Student'S Activity Sheet For Melc 1 (Modular Modality)
Student'S Activity Sheet For Melc 1 (Modular Modality)
Student'S Activity Sheet For Melc 1 (Modular Modality)
. OBJECTIVES: At the end of the lesson, you are expected to:
B. Performance Standard:
The learners shall be able to independently compose an insightful reflection paper on the nature
of ICT in the context of their lives, society, and professional tracks (ABM, Tech Voc, Academic).
Compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges _ICT11/12-ICTPT-Ia-b-1).
A. Materials/IMs Needed
Pen, clean sheet of paper
B. References
DepEd Empowerment Technologies Students reader
1
2
III: TIME FRAME: 100 min or 2 days (30 min will be allotted for the lecture part)
IV: INTRODUCTION/RATIONALE
The world is always in constant change and we must keep up with it. Along with this, we must
also understand how the changes work – specifically, through Information and Communication
Technology (ICT) – and what are their implications in our modern society
With this, we must learn and explore ICT and the online platform, sites, content and how it
affects the way we think. This will focus on the different online platform. The duration of this activity
will be two (2) days.
What is ICT?
ICT (Information and Communication Technology)- deals with the use of different
communication technologies such as mobile phones, telephone, internet etc. to locate, save, send
and edit information.
V: PROCEDURE/DIRECTIONS/INSTRUCTIONS
The activities that will follow will test your knowledge and ability about online platform.
Get a clean sheet of paper and label it as Empowerment Technology SAS 1 for week 1. You can cut
and use the bubble sheet provided at the end of this activity sheet for Activity 5 and Activity 8. Your
student ID is the last 9 digits of your LRN number EX: 109321520145
What I know?
Activity 1.1 Find Me!
Directions: With the use of the terms listed in the box, choose at least 5 ICT tools that you are familiar
with. Write your response in your answer sheet.(5 minutes)
mouse Skype Pinterest cable
2
3
What’s in?
Activity 1.3 What am I?
Directions: Identify what online platform is being described in the picture . Write your response in your
answer sheet. (5 minutes)
1.______ 2._____ 3._____ 4._____
5._____
What is it?
3
4
an online marketplace that places one party in touch with another, such as buyers and sellers.
- Social Media
Social Media are forms of electronic communication (as Websites for social networking and
microblogging) through which users create online communities to share information, ideas, personal
messages, and other content (as videos).
Social Networking
What is the difference between social media and social networking? These are forms of
media. Essentially, social media is a platform for broadcasting information, whereas social networking
is a platform for communicating with one another. Social media is a communication channel,
whereas, in social networking, communication has a two-way nature. Even with the distinction being
given, some nuances can be pointed out.
As an example of how they differ and yet somewhat overlap, Facebook is a social networking
site. You register and post your profile, connect with friends, and comment on topics in a generally
interactive way. On that same social networking site, companies set up a presence and use
Facebook as a way to promote their brand and gain followers.
- Search Engines
It is a software system designed to search for information on the World Wide Web (WWW). The
search results are generally presented in a line of results referred to as Search Engine Results Pages
(SERPs).
- Communications Services
- Payment Systems
It is any system used to settle financial transactions through the transfer of monetary value and
includes the institutions, instruments, people, rules, procedures, standards, and technologies.
- Advertising Platforms
are offering. Facebook makes your product or service put into the hands of the exact person who
wants it.
PLATFORM FOR HASHTAGGING
Twitter is a fast-paced, concise, and easy way to connect with your audience. With over
310 million registered users (and growing), Twitter is a sea of information of 140 characters or less
content waiting to be read, clicked, followed, and re-tweeted. When marketing on Twitter, you need
to have content that is enticing to stop and click through. People are usually scrolling quickly, to take
more than just a simple text to stop them in their tracks. Make sure when you are constructing your
tweets, you are making people want to click through
PLATFORM FOR GROUPING
LinkedIn is different from the rest of the social media outlets because it is specially designed
for businesses and professionals. Users mainly go to LinkedIn to showcase their job experience and
professional thoughts, making it one of the most important platforms to use for those in B2B.
PLATFORM FOR TEACHING
YouTube is the leading video-sharing platform in the world. On your channel, your brand
can share and edit videos, create playlists, and prompt discussions.
PLATFORM FOR ANALYZING BUSINESS
Pinterest is one of the unique marketing platforms on this list. Instead of posting content for
your audience to read, on Pinterest, you will post just a clickable picture and a short caption.
Pinterest is a top-rated platform for brands with a tangible product, i.e., clothing and food brands,
restaurants, those in eCommerce, etc
5
6
What’s more?
Activity 1.4 Read Me!
Directions: Read the selection and answer the questions below. Write your response in your answer
sheet. (10 minutes)
6
7
Real world relevance of the topic Networked World – everything is connected through the Internet. In
a publication by Marshall McLuhan, he coined the term “Global Village”
- Due to the continuous spread of connection to the Internet, the world as we know it gets
smaller and smaller. A lot more people are getting connected (virtually or online) to each other.
And information is much easier to be accessed.
- The rise of the Global Village (or the Networked World) causes a huge dilemma between:
o Since a lot more people are connected over the Internet, there will be an inevitable risk to
each users’ privacy. This is already seen in the events where hacking of personal and
private information is prevalent.
o The community’s need to know.
As McLuhan stated in his 1967 book The Medium is the Message: “Electrical information devices for
universal, tyrannical womb-to-tomb surveillance are causing a very serious dilemma between our
claim to privacy and the community’s need to know.”
GUIDE QUESTIONS:
1.What does the title tell the reader?__________________________________________________________
2.What is/are the effect/s of the media on how people think and perceive information and
communicate
information?__________________________________________________________________________________
3. As student, how does media and the Networked world affect your choice of track?
______________________________________________________________________________________________
Your hashtag. Your survey
#____________ _____________
Answer the following Guide questions: Write your response in your answer sheet.
3.1. Why did you choose that kind of hashtags?
3.2. How does it feel when you receive likes for your hashtags
8
9
What I can do? (Assessment)
Activity 1.8 Answer me!
Quiz #1
7. Web 2.0 introduced static web pages that allow users to interact with the web page.
9. Windows Phone OS is a closed source and proprietary operating system developed by
Microsoft.
Test II. Multiple Choice. Identify what is being describe by each sentence. Choose the letter of the
correct answer (11-20)
11. A key features of Web 2.0 which allows users to categorize and classify/ arrange information
using freely chosen keyword (e.g. tagging)
9
10
17. It is a platform and a category of business software that adds broad social networking
capabilities to work processes.
a.Mobile b. assistive c. convergent d. collaborative
18. This refers to media devices such as mobile phones and PDA's were the primary source of
portable media from which we could obtain information and communicate with one another.
a.Mobile b. assistive c. convergent d. collaborative
19. This refer to a websites, applications or online channels that enable users to co-create, discuss,
modify, and exchange user generated content.
a. Social media b. web 1.0 c. mobile d. online system
20. An online versions of information systems which is the process of and tools for storing, managing,
using and gathering of data and communications in an organization.
a.Social media b. web 1.0 c. mobile d. online system
I. II.Direction: Answer the following questions. Write your response in answer sheet.
21-23. Based on your mind map, can you classify the online platforms, sites, and content?
24-25. How will you determine the significance of online platform in your everyday lives?
REFLECTION: ( 5 minutes)
10
11
ROSA T. TAYAMORA
School Head
---------------------------------------------------------------you -----can-------cut-------from------here--------------------------------------------
11
12
Department of Education
Region IV (A) – CALABARZON
City Schools Division Office of Antipolo
District I – A
ANTIPOLO CITY SENIOR HIGH SCHOOL
(#342175 - SHS within Sta. Cruz Elementary School)
Brgy. Sta. Cruz, Antipolo City
Email add: [email protected]
STUDENT’s ACTIVITY SHEET FOR EMPOWERMENT TECHNOLOGIES
I.OBJECTIVES: At the end of the lesson, you are expected to:
12
13
a. Explain online safety, security, ethics and etiquette standards & practice in the use of ICT
I. b. Apply online safety, security, ethics and etiquette standards & practice in the use of ICT as it
would relate to their specific professional tracks.
A. Content Standard:
The learners demonstrate an understanding of ICT in the context of global communication for
specific professional track
B. Performance Standard:
The learners shall be able to independently compose an insightful reflection paper on the
nature of ICT in the context of their lives, society, and professional tracks (ABM, Tech Voc, Academic)
Apply online safety, security, ethics and etiquette standards & practice ICT as it would relate to
their specific professional tracks.
A. Materials/IMs Needed
Pen, clean sheet of paper
B. References
DepEd Empowerment Technologies Students reader
C. Additional Materials and Learning Resources
III: TIME FRAME: 100 min or 2 days (30 min will be allotted for the lecture part)
IV: INTRODUCTION/RATIONALE
In this generation, people are dependent on the Internet. Like how people socialize face to
face, we should always follow etiquette as it mirrors our personality. Being on different platforms, we
should be aware of our actions and protect ourselves at the same time. Remember that once
something has been shared online, it cannot be deleted.
This lesson provides information about Netiquette. It will serve as your guide on how to behave
appropriately online. It is vital to use Netiquette because communication online is non-verbal. Most
often, online discussion consists of reading something someone else’s has type. The duration of the
activity will be 2 days.
V: PROCEDURE/DIRECTIONS/INSTRUCTIONS
13
14
The activities that will follow will test your knowledge and ability about online platform. Get a
clean sheet of paper and label it as Empowerment Technology SAS 2 for week 1. You can cut and
use the bubble sheet provided at the end of this activity sheet for Activity 2, 4 and Activity 8. Your
student ID is the last 9 digits of your LRN number EX: 109321520145
a. Explain online safety, security, ethics and etiquette standards & practice in the use of ICT
V. b. Apply online safety, security, ethics and etiquette standards & practice in the use of ICT as it
would relate to their specific professional tracks.
What I know?
Activity 2.1 Agree or Disagree!!
Directions: Choose A if Yes you agree with the statement and choose B if No you disagree on the
statement. (5 minutes)
_______ 1. My computer has an antivirus, so it is okay to open most email attachments like e-cards and video
files.
_______ 2. Your friend told you that his college application was rejected because you posted a video of him
doing crazy stuff at a party. You posted the video several years ago but later took it down to protect your
friend's reputation. Can your friend be right that the college found the video?
_______ 3. You and your best friend plays a lot of video games. One time, she asks you for your password so she
can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give
away your password?
_______ 4. You received an email stating that your mother's bank account is going to be forfeited if you do not
respond to the email. Is it safe to' reply?
_______ 5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a
website offering free essays. Is it okay to use the essays from this free essay website?
_______ 6. A virus is a malware that multiplies and infects other computers through flash drives.
_______ 7. Keyloggers are software that show pop-up ads even if you are not using your browser.
_______ 8. Search engines scan websites for search results even if you have set your post to "private"
_______ 9. There is a danger in posting information about a future vacation.
_______ 10. Letting people know your birthday is probably a must if you want to get as many
1. First name
2. Last name
3. Middle name
8. Your address
Guide Questions:
1. How many checks did you have for Shared? Not Shared? __________________________________
2. If you search your first and last name, did you get links to your profile page? ________________
What’s in?
Activity 2.3 What am I?
Directions: Study the picture below from there you will form a word from a given letters. Write your
answer legibly . (5 minutes)
1.P, R, I, C, Y, A, G, F, V - _________________ 2. A, C, G, H , D, E, Y, K , R-__________________
15
16
3. W, V, I, S, R, U, T -__________________
4. E, R, I, N, C, S, I , T, U , Y-____________________
What is it?
Read Me
ONLINE SAFETY AND SECURITY (30 minutes)
INFORMATION AT RISK
16
17
Netiquette, or network etiquette, is concerned with the "proper" manner of communication in
the online environment. Every Time you communicate in the virtual world, consider the following
"rules," adapted from Virginia Shea's Core Rules of Netiquette.
When communicating electronically, whether through email, instant message, discussion
post, text, or another method, practice the Golden Rule: Do unto others as you would have others do
unto you. Remember, your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?"
Rule 2: Adhere to the same standards of behavior online that you follow in real life
While it can be argued that standards of behavior may be different in the virtual world,
they certainly should not be lower. You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone
face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.
Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain."(Shea, 1994)
Depending on where you are in the virtual world, the same written communication can
be acceptable in one area, where it might be considered inappropriate in another. What you text to
a friend may not be appropriate in an email to a classmate or colleague. Can you think of another
example?
Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to
read and time in which to respond.
Most people today lead busy lives, just like you do, and do not have time to read or
respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility
to make sure that the time spent reading your words is not wasted. Make your written
communication meaningful and to the point, without extraneous text or superfluous graphics or
attachments that may take forever to download.
One of the virtual world's best things is the lack of judgment associated with your physical
appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself
singing Karaoke in a clown outfit.) The quality of your writing will judge you, so keep the following tips
in mind: Always check for spelling and grammar errors Know what you are talking about and state it
clearly Be pleasant and polite
17
18
What is meant by "flaming" and "flame wars?" "Flaming is what people do when they
express a strongly held opinion without holding back any emotion."(Shea, 1994). As an example, think
of the kinds of passionate comments you might read on a sports blog. While "flaming" is not
necessarily forbidden in virtual communication, "flame wars," when two or three people exchange
angry posts between one another, must be controlled, or the camaraderie of the group could be
compromised. Do not feed the flames; extinguish them by guiding the discussion back to a more
productive direction.
