0% found this document useful (0 votes)
23 views

Em Tech q1 Module 1 for Students (1)

Uploaded by

jcdims07
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Em Tech q1 Module 1 for Students (1)

Uploaded by

jcdims07
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

EMPOWERMENT

TECHNOLOGY
INTRODUCTION

Lesson 1: Information and Communication Technologies

Information and Communication Technology

It refers to the use of communication technology such as laptop, smart


phones, tablet, telephone, internet and etc. to send, save, and edit
information.

ICT in the Philippines

The use of communication technology spread in the entire country


now a day even in rural areas. According to Rappler blog site there are 119
million mobile phone subscriptions from a total population of 101 million and
47 million active Facebook accounts. The Philippines is the fastest growing
app market in Southeast Asia and the highest digital population in the world.
The top online activities are social media, videos, online mobile games,
location-based search and online shopping. Staying connected with loved
ones, friends, and relatives is a fundamental need for Filipinos.

5
ABSTRACTION

World Wide Web


It is also known as WWW or W3 introduce by Tim Berners -Lee. It consists
of different pages that are formatted in a markup language called HTML
(Hypertext Markup Language) and linked to each other that contain text,
graphics, multimedia files, hyperlinks and etc.
Web 1.0
The first development of World Wide Web where web pages are static.
It also known as flat or stationary page and it cannot be manipulated by
users.
Web 2.0
It is a dynamic web page where user can interact with page like
creating a user account, posting comments, uploading files and images, and
others.
Example: Blog sites, Facebook, Twitter, Instagram, YouTube

Features of Web 2.0

1. Folksonomy –users can classify and arrange information by adding tag


or label. Pound sign (#) is used in Facebook, Twitter, Instagram and
other social networking sites.
Example in tagging on Facebook: #TeamKawayan, #Single
2. Rich User Experience –user can have high interaction with the content
of the page and can achieve level of expertise.
3. User Participation –user can put content on their own in web page like
comment, evaluation, and etc.
4. Long Tail –A site that offers services and brings individual and businesses
into selling different goods and commodities such as shopping site like
OLX, Lazada, Shopee, Zalora and others.
5. Software as a service –users can subscribe to a software when they
need itinstead of purchasing them.
6. Mass Participation –sharing of diverse information through universal
webaccess.

Web 3.0 The Semantic Web


A new paradigm in web interaction extension of led by World Wide
Web Consortium (W3C) where it provides framework that allows data to be
shared and reuse.

Trends in ICT

1. Convergence –it refers to fusing of technological advancement to


work on a similar task.

Example. Using smartphone as camera in taking pictures instead of


DSLR camera.
2. Social Media –an application and website where user can
communicate, create and share content, and participate in online
communities.

Photo Credit: https://www.pexels.com/photo/apps-blur-button-close-up-267350

Type of Social Media

A. Social Network –A website where people with the same


come together to share information.
Examples: Twitter, Instagram, Facebook

Image taken from https://www.facebook.com

B. Social News –A website where user can post stories and


are ranked based on the popularity through voting.

Examples: Digg, Reddit, Propeller, Slashdot, Far


Image taken from https://www.reddit.com

C. Bookmarking Sites –A website that allows you to share and


store internet bookmarks, articles, posts, blogs, images and
others. Examples: Pinterest, StumbleUpon, Dribble

Image taken from https://www.pinterest.ph/autologin=true

8
D. Media Sharing – A website that allows you to share and store
multimedia files such as video, photos and music.

Examples: Instagram, YouTube, Flickr

Image taken from https://www.youtube.com

E. Microblogging –a website that allows you to


broadcast short message. Examples: Twitter, Tumblr, Meetme

Image taken from https://www.tumblr.com/login

F. Blogs and Forums –a discussion website that allows user to ask


questions and comments on a journal posted by an individual
or group. Examples: Wordpress, Blogger

9
Image taken from https://www.wordpress.com

3. Mobile Technologies –a technology used in cellular and other devices


such netbook, laptop, tablet, smartphones and etc.

