0% found this document useful (0 votes)
235 views43 pages

TLE11 ICT Empowerment Tech Q1 W1

This document provides instructions for a Technical-Vocational Livelihood self-learning module on Information and Communications Technology for 11th grade students. It introduces the module writers and reviewers and explains how students should use the module, which aims to help students learn about comparing different online platforms and content to achieve class objectives. The module pre-test checks students' existing knowledge on topics like mobile networks, social media sites, and assistive technologies.

Uploaded by

Ronnell Jacinto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
235 views43 pages

TLE11 ICT Empowerment Tech Q1 W1

This document provides instructions for a Technical-Vocational Livelihood self-learning module on Information and Communications Technology for 11th grade students. It introduces the module writers and reviewers and explains how students should use the module, which aims to help students learn about comparing different online platforms and content to achieve class objectives. The module pre-test checks students' existing knowledge on topics like mobile networks, social media sites, and assistive technologies.

Uploaded by

Ronnell Jacinto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

11

Technical-
Vocational-
Livelihood (TVL)
ICT - Empowerment
Technologies
Quarter 1 - Week 1

i
Technical-Vocational Livelihood – Grade 11
Self-Learning Module
Week 1 - Module #
First Edition, 2020

Republic Act 8293 section 176 states that: No copyright shall subsist in
any work of the Government of the Republic of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit. Such agency of office
may, among other things. Impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, photos, brand names,


trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission
to use these materials from their respective copyright owners. The publisher
and authors do not represent nor claim ownership over them.

DEVELOPMENT TEAM OF THE MODULE

Writers : Grace N. Sumicad, MAED-TLE, SST-III


Editor : Mercedita A. Sumalinog, District [8]
Editor 2, Designation
Reviewers :
Illustrator : Mar Onell C. Booc, Designation
Layout Artist : Mar Onell C. Booc, Designation
Plagiarism Detector Software : PlagiarismDetector.com
Grammarly Software : CitationMachine.com

Management Team:
Schools Division Superintendent : Dr. Wilfreda D. Bongalos CESO V
Assistant Schools Div. Superintendent : Dr. Marcelita S. Dignos CESO VI
Chief Education Supervisor, CID : Dr. Oliver M. Tuburan
Education Program Supervisor, LRMDS: Mrs. Teresita A. Bandolon
Education Program Supervisor, TLE : Reynold Q. Velos

Department of Education – Regional Office 7


DepED-Division of Lapu-Lapu CIty
Office Address : B. M. Dimataga Street, Poblacion, Lapu-Lapu City
Telefax : (032) 340 7887
E-mail Address : depedlapulapu@deped.gov.ph

ii
Property of DepED-Division of Lapu-Lapu City | www.depedlapulapu.net.ph | (032) 340-7354
INTRODUCTORY MESSAGE

For the facilitator:

Welcome to the (Empowerment Technology) Self-Learning Module


on Lesson Information and Communications Technology and Online safety,
security, ethics, and etiquette !

This module was collaboratively designed, developed and reviewed by


educators both from public and private institutions to assist you, the teacher
or facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social and economic constraints
in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21 st century skills while taking
into consideration their needs and circumstances.

As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners’ progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the module.

For the learner:

Welcome to the Technical - Vocational-Livelihood 11 Self-Learning


Module on (Empowerment Technology)

The hand is one of the most symbolized part of the human body. It is
often used to depict skill, action and purpose. Through our hands we may
learn, create and accomplish. Hence, the hand in this learning resource
signifies that you as a learner is capable and empowered to successfully
achieve the relevant competencies and skills at your own pace and time. Your
academic success lies in your own hands!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.

iii
HOW TO USE THE MODULE

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.

2. Don’t forget to answer What I Know before moving on to the other


activities included in the module.

3. Read the instruction carefully before doing each task.

4. Observe honesty and integrity in doing the tasks and checking your
answers.

5. Finish the task at hand before proceeding to the next.

6. Return this module to your teacher/facilitator once you are through with
it.

If you encounter any difficulty in answering the tasks in this module,


do not hesitate to consult your teacher or facilitator. Always bear in mind that
you are not alone.

We hope that through this material, you will experience meaningful


learning and gain deep understanding of the relevant competencies. You can
do it!

iv
Lesson 1 - Information and Communications
Technology

What I Need to Know


This will give you an idea of the skills or competencies you are expected to
learn in the module.

This lesson is designed and written with you in mind. It is here to help
you understand the Information and Communications Technology. The scope
of this module permits it’s to be used in many different learning situations.
The language used recognizes the diverse vocabulary level of students. The
lessons are arranged to follow the standard sequence of the course.
At the end of this module, you should be able to:
Content Standards:
A. demonstrate an understanding of the ICT in the context of global
communication for specific professional track
Performance Standards:
A. compose an insightful reflection paper on the nature of ICT in the
context of their lives, society, and professional tracks, (Arts,
Tech Voc, Sports, Academic.
Learning Competency:
1. Compare and contrast the nuances of varied online platforms, sites,
and content to best achieve specific class objectives or address
situational challenges.

DepED-Division of Lapu-Lapu City 1 TLE/TVE/TVL


What I Know
This part includes an activity that aims to check what you already know about
the lesson to take. If you get all the answers correctly (100%), you may decide
to skip this module.
Pre-Test 1.0
Let us determine how much you already know about comparing and
contrasting the nuances of varied online platforms, sites, and content. Take
this test.

Direction: Encircle the letter of the correct answer.

1.It is the currently the fastest mobile network.

