Академический Документы
Профессиональный Документы
Культура Документы
Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to Information
and Communication
Technologies and
Rules of Netiquette
Empowerment Technologies – G11
Quarter 1 – Module 1: Introduction to Information and Communication
Technologies and Rules of Netiquette
First Edition, 2020
Republic Act 8293, section 176 states that no copyright shall
subsist in any work of the Government of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.
Editors/Reviewers:
Alice Ganar, Roy Guarin, John Paul Lesondato,
Marilou dela Cuesta, Daisy Von Dy,
and Florinda Geyrogaza
Management Team:
Dr. Rhea Mar A. Angtud
Schools Division Superintendent
Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to Information
and Communication
Technologies and
Rules of Netiquette
Introductory Message
For the facilitator:
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore,
this also aims to help learners acquire the needed 21st century skills while
taking into consideration their needs and circumstances.
As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the
module.
The hand is one of the most symbolized part of the human body. It is often
used to depict skill, action and purpose. Through our hands we may learn,
create and accomplish. Hence, the hand in this learning resource signifies
that you as a learner is capable and empowered to successfully achieve the
relevant competencies and skills at your own pace and time. Your academic
success lies in your own hands!
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and
2
time. You will be enabled to process the contents of the learning resource
while being an active learner.
3
Assessment This is a task which aims to evaluate
your level of mastery in achieving the
learning competency.
1. Use the module with care. Do not put unnecessary mark/s on any
part of the module. Use a separate sheet of paper in answering the
exercises.
2. Don’t forget to answer What I Know before moving on to the other
activities included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through
with it.
If you encounter any difficulty in answering the tasks in this module, do
not hesitate to consult your teacher or facilitator. Always bear in mind
that you are not alone.
4
Quarter 1 - Module 1, Week 1
Introduction to Information and Communication
Technologies and Rules of Netiquette
___________________________________________________________________________
What I Know
5
3. A feature of a dynamic website that allows users to put their own
content.
A. Long tail C. Rich user experience
B. mass participation D. user participation
4. It provides a common framework to allow data to be shared and
reused across platform, enterprise, and community boundaries.
A. Semantic Web C. Web 1.0
B. W3C D. Web 2.0
5. According to this magazine, two Philippine cities are part of the top 10
in their research about “The Selfiest Cities around the World”.
A. Candy C. Reader’s Digest
B. People D. Time
6. It replicates and can transfer from one computer to another.
A. adware C. rogue
B. keylogger D. Virus
7. It tricks the user into posing that it is a security software.
A. Adware C. rogue
B. private D. spam
8. It is used to record the keystrokes done by the user.
A. keylogger C. phishing
B. malware D. spam
9. It is designed to send you advertisements.
A. Adware C. spyware
B. malware D. trojan
10.An unwanted email mostly from bots.
A. Adware C. spam
B. rogue D. trojan
6
What’s In
1. How many times have you checked your phone this morning?
2. How many status updates have you posted in Facebook today?
3. Do you use the internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?
If you happen to check your phone and update your status in Facebook
most of the time and you have answered questions 3 and 4 with a “Yes”, a
great possibility that you are a digital native. Digital native is a person
familiar with digital technologies because he has grown up with them. If you
are a digital native, most likely, you were surrounded by technology the
moment you were born.
What’s New
How many of the items or icons in the image above are you familiar
with? Which ones are you unfamiliar with?
7
What is It
Types of Websites
Web 1.0. A static or stationary page wherein users cannot interact
with the page. Examples: Mp3.com, Ofoto, Aliweb, shopping carts, personal
websites, jekyll.com, brunch, metalsmith.com, Wikipedia, etc…
Web 2.0. A dynamic page wherein users can interact with the page.
Examples: social networking sites (Facebook, Instagram, Twitter, etc.),
video sharing sites (YouTube, Vimeo, TikTok, Twitch, DailyMotion, Facebook
Watch, etc.), wikis (Wikitravel, WikiBooks, WikiHow, Wiktionary, etc.), web
applications (Google Apps, Microsoft 0365, etc.), hosted services (Bluehost,
HostGator Cloud, Hostinger, GreenGeeks, DreamHost), and blogs.
8
Several Problems in using Web 3.0
1. Compatibility -HTML files and current web browsers could not
support Web 3.0.
2. Security -the user’s security is also in question since the machine is
saving his or her preferences.
3. Vastness -the World Wide Web already contains billions of web
pages.
4. Vagueness -certain words are imprecise.
5. Logic -since machines use logic, there are certain limitations for a
computer to be able to predict what the user is referring to at a given
time.
Trends in ICT
As the world of ICT continues to grow, the industry has focused on
several innovations which cater to the needs of the people who benefit most
out of it. The following trends are the current front runners in the innovation
of ICT.
1. Convergence. Technological convergence is the synergy of technological
advancements to work on a similar goal or task. It is the use of several
technologies to accomplish a task conveniently.
2. Social Media. Social media is a website, application, or online channel that
enables web users to create, co-create, discuss, modify, and exchange user-
generated content.
9
were originally found in personal computers. Today, the latest mobile devices
use 4G Networking (LTE), which is currently the fastest mobile network.
What’s More
10
What I Have Learned
Complete the bubble map below on the advantages of ICT. Write your
answer on a separate sheet of paper.
Advantages of
ICT
Lesson
Rules of Netiquette
2
What’s In
11
What’s New
What information you have shared so far online? To check, write Yes if
the following information was being shared and No, if not.
