0% found this document useful (0 votes)
5 views4 pages

Activity No 2 Empowerment Technologies

Uploaded by

Josh Casas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Activity No 2 Empowerment Technologies

Uploaded by

Josh Casas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Republic of the Philippines

BILIRAN PROVINCE STATE UNIVERSITY


SCHOOL OF TEACHER EDUCATION
LABORATORY HIGH SCHOOL
School Id:600074
ISO: 9001: 2015 certified

ACTIVITY No. 02 | Things to Remember: EMPOWERMENT TECHNOLOGIES –SHS 11

These are the lessons that we had already discussed:


Lesson 1: ICT, Web1.0, Web 2.0, Web 3.0 & Emerging Trends Technologies
Lesson 2: Online Safety Security, Etiquettes and Netiquettes & Online Platforms

Directions: Read and analyze each questions based on what you have learned. Answer the
following given questions.

LESSON 1: INFORMATION & COMMUNICATION TECHNOLOGY (ICT)


Directions: Read and analyze each questions based on what you have learned. Answer the
following given questions.
Lesson Objectives:
Based on what we had discussed previously; students will be able to ;
1.Apply and Improves their knowledge on how ICT affects their everyday lives and the state of
our nation;
2. Compare and contrast the differences between online platforms, sites, and content;
3. Understand the future of the World Wide Web through Web 3.0;
4. Learn the different trends in ICT and use them to their advantage.

Test 1.
Direction: Write SO for social networks, BS for bookmarking, MS for media sharing, SN for
Social News, MB for micro-blogging & BF for blogs and forums. It is 1pt.each number.

_______ 1. Facebook _______ 2. Plurk _______ 3. Twitter _______ 4. Tumblr _______


5. reddit _______ 6. Google+ _______ 7. Instagram _______ 8. Pinterest _______
9. Blogger _______ 10. StumbleUpon _______ 11. Wordpress _______ 12. Digg _______
13. Youtube _______ 14. Flicker_______ 15. Amazon _________ 16. Gmail _________
17. Wix_______ 18. Pinterest _______ 19. Eclosia _______ 20. Whats-up_______
21. canva _____ 22. Weebly______ 23. Brainly______ 24. Strikingly_______
25. Lazada_______

Test 2, Direction: Write T if the statement is True or F if False on the blank before each number.
It is 1pt.each number.
______1. Web 2.0 is classified as dynamic webpage.
______ 2. People Magazine conducted the research on “The Selfiest Cities in the World”.
______3. Web 2.0 introduced static web pages that allow users to interact with the web page.
______ 4. Folksonomy allows user to categorize and locate information.
______ 5. Technological convergence is the synergy of technological advancement to work on
a similar goal or task.
______ 6. According to Nielsen, users who use the Internet spend more time in social media
sites than in any other type of site.
______ 7. Blogging sites are sites that focus on short updates from the user.
_____8. Android is a mobile operating system for Apple devices.
_____9. Assistive media is a nonprofit service designed to help people who have visual and
reading impairments.
_____10. ICT deals with the use of diff. comm. Tech. to locate, send, save & edit info.
_____ 11. Semantic web means that the page is stationary or flat page

12-16. There are five (5) Key Features of Web 2.0: What are they?
17-18. List the two (2) Trends in ICT?
19. who develop the web? and what year did he develop?
20-25) List at least (5) uses and importance of Technologies in our Society or in the field?

Directions: Read and analyze each questions based on what you have learned. Answer the
following given questions.

LESSON 2: ONLINE SAFETY, SECURITY ETHICS & NETIQUETTES


Part I. Enumeration
Directions: Enumerate everything that is asked in the following given question.
1. How are you going to make yourself safe while surfing the web?
2. State the threats that you may get if vital or important information will be shared online?
3. Discuss the following issues and crimes on the internet.
4. Discuss the general rules that one should follow when surfing the web?
5. List five (5) different search engines that you know. Which one works the best for you
and why?

Part II. Identification


Directions: Choose the correct answer inside the box.
1. ICT refers to all the technology used to handle ________________________ and
access to information from varied sources
2. ____________uses pocket-based transmitted radio signals.
3. The internet connection using telephone lines is called __________________________.
4. _________________is used to assist in online translation of natural language into
another via the computer.
5. A computer – generated environment that offers a three-dimensional interaction is called
__________________________.
6. The branch of the artificial intelligence that aims to make computers behave like humans
is the field of ___________________.
7. Retina scanning, fingerprint codes, and voice patterns are examples of
_____________________.
8. _____________________is a type of platform that allowed merchants to develop online
stores.
9. The platform used in the education sector to offer distance education is called
_______________________
10. _______________________is a cybercrime that aims to steal personal information.
Telecommunication | Bluetooth | Dial-Up Services | Computer-aided Translation
Virtual reality | Artificial Intelligence | Biometrics | E-Commerce
Online Learning Platforms | Identity Theft

Part III. Conceptual Thinking


A.
11-12. Differentiate online ethics and netiquettes?
13-15. What do you think are the advantages of following and applying the advanced online
research techniques? Cite a situation and explain.
16-18. In what ways or situations you can make use of the common ICT tools in your
prospective career path?
19-20. Do you have limitations In making use of the different online platforms if ever you choose
to pursue careers in ICT?
ASSIGNMENT NO. 1:
LESSON 2: ONLINE SAFETY, SECURITY ETHICS & NETIQUETTES
Directions: For your assignment no.1. Make a Digital Poster about Online Safety, Security
Ethics and Netiquettes and Upload it on your Facebook Timeline. (15% for Reactors) (30%
for your Poster) and (5% for Fb Posted). Be creative! Use those Imaging and Designing
platforms that could help you on making a Digital Poster for OSSEN. For ex: Canva, etc. Be
Initiatives! So that, all the computer users will apply and learned about the rules of Netiquettes
while surfing the web.
Choose only one of the followings. Students will choose what they prefer:
Note: If you will choose to make a digital poster on making an OSSEN. Choose any online
platforms like canva or other Imaging and Designing platforms that could help you to make for a
Digital Poster about Online Safety Rules in Netiquettes.
But;
If you will choose an Illustration Board, you need to draw and write the rules in netiquettes or
OSSEN.
1. Digital Poster
2. Use 1/8- Illustration Board
ASSIGNMENT N0.2:

Directions: Reflect on the questions. Write your answer on a word application and use
short bond paper to print for your assignment.
LESSON 1 : ICT & WEB 1.0, WEB 2.0 & WEB 3.0
Question NO 1: In your Community or Barangay. Can you cite a particular program or event that
made use of ICT? How were the technologies being applied? Can you suggest ways to improve
that program or event?
Question NO 2: Explore the different examples of online learning platforms. What are the
features that attracted you most in each platform? What are the standards set of online learning
platforms? Use slide presentation and research those online learning platforms applications
based on each uses, functions and features of the applications at least 5 platforms or
applications that you always navigated or used and identify each platforms based on the types
of a web. With images. Good luck!!

Prepared by:

MR. JOSHUA A. CASAS,


E-Tech, Instructor

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy