0% found this document useful (0 votes)
323 views38 pages

Media Information Literacy11 - 12 Q2 M1 W1 2

Uploaded by

Khevin Casio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
323 views38 pages

Media Information Literacy11 - 12 Q2 M1 W1 2

Uploaded by

Khevin Casio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

11/12

Module 1
Quarter 2-Week 1 & 2

i
Media in Information Literacy - Grade 11/12
Quarter 2 – Module 1 Week 1-2: Media Trends

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the government of the Philippines. However, prior approval of the government agency
or office wherein the work is created shall be necessary for exploration of such work for
profit. Such agency or office may, among other things, impose as a condition the
payment of royalties.

Borrowed materials (i.e. songs, stories, poems, pictures, photos, brand names,
trademarks, etc. are owned by the respective copyright holders. Every effort has been
exerted to locate and seek permission to us these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over
them.

Development Team of the Module


Writer’s Name : Jorich Lyn E. Sanchez
Editor’s Name : Irene T. Pilapil

Reviewer’s Name : Irene T. Pilapil

Illustrator’s Name : Rodetha P. Catadman

Layout Artist : Jorich Lyn E. Sanchez

Plagiarism Detector Software: [Link]


Grammar Software : [Link]
Management Team:
Schools Division Superintendent : Wilfreda D. Bongalos, PhD, CESO V
Assistant Schools Division Superintendent: Marcelita S. Dignos, Ed.D, CESE
Curriculum Implementation Division Chief : Oliver M. Tuburan, Ed.D.
EPSVR – English : Irene T. Pilapil
EPSVR - LRMDS : Teresita Bandolon
ADM Coordinator : Marigold Cardente

Printed in the Philippines by Department of Education – Division of Lapu-Lapu City


Department of Education – Region VII Central Visayas
Lapu-Lapu City Division
Office Address: B.M. Dimataga St., Lapu-Lapu
City Tel No. (032) 410-4525
Email Address: [Link]@[Link]

ii
11/12

Media and Information


Literacy

Second Quarter – Week 1 & 2

Opportunities, Challenges and Power of Media and Information


Current and Future Trends of Media and Information

iii
Introductory Message
For the facilitator:

Welcome to Media Information Technology

At the end of this module, you should be able to:


1. Evaluate the opportunities and challenges in media and information.
2. Examine the possible threats of the Internet to banking through
phishing and cybercrime.
3. Cites recent examples of the power of media and information to affect
change.
4. Evaluate the current and future trends of media and information.

This module was collaboratively designed, developed and reviewed by


educators both from public and private institutions to assist you, the teacher
or facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social, and economic
constraints in schooling.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the
body of the module:

Notes to the Teacher


This contains helpful tips or strategies
that will help you in guiding the learners.
Notes to the Teacher

This contains helpful tips or strategies that will help you in guiding the
learners.

As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the
module.

iv
For the learner:

Welcome to Media Information Technology

At the end of this module, you should be able to:


1. Evaluate the opportunities and challenges in media and information.
2. Examine the possible threats of the Internet to banking through
phishing and cybercrime.
3. Cites recent examples of the power of media and information to affect
change.
4. Evaluate the current and future trends of media and
information.

The hand is one of the most symbolized part of the human body. It is often
used to depict skill, action, and purpose. Through our hands we may learn,
create, and accomplish. Hence, the hand in this learning resource signifies
that you as a learner is capable and empowered to successfully achieve the
relevant competencies and skills at your own pace and time. Your academic
success lies in your own hands!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.

This learners’ module is mapped and aligned with the DepEd SHS Curriculum
and the Most Essential Learning Competencies for of Oral Communication in
Context. It contains notes, assessments, performance tasks and learning
activities.

This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the


skills or competencies
you are expected to learn in the
module.

What I Know This part includes an activity


that aims to check what you
already know about the
lesson to take. If you get all
the answers correct (100%),

v
you may decide to skip this
module.

What’s In This is a brief drill or review to


help you link the current lesson
with the previous one.

What’s New In this portion, the new lesson


will make you demonstrates
understanding of Media and
Information Literacy (MIL) and
MIL related concepts.

What is It This section provides a


briefdiscussion of the lesson. This
aims to help you discover and
understand new concepts and
skills.

What’s More This comprises activities for


independent practice to
solidify your understanding
and skills of the topic. You
may check the answers to the
exercises using the Answer
Key at the end of the module.

What I have Learned This include (High Order


Thinking Skills)HOTS
questions for you to be
answered into process what
you learned from the lesson.

What I can Do This section provides an activity


which will help you transfer your
new knowledge or skill into real
life situations or concerns.

Assessment This is a task which aims to


evaluate your level of mastery in
achieving the learning
competency.

vi
Additional Activities In this portion, another
activity will be given to you to
enrich your knowledge or skill
of the lesson learned. This
also tends retention of learned
concepts.

AnswerKey This contains answers to all


activities in this module.

At the end of this module you will also find:

References This is a list of all sources used in


developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.

2. Do not forget to answer What I Know before moving on to the other activities
included in the module.

3. Read the instruction carefully before doing each task.

4. Observe honesty and integrity in doing the tasks and checking your
answers.

5. Finish the task at hand before proceeding to the next.

6. Return this module to your teacher/facilitator once you are through with
it.

If you encounter any difficulty in answering the tasks in this module, do not hesitate
to consult your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do i

vii
At the end of this module, you should be able to:

• Evaluate the opportunities and challenges in media and information


(MIL11/12OCPIIIh24);
• Examine the possible threats of the Internet to banking through phishing
and cybercrime (MIL11/12OCP-IIIh24);
• Cites recent examples of the power of media and information to affect
change (MIL11/12OCP-IIIh25);
• Evaluate the current and future trends of media and information
(MIL11/12CFT-IIIi-26);
• Describe what is massive open on-line course (MIL11/12CFT-IIIi-26);
• Produce a prototype about the future media innovation (MIL11/12CFT-IIIi-
27); and
• Synthesizes the overall knowledge about media and information with skills
for producing a prototype of what the learners think is a future media
innovation (MIL11/12CFT-IIIi-28).

1
Multiple Choice: Select the letter of the best answer from among the given choices.

1. It is a cybercrime in which the targets are contacted by email, telephone


or text message.
A. Phishing B. Cyberbullying
C. Cybercrime D. Hacking

2. It is the program which attach themselves to the computer or file and


then circulate themselves to other files and to other components on a
network.
A. E-mail Spoofing C. Cyber Stalking
B. Virus D. Hacking

3. It is category of technology that can be worn by a consumer and often


include tracking for information.
A. Wearable technology C. Smart Watch
B. Smart phone D. MOOCs

4. It is an open access and interactive way to facilitate students’ online


study.
A. Massive Open Online Course C. 4G
B. Holography D. Fitbit charge

5. A form of technology-mediated communication that enables the user of


a mobile device to communicate with someone in a different location.
A. Telephone C. Mobile Phone
B. Laptop D. Mobile Communication

6. It is online harassment and online abuse it involves following a person’s


movement across the internet by posting threatening messages to the
victim.
A. Hacking C. Virus
B. Cyber Stalking D. E-mail Spoofing

7. A person who breaks in or trespasses a computer system and gaining


unauthorized access to the data.
A. Hacker B. TV Broadcaster
B. Call Center Agent D. Radio DJ

2
8. This is a mechanical robot having the characteristics that can-do things
like humans.
A. 5G C. Hologram
B. Smart Glass D. Avatar

9. It is a wireless handheld device that allows users to make and receive


calls and to send text messages, among other features.
A. Computer C. Mobile Phone
B. Telephone D. Laptop

10. A technology that will calculate and monitor your heart rate.
A. Misfit Phase Hybrid C. Fitbit Charge 2
B. Heart Rate Monitoring Device D. Avatar

Lesson 1: Opportunities, Challenges and Power of


Media and Information
Activity 1: Unlocking Words
Before we will discuss the opportunities and challenges, and power of media
and information let us begin our lesson with this activity. This activity will
help you to understand our topic today. Let us start!
The name of the activity is WORD CLOUD GUESSING! In this activity you need
to guess and arrange the scrambled letters to form a new word.

3
Process Questions

1. How do you find the activity?


2. What do you think is the connection of the activity in our lesson?

Answering the activity, let us now discuss and explore the opportunities,
challenges and power of media and information. Let’s start!

In the world of media and information there are a lot of opportunities and
challenges. What is the meaning of the word’s opportunity and challenges?
Below is the meaning of the two words. Take a look!

Opportunity. A time or set of Challenge. A challenge is something


circumstances that makes it new and difficult which requires
possible to do something. great effort and determination.
Source: English Oxford living Source:
dictionaries 2018. What Is [Link]
opportunity? Acces at: http:// dictionary/english/challenge
[Link]

4
So, here are the opportunity and challenges in media and information. First,
we will take a look in the opportunity.
Television Broadcaster Mobile Communication
A television A means of technologymediated
presenter presents communication that allows the user of a
information relating to subjects mobile device to connect with someone else
such as news and sports, and at a different location, such as texting from
may also be responsible for a cell phone and sending email from a
planning the creative content of computer device equipped with WiFi (e.g.
a series. Such experts will work laptop, iPad).
with
news programs and help to discuss A mobile
phone important topics in reporting, as is a wireless
portable well as provide comments on device that
allows users, various events. to make and receive
calls,
They might also formulate and send text messages.
interview questions, read scripts, The first mobile
phone and reveal details
about the show,
generation would only be
such as commercial
breaks. able to make and
receive
calls. Today’s
mobile
Example: TV broadcaster phones are packed with many additional features
Like web browsers, games, cameras, video players and even navigation
systems.

Source: [Link] [Link]


free-vector/podcast- vector/instagram-conceptwith-
conceptillustration_6203440.htm#p smartphone_2584202.htm#pa
age=1& ge=1&quer y=mobile
query=broadcaster&position=5 communication&position=37

5
So, we have two opportunities in media and information, first television
broadcaster and mobile communication. But have you wondered, what makes
television broadcaster and mobile communication an opportunity in media
and information.?
Let me share it to you, media plays a big role in sharing and disseminating
information. Through media, people now a day’s can easily catch up news and
be updated because of television broadcaster. In the other side, mobile
communication can make our life easier. No need to write a letter if you want
to ask allowance to your mom instead just text and call. How amazing isn’t?
Now, take a pause for a while, think in your own understanding, what is the
reason why television broadcaster and mobile communication is an
opportunity and don’t forget to share it to your friends. Share it!
And now let’s move on to the next topic. The next topic is the challenges in
media and information. Here are the two challenges, take a look!

Cybercrime
Cybercrime is defined as a crime in which a computer is the object of the
crime (hacking, phishing, spamming) or is used as a tool to commit an offense
(child pornography, hate crimes). Cybercriminals may use computer
technology to access personal information, business trade secrets or use the
internet for exploitative or malicious purposes.
Source: Technopedia . 2018. Cybercrime Access at:
[Link]

[Link]
[Link]
vector/cyber-thief_4717043. htm#page=1&query=cybercrime&position=0
htm#page=1&query=cybercrime&position=10

Do you know there are four different types of cybercrime? Here are the four
types of cybercrime.

6
Source: LinkedIn. June 22, 2017. Different Types of Cybercrime Access at:
[Link]
different-types-cyber-crime-avanzo-
net

Hacking is the most common type of


cybercrime committed across the
world. Hacking is a crime which
entails cracking systems and gaining
unauthorized access to the data
stored in them. Hacker is a person
who breaks in to a computer system.

Virus dissemination. Virus is the


programs which attach themselves
to the computer or file and then
circulate themselves to other files
and to other components on a
network. They usually affect the data
on the computer, either by altering or
deleting it.
Cyber stalking is use of internet or
other electronic means to stalk
someone. It is online harassment
and online abuse. Mostly cyber
stalking involves following a person’s
movement across the internet by
posting threatening messages to the
victim or by entering the chat rooms
frequented by the victim or by
constantly bombarding the victim
with the e-mails etc.

E-mail Spoofing. An e-mail that


appears to originate from one source
but actually has been sent from
another source. This can also be
termed as e-mail forging.

7
Phishing
Phishing is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to
lure individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
Source: [Link]. 2018. What Is Phishing? Accessed at:
[Link]

[Link]
phishing-vector-banner-
webdesign_4341984.htm#page=1&query=phishing&position=1
After you read about the two How about cybercrime? Cybercrime is
challenges, let us dig deeper what another problem that we are facing today.
makes phishing and cybercrime a Like phishing, the hacker can access your
challenge in media and information. information’s over the internet. You
Here is the answer. should always remember your personal
Phishing is an illegal action or crime. information’s are considered confidential.
Where in the hacker will hack or get all Always remember, your
your information’s over the internet. personal information’s are always
For example, your bank account confidential. No sharing and posting
details, your personal information’s and personal information’s over the internet.
even your credit card details. So, for
you to be safe in phishing avoid posting For the last topic, let me show you the
your personal information’s over the examples of the power of media and
internet. information to affect change.

7
Now, you have already knowledge about Opportunities, Challenges, and
Power of Media and Information. Please don’t forget to share to your friends
and family about our topic for the day. Share it!

Activity 2: Matching Type: Match the column A to column B. Choose the best
answer.

8
Activity 3: For Pics One Word
Directions:
1. You will be shown four photographs. These four photographs each
have something in common.
2. Below the pictures, you will see blank spaces indicating how many
letters are in the answer.
3. Guess what the word is and write your answer in the blank space.
4. Enjoy the activity!

Images from [Link]

—————————————

9
Images from [Link]

———————————

Images from [Link]

————————————

10
Images from [Link]

——————— —

Images from [Link]

——————— —

11
Activity 4:
Instructions: Search up, down, forward, backward, and on the diagonal to
find the hidden words. Hidden words to find: hacking, mobile phone,
phishing, opportunity, challenge, TV broadcaster, cybercrime, cyberstalking,
cybercriminal, hacker, virus, e-mail forging, mobile communication, internet
and media.

12
Evaluation of Learning: Case Analysis
For your performance task. Make a mind mapping about our topic of the day.
A mind map is a diagram used to visually organized information and it shows
relationship to the topic. So, are you ready? Good luck!

13
Lesson 2: Current and Future Trends of Media
and Information

Activity 1: Unlocking Words


Hi there! How are you today? We are now in lesson 9, in this lesson we will
talk about
the current and future trends of media and information.
But just hold on first, before we will discuss I want you to answer our
motivational activity. This is to help you discover and understand our topic.
Are you ready? Let’s rock it!
The name of the activity is WORD RIDDLE. Riddle is something like puzzle, in
that clues properly put together create a mental picture that gives the answer
to the riddle. You only must understand the statement and guess. Here is the
example. Take a look!

For example:
I am a small animal. I am grey. I like cheese. I rhyme with house. I’m a .
The answer of this riddle is mouse. Now let’s start! Analyze the statement
very well. You can do it!

1. Look at the numbers on my face you won’t find 13 in any place. What
am I?
2. You can play with it at night. It can give you text and call even
information that you want. Who am I?
3. I am a word. My name starts in letter I and ends in letter T. I am useful
in opening website like google, yahoo and Facebook. Can you guess me?
4. You can take me wherever you go. I can take all your precious moments
with your friends and family. I can take video too. Who am I?
5. I am something in your house in the living room I am seen. When you
sit on the sofa, you can watch things on my widescreen. Can you guess
me?

Thank you for answering the first activity, for that give yourself 5 claps for a
job well done! Now let’s process the activity. I want you to answer the following
process questions.

14
Process Questions:
1. How do you find the activity?
2. What do you think is the connection of this activity to our lesson?
3. Aside from your answer, can you enumerate other example of
technology?

Today, we will discuss about the current and future trends of media and
information. I will show you some examples of current technologies and even
in the future.
Before we will start, I want you to think a technology that will help you in the
future and write it in the piece of paper. Describe what is the uses of that
technology and how it works. Just keep the paper.
Now, let’s move on to our discussion. We will evaluate current trends in media
and information and how it will affect/how they affect individuals and the
society.
So, here are the examples of current trends in media and information. Let’s
start!

Wearable technology (also called wearable gadgets) is a category of


technology devices that can be worn by a consumer and often include tracking
information related to health and fitness. Other wearable tech gadgets include
devices that have small motion sensors to take photos and sync with your
mobile devices.
Source: Webopedia . 2018. Wearable Technology Access at:
[Link]
[Link] extending the capabilities of the
wearer’s smartphone to the watch
Smartwatch is a wearable computing Source: Techtarget 2018. Smart
device that closely resembles a Watch Access at:
wristwatch or other time-keeping [Link]
device. In addition to telling time, [Link]/
many smartwatches are Bluetooth- definition/smartwatch
capable. The watch becomes, in
effect, a wireless Bluetooth adaptor
capable of

