TLE11 ICT Empowerment Tech Q1 W1
TLE11 ICT Empowerment Tech Q1 W1
Technical-
Vocational-
Livelihood (TVL)
ICT - Empowerment
Technologies
Quarter 1 - Week 1
i
Technical-Vocational Livelihood – Grade 11
Self-Learning Module
Week 1 - Module #
First Edition, 2020
Republic Act 8293 section 176 states that: No copyright shall subsist in
any work of the Government of the Republic of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit. Such agency of office
may, among other things. Impose as a condition the payment of royalties.
Management Team:
Schools Division Superintendent : Dr. Wilfreda D. Bongalos CESO V
Assistant Schools Div. Superintendent : Dr. Marcelita S. Dignos CESO VI
Chief Education Supervisor, CID : Dr. Oliver M. Tuburan
Education Program Supervisor, LRMDS: Mrs. Teresita A. Bandolon
Education Program Supervisor, TLE : Reynold Q. Velos
ii
Property of DepED-Division of Lapu-Lapu City | www.depedlapulapu.net.ph | (032) 340-7354
INTRODUCTORY MESSAGE
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21 st century skills while taking
into consideration their needs and circumstances.
As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners’ progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the module.
The hand is one of the most symbolized part of the human body. It is
often used to depict skill, action and purpose. Through our hands we may
learn, create and accomplish. Hence, the hand in this learning resource
signifies that you as a learner is capable and empowered to successfully
achieve the relevant competencies and skills at your own pace and time. Your
academic success lies in your own hands!
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.
iii
HOW TO USE THE MODULE
1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
6. Return this module to your teacher/facilitator once you are through with
it.
iv
Lesson 1 - Information and Communications
Technology
This lesson is designed and written with you in mind. It is here to help
you understand the Information and Communications Technology. The scope
of this module permits it’s to be used in many different learning situations.
The language used recognizes the diverse vocabulary level of students. The
lessons are arranged to follow the standard sequence of the course.
At the end of this module, you should be able to:
Content Standards:
A. demonstrate an understanding of the ICT in the context of global
communication for specific professional track
Performance Standards:
A. compose an insightful reflection paper on the nature of ICT in the
context of their lives, society, and professional tracks, (Arts,
Tech Voc, Sports, Academic.
Learning Competency:
1. Compare and contrast the nuances of varied online platforms, sites,
and content to best achieve specific class objectives or address
situational challenges.
A.2G B. 3G C. 4G D. 5G
5. This refers to the feature where users categorize and locate information
through tagging.
6. A feature of a dynamic website that allows user to put their own content.
7. According to this magazine, two Philippines cities are part of the top 10 in
their research.
10. This media is designed to help people who have visual and reading
impairments.
Form groups with five members. Answer honestly the given guide questions
presented below.
Guide questions:
1. What are the means of communication?
2. How many times have you checked and used your phones in a day to
communicate with?
What Is It
This section provides a brief discussion of the lesson. This aims to help you
discover and understand new concepts and skills.
After the activity, you may find chances about the importance of ICT
in a day to day task.
EDUCATION
• Schools use computers to protect and maintain the records of
information about the school and the students.
• Computers in schools are used for quick, effortless and effective
Telecommunications
• Computers are used in mobile phone communications to regulate the
calls and SMS (short messages service) or text traffic
• VoIP (Voice over Internet Protocol) is a voice communication application
via the internet which costs less than conventional means.
• Computers in home, schools, private and government offices, hospitals,
and almost everywhere are used to get in touch with other people. It
used to send picture, letters, video clips and music.
Health Services
• Emails are used widely to communicate with the doctors efficiently. Test
results and diagnoses are sent via the Internet.
• With the Internet, doctors share experiences and medical data with
other doctors around the globe to research and diagnose patients with
greater accuracy.
• Computers in hospitals are used by medical personnel to store medical
data, patients’ records, research materials, and other information to
effectively diagnose and treat patients.
• Online health information and consultations are now available on the
internet that shares of valuable experience and expertise will help treat
Government Services
Assessment
This is a task which aims to evaluate your level of mastery in
achieving the learning competency.
Self-Check 1.1
A. True or False: Write T if the sentence is correct; otherwise, write F on the space
provide before each number.
