Republic of the Philippines
Department of Education
DIVISION OF NORTHERN SAMAR
Laoang V District
OLERAS NATIONAL HIGH SCHOOL
EMPOWERMENT AND TECHNOLOGIES
11
(WEEK 1)
DO NOT WRITE ANYTHING ON
THIS MODULE
For academic related concern:
Mobile Phone: 0951-821-1521
Facebook: Dolor Ace
Performance Standard: Performance Standard: The learners shall be able to: at
the end of the 2-week period independently compose an insightful reflection paper on
the nature of ICT in the context of their lives, society, and professional tracks (Arts,
Tech Voc, Sports, Academic). Quarter 1 Week 1
Learning Competency 1: compare and contrast the nuances of varied online
platforms, sites, and content to best achieve specific class objectives or address
situational challenges
Learning Competency 2: apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would relate to their specific
professional tracks
Learning Competency 3: use the Internet as a tool for credible research and
information gathering to best achieve specific class objectives or address situational
Quarter 1 – Week 1 ICT in the Context of Global Communication
: What is Information and Communications Technology?
Information and Communications Technology (ICT) often deals with the
use of different technologies such as mobile phones, telephones, computer, Internet,
and other devices, as well as software and applications to locate, save, send, and
manipulate information. Empowering ICT is important for its innovative uses impacts
our daily lives. It has affected our ways of communicating, made our lives more
convenient, and assisted countries towards their modernization plans.
Thus, there is a need to create a foundation of understanding in the world of
ICT.
WHAT I KNOW
You must be excited to flip over the pages and begin with the lessons. But
first, please answer the pre-test to measure what topics have you known so far.
Direction: Read each item carefully and choose the letter of the correct answer.
Encircle it.
1. What type of web page is classified as flat or stationary?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0
2. What web 2.0 feature allows users to subscribe to a data plan
that charges for the amount of time spent on the internet?
A. Folksonomy B. Long Tail C. User Participation D. Application
3. What is the name of the symbol that is used to classify and
categorize information?
A. Hashtag B. Question Mark C. Asterisk D. At sign
4. What specific type of social media allows you to connect with
other people?
A. Microblogging C. Media Sharing
B. Social Networks D. Social News
5. Twitter is an example of what specific type of social media?
A. Microblogging C. Media Sharing
B. Social Networks D. Social News
WHAT’S NEW SITES
Because of the wide capacity of Web 2.0, it has helped in creating dynamic online
platform sites. Online platform is a specially developed platform using Internet
technology. Online platforms have revolutionized access to any information. Online
platforms currently include, but are not limited to:
Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Media
Let us go through them one by one!
1. Presentation or Visualization Platform allows you
to present and share presentations, infographics and
videos with other people. It is used to communicate
information clearly and efficiently.
2. Cloud Computing Platform is also called as “The cloud.” It
is the practice of using a network of remote servers hosted
on the internet. Instead of using your computer’s hard drive,
you store and access your data and programs over the
Internet.
3. File Management Platform is used for the storing, naming,
sorting, and handling of computer files. Allows you to
convert and manage files without download in the software
tool.
4. Mapping Platform is a transformation taking the points of
one space into the points of the same or another space.
Uses GPS to detect location and used for navigation.
5. Social Media Platform is a computer-mediated tools that
allow large group of people to create, share or exchange
information, interest and the information shared can be in
the form of ideas, pictures, videos or anything that you want
to create and share to virtual communities. It can be in the
following platforms:
Social Networks. These sites allow you to connect
with other people with the same interests or
background.
Bookmarking Sites. These are sites that allow you
to store and manage links to various websites and
resources.
Social News. These are sites that allow users to post their
own news items or links to other news sources.
Media Sharing. These are sites that allow you to
upload and share media content like images,
music, and video. Media sharing sites can be
specific for video sharing, photo sharing, slide
sharing, social bookmarking, and gaming.
Microblogging. These are sites that focus on short
updates from the user. Those subscribed to the
user will be able to receive these updates. Posts
are brief that range typically from 140 – 200
characters.
Blogs and Forums. These are websites that allow
users to post their content. Other users can
comment on the said topic.
WHAT CAN I DO
ACTIVITY 1.1: Which Website Is It?
DIRECTIONS: Listed below are some of the platforms. Complete
the table below by providing name of website and a short
description using the internet. Write your answers on the space
provided in the table.
PLATFORMS NAMES OF WEBSITES DESCRIPTION
Presentation or
Visualization
Cloud
Computing
File
Management
Mapping
Social
Networks
Social News
Microblogging
Blogs and Forums
ASSESSMENT
Directions: Read each item carefully and choose the letter of the
correct answer. Encircle the letter of your choice.
1. What type of web provides a framework that allows data to be shared and reuse to
deliver web content specifically targeting the user?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D.Website
2. Which of the following is an example of sites under web
2.0?
A. Facebook B. YouTube C. Wikipedia D. All of the above
3. What type of web page is classified as flat or stationary?
A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0
4. Twitter statuses are only composed of a few characters. What
type of social media site does Twitter belong?
A. Micro blogging C. Social Networks
B. Media Sharing D. Bookmarking
Sites
For #’s 4-5, use the choices inside the box.
A. If only the FIRST statement is TRUE. C. If BOTH statements are TRUE.
B. If only the SECOND statement is TRUE. D. If BOTH statements are FALSE.
5. Social networks are sites that allow you to connect with other
people having the same interests. It allows you to share your
own news and other news from other sources.
WHAT I NEED TO KNOW
,
LESSON 2: Online Safety, Security and Netiquette
The internet is the guiding technology of the Information Technology Age just
as the electrical engine was of the Industrial Age. In these times, more and more
people are already engaged in the use of technology. These people who are raised in
a digital, media-saturated world are called digital natives. No doubt, the Internet has
been very useful to us but with the rise of instant messaging, chat rooms, emails and
social networking sites, it can also bring trouble - from cyberbullying to more serious
Internet dangers, including exposure to sexual predators. Thus, internet safety is
always our primary concern.
WHAT I KNOW
I bet you are ready to know if you have practiced online safety, aren’t you? But
before that, take time to answer the pre-test to gauge how much you know about the
lesson.
Direction: Read each item carefully and choose the letter of the correct answer.
Encircle your answer.
1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
2. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a
sentence.
D. Not answering a friend request on Facebook.
3. It is OK to forward or post an email message that you received if
__________
A. the message is typed in all capitals.
B. the author of the message has given you permission to
forward or post it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as
confidential.
4. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion
or criticism.
5. Knowledge and understanding of netiquette is useful because
___________
A. it will help you create a positive impression on those you
meet in cyberspace.
B. it explains some of the technical limitations of online
communications.
C. it explains the conventions already being used by millions
of cybernauts.
D. All of the above.
WHAT IS IT
Lesson 2.1: Online Safety, Security and Netiquette
Online safety refers to the practices and precautions that should be observed
Netiquette is a combination of the words network and etiquette. It is a set of rules
for behaving properly online.
WHAT CAN I DO
A ACTIVITY 2.2: Can You Keep It Private?
DIRECTIONS: Choose the most appropriate thing
to do in the following situation. Encircle your answer.
1. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels
or places.
D. Tell no one. Vacations are for getting away.
2. Do you have the same passwords for all your accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my
accounts.
3. Choose which image below describes how you feel about
sharing your password with your boyfriend/ girlfriend?
.
C.
A.
D.
B.
4.Yourparentsbought
you your first
cellphone. How will
you share your
cellphone number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
5. Your social media friends list should only be composed of
______________.
A. Your favorite brands. C. Anyone who sends you a friend
request
B. Foreigners D. Family and friends
ASSESSMENT
Directions: Read each item carefully and choose the letter of the
correct answer. Encircle the letter of your choice.
