0% found this document useful (0 votes)
34 views12 pages

Module 1emtech

This document provides an overview of information and communication technology (ICT) and discusses its role and impact. It begins with definitions of ICT and examples of how it has integrated into daily life through technology like phones, computers, and the internet. It then focuses on the growth of ICT industries in the Philippines and the impact of the internet and world wide web on communication and commerce. Finally, it differentiates between web 1.0, 2.0 and 3.0, providing features of web 2.0 like tagging and user participation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views12 pages

Module 1emtech

This document provides an overview of information and communication technology (ICT) and discusses its role and impact. It begins with definitions of ICT and examples of how it has integrated into daily life through technology like phones, computers, and the internet. It then focuses on the growth of ICT industries in the Philippines and the impact of the internet and world wide web on communication and commerce. Finally, it differentiates between web 1.0, 2.0 and 3.0, providing features of web 2.0 like tagging and user participation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

CLARENDON COLLEGE INC.

Odiong, Roxas, Oriental Mindoro


Tel: (043) 289-7056 / [email protected]
EMPOWERMENT TECHNOLOGIES
MODULE 1
ICT IN THE CONTEXT OF GLOBAL COMMUNICATION
LESSON 1: INFORMATION AND COMMUNICATION TECHNOLOGY
ACTIVITY: LOOP THE WORD
Directions: Search the words that are related to ICT. The words have been placed horizontally, vertically, or diagonally
frontwards or backwards.

What is Information and Communication Technology?


Information and Communications Technology (ICT) often deals with the use of different technologies such as
mobile phones, telephones, computer, Internet, and other devices, as well as software and applications to locate, save,
send, and manipulate information.

Reflect on the following questions:


 How many times have you checked your phone this morning?
 How many updates have you posted on Facebook, Twitter, or Instagram today?
 Do you use the internet/ mobile for an hour after you woke up this morning? ✓ Have you followed a celebrity/ a
crush on his/ her social media?

ICT has greatly contributed to how easy our lives has been today. Our gadgets have become part of our necessity
that we check on them after we wake up. It made communication easier. We can use cellular phones that are designed for
communicating with other people even they are miles away from us. It has also assisted us in our work since there are
Internet-based jobs. It has revolutionized our education and in the modernization of our economy.

ICT in the Philippines


Philippines is dubbed as the ―ICT Hub of Asia‖ because of huge growth of ICT-related jobs, one of which is
BPO, Business Process Outsourcing, or call centers. In a data gathered by the Annual Survey of Philippines Business and
Industries in 2010, the ICT industry shares 19.3% of the total employment population. When the internet was fully
commercialized in 1995, it has tremendously impacted culture and commerce, including the rise of near instant
communication by email, instant messaging, telephony (Voice over Internet Protocol or VoIP), two-way interactive video
calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. Internet is
the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate
between networks and devices.

The World Wide Web


The World Wide Web is an information system on the Internet that allows documents to be connected to other
documents by hypertext links, enabling the user to search for information by moving from one document to another. It
was invented by Tim-Berners Lee. The World Wide Web browser software, such as Microsoft's Internet Explorer/Edge,
Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, let users navigate from one web page to another via the
hyperlinks embedded in the documents. These documents may also contain any combination of computer data, including
graphics, sounds, text, video, multimedia, and interactive content that runs while the user is interacting with the page. The
Web has enabled individuals and organizations to publish ideas and information to a potentially large audience online at
greatly reduced expense and time delay.
Types of Web Pages
 Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat or stationary page since it
cannot be manipulated by the user.
 Web 2.0 or The Social Web allows users to interact with the page, the user may be able to comment or create a
user account. Most website that we visit today are Web 2.0.
 Web 3.0 or Semantic Web. The semantic web provides a framework that allows data to be shared and reuse to
deliver web content specifically targeting the user. Search Engine will learn about you and your habits from each
search you perform and will gather details about you from your previous activities like likes and social postings
and present the answers as per your preferences.

