0% found this document useful (0 votes)
32 views16 pages

EmTech Module Week1-8

Uploaded by

phillinadeguzman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views16 pages

EmTech Module Week1-8

Uploaded by

phillinadeguzman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Republicof theP hilippines

Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y

NAME: ___________________________________________ Score:______________


GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 1
MOST ESSENTIAL LEARNING COMPETENCY
 The state of ICT Technologies, and Online Systems, functions, and platforms.

OBJECTIVES
1. Improve their knowledge on how ICT affects their everyday lives and the state of
our nation
2. Compare and contrast the differences between online platform, sites, and
content.
3. Understand the future of the World Wide Web through Web 3.0 and the different
trends in ICT.

Information and Communication Technologies

Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send,
and edit information.

When we make a video call, we use the Internet. When we send a text or make a call, we use
cellular networks. When we run out of load or battery, we use payphones which use a telephone
network. Having a unified way to communicate is one of the goals of ICT. In terms of economics,
ICT has saved companies a lot of resources (time and money) with the kind of communication
technology they use.

ICT in the Philippines

Several international companies dub the Philippines as the “ICT Hub of Asia.” It is no secret
that there is a huge growth of ICT-related jobs around the country, one of which is the call center or
BPO (Business Process Outsourcing) centers.

According to the 2013 edition of Measuring the Information Society by the International
Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. That
would mean that for every 100 Filipinos you meet, there is a high chance that they have a cellphone
and approximately for the seven of them, they have two.

Web 2.0: Dynamic Web Pages

Web 2.0 is a term coined by Darcy DiNucci on January 1999. In her article titled,
“Fragmented Future”.

Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages – the user is able to see
a website differently than others, include social networking sites, blogs, wikis, video sharing sites
hosted services, and web application. Web 2.0 allows users to interact with the page, instead of just
reading a page, the user may be able to comment or create a user account. Also, use web browser
instead of just using their operating system. Browsers can now be used for their user interface,
application software, and even for file storage.

Folksonomy, Rich User Experience, User Participation, Long Tail, Software as a Service and Mass
Participation as among the features of Web 2.0

Web 3.0 and the Semantic Web


The Semantic Web is a movement led by the World Wide Web Consortium (W3C). the W3C
standard encourages web developers to include semantic content in their web pages. The term was
coined by the inventor of the World Wide Web, Tim Berners-Lee, noted that the Semantic Web is a
component for Web 3.0

The Semantic Web provides a common framework that allows data to be shared and reused
across application, enterprise, and community boundaries. The aim of Web 3.0 is to have machines
(or servers) understand the user’s preferences to be able to deliver web content specifically
targeting the user.

Web 3.0 fully realized some several problems: Compatibility, Security, Vastness,
Vagueness, and Logic

Trends in ICT

1. Converge. Technological convergence is the synergy of technological advancement to work


on a similar goal or task

2. Social Media. Social Media is a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange user-generated content.

Types of Social Media:


a. Social Network
b. Bookmarking Sites
c. Social News
d. Media Sharing
e. Microblogging
f. Blogs and Forums

3. Mobile Technologies. These devices are capable of using high-speed Internet using 4G
Networking (LTE).

Operating Systems on Mobile Devices


a. iOS – used in Apple devices such as iPhone and iPad
b. Android – an open source operating system developed by Google.
c. Blackberry OS – used in Blackberry devices
d. Windows Phone OS – a close source and proprietary operating system
developed by Microsoft
e. Symbian – the original smartphone OS; used by Nokia devices
f. WebOs – originally used for smartphones; ow used for smart TVs
g. Windows Mobile – developed by Microsoft for smartphones and pocket PCs

4. Assistive Media. Assistive media is a nonprofit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to read to the user.

