TG EmTech Week 1 and 2 Final
TG EmTech Week 1 and 2 Final
TG EmTech Week 1 and 2 Final
Week(s) 3-4
Topic/Lesson Applied productivity tools with advanced application
techniques.
LESSON OUTLINE
I- Introduction The instructor will call someone to lead the opening prayer,
greet the students, check them in regards to their personal stuff
last weekends, and after checking their state of mind, and to
make sure that their focus is in the class, there will be a brief
summary or recap of the last topic.
II- Motivation
The instructor will then introduce the topic by asking some
questions that is related to the topic.
III- Instruction/ Delivery
After the motivation, the instructor will then discuss the topic:
(Review part)
Technology
Data
Information
Web 1.0
internet
while,
Internet
Web 2.0
Web 3.0
Mobile Media
Collaborative platforms
Convergent Technologies
Online Systems
============================================
Online systems, functions, and platforms:
“If you can program it, then it’s a platform. If you can’t,
then it’s not.” – Marc Andreessen
Platforms
Communication Services
Payment System
Advertising Platforms
============================================
Online safety, security, ethics, and etiquette:
E-mail spoofing
Phishing
Pharming
Spyware
Trojan Horse
- A malware fronting to perform a good task, but covertly
performs undesirable function with the intention of
entering the computer without the user’s consent.
- It can disable the computer’s defenses, opening it to
unauthorized entry.
- It can erase data, corrupt files, allow access to computer
and disrupt everything.
Computer Virus
Hacker(s)
Aggregator
Avatar
Blog
Flaming
Mash-up
- is a remix or blend of multiple songs, videos, or
another media content into one product. Fan fiction
writing is one form of a mash-up, as writers take
characters from a well-known video game, movie, or
book, and rewrite their actions or relationships.
P2P, or Peer-to-Peer
- it is a network allows for sharing of mp3s, videos, and
other digital files by transferring information directly
between two computers rather than by going through a
central server. P2P technology is also behind the
popular Internet phone service Skype.
Podcast
============================================
Online Search
Advantages/Pros:
Research skills:
- Report writing.
- Analyzing lots of information from different sources.
- Finding information off the Internet.
- Critical thinking.
Rules:
Rubrics:
Teamwork: 40%
Content of explanation: 40%
Audience Impact: 20%
Total: 100%
Rules:
Rubrics:
Teamwork: 40%
Content of the roleplay: 40%
Audience Impact: 20%
Total: 100%
============================================
Week 2:
Rules:
1. Each group will have a representative, and the
instructor will give them a specific topic that they will
need to portray, and the group will guess what the
representative is portraying.
2. Each group has one (1) minute to guess.
3. First group to guess the right answer gets a point.
Rubrics:
Teamwork: 30%
Accurate guessing: 40%
Accuracy of the answer: 30%
Total: 100%
Rules:
4. Each group will be given a specific topic or item or a
hint that they need to search online, using their phones.
5. Searching the topic will have a duration of 10 seconds.
6. If a certain group has found the answer, then they will
shout their specific yell, to be recognized and give
their answer to the class within 5 seconds, otherwise,
the other groups will have a steal
7. The scoring will be: 3 point per correct answer, 2
points if it is a steal.
Rubrics:
Teamwork: 30%
Active Listening and active searching: 40%
Accuracy of the answer: 30%
Total: 100%
V- Enrichment The instructor, then, will ask the students how they understood
the topic, the importance of the topic, and the relevance of the
topic in their daily lives.
VI- Evaluation At the end of the 2-week period, the instructor will ask the
student to independently compose an insightful reflection
paper on the nature of ICT in the context of their lives, society,
and professional tracks (Arts, Tech-Voc, Sports, Academic).
VII- Recommended Resources and Internet Connection: slideshare.net
Material
- The Current State of ICT Technologies; Online
Systems, Functions and Platforms; and, Online Safety,
Security, Ethics and Etiquette, a PowerPoint
Presentation by Maria Eloisa Blanza
Prepared by:
COURSE OUTLINE
Instructor’s Name: Prince Virniel B. Carumba, LPT Subject: E-Tech: ICT for Professional Track
Week(s): 1 – 2
Grade& Block: Grade 12 | Block B1
Days: MWF Time: 4:10 PM - 5:40 PM
Room Number: Room D
1. The current state of ICT technologies (i.e., Web 2.0, 3.0, convergent technologies,
social, mobile, and assistive media).
