Module Educ 5a

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 1
Crossword Puzzle

Direction. Identify the word that is being described/ defined below. Each correct word will be
rewarded two points.

2.S 1.
S
I O
N 4.F I R E W A L L
G 5. P L I T
S
L W
E A
1.U N A U T H O R I Z E D A C C E S S
S E
E 4. P 3.
P S
R H I P
I N F O R M 5.A T I O N T H E F T
S A D M
H C W
I Y A
N R
G 3.H A C K E R

CROSSWARD

1. Using anybody’s computer and files without permission from the owner
2. A computer crime usually happens when one deliberately steals information for
purposes of studying how to compete with other organizations or companies.
3. A person who breaks into the computer system to steal or corrupt the data in it.
4. A security system (hardware and/or software) that blocks unauthorized access to data
on a network.
5. Also called as telephony

DOWNWARD

1. A person copies illegally copyrighted software for personal use or business use
2. Software that can be installed only in one computer
3. A spam sent through instant messaging device

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 1


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

4. A scam in which an agent sends legitimate-looking e-mail that attempts to steal personal
and financial information including bank accounts numbers of the recipient
5. A software that incorporates the presentation of advertisement as condition for operating
the software.

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:
Activity No. 2
True or False

Direction. Write your name if the statement is TRUE and Write your FAMILY NAME if the
statement is false, underline the word/phrase that makes the statement false and replace it with
the correct one.

ANTONETTE1. Multi-user is the most common type of license used in school.

DACUYA 2. One of the conditions in purchasing software belongs in single -user license
where users are prohibited to give copies of software to their friends.

DACUYA 3. A computer crime when one deliberately steals information for purposes of
studying how to compete with other organization or companies.

DACUYA 4. Encryption is a process of converting readable data to unreadable on

DACUYA 5. Firewall restricts teachers and students from accessing malicious data.

DACUYA 6. Adware is a software that incorporates the presentation of advertisement as


condition for operating the software.
DACUYA 7. Phishing is may also called as carding or spoofing.

ANTONETTE 8. Hacker originally means a computer enthusiast who does well in computer that
benefits other people.
DACUYA 9. In creating a password make sure it is easily to remember.

ANTONETTE 10. Vandalism is an act of damaging or breaking the hardware.

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 2


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 3
Poster and Slogan Making

Direction. Make a poster and slogan showing any of this unethical issue:

a. unauthorized access and use of hardware, software network, and computer files
b. hardware theft and vandalism
c. software theft
d. information theft
e. Malicious acts in software

Discuss your poster and slogan in space provided below. As a student, what will you do
or what can you suggest in order to minimize this kind of act? (20 points)

sThe illustration above portray what is information theft. Information theft is were in one
deliberately steals information for purposes of studying how to compete with other companies or
organization, it’s all about getting confidential information about school administrator, academic
officials and such. The robber represents the thief who will rob your personal information
including your passwords, messages, emails/ social accounts, files/documents. To prevent
access of information through the use of computers and networks, school implements the use of

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 3


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

encryption. Encryption is the process of converting readable data to unreadable one. An


encryption key is needed to enable the person to convert is back in readable form.

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 4
Ethics in Practice

Direction. Below are the different situations in the use of school technologies. Place yourself in
each of the situation and internalize on the action you will do to solve the issues.

1. One of the ethics of using technology and software is that sharing or giving out your password to
other is an unacceptable practice. For instance, your classmate or friend borrowed your personal
gadget such as laptop good for a day for an important purpose. For him/her to be able to operate the
laptop it requires the password that you have been personally set. Will you give your password even
if you know the fact that you know it is not advisable and unacceptable. Why or why not? Support
your answer.
I am going to let my friend barrowed my laptop especially when he/she badly needed it
and as a friend I believe I should help her/him for that’s what friends do. I know that my
friends are trustworthy and honest persons its just only for 1 day I can live with that. I
can also change my passwords and create a new one after my friend is done using my
laptop.
2. Your teacher instructed you that whenever you are in the computer laboratory, internet access will be
allowed for educational purposes only. However, you have noticed that your seatmate is playing
online games. What will you do? As a student what school/ classroom policy can you suggest in order
to limit this unethical issue?
For me, as a student I will implement a classroom policy that “No playing of offline/online
games during class or any class activities that needed attention”. If one of my classmate disobey
he/she will face its punishment that whenever he/she is being caught playing games and not
paying attention he will be face a consequence which is the professor/instructor will confiscate its
cellphone with the duration of the class and activity and will call his/her parents to get the student
cellphone from his instructor so that the parents also may know what’s going on or behavior of
their child in the school. In that way we may able to correct and straighten the bad attitude of
student with the help of the parent’s guidance and with knowledge of the parents.
3. You, as a student, are aware that one of your classmates is being cyberbullied by some of your
classmates. Because of this, the victim is losing her self-confidence and self-esteem. What will you
do to help the victim and stop cyberbullying? What school/ classroom policy can you suggest in order
to limit this unethical issue? As a future teacher, what will you do/suggest to address this issue?
If one my friend is being cyber bullied, I will comfort and give her advices that can lift up
herself from the shame, hatred, pain and I will be her strength to fight those persons who bullied
her but in a good way. Cyberbullying is a very crucial issue in our society nowadays because we
are now in the era where in technologically advanced. For me, a way to stop cyberbullying is that
me, myself I should discipline and must have a good behavior and attitude, its either in the
cyberspace or in person. I should first apply and learn to respect myself before I can respect
others. Because I believe that how can I show respect to others if I can’t have a respect for

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 4


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

myself, I have to start it from myself so that I can share it all the people especially those who have
been bullied. As a future teacher I must be a role model to my students so that they can’t just only
learn new ideas and concepts pertaining to its subject matter but they can also gain some
values, good moral, and how to behave right with the usage of their social media, for I must be
equip with the media literacy.

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 5
Mosaic Making

Direction. Using magazine, newspaper, and other resources, make or form something that
describes the importance of educational technology.

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 5


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 6
Traditional Assessment Versus Alternative Assessment

Direction. Compare and contrast traditional assessment and alternative assessment. Write
your answer using a Venn diagram below.

Traditional Assessment Alternative Assessment

 Non-interactive  Non-interactive performance


 Individualized feedback/was back
performance
 Assessment directs curriculum
 Emphasis on ensuring proficiency
 Curriculum directs
at real world tasks
 Promotes “what”
knowledge  Promotes “how” knowledge
 Provides a one-time  Provides an examination of
snapshot of students learning over time
understanding  Continuous long-term
 Timed, multiple-choice assessment
format  Untimed. Free-response format
 Decontextualized test  Contextualizing communicative
items  Criterion-referenced scores
 Scores suffice for  Open-ended, creative answers
feedback  Formative
 Nor-referenced scores  Oriented process
 Focus on “right”  Interactive performance
answer?'  Fosters intrinsic motivation
 Process of information
 Summative
 Group projects
 Oriented product
 Teacher mediated
project
 Developmental

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 6


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 7
Analysis on the Effectiveness of Educational Technology

Direction. Answer the following questions:

1. Why is there a need to evaluate educational technology in a classroom use?

2. What evaluation tool(s) is or are you going to use when evaluating educational technology?
Why? Explain.

3. What is meant by evaluation? Define and discuss it in your own words.

Name: Dacuya, Antonette M. Date: March 23, 2020

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 7


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

CYS: BTVTED-FSM 2A Score:

Activity No. 8
Word Search

Direction. Search and encircle the words that are being asked below.

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 8


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Find the following words in the puzzle. Words are hidden


diagonally, horizontally, and vertically.

ALTERNATIVE ASSESSMENT AUTHENTIC


CHECKLIST

EVALUATIONTOOL PORTFOLIO
PROJECTBASED

RATINGSCALE RUBRIC
TRADITIONAL
Name: Dacuya, Antonette M. Date: March 23, 2020
CYS: BTVTED-FSM 2A Score:

Direction. Search and encircle the words that are being asked below.

Activity No. 9
Internet Safety Word Search

C Q W E R T Y U U I O P L K J G F D S A Z X C V B
X C V G H J N K M K L D I Y U I J K L M N B C S C
G V B L A B A N K M R B M P K E R A W Y P S K D M
C N M L A N G G O O M M R O M A H U M A O N L A R
V A I K A Y K Y W J Y I V N M M B C D C I M M G S
B E A S F J K S R G V F T C H G S D I E O Y K I D
A I I N S T S R T A Y U B I K O N A I E Y A A T C
B O F H K A C V C B Y O N R M K L M O M L A S A S
C U B O P E R Y K K B O E M B M E R B A I U I V F
F A L K N Y J A C K Y O U Y E T H G I N G K M I V
G L I A E H T F H T V E F D N F G P G N L B Y K Y
H A A V F J R D I G V A I B C J B H B E A N G T D
J B P E T U T T S D R A Z A H E M O H E D I E Y V
M Y A F Y W N J I H W F G T R R Y T Y R K F U U V
N U W L H E J M K K A V B Q W R T O L C A W A T D
M O G W D B H C Y B E R B U L L Y S I S O T O K C
J C R I M I N A L I N G I A Y O J W R F V I K O X
U W P A E T T E U Q I T E N A K H D M O G P Q R N
I K I K N O A Y A B M A W N G S F T N M P O M W M
L U O D N O I T A M R O F N I L A N O S R E P J
A N B U I B Y U I O P N W T G H U I L O P L W Q X

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 9


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Identity Password

Social Media Netiquette

Spyware Criminal

Home Hazards Personal Information

Sharing Safety

Harassing Photos

Cyberbully Screen Name

Privacy

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 10
True or False

Direction. Write the FIRST NAME of your CRUSH if the statement is TRUE and write your
LAST NAME if the statement is FALSE. If the statement is false, underline the statement or
word that make it false and replace it with the correct answer. Write your answer in a space
provided.

Dacuya 1. Folder of a Uniform Resource Locator is considered as the directory name.

Dacuya 2. The mobile device such as mobile phone that is set up to respond to web requests is
a web browser.

Dacuya 3. Wiki is a collaborative website.

Kyle K. 4. Web page is a document that contains or references various kinds of data such as
text, images, graphics, and programs.

Dacuya 5. Informational is one of the categories of website that offers factual information.

Direction. Identify the component of the Uniform Resource Locator in an illustrated diagram
below and explain it in your own understanding. Write it on the space provided.

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 10


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

https:// www.kok.edu.ph/preschool/nursery.docx

Protocol Domain Folder File Name


Name
Folder- Used to File Name- It is an
Protocol- It is the
Domain Name- The access a directory
procedures for identifying name
address where containing related
transmitting data given to a computer
internet users can files or documents.
between electronic Sub- file.
access your website.
devices such as Domain
It is the name of
computer. Sub-Domain- Is an additional
your website.
part to your main domain
name. It is created to
organize and navigate to
different sections of your
website
Name: Dacuya, Antonette M. Date: March 23, 2020
CYS: BTVTED-FSM 2A Score:

Activity No. 11
Fill and Complete Me!

Direction. Search a website on the internet. Identify the categories of website that can be
applied to your major. Create a collection of these websites by supplying the necessary
information in the table provided. After that, find for a partner and give it to him/her to check your
work. (2 points each).

Reminder: This activity will create a database of the different categories of websites
that applies to your field of specialization.

Category
Name of the Website
URL
Use of the Website

Category
Name of the Website
URL
Use of the Website

Category

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 11


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Name of the Website


URL
Use of the Website

Category
Name of the Website
URL
Use of the Website

Category
Name of the Website
URL
Use of the Website
Name: Dacuya, Antonette M. Date: March 23, 2020
CYS: BTVTED-FSM 2A Score:

Activity No. 12
Getting to Know Modes of Alternative Delivery System

Direction. Identify each caricature according to the type of Alternative Delivery System (ADS)
it portrays. Choose your answer from the following: Broadcast Radio, Audio Conferencing
(Teleconferencing), Video Conferencing, Web Conferencing, and
Online Technologies.

________________________________ ________________________________

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 12


________________________________ ________________________________
LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

________________________________
Activity No. 13
Getting to Know Modes of Alternative Delivery System

Direction. Based on the caricatures above, give your own brief definition of each of the modes
of Alternative Delivery System presented. For item number five (5), identify which among
the modes is being defined based on the given definition.

1. Broadcast Radio
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

2. Audio Conferencing
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

3. Video Conferencing
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4. Web Conferencing
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

5. These Alternative Delivery Systems are tools that educators use to deliver
instructions. Examples are either through electronic mail (e-mail) and Learning
Management Systems (LMS) and other e-learning platforms.

Answer:________________________________

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 13


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 14
Cross Word Puzzle

Direction. Using the Across and Down clues, write the correct words in the numbered grid
below.

1.A L I C E 2.H O T P O T A T O 4E S
L D
G 5A 7W 3W W 6S T I X Y
E U O
R D 7 R 8T 9m 10P
I D e 13C a D
O P a o I F
B R c m L C
11 K O W L 12E D G E h I V r
G
o O m 14 k e t c h U p e
S
A 15 b S r m a
V
n 16R o s e n T a t
i k d u s o
m i P b 18T u m b l r
a l E t
t 17U J A M r
e S
19 H A R E N D I P I T Y
S

Across
1. an innovative 3D programming environment
Down 2. allows you to create interactive multiple choices
1. He compiled some of the web tools that are useful for teachers. 6. used to create online bulletin boards
3. considered as blogging platform & content management system. 7. abbreviation for world wide web
11. used to create, publish exercises and assignments.
4. tool to test the interest of students in college major.
14. allows teacher & students to create & share stunning 3D
5. an audio blogging site where you can send updates through technology
models
8. it is like Youtube but it is used for educational purposes. 16. according to him, “World Wide Web is merely a tool”
9. provides the ability to record video email any time 17. a cloud-based platform that creates new music and share it
10. creates PDF from any Windows program with friends
11. create animated comic strips and cartoon 18. simplified blogging platform that allows you to share anything
12. allowing you to add extra control to Youtube like zooming and slow online.
motion 19. a web-based creativity suite where anyone can build and
deploy engaging and interactive games and other web
13. easily creates comics (graphic novel) online
applications.
14. create personalized speaking avatar.

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 14


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Name: Dacuya, Antonette M. Date: March 23, 2020


CYS: BTVTED-FSM 2A Score:

Activity No. 15
Tools, Functions and Application

Direction: Write the tools and its functions in the internet and its application in education.

Tools Function Educational Application

MSCI 3 – Technology for Teaching and Learning 2 (TLE) Page 15

You might also like