Features of Web 2.0


FEATURES WEB 2.0
FOLKSONOMY allows users to collectively classify and find information using freely chosen keywords
(e.g. "tagging" by facebook). Tagging uses the pound sign #, often referred to as hashtag.)
RICH USER dynamic content that is responsive to user input (e.g., a user can “click” on an image to
EXPERIENCE enlarge it or find out more information)
USER PARTICIPATION the owner of website is not the only one who is able to put content. Others are able to
place a content on their own by means of comments, reviews, and evaluation.
LONG TAIL services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you
spent on the Internet, or a data plan that charges you for the amount of bandwidth you
used.
SOFTWARE AS A users will subscribe to a software only when needed rather than purchasing them.
SERVICE
ACTIVITY: WHERE DO I BELONG?
DIRECTIONS: Using the Internet, look for the webpages of the pages listed below. Evaluate whether they are Web 1.0,
Web 2.0, or Web 3.0. Write your answers in your activity notebook.

LESSON 1.1: ONLINE PLATFORMS AND SITES


Because of the wide capacity of Web 2.0, it has helped in creating dynamic online platform sites. Online platform is a
specially developed platform using Internet technology. Online platforms have revolutionized access to any information.
Online platforms currently include, but are not limited to:
 Presentation or Visualization
 Cloud Computing
 File Management
 Mapping
 Social Media
Let us go through them one by one!
1. Presentation or Visualization Platform allows you to present and share presentations, infographics and videos
with other people. It is used to communicate information clearly and efficiently.
2. Cloud Computing Platform is also called as ―The cloud.II It is the practice of using a network of remote servers
hosted on the internet. Instead of using your computer’s hard drive, you store and access your data and programs
over the Internet.
3. File Management Platform is used for the storing, naming, sorting, and handling of computer files. Allows you
to convert and manage files without downloading the software tool.
4. Mapping Platform is a transformation taking the points of one space into the points of the same or another space.
Uses GPS to detect location and for navigation.
5. Social Media Platform is a computer-mediated tools that allow large group of people to create, share or exchange
information, interest and the information shared can be in the form of ideas, pictures, videos, or anything that you
want to create and share to virtual communities. It can be in the following platforms:
 Social Networks. These sites allow you to connect with other people with the same interests or
background.
 Bookmarking Sites. These are sites that allow you to store and manage links to various websites and
resources.
 Social News. These are sites that allow users to post their own news items or links to other news sources.
 Media Sharing. These are sites that allow you to upload and share media content like images, music, and
video. Media sharing sites can be specific for video sharing, photo sharing, slide sharing, social
bookmarking, and gaming.
 Microblogging. These are sites that focus on short updates from the user. Those subscribed to the user
will be able to receive these updates. Posts are brief that range typically from 140 – 200 characters.
 Blogs and Forums. These are websites that allow users to post their content. Other users can comment on
the said topic.
ACTIVITY: REFLECT ON ME!
Directions: Reflect on the following questions and answer them briefly on a one whole sheet of paper. Please refer to the
rubrics on the next page.
1. How dependent are we on technology?
2. How do the different online platforms help you as a student in your chosen track?
Rubrics for grading:

ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of
paper or in your notebook.
1. What type of web provides a framework that allows data to be shared and reused to deliver web content
specifically targeting the user?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Website
2. Which of the following is an example of sites under web 2.0?
A. Facebook B. YouTube C. Wikipedia D. All of the above
3. What type of web page is classified as flat or stationary?
A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0
4. Twitter statuses are only composed of a few characters. What type of social media site does Twitter belong to?
A. Micro blogging B. Media Sharing C. Social Networks D. Bookmarking Sites
For #’s 5-6, use the choices inside the box.
A. If only the FIRST statement is TRUE. C. If BOTH statements are TRUE.
B. If only the SECOND statement is TRUE. D. If BOTH statements are FALSE.
5. Social networks are sites that allow you to connect with other people having the same interests. It allows you to
share your own news and other news from other sources.
6. The Philippines is considered as the ―ICT Hub in Asia. The ICT Industry shares 19.3% of the total employment
population in the Philippines coming from the government agencies.
7. Marisa wants to publish her collections of original poems online. Which online platform must she do this?
A. Social News B. Bookmarking Site C. YouTube D. Blogs
8. Watson is creating a cover video of his favorite song. Which online platform must he publish this?
A. Social News B. Bookmarking Site C. YouTube D. Blogs
9. Cathy has created a very good slideshow presentation on a certain topic, and she wants to share it to other teachers
around the world. Which online platform must she publish this?
A. Presentation Platforms C. File Management Platforms
B. Cloud Computing Platforms D. Social Media Platforms
10. What is the name of the symbol that is used to classify and categorize information?
A. Hashtag B. Question Mark C. Asterisk D. At sign

LESSON 2: ONLINE SAFETY, SECURITY AND NETIQUETTE


The internet is the guiding technology of the Information Technology Age just as the electrical engine was of the
Industrial Age. In these times, more and more people are already engaged in the use of technology. These people who are
raised in a digital, media-saturated world are called digital natives. No doubt, the Internet has been very useful to us but
with the rise of instant messaging, chat rooms, emails and social networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers, including exposure to sexual predators. Thus, internet safety is always our
primary concern.

ACTIVITY:

Read the headlines found below and try to reflect on the questions that follow. (ABS-CBN News Topic Page on Identity-theft.
Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.)
Reflect on the following questions:
 What is common among the headlines above?
 Are your social media accounts secured enough that you may not be a victim of these things?
 What type of information do you share in your social media accounts?
There's almost no limit to what you can do online. The Internet makes it possible to access information quickly,
communicate around the world, and much more. Unfortunately, the Internet is also home to certain risks, such as
malware, spam, and phishing. If you want to stay safe online, you'll need to understand these risks and learn how to avoid
them.

ACTIVITY: SHARED OR NOT SHARED? THAT IS THE QUESTION


Directions: Read and reflect on each item carefully. Copy the table below on your notebook and check the space whether
you have shared or not shared these pieces of information in all your social media accounts.

 How many of these information have you SHARED?


 How many of these information have you NOT SHARED?
 Based from your answers above, do you think you are safe when using the Internet? Why?

LESSON 2.1: ONLINE SAFETY, SECURITY AND NETIQUETTE


Online safety refers to the practices and precautions that should be observed when using the internet to ensure that
the users as well as their computers and personal information are safe from crimes associated with using the internet.
Below are personal information that must be kept confidential.

There are numerous delinquencies that can be committed on the internet such as stalking, identity theft, privacy
violations, and harassment.

To avoid these online crimes, follow the following online safety measures:
 Never give any personal information about yourself over the internet.
 Do not give any banking or sensitive information unless you are sure that it is a reputable business having a
secure service. To make sure that you are in a secured network, the website address should begin with “https://’ as
opposed to ―http://. Never access your accounts by following an email link, instead type your URL by yourself.

(Info source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate )

 Never open messages or attachments from someone you do not know.


 Regularly review your privacy settings in your online accounts to make sure you are not sharing important
personal information.
 When using a public computer terminal, be sure to delete your browsing data before leaving.
 Keep your software updated to avoid security holes.
 Do not download or install software or anything on your computer or cell phone that is unknown to you.

Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly online.
Below are the 10 rules of netiquette:

Flame war is a series of flame posts or messages in a thread that are


considered derogatory in nature or are completely off-topic. Often
these flames are posted for the sole purpose of offending or
upsetting other users. The flame becomes a flame war when other
users respond to the thread with their own flame message.

Image from: https://twitter.com/Parkster00/status/1246347088625045504

LESSON 2.2: KINDS OF ONLINE THREATS


There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the years, many
internet predators have been playing on vulnerabilities to attack computers and retrieve sensitive data from individuals.
Half the time, we aren’t even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a computer network without
authorization or permission from the owners. These are usually done by computer hackers who use the World Wide Web
to facilitate cybercrime. Web threats use multiple types of malwares and fraud, all of which utilize HTTP or HTTPS
protocols, but may also employ other protocols and components, such as links in email or Instant Messaging apps, or any
malware attachments on servers that access the Web. They benefit cybercriminals by stealing information for subsequent
sale and help absorb infected PCs into botnets. Web threats pose a broad range of risks, including financial damages,
identity theft, loss of confidential information/data, theft of network resources, damaged brand/personal reputation, and
erosion of consumer confidence in e-commerce and online banking.

The following are the top kinds of online threats that you should be aware of:
 Phishing happens when an email is sent from an internet criminal disguised as an email from a legitimate,
trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
 Pharming happens when a hacker (or ―pharmer) directs an internet user to a fake website instead of a legitimate
one. These ―spoofed‖ sites can capture a victim’s confidential information, including usernames, passwords, and
credit card data, or install malware on their computer. Pharmers usually focus on websites in the financial sector,
including banks, online payment platforms, or other e-commerce destinations.

 Internet Scam generally refers to someone using internet services or software to defraud or take advantage of
victims, typically for financial gain. Cybercriminals may contact potential victims through personal or work
email accounts, social networking sites, dating apps, or other methods in attempts to obtain financial or other
valuable personal information. Online scams may come in various forms such as lottery scams, charity fraud
scams, job offer scams, and online dating scams to name a few.

 Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is programmed
to do certain tasks. Bots are automated, which means they run according to their instructions without a human
user. Some bots are useful, such as search engine bots that index content for searches or customer service bots that
help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact
information for sending spam, or perform other malicious activities. If it's connected to the Internet, a bot will
have an associated IP address.
 Malware or malicious software is any program or file that is harmful to a computer user. Here are the most
common offenders in the rogues’ gallery of malware:
o Adware (advertising supported software) is unwanted software designed to throw advertisements up on
your screen. Example, pop-up ads and banner ads.
o Spyware is malware that secretly observes the computer user’s activities without permission and reports it
to the software’s author. Example is a keylogger.
o Virus and Worms are malware that attach to another program and, when executed—unintentionally by the
user—replicates itself by modifying other computer programs and infecting them with its own bits of
code.
o Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as
something useful in order to trick you.
Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected
computer. From there, Trojans can be used to steal financial information or install threats like viruses and
ransomware.
o Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then
forces you to pay a ransom to get them back.
 Spam is unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for
the message to be sent. Spam messages can be damaging if you open or respond to it.
 Cyberstalking refers to the use of the internet or other electronic devices to harass or stalk individuals or
organizations.

 Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using the internet.

 Spoofing happens when someone or something pretends to be something else to gain our confidence, get access to
our systems, steal data, steal money, or spread malware.

ACTIVITY: SHOW ME HOW YOU HASHTAG


Direction: Look at the following images and create a hashtag based on the type of online threat represented by each
image. Write your answers in your activity notebook.
ACTIVITY: REFLECT ON ME 2
Directions: Reflect on this.

From all you have learned in Lesson 2, why is there a need to ―think before you click?”

ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet
of paper.
1. What type of malicious program is designed to replicate itself and transfer from one computer to another either
through the internet or local networks or data storage like flash drives and CDs?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
4. What is ransomware based on?
A. Fear of hackers C. Fear of spyware
B. Fear of the Internet D. Fear of losing important files
5. Which of the following is an example of a ―phishing‖ attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone
reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their
login information.
C. Sending someone a text message looks like a notification that the person has won a contest. D. Sending
someone an email that records their keystroke activities while using their computers.
6. Which of the following must NOT be done if you received an embarrassing picture from your friend?
A. Tell your parents or teachers.
B. Send the picture to other friends.
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
7. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letters.
D. A post or email message that expresses a strong opinion or criticism.
8. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
10. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn’t mean to hurt someone's feelings, then it's okay.
D. You are judged by your based on your photos posted.
ASSIGNMENT: WHAT’S IN MY NAME?
Direction: Write all your answers in your activity notebook.
1. Using the Internet, try to search for your complete name.
2. Write down how many sites have featured your personal name and what is written about you.
3. Answer the following:
a. What other information are written about you?
b. Are the search results coming from reliable sources? Why?
c. Should these bits of information need to be posted or shown in public?

One to two students will share their assignment in front of the class.
LESSON 3: EFFECTIVE INTERNET RESEARCH
The Internet has made our lives easier, especially in terms of doing research. By browsing the internet, we can
access limitless topics. Web-based catalogs are available in many libraries to assist researchers in locating printed books,
journals, government documents and other materials. The biggest obstacle facing all researchers on the internet is how to
access the vast amount of information available effectively and efficiently (The Internet: Research Tools, 2013).

LESSON 3.1: SEARCHING THE WEB


There are billions of information on the web and it is a challenge for us to truly find which information is reliable and
relevant. Here are some tips you may use to be able to look for relevant and reliable sources:
 Search Engines are websites used for retrieval of data, files, or documents from data bases. Some search engines
we use today are:

Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types of names and addresses
that refer to objects on the world wide web. Knowing the URL endings will give you clues to who is sponsoring the
website and help evaluate the sources.

Popular Domains

 Search Skills and Tools


1. Boolean Logic – narrows, broadens, or eliminates search term.
a. Boolean “or” – this operator will find pages that include either of the search terms. Ex. A or B
b. Boolean “and” – this operator will retrieve only pages containing both terms Ex. A and B
c. Boolean “not” – this operator will find pages that do not include search term immediately following it. Ex.
A not B
2. Phase Searching – is used to search for famous quotes, proper names, recommendations, etc. It encloses the
phrase in quotation marks. Ex. ―Jane Doe―To be or not to be.
3. Plus (+) – indicates that the word after the sign is a required word must be found in search. Example: +fire
4. Minus (–) sign – indicates to exclude a word from your search that is not required on the result. Example:
Jaguar speed –car 5.
5. Ampersand (@) is used to find social tags. Example: @SteveJobs
6. Hashtag (#) is used to find popular hashtags. Example: #LawOfClassroom
7. Finding Documents – using the filetype refines the search for documents on the web.
o filetype:pdf
o filetype:doc
o filetype:xls
Ex. ICT in the Philippines pdf
8. Searching Site – the sites find webpage from a website. Ex.: National Geographic information in Australia
Search: Australia site: NationalGeographic.com
LESSON 3.2: EVALUATING SITES
The web provides access to some excellent information and can also give access to those that are irrelevant and
outdated. Here is some checklist that you can use to evaluate your website:
1. Authority. It reveals that the person, institution or agency responsible for a site has the qualifications and
knowledge to do so. Evaluating a web site for authority:
✓ Authorship: It should be clear who developed the site.
✓ Contact information should be clearly provided: e-mail address, snail mail address, phone number, and fax
number.
✓ Credentials: the author should state qualifications, credentials, or personal background that gives them
authority to present information.
✓ Check to see if the site supported by an organization or a commercial body
2. Purpose. The purpose of the information presented on the site should be clear. Some sites are meant to inform,
persuade, state an opinion, entertain, or parody something or someone. Evaluating a web site for purpose:
✓ Does the content support the purpose of the site?
✓ Is the information geared to a specific audience (students, scholars, general reader)?
✓ Is the site organized and focused?
✓ Are the outside links appropriate for the site?
✓ Does the site evaluate the links?
3. Coverage. This refers to how comprehensive the website is in their discussion of certain topics. Evaluating a web
site for coverage:
✓ Does the site claim to be selective or comprehensive?
✓ Are the topics explored in depth?
✓ Compare the value of the site’s information compared to other similar sites.
✓ Do the links go to outside sites rather than its own?
✓ Does the site provide information with no relevant outside links?
4. Currency. It refers to: (1) how current the information presented is, and (2) how often the site is updated or
maintained. It is important to know when a site was created, when it was last updated, and if all of the links are
current.
Evaluating a web site for currency involves finding the date information was:
✓ first written
✓ placed on the web
✓ last revised
5. Objectivity. Objective sites present information with a minimum of bias. Evaluating a web site for objectivity:
✓ Is the information presented with a particular bias?
✓ Does the information try to sway the audience?
✓ Does site advertising conflict with the content?
✓ Is the site trying to explain, inform, persuade, or sell something?
6. Accuracy. It refers to the credibility of the website. Evaluating a web site for accuracy:
✓ Reliability: Is the author affiliated with a known, respectable institution?
✓ References: do statistics and other factual information receive proper references as to their origin?
✓ Is the information comparable to other sites on the same topic?
✓ Does the text follow basic rules of grammar, spelling, and composition?
✓ Is a bibliography or reference list included?

Website evaluation is an important skill that everyone should practice and master through time. It is always
important to learn which information are relevant and reliable to be able to avoid misinformation and be a victim of fake
news.

ASSESSMENT
Direction: Read each item carefully and choose the letter of the correct answer.
1. What happens when a phrase or sentence is placed inside quotation marks when doing research?
A. Will only return items that have both terms.
B. Will search for words that are together and in order.
C. Will return items that exclude a term.
D. Will return items that have either of the terms.
2. What is a URL?
A. A computer software program
B. An acronym for Unlimited Resources for Learning
C. The address of a document or "page" on the World Wide Web
D. A search engine
3. What are the three main search expressions, or operators, recognized by Boolean logic?
A. and, or not B. from, to, whom C. and, or, but D. search, keyword, text
4. How do you evaluate a web page?
A. You confirm that the author or site an authority on the subject.
B. You check to see if the author has been objective.
C. You check to see if the information is current.
D. You do as many of the above as possible.
5. An article that only presents one point of view or omits facts is biased.
A. True B. False

WRITTEN WORKS 1: REFLECTION PAPER


Directions: Compose an insightful reflection paper on the nature of ICT in the context of your life, society, and
professional tracks. Use the rubric below in writing your reflection paper.

Rubrics for Reflection Paper:


Criteria 5 4 3 2
Depth of Writing demonstrates Writing demonstrates Writing demonstrates Writing demonstrates
reflection an in-depth reflection a general reflection on a minimal reflection lack of reflection on
on the selected topic, the selected topic, on the selected topic, the selected topic, with
including supporting including some including a few no details.
details and examples. supporting details and supporting details and
examples. examples.
Quality of Information clearly Information clearly Information clearly Information has little
Information relates to the main relates to the main relates to the main to do with the main
topic. It includes topic. It provides 1-2 topic. No details topic.
several supporting supporting details and/or examples are
details and/or and/or examples. given.
examples.
Structure & Writing is clear, Writing is mostly Writing is unclear, and Writing unclear,
Organization concise, and well clear, concise, and thoughts are not well disorganized.
organized with the use organized with the use organized. Thoughts Thoughts make little
of excellent of excellent are not expressed in a to no sense.
sentence/paragraph sentence/paragraph logical manner.
structure. Thoughts structure. Thoughts
are expressed in a are expressed in a
logical manner. logical manner.
Grammar There are no more There are no more There are more than There are numerous
than three spelling or than five spelling or five spelling or spelling or grammar
grammar errors per grammar errors per grammar errors per errors per page of
page of writing page of writing page of writing writing reflection.
reflection. reflection. reflection.

GRADED ACTIVITIES
WRITTEN WORKS 1 REFLECTION PAPER

You might also like