WEEK5 MEDIA Organized
WEEK5 MEDIA Organized
WEEK5 MEDIA Organized
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalty.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials
from their respective copyright owners. The publisher and authors do not represent
nor claim ownership over them.
Development Team
Development team of
of the
theModule:
module
Author: Ezra Mae T. Tuba
Author: Ezra Mae T. Tuba
Reviewers: Therese Mae C. Maandig
Editors:
Arian M. Edullantes
Reviewers: Therese Mae C. Maandig
Abihail L. Gimena
Illustrator: Arian M. Edullantes
Jay Michael A. Calipusan
Abihail L. Gimena
Illustrator
Management and Layout Artist:
Team:
Jay Michael A. Calipusan
Chairperson: Dr. Arturo B. Bayocot, CESO III
Management Team: Regional Director
Himaya B. Sinatao
Co-Chairpersons: Dr. Victor G. De Gracia Jr., CESO V
Joel D. Potane
Asst. Regional Director
Mala Epra B. Magnaong
CES, CLMD
Members: Dr. Bienvenido U. Tagolimot, Jr.
Regional ADM Coordinator
Elson C. Jamero
EPS-Designate-TLE
Printed in the Philippines by
Department of Education - Alternative Delivery Mode (DepEd-ADM)
OfficePrinted
Address:in the Philippines
Masterson by:Avenue,
Department
Upper Balulang,–Zone
of Education Regional Office 10 de Oro
1, Cagayan
Office Address: City,
ZoneCagayan
1, Upper Balulang Cagayan de Oro City 9000
de Oro, Lalawigan ng Misamis Oriental
Telefax: (088) 880-7071, (088) 880-7072
Telefax: ________________________________________________
E-mail Address: [email protected]
E-mail Address: ________________________________________________
Senior High School
Lesson 1:
Opportunities, Challenges and Power of
Media and Information ............................................................... 1
What’s New ................................................................................................ 2
What Is It .................................................................................................... 2
What’s More ............................................................................................... 5
What’s More ............................................................................................... 6
What I Have Learned ............................................................................... 10
Lesson 2:
Current and Future Trends of Media and Information ........... 11
What’s New .............................................................................................. 11
What Is It .................................................................................................. 12
What’s More ............................................................................................. 17
Summary ........................................................................................................................ 21
Assessment: (Post-Test) ..................................................................................................... 23
Key to Answers ............................................................................................................... 24
References ..................................................................................................................... 28
What This Module is About
Welcome to Module 5!
This module is designed to introduce the core topics of Media and Information Literacy.
The students will acquire a knowledge about Opportunities, Challenges and Power of Media
and Information, Media and Information Literate Individual and People Media. The module
presents identified themes together with exemplar activities to assist the students in better
understanding of Media and Information Literacy. The content of this module focuses on
developing the knowledge and skills of the students towards emerging development of Media
and Information.
Module 5 contents nine (9) learning competencies. Learning competencies are the
main ideas or skills that the students to master these are also called goals. Thus, at the end of
every topic the students shall master the learning competencies with corresponding activities,
evaluation of learning thru performance tasks and case analyses.
This topic opportunities, challenges and power of media and information. Opportunities
and Challenges of media is the core topic of Media and Information Literacy. We shall look
at some examples of opportunities and challenges of media and information and to know the
power of media and information in the part of the student, business and in the society.
The first part of this topic is to answer first the given pre- test. This is to measure your
knowledge about Opportunities and Challenges of media and information and followed by
unlocking activities and deepening of the lesson.
Enjoy!
I
What I Need to Know
II
Icons of this Module
What I Need to This part contains learning objectives that
Know are set for you to learn as you go along the
module.
III
What I Know
Multiple Choice. Select the letter of the best answer from among the given choices.
1. It is a cybercrime in which the targets are contacted by email, telephone or text message.
A. Phishing B. Cyberbullying
C. Cybercrime D. Hacking
2. It is the program which attach themselves to the computer or file and then circulate
themselves to other files and to other components on a network.
A. E-mail Spoofing C. Cyber Stalking
B. Virus D. Hacking
3. It is category of technology that can be worn by a consumer and often include tracking
for information.
A. Wearable technology C. Smart Watch
B. Smart phone D. MOOCs
8. This is a mechanical robot having the characteristics that can-do things like humans.
A.5G C. Hologram
B. Smart Glass D. Avatar
9. It is a wireless handheld device that allows users to make and receive calls and to send
text messages, among other features.
A. Computer C. Mobile Phone
B. Telephone D. Laptop
10. A technology that will calculate and monitor your heart rate.
A. Misfit Phase Hybrid C. Fitbit Charge 2
B. Heart Rate Monitoring Device D. Avatar
IV
Lesson
Opportunities, Challenges and
1 Power of Media and Information
What’s New
Process Questions
1. How do you find the activity?
2. What do you think is the connection of the activity in our lesson?
1
What Is It
Answering the activity, let us now discuss and explore the opportunities, challenges
and power of media and information. Let’s start!
In the world of media and information there are a lot of opportunities and challenges.
What is the meaning of the word’s opportunity and challenges? Below is the meaning of the
two words. Take a look!
So, here are the opportunity and challenges in media and information. First, we will
take a look in the opportunity.
2
So, we have two opportunities in media and information, first television broadcaster
and mobile communication. But have you wondered, what makes television broadcaster and
mobile communication an opportunity in media and information.?
Let me share it to you, media plays a big role in sharing and disseminating information.
Through media, people now a day’s can easily catch up news and be updated because of
television broadcaster. In the other side, mobile communication can make our life easier. No
need to write a letter if you want to ask allowance to your mom instead just text and call. How
amazing isn’t?
Now, take a pause for a while, think in your own understanding, what is the reason why
television broadcaster and mobile communication is an opportunity and don’t forget to share it
to your friends. Share it!
And now let’s move on to the next topic. The next topic is the challenges in media and
information. Here are the two challenges, take a look!
Cybercrime
Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography,
hate crimes). Cybercriminals may use computer technology to access personal information,
business trade secrets or use the internet for exploitative or malicious purposes.
Source: Technopedia . 2018. Cybercrime Access at: https://www.techopedia.com/definition/2387/cybercrime
https://www.freepik.com/free-vector/anonymous- https://www.freepik.com/premium-
hacker-concept-with-flat-design_2785043. vector/cyber-thief_4717043.
htm#page=1&query=cybercrime&position=0 htm#page=1&query=cybercrime&position=10
Do you know there are four different types of cybercrime? Here are the four types of cybercrime.
Source: LinkedIn. June 22, 2017. Different Types of Cybercrime Access at: https://www.linkedin.com/pulse/
different-types-cyber-crime-avanzo-net
Hacking is the most common type of Cyber stalking is use of internet or other
cybercrime committed across the world. electronic means to stalk someone. It is
Hacking is a crime which entails cracking online harassment and online abuse. Mostly
systems and gaining unauthorized access to cyber stalking involves following a person’s
the data stored in them. Hacker is a person movement across the internet by posting
who breaks in to a computer system. threatening messages to the victim or by
entering the chat rooms frequented by the
victim or by constantly bombarding the
Virus dissemination. Virus is the programs victim with the e-mails etc.
which attach themselves to the computer or
file and then circulate themselves to other
files and to other components on a network. E-mail Spoofing. An e-mail that appears to
They usually affect the data on the computer, originate from one source but actually has
either by altering or deleting it. been sent from another source. This can
also be termed as e-mail forging.
3
Phishing
Phishing is a cybercrime in which a target or targets are contacted by email, telephone
or text message by someone posing as a legitimate institution to lure individuals into providing
sensitive data such as personally identifiable information, banking and credit card details, and
passwords.
