0% found this document useful (0 votes)
36 views12 pages

Week 1

The document provides information about online platforms, sites, and safety. It defines online platforms as structures that use the internet for communication, education, and business. Examples include Facebook, Amazon, and Uber. It distinguishes between Web 1.0 (static pages), Web 2.0 (user-generated content), and Web 3.0 (personalized "intelligent web"). The document also outlines online safety measures like avoiding sharing personal information, using secure websites, and keeping software updated to prevent threats from hackers, phishing, pharming and internet scams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views12 pages

Week 1

The document provides information about online platforms, sites, and safety. It defines online platforms as structures that use the internet for communication, education, and business. Examples include Facebook, Amazon, and Uber. It distinguishes between Web 1.0 (static pages), Web 2.0 (user-generated content), and Web 3.0 (personalized "intelligent web"). The document also outlines online safety measures like avoiding sharing personal information, using secure websites, and keeping software updated to prevent threats from hackers, phishing, pharming and internet scams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Modified Self-Learning Module SHS

APPLIED SUBJECT

Empowerment
Technologies
QUARTER 3, MODULE 1
ICT IN THE CONTEXT OF GLOBAL
COMMUNICATION

Writer:

Melorie M. Mutia
España National
0
High School
LESSON 1: INTRODUCTION TO
INFORMATION AND COMMUNICATION
I.TECHNOLOGIES
Most Essential Learning Competency
Compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges
(CS_ICT11/12-ICTPT-Ia-b-1)

At the end of the lesson, it is expected that you should be able to:

1. Identify varied online platforms and sites


2. Differentiate Web 2.0 and 3.0; and
3. Compare and contrast the nuances of varied online platforms, sites and
content.

II. CONTENT
What is online platform?
Online Platforms – is a structure or a place that uses internet that can be used by
people for different purposes. (Communication, educational and business purposes)
Examples of Online Platforms:
 Facebook
 Lazada
 Skype
 eBay
 Craiglist
 Amazon Marketplace
 Airbnb
 Uber
What are the different online platforms?
1. Assistive Media – this platform is created to help people with disabilities to
access computers. Example: Blind people
2. Collaborative Platform – categorized as a business software.
3. Convergent technologies – the technologies converging or coming together
to form another technology. Example: scanning technology, printing
technology and telecommunicating. (Simple example: phone with alarm,
calculator, camera, music, video, internet, etc)
4. Information and Communication Technology (ICT) – digital forms of
communication. Examples: cellular phones, computer network and hardware
and software, blogging and email.
5. Mobile Media – about media devices like mobile phones.
6. Online Systems – online versions of information systems for sharing,
managing, gathering of data and communications. We need internet to use
this system.
7. Social Media – gathers people to share information, interest and pictures in
virtual community. It allows people to interact with each other. Example:
Facebook, Instagram, Pinterest, twitter, YouTube

1
8. Web 2.0 – a dynamic web and a user-generated platform.
9. Web 3.0 – also known as “Intelligent Web” created more personalized than the
Web 2.0.
Online Site – a computer connected to the internet that maintains a series of web
pages on the World Wide Web. (Website)
Some Examples of Online Sites:
 Google.com
 Youtube.com
 Facebook.com
 Amazon.com
 Wikipedia.org
 Yahoo.com
 Reddit.com
 Twitter.com
 Instagram.com

The World Wide Web


The World Wide Web is an information system on the Internet that allows documents
to be connected to other documents by hypertext links, enabling the user to search
for information by moving from one document to another. It was invented by Tim-
Berners Lee. The World Wide Web browser software, such as Microsoft's Internet
Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, let users
navigate from one web page to another via the hyperlinks embedded in the
documents. These documents may also contain any combination of computer data,
including graphics, sounds, text, video, multimedia and interactive content that runs
while the user is interacting with the page. The Web has enabled individuals and
organizations to publish ideas and information to a potentially large audience online
at greatly reduced expense and time delay.
Types of Web Pages
1. Web 1.0 or The Web
 It is the first stage of the World Wide Web evolution.
 It is a flat or stationary page since it cannot be manipulated by the user.
 You can’t post comments or create an account.
2. Web 2.0 or The Social Web
allows users to interact with the page, the user may be able to comment or create a
user account. Most website that we visit today are Web 2.0.

Features of Web 2.0


 Folksonomy - It allows users to categorize and classify/arrange information
using freely chosen keywords (e.g., tagging). Popular social networking sites
such as Twitter, Instagram, Facebook, etc. use tags that start with the pound
sign (#). This is also referred to as hashtag.
 Rich User Experience - Content is dynamic and is responsive to user’s input.
An example would be a website that shows local content. In the case of social
networking sites, when logged on, your account is used to modify what you
see in their website.
 User Participation - The owner of the website is not the only one who is able
to put content. Others are able to place a content of their own by means of
comment, reviews, and evaluation. Some websites allow readers to comment
on an article, participate in a poll, or review a specific product (e.g.,
Amazon.com, online stores).

2
 Software as a Service - Users will subscribe to a software only when needed
rather than purchasing them. This is a cheaper option if you do not always
need to use a software. For instance, Google Docs is a free web-based
application that allows the user to create and edit word processing and
spreadsheet documents online. When you need a software, like a Word
Processor, you can purchase it for a one-time huge amount and install it in
your computer and it is yours forever. Software as a service allows you to
“rent” a software for a minimal fee.
 Mass Participation - It is a diverse information sharing through universal
web access. Since most users can use the Internet, Web 2.0’s content is based
on people from various cultures.
3. Web 3.0 or Semantic Web
 also called as Semantic Web
 Semantics – ability of Web technologies to understand and interpret
human-generated content
 The aim of Web 3.0 is to have machines understand the user’s preferences
to be able to deliver web content specifically targeting the user.
 The Internet is able to predict the best possible answers to your question
by “learning from your previous choices

Even though these online platforms are different, they still share the same goal and
that is to help individuals gather information, communicate and interact with each
other for a better living.
PRACTICE EXERCISES
ACTIVITY 1
Directions: Differentiate Web 1.0, Web 2.0, and Web 3.0 in your own words. (HINDI
ITO IPAPASA. ISULAT ITO SA INYONG NOTEBOOK/PAPEL PARA SA IYONG
PORTFOLIO.)
Web 1.0 Web 2.0 Web 3.0

Students answer may vary

3
LESSON 2: ONLINE SAFETY,
SECURITY, ETHICS, AND ETIQUETTE
I. Most Essential Learning Competency
Apply online safety, security, ethics, and etiquette standards and practice in the use
of ICTs as it would relate to their specific professional tracks (CS_ICT11/12-ICTPT-
Ia-b-2)
At the end of this lesson, you should be able to:

1. Identify what constitutes appropriate and inappropriate online behavior.


2. consider one’s and others’ reputation when using the Internet.

II. CONTENT
Online Safety – it is the practices and precautions that should be observed when
using the internet to ensure that the users as well as their computers and personal
information are safe from crimes associated with using the internet.
Internet – it is the information superhighway. This means that anyone has
access to this highway, can place information, and can grab that information.
Numerous delinquencies that can be committed on the internet:
 Stalking
 Identity theft
 Privacy violations
 Harassment
ONLINE SAFETY MEASURES
 Never give any personal information about yourself over the internet.
 Do not give any banking or sensitive information unless you are sure that it
is a reputable business having a secure service. To make sure that you are in
a secured network the website address should begin with https:// as opposed
to http://. Never access your accounts by following an email link, instead type
the URL by yourself.
 Never open messages or attachments from someone you do not know.
 Regularly review your privacy settings in your online accounts to make sure
you are not sharing important personal information.
 When using a public computer terminal, be sure to delete your browsing data
before leaving.
 Keep your software updated to avoid security holes.
 Do not download or install software or anything on your computer or cell
phone that is unknown to you.

ONLINE THREATS
Online threats – it is an act performed by a knowledgeable computer user like
hacker.
Hacker – illegally browses or steal someone’s information.

INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:

4
1. Phishing - its goal is to acquire sensitive personal information like passwords
and credit card details. This is done by sending you an e-mail that will direct the
user to visit a fake website and be asked to update his/her username, password,
credit card or personal information.
2. Pharming – a malicious website that resembles a legitimate website, used to
gather usernames and passwords.
3. Internet Scam – a type of scam that misleads the user in many ways attempting
to take lead of them. the purpose of this scam is to cheat the target of their
personal property directly rather than private information through fabricated
promises, confidence tricks and many more.
4. Internet Bots – a network of zombie computers that have been taken over by a
robot or bot that performs large-scale malicious acts for the creator of the botnet.
Captcha technology is used to avoid this type of security threat.
5. Malware – a generic term for spyware and adware. It is a malicious software
disguised as real software often secretly installed, intended to transfer and gather
private information, like passwords, without the user’s permission.
Types of Malware:
 Spyware - a program that runs in the background without you knowing it
(thus called “spy”). It has the ability to monitor what you are currently doing
and typing through keylogging.
Example: Keylogger - used to record keystrokes done by the user. This is done
to steal their password or any other sensitive information. The key logger
software typically uses log file to store its recording.
 Adware - a program designed to send you advertisements, mostly as pop-ups.
Examples: Banner Ads and Pop-up Ads
6. Virus - a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks, FDs, CDs, etc.)
Worm - a malicious program that transfers from one computer to another by any
type of means.
Examples:
 Trojan - a malicious program that disguises as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to
get your information.
 Iloveyou Virus – Also known as Love bug or love letter. The malware
originated in the Pandacan neighborhood of Manila in the Philippines on May
5, 2000.
7. Computer bug – a malfunction on a computer system through its runtime.
8. Cyber stalking – the use of the internet or other electronic device to harass or
stalk individual, group or organization.
9. Cyber bullying - the act of tormenting, threatening, harassing or embarrassing
another person using the internet or other technologies.
10. Spam – unsolicited email, instant messages or social media messages. These
messages are fairly easy to spot and can damaging if you open or respond.
11. Spoofing – describes a criminal who impersonates another individual or
organization with the intent to gather personal or business information.
Online Ethics and Etiquette
Online ethics focuses on the acceptable use of online resources in an online social
environment.
Netiquette is network etiquette, the do’s and don’ts of online communication.

10 Basic Rules of Netiquette


The rules of etiquette are just as important in cyberspace as they are in the real world
(Hartney 2020)

5
1. Make Real People a Priority
If you are talking personally and face to face with someone, stop browsing or
chatting with anybody else in your cellphone.
2. Use Respectful Language
Avoid name-calling, cursing, expressing deliberately offensive opinions. In typing,
don't use caps lock. Text in all caps is generally perceived as yelling or flaming
which cause misunderstanding and trouble. Please don't forget to say please and
thank you as appropriate.
3. Share with Discretion
Avoid sending naked sexy pictures, drunk pictures, drug use pictures or unedited
home video. If you would have a problem with your boss, your parents, or your
kids seeing it now, or at any point in the future, don't post it online. Children
should not post private information online. Do not also share your location or
picture where you are currently at. Keep your personal information private.
4. Don't Exclude Others
Don’t let others feel that they are the one you are talking to in your obscure
comment to your Facebook status, forum or Instagram story. And if you have an
in-joke to share with one other person, or a small number of people in a larger
online group, send them a private message.
5. Choose Friends Wisely
It is insulting to be dropped from someone's friend list on a social media site. So,
think about it before sending a friend request or accepting an invitation. If you
don't want to be in touch with someone, don't add them in the first place. This
must be observed by kids or teens so they will not be a victim of online predation.
People sometimes are good in pretending just to get your attention or use fake
accounts.
6. Respect People's Privacy
One example is when you send email to multiple recipients, don’t send it at once,
you can send it privately individually or use BCC (blind carbon copy) rather than
CC (carbon copy). The same goes for uploading photos or videos that include other
people because others who are in this photo don’t want to be viewed by unknown
friends. This also applies for tagging people on Facebook because others don’t
want to be tagged. Another example is don't sign up for newsletters and other
communications using someone else's email address. If you apply this rule,
hackers might not have chance to enter and ruin your digital life.
7. Fact Check Before Reposting
If you aren't sure of the facts that you’re going to repost, email it to someone who
does know or can find out. Or do a search on Google or snopes.com. Because
once you’ve reposted a fake news or false facts, many can possibly believe it and
spread once again. Don't forget also that many viruses are circulated via chain
letters and invitations. So forwarding or reposting this kind of messages will not
bring good luck but rather bad luck. Don’t forget to cite the owner of the post or
where it came from. And before posting, check whether it is appropriate or
inappropriate to others.
8. Respond to Emails Promptly
In doing this, you can easily check whether the emails you received are spams,
unsolicited messages or crafty stuffs and delete these right away. But if you send
your email to your friends or set it as public, then you need to respond
immediately. But double-check where it really came because there are people who
are fond of playing or making fake emails just to get in touch with you.
9. Update Online Information
Don't leave inaccurate information online that will mislead your friends or your
customers if you have an online business. If you have a business website, update

6
it regularly. Like your operating hours, if you are not available for that time,
change it right away.
10. Think before Click
Don’t hesitate to think before clicking because you might click an unknown links
or files that are likely to contain malware which will infect your devices or a link
to hacker’s website. Think before clicking Like in social media posts because it
might be a suicide post that will end to death because you liked his suicidal post.
There is no doubt that you need to be vigilant online. As the World Wide Web evolved
over the years, many internet predators have been playing on vulnerabilities to attack
computers and retrieve sensitive data from individuals. Half the time, we aren’t even
aware it is happening until it is too late.
Protecting Reputations Online
Here are the things you might want to consider before posting something over the
internet:
1. Before you post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your future
boss to see it?
2. If you feel that a post can affect you or other’s reputation, ask the one who posted
it to pull it down or report it as inappropriate.
Copyright Infringement
It is the use of works protected by copyright law without permission for a usage where
such permission is required.

Here are some tips that could help you avoid copyright infringement:
1. Always assume that the work is copyrighted.
2. Do not copy, share or alter without seeking permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or information.

PRACTICE EXERCISES
ACTIVITY 2 (HINDI ITO IPAPASA. ISULAT ITO SA INYONG NOTEBOOK/PAPEL
PARA SA IYONG PORTFOLIO.)

A. Direction: Suppose that you have a cyberstalker and you want to get rid of him,
and you want to control who can see what you share, it is time for you to set your
privacy settings of your Facebook account. What will you do? Isulat ang mga
hakbang kung paano gawing pribado ang account sa Facebook.

B. Direction: Examine the message below and answer the questions that follows.
Write your answers in your notebook/paper.
“Hello, STUPID! If you weren’t such an IDIOT, you’d understand why you’re
wrong about everything. But apparently you’re so RETARDED that you CAN’T
EVEN SPELL RIGHT. And also you’re FAT.” (Burnside 2019)
1. What kind of an internet threat do you think is this?

2. Why is this a threat to you?

3. What can you do to avoid this? Students answer may vary

7
Thank you for answering the practice exercises. If you answered the practice
exercises correctly, you are now ready to proceed to do the written works. If not,
please try until you arrived on the correct answer.

REFERENCES

Empowerment Technologies Rex Book Store, Inc. at 856 Nicanor Reyes Sr. St.,
Sampaloc, Manila, Philippines: First Edition 2016

Department of Education. First Edition 2016. Empowerment Technologies for the


Academic Track: Teacher’s Guide. Manila: DepEd Central Office.

Department of Education. First Edition 2016. Empowerment Technologies: Student


Reader. Manila: DepEd Central Office.

KEY TO PRACTICE EXERCISES


ACTIVITY 1
(Students’ answer may vary)

ACTIVITY 2
A. Just follow the steps.
For the Classic Facebook version:
1. Click in the top right of Facebook and select Settings.
2. Click Privacy in the left column.

8
1

3. Click Edit if you want to change the settings.


 You can choose Public, if you want your post to be
seen by anyone,
 Or restricted to your Friends only,
 Or Friends except… you can deselect friends from
the list,
 Or Specific friends, you can select few friends
 Or Only me, you are the only one who can see your
post.

B. It depends upon the answer of the student

9
Empowerment Technologies
Quarter 3 - Module 1 - Week 1
Name: _________________________________________ Grade/ Sec. _________ Score: ___
Teacher: ____________________________________ School: _________ Date: ___________
Sa bahaging ito isulat ang inyong mga sagot at gawain. Tanggalin ang pahinang
ito at ipasa sa inyong guro. Huwag kalilimutang ilagay ang pangalan at ang lagda
ng inyong magulang.
WRITTEN WORKS
Directions: Compare and contrast the implications of varied online platforms, sites
and content. Write down your insight below.
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Basis 3 2 1
Ideas presented is Ideas presented is Ideas has no clear
Content & Ideas
clear not well defined sense of purpose
Information is Information is Information is not
Information
relevant somewhat relevant relevant

Lagda ng magulang: ______________________


10
PERFORMANCE TASK

You will create campaign materials in the form of small posters promoting “Think
Before You Click”. Use bond paper.

5 4 3 2
All of the Most of the Few of the The contents
campaign campaign campaign are not aligned
poster’s poster’s poster’s with the
Content
elements are elements are elements are advocacy
aligned with aligned with aligned with
the advocacy the advocacy the advocacy
The ideas are The ideas are The ideas are The ideas are
fully developed, not fully not developed,
developed, somewhat developed, lack focus and
Creativity
focused and focused and focused or are not
original are good but original original
not original
Appearance Appearance Appearance Appearance
shows time is neat, is not neat and is unfinished
and effort. colorful. lacks color. and reflects
Appearance Poster is neat, that little time
colorful and and effort were
attention- put forth.
grabbing.

11

You might also like