Mindanao Community School, Inc.: Empowerment Technologies
Mindanao Community School, Inc.: Empowerment Technologies
Empowerment
Technologies
____________________________________________________________________
Name
Grade 12
[ ] HUMSS [ ] CSS
Module 1 - 3
Mindanao Community School, Inc. || Empowerment Technology
1. How many times have you checked your phone this morning?
2. How many status updates have you posted in Facebook or Twitter today?
3. Did you use the Internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?
If you happen to be “guilty as charged” in most of these questions, chances are, you are a digital native. And chances are, from the
moment you were born, you were surrounded by technology. You are surrounded by ICT.
Digital Native is a person born or brought up during the age of digital technology and therefore familiar with computers and
the Internet from an early age.
What is It?
As the famous saying goes, "Love makes the world go round." But you might argue how the Internet has made the world go round
for decades before you start searching for someone to fall in love with. Likewise, the Internet has probably made your world go
round in the motivation activity. In this lesson we will understand how information and communication technologies in such a
short period of time have improved our lives.
Having a unified way to communicate is one of the goals of ICT. We spend less because of ICT.
1
Mindanao Community School, Inc. || Empowerment Technology
Web 1.0
• Web pages are static and not interactive. You can’t post comments or create an account.
Examples of Websites in Web 1.0
Web 2.0
• term used to describe the present generation of the World Wide Web that concentrates on its capability of providing people
the means to collaborate and share information online.
• The second stage in World Wide Web
• Dynamic Website o The content of the website changes
• Interactive o The user may be able to comment or create user account
• enables an increased user participation in the web
• Darcy DiNucci, an information architecture consultant, coined the term Web
2.0 in her 1999 article,
“Fragmented Future”.
• The term was popularized by Tim O'Reilly and Dale Dougherty at the O'Reilly Media Web 2.0 Conference in late 2004
(TechTarget, 2015).
2
Mindanao Community School, Inc. || Empowerment Technology
• Rich User Experience - Content is dynamic and is responsive to user’s input. An example would be a website that shows
local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their
website.
• User Participation - The owner of the website is not the only one who is able to put content. Others are able to place a
content of their own by means of comment, reviews, and evaluation. Some websites allow readers to comment on an article,
participate in a poll, or review a specific product (e.g., Amazon.com, online stores).
• Software as a Service - Users will subscribe to a software only when needed rather than purchasing them. This is a
cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that
allows the user to create and edit word processing and spreadsheet documents online. When you need a software, like a Word
Processor, you can purchase it for a one-time huge amount and install it in your computer and it is yours forever. Software as
a service allows you to “rent” a software for a minimal fee.
• Mass Participation - It is a diverse information sharing through universal web access. Since most users can use the
Internet, Web 2.0’s content is based on people from various cultures.
Web 3.0
Trends in ICT
As the world of ICT continues to grow, the industry has focused on several innovations. These innovations cater to the needs of the
people that benefit most out of ICT. Whether it is for business or personal use, these trends are current front runners in the
innovation of ICT.
1. Convergence
• Technological convergence is the combination of two or more different entities of technologies to create a new
single device.
• Example: Using of smartphone to create word documents that was previously can only be created using desktop
computer.
3
Mindanao Community School, Inc. || Empowerment Technology
2. Social Media
• It is a website, application, or online channel that enables web users to create, co-create, modify, and exchange user-
generated content.
• Types of Social media:
1. Social Networks - sites that allow you to connect with other people with same interests or background.
Examples: Facebook, Google+
2. Bookmarking Sites - sites that allow users you to store and manage links to various websites and
resources, and to tag
Examples: StumbleUpon, Pinterest
3. Social News - sites that allow users to post their own news items or links to other news
sources.
Examples: reddit, dig
4. Media Sharing - sites that allow you to upload and share media content like images, music, and video.
Examples: Flickr, YouTube, and Instagram
5. Microblogging - sites that focus on short updates from the user. Those who are subscribed will receive
updates.
Examples: Twitter Plurk
6. Blogs and Forums - sites that allow users to post their content.
Examples: Blogger, WordPress, Tumblr
3. Mobile Technologies
• The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’
capability to do tasks that were originally found in personal computers.
• Different types of mobile operating systems:
1. iOS – used in Apple devices such as the iPhone and iPad
2. Android – an open source operating system developed by Google. Being open source means several mobile
phone companies use this OS for free.
3. Blackberry OS – used in blackberry devices
4. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft
5. Symbian – the original smartphone OS used by Nokia devices
6. WebOS – originally used for smartphones; now used for smartTVs
7. Windows Mobile – developed by Microsoft for smartphones and pocket PCs.
4. Assistive Media
• It is a nonprofit service designed to help people who have visual and reading impairments. A database of audio
recordings is used to read to the user. You may visit http://assistivemedia.org/ for several of their audio recordings.