_________1. Information and Communication Technology (ICT compacts with
the use of different communications technology to locate, save, send, and
edit information.
________2. Classic homes have computers for research and learning by
students and the family for school lessons.
________3. Philippines was name as the “ICT Hub of Asia” by the numerous
international companies.
_______4. Military group uses computers to guide weapon systems from any
source and pinpoint targets.
data:image/png;base64
What Is It
• Web 2.0,
• Wed 3.0
• Convergent technologies
• Social, mobile, and assistive media
The Internet has been a forceful tool to the current situation of our
lives that is why it is very significant to make the best of the Internet. Web
1.0 is a term created to differentiate the first stage of World Wide Web (WWW)
in comparison with the present stage of the Internet. When the World Wide
Web has developed, most web pages were static which is also known as flat
page or stationary page which is the page is “as is” and cannot be operated
by the user.
Around year 2004 the term Web 2.0 was first used to
differentiate the current internet technology with the past
technology. At this stage, it is the beginning of social
media like Twitter, Facebook, and Youtube are wide use
and popular. The users can interact, contribute, and
create their own internet space and content resulting to
Trends in ICT
As the world of ICT continues to grow, industry has focused on some
innovations. These innovations provide to the needs of the people that benefit
most out of ICT whether it is business or personal use. The trends are the
current front runners in the innovation of ICT specifically:
1. Convergence
Technological convergence is a progression of technological
developments that combine into a new system bringing together different
types of applications and media materials. It is also a synergy of
technological innovations to work on a similar goal or task. For example, a
tablet computer is a device that allows the use of its monitor as game
console, video or radio playback, display photos, browse websites and stream
various applications and data from the Internet.
2. Social Media
Social media is a website, application, or online channel that
enables web users to create, co-create, modify, discuss, and exchange use-
generated content.
There are six types of social media:
a. Social Networks. These are sites that allow you to connect with the
other people with the same interests or background. User can create
account and can set up profile, add people, create groups, and share
content. Examples: Google+ and Facebook
b. Bookmarking Sites. These sites will store and manage links to
numerous websites and resources. Most of these sites let you create
3. Mobile Media
4. Assistive Media
Assessment
Self-Check 1.2
A. Identify what is being asked. Write your answer on the space provided
before the number.
A B
______1. iOS A. used by Nokia devices
______2. Symbian B. a closed and propriety operating
system developed by Microsoft
______3. Android C. used in Blackberry devices
______4. WebOS D.developed by Microsoft for
smartphones and pockets PCs
______5. Windows Mobile E. a closed and propriety operating
system developed by Microsoft
F. now used for smart TV’s
G. an open operating system developed
by Google
H. used by Apple device
2. What do you think of Web 3.0? Do you think it will be realized someday in the future?
Word analysis
Figure out the letters inside the box to make a word and make a statement
about it.
N I O T A C I L A P P
1. ____________________________________
N E I L N O
2. _____________________________________
What Is It
Social impacts
Staying in touch - online platforms bring families and friends closer
together, despite geographic separation, with features such as social media
Responsibility issues
Platforms’ responsibility for user behaviour in general - appropriate
limitations of liability for Internet intermediaries play a fundamental role in
promoting innovation and creativity, the free flow of information, incentives
for co-operation among stakeholders and economic growth.
Filtering to comply with legal requirements - online platforms be
obligated to monitor and, where necessary, remove or block user content that
does not conform to legal requirement. The common accountabilities for
platform are to monitor themselves for illegal content that are prohibited in
many jurisdictions particularly question has grown beyond the familiar issues
like opposing hate language, pornography, violence, intellectual property,
infringement and the sale of unsafe products.
Filtering to comply with private standards - online platforms categorizes
content in accordance with their own standards. For example, Facebook has
guidelines about what can and cannot be posted.
Responsibility for third-party apps - app stores provide a benefit to
users by checking the apps to make sure they meet certain standards, such
as that they are not malware and are compatible with the applicable operating
system
Online platforms can be great help for a user due to the number of
options. They can be classified as follows:
• Social Media
• Search Engines
• Communication Services
• Payment Systems
• Advertising Platform
• Creative Content Outlets
The following lists are some of the online platforms and applications
that you can use to create online presentation, web page, newsletter,
infographics, music, video, and other multimedia contents: (mardocheo n.d.)
• Presentation – Prezi, Zoho Show, MS PowerPoint
• Newsletter,ICT content platforms – Dropbox, Tumblr, Wix
• Photo editing tools – Picasa, Adobe Photoshop, MS Paint
• Online collaborative tools – Google Drive, Viber, Facebook
• Cloud computing – Dropbox, Google Drive, Microsoft One
Drive
• Blog tools – Blogger, WordPress, LiveJournal
• Mapping tools – Google Maps, Wikimapia
• Music production – Sibelius
The online platform use in ICT makes it easier for users to interact, to collect,
and use the data from the user’s interactions for their own needs.
Read the following statement and write the correct answer in the blank
provided for.
1. ________________ an online platform the brings the families and friend closer
together.
2. ________________ an online platform which play a role in improving health
outcomes.
3. ________________is a group of technologies that are used as a base upon
which other applications.
4. ________________ a responsibility issue which also filter content in
accordance with their own standards.
5. _________________ a responsibility issue which monitors for illegal content
that are prohibited in many jurisdictions.
Self-Check 1.3
A. Identify the following online platforms and applications that you can
use in creating online presentation, web page, newsletter,
infographics, music, video, and other multimedia. Write your answer
on the space provided for
Directions: On the box below, make a paragraph explaining the most online
platform/s you are using. For the paragraph’s introduction, justify why you choose
this platform.
This lesson is designed and written with you in mind. It is here to help
you understand about Online safety, ethics and etiquette. The scope of this
module permits it’s to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The
lessons are arranged to follow the standard sequence of the course.
At the end of this module, you should be able to:
Content Standards:
B. demonstrate an understanding of the ICT in the context of global
communication for specific professional track
Performance Standards:
B. compose an insightful reflection paper on the nature of ICT in the
context of their lives, society, and professional tracks, (Arts, Tech Voc,
Sports, Academic..
Learning Competency:
1. apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific
professional tracks.
Directions: Mark [√] if you agree with the statement and [X] if you
disagree on the space provided before each number.
___1. Letting people know your birthday is probably a must but having
it in your profile it makes you vulnerable to identity theft.
___4. You received an email stating that your mother’s bank account is
going to be forfeited if you do not respond to the email, Is it safe to reply?
___6. Keybloggers are software that show pop-up ads even if you are not
using your browser.
___7. You friend would like to ask your security password to open
account in a certain online game, will you give her your password?
___9. Search engines scan websites for search results even if you have
set your post to “private”.
How Safe Am I?
Below is a questionnaire about how much information you have shared
in the Internet which would determine your safety. Put a check [√] under
Shared or Not Shared.
What Is It
This section provides a brief discussion of the lesson. This aims to help you
discover and understand new concepts and skills.
After performing the activity, how many checks did you have for
Shared? Is there any possible danger happens?
The Internet is a powerful tool for learning and communication with people.
It can be used to promote business, stay in touch with family and friends
that are far away. Entertainment is also a source through gaming, online
communities, and everything in between. However, there are many dangers
Self-Check 2.1
A. Directions: Write down the needed information that would reveal safety and
unsafe activities when you are online? Give at least 3.
Online Safety
Safe Unsafe
Look in a social networking site and examine for the sites’ privacy policy. The
link is normally found at the bottom of the page and sometimes identified only as
“Privacy”. Write a summary on how the websites handles both your privacy and
public information.
Drawing Words
Directions: Read the questions comprehensively.
1.How would you draw “danger”?
2. How would you draw “virus”?
What Is It
After illustrating the word, student understands the true meaning and
importance of every word use especially when using Internet.
Self-Check 2.2
A. Matching Type: Match Column A with Column B. Write the letter of the
correct answer on the space before each number.
