EmpoTech Handout
EmpoTech Handout
EMPOWERMENT
TECHNOLOGY
Quarter 1 Module 1
ICT in the Context of Global Communication
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein
the work is created shall be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.)
included in this book are owned by their respective copyright holders. Every effort has been exerted to
locate and seek permission to use these materials from their respective copyright owners. The
publisher and authors do not represent nor claim ownership over them.
Development Team:
Chairperson: Dr. Arturo B. Bayocot, CESO III
Regional Director
Members: Neil A. Improgo, PhD, EPS-LRMS; Bienvenido U. Tagolimot, Jr., PhD, EPS-ADM;
Erlinda G. Dael, PhD, CID Chief; Maria Teresa M. Absin, EPS (English); Celieto B.
Magsayo, LRMS Manager; Loucile L. Paclar, Librarian II;
Kim Eric G. Lubguban, PDO II
Telefax: ____________________________________________________
E-mail Address: ____________________________________________________
SENIOR HIGH SCHOOL
EMPOWERMENT
TECHNOLOGY
Quarter 1 Module 1
ICT in the Context of Global Communication
i
Department of Education • Republic of the Philippines
i
TABLE OF CONTENTS
Page No.
Cover Page i
Table of Contents
ii
Introduction 1
Module Content 1
Learning Competencies 2
LESSON 1: What is Information and Communications Technology? 3
What I Need to Know 3
What I Know: Pre-Test 3
I 5
N :A 1.1 I C ter Readiness Test 5
What Is It 6
ICT in the Philippines 6
The World Wide Web 7
Features of Web 2.0 8
What Is It: Activity 1.2: Where do I belong? 8
N : Lesson 1.1: Online Platforms and Sites 9
What Can I Do: Activity 1.3: Which Website Is It? 10
What I Have Learned 11
Assessment 12
Answer Key and References 14
LESSON 2: Online Safety, Security and Netiquette 15
What I Need to Know 15
What I Know: Pre-Test 15
I 17
N :A 2.1: S N S ?T Q on 18
What Is It 19
Online Safety, Security and Netiquette 19
Netiquette 21
What Can I Do: ACTIVITY 2.2: Can You Keep It Private? 22
What Is It
23
Kinds of Online Threats
What Can I Do: Activity 2.3: Show Me How You Hashtag 27
What I Have Learned 28
Assessment 28
Answer Key 30
References 31
LESSON 3: Effective Internet Research 32
What I Need To Know 32
What I Know: Pre-Test 31
I :A 3.1: I M N 33
N
34
Searching the Web
What Is It: Activity 3.2: Can You Find Me? 37
N :E S 38
What Can I Do: Activity 3.3: Evaluating Websites: Checklist 40
What I Have Learned 43
Assessment 43
Answer Key and References 44
ii
WHAT I NEED TO KNOW:
Overview
Hello dear learners! Welcome to this module on Empowerment Technology.
This module will help you explore the different technologies and online platforms and
how they can be used effectively. It contains activities that will let you create your
own ICT contents and evaluate existing online creation tools, platforms, and
applications. The module is self instructional and allows you to learn in your own
space, at your own pace. So, relax and enjoy learning.
Module Content
To get the most of this module, here are some reminders for you:
1
Learning Competencies
1. Compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational
challenges.
3. Apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks.
4. Use the Internet as a tool for credible research and information gathering to
best achieve specific class objectives or address situational.
WHAT I KNOW
You must be excited to flip over the pages and begin with the lessons.
But first, please answer the pre-test to measure what topics have you known so far.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
2. What web 2.0 feature allows users to subscribe to a data plan that charges for
the amount of time spent on the internet?
A. Folksonomy B. Long Tail C. User Participation D. Application
3. What is the name of the symbol that is used to classify and categorize
information?
3
Reflect on the following questions:
How many times have you checked your phone this morning?
How many updates have you posted on Facebook, Twitter, or
Instagram today?
Do you use the internet/ mobile for an hour after you woke up this
morning?
Have you followed a celebrity/ a crush on his/ her social media
account?
I
nformation and Communications Technology (ICT) often deals with the use of
different technological inventions like mobile phones, telephones, computer, Internet,
and other devices, as well as software and applications to locate, save, send, and
manipulate information. ICT has greatly contributed to how easy our lives has been
today. Our gadgets have become part of our necessity that we check on them after
we wake up. It made communication easier. We can use cellular phones that are
designed for communicating with other people even they are miles away from us. It
has also assisted us in our work since there are Internet-based jobs. It has
revolutionized our education and in the modernization of our economy.
HAT S NE
Directions: Read and reflect each item carefully. State whether you agree or
disagree to each of the statements by drawing a happy face ( ) if you agree and a
sad face ( ) if you disagree. There are no right or wrong answers for this activity.
Write your answers on your notebook.
SITUATIONS
1. I have reliable access to a computer, mobile phone, tablet, or any gadget that
can act as substitute to computers.
2. I have access to a high-speed internet connection with video streaming
capabilities.
3. I have experience using email: I can create, send, forward, reply to, and save
email messages and attachments.
5
4. I have experience in word processing: I can create, edit, save, and navigate
documents using software program such as Microsoft Word or Pages for Mac.
Did you agree to all or most of the questions? If so, then you must have
experienced using the different online platforms and sites!
WHAT IS IT
6
interconnected computer networks that uses the Internet protocol suite (TCP/IP) to
communicate between networks and devices.
The World Wide Web
The World Wide Web is an information system on the Internet that allows
documents to be connected to other documents by hypertext links, enabling the user
to search for information by moving from one document to another. It was invented
by Tim-Berners Lee. The World Wide Web browser software, such as Microsoft's
Internet Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome,
let users navigate from one web page to another via the hyperlinks embedded in the
documents. These documents may also contain any combination of computer data,
including graphics, sounds, text, video, multimedia and interactive content that runs
while the user is interacting with the page. The Web has enabled individuals and
organizations to publish ideas and information to a potentially large audience online
at greatly reduced expense and time delay.
Types of Web Pages
Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It
is a flat or stationary page since it cannot be manipulated by the user.
Web 2.0 or The Social Web allows users to interact with the page, the user
may be able to comment or create a user account. Most website that we visit
today are Web 2.0.
Web 3.0 or Semantic Web. The semantic web provides a framework that
allows data to be shared and reuse to deliver web content specifically
targeting the user. Search Engine will learn about you and your habits from
each search you perform and will gather details about you from your previous
activities like likes and social postings and present the answers as per your
preferences.
7
Search Directories Tags/ Keywords Context/ Relevance
Metrics Page Views Cost per Click User Engagement
Advertising Banners Interactive Behavioral
Technologies HTML/ FTP Flash/ Java/ XML RDF/ RDFS/ OWL
Features of Web 2.0
FEATURES WEB 2.0
FOLKSONOMY allows users to collectively classify and find information using
freely chosen keywords (e.g. "tagging" by facebook). Tagging
uses the pound sign #, often referred to as hastag.
RICH USER dynamic content that is responsive to user input (e.g., a user
EXPERIENCE can "click" on an image to enlarge it or find out more
information)
USER the owner of website is not the only one who is able to put
PARTICIPATION content. Others are able to place a content on their own by
means of comments, reviews, and evaluation.
LONG TAIL services that are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan
that charges you for the amount of time you spent in the
Internet, or a data plan that charges you for the amount of
bandwidth you used.
SOFTWARE AS users will subscribe to a software only when needed rather
A SERVICE than purchasing them.
WHAT IS IT
ACTIVITY 1.2: Where do I belong?
DIRECTIONS: Using the Internet, look for the webpages of the pages listed
below. Evaluate whether they are Web 1.0, Web 2.0, or Web 3.0. Write your
answers in your activity notebook.
1. Amazon.co.uk 6. S A V R
2. 7.
3. 8. Encyclopedia Britannica
8
5. 10.
HAT S NE
Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Media
9
4. Mapping Platform is a transformation taking the points of one space into the
points of the same or another space. Uses GPS to detect location and used
for navigation.
5. Social Media Platform is a computer-mediated tools that allow large group of
people to create, share or exchange information, interest and the information
shared can be in the form of ideas, pictures, videos or anything that you want
to create and share to virtual communities. It can be in the following platforms:
Bookmarking Sites. These are sites that allow you to store and
manage links to various websites and resources.
Social News. These are sites that allow users to post their own
news items or links to other news sources.
Media Sharing. These are sites that allow you to upload and share
media content like images, music, and video. Media sharing sites
can be specific for video sharing, photo sharing, slide sharing,
social bookmarking, and gaming.
Blogs and Forums. These are websites that allow users to post
their content. Other users can comment on the said topic.
WHAT CAN I DO
ACTIVITY 1.3: Which Website Is It?
DIRECTIONS: Listed below are some of the platforms. Complete the table
below by providing name of website and a short description using the internet. Write
your answers on your notebook.
10
Retrieved from https://www.surveymonkey.com/r/ET_student-
readiness. Retrieved on May 19, 2020.
3. Quiambao, A. (2019, Sep 8). Online platforms for ICT Content Development.
Retrieved from https://www.slideshare.net/AngelitoQuiambao/online-
platforms-for-ict-content-development-169954837. Retrieved on May
2
0
,
WHAT I NEED TO KNOW
2
020.
WHAT I KNOW
I bet , ?B
before that, take time to answer the pre-test to gauge how much you know about the
lesson.
15
A. Phone number B. Profile Picture C. Shirt Size D. Religion
10. You get an email telling you that you won a hundred thousand without joining
in a competition. You should ____________.
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge
HAT S IN
Read the headlines found below and try to reflect on the questions that follow.
ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.
HAT S NE
A
CTIVITY 2.1: Shared or Not Shared? That is the Question
DIRECTIONS: Read and reflect each item carefully. Copy the table below on your
notebook and check the space whether you have shared or not shared these pieces
of information in all your social media accounts.
First Name
Middle Name
Last Name
Current and Previous
School/s
Your cellphone number
Complete name of mother
and father
numbers
Name of Siblings
Your Address
Your Birthday
18
______________________________________________________________
3. Based from your answers above, do you think you are safe when using the
Internet? Why?
______________________________________________________________
______________________________________________________________
______________________________________________________________
WHAT IS IT
Lesson 2.1: Online Safety, Security and Netiquette
Online safety refers to the practices and precautions that should be observed
19
when using the internet to ensure that the users as well as their computers and
personal information are safe from crimes associated with using the internet. Below
are personal information that must be kept confidential.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is
a reputable business having a secure service. To make sure that you are in a
secured network, the website address should begin with h :// as
:// . N ,
instead type your URL by yourself.
Regularly review your privacy settings in your online accounts to make sure
you are not sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data
before leaving.
20
Do not download or install software or anything on your computer or cell
phone that is unknown to you.
21
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
L
e WHAT IS IT
s
son 2.2: Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities
to attack computers and retrieve sensitive data from individuals. Half the time, we
.
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which utilize
HTTP or HTTPS protocols, but may also employ other protocols and components,
such as links in email or Instant Messaging apps, or any malware attachments on
servers that access the Web. They benefit cybercriminals by stealing information for
subsequent sale and help absorb infected PCs into botnets. Web threats pose a
broad range of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
23
Phishing happens when an email is sent from an internet criminal disguised
as an email from a legitimate, trustworthy source. The message is meant to
lure you into revealing sensitive or confidential information.
Pharming happens ( )
.T
, , rds, and credit
card data, or install malware on their computer. Pharmers usually focus on
websites in the financial sector, including banks, online payment platforms, or
other e-commerce destinations.
24
Internet Scam generally refers to someone using internet services or
software to defraud or take advantage of victims, typically for financial gain.
Cybercriminals may contact potential victims through personal or work email
accounts, social networking sites, dating apps, or other methods in attempts
to obtain financial or other valuable personal information. Online scams may
come in various forms such as lottery scam, charity fraud scams, job offer
scams, and online dating scams to name a few.
Internet robots are also known as spiders, crawlers, and web bots. It is a
software application that is programmed to do certain tasks. Bots are
automated, which means they run according to their instructions without a
human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots are
"bad" and are programmed to break into user accounts, scan the web for
contact information for sending spam, or perform other malicious activities. If
it's connected to the Internet, a bot will have an associated IP address.
25
Virus and Worms are malwares that attach to another program and,
when executed unintentionally by the user replicates itself by
modifying other computer programs and infecting them with its own bits
of code.
Trojan, or Trojan horse, is one of the most dangerous malware types.
It usually represents itself as something useful in order to trick you.
O , T
unauthorized access to the affected computer. From there, Trojans can
be used to steal financial information or install threats like viruses and
ransomware.
Ransomware is a form of malware that locks you out of your device
and/or encrypts your files, then forces you to pay a ransom to get them
back.
Spams are unsolicited emails, instant messages coming from recipients that
are not granted verifiable permission for the message to be sent. Spam
messages can be damaging if you open or respond to it.
Cyberstalking refers to the use of the internet or other electronic device to
harass or stalk individuals or organizations.
26
Cyberbullying refers to the act of tormenting, harassing, or embarrassing
another person using the internet.
WHAT CAN I DO
ACTIV
ITY 2.3: Show Me How You Hashtag
Direction: Look at the following images and create a hashtag based on the type of
online threat represented by each image. Write your answers in your activity
notebook.
27
1. ABS-CBN News Topic Page on Identity-theft. Retrieved from
https://news.abs-cbn.com/list/tag/identity-theft. Retrieved on May 22, 2020.
2. National Center for Missing and Exploited Children. (n.d.). NSTeens: Can you
keep it private. Retrieved from
3. Netiquette Quiz. Retrieved from
https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm. Retrieved on
May 22, 2020.
4. Quiambao, Angelito. (2018, Jul. 23). Online safety, security, ethics, and
etiquette. Retrieved from
https://www.slideshare.net/AngelitoQuiambao/online-safety-security-ethics-
amp-etiquette. Retrieved on May 22, 2020.
5. Belcic, Ivan. (2019, Nov. 7). What is pharming and how to protect against
attacks. Retrieved from https://www.avg.com/en/signal/what-is-pharming.
Retrieved on May 22, 2020.
Images
1. https://twitter.com/Parkster00/status/1246347088625045504
2. Shea, Virginia. (2011). Netiquette. Retrieved from
http://www.albion.com/netiquette/introduction.html. Retrieved on May 22,
2020.
3. https://searchsecurity.techtarget.com/definition/phishing
4. https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-
pharming.html
5. Chua, Ryan (2011, May 24). ABS-CBN News. Are you a victim of cyber-
stalking. Retrieved from https://news.abs-cbn.com/nation/05/24/11/are-you-
victim-cyber-stalking. Retrieved on May 22, 2020.
6. Andrade, Jeannette. (2012, June 2). Teen arrested for Facebook blackmail.
Retrieved from https://technology.inquirer.net/11673/teen-arrested-for-
facebook-blackmail. Retrieved on May 22, 2020.
7. https://www.avg.com/en/signal/what-is-spyware
8. https://itigic.com/tag/adware/
9. https://dlpng.com/png/6702600
10. https://www.gtmaritime.com/free-phishing-penetration-test/
11. http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-to-
benefit-consumers-says-globe-telecom/
12. https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
32
WHAT I NEED TO KNOW
Lesson 3: Effective Internet Research
The Internet has made our lives easier especially in terms of doing research.
By browsing the internet, we can access limitless topics. Web-based catalogs are
available in many libraries to assist researchers in locating printed books, journals,
government documents and other materials. The biggest obstacle facing all
researchers on the internet is how to effectively and efficiently access the vast
amount of information available (The Internet: Research Tools, 2013).
WHAT I KNOW
Before we take on another journey towards exploring the great capacity of the
internet into research, kindly take time to answer the following questions for your pre-
test.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper.
33
________________________________________________________
________________________________________________________
_
_
_
HAT S NE
_
____________________________________________________
There are billions of information on the web and it is a challenge for us to truly find
which information is reliable and relevant. Here are some tips you may use to be
able to look for relevant and reliable sources:
Search Engines are websites used for retrieval of data, files, or documents
from data bases. Some search engines we use today are:
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic
term for all types of names and addresses that refer to objects on the
world wide web. Knowing the URL endings will give you clues to who is
sponsoring the website and help evaluate the sources.
https://www.searchenginejournal.com/alternative-searchengines/271409/#close
4 5
1 2 3 6 7
35
2. Subdomain 5. Folders/ Paths
3. Domain 6. Page
Popular Domains
Top- level Domains Country code top level domains
.edu educational institution .ph Philippines
.org non-profit organization .eu European Union
.gov government site .uk United Kingdom
.com commercial site .au - Australia
.net - network
A B
A B
36
2. Phase Searching is used to search for famous quotes, proper names,
recommendations, etc. It encloses the phrase in quotation marks.
Ex. J D T
3. Plus (+) indicates that the word after the sign is a required word must be
found in search. Example: +fire
4. Minus ( ) sign indicates to exclude a word from your search that is not
required on the result. Example: Jaguar speed car
7. Finding Documents using the filetype refines the search for documents
on the web.
o filetype:pdf
o filetype:doc
o filetype:xls
Ex. ICT in the Philippines pdf
8. Searching Site the sites find webpage from a website.
Ex.: National Geographic information in Australia
Search: Australia site: NationalGeographic.com
37
Technology in the Philippines. This information must come from a government
site in PDF or Word document. Print the article and paste your work on a separate
sheet of paper. Do not forget to include the URL of the article you have taken the
information.
L
e HAT S NE
s
son 3.3: Evaluating Sites
The web provides access to some excellent information and can also give
access to those that are irrelevant and outdated. Here is some checklist that you can
use to evaluate your website:
1. Authority. It reveals that the person, institution or agency responsible for a
site has the qualifications and knowledge to do so. Evaluating a web site for
authority:
Authorship: It should be clear who developed the site.
Contact information should be clearly provided: e-mail address, snail
mail address, phone number, and fax number.
Credentials: the author should state qualifications, credentials, or
personal background that gives them authority to present information.
Check to see if the site supported by an organization or a commercial
body
39
3. Coverage. This refers to how comprehensive the website is in their
discussion of certain topics. Evaluating a web site for coverage:
Does the site claim to be selective or comprehensive?
Are the topics explored in depth?
C
sites.
Do the links go to outside sites rather than its own?
Does the site provide information with no relevant outside links?
4. Currency. It refers to: (1) how current the information presented is, and (2)
how often the site is updated or maintained. It is important to know when a
site was created, when it was last updated, and if all of the links are current.
Evaluating a web site for currency involves finding the date information was:
first written
placed on the web
last revised
6. Accuracy. It refers to the credibility of the website. Evaluating a web site for
accuracy:
Reliability: Is the author affiliated with a known, respectable institution?
References: do statistics and other factual information receive proper
references as to their origin?
Is the information comparable to other sites on the same topic?
Does the text follow basic rules of grammar, spelling and composition?
Is a bibliography or reference list included?
40
Is the site well maintained?
I
Yes
No
ASSESSMENT
Direction: Read each item carefully and choose the letter of the correct
answer. Write your answers on a separate sheet of paper or in your notebook.
2. What is a URL?
A. A computer software program
44
1. Dalhousie University. (n.d.) 6 criteria for websites. Retrieved from
https://cdn.dal.ca/content/dam/dalhousie/pdf/library/CoreSkills/6_Criteria_fo
r_Websites.pdf. Retrieved on May 24, 2020.
46
For inquiries or feedback, please write or call:
Telefax: _______________________________________
47