Additional Materials for Learning (LR) portal


1. History of Internet in the Philippines – Empowerment Technologies K TO 12
by ICT Tech Tips
2. What is ICT? - Empowerment Technologies K to 12 by ICT Tech Tips
3. Digital Life 101
www.youtube.com/watch?=MkwmD60QrWQ
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y

NAME: ___________________________________________ Score:______________


GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 2
MOST ESSENTIAL LEARNING COMPETENCY
 Compare and contrast the nuances of varied online platforms, sites and content to
best acieve specific class objectives or address situational challenges

OBJECTIVES
 Differentiate web 1.0, 2.0 and 3.0
 Identify the advantages and disadvantages of 3 webs

Web 1.0, Web 2.0 and Web 3.0 with their difference

Web 1.0 refers to the first stage of the World Wide Web evolution. Earlier, there were only
few content creators in Web 1.0 with the huge majority of users who are consumers of
content. Personal web pages were common, consisting mainly of static pages hosted on
ISP-run web servers, or on free web hosting services.
In Web 1.0 advertisements on websites while surfing the internet is banned. Also, in Web
1.0, Ofoto is an online digital photography website, on which user could store, share, view
and print digital pictures. Web 1.0 is a content delivery network (CDN) which enables to
showcase the piece of information on the websites. It can be used as personal websites. It
costs to user as per pages viewed. It has directories which enable user to retrieve a
particular piece of information.
Four design essentials of a Web 1.0 site include:
1. Static pages.
2. Content is served from the server’s file-system.
3. Pages built using Server Side Includes or Common Gateway Interface (CGI).
4. Frames and Tables used to position and align the elements on a page.

Web 2.0 refers to world wide website which highlight user-generated content, usability and
interoperability for end users. Web 2.0 is also called participative social web. It does not
refer to a modification to any technical specification, but to modify in the way Web pages
are designed and used. The transition is beneficial but it does not seem that when the
changes are occurred. An interaction and collaboration with each other is allowed by Web
2.0 in a social media dialogue as creator of user-generated content in a virtual community.
Web 1.0 is enhanced version of Web 2.0.
The web browser technologies are used in Web 2.0 development and it includes AJAX and
JavaScript frameworks. Recently, AJAX and JavaScript frameworks have become a very
popular means of creating web 2.0 sites.
Five major features of Web 2.0 –
1. Free sorting of information, permits users to retrieve and classify the information
collectively.
2. Dynamic content that is responsive to user input.
3. Information flows between site owner and site users by means of evaluation & online
commenting.
4. Developed APIs to allow self-usage, such as by a software application.
5. Web access leads to concern different, from the traditional Internet user base to a
wider variety of users.
Usage of Web 2.0
The social Web contains a number of online tools and platforms where people share their
perspectives, opinions, thoughts and experiences. Web 2.0 applications tend to interact
much more with the end user. As such, the end user is not only a user of the application but
also a participant by these 8 tools mentioned below:
1. Podcasting 5. Social bookmarking
2. Blogging 6. Social networking
3. Tagging 7. Social media
4. Curating with RSS 8. Web content voting

Web 3.0 It refers the evolution of web utilization and interaction which includes altering the
Web into a database. In enables the upgradation of back-end of the web, after a long time
of focus on the front-end (Web 2.0 has mainly been about AJAX, tagging, and another front-
end user-experience innovation). Web 3.0 is a term which is used to describe many
evolutions of web usage and interaction among several paths. In this, data isn’t owned but
instead shared, where services show different views for the same web / the same data.
The Semantic Web (3.0) promises to establish “the world’s information” in more reasonable
way than Google can ever attain with their existing engine schema. This is particularly true
from the perspective of machine conception as opposed to human understanding. The
Semantic Web necessitates the use of a declarative ontological language like OWL to
produce domain-specific ontologies that machines can use to reason about information and
make new conclusions, not simply match keywords.
Below are 5 main features that can help us define Web 3.0:
1. Semantic Web
The succeeding evolution of the Web involves the Semantic Web. The semantic web
improves web technologies in demand to create, share and connect content through
search and analysis based on the capability to comprehend the meaning of words,
rather than on keywords or numbers.
2. Artificial Intelligence
Combining this capability with natural language processing, in Web 3.0, computers
can distinguish information like humans in order to provide faster and more relevant
results. They become more intelligent to fulfil the requirements of users.
3. 3D Graphics
The three-dimensional design is being used widely in websites and services in Web
3.0. Museum guides, computer games, ecommerce, geospatial contexts, etc. are all
examples that use 3D graphics.
4. Connectivity
With Web 3.0, information is more connected thanks to semantic metadata. As a
result, the user experience evolves to another level of connectivity that leverages all
the available information.
5. Ubiquity
Content is accessible by multiple applications, every device is connected to the web,
the services can be used everywhere.

Difference between Web 1.0, Web 2.0 and Web 3.0


WEB 1.0 WEB 2.0 WEB 3.0
Mostly Read-Only Wildly Read-Write Portable and Personal
Company Focus Community Focus Individual Focus
Home Pages Blogs / Wikis Live-streams / Waves
Owning Content Sharing Content Consolidating Content
Web Forms Web Applications Smart Applications
Directories Tagging User Behaviour
Additional Materials for Learning (LR) portal
1. https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-their-
difference/
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y

NAME: ___________________________________________ Score:______________


GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 3
MOST ESSENTIAL LEARNING COMPETENCY
 Apply online safety, security, ethics, and etiquette standards and practice in the use
of ICts as it would relate to their specific professional tracks

OBJECTIVES
 Identify the online safety measures
 Define online ethics and netiquette
 Apply online safety, security, ethics and etiquette standards and practice in the sue of ICTs.

The Internet has radically changed the way that people interact with the world. They have
accounts on different online platforms; some have unlimited Internet access; and some are active
users of the web. Yet along with this opportunity are the new risks or threats that Internet may bring.
Hence, online safety or Internet safety is an emergent concern for children.

Online safety or Internet safety refers to the practices and precautions that should be
observed when using the Internet to ensure that the users as well as their computers and personal
information are safe from crimes associated with using the Internet. There are worries concerning
safety on the internet such as malicious users, websites and software and committed on the Internet
like stalking, identity theft, privacy violations, even harassment and more. With there, almost all
social networking and chat sites.

THE TOP 10 MOST COMMON INTERNET THREATS


There is no doubt that you need to be vigilant online. As the World Wide Web has evolved over the
years, many internet nasties have been playing on vulnerabilities to attack computers and retrieve
sensitive data from individuals. Half the time, we aren’t even aware it is happening until it is too late.

Whilst the internet is a fantastic place for communication and information, there are many malicious
threats you need to dodge along the way.

1. Spam
The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder insinuates that spam
emails are a huge issue, with more than 50% of emails being syphoned into these folders. Aside
from being an annoyance, spam emails are not a direct threat. However, many can contain
malware.

Adware
Adware is a type of malware software that displays unwanted ads when a user is surfing the
internet. The ads often redirect your searches to advertising websites and collect marketing-type
data about you, behind your back, which is considered malicious.

Adware is often included in many shareware or freeware downloads as a legitimate way of


generating advertising revenues that help fund development. However, some websites are infected
with malicious adware that us automatically downloaded to your computer. When this has been
completed, Trojans can be used.

Trojan
Trojans leave your computer completely unprotected, which can mean that hackers can steal any
data from your system. Trojans often present themselves as harmless computer programmes so
that hackers can penetrate your computer without being detected.
Virus
One of the most talked about internet threats is a virus. Viruses usually attach themselves covertly
to downloads as they are designed to spread at an alarming rate. Viruses are often attached to files
for download, shared via CDs, DVDs, and USB sticks, or loaded on to computers by opening
infected email attachments.

Worms
Worms usually make their way on to a computer via a malicious email attachment or USB stick.
Once your computer has been infected by a worm, it will likely send itself to every email address
logged in your system. To the receiver, your email will appear harmless, until they open it and are
infected by the same worm.

Phishing
In its simplest terms, phishing is a form of fraudulent activity. More often than not, official-looking
emails are sent impersonating a well-known provider, such as a bank. These emails are sent to
acquire people’s passwords and credit card details.

Spyware
Another form of malware is spyware. Spyware is an all-encompassing internet nasty and is usually
attached to pop-ups of downloadable files. Once installed on your computer, spyware can monitor
your keystrokes, read and delete your files, reformat your hard drive, and access your applications.
Whoever is controlling the spyware has access to your personal details without you even knowing.

Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard actions. Most keyloggers will be
looking for distinguishable key entries, such as bank card details and passwords. Keylogging is
often linked to identity and intellectual property theft.

Pharming
Pharming is a more complex version of phishing that exploits the DNS system. Pharmers often
create web pages mimicking that of a trustworthy business, such as an online banking log-in page.
Users will then enter their details, thinking they are logging in to their usual service, and their details
will be stolen by the pharmer.

Rogue Security Software


If you are ever downloading antivirus or antispyware programmes, make sure you have purchased it
from a legitimate source. Rogue security software will often ask you to pay for extra protection,
which is a huge con. The security software is completely useless and criminals have robbed you of
your money.
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y

NAME: ___________________________________________ Score:______________


GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 4
MOST ESSENTIAL LEARNING COMPETENCY
 Uses common productivity tools effectively by maximizing advances application techniques
 Creates an original or derivative ICT content to effectively communicate or present data
information related to specific professional tracks

OBJECTIVES
 identify the parts of word processing and its functions
 insert and format pictures, clip art, shape, SmartART, charts and screen clippings
 Discuss the concept of Mail Merge
 Create and link a main document, a data source

BASIC PARTS OF MICROSOFT WORD

Microsoft Word or MS-WORD (often called Word) is a Graphical word processing program that
users can type with. It is made by the computer company Microsoft. Its purpose is to allow users to
type and save documents. Similar to other word processors, it has helpful tools to make documents .
(https://simple.wikipedia.org › wiki › Microsoft_Word)
DIFFERENT SHORTCUT KEYS IN MICROSOFT WORD
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y

NAME: ___________________________________________ Score:______________


GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 5

MOST E SSENTIAL LEARNING COMPETENCY


 Uses common productivity tools effectively by maximizing advances application techniques
 Creates an original or derivative ICT content to effectively communicate or present data
information related to specific professional tracks

OBJECTIVE
 Insert pictures, clip art, shape, SmartART, charts and screen clippings
 Format pictures, clip art, shape, SmartART, charts and screen clippings

Integrating Illustrations in Word Processor

An Illustration in Microsoft Office is visualization or drawing that is in the form of pictures,


Clipart, shapes, smartart, charts or screen clippings

Images are a great way to liven up a document, and Word offers a few methods to insert
them. There are built-in clip art images for just about every topic, so you may be able to find a
perfect clip art image for your document. If you have a more specific image in mind, you can insert a
picture from a file.

INSERT TAB FOR ILLUSTRATIONS

The Insert Tab is used to insert different features such as tables, pictures, clip art, shapes,
charts, page numbers, word art, headers, and footers into a document. The table below describes
each of the groups and buttons available on this tab.

ILLUSTRATIONS GROUP

1. Picture – To insert a picture from a file on the computer into the document, click the button.
The Insert Picture dialog box will appear. This dialog box is used to select the picture that is
to be inserted into the document.
2. Online Pictures – Click the button to find and insert pictures from the Bing Image Search
site. It is also possible to lob into a Microsoft Account to insert pictures
3. Clipart - are graphic elements used to create a design. In other words, this is raster or
vector picture that may have any graphic format. For instance, a raster clipart comprises of
photographs, drawings, which are composed of pixels, the scanned images can be also
used here.
4. Shapes -This button is used to insert ready-made shapes such as circles, squares, arrows,
and triangles into a document. When the button is clicked, a gallery of different shapes will
appear. To insert a shape, click the desired shape and then draw the shape in the
document.
5. SmartArt – To insert a SmartArt graphic into the document, click this button. SmartArt
graphics are objects such as Venn Diagram and organizational charts. When the button is
clicked, a gallery of different categories and shapes will be displayed.
6. Chart – Use this feature to insert a bar, area or line chart. When the button is clicked the
Insert Chart dialog box will display. In this dialog box, it is possible to specify the type of
chart.
7. Screenshot – This feature can be used to insert a picture of any window that is available on
the desktop. When the buttons is clicked, a gallery of the available windows will display.
Click any of the windows icons. An image of that window will appear in the Word Document.

CHANGING TEXT WRAPPING SETTINGS

When you insert clip art or a picture from a file, you may notice that it's difficult to move it
exactly where you want. This is because the text wrapping for the image is set to In Line with
Text. You'll need to change the text wrapping setting if you want to move the image freely, or if
you just want the text to wrap around the image in a more natural way.

To wrap text around an image:

1. Select the image. The Format tab will appear.


2. Click the Format tab.
3. Click the Wrap Text command in the Arrange group.
4. Select the desired menu option. The text will adjust based on the option you have
selected.

5. Move the image around to see how the text wraps for each setting.

NOTE: If you can’t get your text to wrap the way you want, click the Wrap Text command, then
select More Layout Options from the menu. You can make more precise changes in the Advanced
Layout dialog box that appears.
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y

NAME: ___________________________________________ Score:______________


GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES


First Quarter
Week 6

MOST E SSENTIAL LEARNING COMPETENCY


 Uses common productivity tools effectively by maximizing advances application techniques
 Creates an original or derivative ICT content to effectively communicate or present data
information related to specific professional tracks

OBJECTIVE
 Discuss the concept of Mail Merge
 Create a main document, a data source
 Link the main document with the data source

MAIL MERGE IN MICROSOFT WORD


A mail merge is a word processing feature that allow you to easily create multiple letters,
labels, envelopes, nametags, or catalogue documents to a group of people as stored in a list in
database or spreadsheet.

Mail merge lets you create a batch of documents that are personalized for each recipient.
For example, a form letter might be personalized to address each recipient by name. A data source,
like a list, spreadsheet, or database, is associated with the document. Placeholders--called merge
fields--tell Word where in the document to include information from the data source.

You work on the main document in Word, inserting merge fields for the personalized content you
want to include. When the mail merge is complete, the merge document will generate a
personalized version of itself for each name in the data source.

DOCUMENT TYPES

Word provides tools for incorporating your data into the following kinds of documents. Follow the
links for details about each type:

1. Letters that include a personalized greeting. Each letter prints on a separate sheet of paper.
Create and print a batch of personalized letters
2. Email where each recipient's address is the only address on the To line. You'll be sending
the email directly from Word.

3. Create and send email messages

4. Envelopes or Labels where names and addresses come from your data source. Create and
print a batch of envelopes for mailing Create and print sheets of mailing labels

5. Directory that lists a batch of information for each item in your data source. Use it to print out
your contact list, or to list groups of information, like all of the students in each class. This
type of document is also called a catalog merge.

THREE COMPONENTS OF MAIL MERGE


1. Main Document – the letter which contains the mail information for each of the merged
document that can be letter, stationary or template. It also contains the field names which
contains the instructions for carrying out the merge.
2. Data Source – it is also called data file which comprises the information to be merged into a
document such as the list of names and addresses to be used in a mail merge. This must be
connected to the data source before it can be used the information in it.
3. Merge document- this is also a word processing document that is the generated output
after executing the merge process.

HOW TO START MAIL MERGING


1. In a blank Microsoft Word document, click on the Mailings tab, and in the Start Mail
Merge group, click Start Mail Merge.Click Step-by-Step Mail Merge Wizard.
2. Select your document type. In this demo we will select Letters. Click Next: Starting
document. Select the starting document. In this demo we will use the current (blank)
document. Select Use the current document and then click Next: Select recipients.
3. Select recipients. In this demo we will create a new list, so select Type a new list and then
click Create.
a. Create a list by adding data in the New Address List dialog box and clicking OK. Save
the list.
b. Note that now that a list has been created, the Mail Merge Wizard reverts to Use an
existing list and you have the option to edit the recipient list.
c. Selecting Edit recipient list opens up the Mail Merge Recipients dialog box, where you
can edit the list and select or unselect records. Click OK to accept the list as is.
Click Next: Write your letter.
4. Write the letter and add custom fields.
a. Click Address block to add the recipients' addresses at the top of the document.
b. In the Insert Address Block dialog box, check or uncheck boxes and select options on
the left until the address appears the way you want it to.
c. Clicking Match Fields opens up the Match Fields dialog box, in which you can associate
the fields from your list with the fields required by the wizard.
5. Press Enter on your keyboard and click Greeting line... to enter a greeting. In the Insert
Greeting Line dialog box, choose the greeting line format by clicking the drop-down arrows
and selecting the options of your choice, and then click OK.
Note that the address block and greeting line are surrounded by chevrons (« »). Write a
short letter and click Next: Preview your letters. Preview your letter and click Next: Complete
he merge. Click Print to print your letters or Edit individual letters to further personalize some
or all of the letters.
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y

NAME: ___________________________________________ Score:______________


GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES GRADE 12


First Quarter
Week 7

MOST ESSENTIAL LEARNING COMPETENCY


 Evaluate the quality, value, and appropriateness of peer’s existing or previously developed
ICT content in relation to the theme or intended audience/ viewer of an ICT project

OBJECTIVES
1. Identify the different Project Management of ICT Content

PROJECT MANAGEMENT FOR ICT CONTENT

THE FIVE (5) STAGES OF PROJECT MANAGEMENT PROCESS.


1. Initiation  Authorization to start a new project
 A phase wherein the needs were identified
 A feasibility study may be conducted here to
evaluate the proposed solution to the needs.
 The scope of the project and the resources
required are refined in this phase
 Other modifications of the project are also done in
this phase
 During this phase, projects may be split into
various stages

2. Planning  Gathering of information from difference sources


to further identify, define, and understand the
project to make the project into fruition
 Identify the tasks and requirements needed to
accomplish the project
 This is the stage where the scope aspect, risks,
schedule, cost, and technology are further
explored
 Planning is an on-going process and changes in
planning may also occur during execution
process

3. Executing  Does the action that was discussed in the


planning phase
 Coordinating with people, gathering the
resources, integrating, and performing the
activities according to the plan
 It is normal to experience in the execution stage
that the decisions made in the planning needs to
be changed (i.e. due to unexpected risks or
unavailability of resources).
 Implementation of the approved changes
4. Controlling  Monitoring and observing the project execution
 Potential problems can be identified in this phase
 Project performance is observed and measured
 Identifies if there are variances executed from
what had been decided in the planning
 Highlights areas that need additional attention
o Observations made can result in
recommendations for changes in the
planning

5. Closing  This is the termination of the project after


completing the project or if the project needs to
be cancelled
 Verifies if the project has completed all phases
and if it is appropriate to close the project
 Formally declares that the project is finished
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y

NAME: ___________________________________________ Score:______________


GRADE & SECTION ____________________________ Teacher: _____________

MODULE IN EMPOWERMENT TECHNOLOGIES GRADE 12


First Quarter
Week 8

MOST ESSENTIAL LEARNING COMPETENCY


 Share and showcase existing or previously developed material in the form of a
collaboratively designed newsletter or blog site intended for a specific audience or viewer.

OBJECTIVES
2. Identify the different online platforms and applications.
3. Create a digital product using online creation tools, platforms and applications that will be for
use to effectively communicate messages related to specific professional tracks.

CHALLENGE QUESTIONS

What is the use of a Website?

Did you know that you can use a Website for several purposes? And did you
know that Websites can be considered as platforms for productivity?

ONLINE COLLABORATIVE TOOLS AND PROCESSES

Individual Activity: Instruct the students to research at least 5 different types of applications that
can be used for collaborating using the power of the Internet.
Note: messenger applications can also be used for collaboration.
Each application should answer the following question:
1. What does this application do?
2. How do you manipulate this application? How do you make this application work?
3. How can this application be helpful in collaborating online?

PLATFORMS THAT MAY BE CURRENTLY USED TO HOST ICT CONTENT


1. Presentation:
 https://www.slideshare.net/kris.kenny0824/how-to-use-google-docs
 This is a link to a slideshare that explains how to use Google docs
2. Cloud Computing
 https://www.google.com.ph/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-
8#q=google+docs+for+doctors
 This is a link to a Google Doc file that shows a sample of a doctor’s note.
3. Social Media
 https://www.facebook.com/govph
 This is a link to the Facebook Page of the Official Gazette of the Republic of the
Philippines
4. Web Page
 https://deped.gov.ph/
 This is a link to the Website of the Department of Education
5. Blog Site
 https://learningandteachingwithpreschoolers.blogspot.com/
 This is a link to a blog about learning and teaching with preschoolers

You might also like