Empowerment Technologies Quarter 1, Module 1
Empowerment Technologies Quarter 1, Module 1
EMPOWERMENT
TECHNOLOGIES
FIRST SEMESTER
FIRST QUARTER
MODULE 1
Information and Communications Technology,
Online Safety, Security, Ethics and Etiquette
Management Team:
Leilani S. Cunanan, CESO V
Schools Division Superintendent
Maylene M. Minimo, EdD, CESE
OIC- Assistant Schools Division Superintendent
Ariel C. Lansang
Chief, Curriculum Implementation Division
Jose C. Tala, EdD
EPS, Learning Resource Management System
Corazon B. Dumlao
PSDS, SHS Focal Person
Quarter: First Quarter (Week 1)
Content: Information and Communications Technology
1. Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class
objectives or address situational challenges. (CS_ICT11/12-ICTPT-Ia-b-1)
2. Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate
to their specific professional tracks. (CS_ICT11/12-ICTPT-Ia-b-2)
(F11PU – IIg – 88)
WHAT I KNOW
Directions: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of paper.
1. What type of web page is classified as flat or stationary?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0
2. What web 2.0 feature allows users to subscribe to a data plan that charges for time spent on the internet?
A. Folksonomy B. Long Tail C. User Participation D. Application
3. What is the name of the symbol that is used to classify and categorize information?
A. Hashtag B. Question Mark C. Asterisk D. At sign
4. These are computer-mediated tools that allow people or companies to create, share, or exchange information, career interests,
ideas, and pictures/videos in virtual communities and networks.
A. Microblogging B. Media Sharing C. Social Media D. Social News
5. It is an extension of the term convergence, which means a “coming together of two or more disparate disciplines or technologies.
A. Collaborative Platforms B Convergent Technologies C. WWW D. Internet
6. What is Netiquette?
A. The proper use of manners and etiquette on the Internet. B. Using a net to catch fish.
C. Being mean to other people on Facebook. D. Using proper manners at the dinner table.
7. What is considered shouting over the Internet?
A. Screaming at your computer. B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence. D. Not answering a friend request on Facebook.
8. It is OK to forward or post an email message that you received if __________
A. the message is typed in all capitals. B. the author of the message has given you permission to forward or post it.
C. it does not contain any copyrighted material. D. the author of the message hasn't marked it as confidential.
9. It is the illegal act of sending emails or messages that appear to come from authentic sources, but came from spammers.
A. Spamming B. Phishing C. Pharming D. Cyberstalking
10. It is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them
back.
A. Trojan Horse B. Worm C. Ransomware D. Adware
WHAT’S NEW
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) - ICT is an umbrella term that includes any communication device
or application, encompassing radio, television, cellular phones, computer and network hardware and software, satellite systems, and
so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning. It
may also be defined as, digital forms of communication including tools available on the Internet, such as blogging and email, as well
as computer software, such as Microsoft PowerPoint and Word.
1. Assistive Media - a component under Assistive technology (AT), which is a generic term used to refer to a group of software or
hardware devices by which people with disabilities can access computers. Assistive Media is also a name of a company: “the
Internet's first audio solution for persons with print reading/access barriers. The audio recordings of the literary works produced by
Assistive Media are now easily accessible, on-demand, to the ever-growing number of persons with disabilities who now use the
Internet.”
2. Collaborative platforms - “is a category of business software that adds broad social networking capabilities to work processes.”
3. Convergent Technologies - an extension of the term convergence, which means a “coming together of two or more disparate
disciplines or technologies. For example, the so-called fax revolution was produced by a convergence of telecommunications
technology, optical scanning technology, and printing technology.” Convergent Technologies also refers to an American computer
company formed by a small group of people who left Intel Corporation and Xerox PARC in 1979.
4. Mobile Media - This refers to “media devices such as mobile phones and PDA’s were the primary source of portable media from
which we could obtain information and communicate with one another. More recently, the smartphone (which has combined many
features of the cell phone with the PDA) has rendered the PDA obsolete.5 The growth of new mobile media as a true force in society
was marked by smartphone sales outpacing personal computer sales in 2011.”
5. Online systems - are online versions of information systems, which are “the process of and tools for storing, managing, using,
and gathering of data and communications in an organization. An example of information systems are tools for sending out
communications and storing files in a business.”
6. Social Media - “are computer-mediated tools that allow people or companies to create, share, or exchange information, career
interests, ideas, and pictures/videos in virtual communities and networks.”
7. Internet- It is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate
between networks and devices.
8. World Wide Web- The World Wide Web is an information system on the Internet that allows documents to be connected to other
documents by hypertext links, enabling the user to search for information by moving from one document to another. It was invented
by Tim-Berners Lee. The World Wide Web browser software, such as Microsoft's Internet Explorer/Edge, Mozilla Firefox, Opera,
Apple's Safari, and Google Chrome, let users navigate from one web page to another via the hyperlinks embedded in the documents.
These documents may also contain any combination of computer data, including graphics, sounds, text, video, multimedia, and
interactive content that runs while the user is interacting with the page. The Web has enabled individuals and organizations to publish
ideas and information to a potentially large audience online at greatly reduced expense and time delay.
Types of Webpages
● Web 1.0 or the Web - It is the first stage of the World Wide Web evolution. It is a flat or stationary page since it cannot be
manipulated by the user.
● Web 2.0 or the Social Web - “describes World Wide Web sites that emphasize user-generated content, usability, and
interoperability. The term was popularized by Tim O'Reilly and Dale Dougherty at the O'Reilly Media Web 2.0 Conference
in late 2004, though it was coined by Darcy DeNucci in 1999.” It allows users to interact with the page, the user may be able
to comment or create a user account. Most of the websites that we visit today are Web 2.0.
Features of Web 2.0
1. Folksonomy- allows users to collectively classify and find information using freely chosen keywords (e.g.,
"tagging" by Facebook). Tagging uses the pound sign #, often referred to as the hashtag.
2. Rich User Experience- dynamic content that is responsive to user input (e.g., a user can "click" on an image to
enlarge it or find out more information).
3. User participation- the owner of the website is not the only one who can put content. Others can place content
on their own using comments, reviews, and evaluations.
4. Long Tail- services that are offered on-demand rather than on a one-time purchase. This is synonymous with
subscribing to a data plan that charges you for the amount of time you spent on the Internet, or a data plan that charges
you for the amount of bandwidth you used.
5. Software as a service- users will subscribe to software only when needed rather than purchasing them.
● Web 3.0 or Semantic Web - “a phrase coined by John Markoff of the New York Times in 2006, refers to a supposed third
generation of Internet-based services that collectively comprise what might be called ‘the intelligent Web’. The semantic
web provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user.
Search Engine will learn about you and your habits from each search you perform and will gather details about you from
your previous activities like likes and social postings and present the answers as per your preferences.
WHAT IS IT
messaging, chat rooms, emails, and social networking sites, it can also bring trouble - from cyberbullying to more serious Internet
dangers, including exposure to sexual predators. Thus, internet safety is always our primary concern. Online safety refers to the
practices and precautions that should be observed when using the internet to ensure that the users, as well as their computers and
personal information, are safe from crimes associated with using the internet.
Numerous delinquencies can be committed on the internet such as stalking, identity theft, privacy violations, and harassment. To
avoid these online crimes, follow the following online safety measures:
✔ Never give any personal information out about yourself over the internet.
✔ Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service.
To make sure that you are in a secured network, the website address should begin with “https://’ as opposed to “http://”.
Never access your accounts by following an email link, instead, type your URL by yourself.
✔ Never open messages or attachments from someone you do not know.
✔ Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal
information.
✔ When using a public computer terminal, be sure to delete your browsing data before leaving.
✔ Do not download or install software or anything on your computer or cell phone that is unknown to you.
The Computer Ethics Institute provides the following Ten Commandments of Computer Ethics as a code of computer ethics.
Online threat is deemed any malicious activity that attempts to gain access to a computer network without authorization or
permission from the owners.
❖ Phishing happens when an email is sent from an internet criminal disguised as an email from a legitimate, trustworthy
source. The message is meant to lure you into revealing sensitive or confidential information.
❖ Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate one.
These “spoofed” sites can capture a victim’s confidential information, including usernames, passwords, and credit card data,
or install malware on their computer.
❖ Internet Scam generally refers to someone using internet services or software to defraud or take advantage of victims,
typically for financial gain. Cybercriminals may contact potential victims through personal or work email accounts, social
networking sites, dating apps, or other methods in attempts to obtain financial or other valuable personal information.
❖ Malware or malicious software is any program or file that is harmful to a computer user. Here are the most common
offenders in the rogues’ gallery of malware:
⮚ Adware (advertising-supported software) is unwanted software designed to throw advertisements up on your screen.
Examples, pop-up ads and banner ads.
⮚ Spyware is malware that secretly observes the computer user’s activities without permission and reports it to the
software’s author. An example is a keylogger. A keylogger records keystrokes done by users to steal passwords
⮚ Virus and Worms are malware that attaches to another program and when executed—unintentionally by the user—
replicates itself by modifying other computer programs and infecting them with their bits of code.
⮚ Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as something useful
to trick you. Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected
computer. From there, Trojans can be used to steal financial information or install threats like viruses and ransomware.
⮚ Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay
a ransom to get them back.
1. Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly online.
2. Aggregator is a website or Web application where headlines and other content are collected for easy viewing. Aggregators such
as Google News compile news articles and posts.
3. Avatar is a two- or three-dimensional icon that represents a computer user or a gamer. Avatar can be a cartoonish graphic, a
photograph, a screen name, or a fully developed character.
4. Blog, from the term “weblog”, is a type of website usually updated by an individual or a group of bloggers. Some blogs provide
news or opinions on a specific subject, while others are more like online journals. Most blogs allow readers to leave comments on
blog posts.
5. Flaming is the act of saying mean things online, usually in ALL CAPS, and often in a public forum to humiliate. Flame wars can
occur easily online, as it can be difficult to figure out people’s intentions or emotions online.
6. Mash-up is a remix or blend of multiple songs, videos, or other media content into one product. Fanfiction writing is one form of a
mash-up, as writers take characters from a well-known video game, movie, or book, and rewrite their actions or relationships.
7. Massively multiplayer online game (MMOG) is usually an online virtual world that multiple players navigate and play in together.
While in this virtual world, their avatars chat, cooperate, and quest together, oftentimes towards a goal.
8. Podcast is a downloadable video or audio file. Podcasts can be verbal, based on a certain topic, or can include music, video, and
commentary. Most podcasts are updated regularly through the addition of new episodes.
9. Short Message Service (SMS), or text message, is a short message of fewer than 160 characters sent from a cell phone. A
Multimedia Messaging Service (MMS) is a text message that contains an attached multimedia file, such as a picture or song.
WHAT I CAN DO
DIRECTIONS: Reflect on the following questions and answer them briefly in your paper. Please refer to the rubrics below.
1. How dependent are we on technology?
2. How do the different online platforms help you as a student in your chosen track?
CRITERIA
3. Choose which image below describes how you feel about sharing your password with your boyfriend/ girlfriend?
ASSESSMENT
4. Your parents bought you your first cellphone. How will you share your cellphone number?
A. Do not share your cellphone number with anyone. B. Post your cellphone number in your social media account.
C. Share your cellphone number only with my family. D. Post your cellphone number in your group chat.
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of
paper.
1. What type of web provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the
user?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Website
REFERENCES
Empowerment Technology for Senior High School Alternative Delivery Mode Quarter 1 – Module 1: ICT in the Context of Global
Communication First Edition, 2019
Empowerment Technologies Student Reader First Edition 2016
https://www.sciencedirect.com/topics/computer-science/computer-ethics
https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm.
ANSWER KEY