SENIOR HIGH SCHOOL
EMPOWERMENT TECHNOLOGY
                    Quarter 1 Weeks 1-2
                               BENMAR E. TUBEO
                                   Author
   A. The learner can compare and contrast the nuances of varied online platforms,
      sites, and content to best achieve specific class objectives or address situational
      challenges.
Before starting the module, I want you to set aside other tasks that will disturb you
while enjoying the lessons. Read the simple instructions below to successfully enjoy
the objectives of this kit. Have Fun!
   1. Follow carefully all the contents and instructions indicated on every page of this
      module.
   2. Write in your notebook the concepts about the lessons. Writing enhances
      learning, that is important to develop and keep in mind
   3. Perform all the provided activities in the module
   4. Let your parents/guardian assess your answers using the answer key card.
   5. Analyze conceptually the post test and apply what you have learned.
   6. Enjoy learning!
       This module was designed to help you understand the current state of
Information and Communication Technology (ICT) using different types of web, online
systems, functions, platforms, and sites. It also teaches you how to apply online
safety, security, ethics, etiquette standards and practices in the use of ICTs on your
daily activities.
     SHS EMPOWERMENT TECHNOLOGY                                                   Page 1
     WEEK 1 AND 2
After going through this module, you are expected to:
   1. improve their knowledge on how ICT affects their everyday lives and the state of
      our nation;
   2. compare and contrast the differences between types of web, online platforms,
      websites, and their content;
   3. understand the features of different types of Web;
   4. know online safety, security, ethics, and etiquette standards and practices in
      the use of ICT.
   5. understand and make a reflection on the current state of ICT.
   A. Direction: Choose the letter of the correct answer. Write the chosen letter on a
      separate sheet of paper.
   1. Technologies that provide access to information through telecommunications.
          a. ICT           b. Internet          c. Computers        d. Mobile Phone
   2. A type of WEB which is known as flat page or stationery.
          a. Web 2.0       b. Web 3.0           c. Web 1.0          d. Web 4.0
   3. What does WWW mean?
          a. World Wide Website                 c. Whole Wide Web
          b. World Wide Web                     d. Whole World Website
   4. Types of internet traits that aims to acquire sensitive personal information like
      password and credit card details.
          a. Attitude      b. Behavior          c. Norms            d. Etiquette
   5. It is a collection of internet-based communication tools and computer-assisted
      channels dedicated to allowing users to interact, communicate, and share
      information in a virtual community and network.
          a. Social Media b. Group Chat         c. Web Portal       d. Website
   6. Knowledge obtained from investigation, study, or instruction.
          a. Research       b. Data             c. Information      d. Ideas
   7. Types of internet traits that aims to acquire sensitive personal information like
      password and credit card details.
          a. Hacking       b. Spamming          c. Virus            d. Phishing
   8. It provides a common framework that allows data to be shared and reused
      across application, enterprise, and community boundaries.
          a. Static Web    b. Semantic Web      c. Dynamic Web d. Hyper Web
   9. It’s a way of harassing, threatening, embarrassing, and targeting a person with
      the use of technology.
     SHS EMPOWERMENT TECHNOLOGY                                                    Page 2
     WEEK 1 AND 2
         a. Cyber Crime                       c. Cyberbullying
         b. Stealing’s one’s identity         d. Hacking
   10. It is a synergy of technological advancements that describes the layer of
      abstractions that enable different technologies to interoperate efficiently as a
      system to work on a similar task or goal.
         a. Collaboration b. Convergence      c. Interconnection d. Unification
   Lesson 1: Introduction to Information and Communication
                         Technologies
            Source: chelsuaner, wordpress.com, Empowerment Technology
Information - Knowledge obtained from investigation, study or instruction
Communication - The imparting or exchanging of information or news
Technology - Machinery or equipment developed from the application of scientific
     knowledge.
Information and Communication Technology (ICT) - provide access to information
     through telecommunication that deals with the use of different communication
     technologies such as mobile phones, telephones, the Internet, etc. to locate,
     save, send and edit information.
    SHS EMPOWERMENT TECHNOLOGY                                                    Page 3
    WEEK 1 AND 2
                                Current State of ICT
        ICT is an extended term of Information Technology (IT) in which it stresses the
role of unified communications and the integration of telecommunications, computers
as well as necessary enterprise software, middleware, storage, and audiovisual
systems, digital form of communication such as mobile phones, internet, email
websites and blogging which enable users to access, store, transmits and manipulate
information.
        Due to the fast development and improvement of our technology especially in
the fields of electronics and telecommunication, it gives us high productivity that gives
ease to our daily activities and work.
   Here are some examples of devices that we always use nowadays as a product of
our improved Information and Communication Technologies.
   ●    Desktop / Laptop Computer
   ●    Mobile Phones
   ●    Tablets
    These devices are used to make calls, send information over the internet, send text
messages, make emails, surf the internet, and navigate over different websites for
information and entertainment such as watching movies, video clips, listening to
music, and playing games both online and offline manner. These devices are
empowered also by the different advance applications that can now navigate over the
internet like productivity software such as:
   ●    Microsoft Word – used for data processing
   ●    Microsoft Excel – used for spreadsheets
   ●    Microsoft PowerPoint – used for presentations and digital imagery
   ●    Microsoft Outlook – used for emails
   ●    Adobe Photoshop – used for photo editing
Computer - Is an electronic device for storing and processing data, typically in binary
form, according to instructions given to it in a variable program.
Internet - It is the global system of interconnected computer networks that use the
Internet protocol suite (TCIP/IP) to link billions of devices worldwide. It includes
several high bandwidth data lines that comprise the internet “backbone”. These lines
are connected to major internet hubs that distribute data to other locations such as
web servers and ISPs.
World Wide Web (WWW)
  ● commonly known as the Web, WWW, or the W3.
  ● Invented by Sir Tim Berners in 1989 a British computer scientist.
  ● An information system on the internet that allows documents to be connected
      to other documents by hypertext links, enabling the user to search for
      information by moving from one document to another.
  ● It is an information space where documents and other web resources are
      identified by URLs, interlinked by hypertext links, and can be accessed via the
      internet.
       SHS EMPOWERMENT TECHNOLOGY                                                 Page 4
       WEEK 1 AND 2
Web Pages
  ● It is a simple document displayable by a browser that connected to the world
     wide web
  ● It represents various types of information presented to the visitor of the browser
     in an aesthetic and readable manner.
  ● Is a hypertext documents for the World Wide Web (WWW) that is identified by a
     unique resource locator (URL)
               The different online platforms of World Wide Web
1. Web 1.0 - It refers to the first stage of the World Wide Web evolution and
   commonly called a read-only web which only offers users one-way communication
   such as reading the contents because of its only consists of static pages connected
   by hyperlinks and hosted on web servers.
2. Web 2.0 - It’s the second generation or stages of development and the evolution of
   web 1.0 over the World Wide Web, characterized especially by the changes and
   transition from static web pages to dynamic web pages or user-generated content
   and the growth of social media. In this platform the internet technology became
   more and more interactive. The internet became more available for everyone and
   the users can now interact, contribute, and create their own internet space and
   content (like the explosion of information and social media).
3. Web 3.0 - It is described by Time Berners Lee (Father of the WWW) as the read-
   write-execute web. It’s the third generation or stage of internet services for websites
   and applications that will focus on using a machine-based understanding of data
   to provide a data-driven and semantic web technologies, distributed databases,
   natural language processing, and machine learning. The ultimate goal of Web 3.0
   is to create more intelligent, connected and open websites.
Static Web Page - This is known as a flat page or stationary page in the sense that
   the page is “as is” and cannot be manipulated by the user. The content is also the
   same for all the user navigating to this page that is referred to as Web 1.0
Dynamic Web Pages - It is the evolution of web 1.0 to web 2.0 in which from a static
  web page, it has evolved by to dynamic web pages that display different content
  each time its viewed. The user can see websites differently than the other e.g.
  social networking sites, wikis, video sharing sites, hosted services, and web
  applications.
Semantic Web Pages - Is a movement by the World Wide Web Consortium (W3C) that
   encourages web developers to include semantic content in their web pages as
   standard. It provides a common framework that allows data to be shared and
   reused across application, enterprise, and community boundaries. Its aim is to
   have a machine or servers that understand the user’s preferences to be able to
   deliver web content specifically targeting the user.
Features of WEB 2.0
   1. Folksonomy – a user-generated system of classifying and organizing online
      content into different categories by the use of metadata such as electronic tags.
      allowing users to categorize and classify/arrange information using freely
      chosen keywords (e.g. tagging). Popular social networking sites such as Twitter,
     SHS EMPOWERMENT TECHNOLOGY                                                    Page 5
     WEEK 1 AND 2
   Instagram, Facebook, etc. use tags that start with the pound sign (#). This is
   also referred to as the hashtag.
2. Rich User Experience – it means that the applications are more pervasive,
   dynamic, and interactive. Content is dynamic and is responsive to the user’s
   input. An example would be a website that shows local content and in case of
   social networking sites, when you logged in, your account is used to modify
   what you see on their website.
3. User Participation – means that the web user is participating in web content
   creation, tagging, and sharing. Social networking includes creating user profiles
   to social networking applications and communicating with other web users
   through those applications. The owner of the website is not the only one who
   can put content. Others can place the content of their own utilizing comment,
   reviews, and evaluations. Some websites allow readers to comment on an
   article, participate in a poll, or review a specific product (e.g. Amazon.com,
   online stores).
4. Long tail – Services are offered on-demand rather than on a one-time purchase.
   In certain cases, time-based pricing is better than file size-based pricing or vice
   versa. This is synonymous with subscribing to a data plan that charges you for
   the amount of time you spent on the internet, or a data plan that charges you
   for the amount of bandwidth you used.
5. Software as a service – users will be subscribed to software only when needed
   rather than purchasing them. E.g. Google docs used to create and edit word
   processing and spreadsheet documents online. Software as service allows you
   to “rent” software for a minimal fee or subscriptions.
6. Mass Participation – universal web access diverse information through web
   sharing. Since most users can use the internet, Web 2.0 content are based on
   people from various cultures.
                                 Trends in ICT
1. Convergence – it is an evolution of technological developments and
   advancements that merge into a new system bringing together different types of
   applications and media to work on a similar goal or task. For example, besides
   using your personal computer and laptop to create word documents now you
   can use also your smartphone to attain the same goal and task.
2. Social Media – are interactive computer-mediated technologies that facilitate
   the creation or sharing of information, ideas, career interest and other forms of
   expression via virtual communities and networks. It is a website, application, or
   online channel that enables web users to create, co-create, discuss, modify, and
   exchange user-generated content.
                           Six types of Social Media
   a. Social Networks – a dedicated website or other application that allows users
      to connect with other people with the same interest or background by
 SHS EMPOWERMENT TECHNOLOGY                                                    Page 6
 WEEK 1 AND 2
      posting information, comments, messages, etc. An example of this is
      Facebook and Google+
   b. Bookmarking Sites – Sites that allows you to store and manage links to
      various website and resources. Most of this site allows you to store,
      organize, search and manage bookmarks of web pages and create a tag to
      others. Example is Pinterest
   c. Social News – Sites that allow users to post their own news items and
      stories or links to other news sources. The users can also comment on the
      post and stories are ranked based on popularity, as voted on by other users
      of the site or by the website administrators. Example is Reddit and Digg.
   d. Media Sharing – Sites that allow you to upload and share media content
      like images, music and video to a website that can be accessed from
      anywhere in the world. You can share that media with the world or in a
      selected group of friends. Many media sharing sites allow you to place media
      on other sites using “embedding”. Example is YouTube, Instagram, and
      Flickr.
   e. Microblogging – Sites that focus on short updates from the user. It is a
      combination of instant messaging and content production. With microblog
      you share short messages with an online audience to improve engagement.
      Those that subscribed to the user will be able to receive these updates.
      Examples are Twitter and Plurk.
   f. Blogs and Forums – These websites allow users to post their content. Other
      users can comment on the said topic.
3. Mobile Technologies – is a technology that goes where the user goes. It
   consists of portable two-way communications devices, computing devices like
   computer capabilities and the network technology that connects them with the
   use of mobile phones. The popularity of smartphones and tablets has taken a
   major rise over the years. This is large because of the devices’ capability to do
   the task that was originally found in PCs. Several of these devices are capable of
   using a high-speed internet. Today the latest model devices use 5G networking
   (LTE), which is currently the fastest.
   Different Mobile Operating System (OS)
      ● iOS – use in apple devices such as iPhone and iPad
      ● Android OS – is an open-source OS developed by Google. Being open-
          source means mobile phone companies use this OS for free.
      ● Blackberry OS – use in blackberry devices
      ● Windows Phone OS – A close source and proprietary operating system
          developed by Microsoft.
      ● Symbian – the original smartphone and now in smart TVs
      ● Windows Mobile – developed by Microsoft for smartphones and pocket
          PCs.
4. Assistive Media – Is a nonprofit service designed to help people who have
   visual and reading impairments. A database of audio recordings and
   audiobooks is used to read to the user.
 SHS EMPOWERMENT TECHNOLOGY                                                   Page 7
 WEEK 1 AND 2
   5. Cloud Computing – it is the on-demand availability of computer systems
      resources services especially data storage (cloud storage) and computing power
      without direct active management by the user. This includes servers, storage,
      databases, networking, software, analytics, and intelligence over the internet to
      offer faster innovation, flexible resources, and economies of scale.
      Examples: Microsoft, Google, Yahoo, Gmail.
                            Three Components of Cloud Computing
        1. Client Computers – is the device that end-users interact with the cloud.
        2. Distributed Servers – these servers are in geographically different places,
           but the server acts as if they are working next to each other.
        3. Datacenters – it is collection of servers where the application is placed and
           is accessed via internet.
                                       LESSON 2
          ONLINE SAFETY, SECURITY, AND RULES OF NETIQUETTE
  Source: Royalty-Free Stock Photo ID: 338275772, Rawpixel.com, Online Safety and
                                       Security
Internet Safety – refers to the online safety of the people and their information when
using the internet. It is an act of maximizing the user’s awareness of personal safety
and security risk to private information and property associated with using the
internet and self-protection from computer crime.
Netiquette – is short for “Internet Etiquette”. It refers to the rules of online courtesy,
proper manners, and behavior online. It caters to the do’s and don’ts of online
communication.
                             TEN RULES OF NETIQUETTE
   1.   Remember your talking always to humans even your online.
   2.   Adhere to the same standards online that you follow in real life.
   3.   Know where you are in cyberspace.
   4.   Respect another people’s time and bandwidth.
   5.   Make yourself look good online.
   6.   Share expert knowledge.
   7.   Help keep flame wars under control.
     SHS EMPOWERMENT TECHNOLOGY                                                    Page 8
     WEEK 1 AND 2
   8. Respect other people’s privacy.
   9. Don’t abuse your power.
   10. Be forgiving on other people’s mistakes.
Threat – refers to anything that has the potential to cause serious harm and might
      exploit a vulnerability to breach security to a computer system and devices.
Cybercrime – a crime committed or assisted through the use of the internet.
Privacy Policy / Terms of Services (ToS) – tells the user how the website handles
      and caters privacy and safety regarding its data.
INTERNET THREATS
   1. Malware – stands for malicious software. It is a computer program designed to
      infiltrate and damage computers without user consent.
                                     5 Type of Malware
         ●   Virus – a malicious program designed to replicate itself and transfer from
             computer to another destroying data or crashing network services, do
             nothing, or just annoying.
         ●   Worm – a malicious program that replicates itself, transfer from one
             computer to another by any type or means but not alter any files on your
             machine.
         ●   Trojan – a malicious program that disguises as a useful program but
             once downloaded or installed, leaves your PC unprotected, and allows
             hackers to get your information. It is designed to appear harmless on the
             victim’s computer, but in fact, it accesses files or extracts sensitive data.
         ●   Spyware – a program that runs in the background without you knowing
             it (thus called “spy”). It can monitor what you are currently doing and
             typing through keylogging.
         ●   Adware – stands for advertising malware. A program designed to send
             you advertisements, mostly as pop-ups.
   2. Spam – an unwanted email mostly from bots or advertisers. It can be used to
      send malware and unsolicited message to large numbers of recipients for the
      purpose of commercial advertising.
   3. Phishing – an unwanted acquisition of sensitive personal information like
      passwords and credit card details. Its method is to gather personal information
      using deceptive emails and websites.
   4. Identity Theft – is a crime whereby criminals impersonate individuals, usually
      for financial gain. Posers acting like the real owner of the account that they are
      using.
   5. Hacking – is where an authorized person uses a network, internet or modem
      connection to gain access to security password to see data stored and stealing
    SHS EMPOWERMENT TECHNOLOGY                                                     Page 9
    WEEK 1 AND 2
      important information such as files, personal details, and images on another
      computer.
   6. Cyberbullying – is a form of bullying that involves behavior or acts intended to
      inflict harm, threats, embarrassment using technology.
Some Tips to stay safe online:
   1. Don’t share with anyone especially online all the information with risk.
      Example: Full name, Mother & Father Full name, Address, Birthday, Phone
      number, Email address, Bank accounts, and username and password that you
      always use via online.
   2. Always be mindful on what you share online
   3. Do not just simply accept terms and conditions, permitting apps or software to
      manipulate your mobile phone and computer data. Practice reading it always
      before deciding to accept terms.
   4. Do not share your password with anyone.
   5. Avoid visiting and entering untrusted and unknown websites.
   6. Install antivirus software on your computer and always update it to the latest.
   7. Avoid downloading anything from untrusted websites.
   8. Do not reply or click links from suspicious emails.
Activity 1: Like or Unlike
Direction: This activity will test whether you understand the previous lesson.
   Check (/) the like column if the statement is correct, then check (/) the unlike
   column if the statement is incorrect.
   Information and Communication Technologies              LIKE        UNLIKE
1. Rich User Experience is a user-generated system of
   classifying and organizing online content into
   different categories by the use of metadata such as
   electronic tags.
2. Static Web Page is a flat page or stationary page in
   the sense that the page is “as is” and cannot be
   manipulated by the user.
3. Dynamic Web Pages provides a common framework
   that allows data to be shared and reused across
   application, enterprise and community boundaries.
4. Divergence is an evolution of technological
   developments and advancements that merge into a
   new system bringing together different types of
   applications and media to work on a similar goal or
     SHS EMPOWERMENT TECHNOLOGY                                               Page 10
     WEEK 1 AND 2
   task.
5. Social Networks Sites allows you to store and manage
   links to various website and resources.
6. Blogs and Forums are websites that allow users to
   post their content. Other users are able to comment
   on the said topic.
7. Safety refers to the online safety of the people and
   their information when using internet.
8. Netiquette is short for “Internet Etiquette”. Refers to
  the rules of online courtesy, proper manners and
  behavior online. It caters the do’s and don’ts of online
  communication.
9. Virus is a malicious program that disguises as a
   useful program but once downloaded or installed,
   leaves your PC unprotected and allows hackers to get
   your information.
10. Hacking is where an authorized person uses a
   network, internet or modem connection to gain
   access to security password to see data stored and
   stealing important information’s such as files,
   personal details and images on other computer.
The following are the things that need to remember about Information and
communication Technology.
Information and Communication Technology (ICT) - provide access to information
   through telecommunication that deals with the use of different communication
   technologies such as mobile phones, telephone, Internet, etc. to locate, save, send
   and edit information.
World Wide Web (www) - An information system on the internet that allows
   documents to be connected to other documents by hypertext links, enabling the
   user to search for information by moving from one document to another.
Static Web Page - Is known as a flat page or stationary page in the sense that the
   page is “as is” and cannot be manipulated by the user. The content is also the
   same for all the user navigating to this page that is referred to as Web 1.0
Dynamic Web Pages - It is the evolution of web 1.0 to web 2.0 in which from static
  web page evolve by adding dynamic web pages that displays different content each
  time its viewed. The user is able to see website differently than the other e.g. social
  networking sites, wikis, video sharing sites, hosted services and web applications.
     SHS EMPOWERMENT TECHNOLOGY                                                  Page 11
     WEEK 1 AND 2
Semantic Web Pages - Is a movement by the World Wide Web Consortium (W3C) that
   encourages web developers to include semantic content in their web pages as
   standard. It provides a common framework that allows data to be shared and
   reused across application, enterprise and community boundaries. its aim is to
   have machine or servers understand the user’s preferences to be able to deliver
   web content specifically targeting the user.
Internet Safety – it refers to the online safety of the people and their information
    when using internet. It is an act of maximizing user’s awareness of personal safety
    and security risk to private information and property associated with using the
    internet and a self-protection from computer crime.
Netiquette – is short for “Internet Etiquette”. Refers to the rules of online courtesy,
    proper manners and behavior online. It caters the do’s and don’ts of online
    communication.
Direction: Answer the following questions.
   1. What are the 5 Trends in ICT and explain each trend.
   2. List down the 3 online platforms and explain how they are different from each
      other.
   3. How can you protect yourself from different online threats?
   4. Cite the importance of Netiquette.
   5. What can you say about the current state of ICT today in our country? Suggest
      ways how can you improve its current state.
   A. Direction: Choose the letter of the correct answer. Write the chosen letter on a
      separate sheet of paper.
1. Technologies that provide access to information through telecommunications.
       a. ICT             b. Internet         c. Computers          d. Mobile Phone
2. A type of WEB which is known as flat page or stationery.
       a. Web 2.0         b. Web 3.0          c. Web 1.0            d. Web 4.0
     SHS EMPOWERMENT TECHNOLOGY                                                  Page 12
     WEEK 1 AND 2
3. What is WWW means?
       a. World Wide Website                   c. Whole Wide Web
       b. World Wide Web                       d. Whole World Website
4. Types of internet traits that aims to acquire sensitive personal information likes
   password and credit cards details.
       a. Attitude         b. Behavior         c. Norms              d. Etiquette
5. It is a collection of internet-based communication tools and computer assisted
   channels dedicated to allow users to interact, communicate and share information
   in a virtual community and network.
       a. Social Media      b. Group Chat      c. Web Portal         d. Website
6. Knowledge obtained from investigation, study or instruction.
       a. Research          b. Data            c. Information        d. Ideas
7. Types of internet traits that aims to acquire sensitive personal information likes
   password and credit cards details.
       a. Hacking           b. Spamming        c. Virus              d. Phishing
8. It provides common framework that allows data to be shared and reused across
   application, enterprise and community boundaries.
       a. Static Web        b. Semantic Web    c. Dynamic Web        d. Hyper Web
9. It’s a way of harassing, threatening, embarrassing and targeting a person with the
   use of technology is called?
    a. Cyber Crime                             c. Cyberbullying
    b. Stealing’s one’s identity               d. Hacking
10. It is a synergy of technological advancements that describes the layer of
   abstractions that enable different technologies to interoperate efficiently as a
   system to work on a similar task or goal.
    a. Collaboration       b. Convergence      c. Interconnection d. Unification.
Directions: Answer the following questions into to 3 -5 sentences.
   1. Which part of the lesson gives you a great impact? What did you realized about
      using ICT?
   2. What can you say about our current state of technology today? Is good or bad?
      When is it good for mankind? And when is it bad for mankind?
   3. What is your stand about using our technology today? Are we safe or not? Why?
     SHS EMPOWERMENT TECHNOLOGY                                                     Page 13
     WEEK 1 AND 2