Empowerment Technology Module 1 1st Quarter
Empowerment Technology Module 1 1st Quarter
Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and
Research Skills
11
Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and
Research Skills
NOTE: please do not write ANYTHING on this MODULE, write your answers on your
notebook.
Introductory Message
For the facilitator:
This will aid in teaching competencies that are essential in the Information Age, such
as the state of ICT Technologies; online safety, security, ethics and etiquette;
productivity tools with advanced application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change,
which are aligned to the standards set by the Department of Education for the senior
high school level.
(This module contains information about: the massive world of Information and
Communication Technology (ICT) has continued to shape the world including the
Philippines. This unit allows you to discover the world of ICT in general and also helps
you improve your skills in various applications. It also creates several real-life
scenarios where you can use these applications and resources properly.
This module was designed and written with you in mind. It is here to help
you master the Empowerment Technologies. The scope of this module permits it to
be used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the
standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.
The module is divided into Two lessons and five sub topics, namely:
Lesson 1 – Information and Communication Technologies
Lesson 1.1 – ICT in the Philippines
Lesson 1.2 – ICT, Me, and my Community
Lesson 1.3 - Web 2.0: Dynamic Web Pages
Lesson 1.4 - Web 3.0 and the Semantic Web
Lesson 1.5 - Trends in ICT
Lesson 2 – Online security, safety, and ethics
Lesson 2.1 – Internet Threats
Lesson 2.2 – Protecting reputations online
Lesson 2.3 – Copyright
Lesson 3 – Contextualized Online Search and Research Skills
2
2. understand and demonstrate the proper etiquette in using ICT;
3. demonstrate appropriate skills in using several computer applications,
4. discover opportunities where one can use these skills in real-world scenarios;
and
5. collaboratively create an online portal.
6. Consider one’s and others’ safety when sharing information using the Internet;
7. Consider one’s and others’ reputation when using the Internet;
8. Determine and avoid the dangers of the internet;
9. Be responsible in the use of social networking sites; and
10. Browse the internet efficiently and properly through proper referencing.
What’s New
Activity 1:
Did you use the internet after you woke up this morning?
On your activity sheet, answer the questions.
1. How many times have you checked your phone this morning?
2. How many status updates have you posted in FB or Twitter today?
3. Did you use internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?
Unlocking of Difficulties
The following are the terms you will encounter with this module:
Key Terms
What I Know
Activity 2:
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
3
1. A web page that allows interaction from the user
a. static c. social
b. dynamic d. comment
2. This refers to the feature where users are able to categorize and locate
information through tagging.
a. hashtags c. taxonomy
b. folksonomy d. rich user experience
3. A feature of a dynamic website that allows users to put their own content
a. rich user experience c. user participation
b. long tail d. mass participation
5. According to this magazine, two Philippine cities are part of the top 10 in their
research about “The Selfiest Cities around the World.”
a. People c. Reader’s Digest
b. Time d. Candy
4
Lesson Information and Communication
1 Technologies
Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to
locate, save, send, and edit information.
When we make a video call, we use the Internet. When we send a text or make
a call, we use cellular networks. When we run out of load or battery, we use
payphones which use a telephone network. Having a unified way to communicate is
one of the goals of ICT. In terms of economics, ICT has saved companies a lot of
resources (time and money) with the kind of communication technology they use,
nowadays. In a similar way, we spend less because of ICT. As it normally costs us a
peso to send a text message or SMS, with the Internet, we can send multiple
messages and only be charged by a fraction.
What’s In
5
Philippines is dub as the “ICT Hub of Asia” because of huge growth of
ICT-related jobs, one of which is BPO, Business Process
Outsourcing, or call centers
ICT Department in the Philippines
is responsible for the planning, development and promotion of the
country's information and
communications technology (ICT) agenda in support of national
development.
What is It
Activity 3:
ICT, Me, and My Community
To fully understand the importance of ICT, let us first look at our community. Look
for a small business around your community.
Conduct a short interview (via free data on messenger) of the business owner using
the following guide:
Company/Establishment Name:
Address:
Nature of Business:
Guide Questions:
1. What are the different ways for customers and/or suppliers to
contact you?
2. How often do you use a phone or cellular phone for business? Estimate
only.
3. Does your establishment have Internet connection? If yes, what is its
purpose? If no, would you consider having it in the future? Why or why
not?
4. Does your business have a website? if yes, how does it help the company?
If no, would you consider having one in the future? Why or why not?
5. If applicable) Would you consider giving free Wi-Fi access in the future? If
you already have it, does it help boost sales?
Internet
6
is an information space where documents and other web resources are
identified by URLs, interlinked by hypertext links, and can be accessed via
the Internet.
Invented by Tim-Berners Lee
Web Pages
Web page is a hypertext document connected to the World Wide Web.
