c. Social News -sites that allow users to • reddit and Digg
post their own news
items or links to other
new sources.
d. Media sharing -sites that allow you to • Flicker,
upload and share media YouTube, and
content like images, Instagram
music, and video.
e. Microblogging -sites that focus on short • Twitter and
updates from the user. Plurk
f. Blogs and -websites that allow • Blogger,
Forums users to post their WordPress, and
content. Tumblr

3. Mobile Technologies. The popularity of smartphones and tablets has taken


a major rise over the years because of the devices’ capability to do tasks that

9
were originally found in personal computers. Today, the latest mobile devices
use 4G Networking (LTE), which is currently the fastest mobile network.

Different Operating Systems use by Mobile Devices


a. iOS -used in Apple devices such as the iPhone and iPad
b. Android -an open source operating system developed by Google
c. Blackberry -used in Blackberry devices
d. Windows Phone OS -a closed source and proprietary operating system
developed by Microsoft
e. Symbian -the original smartphone OS; used by Nokia devices
f. WebOS -originally used for smartphones; now used for smart TVs
g. Windows Mobile - developed by Microsoft for smartphones and pocket
PCs.
5. Assistive Media -is a nonprofit service designed to help people who
have visual and reading impairments. A database of audio recordings
is used to read to the user.

What’s More

A. True or False: Write True if the sentence is correct; otherwise, write


False.
1. Tim Berners-Lee created the World Wide Web.
2. People Magazine conducted the research on “The Selfiest Cities in the
World”.
3. Web 2.0 introduced static web pages that allow users to interact with
the web page.
4. Folksonomy allows users to categorize and locate information.
5. Technological convergence is the synergy of technological
advancements to work on a similar goal or task.
6. According to Nielsen, users who use the internet spend more time in
social media sites than in any other type of site.
7. Blogging sites are sites that focus on short updates from the user.
8. Android is a mobile operating system for Apple devices.
9. Assistive media is a nonprofit service designed to help people who
have visual and reading impairments.
10.Information and Communication Technology (ICT) deals with the use
of different communications technology to locate, save, send, and edit
information.
B. Write SO if the social media website is a social network, BS for
bookmarking site, SN for social news, MS for media sharing, MI for
1. Facebook and BF for blogs5.and
microblogging, Reddit
forums. 9. Blogger
2. Plurk 6. Google+ 10. StumbleUpon
3. Twitter 7. Instagram
4. Tumblr 8. Pinterest

10
What I Have Learned

Complete the bubble map below on the advantages of ICT. Write your
answer on a separate sheet of paper.

Advantages of
ICT

Lesson
Rules of Netiquette
2

What I Need to Know

This lesson discusses the appropriate and inappropriate online behavior


that you as users need to know and appreciate. It helps you understand the
social nature of digital media and later you discover the status of your own
digital life. Moreover, this lesson gives emphasis on the importance to act
properly and responsibly to possible consequences on engaging these digital
tools.

What’s In

Cite situations where Information and Communication Technologies


have improved the lives of people.

11
What’s New

What information you have shared so far online? To check, write Yes if
the following information was being shared and No, if not.

1. First name 6. Name of your mother and father


2. Last name 7. Name of your siblings
3. Middle name 8. Your address
4. Current and previous school/s 9. Your home phone number
5. Your cellphone number 10. Your birthday

How many “Yes” you have answered? Probably, you have answered
“Yes” in the first two items. If that is the case, try to type your first and
last name in Google and search if you have access to internet. Did you
get links to your profile page? Try to switch to image search. Did your
pictures appear? If you have a unique name, chances are, it did. But do
not feel bad if it did not appear, in fact, it is probably for your best
interest not to have pictures of yourself in a search engine.
So, how do you think these things happen? How can search engine
like Google locates you? Is there any danger of being found by search
engines?

What is It

Teenagers like you are exposed to many things powered by the


internet because they are mostly into socializing, playing games, reading
sports news, shopping, etc. The internet has given you the most powerful
tools that your parents did not enjoy during their early days. For this reason,
you must observe proper internet usage.

Online Safety and Security


Internet is a powerful tool used to promote business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment
through games, online communities, and everything in between. But there is
always the “other side of the coin”. Internet is one of the most dangerous
places especially if you are unaware of what you are doing with it.
How safe are you? See how risky it is to share the following information
online.
Type of Risks
Information

1. First Name A big possibility that a hacker may already know


plenty of stuff about you even if you only give out your
first name.
2. Last Name If sharing your first name is a small risk, having both
your first and last is riskier. You will be vulnerable to
being searched for using search engines, which
include image search. Matching a name with a face is
modus to several cybercrimes like identity theft.
3. Middle Name Sharing your middle name alone is probably not the
riskiest of this shared information but sharing your
full name would be.

12
4. Current and Most people who steal identities study their subject.
previous school(s) They can use this information for verification
purposes.
5. Your cell phone This should never be posted because internet is a
number public place. It is the same as posting your number on
a billboard. You would not want random strangers to
text or call you, or worse, pretend that they are
someone else.
6. The name of Risky, yet not as risky as posting their full names,
your mother and esp. your mother’s maiden name. In fact, you may
father have already encountered many websites that require
your mother’s maiden name as an answer to a secret
question whenever you lose your password.
7. The name of This is a huge risk. Strangers may pretend or use
your siblings their identity to fool you.
8. Your address Hopefully, you answered “no” to this one. Giving the
internet your number is one thing; giving them your
address is a whole other level. It would be much easier
for criminals to find you.
9. Your home This shared information is riskier than sharing your
phone number personal phone number. Scams usually use this
information to deceive you, one of which is when a
stranger pretends to know your parents or pretends to
be you.
10. Your birthday Letting people know your birthday is probably a must
if you want to get as many gifts as possible. But
having it in your profile makes you vulnerable to
identity theft.
Internet is defined as the information superhighway means that
anyone has access to this highway, can place information, and can grab that
information. Therefore, everyone is a prospect to cybercrime threats. We may
not experience it now but whatever information we share today could affect
our future. With this reason, social networking sites like Facebook continue
to improve their security features.

Tips to Stay Safe Online


1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the
website handles the information you share.
4. Know the security features of the social networking site you use.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by adding a
password.
13. Avoid downloading anything from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

13
Internet Threats
Here are some of the threats you should be aware of when using the
internet.
1.Malware – stands for malicious software.
a. Virus – a malicious program designed to replicate itself and
transfer from one computer to another either through the internet
and local networks or data storage like flash drives and CDs.
b. Worm – a malicious program that transfers from one computer to
another by any type of means. Often, it uses a computer network
to spread itself. For example, the ILOVEYOU worm (Love Bug
Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
o Rogue security software – tricks the user into posing
that it is a security software. It asks the user to pay
to improve his/her security but, they are not
protected at all.
d. Spyware – a program that runs in the background without you
knowing it (thus called “spy”). It can monitor what you are
currently doing and typing through keylogging.
o Keyloggers - used to record the keystroke done by the
users. This is done to steal their password or any
other sensitive information. It can record email,
messages, or any information you type using your
keyboard.
e. Adware – a program designed to send you advertisements, mostly
as pop-ups
2. Spam – unwanted email mostly from bots or advertisers. It can be used to
send malware.
3. Phishing – its goal is to acquire sensitive personal information like
passwords and credit card details.
Pharming – a more complicated way of phishing where it exploits the
DNS (Domain Name Service) system.

Protecting Reputations Online


Embarrassing moments nowadays can be captured using any device
you could imagine. Unlike the old days, doing something embarrassing was
not much a big deal. Worst is that anyone can easily upload it over the
internet and cannot be undone. This puts you in a traumatic situation and
risk the lives of your family. So, before posting something over the internet,
think first before you click.

Think Before You Click


Things you might want to consider before internet posting.
1. Once you post something on the web, you have no control of who sees
your posts.
2. Your friends depend on you to protect their reputation online.
3. Set your post to “private”.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one
who posted it to pull it down or report it as inappropriate.

14
Copyright Infringement
If you create something like an idea, an invention, a form of literary
work, or a research, you have the right as to how it should be used by
others. This is called “intellectual property. The copyright law includes your
rights over your work, and anyone who uses it without your consent is
punishable by law.

Tips to avoid copyright infringement


1. Understand. Copyright protects literary works, photographs,
paintings, drawings, films, music (and lyrics), choreography, and
sculptures, but it does not protect underlying ideas and facts.
2. Be responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is something
that came from you or something made from somebody else’s
creativity. It is important to add your own creative genius in
everything that will be credited to you.
4. Know the law. There are limitations to copyright laws. For instance, in
the Philippines, copyrights only last a lifetime (of the author) plus 50
years. There are also provisions for “fair use” which mean that an
intellectual property may be used without a consent as long as it is
used in commentaries, criticisms, search engines, parodies, news
reports, research, library archiving, teaching, and education.

What’s More

1. Do you agree or disagree with the provisions of the copyright law?


Defend your answer.
2. How would you feel if someone posted something embarrassing
about you? What would you do?
3. Make your own three (3) Do’s and Don’ts in a table form when
using social networking site like Facebook.

What I Have Learned

I have learned that:

1. To stay safe online, I must _________________________________________.


2. There are several internet threats which include ____________________.
3. Malwares could be in the form of a _________________________________.
4. It is our responsibility to protect other’s reputation online so we
should be ___________.
5. It is important for everyone to understand the laws particularly on
Copyright Infringement in order to _________________.