Source: Phishing.org. 2018. What Is Phishing? Accessed at: http://www.phishing.org/what-is-phishing
https://www.freepik.com/premium-vector/phishing-banner-set-isometric-set-phishing-vector-banner-web-
design_4341984.htm#page=1&query=phishing&position=1
After you read about the two How about cybercrime? Cybercrime
challenges, let us dig deeper what makes is another problem that we are facing today.
phishing and cybercrime a challenge in Like phishing, the hacker can access your
media and information. Here is the answer. information’s over the internet. You should
always remember your personal information’s
Phishing is an illegal action or crime.
are considered confidential.
Where in the hacker will hack or get all your
information’s over the internet. For example, Always remember, your personal
your bank account details, your personal information’s are always confidential. No
information’s and even your credit card sharing and posting personal information’s
details. So, for you to be safe in phishing over the internet.
avoid posting your personal information’s
For the last topic, let me show you
over the internet.
the examples of the power of media and
information to affect change.
4
Now, you have already knowledge about Opportunities, Challenges, and Power of
Media and Information. Please don’t forget to share to your friends and family about our topic
for the day. Share it!
What’s More
Column A Column B
1. It is a cybercrime in which a target or targets are A. Cyberstalking
contacted by email, telephone or text message by
B. Cybercriminals
someone.
C. Hacker
2. A type of cybercrime that is the most common type
of cybercrime committed across the world. D. Hacking
3. It is the program which attach themselves to the E. Cyberbulling
computer or file and then circulate themselves to F. Virus
other files and to other components on a network.
G. E-mail Forging
4. These professionals may work for news programs
and help research important stories to discuss as H. Mobile Phone
well as provide commentary about different events. I. Phishing
5. It is online harassment and online abuse it involves J. Mobile
following a person’s movement across the internet
by posting threatening messages to the victim.
6. It is a wireless handheld device that allows users to
make and receive c It is a wireless handheld device
that allows users to make and receive calls and to
send text messages, among other features.
7. A form of technology-mediated communication that
enables the user of a mobile device to communicate
with someone in a different location messages,
among other features.
8. They use computer technology to access personal
information, business trade secrets or use the
internet for exploitative or malicious purposes.
9. A person who breaks in or trespasses a computer
system and gaining unauthorized access to the data.
10. The other name for e-mail spoofing.
5
What’s More
—————————————
6
Images from https://www.freepik.com
———————————
————————————
7
Images from https://www.freepik.com
————————
————————
8
What’s More
Activity 4: ?
Instructions: Search up, down, forward, backward, and on the diagonal to find the
hidden words. Hidden words to find: hacking, mobile phone, phishing, opportunity, challenge,
TV broadcaster, cybercrime, cyberstalking, cybercriminal, hacker, virus, e-mail forging, mobile
communication, internet and media.
9
What I Have Learned
10
Lesson
Current and Future Trends of
2 Media and Information
What’s New
For example:
I am a small animal. I am grey. I like cheese. I rhyme with house. I’m a .
The answer of this riddle is mouse. Now let’s start! Analyze the statement very well.
You can do it!
1. Look at the numbers on my face you won’t find 13 in any place. What am I?
2. You can play with it at night. It can give you text and call even information that you want.
Who am I?
3. I am a word. My name starts in letter I and ends in letter T. I am useful in opening
website like google, yahoo and Facebook. Can you guess me?
4. You can take me wherever you go. I can take all your precious moments with your
friends and family. I can take video too. Who am I?
5. I am something in your house in the living room I am seen. When you sit on the sofa,
you can watch things on my widescreen. Can you guess me?
Thank you for answering the first activity, for that give yourself 5 claps for a job well
done! Now let’s process the activity. I want you to answer the following process questions.
Process Questions:
1. How do you find the activity?
2. What do you think is the connection of this activity to our lesson?
3. Aside from your answer, can you enumerate other example of technology?
11
What Is It
Today, we will discuss about the current and future trends of media and information. I
will show you some examples of current technologies and even in the future.
Before we will start, I want you to think a technology that will help you in the future and
write it in the piece of paper. Describe what is the uses of that technology and how it works.
Just keep the paper.
Now, let’s move on to our discussion. We will evaluate current trends in media and
information and how it will affect/how they affect individuals and the society.
So, here are the examples of current trends in media and information. Let’s start!
Smartwatch is not only for checking time and date. Today, you can use smartwatch for
checking your email, if you have a text message or even a call. Let us dig deeper, the following
are some examples of wearable technology.
12
A Smartphone is a cellular phone with an embedded computer and other non-
telephone-related features such as an operating system, web browsing, and the ability to run
software applications.
Cellphone versus Smart Phone
Source: Techtarget 2018. Smart Phones Access
at: https://searchmobilecomputing.techtarget.com/definition/smartphone
Mind Mapping
13
The third wearable technology is fitness tracker. This technology will tell you how fit
you are. Take a look!
Fitness tracker is the best way to monitor your movement and health with unrivaled
accuracy and effortlessness. A wrist-worn device that can detect some combination of walking
steps, running distance, heart rate, sleep patterns and swimming laps. Fitness bands interact
via Bluetooth with an app in a mobile device that configures the device and downloads the
wearer’s activity data. Below are the list of the best fitness tracker.
Source: PC 2018. Fitness Tracker Access at: https://www.pcmag.com/encyclopedia/term/67469/fitness-tracker
https://www.freepik.com/premium-photo/young- https://www.freepik.com/free-vector/flat-
cientific-caucasian-man-isolated-pointing-temple- smartwatchset_841814.htm#page=1&query=sports
with-finger-thinking-focused-task_6557919. watch&position=10
htm#page=2&query=smart+glass&position=7
Fitbit Charge. This watch is good Smartglass. This smart glass can
for exercise. It can count your running time collect information’s from external and
and the distance. internal. You can listen to music too while
searching informations.
https://www.freepik.com/premium-vector/ https://www.freepik.com/free-vector/flat-
fitness-counter-phone-run-app-wrist-band- smartwatchset_841814.htm#page=1&query=sports
bracelet_5599335.htm watch&position=10
14
Now, let us explore the future technologies. Here are the following future technologies,
let’s take a look!
https://www.freepik.com/free-psd/5g-wifi- https://www.freepik.com/free-vector/futuristic-
network-connection-mock-up_6310422. holographic-infographic-element-collection_4798373.
htm#page=1&query=5G Network&position=1 htm#page=1&query=hologram &position=1
https://unsplash.com/photos/DcKkpYS8nC8
15
What Is It
Explanation:
An e-learning program intended to cater students coming from different parts of the
world. The word MOOC was coined in 2008 by Dave Cormier. A MOOC may be patterned
on a college or university course or may be less structured. Not all MOOCs offer academic
credits when you finish a course such as diploma or certificate although it may be patterned on
a college or university course. With easier access to media like streaming and blogging sites,
most MOOCs are less structured, but they provide education that will help students acquire
certification, employment or proceed to other studies.
Now, are you ready to answer our activities? Let’s do it!
16
What’s More
Activity 2: Complete Me
Below is a mind map with corresponding topic about key features of smart phone.
Supply the missing features of smart phone. Enjoy!
6. A massive open online course (MOOC) is an offline course that has open
access and interactive participation by means of the Web.
8. A fitness tracker is the perfect way to monitor your activity and health effortlessly
and with unmatched accuracy.
9. Fitness tracker interact via Bluetooth with an app in a mobile device that
configures the device and downloads the wearer’s activity data.
10. A smartphone has more advanced features, including web browsing, software
applications and a mobile OS.
18
Activity 4: Connect Me
In this activity, you need to connect the image with its corresponding name. Write the
letter of your choice.