How many “Yes” you have answered? Probably, you have answered
“Yes” in the first two items. If that is the case, try to type your first and
last name in Google and search if you have access to internet. Did you
get links to your profile page? Try to switch to image search. Did your
pictures appear? If you have a unique name, chances are, it did. But do
not feel bad if it did not appear, in fact, it is probably for your best
interest not to have pictures of yourself in a search engine.
So, how do you think these things happen? How can search engine
like Google locates you? Is there any danger of being found by search
engines?
What is It
12
4. Current and Most people who steal identities study their subject.
previous school(s) They can use this information for verification
purposes.
5. Your cell phone This should never be posted because internet is a
number public place. It is the same as posting your number on
a billboard. You would not want random strangers to
text or call you, or worse, pretend that they are
someone else.
6. The name of Risky, yet not as risky as posting their full names,
your mother and esp. your mother’s maiden name. In fact, you may
father have already encountered many websites that require
your mother’s maiden name as an answer to a secret
question whenever you lose your password.
7. The name of This is a huge risk. Strangers may pretend or use
your siblings their identity to fool you.
8. Your address Hopefully, you answered “no” to this one. Giving the
internet your number is one thing; giving them your
address is a whole other level. It would be much easier
for criminals to find you.
9. Your home This shared information is riskier than sharing your
phone number personal phone number. Scams usually use this
information to deceive you, one of which is when a
stranger pretends to know your parents or pretends to
be you.
10. Your birthday Letting people know your birthday is probably a must
if you want to get as many gifts as possible. But
having it in your profile makes you vulnerable to
identity theft.
Internet is defined as the information superhighway means that
anyone has access to this highway, can place information, and can grab that
information. Therefore, everyone is a prospect to cybercrime threats. We may
not experience it now but whatever information we share today could affect
our future. With this reason, social networking sites like Facebook continue
to improve their security features.
13
Internet Threats
Here are some of the threats you should be aware of when using the
internet.
1.Malware – stands for malicious software.
a. Virus – a malicious program designed to replicate itself and
transfer from one computer to another either through the internet
and local networks or data storage like flash drives and CDs.
b. Worm – a malicious program that transfers from one computer to
another by any type of means. Often, it uses a computer network
to spread itself. For example, the ILOVEYOU worm (Love Bug
Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
o Rogue security software – tricks the user into posing
that it is a security software. It asks the user to pay
to improve his/her security but, they are not
protected at all.
d. Spyware – a program that runs in the background without you
knowing it (thus called “spy”). It can monitor what you are
currently doing and typing through keylogging.
o Keyloggers - used to record the keystroke done by the
users. This is done to steal their password or any
other sensitive information. It can record email,
messages, or any information you type using your
keyboard.
e. Adware – a program designed to send you advertisements, mostly
as pop-ups
2. Spam – unwanted email mostly from bots or advertisers. It can be used to
send malware.
3. Phishing – its goal is to acquire sensitive personal information like
passwords and credit card details.
Pharming – a more complicated way of phishing where it exploits the
DNS (Domain Name Service) system.
14
Copyright Infringement
If you create something like an idea, an invention, a form of literary
work, or a research, you have the right as to how it should be used by
others. This is called “intellectual property. The copyright law includes your
rights over your work, and anyone who uses it without your consent is
punishable by law.
What’s More
15
What I Can Do
Example:
Community Problem: Severe flooding during rainy days due to
blocked drainages.
Vicinity: Guadalupe, Cebu City
Campaign Name: “Anti-flooding Movement”
Type of Social Media Used: Blogging
Website Used: WordPress
What will be the content of your social media site? It will contain
pictures of the flooded area during rainy days. It will also
contain pictures of the drainages that are blocked with
garbage. I also plan to update it occasionally. Anyone who
views the site will be able to comment on these updates.
Why did you choose that type of social media? People in my
community are avid readers of blogs. Most of them follow
several blogs that concern the community.
Why did you choose that website? WordPress, unlike other blogging
platforms, has a more “serious feel” to it. It also contains
professional-looking templates that will fit the serious tone
of my campaign.
B. Campaign Material
16
Attractiveness The flow chart is The flow chart is The flow chart is The flow chart is
exceptionally attractive in acceptably distractingly
attractive in terms of design, attractive messy or very
terms of design, layout, and though it may be poorly designed.
layout, and neatness. a bit messy. It is not
neatness. attractive.
Assessment
17
References
Books:
Online Sources:
18
courses.com.ph/senior-high-school-contextualized-subject-empowerment-
technologies/
Grahl, Tim. “The 6 Types of Social Media.” Web log post. Common Insights,
n.d. Web 22 June 2015.
“How to Avoid Copyright Infringement.” WikiHow. N.p., n.d. Web. 27 Sept.
2015. http://www.wikihow.com/Avoid-Copyright-Infringement
Lukasiewicz, Thomas and Umberto Straccia. “Web Semantics: Science,
Service and Agents on the World Wide Web.” Science Direct. N.p., n.d. Web.
May 2015.
“McAfee Teen Safety Test: How Safe Is Your Surfing?” McAfee, n.d. Web. 22
June 2015
Norman AS. “Top 10 Internet Threats.” Norman.com, n.d. Web 22 June 2015
Image/logo Source
https://globalearlyed.wordpress.com/global-tools/teacher-tools/
19