15
without removing your phone
from a pocket or bag. It makes
your life simpler, and saves
time.
2. Battery Life. A huge,
highresolution monitor is often
one of the biggest drains in
battery life for your
smartphone. Use smartwatch
this reduces the amount of
time, and it can have a
[Link] significant impact on battery
/four-flat-watches_900835. life.
htm#page=1&query=smartwatch&po
sition=5 3. Music. Most smartwatches
Pratical Uses of Smartwatch come with a music player
feature in them, enabling you
1. Notifications. One of the main to listen to music in your
reasons you would buy one is pocket on the phone. For
a Smartwatch displaying example, if a music track
notifications. It’s invaluableto comes on that you don not
have messages sent to your particularly like, then you can
wrist and to be able to simply hit ‘next’ on your
recognize their significance smartwatch.
Smartwatch is not only for checking time and date. Today, you can use
smartwatch for checking your email, if you have a text message or even a call.
Let us dig deeper, the following are some examples of wearable technology.
A Smartphone is a cellular phone with an embedded computer and other
non-
telephone-related features such as an operating system, web browsing, and
the ability to run software applications.
Cellphone versus Smart Phone
Source: Techtarget 2018. Smart Phones Access
at: [Link]

Cellphone is simply a telephone A smartphone has


that doesn’t need a landline more advanced
connection. It enables the user to features, including
make and receive phone calls. web browsing, software
Some cellphones also offer text applications and a mobile OS. In
messaging. turn, a smartphone also offers
capabilities such as support for
biometrics, video chatting, digital
assistants and much more.

16
Mind Mapping

The third wearable technology is fitness tracker. This technology will tell you
how fit you are. Take a look!
Fitness tracker is the best way to monitor your movement and health with
unrivaled accuracy and effortlessness. A wrist-worn device that can detect
some combination of walking steps, running distance, heart rate, sleep
patterns and swimming laps. Fitness bands interact via Bluetooth with an
app in a mobile device that configures the device and downloads the wearer’s
activity data. Below are the list of the best fitness tracker.
Source: PC 2018. Fitness Tracker Access at:
[Link]

17
Fitbit Charge. This watch is
Heart Rate Monitoring Device. A technology that good for exercise. It can
will calculate and monitor your heart rate. count your running time
and the distance.

[Link]
premium-vector/ fitness-
counter-phone-run-app-
wrist-
bandbracelet_5599335.htm

[Link]
photo/youngcientific-caucasian-man-isolated-
pointing-templewith-finger-thinking-focused-
task_6557919.
htm#page=2&query=smart+glass&position=

Misfit Phase Hybrid. This watch can count your Smartglass. This smart glass
steps and your heart rate. can collect
information’s from external
and internal. You can
listen to music too while
searching informations

[Link]
vector/flatsmartwatchset_841814.htm#page=
1&query=sports watch&position=10

18
Now, let us explore the future technologies. Here are the following future technologies,let’s take a look!

5G Smartphone and Network. 5G is the fifth Hologram. It is a pattern of interference


generation of internet speed. This is the new produced by a split coherent beam.
fastest speed of internet connection. The
successor of 4G. [Link]

[Link]
connection-mock-up_6310422.
htm#page=1&query=5G Network&position=1

Avatars, Surrogates, Robotic.


Now you already know the different examples of
current and future trends of media and
information. Always remember that the goal of
these technologies is to have an easy
understanding of information. Example, if you
want to know your heart rate you use heart rate
monitoring device. How amazing isn’t?
Before we will continue
our discussion, I want you to pause for
a while. Get some coffee or juice for you to feel
more relax as we discuss about the MOOC or
the Massive Open Online Course. Are you
ready? Let’s start.

This is a mechanical robot. It is having the So, what is MOOC or Massive Open Online
characteristics of a robot. They can do things like Course?
humans.

[Link]
vector/futuristicholographic-infographic-element-
collection_4798373. htm#page=1&query=hologram
&position=1

19
Mind Mapping: Advantages of MOOC

20
Explanation:
An e-learning program intended to cater students coming from different parts
of the world. The word MOOC was coined in 2008 by Dave Cormier. A MOOC
may be patterned on a college or university course or may be less structured.
Not all MOOCs offer academic credits when you finish a course such as
diploma or certificate although it may be patterned on a college or university
course. With easier access to media like streaming and blogging sites, most
MOOCs are less structured, but they provide education that will help students
acquire certification, employment or proceed to other studies.

Now, are you ready to answer our activities? Let’s do it!

Activity 3: Modified True or False


Write MIL if the statement is TRUE. Otherwise, change the underline word/s
with the correct answer and choose your answer in the box.
1. Wearable technology also called wearable gadgets is a category
of technology devices that can be worn by a consumer and often include
tracking information related to health and fitness.
2. A smartwatch is a wearable computing device that closely
resembles a wristwatch or other time-keeping device.
3. A smartwatch is a wearable computing device that closely
resembles a wristwatch or other time-keeping device.
4. 5G is the fourth generation of cellular mobile communications.
5. smartphone has more advanced features, including web
browsing, hardware
applications and a mobile OS.
6. A massive open online course (MOOC) is an offline course that
has open access and interactive participation by means of the Web.
7. Smart glasses may collect information from internal or external
sensors.
8. A fitness tracker is the perfect way to monitor your activity and
health effortlessly and with unmatched accuracy.
9. Fitness tracker interact via Bluetooth with an app in a mobile
device that configures the device and downloads the wearer’s activity
data.
10. A smartphone has more advanced features, including web
browsing, software applications and a mobile OS.

Activity 4: Connect Me
In this activity, you need to connect the image with its corresponding name. Write the
letter of your choice.

21
1. 2.

3. 4.

5.

6.

7.
8.

9.
10.

Images from [Link]

A. Holography B. 5G C. Smart Watch

D. Heart Rate Device E. Smart Phone F. Avatars

G. Smart Glass H. Fitbit Charge 2 I. Misfit Phase Hybrid


J. 4G

22
Activity 5: Performace Task
My Future Technology Prototype.
Produce a prototype about the future media
innovation. In this activity you need to draw
your own future technology prototype or model.
A technology that will help you in the future.
For example, agricultural robot a robot that
will help the farmers to harvest, planting seeds,
weed control and even soil analysis.
Now, it’s your turn to create your own
prototype. Don’t forget to write a short
Image Sourece: [Link]
description and the uses of your prototype Agricultural_robot
model and use the format below. Think a better and useful
future technology.

My Future Prototype

My Future Prototype Rubrics

Creativity (10 points) Clarity (20 points) Relevance (20 points)

23
Assessment: (Post-Test)
Multiple Choice. Answer the question that follows. Choose the best answer from among the given choices.
1. This is a mechanical robot having the characteristics that do can things like humans.
A.5G C. Hologram
B. Smart Glass D. Avatar
2. It is category of technology that can be worn by a consumer and often include tracking
for information.
A. Wearable technology C. Smart Watch
B. Smart phone D. MOOCs
3. A technology that will calculate and monitor your heart rate.
A. Misfit Phase Hybrid C. Fitbit Charge 2
B. Heart Rate Monitoring Device D. Avatar
4. A form of technology-mediated communication that enables the user of a mobile
device to communicate with someone in a different location.
A. Telephone C. Mobile Phone
B. Laptop D. Mobile Communication
5. It is an open access and interactive way to facilitate students’ online study.
A. Massive Open Online Course C. 4G
B. Holography D. Fitbit charge
6. It is a cybercrime in which a target or targets are contacted by email, telephone or
text message by someone.
A. Phishing C. Cybercrime
B. Cyberbullying D. Hacking
7. It is the program which attach themselves to the computer or file and then circulate
themselves to other files and to other components on a network.
A. E-mail Spoofing C. Cyber Stalking
B. Virus D. Hacking
8. It is online harassment and online abuse it involves following a person’s movement
across the internet by posting threatening messages to the victim.

A. Hacking C. Virus
B. Cyber Stalking D. E-mail Spoofing
9. A person who breaks in or trespasses a computer system and gaining unauthorized
access to the data.

A. Hacker C. TV Broadcaster
B. Call Center Agent D. Radio DJ
10. It is a wireless handheld device that allows users to make and receive calls and to
send text messages, among other features.

A. Computer C. Mobile Phone


B. Telephone D. Laptop

24
Pre-Test Lesson 1 Lesson 1
Unlocking Words Activity 1: Matching Type
1 Cybercrime 1 .A
1. A
I . Virus 2 .K
2. 3B Mobile Phone 3 .J
3. A
4 Phishing 4 .E
4. A
5 .G
5. D
6 .I
6. B Lesson 1 7 .H
7. A Activity 2: Four Pics One Word 8 .F
81 D TV Broadcaster 9 .D
9. 2C Mobile Phone 10 . B
10. @
Cybercrime
4 Phishing
5 Computer

