This document contains self-instructional packets for an Empowerment Technology course. It discusses various topics related to information and communication technology (ICT), including defining ICT and giving examples of its uses. It also covers trends in ICT in the Philippines, different online platforms and websites, and the evolution of the World Wide Web from Web 1.0 to Web 3.0. Additionally, the document addresses important issues like online safety, computer security, threats, computer ethics, and netiquette guidelines for appropriate online behavior. Students are provided with learning activities to help apply and evaluate their understanding of the concepts covered.
1. DEPARTMENT OF EDUCATION
Republic of the Philippines
Department of Education – Region III Central Luzon
DIVISION OF CITY OF SAN FERNANDO
____________
EMPOWERMENT TECHNOLOGY 12 Page 1 of 11
FIRST SEMESTER
(QUARTER 1)
SELF-INSTRUCTIONAL PACKETS
in EMPOWERMENT TECHNOLOGY
Source: https://www.deped.gov.ph
2. DEPARTMENT OF EDUCATION
Republic of the Philippines
Department of Education – Region III Central Luzon
DIVISION OF CITY OF SAN FERNANDO
Page 2 of 11
FIRST SEMESTER SIPACKS
(QUARTER 1)
EMPOWERMENT TECHNOLOGY
FIRST SEMESTER – QUARTER 1 – WEEK 1
Content Standard:
The learners demonstrate an understanding of ICT in the
context of global communication for specific professional track.
Performance Standard:
The learners shall be able to independently compose an insightful
reflection paper on the nature of ICT in the context of their lives,
society, and professional tracks (Arts, Tech-Voc, Sports,
Academic)
Learning Competency:
The learners compare and contrast the nuances of varied online
platforms, sites, and content to best achieve specific class
objectives or address situational challenges.
(CS_ICT11/12-ICTPT-Ia-b-1)
Objectives: At the end of the lesson the student should be able to:
1. define and give examples of Information and Communication Technology (ICT).
2. improves their knowledge on how ICT affects their everyday lives and the state of our
nation.
3. learn the different trends in ICT and use them to one’s own advantage.
4. understand the world wide web and other technologies.
5. compare and contrast the differences and implications of varied online platforms, sites
and content.
Content:
(Subject Matter)
ICT tools and technologies, emerging trends, online systems,
and platforms
Learning Resources:
a. References:
https://www.yondu.com/article/ph-ict-industry-trends-2019-
infographic/
https://mec.ph/infographics/ict-trends-philippines/
https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-
their-difference/
http://www.wikipedia.com
b. Instructional
Materials SIPacks copy
3. Page 3 of 11
Procedure:
A. Reviewing previous lesson or presenting the new lesson ( DAY 1 )
Activity 1.1.1 GADGET IDENTIFICATION (5 minutes)
Can you pick two of the given images, state their names and functions?
B. Establishing a purpose for the lesson
Activity 1.1.2 TRENDING UPDATES (5 minutes)
Answer honestly the following questions.
1. How many times have you checked your phone this morning?
2. What are the various means where you able to communicate a message to somebody and
even check the news update today?
3. Did you use the internet today? Why?
4. How and/or where did you usually get the information that you’re looking for?
C. Presenting examples/instances of the lesson
What is Information Communication Technology (ICT)?
ICT deals with the use of different communication technologies such as mobile phones,
telephone, Internet, etc. to locate, save, send, and edit information.
Example: when we make a video call, we use internet.
ICT is an umbrella term that includes any communication device or application,
encompassing: radio, television, cellular phones, computer and network hardware and
software, satellite systems and so on, as well as the various services and applications
associated with them, such as videoconferencing and distance learning.
Aspects/areas and applications where ICT is being utilized:
- Communication, Business, Education, Home and Office, Entertainment, and Leisure
- Gaming and sports, Information storage & retrieval, Process control and simulation
D. Discussing new concepts
ICT Trends in the Philippines
Philippines as the “ICT Hub of Asia”. Huge growth of ICT related jobs around the
country, one of which is call center or BPO (Business Process Outsourcing) centers.
Time magazines declared Makati City, Philippines-Rank 1 as the “Selfiest Cities around
the world and Rank 9 is Cebu City.
4. Page 4 of 11
WWW(World Wide Web)
It is one of the services available on the Internet that allows you to get information about
anything and everything (text, image and more) from any web site anywhere in the world
to your computer.
It is a very huge informal network--- The first billion was reached in 2005. The second
billion in 2010. The third billion in 2014. And as of 2016 3 billion where using the net.
Asia is the large user of the world internet with 1.8 billion as of 2016.
Web 1.0 - refers to the first stage of the World Wide Web evolution.
Design essentials of a Web 1.0:
- Static pages.
- Content is served from the server’s filesystem.
- Pages built using Server Side Includes or Common Gateway Interface (CGI).
- Frames and Tables used to position and align the elements on a page.
Web 2.0 - refers to worldwide website which highlight user-generated content, usability,
and interoperability for end users. Web 2.0 is also called dynamic participative social web.
Key features of Web 2.0:
1. Folksonomy – allows users to categorize and classify/arrange information using
freely chosen keywords (e.g. tagging). Popular social networking sites such as Twitter,
Instagram, Facebook, etc. use tags that start with a pound sign (#) or hashtag.
2. Rich User Interface – means that content is dynamic and is responsive to user’s
input. An example would be a website that shows local content. In the case of social
networking sites, when logged on, your account is used to modify what you see in
their website.
3. User Participation – means the owner of website is not the only one who is able to
put content. Others are able to place a content on their own by means of comments,
reviews, and evaluation.
4. Long Tail – means that services are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent on Internet or a data plan that charges you for the amount
of bandwidth you used.
Web 3.0 – refers the evolution of web utilization and interaction which includes altering the
Web into a database.
5 main features of Web 3.0:
1. Semantic Web - improves web technologies in demand to create, share and connect
content through search and analysis based on the capability to comprehend the
meaning of words, rather than on keywords or numbers.
2. Artificial Intelligence – is combining with natural language processing and can
distinguish information like humans in order to provide faster and more relevant
results. They become more intelligent to fulfil the requirements of users.
3. 3D Graphics – refers to three-dimensional design being used widely in websites and
services such as museum guides, computer games, ecommerce, geospatial contexts.
4. Connectivity – means information is more connected using semantic metadata. As
a result, the user experience evolves to another level of connectivity that leverages
all the available information.
5. Ubiquity – means that content is accessible by multiple applications, every device is
connected to the web, the services can be used everywhere.
E. Continuation of the discussion of new concepts ( DAY 2 )
Online platforms
Online platforms are a specially developed platforms using Internet technology for the design and
development of teaching and learning purposes.
5. Assistive media platform is a unique avenue of
accessibility for many individuals with cognitive,
physical, and communication disabilities.
Ex: Text to speak, hearing aid
Collaboration platform which is software online
system that adds broad social networking
capabilities to work processes.
Ex: Google Docs
Convergence platform which is the different
technological system sometimes evolves toward
performing similar tasks.
Ex: Smart TV
Mobile media platform, which is the
corresponding media technologies, particularly
cloud-based technologies; increasingly important
role in the everyday lives of millions of people.
Ex: Netflix, Spotify
Social media platform are computer-mediated
technologies that facilitate the creation and sharing
of information via virtual communities and networks.
Types:
Social networks – Ex: Facebook, Google+
Bookmarking Sites – Ex: StumbleUpon, Pinterest
Social news – Ex: reddit, digg
Media sharing – Ex: YouTube, Instagram, Flickr
Microblogging – Ex: Twitter, Plurk
Blogs& Forums – Ex: Wordpress, Blogger, Tumblr
F. Developing Mastery
Activity 1.1.3 TECHNOLOGICAL TIMELINE (10 minutes)
Create a timeline (past to present) of at least 5 technological advances in human history,
in terms of communication.
Ex: Typewriter – calculator – telegraph . . . etc.
G. Finding practical applications of concepts and skills in daily living
Activity 1.1.4 ICT DEVICES AND APPLICATIONS (10 minutes)
1. Enumerate at least 5 information technology gadgets/devices
2. Give top 5 Applications you commonly used for communication
H. Making generalizations and abstractions about the lesson
Being aware of the power of ICT, can you cite instances on how ICT became very useful
in your daily life?
On the nature of ICT in the context of the Philippine society, kindly recall instances when/
where ICT was used for common advantage or disadvantage?
6. Page 6 of 11
I. Evaluating learning
TEST 1 SOCIAL MEDIA PLATFORM ( 20 minutes )
Answer the given Crossword puzzle by writing the correct example on Social
Media Platform
Down:
1 Blogs and forums
2 Bookmarking site
4 Media sharing
6 Media sharing
7 Media sharing
Across:
3 Blogs and forums
5 Social news
7 Social networking site
8 Microblogging
9 Blogs and forums
J. Additional activities for application or remediation
Activity 1.1.5 ICT TRENDS (10 minutes)
Instruction:
In 3 – 5 sentences, share and express your own honest experiences and ideas the
implications of varied online platforms in your life as a student.
Guide questions:
1. Cite your personal experience/s or opinion with the various ICT tools and platforms.
2. How does it affect your way of life?
3. How do you want to promote it or even prompt others to refrain from using it? Why?
7. Page 7 of 11
EMPOWERMENT TECHNOLOGY
SECOND SEMESTER - QUARTER 1 – WEEK 1 continuation…
Content Standard:
The learners demonstrate an understanding of ICT in the
context of global communication for specific professional track.
Performance Standard:
The learners shall be able to independently compose an insightful
reflection paper on the nature of ICT in the context of their lives,
society, and professional tracks (Arts, Tech-Voc, Sports,
Academic).
Learning Competency:
The learners apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would relate to
their specific professional tracks. (CS_ICT11/12-ICTPT-Ia-b-2)
Objectives: At the end of the lesson the student should be able to:
1. define online safety, computer security, threats, computer ethics, and netiquettes.
2. apply how to safeguard oneself and others online.
3. evaluate the implications of ICT in your life, profession, and society.
Content:(Subject
Matter) Online safety, security, ethics, and etiquettes in using ICT
Learning Resources:
a. References:
https://www.huffpost.com/entry/online-safety-what-does-
i_b_6179918
https://www.britannica.com/technology/computer-security
https://teachcomputerscience.com/computer-ethics/
https://www.tamiu.edu/distance/students/netiquette.shtml
https://www.greenriver.edu/students/academics/e-learning/e-
learning-online-netiquette/
Empowerment Technologies for Senior High School (page 8 – 9)
b. Instructional
Materials SIPacks copy
Procedure:
A. Reviewing previous lesson or presenting the new lesson ( DAY 3 )
Activity 1.2.1 MY E-LIFE (5 minutes)
Describe your digital media life. Why do you think so?
On your note, write three to five sentences about the status of your daily digital life. (i.e. what
gadget/s do you use for what purpose(communication/entertainment), how often/long do you
use it daily, what features/functionalities do you usually use?, etc.)
Start with “My digital media life is like a ...”
B. Establishing a purpose for the lesson
In this lesson, you will learn about the different online and computer security threats,
netiquettes and how to safeguard yourself and others online. Furthermore, you will learn
what are the implications of ICT in your life, profession, and society.
8. Page 8 of 11
C. Presenting examples/instances of the lesson
Activity 1.2.2 SAFE OR UNSAFE? (5 minutes)
Determine the following by writing S for SAFE and U for UNSAFE.
1. Password consists of varied letters, numbers, and symbols.
2. Immediately believing in contents posted online.
3. Accepting all friend requests.
4. Regularly tweeting ATM (at the moment) updates.
5. Think before you click.
D. Discussing new concepts
What is online safety?
According to Wikipedia, the definition of Internet safety is as
follows:
Internet safety, or online safety, is the knowledge of maximizing the user's personal
safety against security risks to private information and property associated with using the
Internet, and the self-protection from computer crime in general.
Computer security refers to the protection of computer systems and information from
harm, theft, and unauthorized use. Computer hardware is typically protected by the same
means used to protect other valuable or sensitive equipment, namely, serial numbers,
doors and locks, and alarms.
Internet Threats:
1. MALWARE - stand for malicious software.
a. Virus – a malicious program designed to replicate itself and transfer one computer
to another either through the Internet and local networks or data storage like flash
drives and CDs.
b. Worm – a malicious program that transfers from one computer to another by any
type of means. Often, it uses a computer network to spread itself. For example, the
ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get
your information.
*Rogue Security Software – tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality, they
are not protected at all.
d. Spyware – a program that runs in the background without you knowing it (thus
called “spy”). It has the ability to monitor what you are currently doing and typing
through keylogging.
*Keyloggers – used to record the keystroke done by the user. This is done to
steal their password or any other sensitive information. It can record email,
messages, or any information you type using your keyboard.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
2. SPAM – unwanted email mostly from bots or advertisements. It can be used to send
malware.
9. Page 9 of 11
3. PHISHING – involves getting a user to enter personal information via a fake website.
Its goal is to acquire sensitive personal information like passwords and credit card
details. This is done by sending you an email that will direct the user to visit a website
and be asked to update his/her username, password, credit card, or personal
information.
*Pharming – a more complicated way of phishing where it exploits the DNS
(Domain Name System, phonebook of the Internet) . It involves
modifying DNS entries, which cause users to be directed to the
wrong website when they visit a certain web address.
Tips to Stay Safe Online:
Be mindful of what you share online and what site you share it to.
Do not just accept terms and conditions; read it.
Check out the privacy policy page of a website to learn how the website handles
the information you share.
Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile
Do not share your password with anyone.
Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode,”
a feature of the browser, will not protect you from hackers.
Do not talk to strangers whether online or face-to-face.
Never post anything about a future vacation. It is similar to posting, “Rob my house
at this date.”
Add friends you know in real life.
Avoid using untrusted websites.
Install and update antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
If you have a Wi-Fi at home, make it private network by adding a password.
Avoid downloading anything from untrusted websites. You are most vulnerable in
peer-to-peer downloads (torrents) as the download is most likely not monitored by
the site owner.
E. Continuation of the discussion of new concepts
Computer ethics are a set of moral standards that govern the use of computers. It is
society’s views about the use of computers, both hardware and software. Privacy
concerns(hacking, malware, data protection), intellectual property rights(copyright,
plagiarism, software license) and effects on the society(jobs, environmental impact, social
impact) are some of the common issues of computer ethics.
What Is Netiquette?
A netiquette is a set of rules for behaving properly online that a netizen should observe in
communicating and/or publishing information and materials over the World Wide Web and
in ICT in general. Classes with an online component require the use of good netiquette.
Many e-Learning courses use discussion forums. Here are four tips for good netiquette in
an online discussion.
Netiquette Tips
Regardless of the type of communication used, you should always keep in mind the
following:
o be respectful
o be considerate of others
o think through before responding
o write clearly and concisely
o respond in a timely manner
o use short paragraphs
o spell-check your responses
10. Page 10 of 11
Avoid:
o CAPITAL LETTERS may be used to EMPHASIZE, but avoid typing in only capital
letters as it may "sound" AS THOUGH YOU'RE SHOUTING!
o rambling writing style; get to the point quickly
o screens full of text
F. Developing Mastery
Protecting Reputations Online
1. Before you post something on the web, ask these questions to yourself: Would you
want your parents or grandparents to see it? Would you want your future boss to see
it? Once you post something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report as inappropriate.
G. Finding practical applications of concepts and skills in daily living
Activity 1.2.3 PRIVACY POLICIES (10minutes)
Visit a social networking site and look for the site’s privacy policy. The link is typically
found at the bottom of the page and sometimes labeled only as “Privacy.” Write a summary
on how the website handles both your private and public information.
H. Making generalizations and abstractions about the lesson
Being fully aware of the possible risks posed by the frequent use of ICT, one has to decide
to apply necessary measures on the use of ICT for our own advantage and be a responsible
and proactive user of ICT.
I. Evaluating learning ( DAY 4 )
TEST 2 ONLINE SAFETY ( 20 minutes )
Instruction: ENCIRCLE the words found inside the box. WRITE a brief description for
each word.
Ex. SPAM - a junk mail
VIRUS ETIQUETTE MALWARE
TROJAN CYBERCRIME HACKER
WORM SAFETY ONLINE
11. Page 11 of 11
J. Additional activities for application or remediation
Activity 1.2.4 SHARED OR NOT SHARED? (20minutes)
Below is a questionnaire about how much information you have shared so far. Put a
check ( ✔ ) under Shared or Not Shared.
Most of us use the Internet everyday. Sometimes, we do not pay attention on how much
information we share online.
Analysis: (Write your answers on your notes)
How many checks did you have for shared?
In case, why did you share your full name?
In case, why did you share your birthday?
How many hours do you spend on the Internet per day?
Can you live without the Internet for a week?
How many aspects of your life depend on the Internet?
Types of Information Shared Not Shared
1. First name
2. Last name
3. Middle name
4. Current and previous school (s)
5. Your cellphone number
6. The name of your parents
7. The name of your siblings
8. Your address
9. Your birthday