15
What I Can Do

A. Identifying the Correct Web Platform for Social Change

1. Identify a problem in your community, example: littering, garbage


disposal, blocked drainages, water shortage, teenage pregnancy,
cyber bullying, the increasing number of COVID19 cases, etc.
2. Imagine that you are going to create a website to convince both
community leaders and members to solve this problem.
3. Fill out the form below.
Community Problem:
Vicinity:
Campaign Name:
Type of Social Media Used:
Website Used:
What will be the content of your social media site?
Why did you choose that type of social media?
Why did you choose that website?

Example:
Community Problem: Severe flooding during rainy days due to
blocked drainages.
Vicinity: Guadalupe, Cebu City
Campaign Name: “Anti-flooding Movement”
Type of Social Media Used: Blogging
Website Used: WordPress
What will be the content of your social media site? It will contain
pictures of the flooded area during rainy days. It will also
contain pictures of the drainages that are blocked with
garbage. I also plan to update it occasionally. Anyone who
views the site will be able to comment on these updates.
Why did you choose that type of social media? People in my
community are avid readers of blogs. Most of them follow
several blogs that concern the community.
Why did you choose that website? WordPress, unlike other blogging
platforms, has a more “serious feel” to it. It also contains
professional-looking templates that will fit the serious tone
of my campaign.

B. Campaign Material

Create a campaign material promoting “Think before you click”. It could


be in the form of small poster using 1 long size bondpaper. Once graded,
post it anywhere in your place as an awareness campaign for internet users.
Your teacher shall grade your output using the rubric below.

Category Exemplary Accomplished Developing Beginning


4 3 2 1
Content The output The output is The output is The output is
exceeds the complete. somewhat incomplete.
expectations complete.

16
Attractiveness The flow chart is The flow chart is The flow chart is The flow chart is
exceptionally attractive in acceptably distractingly
attractive in terms of design, attractive messy or very
terms of design, layout, and though it may be poorly designed.
layout, and neatness. a bit messy. It is not
neatness. attractive.

Assessment

Multiple Choice: Write the letter of your answer on a separate paper.


1. This is the operating system for blackberry phones.
A. Blackberry OS C. Symbian
B. iOS D. Windows Mobile

2. Pinterest is a social media website that can be classified as


A. blogs and forums C. media sharing
B. bookmarking site D. microblogging
3. Currently, this is the fastest mobile network.
A. 2G C. 4G
B. 3G D. 5G
4. This media is designed to help people who have visual and reading
impairments.
A. accessibility C. bookmark
B. assistive D. social
5. This type of social media website focuses on short updates posted by
the user.
A. Blogging C. microblogging
B. hashtagging D. social media
6. It sends an official-looking email and is designed to steal sensitive
personal information.
A. copyright C. phishing
B. pharming D. private
7. A provision that allows you to use copyrighted work without consent
with certain limitations.
A. copyright C. incognito
B. fair use D. private
8. It runs in the background and monitors what you are doing.
A. Adware C. spam
B. malware D. spyware
9. It is an option to hide a post so that search engines could not scan it.
A. fair use C. private
B. incognito D. rogue
10. A malicious software.
A. adware C. spam
B. malware D. virus

17
References

Books:

Empowerment Technologies: Rex Book Store, Inc. and Innovative Training


Works, Inc., 2016
Empowerment Technologies Student Reader: Department of Education,
2016
Empowerment Technologies Teacher’s Guide: Department of Education,
2016
Abejo, Patricia May M. 2013. “The Philippine ICT Industry: Contributions
to Inclusive Growth”. The Philippine ICT Industry: n.pag.Web.

Online Sources:

“Assistive Media”. Assistive Media. AssistiveMedia.org, n.d.Web. 22 June


2015.

18
courses.com.ph/senior-high-school-contextualized-subject-empowerment-
technologies/
Grahl, Tim. “The 6 Types of Social Media.” Web log post. Common Insights,
n.d. Web 22 June 2015.
“How to Avoid Copyright Infringement.” WikiHow. N.p., n.d. Web. 27 Sept.
2015. http://www.wikihow.com/Avoid-Copyright-Infringement
Lukasiewicz, Thomas and Umberto Straccia. “Web Semantics: Science,
Service and Agents on the World Wide Web.” Science Direct. N.p., n.d. Web.
May 2015.
“McAfee Teen Safety Test: How Safe Is Your Surfing?” McAfee, n.d. Web. 22
June 2015
Norman AS. “Top 10 Internet Threats.” Norman.com, n.d. Web 22 June 2015

Image/logo Source

https://globalearlyed.wordpress.com/global-tools/teacher-tools/

19

Вам также может понравиться