100% found this document useful (1 vote)
1K views13 pages

SHS Empowerment Technology Weeks 1 2

This document provides an overview of a module on empowerment technology for senior high school students. It discusses key topics like different online platforms, information and communication technologies, the current state of ICT, and the evolution of the web from versions 1.0 to 3.0. The module aims to help students understand ICT in their daily lives and apply principles of online safety, security, ethics and etiquette.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views13 pages

SHS Empowerment Technology Weeks 1 2

This document provides an overview of a module on empowerment technology for senior high school students. It discusses key topics like different online platforms, information and communication technologies, the current state of ICT, and the evolution of the web from versions 1.0 to 3.0. The module aims to help students understand ICT in their daily lives and apply principles of online safety, security, ethics and etiquette.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

SENIOR HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Quarter 1 Weeks 1-2
BENMAR E. TUBEO
Author

A. The learner can compare and contrast the nuances of varied online platforms,
sites, and content to best achieve specific class objectives or address situational
challenges.

Before starting the module, I want you to set aside other tasks that will disturb you
while enjoying the lessons. Read the simple instructions below to successfully enjoy
the objectives of this kit. Have Fun!

1. Follow carefully all the contents and instructions indicated on every page of this
module.
2. Write in your notebook the concepts about the lessons. Writing enhances
learning, that is important to develop and keep in mind
3. Perform all the provided activities in the module
4. Let your parents/guardian assess your answers using the answer key card.
5. Analyze conceptually the post test and apply what you have learned.
6. Enjoy learning!

This module was designed to help you understand the current state of
Information and Communication Technology (ICT) using different types of web, online
systems, functions, platforms, and sites. It also teaches you how to apply online
safety, security, ethics, etiquette standards and practices in the use of ICTs on your
daily activities.

SHS EMPOWERMENT TECHNOLOGY Page 1


WEEK 1 AND 2
After going through this module, you are expected to:
1. improve their knowledge on how ICT affects their everyday lives and the state of
our nation;
2. compare and contrast the differences between types of web, online platforms,
websites, and their content;
3. understand the features of different types of Web;
4. know online safety, security, ethics, and etiquette standards and practices in
the use of ICT.
5. understand and make a reflection on the current state of ICT.

A. Direction: Choose the letter of the correct answer. Write the chosen letter on a
separate sheet of paper.

1. Technologies that provide access to information through telecommunications.


a. ICT b. Internet c. Computers d. Mobile Phone
2. A type of WEB which is known as flat page or stationery.
a. Web 2.0 b. Web 3.0 c. Web 1.0 d. Web 4.0
3. What does WWW mean?
a. World Wide Website c. Whole Wide Web
b. World Wide Web d. Whole World Website
4. Types of internet traits that aims to acquire sensitive personal information like
password and credit card details.
a. Attitude b. Behavior c. Norms d. Etiquette
5. It is a collection of internet-based communication tools and computer-assisted
channels dedicated to allowing users to interact, communicate, and share
information in a virtual community and network.
a. Social Media b. Group Chat c. Web Portal d. Website
6. Knowledge obtained from investigation, study, or instruction.
a. Research b. Data c. Information d. Ideas
7. Types of internet traits that aims to acquire sensitive personal information like
password and credit card details.
a. Hacking b. Spamming c. Virus d. Phishing
8. It provides a common framework that allows data to be shared and reused
across application, enterprise, and community boundaries.
a. Static Web b. Semantic Web c. Dynamic Web d. Hyper Web
9. It’s a way of harassing, threatening, embarrassing, and targeting a person with
the use of technology.

SHS EMPOWERMENT TECHNOLOGY Page 2


WEEK 1 AND 2
a. Cyber Crime c. Cyberbullying
b. Stealing’s one’s identity d. Hacking
10. It is a synergy of technological advancements that describes the layer of
abstractions that enable different technologies to interoperate efficiently as a
system to work on a similar task or goal.
a. Collaboration b. Convergence c. Interconnection d. Unification

Lesson 1: Introduction to Information and Communication


Technologies

Source: chelsuaner, wordpress.com, Empowerment Technology

Information - Knowledge obtained from investigation, study or instruction


Communication - The imparting or exchanging of information or news
Technology - Machinery or equipment developed from the application of scientific
knowledge.
Information and Communication Technology (ICT) - provide access to information
through telecommunication that deals with the use of different communication
technologies such as mobile phones, telephones, the Internet, etc. to locate,
save, send and edit information.

SHS EMPOWERMENT TECHNOLOGY Page 3


WEEK 1 AND 2
Current State of ICT

ICT is an extended term of Information Technology (IT) in which it stresses the


role of unified communications and the integration of telecommunications, computers
as well as necessary enterprise software, middleware, storage, and audiovisual
systems, digital form of communication such as mobile phones, internet, email
websites and blogging which enable users to access, store, transmits and manipulate
information.

Due to the fast development and improvement of our technology especially in


the fields of electronics and telecommunication, it gives us high productivity that gives
ease to our daily activities and work.
Here are some examples of devices that we always use nowadays as a product of
our improved Information and Communication Technologies.

● Desktop / Laptop Computer


● Mobile Phones
● Tablets

These devices are used to make calls, send information over the internet, send text
messages, make emails, surf the internet, and navigate over different websites for
information and entertainment such as watching movies, video clips, listening to
music, and playing games both online and offline manner. These devices are
empowered also by the different advance applications that can now navigate over the
internet like productivity software such as:

● Microsoft Word – used for data processing


● Microsoft Excel – used for spreadsheets
● Microsoft PowerPoint – used for presentations and digital imagery
● Microsoft Outlook – used for emails
● Adobe Photoshop – used for photo editing

Computer - Is an electronic device for storing and processing data, typically in binary
form, according to instructions given to it in a variable program.

Internet - It is the global system of interconnected computer networks that use the
Internet protocol suite (TCIP/IP) to link billions of devices worldwide. It includes
several high bandwidth data lines that comprise the internet “backbone”. These lines
are connected to major internet hubs that distribute data to other locations such as
web servers and ISPs.

World Wide Web (WWW)


● commonly known as the Web, WWW, or the W3.
● Invented by Sir Tim Berners in 1989 a British computer scientist.
● An information system on the internet that allows documents to be connected
to other documents by hypertext links, enabling the user to search for
information by moving from one document to another.
● It is an information space where documents and other web resources are
identified by URLs, interlinked by hypertext links, and can be accessed via the
internet.

SHS EMPOWERMENT TECHNOLOGY Page 4


WEEK 1 AND 2
Web Pages
● It is a simple document displayable by a browser that connected to the world
wide web
● It represents various types of information presented to the visitor of the browser
in an aesthetic and readable manner.
● Is a hypertext documents for the World Wide Web (WWW) that is identified by a
unique resource locator (URL)

The different online platforms of World Wide Web

1. Web 1.0 - It refers to the first stage of the World Wide Web evolution and
commonly called a read-only web which only offers users one-way communication
such as reading the contents because of its only consists of static pages connected
by hyperlinks and hosted on web servers.

2. Web 2.0 - It’s the second generation or stages of development and the evolution of
web 1.0 over the World Wide Web, characterized especially by the changes and
transition from static web pages to dynamic web pages or user-generated content
and the growth of social media. In this platform the internet technology became
more and more interactive. The internet became more available for everyone and
the users can now interact, contribute, and create their own internet space and
content (like the explosion of information and social media).

3. Web 3.0 - It is described by Time Berners Lee (Father of the WWW) as the read-
write-execute web. It’s the third generation or stage of internet services for websites
and applications that will focus on using a machine-based understanding of data
to provide a data-driven and semantic web technologies, distributed databases,
natural language processing, and machine learning. The ultimate goal of Web 3.0
is to create more intelligent, connected and open websites.

Static Web Page - This is known as a flat page or stationary page in the sense that
the page is “as is” and cannot be manipulated by the user. The content is also the
same for all the user navigating to this page that is referred to as Web 1.0

Dynamic Web Pages - It is the evolution of web 1.0 to web 2.0 in which from a static
web page, it has evolved by to dynamic web pages that display different content
each time its viewed. The user can see websites differently than the other e.g.
social networking sites, wikis, video sharing sites, hosted services, and web
applications.

Semantic Web Pages - Is a movement by the World Wide Web Consortium (W3C) that
encourages web developers to include semantic content in their web pages as
standard. It provides a common framework that allows data to be shared and
reused across application, enterprise, and community boundaries. Its aim is to
have a machine or servers that understand the user’s preferences to be able to
deliver web content specifically targeting the user.

Features of WEB 2.0

1. Folksonomy – a user-generated system of classifying and organizing online


content into different categories by the use of metadata such as electronic tags.
allowing users to categorize and classify/arrange information using freely
chosen keywords (e.g. tagging). Popular social networking sites such as Twitter,

SHS EMPOWERMENT TECHNOLOGY Page 5


WEEK 1 AND 2
Instagram, Facebook, etc. use tags that start with the pound sign (#). This is
also referred to as the hashtag.

2. Rich User Experience – it means that the applications are more pervasive,
dynamic, and interactive. Content is dynamic and is responsive to the user’s
input. An example would be a website that shows local content and in case of
social networking sites, when you logged in, your account is used to modify
what you see on their website.

3. User Participation – means that the web user is participating in web content
creation, tagging, and sharing. Social networking includes creating user profiles
to social networking applications and communicating with other web users
through those applications. The owner of the website is not the only one who
can put content. Others can place the content of their own utilizing comment,
reviews, and evaluations. Some websites allow readers to comment on an
article, participate in a poll, or review a specific product (e.g. Amazon.com,
online stores).

4. Long tail – Services are offered on-demand rather than on a one-time purchase.
In certain cases, time-based pricing is better than file size-based pricing or vice
versa. This is synonymous with subscribing to a data plan that charges you for
the amount of time you spent on the internet, or a data plan that charges you
for the amount of bandwidth you used.

5. Software as a service – users will be subscribed to software only when needed


rather than purchasing them. E.g. Google docs used to create and edit word
processing and spreadsheet documents online. Software as service allows you
to “rent” software for a minimal fee or subscriptions.

6. Mass Participation – universal web access diverse information through web


sharing. Since most users can use the internet, Web 2.0 content are based on
people from various cultures.

Trends in ICT

1. Convergence – it is an evolution of technological developments and


advancements that merge into a new system bringing together different types of
applications and media to work on a similar goal or task. For example, besides
using your personal computer and laptop to create word documents now you
can use also your smartphone to attain the same goal and task.

2. Social Media – are interactive computer-mediated technologies that facilitate


the creation or sharing of information, ideas, career interest and other forms of
expression via virtual communities and networks. It is a website, application, or
online channel that enables web users to create, co-create, discuss, modify, and
exchange user-generated content.

Six types of Social Media

a. Social Networks – a dedicated website or other application that allows users


to connect with other people with the same interest or background by

SHS EMPOWERMENT TECHNOLOGY Page 6


WEEK 1 AND 2
posting information, comments, messages, etc. An example of this is
Facebook and Google+

b. Bookmarking Sites – Sites that allows you to store and manage links to
various website and resources. Most of this site allows you to store,
organize, search and manage bookmarks of web pages and create a tag to
others. Example is Pinterest

c. Social News – Sites that allow users to post their own news items and
stories or links to other news sources. The users can also comment on the
post and stories are ranked based on popularity, as voted on by other users
of the site or by the website administrators. Example is Reddit and Digg.

d. Media Sharing – Sites that allow you to upload and share media content
like images, music and video to a website that can be accessed from
anywhere in the world. You can share that media with the world or in a
selected group of friends. Many media sharing sites allow you to place media
on other sites using “embedding”. Example is YouTube, Instagram, and
Flickr.

e. Microblogging – Sites that focus on short updates from the user. It is a


combination of instant messaging and content production. With microblog
you share short messages with an online audience to improve engagement.
Those that subscribed to the user will be able to receive these updates.
Examples are Twitter and Plurk.

f. Blogs and Forums – These websites allow users to post their content. Other
users can comment on the said topic.

3. Mobile Technologies – is a technology that goes where the user goes. It


consists of portable two-way communications devices, computing devices like
computer capabilities and the network technology that connects them with the
use of mobile phones. The popularity of smartphones and tablets has taken a
major rise over the years. This is large because of the devices’ capability to do
the task that was originally found in PCs. Several of these devices are capable of
using a high-speed internet. Today the latest model devices use 5G networking
(LTE), which is currently the fastest.

Different Mobile Operating System (OS)


● iOS – use in apple devices such as iPhone and iPad
● Android OS – is an open-source OS developed by Google. Being open-
source means mobile phone companies use this OS for free.
● Blackberry OS – use in blackberry devices
● Windows Phone OS – A close source and proprietary operating system
developed by Microsoft.
● Symbian – the original smartphone and now in smart TVs
● Windows Mobile – developed by Microsoft for smartphones and pocket
PCs.

4. Assistive Media – Is a nonprofit service designed to help people who have


visual and reading impairments. A database of audio recordings and
audiobooks is used to read to the user.

SHS EMPOWERMENT TECHNOLOGY Page 7


WEEK 1 AND 2
5. Cloud Computing – it is the on-demand availability of computer systems
resources services especially data storage (cloud storage) and computing power
without direct active management by the user. This includes servers, storage,
databases, networking, software, analytics, and intelligence over the internet to
offer faster innovation, flexible resources, and economies of scale.
Examples: Microsoft, Google, Yahoo, Gmail.

Three Components of Cloud Computing


1. Client Computers – is the device that end-users interact with the cloud.
2. Distributed Servers – these servers are in geographically different places,
but the server acts as if they are working next to each other.
3. Datacenters – it is collection of servers where the application is placed and
is accessed via internet.

LESSON 2

ONLINE SAFETY, SECURITY, AND RULES OF NETIQUETTE

Source: Royalty-Free Stock Photo ID: 338275772, Rawpixel.com, Online Safety and
Security

Internet Safety – refers to the online safety of the people and their information when
using the internet. It is an act of maximizing the user’s awareness of personal safety
and security risk to private information and property associated with using the
internet and self-protection from computer crime.

Netiquette – is short for “Internet Etiquette”. It refers to the rules of online courtesy,
proper manners, and behavior online. It caters to the do’s and don’ts of online
communication.

TEN RULES OF NETIQUETTE

1. Remember your talking always to humans even your online.


2. Adhere to the same standards online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect another people’s time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.

SHS EMPOWERMENT TECHNOLOGY Page 8


WEEK 1 AND 2
8. Respect other people’s privacy.
9. Don’t abuse your power.
10. Be forgiving on other people’s mistakes.

Threat – refers to anything that has the potential to cause serious harm and might
exploit a vulnerability to breach security to a computer system and devices.

Cybercrime – a crime committed or assisted through the use of the internet.

Privacy Policy / Terms of Services (ToS) – tells the user how the website handles
and caters privacy and safety regarding its data.

INTERNET THREATS

1. Malware – stands for malicious software. It is a computer program designed to


infiltrate and damage computers without user consent.

5 Type of Malware

● Virus – a malicious program designed to replicate itself and transfer from


computer to another destroying data or crashing network services, do
nothing, or just annoying.

● Worm – a malicious program that replicates itself, transfer from one


computer to another by any type or means but not alter any files on your
machine.

● Trojan – a malicious program that disguises as a useful program but


once downloaded or installed, leaves your PC unprotected, and allows
hackers to get your information. It is designed to appear harmless on the
victim’s computer, but in fact, it accesses files or extracts sensitive data.

● Spyware – a program that runs in the background without you knowing


it (thus called “spy”). It can monitor what you are currently doing and
typing through keylogging.

● Adware – stands for advertising malware. A program designed to send


you advertisements, mostly as pop-ups.

2. Spam – an unwanted email mostly from bots or advertisers. It can be used to


send malware and unsolicited message to large numbers of recipients for the
purpose of commercial advertising.

3. Phishing – an unwanted acquisition of sensitive personal information like


passwords and credit card details. Its method is to gather personal information
using deceptive emails and websites.

4. Identity Theft – is a crime whereby criminals impersonate individuals, usually


for financial gain. Posers acting like the real owner of the account that they are
using.

5. Hacking – is where an authorized person uses a network, internet or modem


connection to gain access to security password to see data stored and stealing

SHS EMPOWERMENT TECHNOLOGY Page 9


WEEK 1 AND 2
important information such as files, personal details, and images on another
computer.

6. Cyberbullying – is a form of bullying that involves behavior or acts intended to


inflict harm, threats, embarrassment using technology.

Some Tips to stay safe online:

1. Don’t share with anyone especially online all the information with risk.
Example: Full name, Mother & Father Full name, Address, Birthday, Phone
number, Email address, Bank accounts, and username and password that you
always use via online.
2. Always be mindful on what you share online
3. Do not just simply accept terms and conditions, permitting apps or software to
manipulate your mobile phone and computer data. Practice reading it always
before deciding to accept terms.
4. Do not share your password with anyone.
5. Avoid visiting and entering untrusted and unknown websites.
6. Install antivirus software on your computer and always update it to the latest.
7. Avoid downloading anything from untrusted websites.
8. Do not reply or click links from suspicious emails.

Activity 1: Like or Unlike

Direction: This activity will test whether you understand the previous lesson.
Check (/) the like column if the statement is correct, then check (/) the unlike
column if the statement is incorrect.

Information and Communication Technologies LIKE UNLIKE


1. Rich User Experience is a user-generated system of
classifying and organizing online content into
different categories by the use of metadata such as
electronic tags.
2. Static Web Page is a flat page or stationary page in
the sense that the page is “as is” and cannot be
manipulated by the user.
3. Dynamic Web Pages provides a common framework
that allows data to be shared and reused across
application, enterprise and community boundaries.
4. Divergence is an evolution of technological
developments and advancements that merge into a
new system bringing together different types of
applications and media to work on a similar goal or

SHS EMPOWERMENT TECHNOLOGY Page 10


WEEK 1 AND 2
task.

5. Social Networks Sites allows you to store and manage


links to various website and resources.
6. Blogs and Forums are websites that allow users to
post their content. Other users are able to comment
on the said topic.
7. Safety refers to the online safety of the people and
their information when using internet.
8. Netiquette is short for “Internet Etiquette”. Refers to
the rules of online courtesy, proper manners and
behavior online. It caters the do’s and don’ts of online
communication.
9. Virus is a malicious program that disguises as a
useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get
your information.
10. Hacking is where an authorized person uses a
network, internet or modem connection to gain
access to security password to see data stored and
stealing important information’s such as files,
personal details and images on other computer.

The following are the things that need to remember about Information and
communication Technology.

Information and Communication Technology (ICT) - provide access to information


through telecommunication that deals with the use of different communication
technologies such as mobile phones, telephone, Internet, etc. to locate, save, send
and edit information.

World Wide Web (www) - An information system on the internet that allows
documents to be connected to other documents by hypertext links, enabling the
user to search for information by moving from one document to another.

Static Web Page - Is known as a flat page or stationary page in the sense that the
page is “as is” and cannot be manipulated by the user. The content is also the
same for all the user navigating to this page that is referred to as Web 1.0

Dynamic Web Pages - It is the evolution of web 1.0 to web 2.0 in which from static
web page evolve by adding dynamic web pages that displays different content each
time its viewed. The user is able to see website differently than the other e.g. social
networking sites, wikis, video sharing sites, hosted services and web applications.

SHS EMPOWERMENT TECHNOLOGY Page 11


WEEK 1 AND 2
Semantic Web Pages - Is a movement by the World Wide Web Consortium (W3C) that
encourages web developers to include semantic content in their web pages as
standard. It provides a common framework that allows data to be shared and
reused across application, enterprise and community boundaries. its aim is to
have machine or servers understand the user’s preferences to be able to deliver
web content specifically targeting the user.

Internet Safety – it refers to the online safety of the people and their information
when using internet. It is an act of maximizing user’s awareness of personal safety
and security risk to private information and property associated with using the
internet and a self-protection from computer crime.

Netiquette – is short for “Internet Etiquette”. Refers to the rules of online courtesy,
proper manners and behavior online. It caters the do’s and don’ts of online
communication.

Direction: Answer the following questions.

1. What are the 5 Trends in ICT and explain each trend.

2. List down the 3 online platforms and explain how they are different from each
other.

3. How can you protect yourself from different online threats?

4. Cite the importance of Netiquette.

5. What can you say about the current state of ICT today in our country? Suggest
ways how can you improve its current state.

A. Direction: Choose the letter of the correct answer. Write the chosen letter on a
separate sheet of paper.

1. Technologies that provide access to information through telecommunications.


a. ICT b. Internet c. Computers d. Mobile Phone
2. A type of WEB which is known as flat page or stationery.
a. Web 2.0 b. Web 3.0 c. Web 1.0 d. Web 4.0

SHS EMPOWERMENT TECHNOLOGY Page 12


WEEK 1 AND 2
3. What is WWW means?
a. World Wide Website c. Whole Wide Web
b. World Wide Web d. Whole World Website
4. Types of internet traits that aims to acquire sensitive personal information likes
password and credit cards details.
a. Attitude b. Behavior c. Norms d. Etiquette
5. It is a collection of internet-based communication tools and computer assisted
channels dedicated to allow users to interact, communicate and share information
in a virtual community and network.
a. Social Media b. Group Chat c. Web Portal d. Website
6. Knowledge obtained from investigation, study or instruction.
a. Research b. Data c. Information d. Ideas
7. Types of internet traits that aims to acquire sensitive personal information likes
password and credit cards details.
a. Hacking b. Spamming c. Virus d. Phishing
8. It provides common framework that allows data to be shared and reused across
application, enterprise and community boundaries.
a. Static Web b. Semantic Web c. Dynamic Web d. Hyper Web
9. It’s a way of harassing, threatening, embarrassing and targeting a person with the
use of technology is called?
a. Cyber Crime c. Cyberbullying
b. Stealing’s one’s identity d. Hacking
10. It is a synergy of technological advancements that describes the layer of
abstractions that enable different technologies to interoperate efficiently as a
system to work on a similar task or goal.
a. Collaboration b. Convergence c. Interconnection d. Unification.

Directions: Answer the following questions into to 3 -5 sentences.

1. Which part of the lesson gives you a great impact? What did you realized about
using ICT?

2. What can you say about our current state of technology today? Is good or bad?
When is it good for mankind? And when is it bad for mankind?

3. What is your stand about using our technology today? Are we safe or not? Why?

SHS EMPOWERMENT TECHNOLOGY Page 13


WEEK 1 AND 2

You might also like