4
Mindanao Community School, Inc. || Empowerment Technology
5
Mindanao Community School, Inc. || Empowerment Technology
The Internet is defined as the information superhighway. This means that anyone has access to this highway, can place
information, and can grab that information. This is why social networking sites like Facebook continue to improve their security
features. The threat of cybercrime is very real. Whatever information we share today could affect our future.
The Internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using the
internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be
able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face/
7. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date.”
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. But the software, do not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites
Most people would dispute that there is no such thing as private over the Internet and they may be right. Some hackers can find a
backdoor even if your profile is already set to private. You have no control whoever is looking at your friend's screen whenever
they open your profile or chat with you.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware – or malicious software, is any program or file that is harmful to a computer user.
Types:
a. Virus - a malicious program designed to replicate itself and transfer from one computer to another (internet, local
networks, FDs, CDs, etc.)
b. Worm - a malicious program that transfers from one computer to another by any type of means.
Ex. ILOVEYOU Worm - The malware originated in the Pandacan neighborhood of Manila in the Philippines on May
5, 2000.
6
Mindanao Community School, Inc. || Empowerment Technology
c. Trojan - a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
d. Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the ability to
monitor what you are currently doing and typing through keylogging.
Ex. Keylogger – used to record keystrokes done by the user. This is done to steal their password or any other
sensitive information. The key logger software typically uses log file to store its recording.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware - or ransom software is a type of malicious software from cryptovirology that threatens to publish the
victim's data or perpetually block access to it unless a ransom is paid.
2. Spam - an unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing - its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending
you an e-mail that will direct the user to visit a fake website and be asked to update his/her username, password, credit card
or personal information.
Here are the things you might want to consider before posting something over the internet:
1. Before your post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it?
2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
Copyright Infringement
It is the use of works protected by copyright law without permission for a usage where such permission4 is required.
Here are some tips that could help you avoid copyright infringement:
7
Mindanao Community School, Inc. || Empowerment Technology
What is It
Did you type the whole question on the search box? Are you sure that you get your answer from reliable websites? Are the
authors of article you get your answers from are credible? Are there articles listed on the search results that re irrelevant to
your question?
On this lesson, we will learn how to evaluate website’s credibility and use keywords to specify our search term.
Here are the things that you need to know to improve your online search and research skills. This will guide you to obtain the
most relevant information that you need.
1. When searching online, narrow your topic. Identify the key concepts or important ideas. Assuming that you
would like to search for the answer to this question:
“What precautionary measures should you observe when you are logged-in in a public
computer?”
Keywords are terms that are used in by most search engines to find related documents.
2. Put the word “AND” between each keyword to create a search string. You may type the following in
the search box:
Precautionary measures AND observe AND logged-in AND public computer
8
Mindanao Community School, Inc. || Empowerment Technology
3. Identify synonyms of the key words. Not all databases or articles use the same words to describe a topic. Group
similar words together by using the word “OR” for a quick and relevant search.
In the case of our example: the synonyms of some of the keywords are:
Precautionary measures – preventive measures
Observe – pay attention to
Logged-in – signed-in
You may type the following in the search box:
Precautionary measures OR preventive measures AND observe OR pay attention to AND logged-
in OR signed-in AND public computer
If you think you have found what you are searching for, then you may stop here. Otherwise, you may proceed with these other
techniques.
5. Use the plus (+) sign for a more specific search. Just type + before a keyword to indicate that the word after
the sign is a required word that must be found in the search.
Example: +preventive measures
9
Mindanao Community School, Inc. || Empowerment Technology
6. Use the minus (-) sign for a more specific search. If you want to exclude a word from your search, place a
minus sign just before (without any space) the word you want to exclude.
Example: public computers -personal
7. Use wildcards for a broader search. Wildcard characters (*) let you find variations of a word.
Example: measur*
8. Use quotation marks to find phrases or names. Enclose the phrase or names that you want to search in
quotation marks.
Example: “precautionary measures"
9. Use several search engines. Search engines are programs that look for documents based from specified keywords
and return these documents where the keywords were found. Major search engines include Google, Yahoo (which uses
Google), AltaVista, Bing, and Lycos.
Evaluating Websites
To help you evaluate the website’s credibility, here are the questions that you need to answer:
3. What is the purpose of the document and why was it produced? It is also important to check the
document’s purpose and why it was produced. The document should provide accurate information and must be objective in
presenting it. Some websites produce documents for the purpose of motivating users to buy products. If this is the case,
information might be biased. However, bias is not necessarily bad but you need to investigate the author or connections.
10