Here are some key points about online safety habits based on the self-check activity:
- Talking to strangers online can put your personal information and safety at risk. It's best to only interact with people you know personally.
- Sharing passwords allows others access to your accounts which can enable cybercrimes like identity theft. Keep passwords private.
- Posting about future vacations alerts potential burglars when your home will be empty. It's safer to share travel plans after returning.
- Unsecured websites may download malware or steal personal data. Only visit reputable sites using HTTPS encryption.
- Ranting online can have real-life consequences like damaging your reputation or career. Consider thoughts carefully before
Here are the definitions of key terms in Media and Information Literacy:
Media Literacy - The ability to access, analyze, evaluate and produce communication in a variety of forms. It empowers people to be critical thinkers and makers, effective communicators and active citizens.
Information Literacy - The set of skills needed to find, retrieve, analyze and use information. It involves recognizing when information is needed and having the ability to locate, evaluate, and use effectively the needed information.
Technology Literacy - The ability of an individual, either working independently or with others, to responsibly, appropriately, and effectively use technological tools.
Media - Various channels of communication between a person or persons and their intended audience. It
signed off_EmpowermentG11Tech_q2_ Mod7_managemaintainonline_v3.pdfwithmysense
The document provides information about managing, maintaining, and sustaining an online ICT project for social change. It discusses Republic Act 8293, which states that no copyright exists for works of the Philippine government, but prior approval is needed to use such works for profit. It also notes that borrowed materials in the book are owned by their respective copyright holders. The document was produced by the Department of Education Region X and provides tables of contents and instructions for readers.
Here are the key points about uses of multimedia in different fields:
- Education - Multimedia encourages interaction and active learning. It helps explain complex topics easily. Students can learn at their own pace.
- Entertainment - Multimedia is widely used in movies, music, video games, etc. It engages and entertains the audience.
- Business - Companies use multimedia for presentations, demos, training. It helps promote their products/services effectively.
- Advertising - Ads use multimedia like videos, animations to grab attention and convey messages persuasively.
- Medicine - Used for medical education, simulations, remote diagnosis and treatment. 3D/VR helps understand body parts.
- Engineering
This document discusses online collaborative tools that can be used for communication and collaboration. It defines key terms like web portal and online collaboration. It then provides examples of several popular online collaborative tools like Facebook, G Suite, Microsoft Teams, Dropbox, Lark, Trello, WordPress and Yammer. It explains their features and functions. Finally, it outlines some advantages of using online collaborative tools like having a centralized hub for files, enabling file sharing and hosting online meetings, and allowing for live chat.
signed off_Empowerment TechG11._q2_ Mod5_collaborativeictdev_v3.pdfwithmysense
Here are the steps to evaluate your classmate's website using the rubric:
1. Review your classmate's entire website carefully.
2. Use the rubric criteria (Content, Target Purpose, Crediting Sources, Development of Ideas) to evaluate different aspects of the website.
3. For each criteria, determine which description level (Keep Working, Getting There, Got It) best matches the quality of your classmate's website.
4. Provide specific feedback on strengths and areas for improvement. For example, for "Content":
- The information is accurate but could be more comprehensive with additional research.
5. Repeat this process for each criteria.
6. You may also want to
Empowerment Technologies, ET, Live C. Angga, Malungon NHS, Empowerment Technology, Senior High School, SHS, Department of Education, SHS, ET Student LM, Learning Materials for ET students
Here are some questions to consider when reflecting on online safety, security, ethics and etiquette:
- How much time do you spend using digital media each day? What do you use it for - communication, entertainment, schoolwork, etc.?
- What information do you share online? Photos, personal details, location? How publicly available is this information?
- Do you think about who might see what you post and how they could interpret it? Could anything you post now affect your future?
- Have you ever encountered inappropriate, bullying or unsafe behavior online? How did you respond in a safe and ethical way?
- Do you know how to strengthen passwords and update security/privacy settings on your devices and
Here are the answers to the true/false questions in the "What I Know" section:
1. True
2. True
3. True
4. True
5. True
6. False (the correct shortcut is msconfig)
7. True
8. True
9. True
10. True
11. False (the correct way to open System Configuration is to click Start > Run and type msconfig)
Here are the definitions of key terms in Media and Information Literacy:
Media Literacy - The ability to access, analyze, evaluate and produce communication in a variety of forms. It empowers people to be critical thinkers and makers, effective communicators and active citizens.
Information Literacy - The set of skills needed to find, retrieve, analyze and use information. It involves recognizing when information is needed and having the ability to locate, evaluate, and use effectively the needed information.
Technology Literacy - The ability of an individual, either working independently or with others, to responsibly, appropriately, and effectively use technological tools.
Media - Various channels of communication between a person or persons and their intended audience. It
signed off_EmpowermentG11Tech_q2_ Mod7_managemaintainonline_v3.pdfwithmysense
The document provides information about managing, maintaining, and sustaining an online ICT project for social change. It discusses Republic Act 8293, which states that no copyright exists for works of the Philippine government, but prior approval is needed to use such works for profit. It also notes that borrowed materials in the book are owned by their respective copyright holders. The document was produced by the Department of Education Region X and provides tables of contents and instructions for readers.
Here are the key points about uses of multimedia in different fields:
- Education - Multimedia encourages interaction and active learning. It helps explain complex topics easily. Students can learn at their own pace.
- Entertainment - Multimedia is widely used in movies, music, video games, etc. It engages and entertains the audience.
- Business - Companies use multimedia for presentations, demos, training. It helps promote their products/services effectively.
- Advertising - Ads use multimedia like videos, animations to grab attention and convey messages persuasively.
- Medicine - Used for medical education, simulations, remote diagnosis and treatment. 3D/VR helps understand body parts.
- Engineering
This document discusses online collaborative tools that can be used for communication and collaboration. It defines key terms like web portal and online collaboration. It then provides examples of several popular online collaborative tools like Facebook, G Suite, Microsoft Teams, Dropbox, Lark, Trello, WordPress and Yammer. It explains their features and functions. Finally, it outlines some advantages of using online collaborative tools like having a centralized hub for files, enabling file sharing and hosting online meetings, and allowing for live chat.
signed off_Empowerment TechG11._q2_ Mod5_collaborativeictdev_v3.pdfwithmysense
Here are the steps to evaluate your classmate's website using the rubric:
1. Review your classmate's entire website carefully.
2. Use the rubric criteria (Content, Target Purpose, Crediting Sources, Development of Ideas) to evaluate different aspects of the website.
3. For each criteria, determine which description level (Keep Working, Getting There, Got It) best matches the quality of your classmate's website.
4. Provide specific feedback on strengths and areas for improvement. For example, for "Content":
- The information is accurate but could be more comprehensive with additional research.
5. Repeat this process for each criteria.
6. You may also want to
Empowerment Technologies, ET, Live C. Angga, Malungon NHS, Empowerment Technology, Senior High School, SHS, Department of Education, SHS, ET Student LM, Learning Materials for ET students
Here are some questions to consider when reflecting on online safety, security, ethics and etiquette:
- How much time do you spend using digital media each day? What do you use it for - communication, entertainment, schoolwork, etc.?
- What information do you share online? Photos, personal details, location? How publicly available is this information?
- Do you think about who might see what you post and how they could interpret it? Could anything you post now affect your future?
- Have you ever encountered inappropriate, bullying or unsafe behavior online? How did you respond in a safe and ethical way?
- Do you know how to strengthen passwords and update security/privacy settings on your devices and
Here are the answers to the true/false questions in the "What I Know" section:
1. True
2. True
3. True
4. True
5. True
6. False (the correct shortcut is msconfig)
7. True
8. True
9. True
10. True
11. False (the correct way to open System Configuration is to click Start > Run and type msconfig)
This document provides information about a self-learning module on responsible use of media and information for Grade 11/12 students. It discusses two learning outcomes: 1) discussing responsible use of media and information, and 2) explaining actions to promote ethical use of media and information. The module is intended to help students understand proper online conduct, the importance of netiquette and digital citizenship, and discuss digital issues in the Philippines related to online behavior. It provides definitions for key terms and an introduction to the module's content and structure to meet curriculum standards.
Here is a mind map I created showing the influence of media and information in communication:
[MIND MAP]
The center of the mind map shows "Communication" with branches extending out showing how media and information influence communication in various ways:
- Speed - Media allows for fast communication through social media, texting, video calls etc.
- Access to information - People can easily access a wide range of information online through search engines, news sites, social media.
- Connectedness - Social media allows people to stay connected with friends and family locally and globally.
- Entertainment - People use media like YouTube, Netflix for entertainment and leisure.
- News/Current events - Media is how most
Admshs emp tech_q1_m1_l2_software application and platformsDexter Dizon
The document discusses various online platforms and software applications. It defines web search engines as software designed to search the World Wide Web and present search results. It also discusses communication service providers, payment systems, and advertising platforms. It provides examples of social media like Facebook and Twitter and explains how they differ from social networking. The module aims to help students understand and compare different online platforms, their uses, and advantages in connecting people.
MEDIA-INFORMATION-LITERACY11_12-Q1-M1-W5.pdfDELA GENTE CIV
This document discusses different sources of media and information. It begins by outlining Republic Act 8293 which states that no copyright exists for works produced by the Philippine government, but prior approval is still needed to use them for profit. It then notes that borrowed materials like songs and photos belong to their respective copyright holders. The document provides an overview of different types of information sources like libraries, indigenous knowledge, books, newspapers, magazines, academic journals, and the internet. It also presents criteria for evaluating information, focusing on accuracy, relevance, currentness, authority, and fairness.
1. The document discusses key concepts related to media and information literacy such as media, information, media literacy, information literacy, and technology literacy.
2. It provides learning tasks that involve reflecting on personal media use, imagining a world without technology, analyzing news items, creating a Venn diagram comparing literacies, and designing a media framework as a journalist.
3. The goals are to help learners understand how communication is influenced by media, identify similarities and differences between types of literacy, and discuss responsible use of media and information.
The document provides information about ICT in the Philippines:
1) It discusses the history of telecommunications in the Philippines from 1928 when the first telephone services were established to 1994 when the country's first internet connection was made.
2) It outlines the current state of ICT, noting the massive growth of mobile networks and internet usage in recent years.
3) Examples are given of how ICT is helping address challenges from the COVID-19 pandemic, such as telemedicine, online education, and government information collection.
Empowerment Tech-Mod2_Multimedia and Interactivity.pdfChris selebio
This document provides an introduction to a self-learning module on multimedia and interactivity. It discusses expectations for what students will learn, including summarizing multimedia concepts and recognizing multimedia elements on websites. It also reviews concepts from previous lessons, such as rich content and user participation. The lesson defines multimedia and its basic elements like text, graphics, animation, video and audio. It describes linear and non-linear multimedia and gives examples. Students are provided activities to identify multimedia on websites and improve website designs. The module aims to teach students how to promote advocacy using multimedia.
Here are the answers to the assessment:
1. Event Viewer - Tools
2. Safe Boot - Boot
3. List of services that start when computer boots - Services
4. Make all boot settings permanent - Boot
ICT refers to communication hardware, software, and platforms that allow access, storage, transmission, and manipulation of information. Current trends in ICT include convergent technologies where devices combine functions, social media platforms for online communication, and mobile technologies emphasizing portable devices. The internet involves computer networks and infrastructure, while the web refers to protocols and services that enable accessing information online. Web versions progressed from static Web 1.0 to user-generated Web 2.0 to the envisioned interactive Web 3.0.
ICT refers to communication hardware, software, and platforms that allow access, storage, transmission, and manipulation of information. Current trends in ICT include convergent technologies where devices combine functions, social media platforms for online communication, and mobile technologies featuring miniaturized portable devices. The internet involves computer networks and infrastructure, while the web is a system enabling information access over the internet using protocols like HTTP. The web has evolved from static read-only Web 1.0 to interactive user-generated Web 2.0 and aims to be more personalized and responsive in the developing concept of Web 3.0.
ICT refers to communication hardware, software, and platforms that allow access, storage, transmission, and manipulation of information. Current trends in ICT include convergent technologies where devices combine functions, social media platforms for online communication, and mobile technologies emphasizing portable devices. The internet involves computer networks and infrastructure, while the web refers to protocols and services enabling information access online, represented through successive versions like read-only Web 1.0, read-write interactive Web 2.0, and proposed executable Web 3.0.
Empowerment Technology: ICT and its Current StateLeeJabar
This document provides an introduction to a lesson on information and communication technology (ICT) and its current state. It will define ICT, discuss the difference between the web and internet, outline technological milestones like Web 1.0, 2.0 and 3.0, and how they have impacted information sharing and transmission. The lesson aims to give learners a fundamental understanding of ICT as they will increasingly encounter new technological challenges requiring adaptation.
This module introduces students to basic concepts of media and information literacy through four lessons. It will help students understand how communication is influenced by media and information. The lessons cover an introduction to media literacy, the relationship between media/society/culture, a brief history of media, and communication models and theories.
The document provides an introduction to media and information literacy, outlining key concepts and terms. It discusses how technology has changed communication and how people can now access information easily from all over the world. The lessons in the module are designed to help students understand media literacy and its importance in developing critical thinking skills.
Here are some key ways a person can engage with media and information channels in a meaningful manner:
- Be an active consumer rather than a passive one. Think critically about the information you receive rather than just accepting it at face value. Evaluate sources and consider different perspectives.
- Interact with media for both entertainment and information. Seek out media that both informs and helps you learn new things in addition to just being entertained.
- Get news and information from a variety of credible sources rather than just one to avoid bias and get a more well-rounded perspective. Cross-check facts when possible.
- Contribute back to the conversation by commenting thoughtfully on stories, sharing credible information with others, and engaging in
This document provides information about a self-learning module on contextualized online search and research skills for Grade 11/12 students. It includes details about the module such as the writers and editors involved in developing it, as well as copyright information. The module is intended to help students learn to use precise keywords to improve online searches and evaluate the credibility of websites. It provides learning activities and assessments to help students master these skills.
This document provides an introduction to media and information literacy. It discusses the key components of communication including the source, message, channel, receiver, feedback, environment, context, and interference. Several models of communication are presented, including Lasswell's, Shannon and Weaver's, and Berlo's models. The different forms of communication - intrapersonal, interpersonal, group, public, and mass communication - are defined. The role of media and information in the communication process is also explained. Media is defined as the physical objects used to transmit information to large audiences through channels like television, radio, newspapers, and the internet.
The document discusses a mathematics textbook for Grade 10 that was collaboratively developed by educators from various educational institutions in the Philippines. It provides instructions for teachers and other stakeholders to provide feedback and recommendations to the Department of Education. The document also outlines the copyright details and permissions regarding the content in the textbook.
My portfolio is a purposely collection of my work that exhibits my efforts, progress, and achievements in educational technology. This portfolio includes a summary of lessons about edtech that surely help students, especially the future educator. As a future a educator, edtech will surely help me on how I am going to facilitate learning of my future students with the help of appropriate technology.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
More Related Content
Similar to signed off_EmpowermentG11 Tech_q1 _Mod1_Empwerment _.pdf
This document provides information about a self-learning module on responsible use of media and information for Grade 11/12 students. It discusses two learning outcomes: 1) discussing responsible use of media and information, and 2) explaining actions to promote ethical use of media and information. The module is intended to help students understand proper online conduct, the importance of netiquette and digital citizenship, and discuss digital issues in the Philippines related to online behavior. It provides definitions for key terms and an introduction to the module's content and structure to meet curriculum standards.
Here is a mind map I created showing the influence of media and information in communication:
[MIND MAP]
The center of the mind map shows "Communication" with branches extending out showing how media and information influence communication in various ways:
- Speed - Media allows for fast communication through social media, texting, video calls etc.
- Access to information - People can easily access a wide range of information online through search engines, news sites, social media.
- Connectedness - Social media allows people to stay connected with friends and family locally and globally.
- Entertainment - People use media like YouTube, Netflix for entertainment and leisure.
- News/Current events - Media is how most
Admshs emp tech_q1_m1_l2_software application and platformsDexter Dizon
The document discusses various online platforms and software applications. It defines web search engines as software designed to search the World Wide Web and present search results. It also discusses communication service providers, payment systems, and advertising platforms. It provides examples of social media like Facebook and Twitter and explains how they differ from social networking. The module aims to help students understand and compare different online platforms, their uses, and advantages in connecting people.
MEDIA-INFORMATION-LITERACY11_12-Q1-M1-W5.pdfDELA GENTE CIV
This document discusses different sources of media and information. It begins by outlining Republic Act 8293 which states that no copyright exists for works produced by the Philippine government, but prior approval is still needed to use them for profit. It then notes that borrowed materials like songs and photos belong to their respective copyright holders. The document provides an overview of different types of information sources like libraries, indigenous knowledge, books, newspapers, magazines, academic journals, and the internet. It also presents criteria for evaluating information, focusing on accuracy, relevance, currentness, authority, and fairness.
1. The document discusses key concepts related to media and information literacy such as media, information, media literacy, information literacy, and technology literacy.
2. It provides learning tasks that involve reflecting on personal media use, imagining a world without technology, analyzing news items, creating a Venn diagram comparing literacies, and designing a media framework as a journalist.
3. The goals are to help learners understand how communication is influenced by media, identify similarities and differences between types of literacy, and discuss responsible use of media and information.
The document provides information about ICT in the Philippines:
1) It discusses the history of telecommunications in the Philippines from 1928 when the first telephone services were established to 1994 when the country's first internet connection was made.
2) It outlines the current state of ICT, noting the massive growth of mobile networks and internet usage in recent years.
3) Examples are given of how ICT is helping address challenges from the COVID-19 pandemic, such as telemedicine, online education, and government information collection.
Empowerment Tech-Mod2_Multimedia and Interactivity.pdfChris selebio
This document provides an introduction to a self-learning module on multimedia and interactivity. It discusses expectations for what students will learn, including summarizing multimedia concepts and recognizing multimedia elements on websites. It also reviews concepts from previous lessons, such as rich content and user participation. The lesson defines multimedia and its basic elements like text, graphics, animation, video and audio. It describes linear and non-linear multimedia and gives examples. Students are provided activities to identify multimedia on websites and improve website designs. The module aims to teach students how to promote advocacy using multimedia.
Here are the answers to the assessment:
1. Event Viewer - Tools
2. Safe Boot - Boot
3. List of services that start when computer boots - Services
4. Make all boot settings permanent - Boot
ICT refers to communication hardware, software, and platforms that allow access, storage, transmission, and manipulation of information. Current trends in ICT include convergent technologies where devices combine functions, social media platforms for online communication, and mobile technologies emphasizing portable devices. The internet involves computer networks and infrastructure, while the web refers to protocols and services that enable accessing information online. Web versions progressed from static Web 1.0 to user-generated Web 2.0 to the envisioned interactive Web 3.0.
ICT refers to communication hardware, software, and platforms that allow access, storage, transmission, and manipulation of information. Current trends in ICT include convergent technologies where devices combine functions, social media platforms for online communication, and mobile technologies featuring miniaturized portable devices. The internet involves computer networks and infrastructure, while the web is a system enabling information access over the internet using protocols like HTTP. The web has evolved from static read-only Web 1.0 to interactive user-generated Web 2.0 and aims to be more personalized and responsive in the developing concept of Web 3.0.
ICT refers to communication hardware, software, and platforms that allow access, storage, transmission, and manipulation of information. Current trends in ICT include convergent technologies where devices combine functions, social media platforms for online communication, and mobile technologies emphasizing portable devices. The internet involves computer networks and infrastructure, while the web refers to protocols and services enabling information access online, represented through successive versions like read-only Web 1.0, read-write interactive Web 2.0, and proposed executable Web 3.0.
Empowerment Technology: ICT and its Current StateLeeJabar
This document provides an introduction to a lesson on information and communication technology (ICT) and its current state. It will define ICT, discuss the difference between the web and internet, outline technological milestones like Web 1.0, 2.0 and 3.0, and how they have impacted information sharing and transmission. The lesson aims to give learners a fundamental understanding of ICT as they will increasingly encounter new technological challenges requiring adaptation.
This module introduces students to basic concepts of media and information literacy through four lessons. It will help students understand how communication is influenced by media and information. The lessons cover an introduction to media literacy, the relationship between media/society/culture, a brief history of media, and communication models and theories.
The document provides an introduction to media and information literacy, outlining key concepts and terms. It discusses how technology has changed communication and how people can now access information easily from all over the world. The lessons in the module are designed to help students understand media literacy and its importance in developing critical thinking skills.
Here are some key ways a person can engage with media and information channels in a meaningful manner:
- Be an active consumer rather than a passive one. Think critically about the information you receive rather than just accepting it at face value. Evaluate sources and consider different perspectives.
- Interact with media for both entertainment and information. Seek out media that both informs and helps you learn new things in addition to just being entertained.
- Get news and information from a variety of credible sources rather than just one to avoid bias and get a more well-rounded perspective. Cross-check facts when possible.
- Contribute back to the conversation by commenting thoughtfully on stories, sharing credible information with others, and engaging in
This document provides information about a self-learning module on contextualized online search and research skills for Grade 11/12 students. It includes details about the module such as the writers and editors involved in developing it, as well as copyright information. The module is intended to help students learn to use precise keywords to improve online searches and evaluate the credibility of websites. It provides learning activities and assessments to help students master these skills.
This document provides an introduction to media and information literacy. It discusses the key components of communication including the source, message, channel, receiver, feedback, environment, context, and interference. Several models of communication are presented, including Lasswell's, Shannon and Weaver's, and Berlo's models. The different forms of communication - intrapersonal, interpersonal, group, public, and mass communication - are defined. The role of media and information in the communication process is also explained. Media is defined as the physical objects used to transmit information to large audiences through channels like television, radio, newspapers, and the internet.
The document discusses a mathematics textbook for Grade 10 that was collaboratively developed by educators from various educational institutions in the Philippines. It provides instructions for teachers and other stakeholders to provide feedback and recommendations to the Department of Education. The document also outlines the copyright details and permissions regarding the content in the textbook.
My portfolio is a purposely collection of my work that exhibits my efforts, progress, and achievements in educational technology. This portfolio includes a summary of lessons about edtech that surely help students, especially the future educator. As a future a educator, edtech will surely help me on how I am going to facilitate learning of my future students with the help of appropriate technology.
Similar to signed off_EmpowermentG11 Tech_q1 _Mod1_Empwerment _.pdf (20)
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
signed off_EmpowermentG11 Tech_q1 _Mod1_Empwerment _.pdf
1.
2. Empowerment Technologies - Senior High School
Alternative Delivery Mode
Quarter 1 - Module 1: Information and Communication Technologies
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalty.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials
from their respective copyright owners. The publisher and authors do not represent
nor claim ownership over them.
Published by the Department of Education – Region X – Northern Mindanao
Regional Director: Dr. Arturo B. Bayocot, CESO V
Printed in the Philippines by
Department of Education - Alternative Delivery Mode (DepEd-ADM)
Office Address: Masterson Avenue, Upper Balulang, Zone 1, Cagayan de Oro
City, Cagayan de Oro, Lalawigan ng Misamis Oriental
Telefax: ________________________________________________
E-mail Address: ________________________________________________
Development team of the module
Author: Newlove N. Econg
Editors:
Reviewers: Jay Michael A. Calipusan
Myra Rachelle G. Calipusan
Eric John N. Brandino
Illustrator: Jay Michael A. Calipusan
Layout Artist:
Newlove N. Econg
Management Team:
Himaya B. Sinatao
Development Team of the Module:
Author: Newlove N. Econg
Reviewers: Jay Michael A. Calipusan
Myra Rachelle G. Calipusan
Eric John N. Brandino
Illustrator: Jay Michael A. Calipusan
Layout Artist: Newlove N. Econg
Management Team:
Chairperson: Dr. Arturo B. Bayocot, CESO III
Regional Director
Co-Chairpersons: Dr. Victor G. De Gracia Jr., CESO V
Asst. Regional Director
Mala Epra B. Magnaong
CES, CLMD
Members: Dr. Bienvenido U. Tagolimot, Jr.
Regional ADM Coordinator
Elson C. Jamero
EPS-Designate-TLE
Printed in the Philippines by: Department of Education – Regional Office 10
Office Address: Zone 1, Upper Balulang Cagayan de Oro City 9000
Telefax: (088) 880-7071, (088) 880-7072
E-mail Address: region10@deped.gov.ph
3. Senior High School
Empowerment
Technologies
Quarter 1 - Module 1:
Information and Communication
Technologies
This instructional material was collaboratively developed and reviewed by
educators from public and private schools, colleges, and or/universities. We
encourage teachers and other education stakeholders to email their feedback,
comments, and recommendations to the Department of Education at action@
deped.gov.ph.