4. Assistive Media - A platform that assist people with disability. It will


guide the individual like a blind person by using an audio recording.

Lesson 2: Online Safety, Security, Ethics and Etiquette

INTRODUCTION

Online Safety
The importance of internet plays a crucial part in human development.
Life becomes easy and comfortable because of this technology. Most of us
are connected to the internet via laptop, mobile phone, tablet, personal
computer and other electronic gadgets. Behind this technology there is a risk
that everyone should be aware of. You could be at risk on scam, bullying,
and illegal activities if you will not take precautions in using internet. We need
to keep ourselves safe and secure whenever we use the internet. That is why
it is very important to know and learn the ways on how to be safe and
secured online.

12
Activity 1: Self-Check on Online Habits
Directions: Reflect and assess yourself on your online habits. Check “Yes” or “No” on
the table below.

Online Habits Yes No


I always talk to strangers on social media.
Giving your password to your friends.
Posting about future your vacations.
Visiting unsecured websites.
Ranting on social media.
Posting image or video without asking permission from the owner.

ANALYSIS

1. Based on your activity number 1, Do you think your Online habits are safe?
2. How important is your online safety and Security?

ABSTRACTIONv

Tips on how to be safe online


Do not share your password with anyone.
Add friends you know in real life.
Do not visit untrusted websites.
Add password to your WIFI at home to make it private.
Install and update antivirus in your computer.
Do not give your personal information to anyone
Think before you click.
Never post about your future vacation.
13

Internet Risk
Cyberbullying
It happens when someone intentionally abused, harass, and
mistreated by other person using electronic communication.
Identity Theft
It is a crime of stealing personal information for the purpose of assuming
that person’s name or identity to make any form of transactions.

Cyber Stalking
A criminal practice where electronic communication is used to stalk or
harass individual or group.
Sexting
The act of sending sexually explicit text messages, images, and videos.
Internet Threats
Malware – also known as Malicious Software.
Types of Malware
1. Virus –a malicious program that replicate itself by copying itself to
another program.
2. Trojan Horse –a malicious program that disguised as legitimate
program that user will accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other
computers.
4. Spyware –A malicious program that gathers information from
victim’s computer and send it back to the hacker.
5. Adware –An unwanted advertisement that will pop-up several times
on victim’s computer then behave abnormally and tedious to close them.
6. Keylogger–A program that runs in the background and steals user
credentials and confidential information and send back to hack by recording
every keystroke that a user makes on their computer or device.
7. Botnet –A collection of infected internet–connected devices such
as PC and mobile phone that are controlled by a common type of malware.
8. Rootkit –A software tools used by hackers to gain control over a
computer on a network without being exposed.
9. Ransomware –A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom through online method for
the removal of the virus.
Spam
Also known as junk email or unwanted email send by advertiser or bot.
It can be used to send malware. 14
Phishing
A cyberattack method using deceptive emails and websites to
acquiring sensitive personal information.
Cybercrime
A crime in which computer is used as object and tool in committing a
crime such hacking, phishing, spamming, child pornography, libel, hate
crimes, identity thief and others.
Cybercrime Law
A law that deals with all forms of cybercrime.

Netiquette
It is a word that came from the two words “net” and “etiquette”. It is an
etiquette applied online that shows proper manner and behavior. If you are
a member of an online society through social media you are called netizen.
And in interacting with other netizen online, we need to maintain good
behavior which is acceptable to others in online community.

The Core Rules of Netiquette by Seth T. Ross


1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10.Be forgiving of other people's mistakes.