1. What type of malicious program is designed to replicate itself and
transfer from one computer to another either through the internet
or local networks or data storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
2. What harmful online programs are designed to send you
advertisements, mostly pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
3. What harmful online program is used to record keystrokes done
by users to steal passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
4. What is ransomware based on?
A. Fear of hackers C. Fear of spyware
B. Fear of the Internet D. Fear of losing important
files
5. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious
link that is disguised to look like an email from
someone reliable.
B. Creating a fake website that looks nearly identical to a
real website in order to trick users into entering their
login information.
C. Sending someone a text message looks like a
notification that the person has won a contest.
D. Sending someone an email that records their
keystroke activities while using their computers.
WHAT I NEED TO KNOW
Lesson 3: Effective Internet Research
The Internet has made our lives easier especially in terms
of doing research. By browsing the internet, we can access limitless topics. Web-based
catalogs are available in many libraries to assist researchers in locating printed books,
journals, government documents and other materials. The biggest obstacle facing all
researchers on the internet is how to effectively and efficiently access the vast amount
of information available (The Internet: Research Tools, 2013).
WHAT I KNOW
Before we take on another journey towards exploring the great capacity of the
internet into research, kindly take time to answer the following questions for your
pretest.
Direction: Read each item carefully and choose the letter of the correct answer by
encircling it.
1. What is the Boolean logic technique used for?
A. Narrowing, broadening or eliminating a search term.
B. Using a robot to do instant research.
C. Searching several search engines at the same time.
D. Searching the infinite information from the internet.
2. http://www.avg.com/en/signal/what-is-spyware is an example of?
A. Access code B. Directory C. Server D. URL
3. Which of the following is a search engine?
A. Netscape C. Elsevier
B. Yahoo D. Macromedia Flash
4. Which of the following is NOT an example of a domain?
A. .gov B. .com C. .npr D. .edu
5. What are the three Boolean logic search operators?
A. FROM, TO, WHOM C. AND, OR, BUT
B. AND, OR, NOT D. SEARCH, KEYWORD
Activity 3.1: Evaluating Websites: Checklist
This activity is adapted from the University of Maryland: Evaluating Web Sites: A
Checklist www.lib.umd.edu/tl/guides/evaluating-checklist Directions:
1. Using the Internet, research on topics under CoVid-19 in the
Philippines.
2. Read through the checklist and answer each question in your space provided.
3. Attach a printout of the web site you are evaluating and paste in a short bond
paper:
Print out of the website
1. What is the URL or web address of the web site you are evaluating?
http://_____________________________________________________
2. What is the title of the web site?
____________________________________
AUTHORITY AND ACCURACY
I couldn’t tell The author is:
_______________________________________
Who is the author of the web site?
What authorship clues did the URL (web address) provide? Check all that
apply:
company (.com) country-specific site (e.g., .uk)
non-profit organization (.org) military site (.mil)
academic institution (.edu) network of computer
(.net) government agency (.gov) other? Please
describe: personal web page (e.g.,
www.jamieoliver.com)
ASSESSMENT
Website evaluation is an important skill that everyone should practice and master
through time. It is always important to learn which information are relevant and reliable
to be able to avoid misinformation and be a victim of fake news.
Direction: Read each item carefully and choose the letter of the correct
answer. Encircle the letter of your choice.
1. What happens when a phrase or sentence is placed inside
quotation marks when doing research?
A. Will only return items that have both terms.
B. Will search for words that are together and in order
C. Will return items that exclude a term
D. Will return items that have either of the terms
2. What is a URL?
A. A computer software program
B. An acronym for Unlimited Resources for Learning
C. The address of a document or "page" on the World
Wide Web
D. A search engine
3. What are the three main search expressions, or operators,
recognized by Boolean logic?
A. and, or, not C. and, or, but
B. from, to, whom D. search, keyword, text
4. How do you evaluate a web page?
A. You confirm that the author or site an authority on the
subject.
B. You check to see if the author has been objective.
C. You check to see if the information is current.
D. You do as many of the above possible.
5. An article that only one point of view or omits facts is biased.
A. True B. False