Lesson 1 Lesson 2
Activity 3: Word Puzzle Activity 1: Complete Me
1. Hacking 1. A mobile browsing
2. Mobile Phone 2. Unified Messaging
3. Phishing 3. Touch Screen
4. Opportunity 4. Gaming
5. Challenge 5. Internet Connectivity
6. TV Broadcaster 6. Digital camera with video capability
7. Cybercrime
8. Cyberstalking
9. Cybercriminal
10. Hacker
11. Virus
12. E-mail Forging
13. Mobile Communication
14. Internet
15. Media
Lesson 2 Lesson 2
Activity 2: Modified True or False Activity 3: Connect Me
1. T 1. E. Smart Phone
2. T 2. C. Smart Watch
3. T 3. G. Smart Glass
4. Fifth 4. F. Avatars
5. Software Application 5. D. Heart Rate Device
6. Online Course 6. E. Smart Phone
7. F 7. I. Misfit Phase Hybrid
8. T 8. H. Fitbit Charge 2
9. Fitness Bands 9. B. 5G
10. T 10. A. Holography

Post-Test

1. D
2. A
3. B
4. D
5. A
6. A
7. B
8. B
9. A
10. C
Lesson 1
Activity 5: Synthesizing your Learning
Answers may vary, as this is a personal inventory. )

Lesson 2
Activity 1: Situational Simulation
Possible answers only. Response may vary. )
1. What is your stand on the Reproductive Health Bill?
2. How do you address the need for more information advocacy on the Ecological
Solid Waste Management?
3. Where will this city be 4 years from now?
4. What is your leadership doing on the need for housing relocation of our urban
illegal settlers?
5. How do you alleviate traffic congestion in the city?

Lesson 2
Activity 2: Social Media Scenario
Possible answers )

Information needs The situation of the parties involved in the video, including but
What information do you not limited to the bully, the victim, the school administrators, the
need?I classmates. the Darents. and the first-hand witnesses

News sites, First-hand Sources of Information


Sources of information
Where will vou oet them? I

Access to the information Web Browsing, interview and or communicate intent to the
How will vou access them? I Darties directlv involved

Evaluate information
How will you check the Check credibility of websites, do background check of the
oualitv of information?l sources of information

Organize information Recordings of interviews and other means of correspondence


How will you organize and
store them?I

Communicate information Post on social media account, narratives, etc.


How will you create and
communicate them?I
References
[Link]. “How Can I Become a TV Broadcaster”. Accessed at January 17, 2020,
[Link]
igi-global.”Mobile Communication”. Accessed at January 17, 2020,
[Link]
techopedia.” What does Mobile Phone mean?” Accesed at January 17,2020,https://
[Link]/definition/2955/mobile-phone
techopedia. “ What does Cybercrime mean?” Accessed at January 17,2020, https://
[Link]/definition/2387/cybercrime
[Link].” What is Phishing”. Accessed at January 17,2020, [Link]
org/what-is-phishing
Vangie, Beal. “Wearable Technology”. Access at January 17,2020, [Link]
[Link]/TERM/W/wearable_technology.html
Margareth , Rouse . “Smart Watch”. Access at January 16, 2020, https://
[Link]/definition/smartwatch
Margareth , Rouse . “Smartphone”. Access at January 16, 2020, https://
[Link]/definition/smartphone
James, Peckman. “ Best fitness tracker 2020:the top 10 activity bands on the planet”. Accessed
January 17,
2020.[Link] 1277905
PC encyclopedia. “fitness tracker”. Accesed at January 16, 2020 , [Link]
com/encyclopedia/term/67469/fitness-tracker
Adam, Birkett. “fitbit”. Acceseed at January 17, 2020, [Link]
QRWAdBCqysc
Rozalynn S. Frazier. “17 Best Fitness Tracker” . Accessed at January 17, 2020. https://
[Link]/health/gallery/0,,20929976,[Link]?slide=407559#40755
Wikipedia.”Smartglasses”. Accessed at January 17, 2020, [Link]
wiki/Smartglasses
Terri, Briseno. “10 Futurist Predixtions in the world of Technology”. Accessed at January 17, 2020.
[Link] futurist-predictionsin-the-world-of-
[Link]
techopedia.” Massive Open Online Course”. Accessed at January 17, 2020, https://
[Link]/definition/29260/massive-open-online-course-mooc

For inquiries or feedback, please write or call:

Division of Lapu-Lapu City


Department of Education
B.M. Dimataga St., Lapu-Lapu City
Tel #: (032) 420-4525
Email: [Link]@[Link]

28

You might also like