Module in TTL
Module in TTL
Module in TTL
CITY OF MANDAUE
MANDAUE CITY COLLEGE
Mandaue City Cultural and Sports Complex
Don Andres Soriano Ave., Centro, Mandaue City, Cebu, Philippines, 6014
Tel. Nos.: (032) 236-5520, (032) 420-9228 | E-mail: mc.college@hotmail.com
Prepared by:
Dr. Junry A. Eñego, TM
1
COURSE GUIDE
I. Course Title: Technology for Teaching and Learning 1
II. Course Credits: 3 units
III. Course Description: This is an introductory course that explores basic
knowledge, skills and values in the use of technology for teaching and
learning. It includes ICT policies and safety issues, media and
technology in various content areas, learning theories and principles in
the use and design of learning lessons, teaching-learning experiences
and assessment tasks that utilize appropriate traditional and innovative
technologies with social, ethical and legal responsibility in the use of
technology tools and resources.
IV.
2
Week 4 Safety and Security Issues of Explain the security Explain
and 5 ICT issues of ICT in the
modern world
Week 6 ICT National and International Differentiate the Evaluate
and 7 Policies national/local and
international policies
as regards the
modern ICT
Week 8 The Offline Community (Word, Practice the MS Explore
and 9 Excel, PowerPoint, etc.) Office applications for
better teaching and
learning process
Week 10 The Online Community Apply the different Explore
and 11 (Google classroom, Kahoot, online interventions
Hangaroo, etc.) for better teaching
and learning
experiences
Week 12 ICT towards the teaching and Make a classroom Explore
and 13 learning skills design with the used
of ICT
Week 14 Instructional Material with the Designing Explore
and 15 used of ICT Instructional Material
for teaching
demonstration
X. Grading System
Examinations - 50%
WOSA - 20%
Oral Participation - 20%
Attendance - 10%
XI. Contact details of the instructors:
09165129898/jhon10621@gmail.com
3
Rationale:
Computer Education allows students to learn and enjoy the use of technology
during virtual classes and during personal activities.
Technology opens new ideas to educate us especially during this global health
pandemic. Technology is the bridge of all the gaps in the educational system these
days where teachers can connect to their students, and students can study and
learn in the comfort of their homes.
In this EISU, the students will be acquainted with different terminologies and will
learn varied techniques in using some of the features and applications commonly
used in the world of technology.
4
Rubric on Making a Google Survey Form
Criteria 4 3 2 1
(Excellent) (Approaching (Average) (Needs
Excellent) Improvement)
Content The content of The content of The content of The content of
the ppt is well the ppt is the ppt is the ppt needs
arranged and somewhat arranged and to be
answers arranged and answers 75% arranged
100% of the answers 80%- of the queries properly and
queries of the 90% of the students. doesn’t
students. queries of the answer the
students. queries.
Theme The theme is The theme is The theme is The theme is
perfectly somewhat matched to not matched t
matched to matched to the content the content
the content the content and queries of and queries of
and queries of and queries of the ppt. the ppt.
the ppt. the ppt.
Result It is well It is somewhat The The
presented by presented by proponent is proponent did
the proponent the proponent simply not present to
to the to the presenting the audience
audience. audience. his/her ppt to during his/her
the audience. turn.
Time The student The student The student The student
submitted the submitted the submitted the submitted the
task before/on task 1-day task 1-2 day/s task 3 days
the deadline. after the after the after the
deadline. deadline. deadline.
5
Hi there!
I’m your virtual assistant guide in exploring this ISU. Since
you have already read the rationale of this ISU, let me ask
you the following questions:
1. What specific subject we are going to tackle in this ISU?
______________________________________________
2. Are you interested to learn the different topics on this
subject? _____ Why?_____________________________
_____________________________________________.
3. What are the things you know about this subject?
______________________________________________
_____________________________________________.
Thank
you!
Hey! Wait!
Before we begin, I want to see your
handsome/beautiful smile just like mine.
Can you do that for me by creating a smiley
face inside the box?
6
I understand that you are excited to start with our lessons in
this subject. I can feel your excitement! But, before we start,
I would like to know if you have any background information
about the lessons in stored for you. That way, I will know to
what extent will our sharing go.
Kindly answer the Unit Pretest.
Unit Pretest
I. Directions: Read and understand the statements below. Kindly write the
letter of the correct answer on the line provided after the number.
_______ 1. What does malware do?
a. It protects you from online threats.
b. It downloads harmful software into your computer.
c. It attacks you personally through posting or chatting.
_______ 2. Sophia encountered cyberbullies. What should she do?
a. Send them a virus.
b. Engage them in a discussion.
c. Ignore and do not reply to them.
_______ 3. Which of the following tells you what to do and what not to do in the
online world?
a. Phishing
b. Netiquette
c. Cyberbullying
_______ 4. What kind of website that allows you to ask questions to your audience
and they can answer via an online survey?
a. Google Online Form
b. Blog
c. Group
_______ 5. Mr. Reyes is into a cooking business. He plans to post pictures and
recipes of his dishes. What kind of blog is appropriate for his purpose?
a. Photoblog
b. Hobby blog
c. Personal blog
_______ 6. What kind of website is regularly updated by bloggers?
a. Wiki
b. Blog
c. Group
_______ 7. Which of the following is not needed in setting up an audio or video
conferencing?
a. Microphone
b. Web browser
c. Personal blog
_______ 8. Which tool helps you to connect, collaborate, and share your work with
others?
a. Blog
b. Group
7
c. Online tools
_______ 9. What Google survey tools is best to use if you are asking two or more
answers from your respondents?
a. Paragraph
b. Checkboxes
c. Multiple choice
_______ 10. Which of the following can be done in e-groups?
a. Format a document
b. Create a presentation
c. Post and comment on discussions
II. Directions: Read and analyze the statements below. Identify the computer
terminologies based on the given meaning and purpose. Write your answer
on the line provided after the statement.
1. It is a form used to refer to rules that show respect and courtesy to
people online. _______________
2. It is a combination of keyboard characters used to display emotion.
_______________
3. It is a free web-based e-mail service currently tested at Google that
provides users with a gigabyte of storage for messages and provides
the ability to search for specific messages. _______________
4. It is one of the top social networking sites, quickly gaining on Myspace
in terms of total users and traffic. _______________
5. It is a discussion or informational website published on the World Wide
Web consisting of discrete, often informal diary-style text entries.
_______________
III. Directions: Create a poster about responsible use of internet. Kindly
explain your poster in 3-5 sentences.
8
Great Job!
Were you able to answer the questions in the Unit Pretest with
ease? Do you think you got all the correct answers? We will find
out as we go along with our lessons.
Week 1
Parts of the Computer
Here are the most common online threats. We must always be on the lookout for
our safety
1. Phishing
This is a threat that tricks the user into his or her information, like a
username or password. This usually involves links leading to fake into those
fake sites, we then give out sensitive information that attackers use to hack
our other accounts. They would access our contacts and our friends, and they
would try to victimize them.
When personal and sensitive information is given out to the wrong people,
they would try to use that to their advantage.
9
Photo taken from www.blog.malwarebytes.com
2. Malware
This is a threat that downloads viruses like trojan horses, spyware, and
other harmful software into our computers. When these harmful programs
enter our computers, they would cause lots of problems working both online
and offline.
While surfing the internet, we may notice different windows that suddenly
pop up. These pop-ups are usually would show something of interest like
winning money or winning in a game. Then, when we accidentally click them
out on the computer it would start to malfunction because of a program or
software downloaded into the system.
10
Photo taken from www.csoonlines.com
4. Cyberbullying
Bullies are not only present in real life. They can also be lurking online
environment. In social media and networking sites, groups, chats, and discussion
boards some people would want to say mean and hurtful things about a person.
This is called cyberbullying. They would join forces and attack us personally
through posting or chatting.
Hi!
To learn more, please and scan the QR code below.
11
Week 1
Avoiding online Internet threats is not really hard. We can avoid these threats
by doing the following steps:
1. Think before we click.
Make this our golden rule while using the internet. Usually, anything that we
click may lead to a fake site, which will then make us prone to phishing or
malware.
2. Leave unknown sites.
Do this immediately to avoid threats that may lure us.
3. Do not post personal information.
Do not post home addresses, e-mail addresses, mobile numbers, and
passwords.
4. Only befriends the people we know.
It is safe to use the internet if we know whom we are interacting with.
5. Be careful with the people we meet online.
They may be bullies who may say mean things about us or attackers who
may victimize us.
6. Do not talk back to the cyberbullies.
We may encounter them online. We should not respond. If this happens,
we should let our teachers, parent, or guardians know.
7. Have the latest antivirus software installed in your gadget.
When we accidentally click malware, the antivirus software will protect your
computer from this threat.
Hi!
Week 2
World of Netiquette
There are ten (10) rules that we have to remember when dealing with online
people. These rules are divided into three (3) sections: cyber manners, cyber
12
smarts, and cyber communication. Dividing the rules into these sections will make
it easier for us to remember the basic rules.
1. Cyber Manners
We already know the dangers brought by the effects of cyberbullying. To
avoid this, we should avoid engaging in unnecessary conflicts with another
person online.
a. Be polite.
Remember how our parents used to remind us to say polite words. This
is the same thing when we are in the online world. If we do not want to
be bullied, we have to be polite to others as well.
b. Think before we write or type.
Chat box or message box allows you to communicate with other people.
Before sending a message, you have to think about it first before
clicking.
2. Cyber Smarts
Kindness is one aspect of netiquette but being smart while using the internet
is also another aspect. We have learned that there are threats to our safety
and security that are caused by malware or phishing. Following the rules
below will help us overcome these threats.
13
Emoticons Meaning Emoticons Meaning
:-) Smile ;-) Wink
:-( Frown :-O Shocked
:-\ Puzzled :-/ Skeptical
:-| Indifferent :’-( Crying
B-) Glasses :-D Laughing
Hi!
Activity No. 1
Week 2
Directions: Below are the pictures of common online threats. Give some ways on
how to avoid them. Your answer is graded based on the rubric below.
5 4 3 2
The answer is The answer is The answer is The answer is
accurate. The precise. The not specific but vague. No
examples are examples are the examples examples are
concretely evident somewhat are evident and given from the
and based on facts. correctly evident with limited context and
No grammar and and based on grammar and with grammar
spelling lapses. facts but have spelling lapses. and spelling
limited grammar lapses.
and spelling
lapses.
Phishing
1.________________________________
_________________________________
_________________________________
_________________________________
__________________________________
__________________________________
14
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
_____________________________________________________________.
Malware
2. ________________________________
__________________________________
__________________________________
__________________________________
__________________________________
__________________________________
___________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
_____________________________________________________________.
Cyberbullying
3. ________________________________
__________________________________
__________________________________
__________________________________
__________________________________
__________________________________
___________________________________
________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
_____________________________________________________________.
15
Week 2
Activity No. 2
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
16
Week 3
Activity No. 3
Directions: Expressing our thoughts and feelings to parents will give us at peace
while studying. This time, through the help of this activity you are going to express
or share your thoughts/feelings to your parents through chat massages. Kindly use
the proper emoticons and be polite while chatting your parents.
To: My Son/daughter
From: Father/Mother
Message: Dear Anak. How are you? I hope you are fine
while studying, despite of this health pandemic. I heard
from your Computer teacher that you have something
to say about us. We are worried about it. May we know
what it is?
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
17
Week 3
Republic of the Philippines
CITY OF MANDAUE
MANDAUE CITY COLLEGE
Mandaue City Cultural and Sports Complex
Don Andres Soriano Ave., Centro, Mandaue City, Cebu, Philippines, 6014
Tel. Nos.: (032) 236-5520, (032) 420-9228 | E-mail: mc.college@hotmail.com
II. Directions: Read and understand the statement below. Identify what is
being asked.
1. This guides online users Dos and Don’ts in the online world.
_______________
2. These are the combination of keyboard characters that can display to
online emotions. _______________
3. This can protect the online users from the threats even if he/she is
accidentally clicked the malware. _______________
4. This technique is used when online users are angry to other users in the
online world. _______________
5. This refers to one of the rules in netiquette that online users must do
their part for them to avoid unnecessary conflict with other users.
______________
18
Week 4
To create a Google account, the user must first establish a well dignified Gmail
account. This Gmail account serves as a recipient of any transactions you have
made in the different Google platforms through verification processes and let the
user “agree” on the term and conditions of the company. Therefore, it is a must for
us to create first a Gmail account. Here are the steps in creating a Gmail account.
19
Photo taken from www.just.edu.jo
4. Review the “Google Terms of Service” and “Privacy Policy” and click the
checkbox if you agree to their policy. Then, click “Next step” button.
20
6. Your Gmail account is now created. You will be directed with the Google
“Welcome” page. Note: Just like with any online services, it’s important to
choose a strong password.
21
Hi!
To learn more, please scan the QR code below.
Week 5
22
2. Name your survey form. You can also add a description if you want to
name the Google Form for your reference by clicking the “Untitled” in the
top left corner of the interface.
23
6. Click the side menu icons to add to your survey.
24
Photo taken from www.zapier.com
10. Click the Eye icon to preview your survey.
25
14. Fill in a subject line and message. People typically need a little coaxing to
answer a survey.
26
Photo taken from www.zapier.com
Hi!
Week 6
Engaging to the Facebook World
27
4. Feedback Mechanism. In a service-based sector like hospitality, customer
feedback is vital. Facebook allows users to communicate their experiences
directly and allow the company to respond.
5. Branding. Facebook can be used as a medium for creating brand awareness
in addition to a company’s corporate website. It provides brand exposure to a
potentially new audience and allows organizations to position themselves in
new and unique ways.
6. Drive Web Traffic. As a Facebook page grows its fan base, traffic to the
company website will increase. Facebook pages also appear in Universal
Search Result.
Hi! To learn more, please scan these QR codes below
on how to make a personal Facebook account and
business page.
28
Hi! To learn more, please scan the QR codes below on
the benefits of using Facebook Page to promote your
business.
Week 7
Types of Blog
Generally, we can write a blog about anything like playing water sports, cooking,
taking pictures, friends, environment, and among others. Here are the most
common blogs.
1. Personal Blog
A blogger can post about his or her life. This is called a personal blog.
BLOG BASIC
Before we can make a blog, we have to plan it out . Usually, we need to set the
following decisions:
1. Blogging goal
Guide questions:
• Why do we want to blog?
• What do we want to develop in ourselves and our readers?
2. Topic
Guide questions:
• What do we want to write about?
• What subtopics can we write about?
30
3. Time
Guide questions:
• How much time do we want to spend on our blog?
• Will we be able to post it every day?
• If not, how about every week?
4. Personal information
Guide questions:
• Do we want to post anonymously, or do we want to show our names?
• How much information about ourselves should we tell the reader?
5. Subject
Guide questions:
• Who are your actors and actresses in your blog?
• Who are the target audiences of your blog?
31
Week 8
Activity No. 4
Activity No. 5
A. Directions: People are exhausted due to this health pandemic. So, to ease their
boredom, they must find something to make their life more productive even if they
are in a quarantine period. In this activity, you are going to engage yourself in
blogging about your personal life by creating a Personal Blog You are provided
with different personal topics below. You are graded based on the rubric.
Suggested Topics:
1. It’s my family.
2. House raid
3. My quarantine life.
4. Hello! From my favorite pet.
5. Dear Hobbies!
Concept Has a clear picture of Has a fairly clear picture of Has brainstormed
what the student is trying what the student is trying to his/her concept but
to do and generally how achieve. Can describe what no clear focus has
his/her work will he/she is trying to do but has emerged.
contribute to the final trouble describing his/her
project. blog for the final project.
Quality The movie was The movie was completed The movie was
completed and had all the and contained all the made but had very
required elements. The required items. Editing was little if any editing.
video was well edited and not done as well as it should Many have poor
moves smoothly from the have been done. Some poor shots. Video is
scene with the proper use shots remain. The movie is fragmented and
of transitions. Audio and still somewhat choppy. choppy with little
other enhancements Audio and other audio
were well used. enhancements were utilized, reinforcement.
but not for maximum effect.
33
Week 10
I. Directions: Write True if the statement is correct and False if the statement
is incorrect.
1. The user should protect his/her password always. __________
2. There are more than 1 billion Facebook users all over the world.
__________
3. Google Form is used to ask electronic data from the user’s/maker’s
respondents. __________
4. The user can create his/her Facebook Page without personal account.
__________
5. Gmail is a free web-based e-mail service currently tested at Google that
provides users with a gigabyte of storage for messages and provides the
ability to search for specific messages. __________
6. Google Forms give users an easy way to create a survey that contains
as many questions as they need to ask, in a variety of styles. __________
7. Google Forms has several pre-made templates to choose from but you
cannot view them all. __________
8. Facebook pages can be managed through the page manager which
provides traffic statistics and access the browser. __________
9. A blog is the daily entries of a person's interest such as lifestyles, hobbies,
etc. __________
10. Planning a perfect theme before blogging may result positive outcomes.
__________
II. Directions: Read and understand the questions on types of blogs below.
Kindly write the answer on the blank provided.
1. It is a type of blog that focusses on the personal life of a creator.
_______________
2. It is a type of blog that collects different photos and posted them on the
wall of the creator’s blog such as travel and food. _______________
3. It is a type of blog that talks about the hobby of the creator such as
dancing, singing, etc. _______________
4. It is a type of blog that discusses about a certain topic of internet is an
example of an interesting blog. _______________
34
Yay! You’re done!
Now, it’s time for you to showcase the skills you’ve learned in this unit.
You will be given two (2) sessions to make and collate your Google
Survey Form as your performance task. Kindly refer to pages 2-3 for
the GRASPS and scoring rubric of this ISU.
REFERENCES
Book Source
Cobre, Elmeryn Joy, L. et al. (2017). Computers for Digital Learners Building
Technological Skills for Life Grade 6 Teachers Wraparound Edition. The Phoenix
Publishing House, Inc.
Electronic Sources
http://www.laptopmag.com/articles/create-survey-google-forms
https://whatis.techtarget.com/definition/Gmail
https://www.just.edu.jo/
https://blog.milestoneinternet.com/getting-social/why-is-facebook-important/
35