A B
____1. Malware A. designed to send you advertisements
____2. Keyblogger B. sends an official-looking email to steal sensitive
personal information
____3. Adware C. replicates and can transfer from one computer
to another
____4. Spam D. exploits the DNS system
____5. Spyware E. unwanted email mostly from bots
____6. Internet F. the information superhighway
____7. Worm G. used to record keystrokes done by the user
____8. Phishing H. a malicious software
____9. Trojan I. a program that duplicates itself
____10. Virus J. an option to hide post
K. disguise as a useful program but it is not
Additional Activities
https://image.slidesharecdn.com/rubricfornewsreporting
The Internet can be an extremely useful tool for young people. There are
threats you should be aware of when using the Internet. One of the most
common threats is computer virus, a program that duplicates itself and then
infects the computer.
What Is It
Windows Security
1. Go to Control Panel
3. In the User Accounts window, you will find out tasks that you can do with your
account.
Once you are in account, you can choose any change that you like:
1. Change my account name – if you want to change your name displayed
in your account.
2. Create a password – provides security to new accounts or accounts
without existing password
3. Change my password – provides security to your account by changing
a previously created password.
4. Remove a password – you may remove an existing password if you
decide to do so.
5. Change my picture – allows you to change your picture displayed beside
your name
6. Change my account type – allows you to set an account either as
Computer Administrator or Limited.
Changing Passwords
1. Click the User account icon from the control panel (category
view).
2. Select Change an account.
3. You will be prompted to Pick an account to change.
• You can create or change a password on an existing account or
• Create a new account and password for the new account
4. Click Change Password when done, otherwise click Cancel if you
wish to discontinue.
Security Center
It is the place where you can set additional protection from danger
to your computer, especially when using the Internet. There are three
significant security settings available namely:
1. Firewall -helps your computer be protected from unauthorized
entries, virus, or worms from the Internet or network. It’s a recommendation
that you keep this setting turned on. However, Windows Firewall allows some
exception to programs and services that helps some application programs to
work better same with the other sites that you trust.
2. Automatic Updates – is another feature of Windows which when
turned on will automatically download updates from Microsoft Windows
websites. Secure areas vulnerability fixes any bugs in the operating system
and others are some of the Windows features usually meant for updating.
3. Virus Protection – it is the current antivirus software installed
in your computer and this option is recommended to be turned on always. It
is used to locate, find, and remove virus threats that are already on your
computer.
Assessment
Self-Check 2.3
A. Completion: Supply the missing word/s to complete the steps in
changing password. Write your answer on the space provide for.
1. Click the _____________icon from the control panel (category view).
2. Select _____________.
3. You will be prompted to _____________.
• You can create or change a password on an ___________ or
• Create a new account and password for the new account
5. Click ____________ when done, otherwise click Cancel if you wish to
discontinue.
B. Identify the term being described. Write the correct on the space
provided for.
___________1. It is the current antivirus software installed in your computer
Performance Rating
Book
“Assisstive Media”, Assistive Media. AssistiveMedia.org,n.d.Web.22 June
2015
Grahl, Tim. “ The 6 Types of Social Media”, Web Log post. Common Insights,
n.d Web. 22 June 2015
Jemma Devt.Group, Harnessing Computers, c2012 Jemma, Inc
Innovative Training Works, Inc., Empowerment Technologies,2016
Jemma Devt.Group, Empowerment Technology, c2017 Jemma, Inc
Web
https://assets.puzzlefactory.pl/puzzle/233/339/original.jpg
https://sites.google.com/site/socialimpactonict/ict-
https://www.google.com/search?q=reading+module+clipart&tbm
https://www.cmpe.boun.edu.tr/~say/c150/intro/lit10.html#:~:text=1)
https://enelsonbalneg.weebly.com/uploads/8/5/5/6/85567274/unit_2_les
son_2-4__14-43__second_week.pdf
https://image.slidesharecdn.com/rubricfornewsreporting
https://www.freestudy.com/wp-content/uploads/2019/08/Best-Free-
Online-Research-Courses.jpg
https://2.bp.blogspot.com/-safety.jpg
https://tedconfblog.files.wordpress.com/2014/10/online-research-
feature.jpg?w=530
https://www.quora.com/What-is-a-contextual-search-engine
http://teachers.teach-nology.com/cgi-bin/research.cgi
https://www.homeschoolspark.com/site/assets/files/1097/best-graphics-
software-1.jpg
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-
technologies-lessons-1-15/