Empowerment 1

  • Uploaded by: gRascia Ona
  • 0
  • 0
  • January 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Empowerment 1 as PDF for free.

More details

  • Words: 3,832
  • Pages: 23
Loading documents preview...
11 Empowerment Technologies Quarter 1 – Module 1: Introduction to ICT, Online Safety and Contextualized Online Search and Research Skills

11 Empowerment Technologies Quarter 1 – Module 1: Introduction to ICT, Online Safety and Contextualized Online Search and Research Skills

Module in Empowerment Technologies Author: MARIA BUENASGRACIA O. NOBLETA

2

What I Need to Know This module was designed and written with you in mind. It is here to help you master the Empowerment Technologies. The scope of this module permits it to be used in many different learning situations. The language used recognizes the diverse vocabulary level of students. The lessons are arranged to follow the standard sequence of the course. But the order in which you read them can be changed to correspond with the textbook you are now using. The module is divided into Two lessons and five sub topics, namely: •





Lesson 1 – Information and Communication Technologies ▪ Lesson 1.1 – ICT in the Philippines ▪ Lesson 1.2 – ICT, Me, and my Community ▪ Lesson 1.3 - Web 2.0: Dynamic Web Pages ▪ Lesson 1.4 - Web 3.0 and the Semantic Web ▪ Lesson 1.5 - Trends in ICT Lesson 2 – Online security, safety, and ethics ▪ Lesson 2.1 – Internet Threats ▪ Lesson 2.2 – Protecting reputations online ▪ Lesson 2.3 – Copyright Lesson 3 – Contextualized Online Search and Research Skills

After going through this module, you are expected to: 1. create a foundation of understanding of the world of ICT; 2. understand and demonstrate the proper etiquette in using ICT; 3. demonstrate appropriate skills in using several computer applications, 4. discover opportunities where one can use these skills in real-world scenarios; and 5. collaboratively create an online portal. 6. Consider one’s and others’ safety when sharing information using the Internet; 7. Consider one’s and others’ reputation when using the Internet; 8. Determine and avoid the dangers of the internet; 9. Be responsible in the use of social networking sites; and 10. Browse the internet efficiently and properly through proper referencing.

3

Unlocking of Difficulties The following are the terms you will encounter with this module:

Key Terms • • • • • • • •

Web 1.0- static website without interactivity Web 2.0- websites that contain dynamic content Web 3.0- a concept of the World Wide Web that is designed to cater to the individual user Static-refers to the web that are the same regardless of the user Folksonomy- allows users to categorize and classify/ arrange information Hashtag- used to categorize posts in website Convergence- the synergy of technological advancements to work on a similar goal or task Social media- websites, applications, or online channels that enable users to create, co-create, discuss, modify, and exchange user generated content.

4

Lesson

1

Information and Communication Technologies

Information and Communication Technology (ICT) deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information. When we make a video call, we use the Internet. When we send a text or make a call, we use cellular networks. When we run out of load or battery, we use payphones which use a telephone network. Having a unified way to communicate is one of the goals of ICT. In terms of economics, ICT has saved companies a lot of resources (time and money) with the kind of communication technology they use, nowadays. In a similar way, we spend less because of ICT. As it normally costs us a peso to send a text message or SMS, with the Internet, we can send multiple messages and only be charged by a fraction.

What’s In

-

It deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save, send and edit information.

ICT in the Philippines Several international companies dub the Philippines as the "ICT Hub of Asia" It is no secret that there is a huge growth of ICT-related jobs around the country, one of which is the call center or BPO (Business Process Outsourcing) centers. According to the 2013 edition of Measuring the Information Society by the International Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. That would mean that for every 100 Filipinos you meet, there is a high chance that they have a cellphone and approximately for the seven of them, they have two. In a data gathered by the Annual Survey of Philippine Business and Industries in 2010, the ICT industry shares 19.3% of the total employment population here in the Philippines.