2. Online systems, functions, and platforms.
3. Online safety, security, ethics, and etiquette.
4. Contextualized online search and research skills.
II – Time Frame One (1) hour and thirty (30) minutes per session; total of Four (4) hours and thirty (30)
minutes
III – Learning The learners:
Competencies
1. compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.
2. apply online safety, security, ethics, and etiquette standards and practice in the use
of ICTs as it would relate to their specific professional tracks.
3. use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.
Instruction or Delivery:
The instructor will give the student some insights on what the discussion is all about and
Week 1 will discuss the topic, collaborate with the students to have an engaging environment.
The instructor will also conduct an activity for the students to help them understand further
the topic, and will be assessed through a one-question essay right after the discussion and
activity.
The instructor will give the student some insights on what the discussion is all about and
will discuss the topic, collaborate with the students to have an engaging environment.
Week 2
The instructor will also conduct an activity for the students to help them understand further
the topic, and will be assessed by independently composing an insightful reflection paper
on the nature of ICT in the context of their lives, society, and professional tracks (Arts,
Tech-Voc, Sports, Academic).
Approved by:
LONIVERT O. CRUZ
Principal
COURSE OUTLINE
Instructor’s Name: Prince Virniel B. Carumba, LPT Subject: E-Tech: ICT for Professional Track
Week(s): 1 – 2
Grade& Block: Grade 12 | Block B2
Days: MWF Time: 5:40 PM – 7:10 PM
Room Number: Room A
5. The current state of ICT technologies (i.e., Web 2.0, 3.0, convergent technologies,
social, mobile, and assistive media).
6. Online systems, functions, and platforms.
7. Online safety, security, ethics, and etiquette.
8. Contextualized online search and research skills.
II – Time Frame One (1) hour and thirty (30) minutes per session; total of Four (4) hours and thirty (30)
minutes
III – Learning The learners:
Competencies
4. compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.
5. apply online safety, security, ethics, and etiquette standards and practice in the use
of ICTs as it would relate to their specific professional tracks.
6. use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.
Instruction or Delivery:
The instructor will give the student some insights on what the discussion is all about and
Week 1 will discuss the topic, collaborate with the students to have an engaging environment.
The instructor will also conduct an activity for the students to help them understand further
the topic, and will be assessed through a one-question essay right after the discussion and
activity.
The instructor will give the student some insights on what the discussion is all about and
will discuss the topic, collaborate with the students to have an engaging environment.
Week 2
The instructor will also conduct an activity for the students to help them understand further
the topic, and will be assessed by independently composing an insightful reflection paper
on the nature of ICT in the context of their lives, society, and professional tracks (Arts,
Tech-Voc, Sports, Academic).
Approved by:
LONIVERT O. CRUZ
Principal
COURSE OUTLINE
Instructor’s Name: Prince Virniel B. Carumba, LPT Subject: E-Tech: ICT for Professional Track
Week(s): 1 – 2
Grade& Block: Grade 12 | Block C1
Days: MWF Time: 7:10 PM - 8:40 PM
Room Number: Room C
9. The current state of ICT technologies (i.e., Web 2.0, 3.0, convergent technologies,
social, mobile, and assistive media).
10. Online systems, functions, and platforms.
11. Online safety, security, ethics, and etiquette.
12. Contextualized online search and research skills.
II – Time Frame One (1) hour and thirty (30) minutes per session; total of Four (4) hours and thirty (30)
minutes
III – Learning The learners:
Competencies
7. compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.
8. apply online safety, security, ethics, and etiquette standards and practice in the use
of ICTs as it would relate to their specific professional tracks.
9. use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.
Instruction or Delivery:
The instructor will give the student some insights on what the discussion is all about and
Week 1 will discuss the topic, collaborate with the students to have an engaging environment.
The instructor will also conduct an activity for the students to help them understand further
the topic, and will be assessed through a one-question essay right after the discussion and
activity.
The instructor will give the student some insights on what the discussion is all about and
will discuss the topic, collaborate with the students to have an engaging environment.
Week 2
The instructor will also conduct an activity for the students to help them understand further
the topic, and will be assessed by independently composing an insightful reflection paper
on the nature of ICT in the context of their lives, society, and professional tracks (Arts,
Tech-Voc, Sports, Academic).
Approved by:
LONIVERT O. CRUZ
Principal
Technology
Data
- It can be something simple and seemingly random and useless until it is organized.
Information
- (in information theory) a mathematical quantity expressing the probability of occurrence of a particular
sequence of symbols, impulses, etc., as contrasted with that of alternative sequences.
- When data is processed, organized, structured or presented in a given context so as to make it useful, it is
called information.
The Current State of ICT
Sometimes, it is also called as Information and Communications Technology. So, what is ICT?
It is an extended term of Information Technology (IT), that stresses the role of unified communications and the
integration of telecommunications, computers, as well as necessary enterprise software, middleware, storage,
and audio-visual (AV) systems, which enable users to access store, transmit, and manipulate information.
- is combination of all resources and users on the Internet that are using the Hypertext Transfer Protocol
(HTTP).
- A broader definition comes from the World Wide Web Consortium (W3C): "The World Wide Web is the
universe of network-accessible information, an embodiment of human knowledge."
Web 1.0
- It is a term coined to differentiate the first stage of the World Wide Web (www) in comparison with the
present stage of internet technology.
internet
- the term internet in its lower case spelling was a common short form of the term internetwork, and this
spelling and use may still be found in discussions of networking.
while,
Internet
Hence, the Internet is an internet, but the reverse does not apply.
Web 2.0
- This term was first used around 2004.
- The users can now interact, contribute, and create their own internet space and content (Explosion of
Information & Social Media (SocMed)).
- The term was popularized by Tim O’Reilly and Dale Dougherty at the O’Reilly Media Web 2.0 Conference
in late 2004, though it was coined by Darcy DiNucci in 1999.
Web 3.0
- It is referred to as the semantic web or data driven web content and response.
- The context of the search of the user is processed by a programming language to help the user by presenting
options of what the person is interested in.
- This phrase was coined by John Markoff of the New York Times in 2006, refers to a supposed 3rd
generation of Internet-based services that collectively comprise what might be called “the intelligent
web”.
Technology Convergence
- It is an evolution of technological developments that merge into a new system bringing together different
types of applications and media.
- It is a collection of internet-based communication tools and computer assisted channels dedicated to allow
users to interact, communicate, and share information in a virtual community and network.
Mobile Media
- A range of handheld devices from mobile phones, tablets, and e-readers to game consoles, primarily used as
personal, interactive, Internet-enabled and user-controlled portable platforms that allow interconnected
users to exchange personal and nonpersonal information.
Assistive Media
- The organization was the first internet-based reading service for persons with visual and reading
impairments.
- The produce and publish voice-recorded written materials on cassettes, CDs, and the internet.
Collaborative platforms
- Is a category of business software that adds broad and social networking capabilities to work processes.
Convergent Technologies
- It is an extension of the term convergence, which means “coming together of two or more disparate
disciplines or technologies”. Convergent Technologies also refers to an American computer company
formed by a small group of people who left Intel Corporation and Xerox PARC in 1979.
Online Systems
- Are online versions of information systems, which is “the process of and tools for storing, managing,
using, and gathering of data and communications in an organization. An example of information
systems are tools for sending out communications and storing files in a business.”
============================================
“If you can program it, then it’s a platform. If you can’t, then it’s not.” – Marc Andreessen
Platforms
- A computing platform or digital platform is the environment in which a piece of software is executed. It
may be the hardware or the operating system, even a web browser and associated application programming
interfaces, or other underlying software, as long as the program code is executed with it.
It makes it easier for users to interact, to collect, and use the data from the user’s interactions for their own
particular needs.
- It is a software system that is designed to search information on the World Wide Web (WWW). The search
results are generally presented in a line of results referred to as Search Engine Results Page (SERPs).
- The information may be a mix of webpages, images, and other types of files.
Communication Services
- These are outsourced enterprise communications solutions that can be leased from a single vendor or
provider.
- A communications service provider (CSP) is a provider that transports information electrically and can
encompass public and private companies in telecom, internet, cable, satellite, and managed services
business.
Payment System
- It is any system used to settle financial transactions through transfer of monetary value and includes the
institutions, instruments, people, rules, procedures, standards, and technologies.
Advertising Platforms
- It allows users to create and manage advertising campaigns, generate reports, and retrieve information
about the ads, campaigns and organizations that are associated with an account.
============================================
- Usually unsolicited commercial e-mail sent from an unknown source with identical message sent to
multiple recipients.
- Usually not dangerous but can be time and space consuming.
- Dangerous ones can carry viruses and other malicious software (Malware).
E-mail spoofing
- It is deceitful e-mail practice in which the sender address is changed, so that it would appear to have come
from a different source which is usually someone you know.
- E-mail spoofing is usually used by spammers to hide the origin of the spam.
Phishing
- It is a deceitful practice of trying to get confidential information such as passwords and usernames, and
credit card details by making it appear as if it comes from a trustworthy source.
- It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google, Amazon, and
financial institutions.
Pharming
- This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious
website.
- the main objective is to obtain username and passwords, as well as credit cards and financial information,
and use these to steal their money electronically or use the credit cards of the victims.
- It is a major concern of many online banking and e-commerce (electronic commerce) transactions.
Spyware
- A computer program that is installed covertly on a personal computer to collect information or even take
control over computer without the knowledge of the user.
- It can monitor and collect information about the user’s internet habits and practices.
- It can also affect the performance and setting of the computer.
Trojan Horse
- A malware fronting to perform a good task, but covertly performs undesirable function with the intention of
entering the computer without the user’s consent.
- It can disable the computer’s defenses, opening it to unauthorized entry.
- It can erase data, corrupt files, allow access to computer and disrupt everything.
Computer Virus
- It is a program that duplicates itself and then infects the computer. It spreads like a biological virus.
- It can be transferred by the use of removable storage media devices.
- Damages may be mild to severe.
Hacker(s)
- This is a person who is able to enter and control other people’s computer without authorization.
- Usually vandalizes the victims’ website, steals personal information, obtains intellectual property, and
performs credit card fraud.
- Firewalls are able to prevent entry by hackers.
Aggregator
- is a website or Web application where headlines and other content are collected for easy viewing.
Aggregators such as Google News compile news articles and posts.
Avatar
- is a two- or three-dimensional icon that represents a computer user or a gamer. Avatar can be a
cartoonish graphic, a photograph, a screen name, or a fully developed character.
Blog
- from the term “weblog”, is a type of website usually updated by an individual or a group of bloggers.
Some blogs provide news or opinions on a specific subject, while others are more like online journals.
Most blogs allow readers to leave comments on blog posts.
Flaming
- is the act of saying mean things online, usually in ALL CAPS, and often in a public forum with the
intention to humiliate. Flame wars can occur easily online, as it can be difficult to figure out people’s
intentions or emotions online.
Mash-up
- is a remix or blend of multiple songs, videos, or another media content into one product. Fan fiction
writing is one form of a mash-up, as writers take characters from a well-known video game, movie, or
book, and rewrite their actions or relationships.
- is usually an online virtual world that multiple players navigate and play in together. While in this virtual
world, their avatars chat, cooperate, and quest together, oftentimes towards a goal.
P2P, or Peer-to-Peer
- it is a network allows for sharing of mp3s, videos, and other digital files by transferring information
directly between two computers rather than by going through a central server. P2P technology is also
behind the popular Internet phone service Skype.
Podcast
- is a downloadable video or audio file. Podcasts can be verbal, based on a certain topic, or can include
music, video, and commentary. Most podcasts are updated regularly through the addition of new
episodes.
Short Message Service (SMS)
- or text message, is a short message of fewer than 160 characters sent from a cell phone.
- A Multimedia Messaging Service (MMS) is a text message that contains an attached multimedia file,
such as a picture or song.
============================================
Online Search
- Is the process of interactively searching for and retrieving requested information via computer from
databases that are online.
- Interactive searches became possible in the 1980s with the advent of faster databases and smart
terminals.
Advantages/Pros:
Disadvantages/Cons:
- Online is not totally secure and theft is one of the numerous dangers it poses, researches personal
information is at risk of being access by rogue persons.
- Some of the materials on the Internet have not been evaluated by experts or thoroughly screened.
- Lack of accreditation and low quality.
Research skills:
You can certainly develop advanced information retrieval skills in Working with Sources.
However, in specific understandings of “research” carry a lot of weight. The classic definition is that “research”
leads to an original contribution to knowledge in a particular field of inquiry by defining an important question
or problem and then answering or solving it in a systematic way.
So, you will need to read on to a develop a relevant understanding of what research means in your subject.
- Research design covers the key issues in developing a successful research project.
- Research methods takes you to resources on essential techniques for carrying out convincing research.
- Working with data will provide resources on the use of statistics and other numerical skills in research.
- Report writing.
- Analyzing lots of information from different sources.
- Finding information off the Internet.
- Critical thinking.
Prepared by: