SlideShare a Scribd company logo
EMPOWERMENT
TECHNOLOGIES
Quarter 1 - Module 1:
Information and Communication
Technologies
Lessons Objectives
• Compare and contrast the nuances of varied
online platforms, sites, and content to best
achieve specific class objectives or address
situational challenges;
• Apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it
would relate to their specific professional tracks;
• Use the Internet as a tool for credible research
and information gathering to best achieve specific
class objectives or address situational challenges.
THE CURRENT STATE OF ICT
TECHNOLOGIES
Information and Communication
Technology It refers to the use of
communication technology such
as laptop, smart phones, tablet,
telephone, internet and etc. to
send, save, and edit information.
ICT in the Philippines
The use of communication technology
spread in the entire country now a day
even in rural areas. According to Rappler
blog site there are 119 million mobile
phone subscriptions from a total
population of 101 million and 47 million
active Facebook accounts.
The Philippines is the fastest growing
app market in Southeast Asia and the
highest digital population in the world. The
top online activities are social media,
videos, online mobile games, location-
based search and online shopping. Staying
connected with loved ones, friends, and
relatives is a fundamental need for
Filipinos.
Activity 1: Visiting Websites
Directions: List down three (3) websites that you
have browsed.
1. ___________________
2. ___________________
3. ___________________
World Wide Web
It is also known as WWW or W3
introduce by Tim Berners-Lee. It consists of
different pages that are formatted in a
markup language called HTML (Hypertext
Markup Language) and linked to each
other that contain text, graphics,
multimedia files, hyperlinks and etc.
Web 1.0
The first development of World Wide
Web where web pages are static. It also
known as flat or stationary page and it
cannot be manipulated by users.
Web 2.0
It is a dynamic web page where user
can interact with page like creating a user
account, posting comments, uploading files
and images, and others. Example: Blog
sites, Facebook, Twitter, Instagram, and
YouTube.
Features of Web 2.0
1. Folksonomy – users can classify and arrange
information by adding tag or label. Pound
sign (#) is used in Facebook, Twitter,
Instagram and other social networking sites.
Example in tagging on Facebook:
#TeamKawayan, #Single
2. Rich User Experience – user can have high
interaction with the content of the page and
can achieve level of expertise.
3. User Participation – user can put content on
their own in web page like comment, evaluation,
and etc.
4. Long Tail – A site that offers services and brings
individual and businesses into selling different
goods and commodities such as shopping site
like OLX, Lazada, Shopee, Zalora and others.
5. Software as a service – users can subscribe to a
software when they need it instead of
purchasing them.
6. Mass Participation – sharing of diverse
information through universal web access.
Web 3.0 The Semantic Web
A new paradigm in web interaction
extension of led by World Wide Web
Consortium (W3C) where it provides
framework that allows data to be shared
and reuse.
Activity 2: Social Media
Directions: List down five (5) social media that
you have been used.
1. _____________
2. _____________
3. _____________
4. _____________
5. _____________
Technology keeps rising and
improving every time. The use of
technology connects us to the people
around the globe and gives us current
information on the trends in information
and communication.
Trends in ICT
1. Convergence – it refers to fusing of
technological advancement to work on a
similar task. Example. Using smartphone as
camera in taking pictures instead of DSLR
camera.
2. Social Media – an application and website
where user can communicate, create and
share content, and participate in online
communities.
Type of Social Media
A. Social Network – A website where people
with the same come together to share
information. Examples: Twitter, Instagram,
Facebook.
B. Social News – A website where user can post
stories and are ranked based on the
popularity through voting. Examples: Digg,
Reddit, Propeller, Slashdot, Fark
C. Bookmarking Sites – A website that allows
you to share and store internet bookmarks,
articles, posts, blogs, images and others.
Examples: Pinterest, Stumble Upon, and
Dribble.
D. Media Sharing – A website that allows you to
share and store multimedia files such as
video, photos and music. Examples:
Instagram, YouTube, Flickr
E. Micro blogging – a website that allows you to
broadcast short message. Examples: Twitter,
Tumblr, and Meetme.
F. Blogs and Forums – a discussion website that
allows user to ask questions and comments
on a journal posted by an individual or group.
Examples: Word press, and Blogger.
3. Mobile Technologies – a technology
used in cellular and other devices such
netbook, laptop, tablet, smartphones
and etc.
4. Assistive Media - A platform that assist
people with disability. It will guide the
individual like a blind person by using an
audio recording.
Activity 3: Generalization
In what way is ICT very useful in your studies?
___________________________________
_______________________________________
_______________________________________
_______________________________________
_______________________________________
______________________________________.
Online Safety, Security,
Ethics and Etiquette
Online Safety
The importance of internet plays a
crucial part in human development. Life
becomes easy and comfortable because
of this technology. Most of us are
connected to the internet via laptop,
mobile phone, tablet, personal
computer and other electronic gadgets.
Behind this technology there is a
risk that everyone should be aware of.
You could be at risk on scam, bullying,
and illegal activities if you will not take
precautions in using internet. We need
to keep ourselves safe and secure
whenever we use the internet.
Activity 1: Self-Check on Online Habits
Directions: Reflect and assess yourself on your
online habits. Check “Yes” or “No” on the table
below.
Tips on how to be safe online
Do not share your password with anyone.
Add friends you know in real life.
Do not visit untrusted websites.
Add password to your WIFI at home to make it
private.
Install and update antivirus in your computer.
Do not give your personal information to anyone
Think before you click.
Never post about your future vacation.
Internet Risk
a. Cyber bullying It happens when
someone intentionally abused, harass,
and mistreated by other person using
electronic communication.
b. Identity Theft It is a crime of stealing
personal information for the purpose of
assuming that person’s name or identity
to make any form of transactions.
c. Cyber Stalking A criminal practice
where electronic communication is
used to stalk or harass individual or
group.
d. Sexting The act of sending sexually
explicit text messages, images, and
videos.
Internet Threats
Malware – also known as Malicious Software.
Types of Malware
1. Virus – a malicious program that replicate itself by
copying itself to another program.
2. Trojan Horse – a malicious program that disguised
as legitimate program that user will accept and use
but take control of your computer.
3. Worm – malicious program that copy’s itself and
spreads to other computers.
4. Spyware – A malicious program that gathers
information from victim’s computer and send it
back to the hacker.
5. Adware – An unwanted advertisement that will
pop-up several times on victim’s computer then
behave abnormally and tedious to close them.
6. Key logger – A program that runs in the
background and steals user credentials and
confidential information and send back to hack
by recording every keystroke that a user makes
on their computer or device.
7. Botnet – A collection of infected internet–
connected devices such as PC and mobile phone
that are controlled by a common type of
malware.
8. Rootkit – A software tools used by hackers to
gain control over a computer on a network
without being exposed.
9. Ransom ware – A ransom virus that block the
user from accessing the programs or files and
demands to pay the ransom through online
method for the removal of the virus.
e. Spam Also known as junk email or
unwanted email send by advertiser or
bot. It can be used to send malware.
f. Phishing A cyberattack method using
deceptive emails and websites to
acquiring sensitive personal information
g. Cybercrime A crime in which computer
is used as object and tool in committing
a crime such hacking, phishing,
spamming, child pornography, libel,
hate crimes, identity thief and others.
h. Cybercrime Law A law that deals with
all forms of cybercrime
Activity 2: #Wall
Suppose you have read a post like this “Strong
men don’t cry” in social media. How would you
react? Write your reaction in your notebook.
Netiquette
It is a word that came from the two
words “net” and “etiquette”. It is an etiquette
applied online that shows proper manner and
behavior. If you are a member of an online
society through social media you are called
netizen. And in interacting with other netizen
online, we need to maintain good behavior
which is acceptable to others in online
community.
The Core Rules of Netiquette
by Seth T. Ross
1. Remember the human.
2. Adhere to the same standards of behavior
online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and
bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's
mistakes.
Activity 3: Generalization
Directions: Answer the following questions
below.

More Related Content

What's hot

[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
JazzyNF
 
ICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development Communication
FrancineEspineda
 
Chapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information LiteracyChapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information Literacy
Juvywen
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
Juvywen
 
ICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationICT For advocacy and Developmental Communication
ICT For advocacy and Developmental Communication
Deoky5799
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
George Silandote Jr.
 
Project in Empowerment Technology
Project in Empowerment Technology Project in Empowerment Technology
Project in Empowerment Technology
Jeanloismorante
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
Aira Shayne Come
 
Pagsulat11_Katitikan
Pagsulat11_KatitikanPagsulat11_Katitikan
Pagsulat11_Katitikan
Tine Lachica
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
Teodoro Llanes II
 
Democratic Practices and Inclusive Excellence
Democratic Practices and Inclusive ExcellenceDemocratic Practices and Inclusive Excellence
Democratic Practices and Inclusive Excellencesondramilkie
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Arniel Ping
 
Module 8: THE JUDICIARY
Module 8: THE JUDICIARYModule 8: THE JUDICIARY
Module 8: THE JUDICIARY
Angelita Montilla
 
Lakbay sanaysay filipino grade 12
Lakbay sanaysay filipino grade 12Lakbay sanaysay filipino grade 12
Lakbay sanaysay filipino grade 12
hannamarch
 
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdfPlanning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Eidene Joy Manuel
 
[Lesson 1] UCSP: Some Key Observations
[Lesson 1] UCSP: Some Key Observations[Lesson 1] UCSP: Some Key Observations
[Lesson 1] UCSP: Some Key Observations
Psykherynne Duque
 
MIL-Q1M8.pptx
MIL-Q1M8.pptxMIL-Q1M8.pptx
MIL-Q1M8.pptx
razielyurag
 
9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
Teodoro Llanes II
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Amber Espiritu
 
MIL 12: The Role of Media in a Democratic Society
MIL 12: The Role of Media in a Democratic SocietyMIL 12: The Role of Media in a Democratic Society
MIL 12: The Role of Media in a Democratic Society
Mary Antoniette Rosello
 

What's hot (20)

[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
ICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development Communication
 
Chapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information LiteracyChapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information Literacy
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
ICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationICT For advocacy and Developmental Communication
ICT For advocacy and Developmental Communication
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
Project in Empowerment Technology
Project in Empowerment Technology Project in Empowerment Technology
Project in Empowerment Technology
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
 
Pagsulat11_Katitikan
Pagsulat11_KatitikanPagsulat11_Katitikan
Pagsulat11_Katitikan
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Democratic Practices and Inclusive Excellence
Democratic Practices and Inclusive ExcellenceDemocratic Practices and Inclusive Excellence
Democratic Practices and Inclusive Excellence
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Module 8: THE JUDICIARY
Module 8: THE JUDICIARYModule 8: THE JUDICIARY
Module 8: THE JUDICIARY
 
Lakbay sanaysay filipino grade 12
Lakbay sanaysay filipino grade 12Lakbay sanaysay filipino grade 12
Lakbay sanaysay filipino grade 12
 
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdfPlanning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
 
[Lesson 1] UCSP: Some Key Observations
[Lesson 1] UCSP: Some Key Observations[Lesson 1] UCSP: Some Key Observations
[Lesson 1] UCSP: Some Key Observations
 
MIL-Q1M8.pptx
MIL-Q1M8.pptxMIL-Q1M8.pptx
MIL-Q1M8.pptx
 
9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
 
MIL 12: The Role of Media in a Democratic Society
MIL 12: The Role of Media in a Democratic SocietyMIL 12: The Role of Media in a Democratic Society
MIL 12: The Role of Media in a Democratic Society
 

Similar to EMPOWERMENT TECHNOLOGIES.pptx

EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
RIZALEAHSAMANIEGO
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
TrixieAnneAlindao
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
ChadrickThompson1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
DineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
Liberty Aquino
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptx
MarieChileMutia
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
Rufa Laguit
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
Michael Montarde
 
ICT.pptx
ICT.pptxICT.pptx
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptx
JoyceNolos
 
EMTECH_Module-1.pptx
EMTECH_Module-1.pptxEMTECH_Module-1.pptx
EMTECH_Module-1.pptx
RochellOliver2
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
NibbleGribble
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
Maricel Baldomero De Lara
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
Juvywen
 
empowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxempowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptx
razielyurag
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
Jesus Rances
 

Similar to EMPOWERMENT TECHNOLOGIES.pptx (20)

EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptx
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptx
 
EMTECH_Module-1.pptx
EMTECH_Module-1.pptxEMTECH_Module-1.pptx
EMTECH_Module-1.pptx
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
empowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxempowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptx
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 

More from TedsTV

Brief History and Nature of Dance Lesson 1.pptx
Brief History and Nature of Dance Lesson 1.pptxBrief History and Nature of Dance Lesson 1.pptx
Brief History and Nature of Dance Lesson 1.pptx
TedsTV
 
Lesson 1 in Gen Math.pptx
Lesson 1 in Gen Math.pptxLesson 1 in Gen Math.pptx
Lesson 1 in Gen Math.pptx
TedsTV
 
Truth And Opinion.pptx
Truth And Opinion.pptxTruth And Opinion.pptx
Truth And Opinion.pptx
TedsTV
 
Constructing Probability Distribution.pptx
Constructing Probability Distribution.pptxConstructing Probability Distribution.pptx
Constructing Probability Distribution.pptx
TedsTV
 
Random Variables.pptx
Random Variables.pptxRandom Variables.pptx
Random Variables.pptx
TedsTV
 
The Philippine Economy f.pptx
The Philippine Economy f.pptxThe Philippine Economy f.pptx
The Philippine Economy f.pptx
TedsTV
 
Entrep module 1.pptx
Entrep module 1.pptxEntrep module 1.pptx
Entrep module 1.pptx
TedsTV
 
Lesson 1 in Gen Math.pptx
Lesson 1 in Gen Math.pptxLesson 1 in Gen Math.pptx
Lesson 1 in Gen Math.pptx
TedsTV
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
TedsTV
 

More from TedsTV (9)

Brief History and Nature of Dance Lesson 1.pptx
Brief History and Nature of Dance Lesson 1.pptxBrief History and Nature of Dance Lesson 1.pptx
Brief History and Nature of Dance Lesson 1.pptx
 
Lesson 1 in Gen Math.pptx
Lesson 1 in Gen Math.pptxLesson 1 in Gen Math.pptx
Lesson 1 in Gen Math.pptx
 
Truth And Opinion.pptx
Truth And Opinion.pptxTruth And Opinion.pptx
Truth And Opinion.pptx
 
Constructing Probability Distribution.pptx
Constructing Probability Distribution.pptxConstructing Probability Distribution.pptx
Constructing Probability Distribution.pptx
 
Random Variables.pptx
Random Variables.pptxRandom Variables.pptx
Random Variables.pptx
 
The Philippine Economy f.pptx
The Philippine Economy f.pptxThe Philippine Economy f.pptx
The Philippine Economy f.pptx
 
Entrep module 1.pptx
Entrep module 1.pptxEntrep module 1.pptx
Entrep module 1.pptx
 
Lesson 1 in Gen Math.pptx
Lesson 1 in Gen Math.pptxLesson 1 in Gen Math.pptx
Lesson 1 in Gen Math.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

EMPOWERMENT TECHNOLOGIES.pptx

  • 1. EMPOWERMENT TECHNOLOGIES Quarter 1 - Module 1: Information and Communication Technologies
  • 2. Lessons Objectives • Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges; • Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks; • Use the Internet as a tool for credible research and information gathering to best achieve specific class objectives or address situational challenges.
  • 3. THE CURRENT STATE OF ICT TECHNOLOGIES
  • 4. Information and Communication Technology It refers to the use of communication technology such as laptop, smart phones, tablet, telephone, internet and etc. to send, save, and edit information.
  • 5. ICT in the Philippines The use of communication technology spread in the entire country now a day even in rural areas. According to Rappler blog site there are 119 million mobile phone subscriptions from a total population of 101 million and 47 million active Facebook accounts.
  • 6. The Philippines is the fastest growing app market in Southeast Asia and the highest digital population in the world. The top online activities are social media, videos, online mobile games, location- based search and online shopping. Staying connected with loved ones, friends, and relatives is a fundamental need for Filipinos.
  • 7. Activity 1: Visiting Websites Directions: List down three (3) websites that you have browsed. 1. ___________________ 2. ___________________ 3. ___________________
  • 8. World Wide Web It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different pages that are formatted in a markup language called HTML (Hypertext Markup Language) and linked to each other that contain text, graphics, multimedia files, hyperlinks and etc.
  • 9. Web 1.0 The first development of World Wide Web where web pages are static. It also known as flat or stationary page and it cannot be manipulated by users.
  • 10. Web 2.0 It is a dynamic web page where user can interact with page like creating a user account, posting comments, uploading files and images, and others. Example: Blog sites, Facebook, Twitter, Instagram, and YouTube.
  • 11. Features of Web 2.0 1. Folksonomy – users can classify and arrange information by adding tag or label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social networking sites. Example in tagging on Facebook: #TeamKawayan, #Single 2. Rich User Experience – user can have high interaction with the content of the page and can achieve level of expertise.
  • 12. 3. User Participation – user can put content on their own in web page like comment, evaluation, and etc. 4. Long Tail – A site that offers services and brings individual and businesses into selling different goods and commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others. 5. Software as a service – users can subscribe to a software when they need it instead of purchasing them. 6. Mass Participation – sharing of diverse information through universal web access.
  • 13. Web 3.0 The Semantic Web A new paradigm in web interaction extension of led by World Wide Web Consortium (W3C) where it provides framework that allows data to be shared and reuse.
  • 14. Activity 2: Social Media Directions: List down five (5) social media that you have been used. 1. _____________ 2. _____________ 3. _____________ 4. _____________ 5. _____________
  • 15. Technology keeps rising and improving every time. The use of technology connects us to the people around the globe and gives us current information on the trends in information and communication.
  • 16. Trends in ICT 1. Convergence – it refers to fusing of technological advancement to work on a similar task. Example. Using smartphone as camera in taking pictures instead of DSLR camera. 2. Social Media – an application and website where user can communicate, create and share content, and participate in online communities.
  • 17. Type of Social Media A. Social Network – A website where people with the same come together to share information. Examples: Twitter, Instagram, Facebook.
  • 18. B. Social News – A website where user can post stories and are ranked based on the popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark
  • 19. C. Bookmarking Sites – A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others. Examples: Pinterest, Stumble Upon, and Dribble.
  • 20. D. Media Sharing – A website that allows you to share and store multimedia files such as video, photos and music. Examples: Instagram, YouTube, Flickr
  • 21. E. Micro blogging – a website that allows you to broadcast short message. Examples: Twitter, Tumblr, and Meetme.
  • 22. F. Blogs and Forums – a discussion website that allows user to ask questions and comments on a journal posted by an individual or group. Examples: Word press, and Blogger.
  • 23. 3. Mobile Technologies – a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc. 4. Assistive Media - A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording.
  • 24. Activity 3: Generalization In what way is ICT very useful in your studies? ___________________________________ _______________________________________ _______________________________________ _______________________________________ _______________________________________ ______________________________________.
  • 26. Online Safety The importance of internet plays a crucial part in human development. Life becomes easy and comfortable because of this technology. Most of us are connected to the internet via laptop, mobile phone, tablet, personal computer and other electronic gadgets.
  • 27. Behind this technology there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and illegal activities if you will not take precautions in using internet. We need to keep ourselves safe and secure whenever we use the internet.
  • 28. Activity 1: Self-Check on Online Habits Directions: Reflect and assess yourself on your online habits. Check “Yes” or “No” on the table below.
  • 29. Tips on how to be safe online Do not share your password with anyone. Add friends you know in real life. Do not visit untrusted websites. Add password to your WIFI at home to make it private. Install and update antivirus in your computer. Do not give your personal information to anyone Think before you click. Never post about your future vacation.
  • 30. Internet Risk a. Cyber bullying It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. b. Identity Theft It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
  • 31. c. Cyber Stalking A criminal practice where electronic communication is used to stalk or harass individual or group. d. Sexting The act of sending sexually explicit text messages, images, and videos.
  • 32. Internet Threats Malware – also known as Malicious Software.
  • 33. Types of Malware 1. Virus – a malicious program that replicate itself by copying itself to another program. 2. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your computer. 3. Worm – malicious program that copy’s itself and spreads to other computers. 4. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker.
  • 34. 5. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them. 6. Key logger – A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device. 7. Botnet – A collection of infected internet– connected devices such as PC and mobile phone that are controlled by a common type of malware.
  • 35. 8. Rootkit – A software tools used by hackers to gain control over a computer on a network without being exposed. 9. Ransom ware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
  • 36. e. Spam Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware. f. Phishing A cyberattack method using deceptive emails and websites to acquiring sensitive personal information
  • 37. g. Cybercrime A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others. h. Cybercrime Law A law that deals with all forms of cybercrime
  • 38. Activity 2: #Wall Suppose you have read a post like this “Strong men don’t cry” in social media. How would you react? Write your reaction in your notebook.
  • 39. Netiquette It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community.
  • 40. The Core Rules of Netiquette by Seth T. Ross 1. Remember the human. 2. Adhere to the same standards of behavior online that you follow in real life. 3. Know where you are in cyberspace. 4. Respect other people's time and bandwidth. 5. Make yourself look good online.
  • 41. 6. Share expert knowledge. 7. Help keep flame wars under control. 8. Respect other people's privacy. 9. Don't abuse your power. 10. Be forgiving of other people's mistakes.
  • 42. Activity 3: Generalization Directions: Answer the following questions below.