15

Lesson 3: Contextualized Online Search Research Skills

INTRODUCTION

In previous lesson, we discussed on online safety, security, ethics and


etiquette that we must take into consideration in using internet. Technology such
mobile phone, laptop, computer, and other electronic gadgets connect us to
world through different online platforms. Security and safety have been taught
to us so that we can avoid risk and danger online. As an individual who is part of
online community must maintain good social behavior. We need to adhere to
the same standard behavior online that we follow in real life. Now that you are
ready to enter and explore the online world, this lesson will teach you on online
search and research skills.

ANALYSIS

1. How important Search Engine to us?

2. How will you know if your Internet search is reliable?

ABSTRACTION

Internet Research is a research method in collecting and gathering


information via internet by using search engine such as google.

Search Engine is a program that allows users to search for content on internet.

Examples of Search Engine


Google Aol Search Wow Baidu
Web Crawler Yahoo! Search MyWebSearch Wolframalpha
Bing Info Dogpile DuckDuckGo
Internet
Ask Infospace Contenko Archive

Searching the Web


Getting the correct and reliable information is our goal in internet
research. We may rely on the capability of search engine but sometimes it
may not give us the correct information because of the keywords we entered
into a search engine. There are techniques in searching information that can
be applied in search engine in order to get a better result. Some search
engines allow combination of words and logic connectors of AND, OR, and
NOT.

Tips for Effective Internet Research by George Mathews


1. Know what kind of research you want to do.
2. Make a list of keywords you will use in your search.
18
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.

Online Research Skills by Hannah Trierweiler Hudson


1. Check Your Sources
2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks

Copyright Issues
There are millions of information that we can get from the internet.
Some of this information are free but others are not. They are protected by a
copyright law.

What is Copyright?
Copyright is a protection given to the owner of the rights in an original
work such as books, musical works, films, paintings, and other works, and
computer programs. This original work is called intellectual property which is
protected under Republic Act 8293 known as the “Intellectual Property Code
of the Philippines”.
Copyright Infringement
This happens when the copyrighted work is use by other person without
permission of the author or copyright holder. Any person who is infringing the right
protected work would be liable under the law. An example of this is the case of M.Y.
Intercontinental Trading Corporation (MITC), Tedwin T. Uy, Allianz Marketing and
Publishing Corp. (Allianz), and Fujian New Technology Color Making and Printing
Company, LTD (Fujian) against St. Mary’s Publishing Corporation (SMPC). Manila
regional trial court ordered Fujian and its partners to pay P24.7 million for the
damages and cost of litigation for copyright infringement to SMPC. Fujian and its
three local partners was guilty of printing, copying, reproducing, importing,
distributing and selling of original and revised textbooks that they have illegally sold
to Department of Education in Zamboanga, Municipality of Cabuyao in Laguna
and Municipality of Matnog in Sorsogon without the approval of SMPC, the
copyright owner of the textbooks.

19
Fair Use
Research is important to the students and other people. Most of them
rely on the information that they can get online. Although this information is
protected by a copyright law but we can still use this information without
permission in a limited way under certain condition and purpose.
Fair use is the use of copyrighted material for comment, teaching,
criticism, news reporting, research, scholarship, and other similar purpose is
not an infringement of copyright.
Example of this is when you post a quote from a person in your
Facebook wall. Include the name of person who owns the quote in your post.
Another example is when you copy image from internet, give credit to the
creator of image. The copied image should be use for educational purpose
not for commercial use.
In fair use, 5% of the content of reference can only be copied. If 20%
or less of reference copied, there must be a secondary use agreement and
fee. And if 20% or more of reference copied, it requires purchasing of
creative work.

Guidelines for Fair Use


1. Majority of the contents created must be yours.
2. Give credit to the owner.
3. Don’t make profit of the copyrighted work.

APPLICATION
20

- Make a Research about “Applied Productivity Tools with Advance


Application Techniques” following George Mathews tips and Online
Research Skills by Hannah Trierweiler Hudson.
References

rappler.com, “A Profile of Internet Users in the Philippines”, Accessed


January 7, 2019, https://www.rappler.com/brandrap/profile-internet-users-ph.