1. 2.
3. 4.
5.
6.
7.
8.
9.
10.
My Future Prototype
20
Summary
2 Opportunities in Media 2 Challenges in media
1. Television Broadcaster 1. Cybercrime
2. Mobile Communication • Hacking
• Cyber Stalking
2. Phishing
• Virus Dissemination
• E-mail Spoofing
Future Technologies
1. 5G Smart Phone and Network. 5G is the fifth generation of cellular mobile
communications. It succeeds the 4G (LTE/WiMax), 3G (UMTS) and 2G (GSM) systems.
5G performance targets high data rate, reduced latency, energy saving, cost reduction,
higher system capacity, and massive device connectivity.
2. Avatars, Surrogates, and Robotics. While avatars (like this one from the game
Second Life) and surrogates were once just the stuff of games, virtual reality and
computer interfacing, now they’re taking on more active roles as replacements for
living, breathing humans.
3. Hologram in Retail Store. Stores of the future will offer increasingly immersive and
ultimately more reward experiences, rather than just being a place that customers
come to meet their material needs. This could include technology such as holography.
21
Summary
A Massive Open Online Course (MOOC) is an online course that has open access and
interactive participation by means of the Web. MOOCs provide participants with course
materials that are normally used in a conventional education setting - such as examples,
lectures, videos, study materials and problem sets.
22
Assessment: (Post-Test)
Multiple Choice. Answer the question that follows. Choose the best answer from among
the given choices.
1. This is a mechanical robot having the characteristics that do can things like humans.
A.5G C. Hologram
B. Smart Glass D. Avatar
2. It is category of technology that can be worn by a consumer and often include tracking
for information.
A. Wearable technology C. Smart Watch
B. Smart phone D. MOOCs
3. A technology that will calculate and monitor your heart rate.
A. Misfit Phase Hybrid C. Fitbit Charge 2
B. Heart Rate Monitoring Device D. Avatar
4. A form of technology-mediated communication that enables the user of a mobile device
to communicate with someone in a different location.
A. Telephone C. Mobile Phone
B. Laptop D. Mobile Communication
5. It is an open access and interactive way to facilitate students’ online study.
A. Massive Open Online Course C. 4G
B. Holography D. Fitbit charge
6. It is a cybercrime in which a target or targets are contacted by email, telephone or text
message by someone.
A. Phishing C. Cybercrime
B. Cyberbullying D. Hacking
7. It is the program which attach themselves to the computer or file and then circulate
themselves to other files and to other components on a network.
A. E-mail Spoofing C. Cyber Stalking
B. Virus D. Hacking
8. It is online harassment and online abuse it involves following a person’s movement
across the internet by posting threatening messages to the victim.
A. Hacking C. Virus
B. Cyber Stalking D. E-mail Spoofing
9. A person who breaks in or trespasses a computer system and gaining unauthorized
access to the data.
A. Hacker C. TV Broadcaster
B. Call Center Agent D. Radio DJ
10. It is a wireless handheld device that allows users to make and receive calls and to send
text messages, among other features.
A. Computer C. Mobile Phone
B. Telephone D. Laptop
23
References
James, Peckman. “ Best fitness tracker 2020:the top 10 activity bands on the planet”.
Accessed at January 17, 2020.https://www.techradar.com/news/wearables/10-
best-fitness-trackers-1277905
Rozalynn S. Frazier. “17 Best Fitness Tracker” . Accessed at January 17, 2020. https://
www.health.com/health/gallery/0,,20929976,00.html?slide=407559#40755
Terri, Briseno. “10 Futurist Predixtions in the world of Technology”. Accessed at January
17, 2020. https://electronics.howstuffworks.com/future-tech/10-futurist-predictions-
in-the-world-of-technology10.htm
techopedia.” Massive Open Online Course”. Accessed at January 17, 2020, https://
www.techopedia.com/definition/29260/massive-open-online-course-mooc
28