ET Quarter 3 Weeks 1 3
ET Quarter 3 Weeks 1 3
ET Quarter 3 Weeks 1 3
G11│Q3│Weeks 1-2
Student’s Name:
1
Many Filipinos use social media, the Internet, and information and communications
technology (ICT) for productivity, entertainment, and information dissemination. The skills required
to use these technologies for different applications are required through experience and
observation of peers, who may also lack formal education in ICT. Without formal education in ICT
and related technologies, various problems may arise. First, people may fall victims of Internet or
online fraud, unethical online behaviors such as identify grabbing and cyber bullying, and privacy
invasion. Second, different online tools that are offered for free to enhance productivity and
promote ease in creation of content are neglected and sometimes restricted to their basic
functions because people lack knowledge and familiarity in using them (Bandala & Demegillo,
2016).
Through the power of ICT technologies like computer networks and gadgets made the
world connected in the cyber world. Though we can use these features effortlessly, every one
of us needs to be technology enabled and be aware of the digital community.
On this module, you will learn how the World Wide Web evolves from a flat website to
responsive website. Though this evolution will surely help the learners to be a part of digital
world however the learner needs to learn that their every action online they will be accountable
for it. As you go through this module, remember to look for the answers of the following focus
questions.
Content Standards: You will be able to demonstrate an understanding of ICT in the context of
global communication for specific professional track.
Performance Standard: You will be able to independently compose an insightful reflection paper
on the nature of ICT in the context of their lives, society, and professional tracks.
Instructions:
Minimum words: 300; Maximum words: 500 words
Short bond paper (8.5 x 12); Arial font; 12 font size; 1.15 spacing; 1 in margin (all sides)
The submission of your reflection paper will be on J a n u a r y 3 1
Learning Competencies
DEFINITION OF TERMS
TECHNOLOGY – refers to methods, systems, and devices which are the result of
scientific
knowledge being used for practical purposes.
HYPERTEXT - a software system that links topics on the screen to related information and
graphics,
which are typically accessed by a point-and-click method.
HACKER - is a person skilled in information technology who uses their technical knowledge to
achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
3
Information and Communications Technology (ICT) often deals with the use of different
technologies such as mobile phones, telephones, computer, Internet, and other devices, as well
as software and applications to locate, save, send, and manipulate information. Empowering ICT
is important for its innovative uses impacts our daily lives. It has affected our ways of
communicating, made our lives more convenient, and assisted countries towards their
modernization plans. Thus, there is a need to create a foundation of understanding in the world of
ICT.
Lesson Objectives
The World Wide Web (www) is an information system on the Internet that allows
documents to be connected to other documents by hypertext links, enabling the user to search
for information by moving from one document to another. It was invented by Tim-Berners Lee.
The World Wide Web browser software, such as Microsoft's Internet Explorer/Edge, Mozilla
Firefox, Opera, Apple's Safari, and Google Chrome let users navigate from one web page to
another via the hyperlinks embedded in the documents. These documents may also contain any
combination of computer data, including graphics, sounds, text, video, multimedia and interactive
content that runs while the user is interacting with the page. The Web has enabled individuals
and organizations to publish ideas and information to a potentially large audience online at
greatly reduced expense and time delay.
Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat or
stationary page since it cannot be manipulated by the user.
Web 2.0 or The Social Web allows users to interact with the page, the user may be able
to comment or create a user account. Most website that we visit today are Web 2.0.
Web 3.0 or Semantic Web. The semantic web provides a framework that allows data to
4
be shared and reuse to deliver web content specifically targeting the user. Search Engine
will learn about you and your habits from each search you perform and will gather details
about you from your previous activities like likes and social postings and present the
answers as per your preferences.
USER the owner of website is not the only one who is able to put content. Others
PARTICIPATION are able to place a content on their own by means of comments, reviews,
and evaluation.
LONG TAIL services that are offered on demand rather than on a one-time purchase.
This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent in the Internet, or a data plan that charges you for
the amount of bandwidth you used.
SOFTWARE AS A users will subscribe to a software only when needed rather than
SERVICE purchasing them.
Trends in ICT
Technology keeps rising and improving every time. The use of technology connects us
to the people around the globe and gives us current information on the trends in information
and communication. As what you have written in the activity above, it shows that social media
is mostly used by people and one of the current trends in information and communication
technology.
B. Social News – A website where user can post stories and are ranked based on
the popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark
C. Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images and others. Examples: Pinterest,
StumbleUpon, Dribble
D. Media Sharing – A website that allows you to share and store multimedia
files such as video, photos and music.
5
Examples: Instagram, YouTube, Flickr
F. Blogs and Forums – a discussion website that allows user to ask questions and
comments on a journal posted by an individual or group. Examples: Wordpress,
Blogger
3. Mobile Technologies – a technology used in cellular and other devices such netbook,
laptop,
tablet, smartphones and etc.
4. Assistive Media - A platform that assist people with disability. It will guide the
individual like
a blind person by using an audio recording.
The internet is the guiding technology of the Information Technology Age just as the
electrical engine was of the Industrial Age. In these times, more and more people are already
engaged in the use of technology. These people who are raised in a digital, media-saturated world
are called digital natives. No doubt, the Internet has been very useful to us but with the rise of
instant messaging, chat rooms, emails and social networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers, including exposure to sexual predators. Thus,
internet safety is always our primary concern.
Lesson Objectives
By the end of this lesson, you are expected to:
1. Consider one’s and others’ safety when sharing information using the
internet.
2. Apply internet online safety, security ethics and etiquette
standards and practice in the use of ICTs.
3. Determine and avoid the dangers of the Internet.
ONLINE SAFETY
The importance of internet plays a crucial part in human development. Life becomes
easy and comfortable because of this technology. Most of us are connected to the internet via
laptop, mobile phone, tablet, personal computer and other electronic gadgets. Behind this
technology there is a risk that everyone should be aware of. You could be at risk on scam,
bullying, and illegal activities if you will not take precautions in using internet. We need to keep
ourselves safe and secure whenever we use the internet. That is why it is very important to
know and learn the ways on how to be safe and secured online.
6
In the activity above you assessed yourself in online habits. Those habits might be
good or bad that you must be aware of. If you keep practicing those bad habits it might bring
you danger. Safety is the first thing you must consider in using internet.
Internet Risk
Identity Theft - It is a crime of stealing personal information for the purpose of assuming
that
person’s name or identity to make any form of transactions.
Cyber Stalking - A criminal practice where electronic communication is used to stalked or
harassed individual or group.
Sexting - The act of sending sexually explicit text messages, images, and videos.
Spoofing – it happens when someone or something pretends to be something else to
gain our
confidence, get access to our systems, steal data, steal money, or spread
malware.
INTERNET THREATS
Cybercrime Law - The Cybercrime Prevention Act of 2012, officially recorded as Republic Act
No. 10175, is a law in the Philippines that was approved on September 12, 2012. It aims to
address legal issues concerning online interactions and the Internet in the Philippines. Among the
cybercrime offenses included in the bill are cyber squatting, cybersex, child pornography, identity
theft, illegal access to data and libel.
Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:
Image from:https://twitter.com/Parkster00/status/
1246347088625045504
The Internet has made our lives easier especially in terms of doing research. By browsing
8
the internet, we can access limitless topics. Web-based catalogs are available in many libraries to
assist researchers in locating printed books, journals, government documents and other
materials. The biggest obstacle facing all researchers on the internet is how to effectively and
efficiently access the vast amount of information available (The Internet: Research Tools, 2013).
Lesson Objectives
At the end of the lesson, you will be a better user of search engines. In particular, you can
be more deeply aware of search techniques that will give results that are useful for your academic
and chosen career.
Indeed, Google might be our “friend” but using search engines for the sake of plain
information could actually lead you misinformed. In order to stay meaningfully informed, you
should start appreciating the use of the right combination of words or key phrases.
Popular Domains
Copyright Issues
9
There are millions of information that we can get from the internet. Some of this
information are free but others are not. They are protected by a copyright law.
What is Copyright?
Copyright is a protection given to the owner of the rights in an original work such as
books, musical works, films, paintings, and other works, and computer programs. This original
work is called intellectual property which is protected under Republic Act 8293 known as the
“Intellectual Property Code of the Philippines”.
Copyright Infringement
This happens when the copyrighted work is use by other person without permission of
the author or copyright holder. Any person who is infringing the right protected work would be
liable under the law. An example of this is the case of the media giant ABS CBN against the 21
private website operators. These private domains are illegal streaming portals that have been
providing free access to ABS-CBN content in the US and around the world. Because of these,
ABS-CBN will be awarded trademark damages in excess of $1 million against each of the 21
pirate website operators. Additional damages worth $30,000 to $90,000 will also be paid by six
of the defendants due to copyright infringement, with another $10,000 paid for cyber squatting
damages for its domain name, which is similar to an ABS-CBN registered trademark.
Fair Use
Research is important to the students and other people. Most of them rely on the
information that they can get online. Although this information is protected by a copyright law
but we can still use this information without permission in a limited way under certain condition
and purpose.
Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
Example of this is when you post a quote from a person in your Facebook wall. Include
the name of person who owns the quote in your post. Another example is when you copy
image from internet, give credit to the creator of image. The copied image should be use for
educational purpose not for commercial use.
In fair use, 5% of the content of reference can only be copied. If 20% or less of
reference copied, there must be a secondary use agreement and fee. And if 20% or more of
reference copied, it requires purchasing of creative work.
LESSON SUMMARY
The community online never stops upgrading. Before users of Web 1.0 can only read through the
content of the website, but now with the presence of Web 2.0 and Web 3.0 we can now create
our own profile and communicate online. However, you need to be careful while you are online
since there are possibilities that your identity or personal information might be stolen or your
personal files might be deleted by malicious software. So always bear in mind that you need to
“Think Before you Click”.
Romans 12:2
Do not be conformed to this world, but be
transformed by the renewal of your mind,
that by testing you may discern what is the
will of God, what is good and acceptable
and perfect.
10
Are you living your best life? Shifting your patterns and focus can change your life. That’s what this
verse is about renewing your mind, changing the way you think to create a better life for yourself and
a life that honors God.
The world and society have patterns or ways that lead to a broken life. These patterns are easy to fall
into and can be difficult to transform. The patterns, or routines, are often performed mindlessly,
without any consideration of our actions or their consequences; however, we are not stuck with them.
Same with this bible verse, we human are conformed in living with our desires of the flesh and the
desire of the eyes in the pride of life. Because of the new technology, we live far better from before.
We always pursuit for our happiness through these worldly things but we are reminded to not be
taken away with these things into sins and destructions. All our actions, whether it is good or bad has
consequences. It is up to us to do the right things and to help others to be lifted up not to dragged
them down. So we are asked to change how we think, to have our minds renewed so that we can
begin to understand God's will for our lives.
For the Information Sheets, you can keep it, so that you can study
your lesson anytime for your upcoming examination.
REFERENCES
Innovative Training Works, Inc. (2016). Empowerment technologies.-1st ed. – Manila: Rex Book
Store.
Peralta, A. (2014). Telling and re-telling the story of Jesus through English: An activity workbook
that makes religion the core of the curriculum. – Quezon City: Rex Crown
Publications, Inc.
Yuvienco, J. C. (2017). Empowerment technologies: Making small shifts towards a big difference
for Senior High School. – Quezon City: C & E Publishing, Inc.
https://pdfcoffee.com/empowerment-technology-shsq1mod1ict-in-the-context-of-global-
communicationver3-5-pdf-free.html
https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwi34bSN_L
T0AhUCM94KHckmAQwQFnoECBAQAQ&url=http%3A%2F%2Ffnhs.edu.ph%2Fwp-
content%2Fuploads
%2F2021%2F04%2FETech_Q1_M3.pdf&usg=AOvVaw1VKRFUujjTbpkCFS7DFwk-
https://en.wikipedia.org/wiki/Cybercrime_Prevention_Act_of_2012
11