Emtech M1
Emtech M1
EMPOWERMENT
TECHNOLOGY
Quarter 1 – Module 1
ICT in the Context of Global Communication
ii
WHAT I NEED TO KNOW:
Overview
Hello dear learners! Welcome to this module on Empowerment Technology.
This module will help you explore the different technologies and online platforms and
how they can be used effectively. It contains activities that will let you create your
own ICT contents and evaluate existing online creation tools, platforms, and
applications. The module is self – instructional and allows you to learn in your own
space, at your own pace. So, relax and enjoy learning.
Module Content
To get the most of this module, here are some reminders for you:
Learning Competencies
1. Compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational
challenges.
1
2. Evaluate existing online creation tools, platforms and applications in
developing ICT content for specific professional tracks.
3. Apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks.
4. Use the Internet as a tool for credible research and information gathering to
best achieve specific class objectives or address situational.
LESSON 1: What is Information and Communications
Technology?
2
WHAT’S IN
But first, please answer the pre-test to measure what topics have you known so far.
Direction: Read each item carefully and choose the letter of the correct answer.
1. What type of web page is classified as flat or stationary?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0
2. What web 2.0 feature allows users to subscribe to a data plan that charges for
the amount of time spent on the internet?
A. Folksonomy B. Long Tail C. User Participation D. Application
3. What is the name of the symbol that is used to classify and categorize
information?
A. Hashtag B. Question Mark C. Asterisk D. At sign
4. What specific type of social media allows you to connect with other people?
A. Microblogging C. Media Sharing
B. Social Networks D. Social News
6. YouTube and Instagram are examples of what specific type of social media?
A. Blogs and Forums C. Media Sharing
B. Social Networks D. Bookmarking Sites
7. What specific type of social media allows its users to post their original
content on websites such as WordPress, Blogger, and Tumblr?
A. Blogs and Forums C. Media Sharing
B. Social Networks D. Bookmarking Sites
8. What type of social media allows you to manage links to various websites?
A. Blogs and Forums C. Media Sharing
B. Social Networks D. Bookmarking Sites
9. What do you call the global system of interconnected computer networks that
use servers to link billions of devices worldwide?
A. Websites B. Web browser C. Internet D. World Wide Web
3
Reflect on the following questions:
✓ How many times have you checked your phone this morning?
✓ How many updates have you posted on Facebook, Twitter, or
Instagram today?
✓ Do you use the internet/ mobile for an hour after you woke up this
morning?
✓ Have you followed a celebrity/ a crush on his/ her social media?
Information and Communications Technology (ICT) often deals with the use of different
technological inventions like mobile phones, telephones, computer, Internet, and other devices, as
well as software and applications to locate, save, send, and manipulate information. ICT has greatly
contributed to how easy our lives has been today. Our gadgets have become part of our necessity
that we check on them after we wake up. It made communication easier. We can use cellular phones
that are designed for communicating with other people even they are miles away from us. It has also
assisted us in our work since there are Internet-based jobs. It has revolutionized our education and in
the modernization of our economy.
4
Name: _______________________________________
Section: ______________________________
WHAT’S NEW
ACTIVITY 1.1: Internet and Computer Readiness Test
Directions: Read and reflect each item carefully. State whether you agree or
disagree to each of the statements by drawing a happy face (☺) if you agree anda
sad face () if you disagree. There are no right or wrong answers for this activity.
Write your answers on the space provided before each number.
SITUATIONS
1. I have reliable access to a computer, mobile phone, tablet, or any gadget that
can act as substitute to computers.
2. I have access to a high-speed internet connection with video streaming
capabilities.
3. I have experience using email: I can create, send, forward, reply to, and save
email messages and attachments.
4. I have experience in word processing: I can create, edit, save, and navigate
documents using software program such as Microsoft Word or Pages for Mac.
5
ICT in the Philippines
Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-
related jobs, one of which is BPO, Business Process Outsourcing, or call centers. In
a data gathered by the Annual Survey of Philippines Business and Industries in 2010,
the ICT industry shares 19.3% of the total employment population.
When the internet was fully commercialized in 1995 , it has tremendously
impacted culture and commerce, including the rise of near instant communication by
email, instant messaging, telephony (Voice over Internet Protocol or VoIP), two-way
interactive video calls, and the World Wide Web with its discussion forums, blogs,
social networking, and online shopping sites. Internet is the global system of
interconnected computer networks that use the Internet protocol suite (TCP/IP) to
communicate between networks and devices.
The World Wide Web
The World Wide Web is an information system on the Internet that allows
documents to be connected to other documents by hypertext links, enabling the user
to search for information by moving from one document to another. It was invented
by Tim-Berners Lee. The World Wide Web browser software, such as Microsoft's
Internet Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome,
let users navigate from one web page to another via the hyperlinks embedded in the
documents. These documents may also contain any combination of computer data,
including graphics, sounds, text, video, multimedia and interactive content that runs
while the user is interacting with the page. The Web has enabled individuals and
organizations to publish ideas and information to a potentially large audience online
at greatly reduced expense and time delay.
7
Name: _______________________________
Section: ______________________________
WHAT IS IT
ACTIVITY 1.2: Where do I belong?
DIRECTIONS: Using the Internet, look for the webpages of the pages listed
below. Evaluate whether they are Web 1.0, Web 2.0, or Web 3.0. Write your answer
on the space provided before each number.
2. 7.
3. 8. Encyclopedia Britannica
5. 10.
8
LESSON 1.1: ONLINE PLATFORMS AND SITES
Because of the wide capacity of Web 2.0, it has helped in creating dynamic
online platform sites. Online platform is a specially developed platform using Internet
technology. Online platforms have revolutionized access to any information. Online
platforms currently include, but are not limited to:
Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Media
4. Mapping Platform is a transformation taking the points of one space into the
points of the same or another space. Uses GPS to detect location and used
for navigation.
5. Social Media Platform is a computer-mediated tools that allow large group of
people to create, share or exchange information, interest and the information
shared can be in the form of ideas, pictures, videos or anything that you want
to create and share to virtual communities. It can be in the following platforms:
Bookmarking Sites. These are sites that allow you to store and
9
manage links to various websites and resources.
Social News. These are sites that allow users to post their own
news items or links to other news sources.
Media Sharing. These are sites that allow you to upload and share
media content like images, music, and video. Media sharing sites
can be specific for video sharing, photo sharing, slide sharing,
social bookmarking, and gaming.
Microblogging. These are sites that focus on short updates from
the user. Those subscribed to the user will be able to receive these
updates. Posts are brief that range typically from 140 – 200
characters.
Blogs and Forums. These are websites that allow users to post
their content. Other users can comment on the said topic.
10
Name: _______________________________
Section: ______________________________
WHAT CAN I DO
ACTIVITY 1.3: Which Website Is It?
DIRECTIONS: Listed below are some of the platforms. Complete the table
below by providing name of website and a short description using the internet. Write
your answers on your notebook.
Cloud Computing
File Management
Mapping
Social Networks
Social News
Microblogging
Blogs and
Forums
11
Name: _______________________________
Section: ______________________________
Reflect on the following questions and answer them briefly. Write your answer on the space
provided. Please refer to the rubrics on the next page.
1. How dependent are we on technology?
2. How do the different online platforms help you as a student in your chosen
track?
Criteria Score
Completeness (5 points)
Does your response directly answer 5 4 3 2 1
each part of the question(s)?
Knowledge (10 points)
Does your response clearly show you
have read and understand the lesson
content by correctly defining key
terms, key persons and summarizing 10 - 9 8-7 6-5 4-3 2-1
concepts?
Have you made inferences based on
this knowledge to personal or modern-
day applications?
Writing Skills (5 points)
Do you write clearly, in complete
sentences, with minimal errors in 5 4 3 2 1
grammar and spelling?
12
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write
your answers on the space before each number.
1. What type of web provides a framework that allows data to be shared and reuse to
deliver web content specifically targeting the user?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Website
4. Twitter statuses are only composed of a few characters. What type of social media
site does Twitter belong?
A. Micro blogging C. Social Networks
B. Media Sharing D. Bookmarking Sites
5. Social networks are sites that allow you to connect with other people having the
same interests. It allows you to share your own news and other news from other
sources.
6. The Philippines is considered as the “ICT Hub in Asia.” The ICT Industry shares
19.3% of the total employment population in the Philippines coming from the
government agencies.
7. Marisa wants to publish her collections of original poems online. Which online
platform must she do this?
A. Social News B. Bookmarking Site C. YouTube D. Blogs
8. Watson is creating a cover video of his favorite song. Which online platform must he
publish this?
A. Social News B. Bookmarking Site C. YouTube D. Blogs
9. Cathy has created a very good slideshow presentation on a certain topic, and she
wants to share it to other teachers around the world. Which online platform must
she publish this?
A. Presentation Platforms C. File Management Platforms
B. Cloud Computing Platforms D. Social Media Platforms
10. What is the name of the symbol that is used to classify and categorize information?
A. Hashtag B. Question Mark C. Asterisk D. At sign
13
WHAT I NEED TO KNOW
,
LESSON 2: Online Safety, Security and Netiquette
The internet is the guiding technology of the Information Technology Age just
as the electrical engine was of the Industrial Age. In these times, more and more
people are already engaged in the use of technology. These people who are raised
in a digital, media-saturated world are called digital natives. No doubt, the Internet
has been very useful to us but with the rise of instant messaging, chat rooms, emails
and social networking sites, it can also bring trouble - from cyberbullying to more
serious Internet dangers, including exposure to sexual predators. Thus, internet
safety is always our primary concern.
WHAT I KNOW
I bet you are ready to know if you have practiced online safety, aren’t you? But
before that, take time to answer the pre-test to gauge how much you know about the
lesson.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on the space provided before each number.
1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
6. What type of online threat happens when an attacker uses electronic devices
to do unwanted surveillance against its victim?
A. Cyberbullying B. Phishing C. Spamming D.
Cyberstalking
7. What type of online threat happens when the attacker impersonates another
individual or organization to gather personal or business information?
A. Cyberstalking B. Spoofing C. Scamming D. Pharming
8. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
9. What is the golden rule of netiquette?
A. Remember the human. C. Use correct grammar.
B. Put a smiley in every message. D. Respect people’s time.
10. You get an email telling you that you won a hundred thousand without joining
in a competition. You should .
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge
WHAT’S IN
Read the headlines found below and try to reflect on the questions that follow.
ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.
There's almost no limit to what you can do online. The Internet makes it
possible to access information quickly, communicate around the world, and much
more. Unfortunately, the Internet is also home to certain risks, such as malware,
spam, and phishing. If you want to stay safe online, you'll need to understand these
risks and learn how to avoid them.
Name: _______________________________
Section: ______________________________
WHAT’S NEW
ACTIVITY 2.1: Shared or Not Shared? That is the Question
DIRECTIONS: Read and reflect each item carefully. Copy the table below on your
notebook and check the space whether you have shared or not shared these pieces
of information in all your social media accounts.
First Name
Middle Name
Last Name
Current and Previous
School/s
Your cellphone number
Complete name of mother
and father
Your parents’ cellphone
numbers
Name of Siblings
Your Address
Your Birthday
3. Based from your answers above, do you think you are safe when using the
Internet? Why?
WHAT IS IT
There are numerous delinquencies that can be committed on the internet such
as stalking, identity theft, privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is
a reputable business having a secure service. To make sure that you are in a
secured network, the website address should begin with “https://’ as
opposed to “http://”. Never access your accounts by following an email link,
instead type your URL by yourself.
19
Info source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate
Regularly review your privacy settings in your online accounts to make sure
you are not sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data
before leaving.
19
Name: _______________________________
Section: ______________________________
A C
B D
4. Your parents bought you your first cellphone. How will you share your
cellphone number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
L
e
WHAT IS IT
s
Lesson 2.2: Kinds of Online
Threats
There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities
to attack computers and retrieve sensitive data from individuals. Half the time, we
aren’t even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which utilize
HTTP or HTTPS protocols, but may also employ other protocols and components,
such as links in email or Instant Messaging apps, or any malware attachments on
servers that access the Web. They benefit cybercriminals by stealing information for
subsequent sale and help absorb infected PCs into botnets. Web threats pose a
broad range of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
Phishing happens when an email is sent from an internet criminal disguised
as an email from a legitimate, trustworthy source. The message is meant to
lure you into revealing sensitive or confidential information.
23
1. # 2. #
28
3 # 4 #
24
5 #
Name: _______________________________
Section: ______________________________
From all you have learned in Lesson 2, why is there a need to “think before you click?”
Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
1. What type of malicious program is designed to replicate itself and transfer from
one computer to another either through the internet or local networks or data
storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
2. What harmful online programs are designed to send you advertisements,
mostly pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomware
3. What harmful online program is used to record keystrokes done by users to
steal passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomware
26
WHAT I NEED TO KNOW
Lesson 3: Effective Internet Research
The Internet has made our lives easier especially in terms of doing research.
By browsing the internet, we can access limitless topics. Web-based catalogs are
available in many libraries to assist researchers in locating printed books, journals,
government documents and other materials. The biggest obstacle facing all
researchers on the internet is how to effectively and efficiently access the vast
amount of information available (The Internet: Research Tools, 2013).
WHAT I KNOW
Before we take on another journey towards exploring the great capacity of the
internet into research, kindly take time to answer the following questions for your pre-
test.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper.
A
c
_
Activity 3.1: What’s In My Name?
_
Direction: Write all your answers in your activity notebook.
1. Using the Internet, try to search for your complete name.
2. Write down how many sites have featured your personal name and what is
written about you.
3. Answer the following:
28
Lesson 3.1: Searching the Web
There are billions of information on the web and it is a challenge for us to truly find
which information is reliable and relevant. Here are some tips you may use to be able
to look for relevant and reliable sources:
Search Engines are websites used for retrieval of data, files, or documents
from data bases. Some search engines we use today are:
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic
term for all types of names and addresses that refer to objects on the
world wide web. Knowing the URL endings will give you clues to who is
sponsoring the website and help evaluate the sources.
https://www.searchenginejournal.com/alternative-searchengines/271409/#close
3 4 5 7
1 2 6
29
Popular Domains
Top- level Domains Country code top level domains
.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network
Search Skills and Tools
1. Boolean Logic – narrows, broadens, or eliminates search term.
a. Boolean “or” – this operator will find
pages that include either of the
search terms.
Ex. A or B
A B
A B
3. Plus (+) – indicates that the word after the sign is a required word must be
found in search. Example: +fire
4. Minus (–) sign – indicates to exclude a word from your search that is not
required on the result. Example: Jaguar speed –car
7. Finding Documents – using the filetype refines the search for documents
on the web.
o filetype:pdf
o filetype:doc
o filetype:xls
Ex. ICT in the Philippines pdf 30
8. Searching Site – the sites find webpage from a website.
Ex.: National Geographic information in Australia
Search: Australia site: NationalGeographic.com
Name: _______________________________
Section: ______________________________
WHAT IS IT
URL:
Title of Article: L WHAT’S NEW
e
s
son 3.3: Evaluating Sites
Paste printed article here.
31
The web provides access to some excellent information and can also give
access to those that are irrelevant and outdated. Here is some checklist that you can
use to evaluate your website:
1. Authority. It reveals that the person, institution or agency responsible for a
site has the qualifications and knowledge to do so. Evaluating a web site for
authority:
✓ Authorship: It should be clear who developed the site.
✓ Contact information should be clearly provided: e-mail address, snail
mail address, phone number, and fax number.
✓ Credentials: the author should state qualifications, credentials, or
personal background that gives them authority to present information.
✓ Check to see if the site supported by an organization or a commercial
body
4. Currency. It refers to: (1) how current the information presented is, and (2)
how often the site is updated or maintained. It is important to know when a
site was created, when it was last updated, and if all of the links are current.
Evaluating a web site for currency involves finding the date information was:
37
✓ first written
✓ placed on the web
✓ last revised
6. Accuracy. It refers to the credibility of the website. Evaluating a web site for
accuracy:
✓ Reliability: Is the author affiliated with a known, respectable institution?
✓ References: do statistics and other factual information receive proper
references as to their origin?
✓ Is the information comparable to other sites on the same topic?
✓ Does the text follow basic rules of grammar, spelling and composition?
✓ Is a bibliography or reference list included?
Name: _______________________________
Section: ______________________________
Directions:
1. Using the Internet, research on topics under CoVid-19 in the Philippines.
2. Read through the checklist and answer each question. Use separate sheet of paper for this
activity.
3. Attach a printout of the web site you are evaluating and paste in your answer
sheet
1. What is the URL or web address of the web site you are evaluating?
http://
I couldn’t tell
The author is:
41
37
What authorship clues did the URL (web address) provide? Check all that
apply:
In your own words, briefly describe the purpose of the web site:
CURRENCY
Yes
No
WHAT I HAVE LEARNED
35
Name: _______________________________
Section: ______________________________
ASSESSMENT
Direction: Read each item carefully and choose the letter of the correct
answer. Write your answers on a separate sheet of paper or in your notebook.
2. What is a URL?
A. A computer software program
B. An acronym for Unlimited Resources for Learning
C. The address of a document or "page" on the World Wide Web
D. A search engine
5. An article that only presents one point of view or omits facts is biased.
A. True B. False
36