A.2G B. 3G C. 4G D. 5G

2. A web page that allows interaction from the user.

A. Static B. Social C. Dynamic D. Comment

3. It provides a common framework to allow data to be shared and reused


across platform, enterprise, and community boundaries

A. W3C B. Web 1.0 C. Semantic Web D. Web 2.0

4. Pinterest is a social media website that can be classified as

A. Bookmarking site B. Media sharing C. Microblogging D. Forum

5. This refers to the feature where users categorize and locate information
through tagging.

A. Hashtags B. Folksonomy C. Taxonomy D. Comment

6. A feature of a dynamic website that allows user to put their own content.

A. Comment B. Long tail C. User participation D. Short tail

7. According to this magazine, two Philippines cities are part of the top 10 in
their research.

A. People B. Time C. Reader’s Digest D. Candy

8. This is an operating system for blackberry phones.

A.Blackberry OS B. Symbian C. Window D. iOS

11/12 Empowerment Technology 2 DepED-Division of Lapu-Lapu City


9. This type of social media website focuses on short updates posted by the
user.

A. Blogging B. Microblogging C. Social Media D.


tagging

10. This media is designed to help people who have visual and reading
impairments.

A. Assistive B. Social C. Bookmark D. Accessibility

Refer to Answer Key

11/12 Empowerment Technology 3 DepED-Division of Lapu-Lapu City


What’s In
This is a brief drill or review to help you link the current lesson with the
previous one.

Form groups with five members. Answer honestly the given guide questions
presented below.
Guide questions:
1. What are the means of communication?
2. How many times have you checked and used your phones in a day to
communicate with?

3. How does a technology play a vital role in an individual?

What Is It
This section provides a brief discussion of the lesson. This aims to help you
discover and understand new concepts and skills.

After the activity, you may find chances about the importance of ICT
in a day to day task.

ICT in the Context of Global Communication

Information and Communication Technology (ICT) plays a significant


role in our lives and in all aspects in our society. ICT has become the main
method of communication, getting information and education, attaining
services from business, hospitals, utilizes, government, purchasing products
and services, doing personal and business transactions and expressing social
advocacies and awareness.
It is a great way to think about ICT is to think over and analyze the use
of technology which enable individuals, businesses, and organizations to use
digital information. Information and Communications Technology (ICT)
includes any product that stores, retrieves, manipulates, and receives data or
information electronically in a digital structure. These areas belong to
education, banking, healthcare, government, business, and so many
branches that we can think and use of.

EDUCATION
• Schools use computers to protect and maintain the records of
information about the school and the students.
• Computers in schools are used for quick, effortless and effective

11/12 Empowerment Technology 4 DepED-Division of Lapu-Lapu City


instruction and learning in a subject like, Math, English, Science and
etc. Teachers use multi-media and Computer-Based Training programs
to present topics visually to enhance teaching-leaning process.
• Libraries are now equipped with computers to organize books and to
expand the reference available to the students through the Internet.
• Students use computers to make reports, do their assignments, and
communicate with teachers.
• Online Instructions are courses in the Internet which are available to
learn various lessons and even earn a college degree through distance
learning.

Sports and Recreation


• It makes the results more accurate and well-organized.
• It provides evidence for the officials so they will not receive complaints
or abuse from the opposition - i.e. a tennis ball being shown as out.
• There are simulation application softwares where athletes can practice
their skills, and the computer will identify the flaws in their techniques.
• Computers at home are used for multi-media functions to play games,
listen to music, and watch movies
• Use computerized program fitness programs, gadgets, and equipment.
• Use of internet sites to advertise sporting events.

Arts Design, and Music


• Music and videos are shared by their creators and can be downloaded
for free or a fee
• Computers are used for photo editing and music arrangements like
picture, illustrations, and graphics design.

Telecommunications
• Computers are used in mobile phone communications to regulate the
calls and SMS (short messages service) or text traffic
• VoIP (Voice over Internet Protocol) is a voice communication application
via the internet which costs less than conventional means.
• Computers in home, schools, private and government offices, hospitals,
and almost everywhere are used to get in touch with other people. It
used to send picture, letters, video clips and music.

Health Services
• Emails are used widely to communicate with the doctors efficiently. Test
results and diagnoses are sent via the Internet.
• With the Internet, doctors share experiences and medical data with
other doctors around the globe to research and diagnose patients with
greater accuracy.
• Computers in hospitals are used by medical personnel to store medical
data, patients’ records, research materials, and other information to
effectively diagnose and treat patients.
• Online health information and consultations are now available on the
internet that shares of valuable experience and expertise will help treat

11/12 Empowerment Technology 5 DepED-Division of Lapu-Lapu City


patients with rare and serious diseases faster.
• In operating rooms doctors used computers in performing microsurgery
with better accuracy and better chances of success.

Science and Research


• Mathematicians used super-fast computers to present and solve
complex problems.
• Inventors used computers in designing and testing their product in a
simulation to ensure a working model before actual manufacturing.
• Physicists used computer to look for new renewable, safe and affordable
power sources

Government Services

• The city government offices use computers to render service to its


citizens.
• Government Offices like BIR (Bureau of Internal Revenue) used
computers to compute taxes of real properties such as homes and
buildings.
• The National Statistics Office (NSO) used computers for record tracking
of the births, marriages, and deaths of the country’s citizens.

Writings and Publishing


• Books, newspapers, and magazines are designed and prepared using
powerful computer software applications such as drawing, photo
editing, and lay-out programs.
• Books are shared online by their creators and can be downloaded for
free or with fee.
• Computer are used for reading news in online newspapers, reading of
story using ebooks, research for materials, and journals online.

ICT in the Philippines

Philippines was name as the “ICT Hub of Asia” by the numerous


international companies because of the huge growth of ICT-related jobs
around the country of which is the call center or BPO (Business Process
Outsourcing) center.

In 2013, International Telecommunication Union on its edition of


Measuring the Information Society states that there are 106.8 cellphones per
100 Filipinos in 2012. This would imply that every 100 Filipinos, there is a
chance that they have a cellphone and seven of them have two approximately.

In the year 2010, the Annual Survey of Philippines Business and


Industries collected the data that states the ICT industry shares 19.3% of the
total employment population here in the Philippines. Moreover, Time
Magazines statistics “The Selfiest Cities around the World” of 2013 places two
cities from the Philippines in top 1 and top 10.