Computerhope.com, “WWW”, Accessed January 7,


2019, https://www.computerhope.com/jargon/w/www.htm

Margaret Rouse, “Semantic Web”, Accessed January 19, 2019,


https://searchmicroservices.techtarget.com/definition/Semantic-Web

ontotext.com, “What is the Semantic Web?”, Accessed January 7, 2019,


https://www.ontotext.com/knowledgehub/fundamentals/what-is-the-
semantic-web/

Margaret Rouse, “Social Network” Accessed January 19,


2019, https://searchcio.techtarget.com/definition/social-network

Hatem Mahmoud, “Web 3.0 The Semantic Web”, Accessed January 19, 2019,

https://www.slideshare.net/HatemMahmoud/web-30-the-semantic-
web/48-Available_optionsRDFa_and_microformats

Technopedia,” Web 3.0”, Accessed January 19, 2019,


https://www.techopedia.com/definition/4923/web-30

Antony Maina, “20 Popular Social Media Sites Right Now”, Accessed January
19, 2019, https://smallbiztrends.com/2016/05/popular-social-media-sites.html

Sophie Eagan, “10 Most Popular Social Bookmarking Websites”,


Accessed January 20, 2019, https://www.brandwatch.com/blog/10-
popular-social-bookmarking-websites/

Shrivastava, S.(2014). List of top nine Microblogging sites. Retrieved January 19,
2019 from https://www.pensitdown.com/list-of-top-nine-microblogging-sites/

Jeremiah Owyang, “Understanding the difference between Forums, Blogs,


and Social Networks”, Accessed January 19, 2019, http://www.web
strategist.com/blog/2008/01/28/understanding-the-difference-between-forums-
blogs-and-social-networks/

24
Comodo Antivirus, ”What is a Computer Virus and its Types”, Accessed

January 20, 2019,

https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-

definition/

Margaret Rouse, “Botnet”, Accessed January 19, 2019,


https://searchsecurity.techtarget.com/definition/botnet

Josh Fruhlinger, “What is phishing? How this cyber attack works and how to

prevent it.”, Access January 20, 2019,

https://www.csoonline.com/article/2117843/phishing/what-is-phishing-how-this-

cyber-attack-works-and-how-to-prevent-it.html

techopedia, “Cyberstalking”, Accessed January 20, 2019,


https://www.techopedia.com/definition/14326/cyberstalking

Seth T. Ross, “The Core Rules of Netiquette — Summary”, Accessed January 19,
2019, http://www.albion.com/bookNetiquette/0963702513p32.html

George Matthew, “8 Killer Tips for Effective Internet Research”, Accessed January
19, 2019, https://webwriterspotlight.com/tips-to-nail-online-research

Hannah Trierweiler Hudson, “The 6 Online Research Skills Your Students

Need”, Accessed January 20, 2019,

https://www.scholastic.com/teachers/articles/teaching-content/6-online-

research-skills-your-students-need/

WebWise “What is netiquette?”, Accessed January 28, 2020,


http://www.bbc.co.uk/webwise/guides/about-netiquette

officialgazette.gov.ph,” Republic Act No. 8293”, Accessed January 27, 2020,


https://www.officialgazette.gov.ph/1997/06/06/republic-act-no-8293/

officialgazette.gov.ph,” Republic Act No. 10175”, Accessed January 27, 2020,


https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/

officialgazette.gov.ph,” Republic Act No. 10372”, Accessed January 27, 2020,


https://www.officialgazette.gov.ph/2013/02/28/republic-act-no-10372/

Rey Panaligan, “Publisher awarded P24.7 M in damages for copyright infringement”,


Accessed January 30, 2020, https://news.mb.com.ph/2017/12/10/publisher-
awarded-p24-7-m-in-damages-for-copyright-infringement/

Pexels.com, ”Image”, Accessed January 30, 2020,


https://www.pexels.com/photo/apps-blur-button-close-up-267350

25

You might also like