TTL 1 Unit 4 Reviewer
TTL 1 Unit 4 Reviewer
Blended learning is a term increasingly used to This Model is a system provided by the school
describe the way e-learning is being combined with where the students can choose the courses they
traditional classroom methods and independent would like to have in addition to their typical brick-
study to create a new, hybrid teaching and-mortar classroom classes. This model is
methodology. It represents a much greater change always remote a major difference from the online
in basic technique than simply adding computers to lab.
classrooms; it represents, in many cases, a Model 6: Online Driver
fundamental change in the way teachers and
students approach the learning experience. The online-driver model utilizes a platform and a
teacher that delivers all curricula. Students
remotely work on their program most of the time. If
Types of Blended Learning ever there is face-to-face component, it is made
optional or if ever it is required for students to go to
Model 1: Face-to-Face Driver the physical leaming environment such in a school,
then it can be extracurricular activities augmenting
In the face-to-face model, the teacher delivers the
the curriculum.
curricula most of the time and utilizes online
learning at certain times with the purpose to
augment or provide an alternative experience.
Instruction is provided in a computer laboratory or Online Communities of Learning/Social
assigned tasks are uploaded online. Networking
In a course or subject, students rotate on a fixed Social networking is the process of creating,
schedule between learning online in a one-to-one, sharing, and exchanging information, ideas, and
self-paced learning environment and being inside interests with others through online platforms. It
the classroom with a face-to-face teacher. This is enables individuals to connect, communicate, and
the model that is in between the traditional face-to- build relationships with others who share similar
face earning and online learning. interests, backgrounds, or professions.
Model 3: Flex
This model uses online platform that delivers most Types of Social Networking Platforms
of the course. Support to learning provides as 1. Facebook: Largest social network, allowing
needed through on-site support or by an online users to share profiles, blogs, pictures, and videos.
tutor who facilitates the tutorial or small groups 2. Twitter: Microblogging platform for real-time
sessions. Sessions can be arranged into news, discussions, and short messages (tweets).
synchronous or asynchronous. Course participants 3. LinkedIn: Professional networking for career
may work on their tasks at any convenient time if it development, job searching, and industry
is within the confines of the course duration. connections.
Model 4: Online Lab 4. Google+: Comprehensive platform for
communication, sharing, and community building.
The online lab model uses an online platforms in 5. YouTube: Video-sharing platform for
delivering the course but located in a physical entertainment, education, and marketing.
classroom or computer laboratory. Online lab model 6. Pinterest: Visual discovery and planning website
of blended learning may be enrolled in a traditional using digital bulletin boards.
7. Instagram: Visual storytelling platform for 3. Adware a program designed to send you
sharing photos, videos, and stories. advertisements, mostly as pop- ups
8. Tumblr: Microblogging platform combining social
4. Pharming and Phishing its goal is to acquire
media and blogging features.
sensitive personal information like passwords and
9. Bebo: Blogging and social networking platform.
credit card details. This is done by sending you an
e-mail that will direct the user to visit a fake website
and be asked to update his/her username,
Benefits of using Social Networking Sites
password, credit card or personal information.
• The world has become a global village
Hackers
through connectivity.
• Getting connected to family and friends is is A person who breaks into computers, usually by
now a few clicks away. gaining access to administrative control. Distribute
• It is an easy access to keeping in touch with malware that steals data experienced criminals.
friends or keeping tabs on family. A major They are knowledgeable about infiltrating computer
advantage of social networking websites is that networks, extort money from businesses,
they provide a lot of information. government agencies, or individuals.
• Social networking websites can support
learning or augment educational activities.
1. Black Hat Hackers are cybercriminals that
illegally crack systems with malicious intent.
Dangers of using Social Networking Sites Seeking to gain unauthorized access to computer
systems is the definition of black hat hacking.
• One major risk is making friends with
strangers who may be a predator or a cyberbully 2. Gray Hat Hackers is someone who may violate
ethical standards or principles, but without the
• Topping these risks is also the danger of
malicious intent ascribed to black hat hackers.
users getting hooked on the internet and may learn
to ignore the real world. 3. White Hat Hackers are ethical security hackers
who identify and fix vulnerabilities. Hacking into
Safeguarding Oneself on Using Social Networking
systems with the permission of the organizations
Sites
they hack into, white hat hackers try to uncover
system weaknesses in order to fix them and help
strengthen a system's overall security.
Internet Threats
Refer to various types of malicious activities and
risks that can compromise the security and privacy 9 Ways to PROTECT YOURSELF WHILE USING
of users and their data when connected to the SOCIAL NETWORKING SITES
internet. These threats are diverse and continually
1. A social networking account has passwords and
evolving as technology advances.
login details. Secure passwords and keep them
private.
Here are some common internet threats: 2. Log out every time you use public computers.
1. Virus a malicious program designed to replicate 3. Regularly check privacy settings of social
itself and transfer from one computer to another networking websites so that only direct friends or
(internet, local networks, FDs, CDs, etc.) those particularly known can see the post.
2. Trojan a malicious program that disguises as a 4. Online post are saved and may become a
useful program but once downloaded or installed, permanent part of their online reputation.
leaves your PC unprotected and allows hackers to
5. Do not accept invite from contacts unless you
get your information. (ex. Pirated software)
know them personally or you are sure of their
identity,
6. Seriously consider the effect of possible post on E-Library - It’s an electronic or online library where
others before deciding to do so. one can have access to books, journals, novels,
articles, or any other information over net.
7. Using appropriate language is essential the tone
when communicating or sending social networking
messages should be respectful.
Educational Technology and Mobile Learning
8. When there is an indication of harassment or
• Educational Technology (EdTech) refers to the
abuse it is advised that you report this by clicking
application of technology and digital tools in the
the report button of accuse. It is better still to talk to
field of education, including everything from online
friends or trusted adults about the case.
courses, interactive learning materials, mobile
9. Bullying takes place even in social networking learning, and computer-based assessments.
websites. Cyberbullying uses the sites messages
update and other functions to harass, intimidate, or
humiliate an individual. • Mobile Learning (M-Learning) refers to
educational practices that uses smartphone, tablets
A. Ignore the behavior by not responding at all
and other mobile devices as a platform for learning.
B. block the person
It includes the use of educational apps, online
C. click the report button of abuse
learning platforms, and mobile - friendly educational
D. talk to a trustworthy adult about it
websites and resources.