11/12 Empowerment Technology 6 DepED-Division of Lapu-Lapu City


What I Have Learned
This includes questions or blank sentence/paragraph to be filled in to
process what you learned from the lesson.
Answer the following questions:

1. What do you mean by ICT


2. What are the different areas use ICT as means of communication?
3. Why Philippines was name as the “ICT Hub of Asia”?

Assessment
This is a task which aims to evaluate your level of mastery in
achieving the learning competency.

Self-Check 1.1

A. True or False: Write T if the sentence is correct; otherwise, write F on the space
provide before each number.
_________1. Information and Communication Technology (ICT compacts with
the use of different communications technology to locate, save, send, and
edit information.
________2. Classic homes have computers for research and learning by
students and the family for school lessons.

________3. Philippines was name as the “ICT Hub of Asia” by the numerous
international companies.

_______4. Military group uses computers to guide weapon systems from any
source and pinpoint targets.

_______5. Mechanical Engineers design and determine electrical power


requirements of buildings and houses.

B. Answer the questions comprehensively (5 points each)

1. What is the role of ICT in the community?


2. As a student, what is the importance of ICT in your life and
professional career?

Refer to Answer Key

11/12 Empowerment Technology 7 DepED-Division of Lapu-Lapu City


Additional Activities
In this portion, another activity will be given to you to enrich your
knowledge or skill of the lesson learned. This also tends retention of
learned concepts.

To fully comprehend the significance of ICT, look for a small business


within your community. Conduct a short interview of a business owner using
the following guide and report the results in a class and observe the trend on
most of the reports presented.

11/12 Empowerment Technology 8 DepED-Division of Lapu-Lapu City


What’s In

One-minute paper activity

Looking at this picture, do you agree that


internet is important?

data:image/png;base64

What Is It

As a student, you would realize the necessity of Internet today.


The Current State of ICT technologies

• Web 2.0,
• Wed 3.0
• Convergent technologies
• Social, mobile, and assistive media

The Internet has been a forceful tool to the current situation of our
lives that is why it is very significant to make the best of the Internet. Web
1.0 is a term created to differentiate the first stage of World Wide Web (WWW)
in comparison with the present stage of the Internet. When the World Wide
Web has developed, most web pages were static which is also known as flat
page or stationary page which is the page is “as is” and cannot be operated
by the user.
Around year 2004 the term Web 2.0 was first used to
differentiate the current internet technology with the past
technology. At this stage, it is the beginning of social
media like Twitter, Facebook, and Youtube are wide use
and popular. The users can interact, contribute, and
create their own internet space and content resulting to

11/12 Empowerment Technology 9 DepED-Division of Lapu-Lapu City


explosion of information available for everyone on the net. The Internet is now
a means to interact and communicate with people in a virtual community.

Web 3.0 is called and referred to by web experts as


sematic web or data driven web content and response.
The context of the search of the user is processed by a
programming language to help the user by presenting
options of what the person is interested in as they
interact, responds, contributes, and collaborates on the
web. For example, is when you search for the best restaurant to visit in a
specific area, it may look for your previous visits from other restaurants and
if you have rated them whether good or bad. In view, Web 3.0 will search for
restaurants that have a similar menu, good rating, and budget that fit your
preference in the past. Web 3.0 will not make obsolete or change Web 2.0 but
simply describes an additional use of data created by the users and the use
of enormous data available on the net.

Trends in ICT
As the world of ICT continues to grow, industry has focused on some
innovations. These innovations provide to the needs of the people that benefit
most out of ICT whether it is business or personal use. The trends are the
current front runners in the innovation of ICT specifically:

1. Convergence
Technological convergence is a progression of technological
developments that combine into a new system bringing together different
types of applications and media materials. It is also a synergy of
technological innovations to work on a similar goal or task. For example, a
tablet computer is a device that allows the use of its monitor as game
console, video or radio playback, display photos, browse websites and stream
various applications and data from the Internet.

2. Social Media
Social media is a website, application, or online channel that
enables web users to create, co-create, modify, discuss, and exchange use-
generated content.
There are six types of social media:
a. Social Networks. These are sites that allow you to connect with the
other people with the same interests or background. User can create
account and can set up profile, add people, create groups, and share
content. Examples: Google+ and Facebook
b. Bookmarking Sites. These sites will store and manage links to
numerous websites and resources. Most of these sites let you create

11/12 Empowerment Technology 10 DepED-Division of Lapu-Lapu City


tag that allows you and others to easily search or share them.
Examples: Pinterest
c. Social News. These sites allow users to post their personal news
items or links to other news sources. The users can comment on the
post and comments may be also be ranked. Examples: reddit and
Digg
d. Media Sharing. These are sites that allow you to upload and share
media content like images, music, ands video. These sites have more
additional social features like liking, commenting, and having user
profiles. Examples: Flicker, Youtube, and Instagram.
e. Microblogging. These sites concentrate on short updates from the
user. Those subscribed to the user will be a free able to receive these
updates. Examples: Twitter and Plurk
f. Blogs and Forums. These websites allow users to post their content.
Likewise, other users can comment also on the said topic. Blogger,
Wordpress, and Tumbler are some of free blogging platforms.

3. Mobile Media

With the increasing Mobile media, the popularity of smartphones and


tablets has taken a major rise over the years. Smartphone is an integration of
various technologies rolled into one. Some of these devices are capable of
using high-speed internet. Today, the latest mobile devices use 4G Networking
(LTE) which is currently the fastest mobile network and these mobile device
uses different operating system:
a. iOS – used in Apple devices and tools
b. Android – an open operating system developed by Google which
means that several mobile phone companies use this OS for free.
c. Blackberry – used in Blackberry devices and tools
d. Windows Phone OS – a fastened, and propriety operating system
developed by Microsoft
e. Symbian – original smartphone OS and used by Nokia devices
f. WebOS – originally used for smartphones and currently used
for smart TV’s
g. Windows Mobile – developed by Microsoft for smartphones and
pockets PCs

4. Assistive Media

In 1996, Assistive Media is nonprofit organization founded in Ann


Arbor, Michigan, USA. The organization was the first internet-based reading
services for reasons services for persons with visual and reading impairments
as echoed from the word of its founder David H. Erdody. You may visit
http://www.asisstive.org for several of audio recordings used to read to the
user.

11/12 Empowerment Technology 11 DepED-Division of Lapu-Lapu City


Answer the following questions:
1. What do you mean by Internet?
2. What do you think the difference of Web.20 with Web 3.0?
3. What are the common social media sites you are currently using in
communication?

Assessment

Self-Check 1.2

A. Identify what is being asked. Write your answer on the space provided
before the number.

_______________1. It was first used to differentiate the current internet


technology with the past technology.
______________2. It is a nonprofit organization founded in Ann Arbor,
Michigan, USA.
_______________3. These are sites that allow you to store and manage links to
various websites and resources
_______________4. It is also a synergy of technological advancements to work
on a similar goal or task.
______________5. These websites allow users to post their content

11/12 Empowerment Technology 12 DepED-Division of Lapu-Lapu City


B. Matching Type: Match Column A with column B. Write the letter of the
correct answer on the space before each number.

A B
______1. iOS A. used by Nokia devices
______2. Symbian B. a closed and propriety operating
system developed by Microsoft
______3. Android C. used in Blackberry devices
______4. WebOS D.developed by Microsoft for
smartphones and pockets PCs
______5. Windows Mobile E. a closed and propriety operating
system developed by Microsoft
F. now used for smart TV’s
G. an open operating system developed
by Google
H. used by Apple device

Refer to Answer Key

11/12 Empowerment Technology 13 DepED-Division of Lapu-Lapu City


Make an article that will comprehensively explain the importance of ICT technologies based on
the given guide questions:
1. Why do you think microblogging platforms have become popular when regular blogging
platforms already exist?

2. What do you think of Web 3.0? Do you think it will be realized someday in the future?

Rubrics for an Article Making

Contents Excellent Good Poor


(5) (3) (1)

Spelling Almost all words


spelled correctly
Capitalization Begins all
sentences but one
with uppercase
letters.
Punctuation Correct ending
punctuation in
every sentence but
one.
Grammar Simple sentences
are grammatically
correct.
Handwriting Legible. Good
spacing and
alignment.
Total Points

11/12 Empowerment Technology 14 DepED-Division of Lapu-Lapu City


What’s In

Word analysis
Figure out the letters inside the box to make a word and make a statement
about it.

N I O T A C I L A P P

1. ____________________________________

N E I L N O

2. _____________________________________

What Is It

From the activity given, it is very important to familiarize the functions


of online platforms in our daily activities like staying in touch with our family.

Online Systems, Functions and Platforms

A “Platform” is a collection of technologies that are utilized as a


foundation upon which other applications, processes or technologies are
created and it is a set of standards that supports software creators to make
use of a software applications for the platform.

Online Platforms is an online marketplace that place in one party in


touch in another, such as buyer and sellers. These technologies help us to
produce and share more meaningful information through online platforms.

PRIMARY IMPACTS OF ONLINE PLATFORMS

Social impacts
Staying in touch - online platforms bring families and friends closer
together, despite geographic separation, with features such as social media

11/12 Empowerment Technology 15 DepED-Division of Lapu-Lapu City


posting, instant messaging and video chat, and new options periodically
emerging at no cost to users.
Human health, including child health and safety - online platforms can
play a role in improving health outcomes. For example, the Zika virus and
Ebola records gathered from Internet searches have been used to track the
spread of diseases such as the flu.

Responsibility issues
Platforms’ responsibility for user behaviour in general - appropriate
limitations of liability for Internet intermediaries play a fundamental role in
promoting innovation and creativity, the free flow of information, incentives
for co-operation among stakeholders and economic growth.
Filtering to comply with legal requirements - online platforms be
obligated to monitor and, where necessary, remove or block user content that
does not conform to legal requirement. The common accountabilities for
platform are to monitor themselves for illegal content that are prohibited in
many jurisdictions particularly question has grown beyond the familiar issues
like opposing hate language, pornography, violence, intellectual property,
infringement and the sale of unsafe products.
Filtering to comply with private standards - online platforms categorizes
content in accordance with their own standards. For example, Facebook has
guidelines about what can and cannot be posted.
Responsibility for third-party apps - app stores provide a benefit to
users by checking the apps to make sure they meet certain standards, such
as that they are not malware and are compatible with the applicable operating
system

Online platforms can be great help for a user due to the number of
options. They can be classified as follows:
• Social Media
• Search Engines
• Communication Services
• Payment Systems
• Advertising Platform
• Creative Content Outlets
The following lists are some of the online platforms and applications
that you can use to create online presentation, web page, newsletter,
infographics, music, video, and other multimedia contents: (mardocheo n.d.)
• Presentation – Prezi, Zoho Show, MS PowerPoint
• Newsletter,ICT content platforms – Dropbox, Tumblr, Wix
• Photo editing tools – Picasa, Adobe Photoshop, MS Paint
• Online collaborative tools – Google Drive, Viber, Facebook
• Cloud computing – Dropbox, Google Drive, Microsoft One
Drive
• Blog tools – Blogger, WordPress, LiveJournal
• Mapping tools – Google Maps, Wikimapia
• Music production – Sibelius

11/12 Empowerment Technology 16 DepED-Division of Lapu-Lapu City


• Survey and forms – Google Forms
• File Management Systems platforms – Zamzar, Word2pdf
• Curating tools – Pinterest, Storify, Trapit
• Web design platforms – Wix, Weebly, Adobe Dreamweaver
• Web Management platforms – Drupai, WordPress, Joomia

The online platform use in ICT makes it easier for users to interact, to collect,
and use the data from the user’s interactions for their own needs.

Read the following statement and write the correct answer in the blank
provided for.

1. ________________ an online platform the brings the families and friend closer
together.
2. ________________ an online platform which play a role in improving health
outcomes.
3. ________________is a group of technologies that are used as a base upon
which other applications.
4. ________________ a responsibility issue which also filter content in
accordance with their own standards.
5. _________________ a responsibility issue which monitors for illegal content
that are prohibited in many jurisdictions.

Self-Check 1.3

A. Identify the following online platforms and applications that you can
use in creating online presentation, web page, newsletter,
infographics, music, video, and other multimedia. Write your answer
on the space provided for

1. Survey and forms ___________________________

2. Music production ___________________________

11/12 Empowerment Technology 17 DepED-Division of Lapu-Lapu City


3. Photo editing tools ___________________________

4. Cloud computing __________________________

5. Web design platforms ___________________________

6. Online collaborative tool ___________________________

7. Newsletter,ICT content platforms ___________________________

8. Blog tools ___________________________

9. Curating tools ___________________________

10. Web Management platforms ___________________________

Directions: On the box below, make a paragraph explaining the most online
platform/s you are using. For the paragraph’s introduction, justify why you choose
this platform.

11/12 Empowerment Technology 18 DepED-Division of Lapu-Lapu City


Lesson 2 - Online safety, security, ethics, and
etiquette

What I Need to Know


This will give you an idea of the skills or competencies you are expected to
learn in the module.

This lesson is designed and written with you in mind. It is here to help
you understand about Online safety, ethics and etiquette. The scope of this
module permits it’s to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The
lessons are arranged to follow the standard sequence of the course.
At the end of this module, you should be able to:
Content Standards:
B. demonstrate an understanding of the ICT in the context of global
communication for specific professional track
Performance Standards:
B. compose an insightful reflection paper on the nature of ICT in the
context of their lives, society, and professional tracks, (Arts, Tech Voc,
Sports, Academic..
Learning Competency:
1. apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific
professional tracks.

11/12 Empowerment Technology 19 DepED-Division of Lapu-Lapu City


What I Know
This part includes an activity that aims to check what you already know about
the lesson to take. If you get all the answers correctly (100%), you may decide
to skip this module.
Pre-Test 2.0
Let us determine how much you already know about identifying online
safety, ethics and etiquette. Take this test.

Directions: Mark [√] if you agree with the statement and [X] if you
disagree on the space provided before each number.

___1. Letting people know your birthday is probably a must but having
it in your profile it makes you vulnerable to identity theft.

___2. My laptop has an antivirus so it is okay to open most email


attachments like videos and e-cards.

___3. There is a danger in posting information about your future plans


like vacation.

___4. You received an email stating that your mother’s bank account is
going to be forfeited if you do not respond to the email, Is it safe to reply?

___5. A visus is a malware that multiples and infects other computers


through flash drives.

___6. Keybloggers are software that show pop-up ads even if you are not
using your browser.

___7. You friend would like to ask your security password to open
account in a certain online game, will you give her your password?

___8. You forgot to answer your assignment in English which is an


essay, for you to have an answer you do research and you found out a website
offering free essays. Is it okay to use the essays from a free essay website?

___9. Search engines scan websites for search results even if you have
set your post to “private”.

___10. Is it necessary to protect important work and personal


information stored in a computer through creating secure password?

Refer to Answer Key

DepED-Division of Lapu-Lapu City 20 TLE/TVL


What’s In
This is a brief drill or review to help you link the current lesson with the
previous one.

How Safe Am I?
Below is a questionnaire about how much information you have shared
in the Internet which would determine your safety. Put a check [√] under
Shared or Not Shared.

Type of Information Shared Not Shared


1. Your birthday
2. First name
3. Last name
4. Middle name
5. Your home phone number
6. Your cellphone
7. Current and previous school
8. Your address

What Is It
This section provides a brief discussion of the lesson. This aims to help you
discover and understand new concepts and skills.

After performing the activity, how many checks did you have for
Shared? Is there any possible danger happens?

Online Safety and Security


“I think computer viruses should count as life. I think it says something about human
nature that the only form of life we have created so far is purely destructive.
We’ve created life in our own image.” - Stephen Hawking

The Internet is a powerful tool for learning and communication with people.
It can be used to promote business, stay in touch with family and friends
that are far away. Entertainment is also a source through gaming, online
communities, and everything in between. However, there are many dangers

DepED-Division of Lapu-Lapu City 21 TLE/TVL


that you must watch on.
The Internet is defined as the information superhighway. This means that
anyone has access to this highway, can place, and can grab that information
even if you set your information privately. This is the reason why social
networking sites keep improving their security features like Facebook.

The Commandments for Computer Ethics


1. Thou shalt not use a computer to harm other people.
It is wrong to make use of a computer to hurt others by destroying or
controlling their own documents or essentially by taking their own
records.
2. Thou shalt not interfere with other people’s computer work. (20en)
It is wrong to widen or do things that may intrude or disrupt others
computer works or basically by spreading computer virus.
3. Thou shalt not snoop around in other people’s choice
It is deceptive to look others computer documents or works. Everyone
should know and practice "PRIVACY".
4. Thou shalt not use a computer to steal.
It is unethical to utilize a computer to steal or to take others computer
works.
5. Thou shalt not use a computer to bear false witness.

The computer with internet connectivity can easily escalate gossips


very quickly. Putting out false matters and information is unethical.
6. Thou shalt not use or copy software for which you have not paid.
Software is an intellectual product. Getting illicit duplicates of
copyrighted programming is as awful as copying a copyrighted book .
7. Thou shalt not use other people’s computer resources without
authorization.
It is wrong to copy or to take someone’s file or work in the absence of
any permission for the original author or the true owner.
8. Thou shalt not appropriate other people’s intellectual output.
It is unethical of copying somebody’s Intellectual property without
proper authorization is software piracy.
9. Thou shalt not think about the social consequences of the program
you write.
Constantly think of the outcome that you may get in some thing you
share or you make in a computer thru Internet.
10. Thou shalt not use a computer in ways that show consideration and
respect.
It is right to utilize a computer to display admiration and respect to
others in showing consideration and care to other.

DepED-Division of Lapu-Lapu City 22 TLE/TVL


Internet is a public placed and it is up to you to protect yourself. The
following are some tips to help you to stay safe when using the Internet.
1. Do not reply or click links from suspicious emails.
2. Do not just agree terms and conditions; read and know it.
3. Be mindful of what you share online and what site you share it
to.
4. Do not use pirated ones; buy the software
5. Avoid downloading anything from untrusted websites.
6. Check out the privacy policy page of a website to learn how the
website handles the information you share.
7. If you have Wi-fi at home, make it a private network by adding a
password.
8. Know the security features of the social networking site you use.
By securing your profile private, search engines will not be able
to scan your profile.
9. Install and updates an antivirus software on your computer. Use
only one antivirus software to avoid conflicts.
10. Avoid logging in to public networks/ Wi-fi.
11. Do not share your password with anyone.
12. Add friends you know in real life.

What I Have Learned


This includes questions or blank sentence/paragraph to be filled in to
process what you learned from the lesson.

Answer the following questions:

1. Who wrote “The Ten Commandments of Computer Ethics?


2. What is his purpose?

DepED-Division of Lapu-Lapu City 23 TLE/TVL


Assessment
This is a task which aims to evaluate your level of mastery in
achieving the learning competency.

Self-Check 2.1

A. Directions: Write down the needed information that would reveal safety and
unsafe activities when you are online? Give at least 3.

Online Safety

Safe Unsafe

B. Briefly answer the questions in three sentences.


1. How do you define Internet?
2. Why is it essential to stay safe online?
3. How necessary to you the online ethics and etiquette in using computer
technology?

Refer to Answer Key

DepED-Division of Lapu-Lapu City 24 TLE/TVL


Additional Activities
In this portion, another activity will be given to you to enrich your
knowledge or skill of the lesson learned. This also tends retention of
learned concepts.

Explore yourself! Privacy Policies

Look in a social networking site and examine for the sites’ privacy policy. The
link is normally found at the bottom of the page and sometimes identified only as
“Privacy”. Write a summary on how the websites handles both your privacy and
public information.

DepED-Division of Lapu-Lapu City 25 TLE/TVL


What’s In

Drawing Words
Directions: Read the questions comprehensively.
1.How would you draw “danger”?
2. How would you draw “virus”?

What Is It

After illustrating the word, student understands the true meaning and
importance of every word use especially when using Internet.

Dangers on the Internet


The Internet might be very useful tool for young people nowadays, but
direct messaging, chat rooms, emails and social networking sites can also
bring danger.
The following are some of the dangers you should be mindful when
using the Internet:

1. Spam (email spam) – also known as junk email, it is mostly


unsolicited commercial email sent from one source with identical
message sent to multiple recipients. Spammer is a term refers to a
person who makes electronic spam.
2. Malware – stands for malicious software
• Computer virus – a program that copies itself and then infects
the computer. It expands like areal biological virus wherein it
attaches itself to a host program and infect other computer
through the Internet and local networks or data storage.
• Computer worm – a dangerous computer program that
imitates itself through a network. Computer worm normally
spreads by developing weaknesses in operating system, and
producers of this software frequently send free updates to
clients to avoid the spread of worms. ILOVEYOU worm (Love
Bug Worm) created by a Filipino is an example of this malware.

DepED-Division of Lapu-Lapu City 26 TLE/TVL


• Trojan horse – a malicious program that that is disguised as
useful program but one downloaded or installed, leaves your
PC unprotected and allows hackers to get your information
• Spyware – a computer program that installed covertly on a
personal computer to collect information or even take control
over the computer without the knowledge of the user.
▪ Keyloggers – used to record the keystrokes performed by
the users. It gets something done in stealing the
password or any other sensitive information. It can
record email, messages, or any you type using keyboard.
▪ Adware – an application program intended to send you
advertisements, mostly pop-ups
3. Email spoofing – refers to deceitful email practice in which the
sender address is changed so that it would appear to have come from
a different source usually someone you know.
4. Phishing – a deceitful practice of trying to get confidential
information such as passwords and usernames. And credit card
details by making it appear as if it is coming from a trustworthy
source.
5. Pharming – a dangerous hacker attack on a website which
directs all traffic to that web site to another fictious websites. Its main object
is to obtain username and passwords as well as credit card and financial
information and use these to steal money electronically.

6. Hacker – a person who is able to enter and control other


people’s computer without authorization.

What I Have Learned

Answer the questions comprehensively.


1. What are the dangers in the Internet?
2. What common danger you have encountered while using computer or
Internet?

DepED-Division of Lapu-Lapu City 27 TLE/TVL


Assessment

Self-Check 2.2

A. Matching Type: Match Column A with Column B. Write the letter of the
correct answer on the space before each number.
A B
____1. Malware A. designed to send you advertisements
____2. Keyblogger B. sends an official-looking email to steal sensitive
personal information
____3. Adware C. replicates and can transfer from one computer
to another
____4. Spam D. exploits the DNS system
____5. Spyware E. unwanted email mostly from bots
____6. Internet F. the information superhighway
____7. Worm G. used to record keystrokes done by the user
____8. Phishing H. a malicious software
____9. Trojan I. a program that duplicates itself
____10. Virus J. an option to hide post
K. disguise as a useful program but it is not

Additional Activities

Cyber News Report


Directions: Form a group with three members each. Make a Research
for several news and events related to cybercrime using your multimedia
devices like smartphones or any video- recording device. Report it as if you
were a newscaster. Present in 2-3 minutes recording.

DepED-Division of Lapu-Lapu City 28 TLE/TVL


Rubrics for News Reporting/ Recording

https://image.slidesharecdn.com/rubricfornewsreporting

DepED-Division of Lapu-Lapu City 29 TLE/TVL


What’s In

The Internet can be an extremely useful tool for young people. There are
threats you should be aware of when using the Internet. One of the most
common threats is computer virus, a program that duplicates itself and then
infects the computer.

What Is It

Windows Security

It is sometimes important to protect work and personal information


stored in the computer. There are also circumstances that you want to prevent
other people from using your computer. Microsoft Windows has security
features that determine who can use and have the access to your computer.

Changing and Adding User accounts


Windows operating system provides user accounts in your operating
system to determine and manage the different kinds of users in one computer.
This is to ensure the security and privacy of each user who will use the
computer.

To open the user accounts:

1. Go to Control Panel

2. Look for “ User Accounts” icon or category.

3. In the User Accounts window, you will find out tasks that you can do with your
account.

DepED-Division of Lapu-Lapu City 30 TLE/TVL


To edit your account:
1. Open User Accounts in the control panel
2. In the Pick task, select Change an account.
3. Pick an account to change.

The following are the different kinds of accounts:


1. Computer administrator – controls all the contents and users of the
computer, installs programs, adds and deletes users.
2. Limited account – has limited control commands and have access to
his/ her particular account.
3. Guest – accounts created for temporary users and do not have access
to the other computer accounts and their content.

Once you are in account, you can choose any change that you like:
1. Change my account name – if you want to change your name displayed
in your account.
2. Create a password – provides security to new accounts or accounts
without existing password
3. Change my password – provides security to your account by changing
a previously created password.
4. Remove a password – you may remove an existing password if you
decide to do so.
5. Change my picture – allows you to change your picture displayed beside
your name
6. Change my account type – allows you to set an account either as
Computer Administrator or Limited.

DepED-Division of Lapu-Lapu City 31 TLE/TVL


Creating a New Password
Having a use name first is a requirement to
create a new password. Click on Create a
password and a dialog box will appear and
will need you to type in a new password and
retype it for confirmation. When creating a
password, be mindful that it is case sensitive,
this means that letters that are capital or
small must be typed as they are when you
enter them the first time.

Changing Passwords
1. Click the User account icon from the control panel (category
view).
2. Select Change an account.
3. You will be prompted to Pick an account to change.
• You can create or change a password on an existing account or
• Create a new account and password for the new account
4. Click Change Password when done, otherwise click Cancel if you
wish to discontinue.

Security Center
It is the place where you can set additional protection from danger
to your computer, especially when using the Internet. There are three
significant security settings available namely:
1. Firewall -helps your computer be protected from unauthorized
entries, virus, or worms from the Internet or network. It’s a recommendation
that you keep this setting turned on. However, Windows Firewall allows some
exception to programs and services that helps some application programs to
work better same with the other sites that you trust.
2. Automatic Updates – is another feature of Windows which when
turned on will automatically download updates from Microsoft Windows
websites. Secure areas vulnerability fixes any bugs in the operating system
and others are some of the Windows features usually meant for updating.
3. Virus Protection – it is the current antivirus software installed
in your computer and this option is recommended to be turned on always. It
is used to locate, find, and remove virus threats that are already on your
computer.

DepED-Division of Lapu-Lapu City 32 TLE/TVL


What I Have Learned

Answer the questions comprehensively.


1. What are the three significant security settings in Windows?
2. Which among these three security settings automatically updates
Windows features?

Assessment

Self-Check 2.3
A. Completion: Supply the missing word/s to complete the steps in
changing password. Write your answer on the space provide for.
1. Click the _____________icon from the control panel (category view).
2. Select _____________.
3. You will be prompted to _____________.
• You can create or change a password on an ___________ or
• Create a new account and password for the new account
5. Click ____________ when done, otherwise click Cancel if you wish to
discontinue.

B. Identify the term being described. Write the correct on the space
provided for.
___________1. It is the current antivirus software installed in your computer

___________2. It protects your work and personal information stored in the


computer.
__________3. It helps your computer be protected from unauthorized entries,
virus, or worms from the Internet or network.
__________4. It ensures the security and privacy of each user who will use
the computer.
__________5. It is another feature of Windows which when turned on will
automatically download updates from Microsoft Windows
websites.

DepED-Division of Lapu-Lapu City 33 TLE/TVL


Additional Activities

Directions: Follow the given steps to perform the performance tasks.

To open the user accounts:


1. Go to Control Panel

2. Look for “ User Accounts” icon or category.


3. In the User Accounts window, you will see tasks that you can do with
your account.
To edit your account:
1. Open User Accounts in the control panel
2. In the Pick task, select Change an account.
3. Pick an account to change.

Rubrics for your performance Task

Criteria Percentage Grade


Accuracy 50 %
Adherence to the 20%
procedures
Workmanship (applied 20%
online safety tips)
Speed 10%

Performance Rating

DepED-Division of Lapu-Lapu City 34 TLE/TVL


TLE/TVE/TVL 35 DepED-Division of Lapu-Lapu City
Pre-Test 1.0
1. C
2. C
3. C
4. A
5. B
6. C
7. B
8. A
9. B
10. A
Self-Check 1.1
1. T
2. F
3. T
4. T
5. 5
Self-Check 1.2
A.
1. Web 2.0
2. Assistive Media
3. Bookmarking Sites.
4. Technological convergence
5. Blogs and Forums
B.
1. H
2. A
3. G
4. F
5. D
Self-Check 1.3
1. Google forms
2. Sibelius
3. Adobe Photoshop, Picasa, MS Paint
4. Dropbox, Google Drive, Microsoft One Drive
5. Wix, Weebly, Adobe Dreamweaver
6. Google Drive, Viber, Facebook
7. Dropbox, Tumblr, Wix
8. Blogger, WordPress, LiveJournal
9. Pinterest, Storify, Trapit
10. Drupai, WordPress, Joomia
Answer Key
TLE/TVE/TVL 36 DepED-Division of Lapu-Lapu City
Pre-Test 2.0
1. √ 2. X
3. √ 4. X
5. √ 6. X
7. X 8. X
9. X 10. √
Self-Check 2.2
1.H
2. G
3. A
4. E
5. D
6. F
7. C
8. B
9. K
10. I
Self-Check 2.3
A.
1. User account
2. Change an account
3. Pick an account to change
4. – 5. Change Password; Cancel
B.
1. Antivirus protection
2. Windows security
3. Firewall
4. Windows operating system
5. Automatic updates
References