It is a document that is suitable for the World Wide Web
Web Sites
a location connected to the Internet that
maintains one or more pages on the World
Wide Web.
It is a related collection of World Wide Web
(WWW) files that includes a beginning file
called a home page.
Web Browser
It displays a web page on a monitor or mobile device
is a software application for retrieving, presenting, and traversing
information resources on the World Wide Web.
7
Static vs. Dynamic Web Page
Static" means unchanged or constant, while
"dynamic" means changing or lively.
A static site is one that is usually written in plain
HTML and what is in the code of the page is what
is displayed to the user. A dynamic site is one that
is written using a server-side scripting language
such as PHP, ASP, JSP, or ColdFusion.
Features of Web 2.0
1. Folksonomy- allows user to categorize and
classify information using freely chosen
keywords e.g
tagging by Facebook, twitter, use tags that start with the pound sign #,
referred to as hashtag
2. Rich User Experience- content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is
able to put content. Others are able to place a content of their own by means
of comments, reviews, and evaluation e.g lazada.com, amazon.com
4. Long Tail- services that are offered on demand rather than on a one-
time purchase. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spent in the Internet, or a data
plan that charges you for the amount of bandwidth you used.
5. Software as a Service- users will be subscribe to a software only when
needed rather than purchasing them e.g Google docs used to create and
edit word processing and spread sheet.
6. Mass Participation- diverse information sharing through universal
web access. Web 2.0’s content is based on people from various
cultures.
Web 3.0 and Semantic Web
Semantic Web is a movement led by the World Web Consortium (W3C).
The W3C standard encourages web developers to include semantic content
in their web pages.
Semantic web is a component of Web 3.0
Semantic web provides a common framework that allows data to be
shared and reused across application, enterprise, and community
boundaries.
The aim of web 3.0 is to have is to have machines or servers understand
the user’s preferences to be able to deliver web content specifically targeting
the user.
1. Compatibility. HTML files and current web browsers could not support Web
3.0.
2. Security. The user's security is also in question since the machine is saving
his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words "old" and "small would
depend on the user.
8
5. Logic. Since machines use logic, there are certain limitations for a computer
to be able to predict what the user is referring to at a given time.
Trends in ICT
a. Social Networks- these are sites that allow you to connect with other
people with the same interests or background.
b. Bookmarking Sites- these are sites that allow you to store and manage
links to various websites and resources.
c. Social news- these are sites that allow users to post their own news
items or links to other news sources. The users can also comment on the
post and comments may also be ranked.
d. Media Sharing- these are sites that allow you to upload and share media
content like images, music, and video.
e. Mircoblogging- these are sites that focus on short updates from the
user. Those subscribed to the user will be able to receive these updates.
f. Blogs and Forums- these websites allow users to post their content.
Other users are able to comment on the said topic.
4. Mobile Technologies- popularity of smartphones and tablets. Latest
mobile devices use 4G Networking LTE, which is currently the fastest
mobile network. Mobile devices use different operating systems
iOS
Android
Blackberry OS
Windows Phone OS
Symbian
Web OS
Windows
Mobile
9
5. Assertive Media- is a nonprofit service designed to help people who
have visual and reading impartments. A database of audio recordings
is used to read to the user.
What’s More
Activity 4: Your Turn to Shine
1. Why do you think microblogging platforms have become popular when regular
blogging becomes platforms already exist?
2. What do you think of Web 3.0? Do you think it will be realized someday in
the future?
What I Can Do
Activity 6:
Ask for help for help with the elderly during their time, the significant
“technological advances”, make time lines using long strips of paper, cut out and tape
together or on brown paper that comes in rolls. Time lines should include
illustrations of the “technological advances” you wish to highlight
Assessment
Activity 7:
1. Facebook
2. Plurk
3. Twitter
4. Tumblr
5. reddit
6. Google+
7. Instagram
8. Pinterest
9. Blogger
10. StumbleUpon
What I Know
Activity 9:
I. Directions: Pre-Test: Write Yes if you agree with the statement and No if
you disagree on the blank before each number.
Lesson
Rules of Netiquette
2
Most of us use the Internet every day, Sometimes, we do not pay
attention on how much information we share online. Below is a questionnaire
about how much you have shared so far. Put a check () under Shared or
Not Shared.
How many hours do you spend on the Internet per day? Can you live without
the Internet for a week? How many aspects of your life depend on the Internet? How
many times have you complained about your Internet connection speed? As
teenagers, you are all exposed to many things powered by the Internet.
Whether it is socializing, playing games, reading sports news,
shopping, etc., the Internet has given you one of the most powerful
tools that your parents, during their teenage years, did not have.
