0% found this document useful (0 votes)
21 views

Notes Module 1-3

Uploaded by

Cherry Delica
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Notes Module 1-3

Uploaded by

Cherry Delica
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

QUARTER 1 QUARTER 1

Module 1: ICT in the Context of Global Communication Module 1: ICT in the Context of Global Communication

LESSON 1: What is Information and Communications Technology? LESSON 1: What is Information and Communications Technology?

a. Information and Communication Technology (ICT) often deals with a. Information and Communication Technology (ICT) often deals with
the use of different technologies such as mobile phones, telephones, the use of different technologies such as mobile phones, telephones,
computer, Internet, and other devices, as well as software and computer, Internet, and other devices, as well as software and
applications to locate, save, send, and manipulate information. applications to locate, save, send, and manipulate information.
b. Empowering ICT is important for its innovative uses impacts our b. Empowering ICT is important for its innovative uses impacts our
daily lives. daily lives.
c. It has affected our ways of communicating, made our lives more c. It has affected our ways of communicating, made our lives more
convenient, and assisted countries towards their modernization plans. convenient, and assisted countries towards their modernization plans.

The World Wide Web The World Wide Web

a. The World Wide Web is an information system on the Internet that a. The World Wide Web is an information system on the Internet that
allows documents to be connected to other documents by hypertext allows documents to be connected to other documents by hypertext
links, enabling the user to search for information by moving from one links, enabling the user to search for information by moving from one
document to another. document to another.
b. It was invented by Tim-Berners Lee in 1989. b. It was invented by Tim-Berners Lee in 1989.
c. The World Wide Web browser software, such as Microsoft's Internet c. The World Wide Web browser software, such as Microsoft's Internet
Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google
Chrome, let users navigate from one web page to another via the Chrome, let users navigate from one web page to another via the
hyperlinks embedded in the documents. hyperlinks embedded in the documents.
c. These documents may also contain any combination of computer c. These documents may also contain any combination of computer
data, including graphics, sounds, text, video, multimedia, and data, including graphics, sounds, text, video, multimedia, and
interactive content that runs while the user is interacting with the page. interactive content that runs while the user is interacting with the page.
d. The Web has enabled individuals and organizations to publish ideas d. The Web has enabled individuals and organizations to publish ideas
and information to a potentially large audience online at greatly reduced and information to a potentially large audience online at greatly reduced
expense and time delay. expense and time delay.

TYPES OF WEB PAGES TYPES OF WEB PAGES

Web 1.0 or The Web Web 1.0 or The Web


a. It is the first stage of the World Wide Web evolution. It is a flat or a. It is the first stage of the World Wide Web evolution. It is a flat or
stationary page since it cannot be manipulated by the user. stationary page since it cannot be manipulated by the user.
b. Webpages are static and not interactive. You can’t post, comments or b. Webpages are static and not interactive. You can’t post, comments or
create an account. create an account.

Example: Example:
Encyclopedia Britannica Encyclopedia Britannica
Trio Healthcare Group Trio Healthcare Group

Web 2.0 or The Social Web Web 2.0 or The Social Web
a. Allows users to interact with the page, the user may be able to a. Allows users to interact with the page, the user may be able to
comment or create a user account. Most website that we visit today are comment or create a user account. Most website that we visit today are
Web 2.0. Web 2.0.

Features of Web 2.0 Features of Web 2.0

Web 3.0 or Semantic Web Web 3.0 or Semantic Web


a. The semantic web provides a framework that allows data to be a. The semantic web provides a framework that allows data to be
shared and reuse to deliver web content specifically targeting the user. shared and reuse to deliver web content specifically targeting the user.
b. Search Engine will learn about you and your habits from each b. Search Engine will learn about you and your habits from each
search you perform and will gather details about you from your search you perform and will gather details about you from your
previous activities like likes and social postings and present the previous activities like likes and social postings and present the
answers as per your preferences. answers as per your preferences.
c. Semantics – ability of Web technologies to understand and interpret c. Semantics – ability of Web technologies to understand and interpret
human-generated content. human-generated content.
d. The aim of Web 3.0 is to have machines understand the user’s d. The aim of Web 3.0 is to have machines understand the user’s
preferences to be able to deliver web content specifically targeting the preferences to be able to deliver web content specifically targeting the
user. user.
e. The Internet can predict the best possible answers to your question e. The Internet can predict the best possible answers to your question
by learning from your previous choices. by learning from your previous choices.
LESSON 1.1: ONLINE PLATFORMS AND SITES
ICT in the Philippines LESSON 1.1: ONLINE PLATFORMS AND SITES
Social Media Platform is a computer-mediated tools that allow large ICT in the Philippines
group of people to create, share or exchange information, interest and Social Media Platform is a computer-mediated tools that allow large
the information shared can be in the form of ideas, pictures, videos, or group of people to create, share or exchange information, interest and
anything that you want to create and share to virtual communities. It the information shared can be in the form of ideas, pictures, videos, or
can be in the following platforms: anything that you want to create and share to virtual communities. It
a. Social Networks These sites allow you to connect with other people can be in the following platforms:
with the same interests or background. a. Social Networks These sites allow you to connect with other people
Example: Facebook with the same interests or background.
b. Bookmarking Sites These are sites that allow you to store and Example: Facebook
manage links to various websites and resources. b. Bookmarking Sites These are sites that allow you to store and
Example: Pinterest manage links to various websites and resources.
c. Social News These are sites that allow users to post their own news Example: Pinterest
items or links to other news sources. Example: digg c. Social News These are sites that allow users to post their own news
d. Media Sharing These are sites that allow you to upload and share items or links to other news sources. Example: digg
media content like images, music, and video. Media sharing sites can be d. Media Sharing These are sites that allow you to upload and share
specific for video sharing, photo sharing, slide sharing, social media content like images, music, and video. Media sharing sites can be
bookmarking, and gaming. specific for video sharing, photo sharing, slide sharing, social
Example: YouTube and Instagram bookmarking, and gaming.
e. Microblogging These are sites that focus on short updates from the Example: YouTube and Instagram
user. Those subscribed to the user will be able to receive these updates. e. Microblogging These are sites that focus on short updates from the
Posts are brief that range typically from 140 – 200 characters. Example: user. Those subscribed to the user will be able to receive these updates.
Twitter Posts are brief that range typically from 140 – 200 characters. Example:
f. Blogs and Forums These are websites that allow users to post their Twitter
content. Other users can comment on the said topic. f. Blogs and Forums These are websites that allow users to post their
Example: Blogger, WordPress, Tumblr content. Other users can comment on the said topic.
Example: Blogger, WordPress, Tumblr
LESSON 2:
Online Safety, Security and Netiquette LESSON 2:
Online safety refers to the practices and precautions that should be Online Safety, Security and Netiquette
observed. Online safety refers to the practices and precautions that should be
observed.
TYPE OF INFORMATION RISKS
TYPE OF INFORMATION RISKS
FIRST NAME There is still a risk in sharing
your first name. Chances are, a FIRST NAME There is still a risk in sharing
hacker already knows plenty of your first name. Chances are, a
stuff about you even if you only hacker already knows plenty of
give out your first name. stuff about you even if you only
give out your first name.
LAST NAME You will be vulnerable to being
searched for using search LAST NAME You will be vulnerable to being
engines, which include image searched for using search
search. Matching a name with engines, which include image
a face can led to several search. Matching a name with
cybercrimes like identity theft. a face can led to several
cybercrimes like identity theft.
MIDDLE NAME Sharing your entire full name
would be. MIDDLE NAME Sharing your entire full name
would be.
CURRENT AND PREVIOUS Most people who steal identities
SCHOOL(S) study their subject. They can CURRENT AND PREVIOUS Most people who steal identities
use this information for SCHOOL(S) study their subject. They can
verification purposes. use this information for
verification purposes.
YOUR CELLPHONE NUMBER Your cellphone number should
never be posted over the YOUR CELLPHONE NUMBER Your cellphone number should
Internet. never be posted over the
Internet.
WHO YOUR MOTHER AND In fact, if you have already
FATHER ARE encountered many websites WHO YOUR MOTHER AND In fact, if you have already
that require your mother’s FATHER ARE encountered many websites
maiden name as an answer to a that require your mother’s
secret question whenever you maiden name as an answer to a
lose your password. secret question whenever you
lose your password.
WHO YOUR SIBLINGS ARE This a huge risk, especially if
you have younger siblings. WHO YOUR SIBLINGS ARE This a huge risk, especially if
Strangers may pretend or use you have younger siblings.
their identity to dupe you. Strangers may pretend or use
their identity to dupe you.
YOUR ADDRESS Hopefully you answered no to
this one. Giving the Internet YOUR ADDRESS Hopefully you answered no to
your number is one thing, this one. Giving the Internet
giving them your address is a your number is one thing,
whole other level. It would be giving them your address is a
much easier for criminals to whole other level. It would be
find you. much easier for criminals to
find you.
YOUR HOME PHONE NUMBER This shared information is
more risky than sharing your YOUR HOME PHONE NUMBER This shared information is
personal phone number. Scams more risky than sharing your
usually use this information to personal phone number. Scams
deceive you, one of which is usually use this information to
when a stranger pretends to deceive you, one of which is
know your parents or pretends when a stranger pretends to
to be you. know your parents or pretends
to be you.
YOUR BIRTHDAY Letting know your birthday is
probably a must if you want to YOUR BIRTHDAY Letting know your birthday is
get as many gifts as possible. probably a must if you want to
But having it in your profile get as many gifts as possible.
makes you vulnerable to But having it in your profile
identity theft. makes you vulnerable to
identity theft.
.com – commercial site .au - Australia
Netiquette is a combination of the words network and etiquette. It is a .net - network
set of rules for behaving properly online.
Netiquette is a combination of the words network and etiquette. It is a
Below are the 10 rules of netiquette: set of rules for behaving properly online.
RULE 1: Remember the human.
RULE 2: Adhere to the same standards of behavior online that you Below are the 10 rules of netiquette:
follow in real life. RULE 1: Remember the human.
RULE 3: Know where you are in cyberspace. RULE 2: Adhere to the same standards of behavior online that you
RULE 4: Respect other people’s time and bandwidth follow in real life.
RULE 5: Make yourself look good online. RULE 3: Know where you are in cyberspace.
RULE 6: Share expert knowledge. RULE 4: Respect other people’s time and bandwidth
RULE 7: Help keep flame wars under control. RULE 5: Make yourself look good online.
Flame war is a series of flame posts or messages in a thread RULE 6: Share expert knowledge.
that are considered derogatory in nature or are completely off- RULE 7: Help keep flame wars under control.
topic. Flame war is a series of flame posts or messages in a thread
RULE 8: Respect other people’s privacy. that are considered derogatory in nature or are completely off-
RULE 9: Don’t abuse your power. topic.
RULE 10: Be forgiving of other people’s mistakes. RULE 8: Respect other people’s privacy.
RULE 9: Don’t abuse your power.
Kinds of Online Threats RULE 10: Be forgiving of other people’s mistakes.
Online threat is deemed any malicious act that attempts to gain access
to a computer network without authorization or permission from the Kinds of Online Threats
owners. Online threat is deemed any malicious act that attempts to gain access
to a computer network without authorization or permission from the
Phishing - happens when an email is sent from an internet criminal owners.
disguised as an email from a legitimate, trustworthy source.
Pharming - happens when a hacker (or “pharmer”) directs an internet Phishing - happens when an email is sent from an internet criminal
user to a fake website instead of a legitimate one. disguised as an email from a legitimate, trustworthy source.
Internet Scam - generally refers to someone using internet services or Pharming - happens when a hacker (or “pharmer”) directs an internet
software to defraud or take advantage of victims, typically for financial user to a fake website instead of a legitimate one.
gain. Internet Scam - generally refers to someone using internet services or
Internet robots - are also known as spiders, crawlers, and web bots. It software to defraud or take advantage of victims, typically for financial
is a software application that is programmed to do certain tasks. Bots gain.
are automated, which means they run according to their instructions Internet robots - are also known as spiders, crawlers, and web bots. It
without a human user. is a software application that is programmed to do certain tasks. Bots
Malware - or malicious software, is any program or file that is harmful are automated, which means they run according to their instructions
to a computer user. Here are the most common offenders in the rogues’ without a human user.
gallery of malware: Malware - or malicious software, is any program or file that is harmful
Adware - (advertising supported software) is unwanted to a computer user. Here are the most common offenders in the rogues’
software designed to throw advertisements up on your screen. gallery of malware:
Example, pop-up ads and banner ads. Adware - (advertising supported software) is unwanted
Spyware - is malware that secretly observes the computer software designed to throw advertisements up on your screen.
user’s activities without permission and reports it to the Example, pop-up ads and banner ads.
software’s author. Spyware - is malware that secretly observes the computer
Virus and Worms - are malwares that attach to another user’s activities without permission and reports it to the
program and, when executed—unintentionally by the user— software’s author.
replicates itself by modifying other computer programs and Virus and Worms - are malwares that attach to another
infecting them with its own bits of code. program and, when executed—unintentionally by the user—
Trojan, or Trojan horse - is one of the most dangerous replicates itself by modifying other computer programs and
malware types. It usually represents itself as something useful infecting them with its own bits of code.
in order to trick you. Trojan, or Trojan horse - is one of the most dangerous
Ransomware - is a form of malware that locks you out of your malware types. It usually represents itself as something useful
device and/or encrypts your files, then forces you to pay a in order to trick you.
ransom to get them back. Ransomware - is a form of malware that locks you out of your
Spams - are unsolicited emails, instant messages coming from device and/or encrypts your files, then forces you to pay a
recipients that are not granted verifiable permission for the ransom to get them back.
message to be sent. Spams - are unsolicited emails, instant messages coming from
Cyberstalking - refers to the use of the internet or other electronic recipients that are not granted verifiable permission for the
device to harass or stalk individuals or organizations. message to be sent.
Cyberbullying - refers to the act of tormenting, harassing, or Cyberstalking - refers to the use of the internet or other electronic
embarrassing another person using the internet. device to harass or stalk individuals or organizations.
Spoofing - happens when someone or something pretends to be Cyberbullying - refers to the act of tormenting, harassing, or
something else to gain our confidence, get access to our systems, steal embarrassing another person using the internet.
data, steal money, or spread malware. Spoofing - happens when someone or something pretends to be
something else to gain our confidence, get access to our systems, steal
Lesson 3: Effective Internet Research data, steal money, or spread malware.
Search Engines are websites used for retrieval of data, files, or
documents from data bases. Some search engines we use today are: Lesson 3: Effective Internet Research
Search Engines are websites used for retrieval of data, files, or
documents from data bases. Some search engines we use today are:

Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic
term for all types of names and addresses that refer to objects on the Anatomy of a URL
World Wide Web. A URL is one type of Uniform Resource Identifier (URI). It is a generic
term for all types of names and addresses that refer to objects on the
World Wide Web.

1. Protocol 5. Folders/Path
2. Subdomain 6. Page
3. Domain 7. Named anchor 1. Protocol 5. Folders/Path
4. Top – level domain 2. Subdomain 6. Page
3. Domain 7. Named anchor
Popular Domains 4. Top – level domain

Top- level Domains Country code top level Popular Domains


domains
.edu – educational institution .ph – Philippines Top- level Domains Country code top level
.org – non-profit organization .eu – European Union domains
.gov – government site .uk – United Kingdom .edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network

Search Skills and Tools

1. Boolean Logic – narrows, broadens, or eliminates search term. Search Skills and Tools
A. Boolean “or” – this operator will find pages that include
either of the search terms. Example: A or B 1. Boolean Logic – narrows, broadens, or eliminates search term.
B. Boolean “and” – this operator will retrieve only pages A. Boolean “or” – this operator will find pages that include
containing both terms. Example: A and B either of the search terms. Example: A or B
C. Boolean “not” – this operator will find pages that do not B. Boolean “and” – this operator will retrieve only pages
include search term immediately following it. Ex. A not B containing both terms. Example: A and B
2. Phase Searching – is used to search for famous quotes, proper C. Boolean “not” – this operator will find pages that do not
names, recommendations, etc. It encloses the phrase in quotation include search term immediately following it. Ex. A not B
marks. Ex. “Jane Doe” “To be or not to be” 2. Phase Searching – is used to search for famous quotes, proper
3. Plus (+) – indicates that the word after the sign is a required word names, recommendations, etc. It encloses the phrase in quotation
must be found in search. Example: +fire marks. Ex. “Jane Doe” “To be or not to be”
4. Minus (–) sign – indicates to exclude a word from your search that is 3. Plus (+) – indicates that the word after the sign is a required word
not required on the result. Example: Jaguar speed –car must be found in search. Example: +fire
5. Ampersand (@) - is used to find social tags. Example: @SteveJobs 4. Minus (–) sign – indicates to exclude a word from your search that is
6. Hashtag (#) - is used to find popular hashtags. Example: #LawOfClassroom not required on the result. Example: Jaguar speed –car
7. Finding Documents – using the file type refines the search for 5. Ampersand (@) - is used to find social tags. Example: @SteveJobs
documents on the web. 6. Hashtag (#) - is used to find popular hashtags. Example: #LawOfClassroom
o filetype:pdf 7. Finding Documents – using the file type refines the search for
o filetype:doc documents on the web.
o filetype:xls o filetype:pdf
8. Searching Site – the sites find webpage from a website. o filetype:doc
Ex.: National Geographic information in Australia o filetype:xls
Search: Australia site: NationalGeographic.com 8. Searching Site – the sites find webpage from a website.
Ex.: National Geographic information in Australia
Search: Australia site: NationalGeographic.com
Lesson 3.3: Evaluating Sites

Here is some checklist that you can use to evaluate your website: Lesson 3.3: Evaluating Sites

1. Authority. It reveals that the person, institution or agency Here is some checklist that you can use to evaluate your website:
responsible for a site has the qualifications and
knowledge to do so. Evaluating a web site for authority: 1. Authority. It reveals that the person, institution or agency
a. Authorship: It should be clear who developed the site. responsible for a site has the qualifications and
b. Contact information should be clearly provided: e-mail address, knowledge to do so. Evaluating a web site for authority:
snail mail address, phone number, and fax number. a. Authorship: It should be clear who developed the site.
c. Credentials: the author should state qualifications, credentials, or b. Contact information should be clearly provided: e-mail address,
personal background that gives them authority to present snail mail address, phone number, and fax number.
information. c. Credentials: the author should state qualifications, credentials, or
d. Check to see if the site supported by an organization or a personal background that gives them authority to present
commercial body information.
2. Purpose. The purpose of the information presented in the site should d. Check to see if the site supported by an organization or a
be clear. Some sites are meant to inform, persuade, state commercial body
an opinion, entertain or parody something or someone. 2. Purpose. The purpose of the information presented in the site should
3. Coverage. This refers to how comprehensive the website is in their be clear. Some sites are meant to inform, persuade, state
discussion of certain topics. an opinion, entertain or parody something or someone.
4. Currency. It refers to: (1) how current the information is presented 3. Coverage. This refers to how comprehensive the website is in their
is, and (2) how often the site is updated or maintained. discussion of certain topics.
Evaluating a website for currency involves finding the date 4. Currency. It refers to: (1) how current the information is presented
information was: first written, placed on the web, and last is, and (2) how often the site is updated or maintained.
revised. Evaluating a website for currency involves finding the date
5. Objectivity. Objective sites present information with a minimum information was: first written, placed on the web, and last
bias. revised.
6. Accuracy. It refers to the credibility of the website. 5. Objectivity. Objective sites present information with a minimum
bias.
6. Accuracy. It refers to the credibility of the website.

You might also like