Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

DEE HWA LIONG ACADEMY

Sta. Maria Compound, Marcos Highway, Santolan, Pasig City


Senior High School Department
S.Y. 2020-2021

NOT FOR SALE

EMPOWERMENT
TECHNOLOGY
Angelica D.R. Banaag, LPT

This module uses Empowerment Technologies Innovative Training Works, Inc by REX Book Store, Inc.
All rights reserved to the Author. No copyright infringement intended.
MULTIPLE CHOICE: Choose the correct answer.
1. A web page that allows interaction from the user.
a. Static c. Social
b. Dynamic d. Comment

2. This refers to the feature where users are able to categorize and locate information through
tagging.
a. Hashtags c. Taxonomy
b. Folksonomy d. Rich User Experience
3. A feature of a dynamic website that allows users to put their own content.
a. Rich user experience c. User participation
b. Long Tail d. Mass participation
4. It provides common framework to allow data to be shared and reused across platform.
a. W3C c. Web 1.0
b. Semantic Web d. Web 2.0
5. Based on this magazine, Philippines is one of the top 10 as “The Selfiest Cities around the
world”.
a. People c. Reader’s Digest
b. Time d. Candy
6. This is the operating system for blackberry phones.
a. Blackberry OS c. Windows Mobile
b. Symbian d. iOS
7. Pinterest is a social media website that can be classified as _________?
a. Bookmarking site c. Microblogging
b. Media sharing d. Blogs and Forums
8. Currently, this is the fastest mobile network.
a. 2G c. 4G
b. 3G d. 5G
9. This media is designed to help people who have visual and reading impairments.
a. Assistive c. Bookmarking
b. Social d. Accessibility
10. This type of social media website focuses on short updates posted by the user.
a. Blogging c. Social Media
b. Microblogging d. Hastagging
1|P ag e
ADRB
Lesson 1: Introduction to Information and
Communication Technologies

Objectives: In today’s generation Information and

At the end of this module, the students Communication Technologies are commonly
should be able to:
used in everyday lives. We usually use our
o improve their knowledge on how ICT
affects their everyday lives and the state phones to communicate to our family, friends,
of our nation;
o compare and contrast the differences work and business. According to the 2013
between online and platforms, sites,
and content; edition of Measuring the Information Society by
o understand the feature of Web 2.0;
the International Telecommunication Union,
o understand the future of the World
Wide Web through web 3.0 and there are 106.8 cellphones per 100 Filipinos in
o learn the different trends in ICT and use
them to their advantage. the year 2012. That would mean that for every

Filipino you meet, there is a high chance that

2|P ag e
ADRB
they have a cellphone and approximately for the seven of them, they have two.

ICT is playing a central role in the development of social businesses, especially here in the

Philippines that is why the country was dubed as “ICT Hub of Asia” because of the huge growth

of ICT related jobs, one of which Business Processing Outsourcing (BPO) or call centers.

Information and Communication Technologies (ICT)

deals with the use of different communication such as mobile

phones, telephone, internet, etc. to locate, save, send and edit

information.

When the World Wide Web was invented by Tim Berners-

Lee in 1989 most web pages were static. Static is also known

as flat page or ordinary page, in the sense that the page is “as

is” and cannot be manipulated by the user. The content is also

the same for all user and this is also called “read-only” web, this is referred to as Web 1.0.

Web 2.0 is the evolution of Web 1.0 by

adding dynamic web pages and the user is able

to see a website differently than the others.

Examples of Web 2.0 include social

networking sites, blogs, wikis, web

applications and hosted services.

It allows the users to interact with the page instead of just reading a page, the user may able to

comment or create a user account that is why it is called “read-write” web. Web 2.0 also allow

users to use web browsers instead of just using their operating system. The term Web 2.0 was

coined by Darci DiNucci in 1999. Browsers can now be used for their interface, application
3|P ag e
ADRB
software or web applications, and even for file storage. Most websites that we visit today are Web

2.0.

Features of Web 2.0

1. Folksonomy. It allows user to categorize and classify/arrange information using freely chosen

keywords (e.g. tagging). Popular social networking sites such Facebook, Twitter, Instagram,

etc. use tags that start with the pound sign (#). This is also referred to as hashtag.

2. Rich User Experience. Content is dynamic and responsive to user’s input. A website that shows

local content would be an example. In the case of social networking sites, when you logged

on, your account is used to modify what you see in their website.

3. