Empowerment Technologiesweek 1
Empowerment Technologiesweek 1
As the popular saying goes, “Love makes the world go round.” But, before you start
looking for someone to fall in love with, you could argue how the internet has made the world
go round for decade. The internet has probably made your world go round. In this lesson,
you will understand how Information and Communication Technologies have improved your
lives in such a short period of time.
Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to locate,
save, send and edit information.
When we make a video, we use Internet. When we send a text or make a call, we
use cellular networks. When we run out of load or battery, we use payphones which use a
telephone network. Having a unified way to communicate is one of the goals of ICT. In terms
of economics, ICT has saved companies a lot of resources (time and money) with the kind of
communication technology they use, nowadays. In a similar way, we spend less because of
ICT. As it normally costs us a peso to send a text message or SMS, with the Internet, we
can send multiple message and only be charged by a fraction.
Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is Business Process Outsourcing (BPO) or call centers.
ICT Department in the Philippines is responsible for the planning, development and
promotion of the country’s information and communications technology (ICT) agenda in
support of national development.
In the data gathered by the annual survey of the Philippines Business and Industries,
the then National Statistics Office (NSO) now Philippine Statistics Authority (PSA), in 2010,
the ICT industry shares 19.3% of the total employment population here in the Philippines.
To add to these statistics, Time Magazine’s “The Selfiest Cities around the World” of
2013 place two cities from the Philippines in the top 1 to 10 spots. The study was conducted
using Instagram, a popular photo sharing application.
With these numbers, there is no doubt that the Philippines is one of the countries that
benefits most out of ICT.
How many hours do you spend on the Internet per day? Can you live without the
Internet for a week? How many aspects of your lives depend on the Internet? How many
times have you complained about your Internet connection speed?
As teenagers, you are all exposed to many things powered by the Internet. Whether it
is socializing, playing games, reading sports news, sopping, etc., the internet has given you
one of the most powerful tools that yours parents, during their teenage years, did not have.
Because of this, do you not think that it is also important to wield this powerful tool properly?
Without proper training, a swordsman can easily injure himself when wielding a sword; the
same could be said for you whenever you use the Internet.
LEARNING COMPETENCIES
1. Compare and contrast the nuances of varied online platforms, sites, and content to
best achieve specific class objectives or address situational challenges
2. Apply online safety, security, ethics, and etiquette standards and practice in the use
of ICTs as it would relate to their specific professional tracks
3. Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational challenges
(Quarter 1, Week 1-2)
DIRECTIONS
Let’s Start!
Hello learner. Please sign the learning agreement before answering the
different activities. ENJOY!
LEARNING CONTRACT
AGREEMENT: I hereby accept the responsibility to finish the activity package and submit
it to my teacher (____________________) on (____________________).
_______________________________ _________________
Name of Student over Printed Name Date
Look for five websites and classify them as static or dynamic. Check the static
column if it is static and dynamic column if it is dynamic.
Note:
Static Web Page – is known as a flat page or stationary age in the sense that the page is
“as is” and cannot be manipulated by the user. The content is also the same for all users
that is referred to as Web 1.0
Dynamic Web Pages – web 2.0 is the evolution of web 1.0 by adding dynamic web pages.
The user is able to see website differently than others e.g. social networking sites, wikis,
video sharing sites.
Most of us use the Internet every day. Sometimes, we do not pay attention on
how much information we share online. Below is a questionnaire about how
much information you have shared so far. Put a check (/) under Shared or
Not Shared
How many checks did you have for Shared? You probably answered Shared in the
first two items. If that is the case, try using search engine like Google then type your first and
last name. Did you get links to your profile page? Try switching to image search. Did your
pictures appear? If you have a unique name, chances are, it did. Do not feel bad if it did not
appear though; in fact, it is probably for your best interest not to have pictures of yourself in a
search engine.
So how did these things happen? How can search engines locate you? Is there any
danger of being found by search engines?
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, stay in touch with the old ones. It is also a source of entertainment through games,
online communities, and everything in between. But like most things in this world, there is
always the “other side of the coin” the Internet is one of the most dangerous places,
especially if you do not know what you are doing with it. But there is no need to worry; it is
never late. By the end of this lesson, you are able to consider how you go about your use of
the Internet.
Let us go back “How Safe Are You” Activity. Let us visit each item and see how risky
it is to share them.
Type of Information Risks
1.First name There is a risk in sharing your first name.
Chances are, a hacker may already know
plenty of stuff about you even if you only give
out your first name. Likewise, you cannot just
walk in a room and start introducing yourself to
everyone. You do not know whom you can
come across with.
2.Last name If sharing your first name is small risk, having
both your first and last is more risky. You will
be vulnerable to being searched for using
search engines, which include image search.
Matching a name with a face is a modus to
several cybercrimes like identity theft.
3. Middle name Sharing your middle name alone is probably
not the most risky of these shared information,
but sharing your full name would be.
4.Current and previous school(s) Most people who steal identities study their
subject. They can use this information for
verification purposes
5.Your cellphone number Your cellphone number should never be
posted over the Internet. The Internet is a
public place. It is the same as posting your
number on a billboard. You would not want
random strangers to text or call you, or worse,
pretend that they are someone you lose your
password.
6.The name of your mother and fat Risky, yet not as risky as posting their full
names, especially your mother’s maiden name.
In fact, you may have already encountered
many websites that require your mother’s
maiden name as answer to a secret question
whenever you lose your password.
7.The name of your siblings Disclosing this is a huge risk. Strangers may
pretend or use their identity to dupe you.
Community Problem:
____________________________________________________________________
Vicinity:
____________________________________________________________________
Campaign
Name_______________________________________________________________
Type of Social Media Used:
____________________________________________________________________
Website Used:
____________________________________________________________________
Think about your life with media. First consider the questions below. Use your
responses to help you finish the statement, “My media life is like a...” This
statement is a simile, a literary device for comparing two unlike things.
Answer the following questions and make a picture or drawing of the simile
you created.
Guide Questions:
1. Explore the content of the Networked World Readiness6 assessment via this link:
http://cyber.law.harvard.edu/readinessguide/intro.html
2. Compare and contrast the implications of varied online platforms, sites and content;
to best achieve specific needs, objectives; or to best address the challenges in the
classroom or that of your community. Write down your insight in 300 words.
Visit a social networking site and look for the site’s privacy policy. The link is
typically found at the bottom of the page and sometimes labelled only as
“Privacy”. Write a summary on how the website handles both your private and
public information.
Activity 4
REFLECTION