0% found this document useful (0 votes)
26 views13 pages

1ST WK Empowerment

The document is an educational module for students at Oleras National High School in the Philippines, focusing on Information and Communications Technology (ICT) and its application in various contexts. It outlines performance standards, learning competencies, and activities related to online platforms, safety, security, and effective internet research. The module includes assessments and pre-tests to gauge students' understanding of ICT concepts and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views13 pages

1ST WK Empowerment

The document is an educational module for students at Oleras National High School in the Philippines, focusing on Information and Communications Technology (ICT) and its application in various contexts. It outlines performance standards, learning competencies, and activities related to online platforms, safety, security, and effective internet research. The module includes assessments and pre-tests to gauge students' understanding of ICT concepts and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Republic of the Philippines

Department of Education
DIVISION OF NORTHERN SAMAR
Laoang V District
OLERAS NATIONAL HIGH SCHOOL

EMPOWERMENT AND TECHNOLOGIES


11
(WEEK 1)

DO NOT WRITE ANYTHING ON


THIS MODULE

For academic related concern:


Mobile Phone: 0951-821-1521
Facebook: Dolor Ace
Performance Standard: Performance Standard: The learners shall be able to: at
the end of the 2-week period independently compose an insightful reflection paper on
the nature of ICT in the context of their lives, society, and professional tracks (Arts,
Tech Voc, Sports, Academic). Quarter 1 Week 1

Learning Competency 1: compare and contrast the nuances of varied online


platforms, sites, and content to best achieve specific class objectives or address
situational challenges

Learning Competency 2: apply online safety, security, ethics, and etiquette


standards and practice in the use of ICTs as it would relate to their specific
professional tracks

Learning Competency 3: use the Internet as a tool for credible research and
information gathering to best achieve specific class objectives or address situational

Quarter 1 – Week 1 ICT in the Context of Global Communication

: What is Information and Communications Technology?

Information and Communications Technology (ICT) often deals with the


use of different technologies such as mobile phones, telephones, computer, Internet,
and other devices, as well as software and applications to locate, save, send, and
manipulate information. Empowering ICT is important for its innovative uses impacts
our daily lives. It has affected our ways of communicating, made our lives more
convenient, and assisted countries towards their modernization plans.

Thus, there is a need to create a foundation of understanding in the world of


ICT.

WHAT I KNOW
You must be excited to flip over the pages and begin with the lessons. But
first, please answer the pre-test to measure what topics have you known so far.
Direction: Read each item carefully and choose the letter of the correct answer.
Encircle it.

1. What type of web page is classified as flat or stationary?


A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0
2. What web 2.0 feature allows users to subscribe to a data plan
that charges for the amount of time spent on the internet?
A. Folksonomy B. Long Tail C. User Participation D. Application
3. What is the name of the symbol that is used to classify and
categorize information?
A. Hashtag B. Question Mark C. Asterisk D. At sign

4. What specific type of social media allows you to connect with


other people?
A. Microblogging C. Media Sharing
B. Social Networks D. Social News

5. Twitter is an example of what specific type of social media?


A. Microblogging C. Media Sharing
B. Social Networks D. Social News

WHAT’S NEW SITES


Because of the wide capacity of Web 2.0, it has helped in creating dynamic online
platform sites. Online platform is a specially developed platform using Internet
technology. Online platforms have revolutionized access to any information. Online
platforms currently include, but are not limited to:
Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Media
Let us go through them one by one!
1. Presentation or Visualization Platform allows you
to present and share presentations, infographics and
videos with other people. It is used to communicate
information clearly and efficiently.
2. Cloud Computing Platform is also called as “The cloud.” It
is the practice of using a network of remote servers hosted
on the internet. Instead of using your computer’s hard drive,
you store and access your data and programs over the
Internet.
3. File Management Platform is used for the storing, naming,
sorting, and handling of computer files. Allows you to
convert and manage files without download in the software
tool.
4. Mapping Platform is a transformation taking the points of
one space into the points of the same or another space.
Uses GPS to detect location and used for navigation.
5. Social Media Platform is a computer-mediated tools that
allow large group of people to create, share or exchange
information, interest and the information shared can be in
the form of ideas, pictures, videos or anything that you want
to create and share to virtual communities. It can be in the
following platforms:

Social Networks. These sites allow you to connect


with other people with the same interests or
background.

Bookmarking Sites. These are sites that allow you


to store and manage links to various websites and
resources.

Social News. These are sites that allow users to post their
own news items or links to other news sources.

Media Sharing. These are sites that allow you to


upload and share media content like images,
music, and video. Media sharing sites can be
specific for video sharing, photo sharing, slide
sharing, social bookmarking, and gaming.

Microblogging. These are sites that focus on short


updates from the user. Those subscribed to the
user will be able to receive these updates. Posts
are brief that range typically from 140 – 200
characters.

Blogs and Forums. These are websites that allow


users to post their content. Other users can
comment on the said topic.

WHAT CAN I DO

ACTIVITY 1.1: Which Website Is It?


DIRECTIONS: Listed below are some of the platforms. Complete
the table below by providing name of website and a short
description using the internet. Write your answers on the space
provided in the table.
PLATFORMS NAMES OF WEBSITES DESCRIPTION
Presentation or
Visualization
Cloud
Computing
File
Management

Mapping

Social
Networks

Social News

Microblogging

Blogs and Forums

ASSESSMENT
Directions: Read each item carefully and choose the letter of the
correct answer. Encircle the letter of your choice.

1. What type of web provides a framework that allows data to be shared and reuse to
deliver web content specifically targeting the user?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D.Website

2. Which of the following is an example of sites under web


2.0?
A. Facebook B. YouTube C. Wikipedia D. All of the above

3. What type of web page is classified as flat or stationary?


A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0

4. Twitter statuses are only composed of a few characters. What


type of social media site does Twitter belong?
A. Micro blogging C. Social Networks
B. Media Sharing D. Bookmarking
Sites

For #’s 4-5, use the choices inside the box.


A. If only the FIRST statement is TRUE. C. If BOTH statements are TRUE.

B. If only the SECOND statement is TRUE. D. If BOTH statements are FALSE.

5. Social networks are sites that allow you to connect with other
people having the same interests. It allows you to share your
own news and other news from other sources.

WHAT I NEED TO KNOW


,

LESSON 2: Online Safety, Security and Netiquette

The internet is the guiding technology of the Information Technology Age just
as the electrical engine was of the Industrial Age. In these times, more and more
people are already engaged in the use of technology. These people who are raised in
a digital, media-saturated world are called digital natives. No doubt, the Internet has
been very useful to us but with the rise of instant messaging, chat rooms, emails and
social networking sites, it can also bring trouble - from cyberbullying to more serious
Internet dangers, including exposure to sexual predators. Thus, internet safety is
always our primary concern.

WHAT I KNOW
I bet you are ready to know if you have practiced online safety, aren’t you? But
before that, take time to answer the pre-test to gauge how much you know about the
lesson.

Direction: Read each item carefully and choose the letter of the correct answer.
Encircle your answer.

1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.

2. What is considered shouting over the Internet?

A. Screaming at your computer.


B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a
sentence.
D. Not answering a friend request on Facebook.

3. It is OK to forward or post an email message that you received if


__________
A. the message is typed in all capitals.
B. the author of the message has given you permission to
forward or post it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as
confidential.

4. What is a flame in cyberspace?


A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion
or criticism.
5. Knowledge and understanding of netiquette is useful because
___________
A. it will help you create a positive impression on those you
meet in cyberspace.
B. it explains some of the technical limitations of online
communications.
C. it explains the conventions already being used by millions
of cybernauts.
D. All of the above.
WHAT IS IT

Lesson 2.1: Online Safety, Security and Netiquette

Online safety refers to the practices and precautions that should be observed
Netiquette is a combination of the words network and etiquette. It is a set of rules
for behaving properly online.

WHAT CAN I DO
A ACTIVITY 2.2: Can You Keep It Private?
DIRECTIONS: Choose the most appropriate thing
to do in the following situation. Encircle your answer.
1. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels
or places.
D. Tell no one. Vacations are for getting away.

2. Do you have the same passwords for all your accounts?


A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.

C. I keep it simple. I don’t have any passwords.


D. I have two similar passwords that I alternately use for all my
accounts.
3. Choose which image below describes how you feel about
sharing your password with your boyfriend/ girlfriend?
.

C.
A.
D.

B.

4.Yourparentsbought
you your first
cellphone. How will
you share your
cellphone number?

A. Do not share your cellphone number to anyone.


B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
5. Your social media friends list should only be composed of
______________.
A. Your favorite brands. C. Anyone who sends you a friend
request
B. Foreigners D. Family and friends

ASSESSMENT
Directions: Read each item carefully and choose the letter of the
correct answer. Encircle the letter of your choice.

1. What type of malicious program is designed to replicate itself and


transfer from one computer to another either through the internet
or local networks or data storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

2. What harmful online programs are designed to send you


advertisements, mostly pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

3. What harmful online program is used to record keystrokes done


by users to steal passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

4. What is ransomware based on?


A. Fear of hackers C. Fear of spyware
B. Fear of the Internet D. Fear of losing important
files

5. Which of the following is an example of a “phishing” attack?


A. Sending someone an email that contains a malicious
link that is disguised to look like an email from
someone reliable.
B. Creating a fake website that looks nearly identical to a
real website in order to trick users into entering their
login information.
C. Sending someone a text message looks like a
notification that the person has won a contest.
D. Sending someone an email that records their
keystroke activities while using their computers.
WHAT I NEED TO KNOW
Lesson 3: Effective Internet Research

The Internet has made our lives easier especially in terms


of doing research. By browsing the internet, we can access limitless topics. Web-based
catalogs are available in many libraries to assist researchers in locating printed books,
journals, government documents and other materials. The biggest obstacle facing all
researchers on the internet is how to effectively and efficiently access the vast amount
of information available (The Internet: Research Tools, 2013).

WHAT I KNOW
Before we take on another journey towards exploring the great capacity of the
internet into research, kindly take time to answer the following questions for your
pretest.

Direction: Read each item carefully and choose the letter of the correct answer by
encircling it.
1. What is the Boolean logic technique used for?
A. Narrowing, broadening or eliminating a search term.
B. Using a robot to do instant research.
C. Searching several search engines at the same time.
D. Searching the infinite information from the internet.

2. http://www.avg.com/en/signal/what-is-spyware is an example of?


A. Access code B. Directory C. Server D. URL
3. Which of the following is a search engine?
A. Netscape C. Elsevier
B. Yahoo D. Macromedia Flash

4. Which of the following is NOT an example of a domain?


A. .gov B. .com C. .npr D. .edu
5. What are the three Boolean logic search operators?
A. FROM, TO, WHOM C. AND, OR, BUT
B. AND, OR, NOT D. SEARCH, KEYWORD

Activity 3.1: Evaluating Websites: Checklist


This activity is adapted from the University of Maryland: Evaluating Web Sites: A
Checklist www.lib.umd.edu/tl/guides/evaluating-checklist Directions:
1. Using the Internet, research on topics under CoVid-19 in the
Philippines.
2. Read through the checklist and answer each question in your space provided.
3. Attach a printout of the web site you are evaluating and paste in a short bond
paper:

Print out of the website

1. What is the URL or web address of the web site you are evaluating?
http://_____________________________________________________
2. What is the title of the web site?
____________________________________

AUTHORITY AND ACCURACY


I couldn’t tell The author is:

_______________________________________

Who is the author of the web site?

What authorship clues did the URL (web address) provide? Check all that
apply:

company (.com) country-specific site (e.g., .uk)

non-profit organization (.org) military site (.mil)

academic institution (.edu) network of computer

(.net) government agency (.gov) other? Please

describe: personal web page (e.g.,

www.jamieoliver.com)
ASSESSMENT

Website evaluation is an important skill that everyone should practice and master
through time. It is always important to learn which information are relevant and reliable
to be able to avoid misinformation and be a victim of fake news.

Direction: Read each item carefully and choose the letter of the correct
answer. Encircle the letter of your choice.

1. What happens when a phrase or sentence is placed inside


quotation marks when doing research?
A. Will only return items that have both terms.
B. Will search for words that are together and in order
C. Will return items that exclude a term
D. Will return items that have either of the terms

2. What is a URL?
A. A computer software program
B. An acronym for Unlimited Resources for Learning
C. The address of a document or "page" on the World
Wide Web
D. A search engine

3. What are the three main search expressions, or operators,


recognized by Boolean logic?
A. and, or, not C. and, or, but
B. from, to, whom D. search, keyword, text

4. How do you evaluate a web page?

A. You confirm that the author or site an authority on the


subject.
B. You check to see if the author has been objective.
C. You check to see if the information is current.
D. You do as many of the above possible.

5. An article that only one point of view or omits facts is biased.


A. True B. False

You might also like