Module 1. Empowerment Intro
Module 1. Empowerment Intro
INTRODUCTION TO INFORMATION
AND COMMUNICATION MODULE 8
TECHNOLOGIES
INTRODUCTION
Gathering information and facts about teaching competencies that are essential in the
information Age, such as the state of ICT technologies; online safety, security, ethics, and
etiquette; productivity tools with advances application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change, which are
aligned to the standards sets by the Department Of Education.
This module is prepared for you to help you achieve the required learning that need to
develop. This will be the source of information that will enable you to acquire the knowledge
and skills in Empowerment Technologies.
LEARNING OBJECTIVES
improve their knowledge on how ICT affects their everyday lives and the state of our
notion;
compare and contrast the difference between online platforms, sites, and content;
understand the feature of Web 2.0;
understand the future of the World Wide Web through Web 3.0; and
Learn the different trends in ICT and use them to their advantage.
Empowerment Technologies 1
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
According to this magazine, two Philippine cities are part of the top 10 in their research
about “The selfiest Cities around the world”
a. Reader’s digest b. Time c. People d. Candy
6. This is the operating system for black berry phone.
a. Black berry OS b. Windows mobile c. Symbian d. IOS
Pinterest is the social media website that can be classified as
a. Book marking site b. Blogs and forums b. Microblogging d.Media
sharing
Currently, this is the fastest mobile network.
a. 2G b. 3G c. 4G d. 5G
This media is designed to help people who have visual and reading impairments.
a. assistive b. social c. bookmark d. accessibility
10. This type of social media website focuses on short updates posted by the user.
a. hashtagging b. microblogging c. social media d. blogging
KEY TERMS
IMPORTANT CONCEPT
Information and Information Technology (ICT) deals with the use of different communication
technologies such as mobile phones, telephone, Internet etc. to locate, save, send and edit
information.
Several International companies dub the Philippines as the “ICT hub of Asia”. It is no secret
that there is a huge growth of ICT- related jobs around the country, one of which is the
call center or BPO (Business Process Outsourcing) centers.
According to the 2013 edition of measuring the information Society by the international
Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012.
That would mean that for every 100 Filipinos you meet, there is a high chance that they
have a cellphone and approximately for the seven of them, they have two.
In the data gathered by the Annual survey of Philippine Business and Industries, NSO, in
2010, the ICT industry shares 19.3% of the total employment population here in the
Philippines.
To add to these statistics, Time Magazine’s “ The Selfiest Cities around the World” of
2013 places two cities from the Philippines in the top 1 and top 10 spots. The study was
conducted using Instagram, a popular photo sharing application.
With these numbers, there is no doubt that the Philippines is one of the countries that
benefits most out of ICT.
The internet has been a vital tool to our modern lives that is why it is important to make the
best of the internet.
The World Wide Web is invented by Timbers Berners-Lee. When the World Wide Web was
invented, most web pages were static. Static (also known as flat page or stationary page) n
the sense is “as is” and cannot be manipulated by the user. The content is also the same for all
users. This is referred to as Web 1.0
Web 2.0 allows users to interact with the page: instead of just reading a page, the user may be
able to comment or create a user account.
Web 2.0 allows user to use web browsers instead of just using their operating system.
Empowerment Technologies 3
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
The semantic web is a movement led by the World Wide Web Consortium (W3C). The
W3C standard encourages web developers to include semantic content in their web pages.
According to the W3C, “The semantic web provides a common framework that allows
data to be shared and reused across application, enterprise, and community
boundaries.”
The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences to
be able to deliver web content specifically targeting the user.
Compatibility- HTML files and current web browsers could not support Web 3.0.
Security – The user’s security is also in question since the machine is saving his or her
preferences.
Vastness – The World Wide Web already contains billions of web pages.
Vagueness – Certain words are imprecise. The words “old” and “small” would depend on the
user.
Logic – Since machines use logic, there are certain limitations for a computer to be able to
predict what the user is referring to at a given time.
Trends in ICT
As the world of ICT continues to grow, the industries have focused on several innovations. This
innovation caters the needs of the people that cater the needs of the people that that benefits
most out of ICT.
personal computer to create word documents, you can now use you smartphone. It can
also use cloud technologies to sync files from one device to another while also using
several technology which mean you can access your files anytime, anywhere.
Convergence is using several technologies to accomplish a task conveniently.
Social Media – is a website, application, or online channel that in able web users to create
co-creates, discuss, modify and exchange user-generated content.
Social Networks. These are sites that allow you to connect with other people with the
same interest or background. Once a user creates his or her account, he or she can
set up a profile, add people, create groups, and share content.
Example: Facebook and Google+
Bookmarking Sites. These are sites that allow you to store and manage links to
various websites and resources. Most of these sites allow you to create a tag that
allows you and others to easily search or share them.
Example: StumbleUpon and Pinterest
Empowerment Technologies 5
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
Media Sharing. These are site that allow you to upload and share media content like
images, music, and video. Most of these sites are have additional social features like
liking, commenting, and having user profiles.
