ET Quarter 3 Weeks 1 3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

LEARNING MODULE 1

G11│Q3│Weeks 1-2

Student’s Name:

Grade & Section: School Year: 2021-2022

1
Many Filipinos use social media, the Internet, and information and communications
technology (ICT) for productivity, entertainment, and information dissemination. The skills required
to use these technologies for different applications are required through experience and
observation of peers, who may also lack formal education in ICT. Without formal education in ICT
and related technologies, various problems may arise. First, people may fall victims of Internet or
online fraud, unethical online behaviors such as identify grabbing and cyber bullying, and privacy
invasion. Second, different online tools that are offered for free to enhance productivity and
promote ease in creation of content are neglected and sometimes restricted to their basic
functions because people lack knowledge and familiarity in using them (Bandala & Demegillo,
2016).

Through the power of ICT technologies like computer networks and gadgets made the
world connected in the cyber world. Though we can use these features effortlessly, every one
of us needs to be technology enabled and be aware of the digital community.

On this module, you will learn how the World Wide Web evolves from a flat website to
responsive website. Though this evolution will surely help the learners to be a part of digital
world however the learner needs to learn that their every action online they will be accountable
for it. As you go through this module, remember to look for the answers of the following focus
questions.

 What is Information and Communication Technology?


 How does ICT affects your everyday lives?
 What are the things you need to do and remember to stay safe online?

Content Standards: You will be able to demonstrate an understanding of ICT in the context of
global communication for specific professional track.

Performance Standard: You will be able to independently compose an insightful reflection paper
on the nature of ICT in the context of their lives, society, and professional tracks.

THIRD QUARTER PERFORMANCE TASKS IN GRASPS FORM


GOAL Compose an insightful reflection paper on how ICT affects your lives, the society,
and the professional tracks.
ROLE Personal blogs blogger
AUDIENCE Followers and viewers
SITUATION In this time of the pandemic, when there were no face-to-face classes, you are to
discuss and share your experience that ICT helps you or how it affects you in the
context of your lives, in society, and in the professional tracks you choose.
PRODUCT/ Reflection Paper
PERFORMANCE
STANDARDS You will be graded using the rubrics below.

Criteria Description Total


Excellent Satisfactory Developing Beginning
60
5 3 2 1
pts.
Depth of Demonstrate a Demonstrate a Demonstrate a Demonstrate
Reflection conscious and thoughtful limited little or no
(X5) thorough understanding of understanding of understandin
understanding the writing prompt the writing prompt g of the
of the writing and the subject and subject writing
prompt and the matter. matter. The prompt and
subject matter. reflection needs subject
This reflection revision.- matter. This
can be used as reflection
2
an example for needs
other students. revision
Analysis Analysis was Analysis was Analysis was not Analysis was
(X4) very clear and clear and concise clear and concise poor, not clear
concise based based on the data on the data and concise on
on presented. presented. the data
the data presented.
presented.
Organization The paper The paper was The paper was The paper was
(X3) was well written with some written with few written with poor
written with ideas easily ideas not easily ideas not easily
ideas easily conveyed to the conveyed to the conveyed to the
conveyed to readers. readers. readers.
the readers.

Instructions:
 Minimum words: 300; Maximum words: 500 words
 Short bond paper (8.5 x 12); Arial font; 12 font size; 1.15 spacing; 1 in margin (all sides)
 The submission of your reflection paper will be on J a n u a r y 3 1

Learning Competencies

After going through this module, you are expected to:


1. Compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.
2. Apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks.
3. Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.

LESSON 1: What is Information and


Communications Technology?

DEFINITION OF TERMS

TECHNOLOGY – refers to methods, systems, and devices which are the result of
scientific
knowledge being used for practical purposes.

PLATFORM - any hardware or software used to host an application or service.

HYPERTEXT - a software system that links topics on the screen to related information and
graphics,
which are typically accessed by a point-and-click method.

DIGITAL NATIVE – person who has grown up in an information era.

HACKER - is a person skilled in information technology who uses their technical knowledge to
achieve a goal or overcome an obstacle, within a computerized system by non-standard means.

3
Information and Communications Technology (ICT) often deals with the use of different
technologies such as mobile phones, telephones, computer, Internet, and other devices, as well
as software and applications to locate, save, send, and manipulate information. Empowering ICT
is important for its innovative uses impacts our daily lives. It has affected our ways of
communicating, made our lives more convenient, and assisted countries towards their
modernization plans. Thus, there is a need to create a foundation of understanding in the world of
ICT.

Lesson Objectives

By the end of this lesson, you are expected to:


1. Identify varied online platforms and sites.
2. Compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges.
3. Evaluate existing online creation tools, platforms and applications in developing ICT
content.

Reflect on the following questions:


 How many times have you checked your phone this morning?
 How many updates have you posted on Facebook, Twitter, or Instagram today?
 Do you use the internet/ mobile for an hour after you woke up this morning?
 Have you followed a celebrity/ a crush on his/ her social media

ICT in the Philippines


Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-related jobs,
one of which is BPO, Business Process Outsourcing, or call centers. In a data gathered by the
Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares 19.3% of
the total employment population.
The use of communication technology spread in the entire country nowadays even in rural
areas. According to Rappler blog site there are 119 million mobile phone subscriptions from a
total population of 101 million and 47 million active Facebook accounts. The Philippines is the
fastest growing app market in Southeast Asia and the highest digital population in the world. The
top online activities are social media, videos, online mobile games, location-based search and
online shopping. Staying connected with loved ones, friends, and relatives is a fundamental need
for Filipinos

The World Wide Web

The World Wide Web (www) is an information system on the Internet that allows
documents to be connected to other documents by hypertext links, enabling the user to search
for information by moving from one document to another. It was invented by Tim-Berners Lee.
The World Wide Web browser software, such as Microsoft's Internet Explorer/Edge, Mozilla
Firefox, Opera, Apple's Safari, and Google Chrome let users navigate from one web page to
another via the hyperlinks embedded in the documents. These documents may also contain any
combination of computer data, including graphics, sounds, text, video, multimedia and interactive
content that runs while the user is interacting with the page. The Web has enabled individuals
and organizations to publish ideas and information to a potentially large audience online at
greatly reduced expense and time delay.

Types of Web Pages

Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat or
stationary page since it cannot be manipulated by the user.
Web 2.0 or The Social Web allows users to interact with the page, the user may be able
to comment or create a user account. Most website that we visit today are Web 2.0.
Web 3.0 or Semantic Web. The semantic web provides a framework that allows data to
4
be shared and reuse to deliver web content specifically targeting the user. Search Engine
will learn about you and your habits from each search you perform and will gather details
about you from your previous activities like likes and social postings and present the
answers as per your preferences.

Features of Web 2.0

FEATURES WEB 2.0


FOLKSONOMY allows users to collectively classify and find information using freely chosen
keywords (e.g. "tagging" by facebook). Tagging uses the pound sign #, often
referred to as hastag.
RICH USER dynamic content that is responsive to user input (e.g., a user can "click" on
EXPERIENCE an image to enlarge it or find out more information)

USER the owner of website is not the only one who is able to put content. Others
PARTICIPATION are able to place a content on their own by means of comments, reviews,
and evaluation.
LONG TAIL services that are offered on demand rather than on a one-time purchase.
This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent in the Internet, or a data plan that charges you for
the amount of bandwidth you used.
SOFTWARE AS A users will subscribe to a software only when needed rather than
SERVICE purchasing them.

Trends in ICT
Technology keeps rising and improving every time. The use of technology connects us
to the people around the globe and gives us current information on the trends in information
and communication. As what you have written in the activity above, it shows that social media
is mostly used by people and one of the current trends in information and communication
technology.

1. Convergence – it refers to fusing of technological advancement to work on a similar


task.
Techonological Convergence is the combination of two or more different
entities of technologies to create a new single device.
Ex. Using smartphone as camera in taking pictures instead of DSLR
camera.
2. Social Media – an application and website where user can communicate, create, co-
create
and share content, and participate in online communities.

TYPES OF SOCIAL MEDIA


A. Social Network – A website where people with the same come together to share
information. Examples: Twitter, Instagram, Facebook

B. Social News – A website where user can post stories and are ranked based on
the popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark

C. Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images and others. Examples: Pinterest,
StumbleUpon, Dribble

D. Media Sharing – A website that allows you to share and store multimedia
files such as video, photos and music.
5
Examples: Instagram, YouTube, Flickr

E. Microblogging – a website that allows you to broadcast short message.


Examples: Twitter, Tumblr, Meetme

F. Blogs and Forums – a discussion website that allows user to ask questions and
comments on a journal posted by an individual or group. Examples: Wordpress,
Blogger
3. Mobile Technologies – a technology used in cellular and other devices such netbook,
laptop,
tablet, smartphones and etc.
4. Assistive Media - A platform that assist people with disability. It will guide the
individual like
a blind person by using an audio recording.

LESSON 2: Online Safety, Security and Netiquette

The internet is the guiding technology of the Information Technology Age just as the
electrical engine was of the Industrial Age. In these times, more and more people are already
engaged in the use of technology. These people who are raised in a digital, media-saturated world
are called digital natives. No doubt, the Internet has been very useful to us but with the rise of
instant messaging, chat rooms, emails and social networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers, including exposure to sexual predators. Thus,
internet safety is always our primary concern.

Lesson Objectives
By the end of this lesson, you are expected to:
1. Consider one’s and others’ safety when sharing information using the
internet.
2. Apply internet online safety, security ethics and etiquette
standards and practice in the use of ICTs.
3. Determine and avoid the dangers of the Internet.

ONLINE SAFETY

The importance of internet plays a crucial part in human development. Life becomes
easy and comfortable because of this technology. Most of us are connected to the internet via
laptop, mobile phone, tablet, personal computer and other electronic gadgets. Behind this
technology there is a risk that everyone should be aware of. You could be at risk on scam,
bullying, and illegal activities if you will not take precautions in using internet. We need to keep
ourselves safe and secure whenever we use the internet. That is why it is very important to
know and learn the ways on how to be safe and secured online.

Self-Check on Online Habits


Directions: Reflect and assess yourself on your online habits. Check “Yes” or “No” on
the table below.

Online Habits Yes No


I always talk to strangers on social media.
Giving your password to your friends.
Posting about your future vacations.
Visiting unsecured websites.
Ranting on social media.
Posting image or video without asking permission from the owner.

6
In the activity above you assessed yourself in online habits. Those habits might be
good or bad that you must be aware of. If you keep practicing those bad habits it might bring
you danger. Safety is the first thing you must consider in using internet.

Tips on how to be safe online


Do not share your password with anyone.
Add friends you know in real life.
Do not visit untrusted websites.
Add password to your WIFI at home to make it private.
Install and update antivirus in your computer.
Do not give your personal information to anyone
Think before you click.
Never post about your future vacation.

Internet Risk

Cyberbullying - It happens when someone intentionally abused, harassed, and


mistreated by
other person using electronic communication.

Identity Theft - It is a crime of stealing personal information for the purpose of assuming
that
person’s name or identity to make any form of transactions.
Cyber Stalking - A criminal practice where electronic communication is used to stalked or
harassed individual or group.
Sexting - The act of sending sexually explicit text messages, images, and videos.
Spoofing – it happens when someone or something pretends to be something else to
gain our
confidence, get access to our systems, steal data, steal money, or spread
malware.

INTERNET THREATS

 Malware – also known as Malicious Software.


Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to another
program.
2. Trojan Horse – a malicious program that disguised as legitimate program that
user will accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other
computers.
4. Spyware – A malicious program that gathers information from victim’s
computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user credentials
and confidential information and send back to hack by recording every keystroke
that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as PC and
mobile phone that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a computer on a
network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the programs or
files and demands to pay the ransom through online method for the removal of the
virus.
 Spam - also known as junk email or unwanted email send by advertiser or bot. It can be
used
 to send malware.
 Phishing - a cyber attack method using deceptive emails and websites to acquiring
7
sensitive personal information.
 Pharming – it happens when a hacker (or “pharmer”) directs an internet user to a
fake website instead of a legitimate one. These “spoofed” sites can capture a victim’s
confidential information, including usernames, passwords, and credit card data, or
install malware on their computer. Pharmers usually focus on websites in the financial
sector, including banks, online payment platforms, or other e-commerce destinations.
 Cybercrime - a crime in which computer is used as object and tool in committing a crime
such
hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and
others.

Cybercrime Law - The Cybercrime Prevention Act of 2012, officially recorded as Republic Act
No. 10175, is a law in the Philippines that was approved on September 12, 2012. It aims to
address legal issues concerning online interactions and the Internet in the Philippines. Among the
cybercrime offenses included in the bill are cyber squatting, cybersex, child pornography, identity
theft, illegal access to data and libel.

Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:

Flame war is a series of flame posts or messages


in a thread that are considered derogatory in nature
or are completely off-topic. Often these flames are
posted for the sole purpose of offending or
upsetting other users. The flame becomes a flame
war when other users respond to the thread with
their own flame message.

Image from:https://twitter.com/Parkster00/status/
1246347088625045504

Lesson 3: Contextualized Online Search and Research Skills

The Internet has made our lives easier especially in terms of doing research. By browsing

8
the internet, we can access limitless topics. Web-based catalogs are available in many libraries to
assist researchers in locating printed books, journals, government documents and other
materials. The biggest obstacle facing all researchers on the internet is how to effectively and
efficiently access the vast amount of information available (The Internet: Research Tools, 2013).

Lesson Objectives
At the end of the lesson, you will be a better user of search engines. In particular, you can
be more deeply aware of search techniques that will give results that are useful for your academic
and chosen career.
Indeed, Google might be our “friend” but using search engines for the sake of plain
information could actually lead you misinformed. In order to stay meaningfully informed, you
should start appreciating the use of the right combination of words or key phrases.

Searching the Web


Getting the correct and reliable information is our goal in internet research. We may
rely on the capability of search engine but sometimes it may not give us the correct information
because of the keywords we entered into a search engine. There are techniques in searching
information that can be applied in search engine in order to get a better result. Some search
engines allow combination of words and logic connectors of AND, OR, and NOT.
Search Engines are websites used for retrieval of data, files, or documents from
data bases. Some search engines we use today are:

Popular Domains

Top- level Domains Country code top level domains


.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network

Tips for Effective Internet Research by George Mathews


1. Know what kind of research you want to do.
2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.

Online Research Skills by Hannah Trierweiler Hudson


1. Check Your Sources
2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks

Copyright Issues

9
There are millions of information that we can get from the internet. Some of this
information are free but others are not. They are protected by a copyright law.

What is Copyright?
Copyright is a protection given to the owner of the rights in an original work such as
books, musical works, films, paintings, and other works, and computer programs. This original
work is called intellectual property which is protected under Republic Act 8293 known as the
“Intellectual Property Code of the Philippines”.

Copyright Infringement
This happens when the copyrighted work is use by other person without permission of
the author or copyright holder. Any person who is infringing the right protected work would be
liable under the law. An example of this is the case of the media giant ABS CBN against the 21
private website operators. These private domains are illegal streaming portals that have been
providing free access to ABS-CBN content in the US and around the world. Because of these,
ABS-CBN will be awarded trademark damages in excess of $1 million against each of the 21
pirate website operators. Additional damages worth $30,000 to $90,000 will also be paid by six
of the defendants due to copyright infringement, with another $10,000 paid for cyber squatting
damages for its domain name, which is similar to an ABS-CBN registered trademark.

Fair Use
Research is important to the students and other people. Most of them rely on the
information that they can get online. Although this information is protected by a copyright law
but we can still use this information without permission in a limited way under certain condition
and purpose.
Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
Example of this is when you post a quote from a person in your Facebook wall. Include
the name of person who owns the quote in your post. Another example is when you copy
image from internet, give credit to the creator of image. The copied image should be use for
educational purpose not for commercial use.
In fair use, 5% of the content of reference can only be copied. If 20% or less of
reference copied, there must be a secondary use agreement and fee. And if 20% or more of
reference copied, it requires purchasing of creative work.

Guidelines for Fair Use


1. Majority of the contents created must be yours.
2. Give credit to the owner.
3. Don’t make profit of the copyrighted work.

LESSON SUMMARY
The community online never stops upgrading. Before users of Web 1.0 can only read through the
content of the website, but now with the presence of Web 2.0 and Web 3.0 we can now create
our own profile and communicate online. However, you need to be careful while you are online
since there are possibilities that your identity or personal information might be stolen or your
personal files might be deleted by malicious software. So always bear in mind that you need to
“Think Before you Click”.

Romans 12:2
Do not be conformed to this world, but be
transformed by the renewal of your mind,
that by testing you may discern what is the
will of God, what is good and acceptable
and perfect.

10
Are you living your best life? Shifting your patterns and focus can change your life. That’s what this
verse is about renewing your mind, changing the way you think to create a better life for yourself and
a life that honors God.

The world and society have patterns or ways that lead to a broken life. These patterns are easy to fall
into and can be difficult to transform. The patterns, or routines, are often performed mindlessly,
without any consideration of our actions or their consequences; however, we are not stuck with them.

Same with this bible verse, we human are conformed in living with our desires of the flesh and the
desire of the eyes in the pride of life. Because of the new technology, we live far better from before.
We always pursuit for our happiness through these worldly things but we are reminded to not be
taken away with these things into sins and destructions. All our actions, whether it is good or bad has
consequences. It is up to us to do the right things and to help others to be lifted up not to dragged
them down. So we are asked to change how we think, to have our minds renewed so that we can
begin to understand God's will for our lives.

Only the Activity Sheets will be returned to your Subject Teacher.


Kindly remove/detach them upon returning with your respective
area for retrieval.

For the Information Sheets, you can keep it, so that you can study
your lesson anytime for your upcoming examination.

REFERENCES

Bandala, A. A. & Demegillo, J. J. (2016). Empowerment Technologies. – Makati City: Diwa


Learning Systems, Inc.

Innovative Training Works, Inc. (2016). Empowerment technologies.-1st ed. – Manila: Rex Book
Store.

Peralta, A. (2014). Telling and re-telling the story of Jesus through English: An activity workbook
that makes religion the core of the curriculum. – Quezon City: Rex Crown
Publications, Inc.

Yuvienco, J. C. (2017). Empowerment technologies: Making small shifts towards a big difference
for Senior High School. – Quezon City: C & E Publishing, Inc.

https://pdfcoffee.com/empowerment-technology-shsq1mod1ict-in-the-context-of-global-
communicationver3-5-pdf-free.html

https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwi34bSN_L
T0AhUCM94KHckmAQwQFnoECBAQAQ&url=http%3A%2F%2Ffnhs.edu.ph%2Fwp-
content%2Fuploads
%2F2021%2F04%2FETech_Q1_M3.pdf&usg=AOvVaw1VKRFUujjTbpkCFS7DFwk-

https://en.wikipedia.org/wiki/Cybercrime_Prevention_Act_of_2012

11

You might also like