5

To add to these statistics, Time Magazines "The Selfiest Cities around the World” of 2013 places two cities from the Philippines in the top 1 and top 10 spots. The study was conducted using Instagram, a popular photo sharing application. With these numbers, there is no doubt that the Philippines is one of the countries that benefits most out of ICT.





Philippines is dub as the “ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is BPO, Business Process Outsourcing, or call centers ICT Department in the Philippines is responsible for the planning, development and promotion of the country's information and communications technology (ICT) agenda in support of national development.

Internet •





It is the global system of interconnected computer networks that use the Internet protocol suite TCP/IP) to link billions of devices worldwide. means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can get information from any other computer

World Wide Web •

an information system on the Internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.



is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet.



Invented by Tim-Berners Lee

Web Pages •

Web page is a hypertext document connected to the World Wide Web.



It is a document that is suitable for the World Wide Web

6

Web Sites •

a location connected to the Internet that maintains one or more pages on the World Wide Web.



It is a related collection of World Wide Web (WWW) files that includes a beginning file called a home page.

Web Browser •

It displays a web page on a monitor or mobile device



is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.

Static Web Pages •

Static is Web 1.0



Dynamic is Web 2.0, 3.0



Static web page is known as flat page or stationary page in the sense that the page is “as is” and cannot be manipulated by the user.



The content is also the same for all users that is referred to as Web 1.0

7

Dynamic Web Pages •

web 2.0 is the evolution of Web 1.0 by adding dynamic web pages



The user is able to see website differently than others e.g social networking sites, wikis, video sharing sites



Web 2.0 allows users to interact with the page, the user may be able to comment or create a user account



Most website the we visit today are Web 2.0

Static vs. Dynamic Web Page •

Static" means unchanged or constant, while "dynamic" means changing or lively.



A static site is one that is usually written in plain HTML and what is in the code of the page is what is displayed to the user. A dynamic site is one that is written using a server-side scripting language such as PHP, ASP, JSP, or ColdFusion.

Features of Web 2.0 1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g tagging by Facebook, twitter, use tags that start with the pound sign #, referred to as hashtag 2. Rich User Experience- content is dynamic and is responsive to user’s input 3. User Participation- The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews, and evaluation e.g lazada.com, amazon.com 4. Long Tail- services that are offered on demand rather than on a one-

time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used. 5. Software as a Service- users will be subscribe to a software only when

needed rather than purchasing them e.g Google docs used to create and edit word processing and spread sheet. 6. Mass Participation- diverse information sharing through universal

web access. Web 2.0’s content is based on people from various cultures. Web 3.0 and Semantic Web •

Semantic Web is a movement led by the World Web Consortium (W3C).

8



The W3C standard encourages web developers to include semantic content in their web pages.



Semantic web is a component of Web 3.0



Semantic web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.



The aim of web 3.0 is to have is to have machines or servers understand the user’s preferences to be able to deliver web content specifically targeting the user.

Web 3.0 is yet to be fully realized because of several problems: 1. 2. 3. 4. 5.

Compatibility. HTML files and current web browsers could not support Web 3.0. Security. The user's security is also in question since the machine is saving his or her preferences. Vastness. The World Wide Web already contains billions of web pages. Vagueness. Certain words are imprecise. The words "old" and "small would depend on the user. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time.

Trends in ICT 2. Convergence- is the synergy of technological advancements to work on a similar goal or task 3. Social media- is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content. Six Types of Social Media: a. Social Networks- these are sites that allow you to connect with other people with the same interests or background. b. Bookmarking Sites- these are sites that allow you to store and manage links to various websites and resources. c. Social news- these are sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be ranked. d. Media Sharing- these are sites that allow you to upload and share media content like images, music, and video. e. Mircoblogging- these are sites that focus on short updates from the user. Those subscribed to the user will be able to receive these updates. f. Blogs and Forums- these websites allow users to post their content. Other users are able to comment on the said topic.

4. Mobile Technologies- popularity of smartphones and tablets. Latest mobile devices use 4G Networking LTE, which is currently the fastest mobile network. Mobile devices use different operating systems

9



iOS



Android





Windows Phone OS



Symbian



Web OS



Windows Mobile

Blackberry OS

5. Assertive Media- is a nonprofit service designed to help people who have visual and reading impartments. A database of audio recordings is used to read to the user.

References For educational purposes only; All rights reserved for rightful owners





Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0; Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI) Reygie Fabro-College Instructor at Divine Word College of Laoag; Published on Jul 13, 2016; https://www.slideshare.net/reygiebumagat/empowerment-technology

2

Lesson

2

Rules of Netiquette

What’s In How many hours do you spend on the Internet per day? Can you live without the Internet for a week? How many aspects of your life depend on the Internet? How many times have you complained about your Internet connection speed? As teenagers, you are all exposed to many things powered by the Internet. Whether it is socializing, playing games, reading sports news, shopping, etc., the Internet has given you one of the most powerful tools that your parents, during their teenage years, did not have. Because of this, do you not think that it is also important to wield this powerful tool properly? Without proper training, a swordsman can easily injure himself when wielding a swordsman, the same could be said for you whenever you use the Internet.

What’s New

• • • •

Lesson 2 – Online security, safety, and ethics Lesson 2.1 – Internet Threats Lesson 2.2 – Protecting reputations online Lesson 2.3 – Copyright

Online Safety and Security The Internet, truly, is a powerful tool. It can be used to promote your business, gain Online Safety and Security new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things in this world there is always the 'other side of the coin The Internet is one of the most dangerous places especially if you do not know what you are doing with it. But there is no need to worry: it is never that late. Hopefully, by the end of this lesson, you are able to consider how you go about your use of the Internet.

Let us go back to the "How Safe Are You?" test. Let us visit each item and see how risky it is to share them. pe of information Risks There is a risk in sharing your The Internet, truly, is a powerful tool. It can be used to promote your business, gain Online Safety and Security new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things in this world there is always the 'other side of the coin The Internet is one of the most dangerous places especially if you do not know what you are doing with it. But there is no need to worry: it is never that late. Hopefully, by the end of this lesson, you are able to consider how you go about your use of the Internet. Let us go back to the "How Safe Are You?" test. Let us visit each item and see how risky it is to share them. pe of information Risks There is a risk in sharing your First name

Last name

If sharing your first name is a small risk, having both your first and last is riskier. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face is modus to several cybercrimes like identity theft.

Middle name

Current and Previous Schools

There is a risk in sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you only give out your first name. Likewise, you cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with.

Sharing your middle name alone is probably not the riskiest of this shared information, but sharing your full name would be.

Most people who steal identities study their subject. They can use this information for verification purposes.

Your cellphone numbers

The name of your mother and father.

Risky yet not as risky as posting their full names, especially your mother's maiden name. In fact, you may have already encountered many websites that require your mother's maiden name as an answer to a secret question whenever you lose your password.

The name of your siblings.

Your address

Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe you.

Hopefully, you answered "no" to this one. Giving the Internet your number is one thing; giving them your address is a whole other level. It would be much easier for criminals to find you.

Your home phone number.

Your birthday

Your cellphone number should never be posted over the Internet. The Internet number is a public place. It is the same as posting your number on a billboard. You would not want random strangers to text or call you, or worse, pretend that they are someone else.

This shared information is riskier than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you.

Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.

What is It TEN RULES OF NETIQUETTE Rule no. 1: Remember the human Rule no. 2: Adhere to the same standards online that you follow in real life. Rule no. 3: Know where you are in cyberspace. Rule no. 4: Respect other people’s time and bandwidth. Rule no. 5: Make yourself look good online. Rule no. 6: Share expert knowledge Rule no. 7: Help keep flame wars under control Rule no. 8: Respect other people’s privacy. Rule no. 9: Don’t abuse your power Rule no. 10: Be forgiving of other people’s mistake. RULES OF NETIQUETTE

What is It • • • • •

Lesson 2 – Online security, safety, and ethics Lesson 2.1 – Internet Threats Lesson 2.2 – Protecting reputations online Lesson 2.3 – Copyright Lesson 2.4 – Contextualized online research skills

What is It • • • •

Lesson 2 – Online security, safety, and ethics Lesson 2.1 – Internet Threats Lesson 2.2 – Protecting reputations online Lesson 2.3 – Copyright

What is It • • • • •

Lesson 2 – Online security, safety, and ethics Lesson 2.1 – Internet Threats Lesson 2.2 – Protecting reputations online Lesson 2.3 – Copyright Lesson 2.4 – Contextualized online research skills

Lesson

3

Contextualized Online Search and Research Skills

Being a vast sea of information is one of the key features of the Internet. it is such a big repository of data that is believed that one could find out something about anything on the internet. Developing the necessary knowledge and skills in online searching, however, is the key to maximizing its use.i

What’s New “Googling” Indeed, Google might be our “friend” but using search engines for the sake of plain information could actually lead you misinformed. In order to stay meaningfully informed, you should start appreciating the use of the right combination of words or key phrases. SEARCH ENGINE A search engine is a software system designed to search the Internet for documents related to the keyword or search word used or entered into the system. Users are able to maximize the potential of search engines by learning the proper searching protocols.ii TYPES OF SEARCH ENGINES

❑ Crawler-based search engine - It uses a spider or a crawler to search the Internet. The crawler digs through individual web pages, pulls out keywords, and then adds the pages to the search engine's database. Google and Yahoo are its examples.

❑ Directories - depend on human editors to create their listings or database. There are two types of directories: (1) academic and professional directories which are often created and maintained by subject experts to support the needs of researchers; and (2) commercial and portal directories that cater to the general public and are competing for Internet traffic. ❑ Hybrid search engine uses both crawler based searches and directory searches to obtain their results. ❑ Meta search engines - transmit user supplied keywords simultaneously to several individual search engines to carry out the search. In this type of search engine, duplicates can be eliminated and clustering by subjects within search is implemented.iii

ONLINE RESEARCH In the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also provisions for “fair use”.

❑ Have a question in mind- Focus on a question you want answered. ❑ Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for you. ❑ Advanced Search- The best way to filter information you get from search engines is by using the advanced search. ❑ Look for a credible source- Some wikis, filled with updated information, are not a credible source. When using wikis, check out the link of the cited texts. ❑ Give credit- Give credit to the original author of the page or information. To properly site a reference, you may use the format below Symbol + ““ () AND or & NOT or -

Function Finds web pages that contain all the terms that are preceded by the + symbol; allows you to include terms that are usually ignored Finds the exact words in a phrase Finds or excludes web pages that contain a group of words Finds web pages that contain all the terms or phrases Excludes web pages that contain a term or phrase

References For educational purposes only; All rights reserved for rightful owners Empowerment Technologies by Innovative Training Works, Inc. and Rex Bookstore ISBN 978-971-23-7830-0 Published, Copyright 2016 and distributed by rex Book Store, Inc. (RSBI) Patronage of Mary Development School (PMDS), Published on May 6, 2020; https://www.slideshare.net/arias201625/empowerment-technologies-lesson2?qid=45c533b4-a83e-4e70-ae13-92c5b3b8b650&v=&b=&from_search=3 Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1. Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2. Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3. Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 367, paragraph 3.

i

Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 1. ii Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 2. iii Rosalie P. Lujero; Empowerment Technologies Copyright 2018 by Vibal Group Inc. and Rosalie P. Lujero; 1253 G. Araneta Ave., cor Ma. Clara St., Quezon City. Page 36, paragraph 3.

Related Documents

Empowerment 1
January 2021 1
Empowerment
January 2021 1
Tos Empowerment
January 2021 0
Youth Empowerment
February 2021 0
Ganesha Empowerment
January 2021 1
Grounding Empowerment
January 2021 1

More Documents from "Volkan VVolkan"