SlideShare a Scribd company logo
DEPARTMENT OF EDUCATION
Republic of the Philippines
Department of Education – Region III Central Luzon
DIVISION OF CITY OF SAN FERNANDO
____________
EMPOWERMENT TECHNOLOGY 12 Page 1 of 11
FIRST SEMESTER
(QUARTER 1)
SELF-INSTRUCTIONAL PACKETS
in EMPOWERMENT TECHNOLOGY
Source: https://www.deped.gov.ph
DEPARTMENT OF EDUCATION
Republic of the Philippines
Department of Education – Region III Central Luzon
DIVISION OF CITY OF SAN FERNANDO
Page 2 of 11
FIRST SEMESTER SIPACKS
(QUARTER 1)
EMPOWERMENT TECHNOLOGY
FIRST SEMESTER – QUARTER 1 – WEEK 1
Content Standard:
The learners demonstrate an understanding of ICT in the
context of global communication for specific professional track.
Performance Standard:
The learners shall be able to independently compose an insightful
reflection paper on the nature of ICT in the context of their lives,
society, and professional tracks (Arts, Tech-Voc, Sports,
Academic)
Learning Competency:
The learners compare and contrast the nuances of varied online
platforms, sites, and content to best achieve specific class
objectives or address situational challenges.
(CS_ICT11/12-ICTPT-Ia-b-1)
Objectives: At the end of the lesson the student should be able to:
1. define and give examples of Information and Communication Technology (ICT).
2. improves their knowledge on how ICT affects their everyday lives and the state of our
nation.
3. learn the different trends in ICT and use them to one’s own advantage.
4. understand the world wide web and other technologies.
5. compare and contrast the differences and implications of varied online platforms, sites
and content.
Content:
(Subject Matter)
ICT tools and technologies, emerging trends, online systems,
and platforms
Learning Resources:
a. References:
https://www.yondu.com/article/ph-ict-industry-trends-2019-
infographic/
https://mec.ph/infographics/ict-trends-philippines/
https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-
their-difference/
http://www.wikipedia.com
b. Instructional
Materials SIPacks copy
Page 3 of 11
Procedure:
A. Reviewing previous lesson or presenting the new lesson ( DAY 1 )
Activity 1.1.1 GADGET IDENTIFICATION (5 minutes)
Can you pick two of the given images, state their names and functions?
B. Establishing a purpose for the lesson
Activity 1.1.2 TRENDING UPDATES (5 minutes)
Answer honestly the following questions.
1. How many times have you checked your phone this morning?
2. What are the various means where you able to communicate a message to somebody and
even check the news update today?
3. Did you use the internet today? Why?
4. How and/or where did you usually get the information that you’re looking for?
C. Presenting examples/instances of the lesson
What is Information Communication Technology (ICT)?
ICT deals with the use of different communication technologies such as mobile phones,
telephone, Internet, etc. to locate, save, send, and edit information.
Example: when we make a video call, we use internet.
ICT is an umbrella term that includes any communication device or application,
encompassing: radio, television, cellular phones, computer and network hardware and
software, satellite systems and so on, as well as the various services and applications
associated with them, such as videoconferencing and distance learning.
Aspects/areas and applications where ICT is being utilized:
- Communication, Business, Education, Home and Office, Entertainment, and Leisure
- Gaming and sports, Information storage & retrieval, Process control and simulation
D. Discussing new concepts
ICT Trends in the Philippines
 Philippines as the “ICT Hub of Asia”. Huge growth of ICT related jobs around the
country, one of which is call center or BPO (Business Process Outsourcing) centers.
 Time magazines declared Makati City, Philippines-Rank 1 as the “Selfiest Cities around
the world and Rank 9 is Cebu City.
Page 4 of 11
WWW(World Wide Web)
It is one of the services available on the Internet that allows you to get information about
anything and everything (text, image and more) from any web site anywhere in the world
to your computer.
It is a very huge informal network--- The first billion was reached in 2005. The second
billion in 2010. The third billion in 2014. And as of 2016 3 billion where using the net.
Asia is the large user of the world internet with 1.8 billion as of 2016.
Web 1.0 - refers to the first stage of the World Wide Web evolution.
Design essentials of a Web 1.0:
- Static pages.
- Content is served from the server’s filesystem.
- Pages built using Server Side Includes or Common Gateway Interface (CGI).
- Frames and Tables used to position and align the elements on a page.
Web 2.0 - refers to worldwide website which highlight user-generated content, usability,
and interoperability for end users. Web 2.0 is also called dynamic participative social web.
Key features of Web 2.0:
1. Folksonomy – allows users to categorize and classify/arrange information using
freely chosen keywords (e.g. tagging). Popular social networking sites such as Twitter,
Instagram, Facebook, etc. use tags that start with a pound sign (#) or hashtag.
2. Rich User Interface – means that content is dynamic and is responsive to user’s
input. An example would be a website that shows local content. In the case of social
networking sites, when logged on, your account is used to modify what you see in
their website.
3. User Participation – means the owner of website is not the only one who is able to
put content. Others are able to place a content on their own by means of comments,
reviews, and evaluation.
4. Long Tail – means that services are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent on Internet or a data plan that charges you for the amount
of bandwidth you used.
Web 3.0 – refers the evolution of web utilization and interaction which includes altering the
Web into a database.
5 main features of Web 3.0:
1. Semantic Web - improves web technologies in demand to create, share and connect
content through search and analysis based on the capability to comprehend the
meaning of words, rather than on keywords or numbers.
2. Artificial Intelligence – is combining with natural language processing and can
distinguish information like humans in order to provide faster and more relevant
results. They become more intelligent to fulfil the requirements of users.
3. 3D Graphics – refers to three-dimensional design being used widely in websites and
services such as museum guides, computer games, ecommerce, geospatial contexts.
4. Connectivity – means information is more connected using semantic metadata. As
a result, the user experience evolves to another level of connectivity that leverages
all the available information.
5. Ubiquity – means that content is accessible by multiple applications, every device is
connected to the web, the services can be used everywhere.
E. Continuation of the discussion of new concepts ( DAY 2 )
Online platforms
Online platforms are a specially developed platforms using Internet technology for the design and
development of teaching and learning purposes.
Assistive media platform is a unique avenue of
accessibility for many individuals with cognitive,
physical, and communication disabilities.
Ex: Text to speak, hearing aid
Collaboration platform which is software online
system that adds broad social networking
capabilities to work processes.
Ex: Google Docs
Convergence platform which is the different
technological system sometimes evolves toward
performing similar tasks.
Ex: Smart TV
Mobile media platform, which is the
corresponding media technologies, particularly
cloud-based technologies; increasingly important
role in the everyday lives of millions of people.
Ex: Netflix, Spotify
Social media platform are computer-mediated
technologies that facilitate the creation and sharing
of information via virtual communities and networks.
Types:
Social networks – Ex: Facebook, Google+
Bookmarking Sites – Ex: StumbleUpon, Pinterest
Social news – Ex: reddit, digg
Media sharing – Ex: YouTube, Instagram, Flickr
Microblogging – Ex: Twitter, Plurk
Blogs& Forums – Ex: Wordpress, Blogger, Tumblr
F. Developing Mastery
Activity 1.1.3 TECHNOLOGICAL TIMELINE (10 minutes)
Create a timeline (past to present) of at least 5 technological advances in human history,
in terms of communication.
Ex: Typewriter – calculator – telegraph . . . etc.
G. Finding practical applications of concepts and skills in daily living
Activity 1.1.4 ICT DEVICES AND APPLICATIONS (10 minutes)
1. Enumerate at least 5 information technology gadgets/devices
2. Give top 5 Applications you commonly used for communication
H. Making generalizations and abstractions about the lesson
Being aware of the power of ICT, can you cite instances on how ICT became very useful
in your daily life?
On the nature of ICT in the context of the Philippine society, kindly recall instances when/
where ICT was used for common advantage or disadvantage?
Page 6 of 11
I. Evaluating learning
TEST 1 SOCIAL MEDIA PLATFORM ( 20 minutes )
Answer the given Crossword puzzle by writing the correct example on Social
Media Platform
Down:
1 Blogs and forums
2 Bookmarking site
4 Media sharing
6 Media sharing
7 Media sharing
Across:
3 Blogs and forums
5 Social news
7 Social networking site
8 Microblogging
9 Blogs and forums
J. Additional activities for application or remediation
Activity 1.1.5 ICT TRENDS (10 minutes)
Instruction:
In 3 – 5 sentences, share and express your own honest experiences and ideas the
implications of varied online platforms in your life as a student.
Guide questions:
1. Cite your personal experience/s or opinion with the various ICT tools and platforms.
2. How does it affect your way of life?
3. How do you want to promote it or even prompt others to refrain from using it? Why?
Page 7 of 11
EMPOWERMENT TECHNOLOGY
SECOND SEMESTER - QUARTER 1 – WEEK 1 continuation…
Content Standard:
The learners demonstrate an understanding of ICT in the
context of global communication for specific professional track.
Performance Standard:
The learners shall be able to independently compose an insightful
reflection paper on the nature of ICT in the context of their lives,
society, and professional tracks (Arts, Tech-Voc, Sports,
Academic).
Learning Competency:
The learners apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would relate to
their specific professional tracks. (CS_ICT11/12-ICTPT-Ia-b-2)
Objectives: At the end of the lesson the student should be able to:
1. define online safety, computer security, threats, computer ethics, and netiquettes.
2. apply how to safeguard oneself and others online.
3. evaluate the implications of ICT in your life, profession, and society.
Content:(Subject
Matter) Online safety, security, ethics, and etiquettes in using ICT
Learning Resources:
a. References:
https://www.huffpost.com/entry/online-safety-what-does-
i_b_6179918
https://www.britannica.com/technology/computer-security
https://teachcomputerscience.com/computer-ethics/
https://www.tamiu.edu/distance/students/netiquette.shtml
https://www.greenriver.edu/students/academics/e-learning/e-
learning-online-netiquette/
Empowerment Technologies for Senior High School (page 8 – 9)
b. Instructional
Materials SIPacks copy
Procedure:
A. Reviewing previous lesson or presenting the new lesson ( DAY 3 )
Activity 1.2.1 MY E-LIFE (5 minutes)
Describe your digital media life. Why do you think so?
On your note, write three to five sentences about the status of your daily digital life. (i.e. what
gadget/s do you use for what purpose(communication/entertainment), how often/long do you
use it daily, what features/functionalities do you usually use?, etc.)
Start with “My digital media life is like a ...”
B. Establishing a purpose for the lesson
In this lesson, you will learn about the different online and computer security threats,
netiquettes and how to safeguard yourself and others online. Furthermore, you will learn
what are the implications of ICT in your life, profession, and society.
Page 8 of 11
C. Presenting examples/instances of the lesson
Activity 1.2.2 SAFE OR UNSAFE? (5 minutes)
Determine the following by writing S for SAFE and U for UNSAFE.
1. Password consists of varied letters, numbers, and symbols.
2. Immediately believing in contents posted online.
3. Accepting all friend requests.
4. Regularly tweeting ATM (at the moment) updates.
5. Think before you click.
D. Discussing new concepts
What is online safety?
According to Wikipedia, the definition of Internet safety is as
follows:
Internet safety, or online safety, is the knowledge of maximizing the user's personal
safety against security risks to private information and property associated with using the
Internet, and the self-protection from computer crime in general.
Computer security refers to the protection of computer systems and information from
harm, theft, and unauthorized use. Computer hardware is typically protected by the same
means used to protect other valuable or sensitive equipment, namely, serial numbers,
doors and locks, and alarms.
Internet Threats:
1. MALWARE - stand for malicious software.
a. Virus – a malicious program designed to replicate itself and transfer one computer
to another either through the Internet and local networks or data storage like flash
drives and CDs.
b. Worm – a malicious program that transfers from one computer to another by any
type of means. Often, it uses a computer network to spread itself. For example, the
ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get
your information.
*Rogue Security Software – tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality, they
are not protected at all.
d. Spyware – a program that runs in the background without you knowing it (thus
called “spy”). It has the ability to monitor what you are currently doing and typing
through keylogging.
*Keyloggers – used to record the keystroke done by the user. This is done to
steal their password or any other sensitive information. It can record email,
messages, or any information you type using your keyboard.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
2. SPAM – unwanted email mostly from bots or advertisements. It can be used to send
malware.
Page 9 of 11
3. PHISHING – involves getting a user to enter personal information via a fake website.
Its goal is to acquire sensitive personal information like passwords and credit card
details. This is done by sending you an email that will direct the user to visit a website
and be asked to update his/her username, password, credit card, or personal
information.
*Pharming – a more complicated way of phishing where it exploits the DNS
(Domain Name System, phonebook of the Internet) . It involves
modifying DNS entries, which cause users to be directed to the
wrong website when they visit a certain web address.
Tips to Stay Safe Online:
 Be mindful of what you share online and what site you share it to.
 Do not just accept terms and conditions; read it.
 Check out the privacy policy page of a website to learn how the website handles
the information you share.
 Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile
 Do not share your password with anyone.
 Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode,”
a feature of the browser, will not protect you from hackers.
 Do not talk to strangers whether online or face-to-face.
 Never post anything about a future vacation. It is similar to posting, “Rob my house
at this date.”
 Add friends you know in real life.
 Avoid using untrusted websites.
 Install and update antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
 If you have a Wi-Fi at home, make it private network by adding a password.
 Avoid downloading anything from untrusted websites. You are most vulnerable in
peer-to-peer downloads (torrents) as the download is most likely not monitored by
the site owner.
E. Continuation of the discussion of new concepts
Computer ethics are a set of moral standards that govern the use of computers. It is
society’s views about the use of computers, both hardware and software. Privacy
concerns(hacking, malware, data protection), intellectual property rights(copyright,
plagiarism, software license) and effects on the society(jobs, environmental impact, social
impact) are some of the common issues of computer ethics.
What Is Netiquette?
A netiquette is a set of rules for behaving properly online that a netizen should observe in
communicating and/or publishing information and materials over the World Wide Web and
in ICT in general. Classes with an online component require the use of good netiquette.
Many e-Learning courses use discussion forums. Here are four tips for good netiquette in
an online discussion.
Netiquette Tips
Regardless of the type of communication used, you should always keep in mind the
following:
o be respectful
o be considerate of others
o think through before responding
o write clearly and concisely
o respond in a timely manner
o use short paragraphs
o spell-check your responses
Page 10 of 11
Avoid:
o CAPITAL LETTERS may be used to EMPHASIZE, but avoid typing in only capital
letters as it may "sound" AS THOUGH YOU'RE SHOUTING!
o rambling writing style; get to the point quickly
o screens full of text
F. Developing Mastery
Protecting Reputations Online
1. Before you post something on the web, ask these questions to yourself: Would you
want your parents or grandparents to see it? Would you want your future boss to see
it? Once you post something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report as inappropriate.
G. Finding practical applications of concepts and skills in daily living
Activity 1.2.3 PRIVACY POLICIES (10minutes)
Visit a social networking site and look for the site’s privacy policy. The link is typically
found at the bottom of the page and sometimes labeled only as “Privacy.” Write a summary
on how the website handles both your private and public information.
H. Making generalizations and abstractions about the lesson
Being fully aware of the possible risks posed by the frequent use of ICT, one has to decide
to apply necessary measures on the use of ICT for our own advantage and be a responsible
and proactive user of ICT.
I. Evaluating learning ( DAY 4 )
TEST 2 ONLINE SAFETY ( 20 minutes )
Instruction: ENCIRCLE the words found inside the box. WRITE a brief description for
each word.
Ex. SPAM - a junk mail
VIRUS ETIQUETTE MALWARE
TROJAN CYBERCRIME HACKER
WORM SAFETY ONLINE
Page 11 of 11
J. Additional activities for application or remediation
Activity 1.2.4 SHARED OR NOT SHARED? (20minutes)
Below is a questionnaire about how much information you have shared so far. Put a
check ( ✔ ) under Shared or Not Shared.
Most of us use the Internet everyday. Sometimes, we do not pay attention on how much
information we share online.
Analysis: (Write your answers on your notes)
How many checks did you have for shared?
In case, why did you share your full name?
In case, why did you share your birthday?
How many hours do you spend on the Internet per day?
Can you live without the Internet for a week?
How many aspects of your life depend on the Internet?
Types of Information Shared Not Shared
1. First name
2. Last name
3. Middle name
4. Current and previous school (s)
5. Your cellphone number
6. The name of your parents
7. The name of your siblings
8. Your address
9. Your birthday

More Related Content

Similar to EMPOWERMENT-TECH-WEEK-1.docx

Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptxJasonPDelosSantos
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptxJasonPDelosSantos
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptxJasonPDelosSantos
 
Understanding the basic concepts in ict
Understanding the basic concepts in ictUnderstanding the basic concepts in ict
Understanding the basic concepts in ictMelchorArestaBaniaga1
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxmaverickarquillo1
 
ppt for observation_1.pptx
ppt for observation_1.pptxppt for observation_1.pptx
ppt for observation_1.pptxJENNIFERFORTU1
 
thefinalreport
thefinalreportthefinalreport
thefinalreports06283
 
Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1SheilaBungalan1
 
Empowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxEmpowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxCatherineBotardo3
 
Empowerment Technology_Introduction.pptx
 Empowerment Technology_Introduction.pptx Empowerment Technology_Introduction.pptx
Empowerment Technology_Introduction.pptxCliffordBorromeo
 
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfSLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfLadyCheyenneMontefal
 
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdfADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdfBabylyn Atillaga
 

Similar to EMPOWERMENT-TECH-WEEK-1.docx (20)

E-tech lesson 1.pptx
E-tech lesson 1.pptxE-tech lesson 1.pptx
E-tech lesson 1.pptx
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptx
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptx
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptx
 
1.docx
1.docx1.docx
1.docx
 
Understanding the basic concepts in ict
Understanding the basic concepts in ictUnderstanding the basic concepts in ict
Understanding the basic concepts in ict
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
ppt for observation_1.pptx
ppt for observation_1.pptxppt for observation_1.pptx
ppt for observation_1.pptx
 
thefinalreport
thefinalreportthefinalreport
thefinalreport
 
Empowerment technology 101
Empowerment technology 101Empowerment technology 101
Empowerment technology 101
 
Web2 Seminar
Web2 SeminarWeb2 Seminar
Web2 Seminar
 
Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1
 
Empowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxEmpowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptx
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
MODULE 1- WEEK 2.pptx
MODULE 1- WEEK 2.pptxMODULE 1- WEEK 2.pptx
MODULE 1- WEEK 2.pptx
 
Empowerment Technology_Introduction.pptx
 Empowerment Technology_Introduction.pptx Empowerment Technology_Introduction.pptx
Empowerment Technology_Introduction.pptx
 
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfSLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
 
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdfADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxJisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...EugeneSaldivar
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasGeoBlogs
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxJisc
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsparmarsneha2
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfThiyagu K
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfSpecial education needs
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

EMPOWERMENT-TECH-WEEK-1.docx

  • 1. DEPARTMENT OF EDUCATION Republic of the Philippines Department of Education – Region III Central Luzon DIVISION OF CITY OF SAN FERNANDO ____________ EMPOWERMENT TECHNOLOGY 12 Page 1 of 11 FIRST SEMESTER (QUARTER 1) SELF-INSTRUCTIONAL PACKETS in EMPOWERMENT TECHNOLOGY Source: https://www.deped.gov.ph
  • 2. DEPARTMENT OF EDUCATION Republic of the Philippines Department of Education – Region III Central Luzon DIVISION OF CITY OF SAN FERNANDO Page 2 of 11 FIRST SEMESTER SIPACKS (QUARTER 1) EMPOWERMENT TECHNOLOGY FIRST SEMESTER – QUARTER 1 – WEEK 1 Content Standard: The learners demonstrate an understanding of ICT in the context of global communication for specific professional track. Performance Standard: The learners shall be able to independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and professional tracks (Arts, Tech-Voc, Sports, Academic) Learning Competency: The learners compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges. (CS_ICT11/12-ICTPT-Ia-b-1) Objectives: At the end of the lesson the student should be able to: 1. define and give examples of Information and Communication Technology (ICT). 2. improves their knowledge on how ICT affects their everyday lives and the state of our nation. 3. learn the different trends in ICT and use them to one’s own advantage. 4. understand the world wide web and other technologies. 5. compare and contrast the differences and implications of varied online platforms, sites and content. Content: (Subject Matter) ICT tools and technologies, emerging trends, online systems, and platforms Learning Resources: a. References: https://www.yondu.com/article/ph-ict-industry-trends-2019- infographic/ https://mec.ph/infographics/ict-trends-philippines/ https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with- their-difference/ http://www.wikipedia.com b. Instructional Materials SIPacks copy
  • 3. Page 3 of 11 Procedure: A. Reviewing previous lesson or presenting the new lesson ( DAY 1 ) Activity 1.1.1 GADGET IDENTIFICATION (5 minutes) Can you pick two of the given images, state their names and functions? B. Establishing a purpose for the lesson Activity 1.1.2 TRENDING UPDATES (5 minutes) Answer honestly the following questions. 1. How many times have you checked your phone this morning? 2. What are the various means where you able to communicate a message to somebody and even check the news update today? 3. Did you use the internet today? Why? 4. How and/or where did you usually get the information that you’re looking for? C. Presenting examples/instances of the lesson What is Information Communication Technology (ICT)? ICT deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information. Example: when we make a video call, we use internet. ICT is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning. Aspects/areas and applications where ICT is being utilized: - Communication, Business, Education, Home and Office, Entertainment, and Leisure - Gaming and sports, Information storage & retrieval, Process control and simulation D. Discussing new concepts ICT Trends in the Philippines  Philippines as the “ICT Hub of Asia”. Huge growth of ICT related jobs around the country, one of which is call center or BPO (Business Process Outsourcing) centers.  Time magazines declared Makati City, Philippines-Rank 1 as the “Selfiest Cities around the world and Rank 9 is Cebu City.
  • 4. Page 4 of 11 WWW(World Wide Web) It is one of the services available on the Internet that allows you to get information about anything and everything (text, image and more) from any web site anywhere in the world to your computer. It is a very huge informal network--- The first billion was reached in 2005. The second billion in 2010. The third billion in 2014. And as of 2016 3 billion where using the net. Asia is the large user of the world internet with 1.8 billion as of 2016. Web 1.0 - refers to the first stage of the World Wide Web evolution. Design essentials of a Web 1.0: - Static pages. - Content is served from the server’s filesystem. - Pages built using Server Side Includes or Common Gateway Interface (CGI). - Frames and Tables used to position and align the elements on a page. Web 2.0 - refers to worldwide website which highlight user-generated content, usability, and interoperability for end users. Web 2.0 is also called dynamic participative social web. Key features of Web 2.0: 1. Folksonomy – allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with a pound sign (#) or hashtag. 2. Rich User Interface – means that content is dynamic and is responsive to user’s input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website. 3. User Participation – means the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means of comments, reviews, and evaluation. 4. Long Tail – means that services are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used. Web 3.0 – refers the evolution of web utilization and interaction which includes altering the Web into a database. 5 main features of Web 3.0: 1. Semantic Web - improves web technologies in demand to create, share and connect content through search and analysis based on the capability to comprehend the meaning of words, rather than on keywords or numbers. 2. Artificial Intelligence – is combining with natural language processing and can distinguish information like humans in order to provide faster and more relevant results. They become more intelligent to fulfil the requirements of users. 3. 3D Graphics – refers to three-dimensional design being used widely in websites and services such as museum guides, computer games, ecommerce, geospatial contexts. 4. Connectivity – means information is more connected using semantic metadata. As a result, the user experience evolves to another level of connectivity that leverages all the available information. 5. Ubiquity – means that content is accessible by multiple applications, every device is connected to the web, the services can be used everywhere. E. Continuation of the discussion of new concepts ( DAY 2 ) Online platforms Online platforms are a specially developed platforms using Internet technology for the design and development of teaching and learning purposes.
  • 5. Assistive media platform is a unique avenue of accessibility for many individuals with cognitive, physical, and communication disabilities. Ex: Text to speak, hearing aid Collaboration platform which is software online system that adds broad social networking capabilities to work processes. Ex: Google Docs Convergence platform which is the different technological system sometimes evolves toward performing similar tasks. Ex: Smart TV Mobile media platform, which is the corresponding media technologies, particularly cloud-based technologies; increasingly important role in the everyday lives of millions of people. Ex: Netflix, Spotify Social media platform are computer-mediated technologies that facilitate the creation and sharing of information via virtual communities and networks. Types: Social networks – Ex: Facebook, Google+ Bookmarking Sites – Ex: StumbleUpon, Pinterest Social news – Ex: reddit, digg Media sharing – Ex: YouTube, Instagram, Flickr Microblogging – Ex: Twitter, Plurk Blogs& Forums – Ex: Wordpress, Blogger, Tumblr F. Developing Mastery Activity 1.1.3 TECHNOLOGICAL TIMELINE (10 minutes) Create a timeline (past to present) of at least 5 technological advances in human history, in terms of communication. Ex: Typewriter – calculator – telegraph . . . etc. G. Finding practical applications of concepts and skills in daily living Activity 1.1.4 ICT DEVICES AND APPLICATIONS (10 minutes) 1. Enumerate at least 5 information technology gadgets/devices 2. Give top 5 Applications you commonly used for communication H. Making generalizations and abstractions about the lesson Being aware of the power of ICT, can you cite instances on how ICT became very useful in your daily life? On the nature of ICT in the context of the Philippine society, kindly recall instances when/ where ICT was used for common advantage or disadvantage?
  • 6. Page 6 of 11 I. Evaluating learning TEST 1 SOCIAL MEDIA PLATFORM ( 20 minutes ) Answer the given Crossword puzzle by writing the correct example on Social Media Platform Down: 1 Blogs and forums 2 Bookmarking site 4 Media sharing 6 Media sharing 7 Media sharing Across: 3 Blogs and forums 5 Social news 7 Social networking site 8 Microblogging 9 Blogs and forums J. Additional activities for application or remediation Activity 1.1.5 ICT TRENDS (10 minutes) Instruction: In 3 – 5 sentences, share and express your own honest experiences and ideas the implications of varied online platforms in your life as a student. Guide questions: 1. Cite your personal experience/s or opinion with the various ICT tools and platforms. 2. How does it affect your way of life? 3. How do you want to promote it or even prompt others to refrain from using it? Why?
  • 7. Page 7 of 11 EMPOWERMENT TECHNOLOGY SECOND SEMESTER - QUARTER 1 – WEEK 1 continuation… Content Standard: The learners demonstrate an understanding of ICT in the context of global communication for specific professional track. Performance Standard: The learners shall be able to independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and professional tracks (Arts, Tech-Voc, Sports, Academic). Learning Competency: The learners apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks. (CS_ICT11/12-ICTPT-Ia-b-2) Objectives: At the end of the lesson the student should be able to: 1. define online safety, computer security, threats, computer ethics, and netiquettes. 2. apply how to safeguard oneself and others online. 3. evaluate the implications of ICT in your life, profession, and society. Content:(Subject Matter) Online safety, security, ethics, and etiquettes in using ICT Learning Resources: a. References: https://www.huffpost.com/entry/online-safety-what-does- i_b_6179918 https://www.britannica.com/technology/computer-security https://teachcomputerscience.com/computer-ethics/ https://www.tamiu.edu/distance/students/netiquette.shtml https://www.greenriver.edu/students/academics/e-learning/e- learning-online-netiquette/ Empowerment Technologies for Senior High School (page 8 – 9) b. Instructional Materials SIPacks copy Procedure: A. Reviewing previous lesson or presenting the new lesson ( DAY 3 ) Activity 1.2.1 MY E-LIFE (5 minutes) Describe your digital media life. Why do you think so? On your note, write three to five sentences about the status of your daily digital life. (i.e. what gadget/s do you use for what purpose(communication/entertainment), how often/long do you use it daily, what features/functionalities do you usually use?, etc.) Start with “My digital media life is like a ...” B. Establishing a purpose for the lesson In this lesson, you will learn about the different online and computer security threats, netiquettes and how to safeguard yourself and others online. Furthermore, you will learn what are the implications of ICT in your life, profession, and society.
  • 8. Page 8 of 11 C. Presenting examples/instances of the lesson Activity 1.2.2 SAFE OR UNSAFE? (5 minutes) Determine the following by writing S for SAFE and U for UNSAFE. 1. Password consists of varied letters, numbers, and symbols. 2. Immediately believing in contents posted online. 3. Accepting all friend requests. 4. Regularly tweeting ATM (at the moment) updates. 5. Think before you click. D. Discussing new concepts What is online safety? According to Wikipedia, the definition of Internet safety is as follows: Internet safety, or online safety, is the knowledge of maximizing the user's personal safety against security risks to private information and property associated with using the Internet, and the self-protection from computer crime in general. Computer security refers to the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment, namely, serial numbers, doors and locks, and alarms. Internet Threats: 1. MALWARE - stand for malicious software. a. Virus – a malicious program designed to replicate itself and transfer one computer to another either through the Internet and local networks or data storage like flash drives and CDs. b. Worm – a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm (Love Bug Worm) created by a Filipino. c. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. *Rogue Security Software – tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all. d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging. *Keyloggers – used to record the keystroke done by the user. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard. e. Adware – a program designed to send you advertisements, mostly as pop-ups. 2. SPAM – unwanted email mostly from bots or advertisements. It can be used to send malware.
  • 9. Page 9 of 11 3. PHISHING – involves getting a user to enter personal information via a fake website. Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information. *Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name System, phonebook of the Internet) . It involves modifying DNS entries, which cause users to be directed to the wrong website when they visit a certain web address. Tips to Stay Safe Online:  Be mindful of what you share online and what site you share it to.  Do not just accept terms and conditions; read it.  Check out the privacy policy page of a website to learn how the website handles the information you share.  Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile  Do not share your password with anyone.  Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode,” a feature of the browser, will not protect you from hackers.  Do not talk to strangers whether online or face-to-face.  Never post anything about a future vacation. It is similar to posting, “Rob my house at this date.”  Add friends you know in real life.  Avoid using untrusted websites.  Install and update antivirus software on your computer. Use only one anti-virus software to avoid conflicts.  If you have a Wi-Fi at home, make it private network by adding a password.  Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner. E. Continuation of the discussion of new concepts Computer ethics are a set of moral standards that govern the use of computers. It is society’s views about the use of computers, both hardware and software. Privacy concerns(hacking, malware, data protection), intellectual property rights(copyright, plagiarism, software license) and effects on the society(jobs, environmental impact, social impact) are some of the common issues of computer ethics. What Is Netiquette? A netiquette is a set of rules for behaving properly online that a netizen should observe in communicating and/or publishing information and materials over the World Wide Web and in ICT in general. Classes with an online component require the use of good netiquette. Many e-Learning courses use discussion forums. Here are four tips for good netiquette in an online discussion. Netiquette Tips Regardless of the type of communication used, you should always keep in mind the following: o be respectful o be considerate of others o think through before responding o write clearly and concisely o respond in a timely manner o use short paragraphs o spell-check your responses
  • 10. Page 10 of 11 Avoid: o CAPITAL LETTERS may be used to EMPHASIZE, but avoid typing in only capital letters as it may "sound" AS THOUGH YOU'RE SHOUTING! o rambling writing style; get to the point quickly o screens full of text F. Developing Mastery Protecting Reputations Online 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to “private.” In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report as inappropriate. G. Finding practical applications of concepts and skills in daily living Activity 1.2.3 PRIVACY POLICIES (10minutes) Visit a social networking site and look for the site’s privacy policy. The link is typically found at the bottom of the page and sometimes labeled only as “Privacy.” Write a summary on how the website handles both your private and public information. H. Making generalizations and abstractions about the lesson Being fully aware of the possible risks posed by the frequent use of ICT, one has to decide to apply necessary measures on the use of ICT for our own advantage and be a responsible and proactive user of ICT. I. Evaluating learning ( DAY 4 ) TEST 2 ONLINE SAFETY ( 20 minutes ) Instruction: ENCIRCLE the words found inside the box. WRITE a brief description for each word. Ex. SPAM - a junk mail VIRUS ETIQUETTE MALWARE TROJAN CYBERCRIME HACKER WORM SAFETY ONLINE
  • 11. Page 11 of 11 J. Additional activities for application or remediation Activity 1.2.4 SHARED OR NOT SHARED? (20minutes) Below is a questionnaire about how much information you have shared so far. Put a check ( ✔ ) under Shared or Not Shared. Most of us use the Internet everyday. Sometimes, we do not pay attention on how much information we share online. Analysis: (Write your answers on your notes) How many checks did you have for shared? In case, why did you share your full name? In case, why did you share your birthday? How many hours do you spend on the Internet per day? Can you live without the Internet for a week? How many aspects of your life depend on the Internet? Types of Information Shared Not Shared 1. First name 2. Last name 3. Middle name 4. Current and previous school (s) 5. Your cellphone number 6. The name of your parents 7. The name of your siblings 8. Your address 9. Your birthday