Book
“Assisstive Media”, Assistive Media. AssistiveMedia.org,n.d.Web.22 June
2015
Grahl, Tim. “ The 6 Types of Social Media”, Web Log post. Common Insights,
n.d Web. 22 June 2015
Jemma Devt.Group, Harnessing Computers, c2012 Jemma, Inc
Innovative Training Works, Inc., Empowerment Technologies,2016
Jemma Devt.Group, Empowerment Technology, c2017 Jemma, Inc

Web
https://assets.puzzlefactory.pl/puzzle/233/339/original.jpg
https://sites.google.com/site/socialimpactonict/ict-
https://www.google.com/search?q=reading+module+clipart&tbm
https://www.cmpe.boun.edu.tr/~say/c150/intro/lit10.html#:~:text=1)
https://enelsonbalneg.weebly.com/uploads/8/5/5/6/85567274/unit_2_les
son_2-4__14-43__second_week.pdf
https://image.slidesharecdn.com/rubricfornewsreporting
https://www.freestudy.com/wp-content/uploads/2019/08/Best-Free-
Online-Research-Courses.jpg
https://2.bp.blogspot.com/-safety.jpg
https://tedconfblog.files.wordpress.com/2014/10/online-research-
feature.jpg?w=530
https://www.quora.com/What-is-a-contextual-search-engine
http://teachers.teach-nology.com/cgi-bin/research.cgi
https://www.homeschoolspark.com/site/assets/files/1097/best-graphics-
software-1.jpg
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-
technologies-lessons-1-15/

DepED-Division of Lapu-Lapu City 37 TLE/TVL


OECD (2019), An Introduction to Online Platforms and Their Role in the
Digital Transformation, OECD Publishing, Paris,
https://doi.org/10.1787/53e5f593-en
https://www.klientsolutech.com/importance-of-internet-safety/
https://www.thebraggingmommy.com/what-you-need-to-know-in-
picking-the-best-baby-crib-mattress/
https://www.scribd.com/document/426545115/ICT-PLATFORMS-
pdf
https://www.english4it.com/unit/22/reading
https://www.deped.gov.ph/wp-content/uploads/2019/01/SHS-
Applied_Empowerment-Technologies-for-the-Strand.pdf
https://www.slideshare.net/RochelleNato/rules-of-netiquette-
81446275
https://en.wikipedia.org/wiki/Information_and_communications_tec
hnology#:~:text=Information%20and%20communications%20technol
ogy%20%28ICT%29%20is%20an%20extensional
https://en.wikipedia.org/wiki/Information_and_communications_tec
hnology#Etymology
https://en.wikipedia.org/wiki/Information_and_communications_tec
hnology
https://quizlet.com/267627142/online-safety-security-ethics-and-
etiquette-computer-ethics-flash-cards/
https://www.slideshare.net/JoseReyPea/reflection-paperabout-the-
ict
https://www.scribd.com/presentation/422729748/Lesson-2-Online-
Safety-Security-Ethics-And-Etiquette
https://www.scribd.com/presentation/353047172/Lesson-1-
Empowerment
https://www.slideshare.net/edithahonradez/pe-3-teachers-guide
https://www.slideshare.net/lhoralight/music-grade-3
https://www.studymumbai.com/virus-spyware-malware/
https://en.wikipedia.org/wiki/Information_and_communications_tec
hnology#:~:text=Information%20and%20communications%20technol
ogy%20%28ICT%29%20is%20an%20extensional
https://www.slideshare.net/maricelbaldomerodelara/lesson-1-
empowerment-technology
https://denagajulius.wordpress.com/2017/06/29/the-nature-of-ict-
in-the-context-of-my-life-society-and-to-my-chosen-professional-
trackstem/
https://www.scribd.com/presentation/370690980/Session-1-ICT-in-
the-Context-of-Global-Communication
https://www.lil-help.com/search/?q=if%20a

DepED-Division of Lapu-Lapu City 38 TLE/TVL


https://epdf.pub/the-economics-of-business-enterprise-an-
introduction-to-economic-organization-an.html
https://psa.gov.ph/content/2017-annual-survey-philippine-
business-and-industry-aspbi-economy-wide-all-establishments
http://media.openschool.bc.ca/osbcmedia/math/math7/etext/Math
7_mod4.pdf
https://docs.oracle.com/en/cloud/saas/human-
resources/20a/faohb/subject-areas.html
https://www.proprofs.com/discuss/c/operating-system
https://aboutprojectict.wordpress.com/2017/01/20/trends-in-ict/
https://en.wikipedia.org/wiki/Mobile_platforms
https://b2b.partcommunity.com/community/knowledge/hr/detail/9
591/Mobile
https://www.techopedia.com/definition/3411/platform-computing
https://northstar-data.com/services/
https://indianexpress.com/article/technology/tech-news-
technology/whatsapp-ifcn-partner-spot-false-messages-covid-19-
6393475/
https://www.slideshare.net/RochelleNato/rules-of-netiquette-
81446275
http://media.openschool.bc.ca/osbcmedia/math/math7/etext/Math
7_mod4.pdf
https://www.slideshare.net/RochelleNato/rules-of-netiquette-
81446275
https://brainly.ph/question/2454315
https://www.slideshare.net/JessaCalingcag1/empowerment-online-
safety
http://archive.org/stream/historyofpaintin06macf/historyofpaintin0
6macf_djvu.txt
https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Et
hics
https://www.oecd-ilibrary.org/science-and-technology/an-
introduction-to-online-platforms-and-their-role-in-the-digital-
transformation_53e5f593-en

DepED-Division of Lapu-Lapu City 39 TLE/TVL

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy