0% found this document useful (0 votes)
11 views17 pages

Prof Ed7 Handouts2

Uploaded by

Hartzel Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views17 pages

Prof Ed7 Handouts2

Uploaded by

Hartzel Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.

DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

TECHNOLOGY FOR TEACHING AND


LEARNING 1
Handouts 2

NAME: ________________________________________________________________
YEAR/COURSE:
_________________________________________________________
INSTRUCTOR___________________________________________________________

INTRODUCTION
Globalization is a reality and ICT has become a fundamental part of the process. A
networked society is one in which the entire planet is organized around telecommunicated
networks of computers. The powerful use of network use of network has broken boundaries,
provided opportunities for inclusion and collaboration.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

At the end of this module, students are able to:


 Discussed some ICT policies and explained their implications to teaching and learning
 Explain some issues that relate to ICT policies
 Identified safety concerns on Internet including digital safety rules;
 Named examples of ICT Policies which are applicable to teaching and learning
 Identified and explained safety issues on the use of ICT
 Listed and applied e-safety rules in the use of ICT
 Recognized how innovative teachers use online resources and educational sites and portals
for online distance learning
 Described a flexible learning environment and the different platforms used for flexible
learning

 Policies and Issues on Internet and Implications to Teaching and Learning


 Safety Issues on the Use of ICT Including e-safety Rules
 Flexible Learning Environment

Lesson 1: policies and issues and implications to teaching and learning

One way of enhancing and regulating the use of ICT is to formulate and implement policies
to guide appropriate decisions.
Definition of ICT Policy
The Oxford English Dictionary has defined "policy" as a course of action, adopted and
pursued by a government, party, ruler, statesman. It is any course of action adopted as
expedient or advantageous. Its operational definition of policy is a plan of action to guide
decisions and achieve outcomes.
Thus, ICT Policies are needed to put a roadmap or course of actions to be pursued and
adopted by various governments, organizations, entities involving ICT. These include principles
and guidelines in the use of ICT which cover three main areas: telecommunications (telephone),
broadcasting (radio and television) and Internet.
The New ICT Technologies
More recent technological innovations increased the reach and speed of communications
which can be grouped into three categories:
1. Information Technology includes the use of computers, which has become indispensable in
modern societies to process data and save time and effort. What are needed will be computer
hardware and peripherals, software and for the user, computer literacy.
2. Telecommunication technologies - include telephones (with fax) and the broadcasting of radio
and television often through satellites. Telephone system, radio and TV broadcasting are needed
in this category.
3. Networking technologies The best known of networking technologies is Internet, but has
extended to mobile phone technology, Voice Over Internet Protocol (VOIP) satellite
communications and other forms of communications are still in their infancy. In addition to
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

Internet, this category also includes mobile telephone, cable. DSL, satellite and other broadband
connectivity.

The DICT Roadmap


In our country, the Department of Information and Communication Technology (DICT) has
formulated a roadmap to guide all agencies in the utilization, regulation and enhancement of ICT.
Each project has corresponding policy statements and guidelines.
The ICT for Education (ICT4E) is a program under the DICT that supports all the efforts of
the education sector in incorporating the use of ICT as well in determining and gaining access to
the infrastructure (hardware, software, telecommunications facilities and others) which are
necessary to use and deploy learning technologies at all levels of education. Among the policy
recommended programs that have applications to education teaching-learning are:
1. ICT in Education Masterplan for all levels, including a National Roadmap for Faculty
Development in ICT in Education. A National Framework Plan for ICTs in Basic Education was
developed.
2. Content and application development through the Open Content in materials DepEd Education
Initiative (OCED) which converts into interactive multi-media content, develop applications used
in schools, and conduct students and teacher’s competitions to promote the development of
education-related web content.
3. PheDNET, is a "walled" garden that hosts educational learning and teaching materials and
applications for use by Filipino students, their parents and teachers. All public high schools will
be part of this network with only DepEd-approved multi-media applications, materials and
mirrored internet sites accessible from school's PCs.
4. Established Community eLearning Centers called eSkwela for out-of-school youth (OSY)
providing them with ICT-enhanced alternative education opportunities.
5. Quality Program for tertiary education through partnerships with state universities and
colleges (SUCS) to improve quality of IT education and the use of ICT in education in the country,
particularly outside of Metro Manila.
6. Digital Media Arts Program which builds digital media skills for government using Open Source
technologies. Particular beneficiary agencies include the Philippine Information Agency and the
other government media organizations, the Cultural Center of the Philippines, National
Commission for Culture and Arts and other government art agencies, State Universities and
Colleges and local government units.
7. ICT skills strategic plan which develops an inter-agency approach identifying strategic and
policy and program recommendations to address ICT skills demand-supply type.
All the seven programs were guided by the roadmap that embeds policy statements that
relate to education specifically in the enhancement of human development for teaching and
learning.
Some Issues on ICT and Internet Policy and Regulations
Global Issues
Access and Civil Liberties are two sets of issues in ICT Policy which are crucial to the
modern society. The other concern is civil liberties which refer to human rights and freedom.
These include freedom of expression, the right to privacy, the right to communicate and
intellectual property rights.
Access to the Use of Internet and ICT. Access means the possibility for everyone to use the
internet and other media. In richer countries, basic access to internet is almost available to all
with faster broadband connections. There are still countries where access to internet is still a
challenge.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

Infringement to Civil Liberties or Human Rights. What are specific internet issues on
internet policy that have relationship to civil liberties or human rights? Let's study the examples
that follow.
Issue No. 1: Freedom of Expression and Censorship
Under international human rights conventions, all people are guaranteed the rights for
free expression. However, with the shift from communicating through letter, newspapers and
public meetings to electronic communications and on-line networking, a need to look into how
these new means modifies the understanding of freedom of expression and censorship.
The UN Universal Declaration of Human Rights provides that everyone has the right to freedom
of thought, conscience and religion, likewise the right to freedom of opinion and expression.
However, there are practices that violate these provisions in the use of internet. Some examples
are the following:
1. Individual rights are given up in order to have access to electronic networks. Microsoft
Network's (MSN's contracts provide protection of individuals like "upload, or otherwise make
available files that contain images, photographs or other materials protected by intellectual
property laws, including but not limiting to copyright or trademark laws, unless you own or
control the rights thereto or have received all necessary consents to do the same." However,
Microsoft reserves the rights, in its sole discretion, to terminate access to any or all MSN sites or
services.
2. Censorship restricts the transmission of information by blocking it or filtering the information.
Blocking is preventing access to whole areas of internet based upon the "blacklist" of certain
Internet address, location or email addresses while filtering is sifting the packets of data or
messages as they move across computer networks and eliminating those considered
"undesirable" materials. The selection of sites that are blocked or filtered has been considered as
an issue.
Warning!!!!
When you are surfing the web, you may think you are anonymous, but there are various ways
that information about you or your activities can be collected without your consent.

3. Defamation actions may be used to silence critics. This action deters the freedom of
expression.

Issue No. 2: Privacy and Security


Privacy policies are an issue. Most commercial sites have a privacy policy. When someone
uses a site and clicks " agree button, it is as if you have turned over private information to any
authority that may access it.
There are several types of privacy as shown by the following examples:
1. For most, privacy means "personal privacy" the right of individuals not to have their home,
private life or personal life interfered with.
2. Privacy of communication refers to the protection from interference with communication over
the phone or internet. Respect for privacy of communications is an essential prerequisite for the
maintenance of human relationship via technological communications media.
3. Information privacy is related to the use of computers and communications system which are
able to hold and process information about large numbers of people at a high speed. It is
important to ensure that information will only be used for purposes for which it was gathered and
will not be disclosed to others without consent of the individuals.

Issue No. 3: Surveillance and Data Retention


The use of electronic communications has enhanced the development of indirect
surveillance. In the indirect surveillance, there is no direct contact between the agent and the
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

subject of surveillance but evidence of activities can be traced. The new and powerful form of
indirect surveillance is dataveillance. Dataveillance is the use of personal information to
monitor a person's activities while data retention is the storage and use of information from
communication systems.
There is very little that can be done to prevent surveillance. What can be done is to
change the methods of working to make surveillance difficult. This is called "counter
surveillance" or "information security" if it refers to computers and electronic communication.
Issue No. 4: E-pollutants from E-waste
Large amount of e-waste is generated by ICT. These are in particular, terminal
equipment’s used for computing (PCs, laptops), broadcasting (television and radio sets),
telephony (fixed and mobile phones), and peripherals (fax machines, printers and scanners).
The accumulated e-waste is due to rapid turnover of equipment due to rapid improvement
of software. While material waste can be destroyed by crushing, toxic material brought about by
the different equipment requires utmost management. The quantities of e-waste are increasing
in both developed and developing countries. A very dismal state is that there is a significant
amount of electronic waste that has been shipped from industrial countries to developing
countries, using less environmentally- responsible procedure.
Remedies include standardization and regulatory measures to increase the life cycle of
equipment before they become obsolete. Efficient extraction of toxic components and requiring
the recycling by both consumers and equipment vendors are selling must be required.
If not controlled then, e-waste will tremendously affect climate change, damage human
lives, and overload the capacity of the earth in carrying solid waste.

Implications to Teaching and Learning


How do the policy guidelines, projects and issues relate to the teaching and learning?
There are great implications of this lesson to both the teachers who are teaching and the
learners who are learning. A few of these are as follows:
For the Teachers and Teaching
1. Guide the teachers on what they should teach that relate to ICT, and how to teach it. Since ICT
development comes so rapid and fast, teachers might be overwhelmed by its rapid speed.
Temperance in its use is a caution that should be looked at.
2. Technology should never replace any human teacher. The tools are support instructional
materials for the teachers which are available for use. The teacher should learn how to
appropriately use them. The human touch of the teacher is still a vital component in teaching.
Teachers should always be reminded that there are always limitations in the use of the different
gadget and tools.
3. There are rules and regulations that govern the use of technology. Caution should be observed
to protect individual privacy. As teachers, you must be aware that the use of technology may
jeopardize your privacy and security.
4. All the issues and many more shall be part of the teaching content as each teacher will be
encouraged to use technology in teaching.
For the Learners and Learning
The learners of the 21% Century are even more advanced than some of the teachers.
However, learners still need guidance on how to use, regulate technology use. As there are
positive and negative effects of technology use, learners should know the difference.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

Learners should not only know the benefits of technology use, but they should also know
how they can be protected from the hazards that technology brings to their lives. Learners
should take advantage of the potential of learning support they can derive such as the
development of higher order thinking skills, the development of learning communities through
collaboration, the enhancement of skills to manage the vast resources as 21" century learners
and many more.
Both the teachers and learners should be mindful of the e-waste that are being thrown
away to the land and to the atmosphere. Thus, safety in the use of technology shall be presented
in the next lesson.

Assume yourself as an investigator who would like to inform your learner and co-
teachers about the current issues on technology issues. Choose only one article that
you will work on. Use the template below to answer.
Search the web and find out articles or cases about:
 Freedom of Expression and Censorship
 Privacy and Security
 Surveillance and Data Retention
 E-pollutants from e-waste

Title of the Issue:


Title of the Article
Source:
Author:

Summary Narrative:

What lesson have you learned?

What suggestions can you offer?

Submitted by: Name and Course

Lesson 2: safety issues on the use of ict including e-safety rules

Some Risks in the Use of ICT and e-Networking


SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

Technology is a phenomenon that seems to be uncontrollable. Despite the so safeguard


many benefits for teaching and learning, there are also negative effects or influence on the
learners. Hence as future teachers you have to be aware of how to learners in the school
communities where they spend most of their waking hours and also in their homes or facilities
that provide opportunities to use digital technologies like Internet Cafes. Safeguard and
protection should be the primordial role of parents, teachers and schools There are so many risks
that we have to be aware of in the use digital technologies. These may include the following:
1. Exposure to inappropriate content, including on-line pornography extremism (exposure to
violence associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying in all forms, receiving sexually explicit images or messages;
4. Privacy issues including disclosure of personal information;
5. Health and well-being (amount of time spent on-line, internet gaming and many more)
6. Prolonged exposure to on-line technologies, particularly at an early age;
7. Addiction to gambling and gaming:
8. Theft and fraud from activities such as phishing; 9. Viruses, Trojans, spyware and other
malware; and
10. Social pressure to maintain online networks via texting and social networking sites.

Minor Misuse of ICT


In school, some minor misuse made by learners include the following:
 Copying information into assignment and failing to acknowledge the source (plagiarism
and copyright infringement)
 Downloading materials not relevant to their studies Misconduct 'associated with subject
logins, such as using someone else's password
 Leaving a mobile phone turned on during class period
 Unauthorized taking of pictures or images with mobile phone camera, still or moving

e-Safety
With all of the above concerns and many more how do we confront all of these so as to
protect our future generation?
e-safety takes care not only of internet technologies but also of electronic communications
Via mobile phones, games consoles and wireless technology. It highlights the need to educate
children and young people about the benefits, risks and responsibilities of using information
technology. Here are some issues of e-safety:
 e-safety helps safeguard children and young people in the digital world;
 e-safety emphasizes learning to understand and new technologies in a positive way;
 e-safety educates children about the risks as well as the benefits so we can feel confident
online: and
 e-safety supports young learners and adults to develop safer online behaviors, both in and out
of school.

Network Management
1. Safety in the Use of Network in Schools
1.1. Make clear that no one should log on as another user.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

1.2. Require all users to always log off when they have finished working.
1.3. Maintain equipment to ensure health and safety.
1.4. Provide students with access to content and resources through guided e-learning.
1.5. Set up a clear disaster recovery system in place for critical data that include secure, remote
back up of critical data. 1.6. Secure wireless network to appropriate standards suitable for
educational Use.
1.7. Install all computer equipment professionally and meet health and safety standards,
1.8 Review the school ICT system regularity with regard to health and safety and security.

2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to disclose
their passwords unless they got permission from the owner or from the management. The
equipment that keeps the personal information shall be locked when unattended to prevent
unauthorized access. Computers should be set to a time out if they become unused for a certain
period of time.
3. Personal mobile phones and mobile devices
3.1 All mobile phones shall be kept away in a box away from the children or learners and
access is only allowed at break time or at the end of classes or when needed during the class
period.
4. Cameras
4.1. Taking pictures only from parents or caregivers and not from any other family member or
friend while the child attends class.
4.2. Any picture taken of children shall be on cameras solely for the purpose.

Setting Up an Educational Technology Room


Schools that plan to dedicate a room where the students can access technologies for
learning should include the following basic safety rules:
1. Provide tiltable tables. These tables can be tilted and adjusted to the height of the users.
2. Provide anti-glare screen filters.
3. Provide adjustable chairs.
4. Provide foot support.
5. Make sure lighting is suitable.
6. Make sure work stations are not cramped.
7. Plan work at a computer so that there are frequent breaks.
More specifically safety rules that can reduce risk of accidents in the working stations should
include:
1. No trailing wires across or around the room which people can trip on.
2. Electrical sockets should not be overloaded.
3. Electrical equipment should be safety-tested at least once a year
4. There should be adequate space around desk for people to move.
5. Bags and obstacles should be stored out of the way.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

6. Food and drinks should not be placed near machines.


7. Heating and ventilation should be suitable for the working environment.
8. Fire extinguishers should be available.
9. Fire exits should be clearly marked and free from clutter.

A. Imagine you are the principal in Southwestern Institute of Business and


Technology, Inc. (SIBTECH), list down all the e-safety rules you are going to
implement in the use of ICT

Task 1: e-safety Rules in Schools

Lesson 3: Flexible learning environment


SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

Learning nowadays is viewed differently. The present generation of learners has access to
information at their fingertips. The teacher is no longer seen as basically the dispenser of
knowledge but rather as one who expertly directs the learners to take their own track in
searching for answers to questions raised inside the classroom. Then they bring these back to
the class for further discussion until perhaps resolutions are agreed. They can search the web
and discover a breadth of information related to the lesson. They even have the patience to stay
in front of the computer for an unusually longer time in search for more articles and multimedia
materials that simplify a challenging topic. That is why they can sometimes learn more than
what is confined in the four corners of the classroom.
Every chance or corner becomes a learning space. It is clear that learning takes place
anywhere and this adds to the concept of flexibility in the learning environment. With
technology, students can possibly continue to join class sessions even if they are not physically
around. The learning space becomes virtual or mediated. The library is not only a physical
structure where they can read published books but has also become virtual.
Online Distance Learning
Online distance learning is not a new concept. Some schools, higher education institutions
in the country, and educational agencies such as the Southeast Asian Ministers of Education
Innovations in Educational Technology (SEAMEO- INNOTECH) provide this mode of learning. It
allows flexibility in learning to certain extent.
The Different Platforms
The flexible mode of learning uses a platform such as moodle, Google classroom,
edmodo, schoology, etc. These are free programs designed for educational purposes. It has
features that are patterned after the instructional activities of a teacher in
physical classroom.

Moodle
Moodle was created by Martin Dougiamas, founder and CEO of Moodle.
MOODLE stands for Module Object Oriented Dynamic Learning
Environment which is an open source software.
It is a Learning Management System (LMS) that supports teaching and
learning.

Google Classroom and Edmodo


Google Classroom is a free service for teachers and students. It is an LMS platform that is
accessible google account. You can create classes and perform your roles and functions as
a facilitator of learning
In 2008, Edmodo was created by Nic Borg, Jeff O’ Hara and Crystal Hutter.
Martina (2015), compared Edmodo and google classroom in her blog. Although she
discusses but with technology, things evolve in so short a time. What is clear is that they
were created as apps that can integrated well with classroom activities. The decision lies
in the teacher who will determine activities. The decision lies in the teacher and learning
context. Both are amazing tools that can be explored.

Schoology
Schools is another LMS founded in 2009 by Jeremy Friedman, Ryan Hwang, Tim Trinidad
and Bill Kindler.

MOOCs
Massive Open Online Course (MOOCs)
It is a model for delivering learning content online to any person who wants to take a
course. It allows one to pursue learning even outside of university or higher education
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

formal structure. Those who are working can enroll in MOOCS with a limit on attendance.
As long as you are willing to learn, you can engage in an area of discipline and learn. It
allows interconnectedness among people in the world to discuss and share recent
developments in their common field of interest.
EDUCAUSE is a nonprofit association with the mission is to advance higher education
through the use of information technology. The link herein provides a sucCinct video
explaining about MOOCs, (Please view URL: https://1ibrary. cducause edutopics/teaching-
and-learning/massive-open-online-course-mooc.)

Synchronous and Asynchronous


In the flexible learning mode, the activities can be done in two ways: (1) synchronous and
(2) asynchronous.
An online chat at real time is a Synchronous session. Course participants meet in a
virtual classroom and discuss a topic in the lesson. So wherever they are situated in the world,
they agree on a scheduled session and log in to join the live class. The LMS has this feature. The
teacher called as the online tutor facilitates the discussion. Ideas are posted in an actual live
class. One cannot lecture and take all the time in explaining. In this mode, the course
participants are made to be engaged in the flow of discussion that is why, the online tutor has to
plan out the instruction guide in facilitating the discourse.
Using the Skype in holding a live class is another example. Members of the class log-in in
their Skype account at a given time to join the video conferencing.
Another important feature is the Asynchronous session. This is when questions or tasks
are posted and course participants answer the question or post their reply at any time most
convenient to them. They can still participate in the discussion by replying to the post. One
advantage is that you can take your time when replying. The LMS mentioned in this lesson has a
feature that can allow an asynchronous session. In the image map, there is a column of icon
labeled as LIVE CLASS and FORUM. If you click the LIVE CLASS, it will lead you to enter the
virtual classroom to attend the synchronous session while the icon labelled FORUM is responsible
for allowing class participants to join the asynchronous sessions.

Blended Learning
Another way of handling flexible learning is by combining modalities of instructional
delivery. Blended learning is a combination of a learning activities wherein a part of the lesson is
delivered online while the other part is handled in actual physical setting of a classroom.
Kinds of Blended Learning
1. Model 1: Face-to-Face Driver
In the face-to-face model, the teacher delivers the curricula most of the time and utilizes
online learning at certain times with the purpose to augment or provide an alternative
experience. Instruction is provided in a computer laboratory or assigned tasks are uploaded
online.
2. Model 2: Rotation
In a particular course or subject, students rotate on a fixed schedule between learning
online in a one-to-one, self-paced learning environment and being inside the classroom with a
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

face-to-face teacher. This is the model that is in between the traditional face-to-face learning and
online learning,
3. Model 3: Flex
This model uses an online platform that delivers most of the course. Support to learning is
provided as needed through on-site support or by an online tutor who facilitates the tutorial or
small group sessions. Sessions can be arranged into synchronous or asynchronous. Course
participants may work on their tasks at any convenient time as long as it is within the confines of
the course duration.
4. Model 4: Online Lab
The online-lab model uses an online platform in delivering the course but located in a
physical classroom or computer laboratory. Since the lessons are in modular format and
available in the online program, teacher assistants supervise these classes. However, they may
not provide the needed expertise if learners seek assistance. Furthermore, students who are
enrolled in an Online Lab model of blended learning may be enrolled in a traditional classroom
courses at the same time and therefore have block schedules.
5. Model 5: Self-Blend
The self-blend Model is a system provided by the school where the students can choose
the courses they would like to have in addition to their typical brick-and-mortar classroom
classes. This model is always remote-a major difference from the Online Lab

6. Model 6: Online Driver


The online-driver model utilizes a platform and a teacher that delivers all curricula.
Students remotely work on their program most of the time. If ever there is a face-to-face
component, it is made optional or if ever it is required for the students to go to the physical
learning environment such as in school, then it can be extracurricular activities augmenting the
curriculum.
Planning and managing blended learning experiences are very similar t planning and
managing a brick-and-mortar school with courses or subjects integrating technology. It needs to
be system-wide as the school makes a plan, developed guidelines for students to follow for the
use of technology in a blended format and provide a resource guide. A lot of preparation is
needed in designing a blended format. Technology has to be prepared. The back-end and front-
end infrastructures of blended learning have to be put in place as well as the content in varied
multimedia formats. Teachers and teacher’s assistant who will act as online tutors and assistants
need to be pedagogically capacitated.
Online Communities of Learning / Social Networking
When we consider online networking, internet users immediately refer to Facebook.
Everybody seems to have a Facebook account and uses this to communicate. If in the teaching
and learning situation, you work on information, data and collaborate with classmates, friends,
teachers and other members of society, then social networking can also be appropriately
employed as an educational tool.
What is Networking
When productive relationships are cultivated, networking works best. A network is defined
as that group of individuals who communicates and connects on a regular basis. If an individual
has a personal network of people, one can tap on the potential contacts for social, educational or
professional purposes.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

They say that there is a great need to connect because whom one knows matters.
Sometimes one needs to link with them because they have what one needs. However, the
challenge is how to shift the network from people who can provide the favors into establishing
the relationship that will entitle him or her to be called 'a friend', one who can be trusted as a
collaborator in working on an assigned task by the teacher.
Social Networking Platforms
Different ways to communicate with friends can be through the internet or mobile devices.
One can have a personal page where a profile can be built in a social networking site. Through
this site, one can contact friends or share resources and interests. Communication through a
chat format can either be one- on-one or in a group. Topics being discussed can be posted and
made known therefore read by many or it can be discreet through a direct chat - a feature
allowing one to have a certain privacy on matters considered as such.
Social networking services have been evolving for more than a decade. Initially these
social networking services allowed users to construct their personal profile so that other contacts
may know the relevant information about them. At present, these have now evolved to sharing
of multimedia resources. Even having immediate and direct contact with friends in real time is
easily accessible through these sites.
There are varied platforms available where one can create a personal account. Some of
these popular social networking sites include Facebook, MySpace, Twitter, Elicker, Youtube, and
Linkedln among others.
Facebook
apparently is the biggest social networking site founded in 2004 based in Menlo Park, California.

The most popular social network apparently is Facebook. Used by most people, it allows users to
post their profile, blogs, pictures and videos.

Facebook lets one share status updates, news articles with friends and family. Although it started
as a way for college students to connect and socialize, it expanded its services allowing people
ages 13 and up to use a Facebook account for personal or even business reasons.

Twitter
does not only provide social networking service but it also gives online news. Breaking news has
taken a new twist with this social network website. Friends or colleagues may tell that they saw the
breaking news on Twitter.

Twitter is the site where users post and interact with messages called "tweets," restricted only to
140 characters. Only registered users can post tweets, but those who are not can only read them.

One of the main features of Twitter is it enables people to post their thoughts immediately.
Founded in 2006, Twitter is based in San Francisco, California, United States.

LinkedIn
is another social networking website for work.

When one has contacts, LinkedIn helps one is trying to find a job and may not contain one's resume
for potential search for career connections. It may employers to see.

The website lets one upload his educational qualifications, skills, work history, and relevant
experiences. One's connections can even endorse and this helps employers who can message the
one concerned and talk about the possibility of employment. Launched in 2003, this is a popular
social site in the 8 professional world.

Google +
is designed to be a total communication social network. Launched in 2011.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

Google is its parent and it is more advantageous if it is kept as a browser for users are connected
even If they are outside Google site.

Users can make friends and remained up to date with old friends without leaving their Gmail
account.
To distinguish connection, Google+ creates circles and the four standard circles refer to friends,
family, acquaintances and those being followed. Users can actually create as many circles as
they intend.
Youtube
is an American video-sharing website where users can upload, view, and even share video clips or
multimedia productions? It is a You Tube free social network site to join and use. Since it is owned
by Google, YouTube prefers a Google account to make it easier and streamlined. Some people think
that YouTube is not a social network.

It is such as it allows the users to share personal videos, view other uploaded multimedia clips and
make connections with friends and acquaintances. Just like with other social networking sites, users
can either make their videos private or public. Based in San Bruno, California, the service was
created in February 2005.

Pinterest
Pinterest is another social media tool that like YouTube, is often thought of as otherwise.
was designed as a catalogue of ideas or project ideas by its founder Ben Silberman. This is an
excellent choice for those who have a passion for creativity. Users must have an account to use
Pinterest. An email account or a Facebook account can be used in signing up to Pinterest, and if
users will use Facebook, their wall would be ready to post pins without linking with Facebook.

Instagram
is a platform where users share visual stories. This system allows users to post photos with captions
allowing followers to like or comment on one's posts. Photos shared have a wide range of coverage
- trips, food, business products. Since the site is free, advertisers can use Instagram to reach a wide
and are follower base.
Instagram account can be private or made public.
It is the best social networking site for photography.

Tumblr
is a networking site that combines social media and tumblr. blogging. Its main goal is to simplify
social media and blogging. Users can post whatever they like such as photos, videos, quotes,
music, links.
This is a social media that makes it very easy and straight forward to search just about anything.

MySpace
is another popular social networking website where members can make friends, post blogs and
photos, videos. It was acquired by Specific Media in 2011 and based in Beverly Hills California.

Myspace had its dose of crisis but came back stronger and rebranded to focus on music. Personal
users can use MySpace to keep up with their favorite artists, have an update on the music industry,
see what their friends are listening to, and connect with people who have similar music
preferences. It is a fitting social networking website for music.

Flickr (pronounced "ficker")


is an image and video hosting website that was created by Ludicorp in 2004 and acquired by flickr
Yahoo. It offers massive online photo storage.
Bebo
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

is a social networking website with the backronym "Blog Early, Blog Often". It was invented to
answer the question what the name meant. It was founded by husband-and-wife team Michel and
Xochi Birch in January 2005 at their home in San Francisco.
With the fast development and vast coverage of innovations that address the mediated
communicative needs in the virtual reality, it is expected that there will be ore interactive features
of social networking sites that will be readily available for the users in the upcoming days.

The Benefits of Using Social Networking Sites


Using social networking websites opens an array of benefits for users. The world has
become a global village through connectivity. The connection has transcended space and
borders. Getting connected to family and friends is now just a few clicks away. It is an easy
access to keeping in touch with friends, or keeping tabs on family. It provides opportunities for
making friends with others who share similar interests and passion.
A major advantage of social networking websites is that they provide information. News
and views of others around the world can be easily accessed instantly at one's fingertips. It
easily allows one to transmit information or update Contacts on what one thinks or how now
feels.
Social networking websites can support learning or augment educational activities. Young
learners are well-acquainted with social networking sites and Tegard them as just a part of the
day-to-day activities and school-related discussions. Even after school period, learners can
continually connect as they collaborate to accomplish a task or homework using a social
networking website. Announcements On assignments or instructions for the upcoming work can
be conveniently delivered to concerned individuals through the social networking sites.
The Dangers of Using Social Networking Sites
Just as there are benefits of having an account in a social networking site of using it in the
teaching and learning contexts, there are risks to consider as well Teachers as well as parents
are wary of youngsters using social networking sites due to many negative publicity and real
incidents connected to the wrong use of social One major risk is making friends with strangers
who may actually be a predator networking websites. or a cyberbully. No one initially recognizes
the true nature of an acquaintance or one who seemingly poses as a friend. Sometimes, a
youngster gets bullied by others who may not even be connected as friends in a social
networking website. There are also trolls who actually instigate conflict, misunderstanding or
emotional response by eliciting anger or ill feelings from other users through social media. They
post messages that are inflammatory or controversial. Topping these risks is also the danger of
users getting hooked on internet and may learn to ignore the real world. Their ability to socialize
is incapacitated as they devote hours or days on gaming or using the computer manifesting
abuse to themselves. That is why teachers and parent’s guardians are protective to the extent of
disallowing youngsters to use the internet and social networking sites without realizing that such
act denies the opportunity to explore the educational potential it can serve.
Safeguarding Oneself when Engaging in Social Networking Sites
You need to understand and take precautionary measures to safeguard yourself in social
networking websites.
Networking can be confined and monitored within the school system. Students can use
social networking platforms designed for educational purposes that will allow students to post,
share and discuss insights gained from an activity. Some of these sites are SuperClubs Plus,
Learner Journey, Scuttle Pad, among others. One drawback however, is that sometimes
youngsters are not enticed to use these social networking platforms because they are not as
attractive as Facebook or Twitter. When young users prefer to use a social networking website
that is outside of the school's system. teach them to stay safe through some precautionary
measures:
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

1. A social networking account has passwords and log-in details. Secure passwords and keep
them private.
2. Log out every time you use public computers.
3. Regularly check privacy settings of social networking websites so that only direct friends or
those particularly known can see the posts.
4. Online posts are saved and may become a permanent part of their online reputation. As you
use the internet, you leave a digital footprint which can be traced back to you.
5. Do not accept invites from contacts unless you know them personally or you are sure of their
identity.
6. Seriously consider the effect of possible posts on others before deciding to do so. If posts (i.e.
text, picture, video) could be considered offensive or humiliating another person, then you
refrain from posting or uploading it.
7. Using appropriate language is essential. The tone when communicating or sending social
networking messages should be respectful.
8. Better be safe than sorry. You should accent friends and connections when you are sure of the
person's identity. Personally meeting someone you only met online is discouraged. Even if the
sincerity of having a personal meeting looks convincing, it would be better if you I will be
accompanied.
9. When there is an indication of harassment or abuse, it is advised that you report this by
clicking the report button of abuse. It is better still to talk to friends or trusted adults about the
case.
10. Bullying takes place even in social networking websites. Cyberbullying updates, and other
functions to harass, uses the site's messages, intimidate, humiliate, taunt. or pick on the
individual. When this happens, you can do the following actions:
a. ignores the behavior by not responding at all:
b. blocks the person;
c. clicks the report button of abuse; or
d. talk to a trustworthy adult about it.
Connecting with friends and having an active life on social networking websites have its
rewards. However, when one is not taking precautionary steps, there is also imminent danger. It
is more beneficial if you understand both its potential and its pitfalls. When used properly and in
the right measure, it can bring more benefits. Only then can social networking sites lead to one's
growth and ensure a productive social life.

Discuss how you will respond to this situation. Think of the best advice you learn.
Situation 1: Meeting someone in person you met online.
A classmate met somebody online and was asked her phone number and address. She confides
in you and you notice that she seems to have been hooked in chatting with this friend. You know
that there is a possibility that she will be invited for a personal meeting. What advice would you
give?
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518

Situation 2: Your best friend and you do not seem to like a group of classmates. You were asked
to take pictures of them in a school activity and since you have the file, your best friend chided
vou to distort their picture and post it on the internet. What should you do?

Prepared by:
Ms. Mialyn Concha,
LPT

You might also like