Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills
11
Empowerment
Technologies
Quarter 1 – Module 1:
Introduction to ICT, Online
Safety and Contextualized
Online Search and Research
Skills
NOTE: please do not write ANYTHING on this MODULE, write your answers on your
notebook.
Introductory Message
For the facilitator:
This will aid in teaching competencies that are essential in the Information Age, such
as the state of ICT Technologies; online safety, security, ethics and etiquette;
productivity tools with advanced application techniques; imaging and designing for
online environment; multimedia tools; and powerful tools to create a social change,
which are aligned to the standards set by the Department of Education for the senior
high school level.
(This module contains information about: the massive world of Information and
Communication Technology (ICT) has continued to shape the world including the
Philippines. This unit allows you to discover the world of ICT in general and also helps
you improve your skills in various applications. It also creates several real-life
scenarios where you can use these applications and resources properly.
This module was designed and written with you in mind. It is here to help you
master the Empowerment Technologies. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.
The module is divided into Two lessons and five sub topics, namely:
• Lesson 1 – Information and Communication Technologies
▪ Lesson 1.1 – ICT in the Philippines
▪ Lesson 1.2 – ICT, Me, and my Community
▪ Lesson 1.3 - Web 2.0: Dynamic Web Pages
▪ Lesson 1.4 - Web 3.0 and the Semantic Web
▪ Lesson 1.5 - Trends in ICT
• Lesson 2 – Online security, safety, and ethics
▪ Lesson 2.1 – Internet Threats
▪ Lesson 2.2 – Protecting reputations online
▪ Lesson 2.3 – Copyright
• Lesson 3 – Contextualized Online Search and Research Skills
2
2. understand and demonstrate the proper etiquette in using ICT;
3. demonstrate appropriate skills in using several computer applications,
4. discover opportunities where one can use these skills in real-world scenarios;
and
5. collaboratively create an online portal.
6. Consider one’s and others’ safety when sharing information using the Internet;
7. Consider one’s and others’ reputation when using the Internet;
8. Determine and avoid the dangers of the internet;
9. Be responsible in the use of social networking sites; and
10. Browse the internet efficiently and properly through proper referencing.
What’s New
Activity 1:
Did you use the internet after you woke up this morning?
On your activity sheet, answer the questions.
1. How many times have you checked your phone this morning?
2. How many status updates have you posted in FB or Twitter today?
3. Did you use internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?
Unlocking of Difficulties
The following are the terms you will encounter with this module:
Key Terms
What I Know
Activity 2:
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
3
1. A web page that allows interaction from the user
a. static c. social
b. dynamic d. comment
2. This refers to the feature where users are able to categorize and locate
information through tagging.
a. hashtags c. taxonomy
b. folksonomy d. rich user experience
3. A feature of a dynamic website that allows users to put their own content
a. rich user experience c. user participation
b. long tail d. mass participation
5. According to this magazine, two Philippine cities are part of the top 10 in their
research about “The Selfiest Cities around the World.”
a. People c. Reader’s Digest
b. Time d. Candy
9. This media is designed to help people who have visual and reading
impairments.
a. assistive c. bookmark
b. social d. accessibility
10. This type of social media website focuses on short updates posted by the user.
a. blogging c. social media
b. microblogging d. hashtagging
4
Lesson Information and Communication
1 Technologies
Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to
locate, save, send, and edit information.
When we make a video call, we use the Internet. When we send a text or make
a call, we use cellular networks. When we run out of load or battery, we use
payphones which use a telephone network. Having a unified way to communicate is
one of the goals of ICT. In terms of economics, ICT has saved companies a lot of
resources (time and money) with the kind of communication technology they use,
nowadays. In a similar way, we spend less because of ICT. As it normally costs us a
peso to send a text message or SMS, with the Internet, we can send multiple
messages and only be charged by a fraction.
What’s In
5
• Philippines is dub as the “ICT Hub of Asia” because of huge growth of
ICT-related jobs, one of which is BPO, Business Process
Outsourcing, or call centers
• ICT Department in the Philippines
is responsible for the planning, development and promotion of the
country's information and
communications technology (ICT) agenda in support of national
development.
What is It
Activity 3:
ICT, Me, and My Community
To fully understand the importance of ICT, let us first look at our community. Look
for a small business around your community.
Conduct a short interview (via free data on messenger) of the business owner using
the following guide:
Company/Establishment Name:
Address:
Nature of Business:
Guide Questions:
1. What are the different ways for customers and/or suppliers to contact
you?
2. How often do you use a phone or cellular phone for business? Estimate
only.
3. Does your establishment have Internet connection? If yes, what is its
purpose? If no, would you consider having it in the future? Why or why
not?
4. Does your business have a website? if yes, how does it help the company?
If no, would you consider having one in the future? Why or why not?
5. If applicable) Would you consider giving free Wi-Fi access in the future? If
you already have it, does it help boost sales?
Internet
6
• is an information space where documents and other web resources are
identified by URLs, interlinked by hypertext links, and can be accessed via
the Internet.
• Invented by Tim-Berners Lee
Web Pages
• Web page is a hypertext document connected to the World Wide Web.
• It is a document that is suitable for the World Wide Web
Web Sites
• a location connected to the Internet that
maintains one or more pages on the World
Wide Web.
• It is a related collection of World Wide Web
(WWW) files that includes a beginning file
called a home page.
Web Browser
• It displays a web page on a monitor or mobile device
• is a software application for retrieving, presenting, and traversing
information resources on the World Wide Web.
7
Static vs. Dynamic Web Page
• Static" means unchanged or constant, while
"dynamic" means changing or lively.
• A static site is one that is usually written in plain
HTML and what is in the code of the page is what
is displayed to the user. A dynamic site is one that
is written using a server-side scripting language
such as PHP, ASP, JSP, or ColdFusion.
Features of Web 2.0
1. Folksonomy- allows user to categorize and classify
information using freely chosen keywords e.g
tagging by Facebook, twitter, use tags that start with the pound sign #,
referred to as hashtag
2. Rich User Experience- content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able
to put content. Others are able to place a content of their own by means of
comments, reviews, and evaluation e.g lazada.com, amazon.com
4. Long Tail- services that are offered on demand rather than on a one-
time purchase. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spent in the Internet, or a data
plan that charges you for the amount of bandwidth you used.
5. Software as a Service- users will be subscribe to a software only when
needed rather than purchasing them e.g Google docs used to create and
edit word processing and spread sheet.
6. Mass Participation- diverse information sharing through universal
web access. Web 2.0’s content is based on people from various cultures.
Web 3.0 and Semantic Web
• Semantic Web is a movement led by the World Web Consortium (W3C).
• The W3C standard encourages web developers to include semantic content
in their web pages.
• Semantic web is a component of Web 3.0
• Semantic web provides a common framework that allows data to be shared
and reused across application, enterprise, and community boundaries.
• The aim of web 3.0 is to have is to have machines or servers understand
the user’s preferences to be able to deliver web content specifically targeting
the user.
1. Compatibility. HTML files and current web browsers could not support Web
3.0.
2. Security. The user's security is also in question since the machine is saving
his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words "old" and "small would
depend on the user.
8
5. Logic. Since machines use logic, there are certain limitations for a computer
to be able to predict what the user is referring to at a given time.
Trends in ICT
a. Social Networks- these are sites that allow you to connect with other
people with the same interests or background.
b. Bookmarking Sites- these are sites that allow you to store and manage
links to various websites and resources.
c. Social news- these are sites that allow users to post their own news
items or links to other news sources. The users can also comment on the
post and comments may also be ranked.
d. Media Sharing- these are sites that allow you to upload and share media
content like images, music, and video.
e. Mircoblogging- these are sites that focus on short updates from the
user. Those subscribed to the user will be able to receive these updates.
f. Blogs and Forums- these websites allow users to post their content.
Other users are able to comment on the said topic.
4. Mobile Technologies- popularity of smartphones and tablets. Latest
mobile devices use 4G Networking LTE, which is currently the fastest
mobile network. Mobile devices use different operating systems
• iOS
• Android
• Blackberry OS
• Windows Phone OS
• Symbian
• Web OS
• Windows
Mobile
9
5. Assertive Media- is a nonprofit service designed to help people who
have visual and reading impartments. A database of audio recordings
is used to read to the user.
What’s More
Activity 4: Your Turn to Shine
1. Why do you think microblogging platforms have become popular when regular
blogging becomes platforms already exist?
2. What do you think of Web 3.0? Do you think it will be realized someday in
the future?
What I Can Do
Activity 6:
Ask for help for help with the elderly during their time, the significant
“technological advances”, make time lines using long strips of paper, cut out and tape
together or on brown paper that comes in rolls. Time lines should include
illustrations of the “technological advances” you wish to highlight
Assessment
Activity 7:
___ 1. Facebook
___ 2. Plurk
___ 3. Twitter
___ 4. Tumblr
___ 5. reddit
___ 6. Google+
___ 7. Instagram
___ 8. Pinterest
___ 9. Blogger
___ 10. StumbleUpon
What I Know
Activity 9:
I. Directions: Pre-Test: Write Yes if you agree with the statement and No if
you disagree on the blank before each number.
Lesson
Rules of Netiquette
2
Most of us use the Internet every day, Sometimes, we do not pay
attention on how much information we share online. Below is a questionnaire
about how much you have shared so far. Put a check (✓) under Shared or
Not Shared.
How many hours do you spend on the Internet per day? Can you live without
the Internet for a week? How many aspects of your life depend on the Internet? How
many times have you complained about your Internet connection speed? As
teenagers, you are all exposed to many things powered by the Internet.
Whether it is socializing, playing games, reading sports news,
shopping, etc., the Internet has given you one of the most powerful
tools that your parents, during their teenage years, did not have.
Because of this, do you not think that it is also important to
wield this powerful tool properly? Without proper training, a
swordsman can easily injure himself when wielding a
swordsman, the same could be said for you whenever you use
the Internet.
What’s New
• Lesson 2 – Online security, safety, and ethics
Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business,
gain Online Safety and Security new friends, and stay in touch with the old ones. It
is also a source of entertainment through games, online communities, and everything
in between. But like most things in this world there is always the 'other side of the
coin
The Internet is one of the most dangerous places especially if you do not know
what you are doing with it. But there is no need to worry: it is never that late.
Hopefully, by the end of this lesson, you are able to consider how you go about your
use of the Internet.
Let us go back to the "How Safe Are You?" test.
Let us visit each item and see how risky it is to share them. pe of information
Risks There is a risk in sharing your
The Internet, truly, is a powerful tool. It can be used to promote your business,
gain Online Safety and Security new friends, and stay in touch with the old ones. It
is also a source of entertainment through games, online communities, and everything
in between. But like most things in this world there is always the 'other side of the
coin
The Internet is one of the most dangerous places especially if you do not know
what you are doing with it. But there is no need to worry: it is never that late.
Hopefully, by the end of this lesson, you are able to consider how you go about your
use of the Internet.
Let us go back to the "How Safe Are You?" test.
Let us visit each item and see how risky it is to share them. pe of information
Risks There is a risk in sharing your
Middle name
Sharing your middle name alone is probably
not the riskiest of this shared information,
but sharing your full name would be.
Current
and
Previous Most people who steal identities study their
Schools subject. They can use this information for
verification purposes.
The name
Disclosing this is a huge risk. Strangers may
of your
pretend or use their identity to dupe you.
siblings.
What is It
What is It
What’s In
What’s New
“Googling”
Indeed, Google might be our “friend” but using search
engines for the sake of plain information could actually lead
you misinformed.
In order to stay meaningfully informed, you should start
appreciating the use of the right combination of words or key phrases.
SEARCH ENGINE
A search engine is a software system designed to search the Internet for documents
related to the keyword or search word used or entered into the system. Users are
able to maximize the potential of search engines by learning the proper searching
protocols.ii
ONLINE RESEARCH
In the Philippines, copyrights only last a lifetime (of the author) plus 50 years.
There are also provisions for “fair use”.
Symbol Function
Finds web pages that contain all the terms that are preceded by
+ the + symbol; allows you to include terms that are usually
ignored
““ Finds the exact words in a phrase
AND or & Finds web pages that contain all the terms or phrases
What’s More
Activity 14: Your Turn to Shine
Self-Check
On your activity sheets, complete the sentences with relevant concepts:
1. When I search using “Jos” the search may result to:
_______________________
2. If I will search the internet using AND, in the word, online
platforms the result is:_____________________________
3. If I will use NOT in my search, what will be its result?
_________________________
Activity 15:
1. 1990s is the development of ICT in the Philippines, supposed you are a first-
year college student, enumerate the ways on getting the
most relevant information about the Information and
Technology. You can ask for help within your family and
friends.
2. Have a documentation of what are the most useful search
tips you used to obtain the most relevant information.
What’s More
Self-Check 1.1
Essay: How misusing social media can create a negative digital foot print?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
Activity 18:
Activity 19:
• Create a Poster that will show brief explanation in one of the 10 Rules in
Netiquette by Virginia Shea.
Assessment
Activity 20: Post-Test Matching Type: Match Column A with Column B. Write
the letter of the correct answer on the space before each
number.
A B
___ 1. virus a) designed to send you advertisements
___ 2. rogue b) sends an official-looking email and is designed
to steal provision that allows you to use
copyrighted work sensitive personal information
___ 3. keylogger c) without consent with certain limitations
___ 4. adware d) a browser feature that is synonymous to
"private" browsing
___ 5. spam e) replicates and can transfer from one computer
to another
___ 6. phishing f) exploits the DNS system
___ 7. fair use g) states that anyone who uses your work without
your consent is punishable by law
___ 8. spyware h) runs in the background and monitors what you
are doing
___ 9. private i) unwanted email mostly from bots
___ 10. malware j) disguised as a useful program but is not
___ 11. incognito k) the information superhighway
___ 12. internet l) tricks the user into posing that it is a security
software
___ 13. trojan m) a malicious software
___ 14. copyright n) an option to hide a post so that search engines
could not scan it
___ 15. pharming o) used to record the keystrokes done by the user
References:
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-
7830-0; Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Reygie Fabro-College Instructor at Divine Word College of Laoag; Published on Jul 13, 2016;
https://www.slideshare.net/reygiebumagat/empowerment-technology
For educational purposes only; All rights reserved for rightful owners
Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0
Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI)
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G.
Araneta Ave., cor Ma. Clara St., Quezon City. Page 367, paragraph 3.
Prepared by:
i
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., c or Ma. Clara St., Quezon
City. Page 36, paragraph 1.
ii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon
City. Page 36, paragraph 2.
iii
Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon
City. Page 36, paragraph 3.