Example: Flicker, Youtube, and Instagram
Micro blogging. These are sites that focus on short updates from the user. Those
subscribed to the user will be able to receive these updates.
Example: Twitter and Plurk
Mobile Technologies – The popularity of smartphones and tablet has taken a major rise
over the years. This is largely because of the device’s capacity to do tasks that were
originally found in personal computers.
Today, the latest mobile devices use 4G Networking (LTE), which is currently the
fastest mobile network.
Mobile devices use different operating systems:
a. iOS – used in apple devices such as the iPhone and iPad.
Empowerment Technologies 6
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
Android – an open source operating system developed by Google. Being open source
means several mobile phone companies use this OS foe free.
Blackberry OS - used in blackberry OS.
Windows Phone OS- a closed source of propriety operating system developed by
Microsoft.
Symbian – the original smart phone OS; now used in smart TV’s
Windows Mobile – developed by Microsoft for smart phones and pocket PCs
Assistive media – is a nonprofit service designed to help people who have visual and
reading impairments. A database of radio recordings is used to read to the user.
ACTIVITY 1
Direction: True or False. Write “T” if the statement is correct; otherwise; write “F” if the
statement is incorrect.
Empowerment Technologies 7
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
ACTIVITY 2
ACTIVITY 3
Identify the correct Web Platform for Social Change.
Empowerment Technologies 8
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
Sample
Community Problem: Severe flooding during rainy days due to blocked drainages
Vicinity: Lapiz, St., Oleander Village, Brgy. Pulo, Quezon City
Campaign: “Anti-Flooding Movement”
Type of Social Media Used: Blogging
Website Used: WordPress
ASSIGNMENT
Do you think your information shared in social media is safe and
secure?
Empowerment Technologies 9
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
INTRODUCTION
Gathering information and facts about teaching competencies that are essential in the
information Age, such as the state of ICT technologies; online safety, security, ethics, and
etiquette; productivity tools with advances application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change, which are
aligned to the standards sets by the Department Of Education.
This module is prepared for you to help you achieve the required learning that need to
develop. This will be the source of information that will enable you to acquire the knowledge
and skills in Empowerment Technologies.
LEARNING OBJECTIVES
consider one’s and other’s safety when sharing information using the internet;
consider one’s and other’s reputation when using the internet
determine and avoid the danger of the internet
be responsible in the use of social networking sites;
browse the internet efficiently and properly through proper referencing
Write YES if you agree with the statement and NO if you disagree on the before
each number.
YES 1. My computer has an antivirus so it is okay to open most email attachments like e-cards
and video files.
YES 2. Your friend told you that his college application was rejected due to the fact that you
posted a video of him doing crazy stuff at a party. You posted the video several years ago but
later took it down to protect your friend’s reputation. Can your friend be right that the college
found the video?
Empowerment Technologies 10
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
NO 3. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up so she can help you level up and get in game money.
She promises to keep your password a secret. Is it okay to give away you password?
NO 4. You received an email stating that your mother’s bank account is going to be forfeited
if you do not respond to the email. Is it safe to reply?
NO 5. You forgot that your essay is due tomorrow. While doing your research, you found a
website offering free essays. Is it okay to use the essay from this free essay website?
YES 6. A virus is a malware that multiplies and infects other computers through flash drives.
NO 7. Keyloggers are software that shows up ads even if you are not using your browser.
NO 8. Search engines scan websites for search results even if you have set your post to
“private”.
YES 10. Letting people know your birthday is probably a must if you want to get as many gifts
as possible. But having it in your profile makes you vulnerable to identify theft.
KEY TERMS
Empowerment Technologies 11
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
Fair use – means that an intellectual property may be used without a consent as long as it
is used in commentaries, critisms, search engines, parodies, news reports, research,
library archiving, teaching and education.
Module 2
RULES OF NETIQUETTE
IMPORTANT CONCEPT
The internet is truly a powerful tool. It can be used to promote a business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment through games, online
communities and everything in between. But, there is always the “other side of the coin”.
The internet is one of the most dangerous places, especially if you do not know what you are
doing with it.
Empowerment Technologies 12
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
Highway 1, Francia, Iriga City, Philippines 4431
The Internet is defined as the “ Information superhighway”. This means that anyone has
access to this highway, can place information and can grab that information. Any information,
even things that you have set privately, can be accessed one way or another.
The treat of cybercrime is very real, while you may not experience the threat now, whatever
information we share today could affect our future.
The internet is a public place and it is set up to protect you. Here are some tips to help you stay
safe when using the internet.
Be mindful of what you share online and what site you share it.
Do not just accept terms and conditions; read it.
Check out the privacy policy page of the social networking site you use. By keeping your
profile private, search engines will be able to scan your profile.
Know the security features of the social networking site you use. By keeping your profile
private, search engine will not be able to scan your profile.
Do not share your password with anyone.
Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode,” a
feature of the browser, will not protect you from hackers.
Do not talk to strangers whether online or face-to-face.