We value your feedback and recommendations.
Department of Education ● Republic of the Philippines
4. Table of Contents
What This Module is About.........................................................................................i
What I Need to Know..................................................................................................i
How to Learn from this Module...................................................................................i
Icons of this Module....................................................................................................ii
What I Know ..............................................................................................................iii
Lesson 1:
The Current State of ICT Technologies………….........................1
What I Need to Know ......................................................................................1
What’s New: World Wide Web ........................................................................1
What Is It: Visiting Websites Part 1..................................................................2
What’s More: Visiting Websites Part 2 ............................................................3
What’s New: Social Media ..............................................................................3
What Is It: Trends in ICT .................................................................................3
What I Have Learned: Generalization .............................................................7
What I Can Do: ...............................................................................................7
Lesson 2:
Online Safety, Security, Ethics and Etiquette ............................8
What’s In .........................................................................................................8
What I Need to Know ......................................................................................8
What’s New: Self-Check on Online Habits ...................................................8
What Is It: …………………………………………………...................................9
What’s New: #Wall ........................................................................................11
What Is It: Netiquette .....................................................................................11
What I Have Learned: Generalization............................................................12
What I Can Do: Shout Your Mind ..................................................................13
Lesson 3:
Contextualized Online Search and Research Skills .................14
What’s In .......................................................................................................14
What I Need to Know ....................................................................................14
What I Have Learned: Generalization ….......................................................16
What I Can Do: Facts and Opinion Chart …..................................................17
Summary ..................................................................................................................17
Assessment: (Post-Test) ..........................................................................................17
Key to Answers ........................................................................................................19
References ...............................................................................................................21
5. i
What This Module is About
Through the power of ICT technologies like computer networks and gadgets
made the world connected in the cyber world. Though we can use these features
effortlessly, every one of us needs to be technology enabled and be aware of the
digital community.
On this module, the learner will learn how the World Wide Web evolves from a
flat website to responsive website. Though this evolution will surely help the learners
to be a part of digital world however the learner needs to learn that their every action
online they will be accountable for it.
What I Need to Know
At the end of this module, you should be able to:
1. Compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational
challenges (CS_ICT11/12ICTPT-Ia-b-1);
2. Apply online safety, security, ethics, and etiquette standards and practice in the
use of ICTs as it would relate to their specific professional tracks
(CS_ICT11/12ICTPT-Ia-b-2);
3. Use the Internet as a tool for credible research and information gathering to
best achieve specific class objectives or address situational challenges
(CS_ICT11/12ICTPT-Ia-b-3).
How to Learn from this Module
To achieve the objectives cited above, you are to do the following:
1. Carefully read all the lessons.
2. Take your time on going thru each lesson.
3. Answer the pretest honestly, the purpose of the pretest is for you to determine
your prior knowledge before going thru the lessons and activities.
4. If you have a hard time understanding the lessons and activities, please do take
a break. Having breaks between lessons and activities will give you some space
where you can absorb the lesson well.
5. You can use the internet if you need more information about the lesson.
6. ii
Icons of this Module
What I Need to
Know
This part contains learning objectives that
are set for you to learn as you go along
the module.
What I know This is an assessment as to your level of
knowledge to the subject matter at hand,
meant specifically to gauge prior related
knowledge
What’s In This part connects previous lesson with
that of the current one.
What’s New An introduction of the new lesson through
various activities, before it will be
presented to you
What is It These are discussions of the activities as
a way to deepen your discovery and
understanding of the concept.
What’s More These are follow-up activities that are
intended for you to practice further in
order to master the competencies.
What I Have
Learned
Activities designed to process what you
have learned from the lesson
What I can do These are tasks that are designed to
showcase your skills and knowledge
gained, and applied into real-life
concerns and situations.
7. iii
What I Know
Multiple
I. Multiple Choice:
Directions: Read and answer the questions below. Select the letter of the best
answer from among the given choices.
1. A web application where a user can communicate, create and share
content, and participate in online communities?
A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media
2. What is the markup language for designing and developing websites?
A. DNS C. HTTP
B. URL D. HTML
3. What version of the world wide web that allows interactivity between the
users and the website?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
4. A website that allows you to broadcast short message.
A. Social News C. Microblogging
B. Bookmarking Sites D. Media Sharing
5. A platform that assist person with disability.
A. Assistive Media C. Convergence
B. Social Media D. Semantic Web
II. True or False
Directions: Write “True” if the statement is true and write “False” if the statement
is false.
1. We are allowed to copy the works of other people without asking
permission.
2. All Information from the internet are free.
3. Search engine is an application used for searching the web.
4. All information from the internet are reliable.
5. Google is an example of search engine.
6. Child pornography is a form of cybercrime.
7. Committing crime on the internet is not punishable by law
8. Do not open suspicious email.
9. Share your password with anyone.
10. Think before you click.
8. 1
Lesson
The Current State of ICT
Technologies
What I Need to Know
Information and Communication Technology
It refers to the use of communication technology such as laptop, smart phones,
tablet, telephone, internet and etc. to send, save, and edit information.
ICT in the Philippines
The use of communication technology spread in the entire country now a day
even in rural areas. According to Rappler blog site there are 119 million mobile phone
subscriptions from a total population of 101 million and 47 million active Facebook
accounts. The Philippines is the fastest growing app market in Southeast Asia and the
highest digital population in the world. The top online activities are social media,
videos, online mobile games, location-based search and online shopping. Staying
connected with loved ones, friends, and relatives is a fundamental need for Filipinos.
What’s New
Activity 1: Visiting Websites Part 1
Directions: List down three (3) websites that you have browsed.
No. Website
1.
2.
3.
Lesson
1
9. 2
What Is It
Activity 1 shows the different websites in World Wide Web. The behavior and
characteristics of a website depends on what version of the development of WWW it
was created.
World Wide Web
It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of
different pages that are formatted in a markup language called HTML (Hypertext
Markup Language) and linked to each other that contain text, graphics, multimedia
files, hyperlinks and etc.
Web 1.0
The first development of World Wide Web where web pages are static. It also
known as flat or stationary page and it cannot be manipulated by users.
Web 2.0
It is a dynamic web page where user can interact with page like creating a user
account, posting comments, uploading files and images, and others.
Example: Blog sites, Facebook, Twitter, Instagram, YouTube
Features of Web 2.0
1. Folksonomy – users can classify and arrange information by adding tag or
label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social
networking sites.
Example in tagging on Facebook: #TeamKawayan, #Single
2. Rich User Experience – user can have high interaction with the content of the
page and can achieve level of expertise.
3. User Participation – user can put content on their own in web page like
comment, evaluation, and etc.
4. Long Tail – A site that offers services and brings individual and businesses into
selling different goods and commodities such as shopping site like OLX,
Lazada, Shopee, Zalora and others.
5. Software as a service – users can subscribe to a software when they need it
instead of purchasing them.
6. Mass Participation – sharing of diverse information through universal web
access.
Web 3.0 The Semantic Web
A new paradigm in web interaction extension of led by World Wide Web
Consortium (W3C) where it provides framework that allows data to be shared and
reuse.
10. 3
What’s More
Activity 2: Visiting Websites Part 2
Directions: Based on the list of websites you have written in activity 1, identify the
version of the web of each website and defend your answer by writing on the Reason
column.
No. Website Web Version Reason
1.
2.
3.
What’s New
Activity 3: Social Media
Directions: List down five (5) social media that you have been used.
No. Social media used
1.
2.
3.
4.
5.
What Is It
Technology keeps rising and improving every time. The use of technology
connects us to the people around the globe and gives us current information on the
trends in information and communication. As what you have written in the activity
above, it shows that social media is mostly used by people and one of the current
trends in information and communication technology.
11. 4
Trends in ICT
1. Convergence – it refers to fusing of technological advancement to work on a
similar task.
Example. Using smartphone as camera in taking pictures instead of DSLR
camera.
2. Social Media – an application and website where user can communicate,
create and share content, and participate in online communities.
Photo Credit: https://www.pexels.com/photo/apps-blur-button-close-up-267350
Type of Social Media
A. Social Network – A website where people with the same come
together to share information.
Examples: Twitter, Instagram, Facebook
Image taken from https://www.facebook.com
B. Social News – A website where user can post stories and are
ranked based on the popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark
12. 5
Image taken from https://www.reddit.com
C. Bookmarking Sites – A website that allows you to share and store
internet bookmarks, articles, posts, blogs, images and others.
Examples: Pinterest, StumbleUpon, Dribble
Image taken from https://www.pinterest.ph/autologin=true
D. Media Sharing – A website that allows you to share and store
multimedia files such as video, photos and music.
Examples: Instagram, YouTube, Flickr
Image taken from https://www.youtube.com
13. 6
E. Microblogging – a website that allows you to broadcast short
message. Examples: Twitter, Tumblr, Meetme
Image taken from https://www.tumblr.com/login
F. Blogs and Forums – a discussion website that allows user to ask
questions and comments on a journal posted by an individual or
group. Examples: Wordpress, Blogger
Image taken from https://www.wordpress.com
3. Mobile Technologies – a technology used in cellular and other devices such
netbook, laptop, tablet, smartphones and etc.
4. Assistive Media - A platform that assist people with disability. It will guide the
individual like a blind person by using an audio recording.
14. 7
What I Have Learned
Activity 4: Generalization
In what way is ICT very useful in your studies?
What I Can do
Activity 5: Let Me Join!
Instructions:
1. Visit the www.facebook.com and create account.
2. Login in your Facebook account.
3. Search for “ICT101” group and join.
4. Take a selfie and post your picture in the group.
Rubrics:
Score Description
4 Demonstrate understanding on tasks given. All tasks are completed
3
Demonstrate understanding on tasks given. Most of the tasks are
completed.
2
Demonstrate understanding on tasks given. Many of the tasks are
completed
1 No response
15. 8
Lesson
Online Safety, Security, Ethics
and Etiquette
What’s In
We have learned in lesson 1 about the current state of Information and
Communication Technology in global setting. There are various online platforms and
sites that people used today as their medium of communication and source of
information. This communication technology spread fast to the people and even
controls their lives. Despite of the good benefits given to us by the technology there
are stills things that we must be aware of. In this lesson we will discuss and give
importance in online safety, security, ethics and etiquette.
What I Need to Know
Online Safety
The importance of internet plays a crucial part in human development. Life
becomes easy and comfortable because of this technology. Most of us are connected
to the internet via laptop, mobile phone, tablet, personal computer and other electronic
gadgets. Behind this technology there is a risk that everyone should be aware of. You
could be at risk on scam, bullying, and illegal activities if you will not take precautions
in using internet. We need to keep ourselves safe and secure whenever we use the
internet. That is why it is very important to know and learn the ways on how to be safe
and secured online.
What’s New
Activity 1: Self-Check on Online Habits
Directions: Reflect and assess yourself on your online habits. Check “Yes” or “No” on
the table below.
Online Habits Yes No
I always talk to strangers on social media.
Lesson
2
16. 9
Giving your password to your friends.
Posting about future your vacations.
Visiting unsecured websites.
Ranting on social media.
Posting image or video without asking permission from the owner.
What Is It
In the activity above you assessed yourself in online habits. Those habits might
be good or bad that you must be aware of. If you keep practicing those bad habits it
might bring you danger. Safety is the first thing you must consider in using internet.
Tips on how to be safe online
Do not share your password with anyone.
Add friends you know in real life.
Do not visit untrusted websites.
Add password to your WIFI at home to make it private.
Install and update antivirus in your computer.
Do not give your personal information to anyone
Think before you click.
Never post about your future vacation.
Internet Risk
Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by
other person using electronic communication.
Identity Theft
It is a crime of stealing personal information for the purpose of assuming that
person’s name or identity to make any form of transactions.
Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass
individual or group.
Sexting
The act of sending sexually explicit text messages, images, and videos.
17. 10
Internet Threats
Malware – also known as Malicious Software.
Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to another
program.
2. Trojan Horse – a malicious program that disguised as legitimate program
that user will accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other
computers.
4. Spyware – A malicious program that gathers information from victim’s
computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user
credentials and confidential information and send back to hack by recording
every keystroke that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as PC
and mobile phone that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a computer
on a network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom through online method
for the removal of the virus.
Spam
Also known as junk email or unwanted email send by advertiser or bot. It can
be used to send malware.
Phishing
A cyberattack method using deceptive emails and websites to acquiring
sensitive personal information.
Cybercrime
A crime in which computer is used as object and tool in committing a crime such
hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and
others.
Cybercrime Law
A law that deals with all forms of cybercrime.
18. 11
What’s New
Activity 2: #Wall
Suppose you have read a post like this “Strong men don’t cry” in social media. How
would you react? Post your reaction in comment section on our #Wall.
#Wall
Comment:
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
What Is It
The activity above shows on how we react on a post by expressing our opinions
and feelings through comments, likes, and emoticons. There are times that netizens
will give compliments and positive reactions on your post but there are also times that
netizens will criticize or give negative reactions on your post. Conflicts and
misunderstanding occur in social media because netizens are not behaving well.
Ethics and etiquette should be practice by people whenever they are in social media.
Netiquette
It is a word that came from the two words “net” and “etiquette”. It is an etiquette
applied online that shows proper manner and behavior. If you are a member of an
online society through social media you are called netizen. And in interacting with other
netizen online, we need to maintain good behavior which is acceptable to others in
online community.
“Strong men don’t cry.”
19. 12
The Core Rules of Netiquette by Seth T. Ross
1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.
What I Have Learned
A
Activity 3: Generalization
Directions: Answer the following questions below.
1. How do you keep yourself safe and secure online?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
2. Why is it important to observe netiquette online?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
20. 13
What I Can do
Activity 4: Shout Your Mind
Directions: Make a poster with a theme “think before you click”. Use a ½ illustration
board or cartolina.
Category 4 3 2 1
Graphics –
Relevance
All graphics
are related to
the
topic/theme
and makes it
easier to
understand.
All graphics are
related to the
topic except 1.
Some
graphics are
not related to
the topic.
Many graphics
are not related
to the topic.
Attractiveness The poster is
exceptionally
attractive,
neat and
clean.
The poster is
attractive, neat
and clean.
The poster is
acceptably
attractive but it
has few
erasures.
The poster is
not attractive
and has many
erasures.
21. 14
Lesson
Contextualized Online Search
and Research Skills
What’s In
In previous lesson, we discussed on online safety, security, ethics and etiquette
that we must take into consideration in using internet. Technology such mobile phone,
laptop, computer, and other electronic gadgets connect us to world through different
online platforms. Security and safety have been taught to us so that we can avoid risk
and danger online. As an individual who is part of online community must maintain
good social behavior. We need to adhere to the same standard behavior online that
we follow in real life. Now that you are ready to enter and explore the online world, this
lesson will teach you on online search and research skills.
What I Need to Know
Internet Research is a research method in collecting and gathering information via
internet by using search engine such as google.
Search Engine is a program that allows users to search for content on internet.
Examples of Search Engine
Google Aol Search Wow Baidu
Web Crawler Yahoo! Search MyWebSearch Wolframalpha
Bing Info Dogpile DuckDuckGo
Ask Infospace Contenko Internet Archive
Searching the Web
Getting the correct and reliable information is our goal in internet research. We
may rely on the capability of search engine but sometimes it may not give us the
correct information because of the keywords we entered into a search engine. There
are techniques in searching information that can be applied in search engine in order
to get a better result. Some search engines allow combination of words and logic
connectors of AND, OR, and NOT.
Lesson
3
22. 15
Tips for Effective Internet Research by George Mathews
1. Know what kind of research you want to do.
2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.
Online Research Skills by Hannah Trierweiler Hudson
1. Check Your Sources
2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks
Copyright Issues
There are millions of information that we can get from the internet. Some of this
information are free but others are not. They are protected by a copyright law.
What is Copyright?
Copyright is a protection given to the owner of the rights in an original work
such as books, musical works, films, paintings, and other works, and computer
programs. This original work is called intellectual property which is protected under
Republic Act 8293 known as the “Intellectual Property Code of the Philippines”.
Copyright Infringement
This happens when the copyrighted work is use by other person without
permission of the author or copyright holder. Any person who is infringing the right
protected work would be liable under the law. An example of this is the case of M.Y.
Intercontinental Trading Corporation (MITC), Tedwin T. Uy, Allianz Marketing and
Publishing Corp. (Allianz), and Fujian New Technology Color Making and Printing
Company, LTD (Fujian) against St. Mary’s Publishing Corporation (SMPC). Manila
regional trial court ordered Fujian and its partners to pay P24.7 million for the damages
and cost of litigation for copyright infringement to SMPC. Fujian and its three local
partners was guilty of printing, copying, reproducing, importing, distributing and selling
of original and revised textbooks that they have illegally sold to Department of
Education in Zamboanga, Municipality of Cabuyao in Laguna and Municipality of
Matnog in Sorsogon without the approval of SMPC, the copyright owner of the
textbooks.
23. 16
Fair Use
Research is important to the students and other people. Most of them rely on
the information that they can get online. Although this information is protected by a
copyright law but we can still use this information without permission in a limited way
under certain condition and purpose.
Fair use is the use of copyrighted material for comment, teaching, criticism,
news reporting, research, scholarship, and other similar purpose is not an infringement
of copyright.
Example of this is when you post a quote from a person in your Facebook wall.
Include the name of person who owns the quote in your post. Another example is when
you copy image from internet, give credit to the creator of image. The copied image
should be use for educational purpose not for commercial use.
In fair use, 5% of the content of reference can only be copied. If 20% or less
of reference copied, there must be a secondary use agreement and fee. And if 20%
or more of reference copied, it requires purchasing of creative work.
Guidelines for Fair Use
1. Majority of the contents created must be yours.
2. Give credit to the owner.
3. Don’t make profit of the copyrighted work.
What I Have Learned
A
Activity 1: Generalization
Directions: Answer the following questions below.
1. Is research online reliable? Why or Why not?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
2. How can you show respect of other’s intellectual property?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
24. 17
What I Can do
Activity: Facts and Opinion Chart
Directions: Fill in the chart correctly by checking the correct column and defend your
answer by writing on the Reason column.
Statements Facts Opinion Reason
1. All information from the
internet are reliable.
2. Giving credit to the owner of
the copied work is optional.
3. All the information can be
found on the internet.
Summary
The community online never stops upgrading. Before, users of Web 1.0 can
only read through the content of the website but now with presence of Web 3.0 we can
now create our own profile and communicate online. However, you need to be careful
while you are online since there are possibilities that your identity or personal
information might be stolen or your personal files might be deleted by malicious
software. So always bear in your mind that you need to "Think Before You Click".
Assessment: (Post-Test)
I. Multiple Choice:
Directions: Read and answer the questions below. Write the letter of the correct
answer.
1. An application and website where user can communicate, create and share
content, and participate in online communities?
A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media
2. What do you call for the markup language used in World Wide Web?
A. DNS C. HTTP
B. URL D. HTML
3. A web page that allows user to interact with web page?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
4. A website that allows you to broadcast short message.
25. 18
A. Social News C. Microblogging
B. Bookmarking Sites D. Media Sharing
5. Platform that assist person with disability.
A. Assistive Media C. Convergence
B. Social Media D. Semantic Web
II. True or False
Directions: Write “True” if the statement is true and write “False” if the statement is
false.
1. It is right to copy the works of other people without asking permission.
2. All Information from the internet are free.
3. Search engine is a tool used in internet research.
4. All information from the internet are reliable.
5. Google is an example of search engine.
6. Child pornography is a form of cybercrime.
7. Committing crime on the internet is not punishable by law
8. Do not share personal information to suspicious website or user.
9. Share your password with anyone.
10. Think before you click.
28. 21
Key to Answers
References
rappler.com, “A Profile of Internet Users in the Philippines”, Accessed January
7, 2019, https://www.rappler.com/brandrap/profile-internet-users-ph.
Computerhope.com, “WWW”, Accessed January 7, 2019,
https://www.computerhope.com/jargon/w/www.htm
Margaret Rouse, “Semantic Web”, Accessed January 19, 2019,
https://searchmicroservices.techtarget.com/definition/Semantic-Web
ontotext.com, “What is the Semantic Web?”, Accessed January 7, 2019,
https://www.ontotext.com/knowledgehub/fundamentals/what-is-the-semantic-
web/
Margaret Rouse, “Social Network” Accessed January 19, 2019,
https://searchcio.techtarget.com/definition/social-network
Hatem Mahmoud, “Web 3.0 The Semantic Web”, Accessed January 19, 2019,
https://www.slideshare.net/HatemMahmoud/web-30-the-semantic-web/48-
Available_optionsRDFa_and_microformats
Technopedia,” Web 3.0”, Accessed January 19, 2019,
https://www.techopedia.com/definition/4923/web-30
Antony Maina, “20 Popular Social Media Sites Right Now”, Accessed January
19, 2019, https://smallbiztrends.com/2016/05/popular-social-media-sites.html
Lesson
3
Activity
2:
Facts
and
Opinion
chart
Possible
answers
Statements
Facts
Opinion
Reason
1.
All
information
from
the
internet
are
reliable.
/
Not
all
information
from
the
internet
are
reliable
others
are
not
true.
2.
Giving
credit
to
the
owner
of
the
copied
work
is
optional.
/
Copyrighted
work
is
protected
by
law.
You
must
give
credit
to
the
owner
of
work
if
you
will
use
or
copy
their
work.
3.
All
the
information
can
be
found
on
the
internet.
/
Information
can
be
found
in
other
places
such
books
in
the
library.
We
can
also
get
information
from
people.
29. 22
Sophie Eagan, “10 Most Popular Social Bookmarking Websites”, Accessed
January 20, 2019, https://www.brandwatch.com/blog/10-popular-social-
bookmarking-websites/
Shrivastava, S.(2014). List of top nine Microblogging sites. Retrieved January
19, 2019 from https://www.pensitdown.com/list-of-top-nine-microblogging-sites/
Jeremiah Owyang, “Understanding the difference between Forums, Blogs, and
Social Networks”, Accessed January 19, 2019, http://www.web
strategist.com/blog/2008/01/28/understanding-the-difference-between-forums-
blogs-and-social-networks/
Comodo Antivirus, ”What is a Computer Virus and its Types”, Accessed
January 20, 2019,
https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-
definition/
Margaret Rouse, “Botnet”, Accessed January 19, 2019,
https://searchsecurity.techtarget.com/definition/botnet
Josh Fruhlinger, “What is phishing? How this cyber attack works and how to
prevent it.”, Access January 20, 2019,
https://www.csoonline.com/article/2117843/phishing/what-is-phishing-how-this-
cyber-attack-works-and-how-to-prevent-it.html
techopedia, “Cyberstalking”, Accessed January 20, 2019,
https://www.techopedia.com/definition/14326/cyberstalking
Seth T. Ross, “The Core Rules of Netiquette — Summary”, Accessed January
19, 2019, http://www.albion.com/bookNetiquette/0963702513p32.html
George Matthew, “8 Killer Tips for Effective Internet Research”, Accessed
January 19, 2019, https://webwriterspotlight.com/tips-to-nail-online-research
Hannah Trierweiler Hudson, “The 6 Online Research Skills Your Students
Need”, Accessed January 20, 2019,
https://www.scholastic.com/teachers/articles/teaching-content/6-online-
research-skills-your-students-need/
WebWise “What is netiquette?”, Accessed January 28, 2020,
http://www.bbc.co.uk/webwise/guides/about-netiquette
officialgazette.gov.ph,” Republic Act No. 8293”, Accessed January 27, 2020,
https://www.officialgazette.gov.ph/1997/06/06/republic-act-no-8293/
officialgazette.gov.ph,” Republic Act No. 10175”, Accessed January 27, 2020,
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
officialgazette.gov.ph,” Republic Act No. 10372”, Accessed January 27, 2020,
https://www.officialgazette.gov.ph/2013/02/28/republic-act-no-10372/
Rey Panaligan, “Publisher awarded P24.7 M in damages for copyright
infringement”, Accessed January 30, 2020,
https://news.mb.com.ph/2017/12/10/publisher-awarded-p24-7-m-in-damages-
for-copyright-infringement/
Pexels.com, ”Image”, Accessed January 30, 2020,
https://www.pexels.com/photo/apps-blur-button-close-up-267350