Because of this, do you not think that it is also important to
wield this powerful tool properly? Without proper training, a
swordsman can easily injure himself when wielding a
swordsman, the same could be said for you whenever you use
the Internet.
What’s New
Lesson 2 – Online security, safety, and ethics
Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business,
gain Online Safety and Security new friends, and stay in touch with the old ones. It
is also a source of entertainment through games, online communities, and everything
in between. But like most things in this world there is always the 'other side of the
coin
The Internet is one of the most dangerous places especially if you do not know
what you are doing with it. But there is no need to worry: it is never that late.
Hopefully, by the end of this lesson, you are able to consider how you go about your
use of the Internet.
Let us go back to the "How Safe Are You?" test.
Let us visit each item and see how risky it is to share them. pe of information
Risks There is a risk in sharing your
The Internet, truly, is a powerful tool. It can be used to promote your business,
gain Online Safety and Security new friends, and stay in touch with the old ones. It
is also a source of entertainment through games, online communities, and everything
in between. But like most things in this world there is always the 'other side of the
coin
The Internet is one of the most dangerous places especially if you do not know
what you are doing with it. But there is no need to worry: it is never that late.
Hopefully, by the end of this lesson, you are able to consider how you go about your
use of the Internet.
Let us go back to the "How Safe Are You?" test.
Let us visit each item and see how risky it is to share them. pe of information
Risks There is a risk in sharing your
Middle name
Sharing your middle name alone is probably
not the riskiest of this shared information,
but sharing your full name would be.
Current
and
Previous Most people who steal identities study their
Schools subject. They can use this information for
verification purposes.
The name
Disclosing this is a huge risk. Strangers may
of your
pretend or use their identity to dupe you.
siblings.
Your homeThis shared information is riskier than sharing phoneyour personal phone
What is It
hadRULE R p hadRULE R p
band dt band dt
What is It
What’s In
What’s New
“Googling”
Indeed, Google might be our “friend” but using search
engines for the sake of plain information could actually lead
you misinformed.
In order to stay meaningfully informed, you should start
appreciating the use of the right combination of words or key phrases.
SEARCH ENGINE
A search engine is a software system designed to search the Internet for documents
related to the keyword or search word used or entered into the system. Users are
able to maximize the potential of search engines by learning the proper searching
protocols.ii
ONLINE RESEARCH
In the Philippines, copyrights only last a lifetime (of the author) plus 50 years.
There are also provisions for “fair use”.
Symbol Function
Finds web pages that contain all the terms that are preceded by
+ the + symbol; allows you to include terms that are usually
ignored
““ Finds the exact words in a phrase
() Finds or excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases
NOT or - Excludes web pages that contain a term or phrase
OR or | Finds web pages that contain either of the terms or phrases
What’s More
Activity 14: Your Turn to Shine
Self-Check
On your activity sheets, complete the sentences with relevant concepts:
1. When I search using “Jos” the search may result to:
Activity 15:
1. 1990s is the development of ICT in the Philippines, supposed you are a first-
year college student, enumerate the ways on getting the
most relevant information about the Information and
Technology. You can ask for help within your family and
friends.
2. Have a documentation of what are the most useful search
tips you used to obtain the most relevant information.
What’s More
Self-Check 1.1
Do you agree or disagree with the provisions of the copyright law? Defend your answer.
Howwouldyoufeelifsomeonepostedsomething embarrassing about you? What would you do?
Essay: How misusing social media can create a negative digital foot print?
Activity 18:
Activity 19:
Create a Poster that will show brief explanation in one of the 10 Rules in
Netiquette by Virginia Shea.
Assessment
Activity 20: Post-Test Matching Type: Match Column A with Column B. Write
the letter of the correct answer on the space before each
number.
A B
1. virus a) designed to send you advertisements
2. rogue b) sends an official-looking email and is designed
to steal provision that allows you to use
copyrighted work sensitive personal information
3. keylogger c) without consent with certain limitations
4. adware d) a browser feature that is synonymous to
"private" browsing
5. spam e) replicates and can transfer from one computer
to another
6. phishing f) exploits the DNS system
7. fair use g) states that anyone who uses your work without
your consent is punishable by law
8. spyware h) runs in the background and monitors what you
are doing
9. private i) unwanted email mostly from bots
10. malware j) disguised as a useful program but is not
11. incognito k) the information superhighway
12. internet l) tricks the user into posing that it is a security
software
13. trojan m) a malicious software
14. copyright n) an option to hide a post so that search engines
could not scan it
15. pharming o) used to record the keystrokes done by the user
References:
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-
7830-0; Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Reygie Fabro-College Instructor at Divine Word College of Laoag; Published on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 367, paragraph 3.
Prepared by:
i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon
City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon
City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon
City. Page 36, paragraph 3.