0% found this document useful (0 votes)
38 views16 pages

TRENDS Q2 Module3

This document discusses dimensions of technology that enable and inhibit learning in education. It states that research has found information and communication technology (ICT) can improve student learning and teaching methods when integrated into the educational curriculum. Specifically, the research found students who are regularly exposed to technology through instruction have better knowledge, presentation skills, creative abilities, and problem-solving skills compared to students not exposed to technology. However, the document also notes ICT in education is not without limitations and can potentially have negative impacts if not implemented properly.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views16 pages

TRENDS Q2 Module3

This document discusses dimensions of technology that enable and inhibit learning in education. It states that research has found information and communication technology (ICT) can improve student learning and teaching methods when integrated into the educational curriculum. Specifically, the research found students who are regularly exposed to technology through instruction have better knowledge, presentation skills, creative abilities, and problem-solving skills compared to students not exposed to technology. However, the document also notes ICT in education is not without limitations and can potentially have negative impacts if not implemented properly.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

DEPARTMENT OF EDUCATION

REGION VII-CENTRAL VISAYAS


Schools Division of Mandaue City
Sudlon, Lahug, Cebu City, Cebu

Trends, Networks and Critical


Thinking in the 21st Century
Grade 12 HUMSS/GAS
Second Quarter, Module 3

Dimensions of Technology that are Enabling


and Inhibiting

Alternative Delivery
Mode Module
FOREWORD

This is an ADM Module in Trends,Networks and Critical Thinking in the


21st Century. This is module is intended for all Grade 12 HUMSS and GAS students
designed to meet their needs as 21 st century Learners. It is anchored on a holistic
approach in developing the basic learning competencies in Trends,Networks and
Critical Thinking in the 21st Century of the Senior High School Curriculum. The lessons
are presented in a manner that allow students to learn at their own pace while learning
away from school. The activities given are simple and easy to work with. The lessons
presented are easily understood yet allowing the students to think in a wider
perspective.

This Alternative Delivery Module is intended to provide you knowledge-based


and actual learning experiences. This aims to monitor your own learning at your own
schedule wherein you can study and decide the importance of the information found
in this module. Please follow the instructions carefully. Just take your time and enjoy
as you answer the exercises.

FOR THE PARENTS/GUARDIANS


Please make a follow-up whether your son/daughter is following the
instructions written in this module and guide them on how to answer the exercises
provided. Feel free to contact me if you have some questions about this SLM.

With this self-learning module, the author hopes that the student would be an
active Social Scientist, a proficient learner ready to compete not only in local but also
in global arena. As this module is prepared for all Grade12 HUMSS/GAS Students, it
is hoped that they will better understand the lessons and activities presented as this
will be one of their instruments as future Social Scientist.
The following are important reminders in
using this ADM:
1. Use the ADM module with utmost care. Do not write or
mark anything in any of the pages of the module. Use a
separate sheet of paper in answering the Pretest, Post-
Test and activities.
2. Do not forget to answer the Pretest before you transfer
and move on to the rest of the pages in this module.

3. Kindly read carefully the directions for every activity.


4. Observe honesty and integrity in performing all of the
activities given and in checking your own work.
5. Accomplish first the recent activities before moving on
to the next.

6. Please return the module to your teacher or facilitator


after performing all the intended activities.

Feel free to consult your teacher if ever you find difficulty in


answering all the test and activities prepared for you. You
can also consult and ask help from your parents, elder
brothers and sisters or any member of the family. Always
remember that you are not alone, there are people around
ready to help you.

We are hopeful that through this ADM module, you can


experience a valuable learning and gain knowledge and
deep understanding of the given competency. You can do
it!
What I Need to Know

LEARNING COMPETENCY/IES:

Second Quarter Week 3 MELCS


 Identify the dimensions of technology that are enabling and inhibiting.
 Discuss the benefits of technology.
 Explain the weakest link in a system using strategic and intuitive thinking.

LEARNING
OBJECTIVES
At the end of this self-learning module, the students are expected to:
 Identify the dimensions of technology that are enabling and inhibiting.
 Understands how ICT enslaves, emancipates, and empowers individuals.
 Explain how ICT in general gives positive and negative impacts to students
through writing an Essay

What I Know

PRETEST

Multiple Choice: Encircle the letter of your answer.

1.What term is being referred to as technology that handles telecommunications,


broadcast media, intelligent building management systems, audiovisual processing
and transmission systems and network-based control and monitoring functions?
A. IT B. ICT C.computers D.Internet Connections
2.The following are social networking sites and mobile apps EXCEPT;
A. Facebook B. Twitter C.Instagram D.Information and Technology
3.The following are functions of Information and Communication Technology
EXCEPT;
A.Technical function C.Decision-making support
B. Infrastructure function D. Hacking personal datas
4.Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ Learning becomes more enjoyable and
teaching becomes more interactive compared to using the old methods.”
A. Education B. Business C. Medical D. Research
5. Identify the statement to what category does it belong referring to the benefits of
information and communication technology.”Information and communications
technology has also made shopping a lot esier.”
A. Education B. Business C. Medical D. Research
6. Identify the statement to what category does it belong referring to the benefits of
information and communication technology.” Information and communications
technology provides easy access to a patient’s record and medical information.”
A. Education B. Business C. Medical D. Research
7. Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ The work of a writer is made easier by
using word processors and applications and attaching Internet links to documents.”
A. Education B. Business C. Medical D. Research
8.It refers to the part that is likely to fail, to cause a problem , or to easily break.It is the
easy point for the attackers.
A.link B. strongest link C. weakest link D. problem
9.It is the use of deception to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent purposes.
A.link B. strongest link C. weakest link D.social engineering
10.Who are the ones who manipulate people to break into the security wall?
A. Practitioners of social engineering
B. Practitioners of school
C. Practitioners of the Information Technology
D. Practitioners of the Information and communication technology
11.This refers to the Management Information System which takes care of report
writing,home school links, attendance ,examination entries, and target setting.
A.MIS B. Learning C.ICT D.IT
12.This includes storing grades electronically and making them available to teachers.
A.MIS B. Learning C.ICT D.IT
13.This is about projecting the right image of the school through its website, which
provides the public an idea about the school.
A.MIS B. Learning C.ICT D.communication tool
14.Attackers look for what appears to be the _______ link , not what appears to be
the the strongest link.
A. weakest B.weak C.weaker D.stronger
15.A ___ practitioner employs risk analysis by identifying the options which are less
risky, in other words they identify the weakest links which attackers may exploit.
A. security B. ICT personnel C.teacher D.web navigator
What’s In?

Activity No.1
Based from the picture below, what word can you formulate that best describes the
picture?

1. T _ _ _ _ _ _ _ _ Y
2. _ A _ _ _ _ S

What’s New?

TEST-A TRUE or FALSE


Directions: Draw 😊 for True and ☹ for False . Write your answer before the
number.(2 pts each)
____1.ICT has benefited in human life in selected dimensions only.
____2.Education has benefited considerably from the use of ICT.
____3.Information and communications technology has made shopping a lot difficult.
____4.In medical field ICT provides easy access to a patient’s record and medical
information.
____5.ICT facilitates the dissemination of news and information to a global audience.

TEST-B JUMBLED LETTERS


Directions: Arrange the jumbled letters below to make a comprehensive word.Describe
each word based from your own understanding, 2 Pts each item.
1.EAKWETS ILNK
2.SASWPROD
3.LACOSI NEGIEENIRNG
4.FOSTWRAE
5.CTTAAEKSR
What is it?

Dimensions of Technology that are Enabling and Inhibiting.


Data and Communication Technology (ICT) in instruction is the method of training
that utilization data and correspondences innovation to help, upgrade, and advance
the conveyance of data.
Overall research has indicated that ICT can prompt an improved understudy learning
and better instructing strategies. A report made by the National Institute of
Multimedia Education in Japan, demonstrated that an expansion in the utilization of
ICT in instruction with coordinating innovation to the educational plan has a huge
and positive effect on understudies' accomplishments. The outcomes explicitly
demonstrated that the understudies who are persistently presented to innovation
through instruction has better 'information', introduction aptitudes, inventive abilities,
and are prepared to accept more endeavors into learning when contrasted with their
partners.
DO'S AND DON'TS of using ICT tools.
These guidelines provide a brief reminder of the key obligations of people using the
ICT tools. All users must be familiar with, and abide it.

Don’ts
1.Don't access pornographic or obscene material or material that could offend
others.
2.Don't let anyone else use any of your accounts or tell anyone your password.
3.Don't download videos, music or anything else that's copyrighted by other people.
4.Don't use IT facilities to bully or harass other people.
5.Don't install unlicensed or malicious software.
6.Don't use IT facilities to advertise goods or services.
7.Don't uninstall security software from your University-owned devices.
Do’s
1.Follow the SecureIT advice about IT security.
2.Log out of computer systems when you have finished using them.
3.Remember that all use of IT facilities is logged and monitored.
4.Think carefully about your online conduct to protect personal information.
5.Keep your operating systems and software up to date.

Information Communication Technology


 Refers to all the technology used to handle telecommunications , broadcast
media, intelligent building management systems , audiovisual processing and
transmission systems and network- based control and monitoring functions.
 The term covers wireless networks, cell phones , the Internet and other media
for communication.
 ICT is perceived to be instrumental in creating a global village , which is the
world conceived as a single community linked by telecommunications.
Benefits of using ICT in Main Areas

ICT IN EDUCATION
 Using Virtual Learning Environments for distance education
 Using Video trainings
 Using digital education contents such as school management system to
manage daily routines of the schools .Specific examples are student
registration,allocating time tables,managing student’s attendance , managing
examination results, managing school accounting and financial processes.
ICT IN MEDICINE
 Using computerized medical equipment such as MRI, CT scanners, EEG ,
EGG machines
 Channeling doctors over the Internet
 Using Tele medicine , the use of medical information exchanged from one site
to another via electronic communications to improve patient’s clinical health
status.
 ICT offers convenient access to patient records and medical knowledge in the
medical industry. The doctor will only have to obtain, read and analyze the
patient's medical history, the previous medical care obtained, and any other
applicable data that will assist in the proper diagnosis and treatment of the
patient. Online hospital or clinic appointments are also possible. This makes it
possible for it makes it easier for the patient to be registered early in the doctor's
appointment diary, thereby relaxing the timetable and preventing long hours of
waiting at the clinic, (Elizabeth T. Urgel, 2017).

ICT IN AGRICULTURE
 Using computerized agricultural equipment for instance using computerized
feeders for diary cows, computerized milk processing systems, computerized
controlled green houses.
 Using internet and email to disseminate information on research information,
market prices , agricultural instructions
 Managing and analyzing information of research and experiments.

ICT in Engineering

 Using CAD (Computer Aided Designing) to design, analysis and optimize


designs. Examples :Construction plans ,Designing vehicles and
machines,Using CAM (Computer Aided Manufacturing) to create 3D models.
 Using robotics in manufacturing plants.
 Computers can be used in different types of fields in engineering such as
Electronic engineering ;Electrical engineering ;Industrial engineering;
Mechanical engineering
ICT in Banking and Finance

 Using internet for banking transactions such as E banking


 Using ATM/ Automated teller Machines
 Using networking to inter-connect branches
 Using electronic payment methods in e – commerce such as credit card,
paypal.
 Using internet to retrieve financial information’s, currency exchange rates and
stock market.
ICT in Transportation

 Using air traffic control systems.


 Booking air tickets over the on line air ticket reservation systems.
 Controlling traffic jams using computerized traffic controlling systems.

ICT in Entertainment

 Computer Gaming
 Animating, Editing in film industry
 Using computers for music composing
 Using portable music players such as iPod ,Mobile phones
 Purchasing digital contents on-line example ,Apple iTunes
ICT in Security and Defense
 Using computers to analyze crimes.
 Using robotics to remove land mines.
 Using computerized air defense systems.

Identifying a System’s Weakest Link Through Strategic and Intuitive thinking


The weakest link refers to a part that is likely to fail, cause a problem, or break easily.
Since it is the most vulnerable part of the network, it is a simple point for attackers.
The weakest link can be part of a software system, infrastructure , an application or
the people- administrators , technical support and users who easily succumb to social
engineering. Social Engineering is the science of getting people to comply with your
desires and the weakest link in the safety chain. Social Engineering is characterized
as the use of manipulation to force individuals to reveal sensitive or personal
information that could be used for fraudulent purposes.Practitioners of social
engineering , in this case the attackers of a system , manipulate of people to break
into the security wall. It is the trusting nature of people which makes them one of the
weakest links. Attackers look for what appears to be the weakest link , not what
appears to be the strongest link. The weakest link is identified in two ways by security
practitioners: strategic thinking and intuitive thinking. Using strategic thinking, security
practitioners use a clear "risk analysis" of the available data to recognize and fix the
most significant danger or issue that is the weakest link. They often use comparison
and some kind of logic to identify the weakest. A security practitioners employs risk
analysis by identifying the options which are less risky ; in other words , they identify
the weakest links which attackers may exploit. Applying intuitive thinking in detecting
the weakest link, security practitioners look for what could be the easiest target of
possible attackers by focusing on the external appearance of the link. They will look
for the part that appears the weakest, like what the attackers do. In order to secure
weak links, it is important for security practitioners to have a ready approach that
determines and strengthens weak links. Efforts must be made before the level of
danger is reduced or is reasonable. Network File Trajectory and System Trajectory
can help security practitioners determine the extent of an intrusion and identify the
presence of malware or malicious files on a network and system level.
Users should avoid opening malicious files and connections that might be infected
with a virus,(Elizabeth T. Urgel, 2017).

What’s more?

Directions: Make a diagram on how to identify the weakest link in a system.


Rubrics :
Content -10
Clarity of words used and steps followed – 10
Neatness of work -5
Total = 25

How to identify the


weakest link in a
system?
What I have learned?

Directions: Using Essay , discuss and explain how ICT in general gives positive and
negative impacts to the lives of the people most especially to the students.

Rubric for Brief essay.


Criteria Rating
1. Is the learnings relevant to the topic? 4 3 2 1
2. Student’s way of expressing his/ her thoughts is in 4 3 2 1
coherence.
3. Explanation is clearly stated. 4 3 2 1
4. Were the given explanation relates substantially to the 4 3 2 1
given topic?
5. Neatness of work 4 3 2 1

Agenda of Scores:
4- All of the time
3- Most of the time
2- Sometimes
1- Never

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________
What I can do?

My Everyday in a Glance: Timetable Worksheet


In learning that there are advantages and disadvantages in using ICT tools, how
then do you manage your time when using the ICT tools? For this activity, the
student will be given timetable worksheets to budget their time for a typical day in
using some ICT tools.

Instructions : Fill in the timetable worksheets below .

TIMETABLE WORKSHEETS ON USING MY SMARTPHONE

Time of the Day What did I do to my Doing such action , does


smartphone in this it make me improve as a
specific time of the day? person or enslaves me
doing such?
(Choose an answer
whether IMPROVE or
ENSLAVES)

1. 2. 3.

4. 5. 6.

7. 8. 9.

10. 11. 12.

13. 14. 15.

16. 17. 18.

19. 20. 21.


Assessment/Post -test

Test I.
Directions: Encircle the letter of the correct answer.
1.The following are social networking sites and mobile apps EXCEPT;
A. Facebook B. Twitter C. Instagram D.Information and Technology
2.What term is being referred to as technology that handles telecommunications,
broadcast media, intelligent building management systems, audiovisual processing
and transmission systems and network-based control and monitoring functions?
A. IT B. ICT C. computers D. Internet Connections
3.Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ Learning becomes more enjoyable and
teaching becomes more interactive compared to using the old methods.”
A. Education B. Business C. Medical D. Research
4 . Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ The work of a writer is made easier by
using word processors and applications and attaching Internet links to documents.”
A. Education B. Business C. Medical D. Research
5.It is the use of deception to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent purposes.
A.link B. strongest link C. weakest link D.social engineering
6.Which of the following statements below is an effective use of ICT?
A. Using your smartphone as the only means to socialize with your friends.
B. Using Facebook as a tool to disseminate new captured selfies.
C. Movies and TV series marathon, for 20 hours, in your brand new LED TV.
D. Using your computer to make PowerPoint presentations as a supplement,
not as a sole material, for your report.
7.The following are the effective use of ICT , EXCEPT;
A. Making research paper with the used of laptap and internet.
B. Using the internet to research information for further knowledge.
C.Using mobile banking for ease of transferring money to other accounts.
D.Using your new cellphone to watch pornographic materials and videos.
8.It refers to the part that is likely to fail, to cause a problem , or to easily break.It is the
easy point for the attackers.
A.link B. strongest link C. weakest link D. problem
9.It is the use of deception to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent purposes.
A.link B. strongest link C. weakest link D.social engineering
10.This refers to the Management Information System which takes care of report
writing,home school links, attendance ,examination entries, and target setting.
A.MIS B. Learning C.ICT D.IT
Test 2
Directions: For nos 11-15, Identify and analyze the statements below whether the
use of ICT is enslaving , effective , does not affect lives or both enslaving and
effective. Write the letter of your choice before the number on the space
provided.Choices are the following :
A.Enslaving
B. Effective
C.Does not affect lives
D.Both enslaving and effective to the lives of the people
______11. Flooding your Instagram account with lots of glamorous photos to boost
your self esteem..
______12. Using the internet to research information for further knowledge.
______13.Using mobile banking for ease of transferring money to other accounts.
______14. Using your new cellphone to watch pornographic materials and videos.
______15.Gadgets has been used more than 22 hours for leisure purposes.

Additional Activities
Directions: Answer the questions below briefly and concisely
Rubrics:
Content -5
Grammar -5
Neatness of work- 5
Total – 15 / 15
1.Explain in your own words on how to identify the weakest link in a system using
intuitive thinking and strategic thinking.

References:

Elizabeth T. Urgel, Trends , Networks and Critical Thinking in the 21 st Century Module
:Diwa Learning Systems Inc. 2017.
ELECTRONIC REFERENCES:
https://en.wikipedia.org/wiki/Enabling_technology
https://www.myforesight.my/2018/02/26/industry-4-0-the-enabling-technologies-and-
its-applications/
https://www.youtube.com/watch?v=bGo6vlWbKl0
SECOND QUARTER MODULE 3
PRE-TEST
1.B 2.D 3. D 4. A 5.B 6.C 7. D 8.C 9.D 10.D 11.A 12.A
13.D 14.A 15.A
What’s in?
Activity No.1
1.TECHNOLOGY
2.GADGETS
What’s new?
Test A.
1☹
2😊
3☹
4😊
5😊
Test B
1. Weakest Link
2.Password
3.Social Engineering
4.Software
5.Attackers
What’s more?
Answer varies depending to student’s idea
What I have learned?
Answer varies depending to student’s idea
What I can do ?
Answer varies depending to student’s idea
POST-TEST
1.D 2.B 3.A 4.D 5.C 6.D 7.D 8.C 9.C 10.A 11.A 12.B
13.B 14.A 15.A
Additional Activities
Answer varies depending to student’s idea
Answer Key
HAILYMAE A. MAGTAGAD,Dev.Ed.D is a licensed
professional teacher, currently connected in Canduman
National High School, Canduman Mandaue City as Senior
High School Teacher 3.
She finished her baccalaureate degree from Cebu
Normal University with the degree Bachelor of Arts in
Political Science and graduated Diploma in Professional
Education major in Social Science (2013) from Cebu
Technological University. She has graduated Master of
Arts in Education (MAEd) major in Social Science at Cebu
Technological University (2017). She is also a graduate of
Doctor in Development Education from Cebu
Tecnological University (2020).

You might also like