Lesson 1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 65

LESSON 1:

TRENDS AND
CURRENT STATE
OF ICT
LEARNING OBJECTIVES :
At the end of the lesson, you will be able to
explain the nature of Information and Communication Technology ;

identifying what is the purpose of a specific ICT tool;

develop ethical and safety habits in using online resources;

apply online research as a mean to enhance knowledge for academic and professional track; and

manipulate and operate a useful ICT tool for a specific professional track.
Identify as many technologies as you can
within the limited time.

The team with the most correct


answers is the winner
Information and Communication
Technology (ICT) is a technology
that “deals with the use of different
communication technologies such as
mobiles phones, telephones, the
Internet, etc. to locate save send, and
edit information”
BENEFITS OF ICT IN THE CONTEXT OF EDUCATION

• Presentations can be created digitally.

• Collaboration can be done online.

• Documents can be prepared using application software.

• Files can be retrieved, work on, and sent anytime and anywhere.

• Communication is faster and more efficient.


DISADVANTAGES :

Using the internet neglecting


ethics, safety and security
might risk you to
cyberbullying, identifying
theft, hacking, and the like.
Important files can be easily
copied or reproduced if they
are not kept safely.
Internet connectivity issues
and technical errors on the
gadgets being used may
cause you productivity
issues.
The emergence of
applications and
technologies
necessitates the user
to cope fast with any
changes.
What is World Wide Web?

The World Wide Web was


proposed by Tim Berners Lee in
1989, which enables you to access
hypertext documents and other
files over the Internet.
Difference Between Internet and Web

The Internet is an infrastructure that


connects users together. 

The Web, on the other hand, is a


huge collection of information, data,
and resources that facilitates
communication between users and
computers. 
Evolution of Web

 
Web 1.0
Webpages based on Web 1.0 are
static pages, meaning users
cannot interact with the page and
the page is in read-only format.

It delivers content in a single


direction, wherein the site owner
is always the contributor, and the
users are always the audience.
Web 1.0
Web 2.0
Web 2.0 is more dynamic.
This means that the site owner
no longer dictates what the
content of the website should
be, instead, users contribute to
the content.
Web 2.0
What is the difference
between Web 1.0 and
Web 2.0?
Web 3.0
Web 3.0 is the smarter
version of the Web that uses
semantics, more commonly
known as the science of
meaning of language and
artificial intelligence, to
optimize and personalize
content display to suit the
needs and tastes of the user.
Web 3.0
What is the difference
among Web 1.0, Web 2.0,
and Web 3.0?

What are the advantages


of Web 3.0 as compared
to Web 1.0 and 2.0?
TECHNOLOGICAL CONVERGENCE

Technological convergence is
the evolution of two or more
different technologies towards
one, performing the same task
but in a more efficient way.
How far have we gone through technological convergence?
SOCIAL MEDIA PLATFORMS
Social media is an online platform
where people and organizations post
status, upload pictures, and videos,
and interact with each other.

Social media is originally


considered Web 2.0-based web
applications, which feature user-
generated content.
MOBILE TECHNOLOGIES
Mobile media is principally a
versatile, personal, intelligent,
and internet-enabled platform
(hand-held gadgets, such as
mobile phones, tablets,
smartwatches, and phablets)
that allows its users to connect
with peers and exchange
information.
With your partner, discuss on how do
you utilize of using Mobile Technologies
on the ffg:

• Social media applications


• News and Information
• Games
• Culture and Entertainment
• Online Shopping
• Used to browse the web
• Productivity
• Finance and Budgeting
ASSISTIVE TECHNOLOGY

Assistive technology is
anything that helps you do
something you could not do
before.
Screen reader
This is software that can read
the text displayed on the screen
out loud. It is usually used by
visually impaired users.
Braille
This is a collection of raised dots
that represent characters (numbers,
letters, punctuation marks), which
the user reads by touching the
raised dots. It is usually used by
visually impaired users.
Magnifier
This is a tool that allows the
user to see enlarged versions
of the material being viewed.
It is usually used by people
with poor vision.
WHEEL CHAIR
This is a seating device that has
wheels, which allows it to be moved.
It can be manually operated or
automatized and is usually used by
people with mobility challenges.
ONLINE SAFETY
AND SECURITY
AND ETHICS
Online safety and security is
the awareness of the user in
implementing countermeasures
to avoid compromise of
sensitive personal data and
assets.

Common threats faced by the netizens every


day include other netizens with malicious intent
(scamming, phishing, and other cybercrimes),
unsecured programmed web applications, and
malware (virus, worm, trojan horse, etc.).
Online safety and security is the awareness of the user
in implementing countermeasures to avoid compromise
of sensitive personal data and assets.
Scamming is an act of the
attacker that seeks to gain
the victim's trust, taking
advantage of the victim to
perform further attacks.
Phishing is one of the
most common cyber
attacks wherein the
attacker impersonates a
trusted third party in an
attempt to get the
credentials or personal
information of the victim.
Cross-site scripting is a type of
attack typically found in
vulnerable web applications.
Attackers often take advantage
of sites without proper input
validation to inject malicious
payloads to attack the victim.
Cross-site scripting can be
categorized as persistent and
non-persistent.
How would you
secure your personal
information online?
How do we know if a website is secure or
not?
1. Check the URL.
URL comes with the pattern
<protocol identifier>://<resource name>.
HTTP (Hypertext Transfer Protocol)
FTP (file transfer protocol).
How do we know if a website is secure or not?

2. Look for the “padlock” icon.


When accessing secured web pages, browsers
should display a padlock icon.

NOTE: The padlock icon is also not an image. When you click on the
padlock, it should display information regarding the HTTPS certification
issued by the Certificate Authority (CA) trusted by the browser.
Google Chrome

Mozilla Firefox

Microsoft Firefox
Malware comes from the
English words “malicious”
and “software”.
It is a generic term referring to any
software that can disrupt normal
business operations by destructing
the network infrastructure, database,
and file systems, or by bypassing the
authorization and authentication
scheme of the system, stealing
sensitive information, and spamming
the workstation or network with
undesirable advertisements.
ONLINE ETHICS AND ETIQUETTE
Netiquette is a set of dos and
don’ts that netizens should
follow when surfing the
internet.

It is important for netizens to


know the proper netiquette so
that one can express freely
without offending anyone.
Do you have rules in
using online?

What are your Do’s


and Don’ts that you
are following when
using Online?
When communicating through email, one is expected to:

Be polite.

Read and reply to messages promptly.

, Do not spam other people’s mail boxes.

, Use the appropriate email subject.

, When using intellectual property online, do not forget


to give credit to the owner of the resource.
Republic Act 10627 or Anti-Bullying Act of 2013
Bullying is defined as “severe or
repeated use by one or more students of
a written, verbal or electronic
expression, or a physical gesture, or any
combination thereof, directed to another
student that has the effect of actually
causing or placing the latter in
reasonable fear of physical or emotional
harm or damage to his property”.
Republic Act 10175 or Cybercrime Prevention Act of
2012

This law protects an individual from


various unwanted online cyber acts
that may harm or evade one’s
privacy and integrity.
Data Privacy Act of 2012

Protects personal
information and
data from being
divulged without
consent.
Intellectual property is anything that is a
result of one’s creativity. This may be an
invention, a design, or any form of art.
Different types of intellectual properties are being
protected under the intellectual property rights
Contextualized
Online search and
Research Skills
Online research tools
are a set of digital tools
that aid the user in
performing research.
What are its advantages?
• offer a single source of information where the user
can perform data gathering from a single point of
location

• allows you to save a topic that


you found online, securely
store it, and access it at a later
time.
• a source of unlimited resources
What are its disadvantages?
some online resources come with an
additional fee for you to fully access their
contents

articles published online are more likely


to have gone through lesser quality
assurance checks as compared to
published books we find in physical
libraries
How do we determine whether a source is credible?

Check the URL.


• We can easily determine the type of organization behind the website.

.com Commercial use


.edu Educational use
.government Government use
.org Non-rofit Organization
.net Network service providers
.mil Military use only

• The URL often contains the name of the abbreviation of the organization’s or publisher’s
name in its URL.
How do we determine whether a source is credible?
We should also take note of the following:
 Credibility of the content publisher.
 The content must be unbiased and of
no commercial use.
 Who is the target audience of the
article and how recently was it
published?
 The date of publication.
 Citation and references.
Written Works #1
IDENTIFYING WHAT IS THE PURPOSE OF A
SPECIFIC ICT TOOL

Group your class into seven (7) groups and each of you
needs to do your individual research about the concept
assigned.

1. Web 1.0 5. Social Media

2. Web 2.0 6. Mobile Media

3. Web 3.0 7. Assistive Media

4. Technological Convergence
Written Works #1
IDENTIFYING WHAT IS THE PURPOSE OF A
SPECIFIC ICT TOOL
Each of you must present the results of your research to your group
mates. The group must then consolidate the data and come up with a
group output that will answer the following questions:

• What is <insert concept here>?

• What are examples of <insert concept here>? Explain briefly how this tool is used.

• In what situations do people use <insert concept here>?


Mini Performance Task #1
ESTABLISHING PARTNERSHIP
Proposing a Partnership Between Learners and Professional

Your goal is to establish a partnership between a


nonprofit professional organization and your student
organization. As an officer of the student organization,
you need to convince your audience, which is a
nonprofit professional organization, through a
presentation that a partnership with your organization
will be beneficial for both parties.
Mini Performance Task #1
ESTABLISHING PARTNERSHIP
Proposing a Partnership Between Learners and Professional

• Your presentation should be able to show why a partnership


between your student organization and the nonprofit professional
organization will be beneficial for both organizations.

• The creation of your presentation should use at least three different


ICT tools and show considerable originality and uniqueness.

• Your presentation's content and ideas should be well-organized.


Mini Performance Task #1
ESTABLISHING PARTNERSHIP
Proposing a Partnership Between Learners and Professional

• Your presentation should be clear, easy to understand, and


appropriate to the audience.

• Your presentation will be evaluated based on content,


resourcefulness, originality, organization, and clarity.
Mini Performance Task #1
ESTABLISHING PARTNERSHIP
Proposing a Partnership Between Learners and Professional

EXAMPLE :

Source: http://www.rochemiseo.com/wp-content/uploads/2014/12/Accounting1.jpg
BEGINNING DEVELOPING PROFICIENT EXCELLENT
CRITERIA 1 2 3 4 SCORE
The presentation The presentation The presentation The presentation
provides irrelevant  provides relevant content provides relevant content provides relevant
content and has no but has a weak point on and has a strong point on content and has
point on why a why a partnership between why a partnership between a strong point on why a
partnership between the the student organization and the student organization and partnership between the
student organization and the non-profit professional the non-profit professional student organization and the
the non-profit organization will benefit organization will benefit non-profit professional
Content professional organization both organizations. No both organization will benefit
  will benefit both evidence are shown to organizations. Evidences are both organizations. 
  organizations. No support the position of the presented but there are no Evidence are presented
evidences are shown to presenter. explanations to show how and explanations are given to
  support the position of the the evidences support the show how the evidences
  presenter. position of the presenter. support the position of the
presenter.

Presentation does not Presentation shows Presentation shows Presentation shows


demonstrate resourcefulness by using resourcefulness by using resourcefulness by using
resourcefulness by 2 different ICT tools that 3 different ICT tools that more than 3 different ICT
only using 1 ICT are relevant and are relevant and tools that are relevant and
Resourcefulness tool that is relevant meaningful to the meaningful to the meaningful to the
and meaningful to the presentation. presentation. presentation.
presentation.
BEGINNING DEVELOPING PROFICIENT EXCELLENT
CRITERIA 1 2 3 4 SCORE
Presentation is Presentation attempts  Presentation shows Presentation shows
Originality a replication of other’s to show originality some originality and considerable originalit
  ideas and shows no and uniqueness. uniqueness. y and uniqueness.
  attempt to make it
  original and
uniqueness.
Presentation is Presentation content Presentation content Presentation content
Organization & a disarray of thoughts and ideas shows an and ideas are well and ideas are well
Clarity and ideas. attempt to be organized. organized. Content
  Content clarity is organized. Content clarity is easy clarity is easy to
  difficult to understand Content clarity is to understand and is understand and is
  and the audience was somewhat clear but appropriate to the appropriate to the
  not taken into not appropriate to the audience but audience.
  consideration. audience. still needs some
improvement

TOTAL :

You might also like