Depending on what you are reading in the virtual world, be it an online class discussion
forum, Facebook page, or an email, you may be exposed to some private or personal information
that needs to be handled with care. Perhaps someone is sharing some medical news about a loved
one or discussing a situation at work. What do you think would happen if this information "got into the
wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your
privacy, so should you respect the privacy of others. Be sure to err on the side of caution when
deciding to discuss or not to discuss virtual communication.
Like in face-to-face situations, there are people in cyberspace who have more "power"
than others. They have more expertise in technology or have years of experience in a skill or subject
matter. Maybe it is you who possesses all of this knowledge and power! Just remember: knowing
more than others do or having more power than others may have does not give you the right to take
advantage of anyone. Think of Rule 1: Remember the human.
Not everyone has the same amount of experience working in the virtual world. And not
everyone knows the rules of Netiquette. At some point, you will see a stupid question, read an
unnecessarily long response, or encounter misspelled words; when this happens, practice kindness
and forgiveness as you would hope someone would do if you had committed the same offense. If it is
a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in
a private email rather than a public forum. Shea, V. (1994). Core Rules of Netiquette. Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html
18
19
What’s more?
Activity 2.4 Choose Me!
Directions: Read the statements carefully and choose the letter of the correct answer.(10 minutes)
1. What code of behavior that delineates expectations for social behavior according to
contemporary conventional norms within a society, social class, or group?
a. Etiquette
b. Mobile media
c. Internet safety
d. Social media
2. What do you call the knowledge of maximizing the user's personal safety and security risks
to private information and property associated with using the internet, and the
self-protection from computer crime in general?
a. Etiquette
b. Mobile media
c. Internet safety
d. Social media
3. What awareness of rules that either punish or reward us for doing something: younger
children are most motivated by a fear of being punished for bad behavior, but become
more concerned with the rewards of good behavior as they get older?
a. Ethics
b. Mail merge
19
20
c. Research skills
d. Online system
4. Typing in all capitals in electronic communications means
a. This message is very important
b. You are shouting
c. It’s okay to forward this message to others
d. Nothing special typing in all CAPS is normal
5. Before posting to a discussion group you should
a. Read the FAQ
b. Find the Frequently Asked Questions document
c. Read some of the existing posts to get an idea of the tone and character of the group
d. All of the above
6. Knowledge and understanding of netiquette is useful because
a. It will help you create a positive impression on those you meet in cyberspace
b. It explains some of the technical limitations of online communications
c. It explains the conventions already being used by millions of cybernauts.
d. All of the above
7. It is concerned with protecting personal data to avoid online exploitation either by bullying
or identity theft
a. Internet safety
b. Internet bullying
c. Internet theft
d. Internet standards
8. It is a method where an unauthorized person attempts to gather personal data, such as
passwords and credit card details
a. smishing
b. phishing
c. vishing
d. fishing
9. Is a computer program that is designed to damage or disrupt a computer system and the
files that are stored on it.
a. Hardware
b. Software
c. Malware
d. Spyware
10. A malicious computer program that disguises itself as another application, such as a game
or a utility program.
a. worm
b. spyware
c. adware
d. Trojan horse
20
21
What other Enrichment activities can I
engage in? (Additional Activities)
Activity 2.6 Draw it!!
POSTER RUBRIC
Relevance to the topic 3
Originality 1
Creativity 2
10
What profession do you prefer to have in the future? In what way could you make an impact on society using
the Internet? Answer the following question in essay form.
ESSAY RUBRIC
Content 4
Word choice, 2
sentence variety &
structure
Grammar & 2
Mechanics
21
22
10
1. What is Netiquette?
A. Using a net to catch fish
B. Being mean to other people on Facebook
C. Presenting proper manners at the dinner table
D. Showing manners and etiquette on the Internet
2. What should you do if you receive a text or email from someone you don't know?
A. Call the police
B. Delete it without opening it
C. Open it immediately and reply
D. Leave it in your inbox until you figure out who it is
3. Which of the following should you never give on the Internet?
A. Your age
B. Your name
C. Your address
D. All of the above
4. What should you do to avoid being cyber-bullied?
A. Observe proper netiquette rules
B. Give out personal information to anyone who asks
C. Ignore any requests from people to be your friend online
D. Strike first - post mean things about other people on your Facebook Wall
5. What should you do if you feel you are being cyber-bullied?
A. Call the police
B. Tell no one, it is embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Internet
6. What should you never do if you get an embarrassing picture from someone?
A. Talk to the person again
B. Send it on to other friends
C. Tell your parents or a teacher
D. Discourage the person from sending pictures like that
7. What should you avoid doing in a chat room?
22
23
24
25
25