Never post anything about a future vacation. It is similar to posting,”Rob my house at this
date”.
Add friends you know in real life.
Avoid visiting untrusted websites.
Install and update anti-virus software on your computer. Use only one anti-virus software to
avoid conflicts.
If you have a Wi-Fi at home, make it a private network by adding a password.
Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-
peer downloads (torrents) as the download is most likely not monitored by the site
owner.
Buy software; do not use pirated ones.
Do not reply or click links from suspicious emails.
Empowerment Technologies 13
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
INTERNET THREATS
Here are some threats you should be aware of when using the internet:
Malware – stands for malicious software
Virus- a malicious program design to replicate itself and transfer from one computer to
another either through the internet and local networks or data storage like flash
drives and CDs
Worm – a malicious program that transfer from one another by any type of means.
Often, it uses a computer network it spread itself. For example, the ILOVEYOU worm
(Love bug Worm) created by a Filipino.
Trojan – a malicious program that is disguised as a powerful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get your
information.
Rogue security software- tricks the user into posting that it is security
software. It asks the user to pay to improve his/her security but in reality
they are not protected at all.
Spyware- a program that runs in the background without you knowing (thus called
“spy”). It has the ability to monitor what you are currently doing and typing through
Keylogging.
Keyloggers – used to record the keystroke dine by the users. This is done to
steel the password or any sensitive information. It can record email,
messages, or any information you typed using your keyboard.
Spam – unwanted email mostly from bots or advertisers. It can be used as malware.
Phishing – Its goal is to acquire sensitive personal information like passwords and credit
card details.
Pharming – a more complicated way of phishing where it exploits the DNS
(Domain Name Service) system.
Think Before You Click
Here are things you might want to consider before posting something over the internet:
Before you post something on the web, ask this question to yourself: Would you want your
parents or grandparents to see it? Would you want your future boss to be it? Once you
post something on the web, you have no control of who sees your posts.
Your friends depend on you to protect their reputation online. Talk to your friends about this
serious responsibility.
Set your post to “private”. In this way, search engines will not be able to scan that post.
Avoid using names. Names are easy for search engines to scan.
If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it
down or report it as inappropriate.
Empowerment Technologies 14
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
Copy Infringement
Here are some tips that could help you avoid copyright infringement:
Understand – Copyright protects literacy works, photographs, paintings, drawings, films,
music (and lyrics), choreography, and sculptures but it generally does NOT protect
underlying ideas and facts.
Be responsible – Even if a material does not say that it is copyrighted, it is not a valid defence
against copyright. Be responsible enough to know if something has a copyright.
Be creative – Ask yourself whether you are making is something that came from you or
something made from somebody else’s creativity.
Know the law- there are some limitations to copy right law. For
instance in the Philippines, copyright only last a lifetime (of the
author) plus 50 years. There are also provisions for “Fair use” which
mean that an intellectual property may be used without consent as
long as it is used in commentaries, criticisms. Search engines,
parodies, news reports, research, library archiving,
teaching, and education. Figure 1 Fair Use Logo
Online Research
Here are some tips in conducting online research:
Have a question in mind – Focus on a question you want answered. If it is a series of
questions, start with one. Never search on one go.
Narrow it down - Search engines like Google, Bing, or Yahoo use several filters to
determine the most appropriate result for you.
Advanced Search – The best way to filter information you get from search engines is by
using the advanced search. This will allow you to filter out information you do not
need.
In Microsoft engine, Bing,you can use certain keywords and symbols for your advance search:
Symbol Function
+ (and) Finds webpage that contain all the items that are preceded by he + symbol; allows
you to include terms that are usually ignored
“” Finds the exact words and phrase
() Finds and excludes web pages that contain a group of words
AND or & Finds web pages that contain all the terms or phrases
Empowerment Technologies 15
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
Because OR is the function with the lowest precedence, enclose OR terms in parentheses when
combined with other operators in a search.
Source: Microsoft.com
Look for a credible source – Some wikis, though filled with updated information, are not
credible source. This is due o the fact that anyone can edit its content.
Figure 3 References found at the bottom of every Wikipedia page contain links to entry's sources of information
Give Credit – If you going to use the information from a source of educational purposes,
give credit to the original author of page or information
Empowerment Technologies 16
Grade 12
CEGUERA TECHNOLOGICAL COLLEGES
ACTIVITY 1
Matching Type: Match Column A with Column B. Write the letter of the correct answer on
the space before each number.
A B
ACTIVITY 2
Below is a questionnaire about how much information you have shared so far. Put check (/)
under shared or not shared.
Empowerment Technologies 17
Grade 12
L
CEGUERA TECHNOLOGICAL COLLEGES
ACTIVITY 3
ASSIGNMENT
The rules of netiquette are just as important in cyberspace as they are in the real world— and
the evidence of poor netiquette can stick around to haunt you for much longer. Follow the
basic rules of netiquette to avoid damaging your online and offline relationship. Be ethical,
breaking the law is bad netiquette. Strong and heated arguments must be operated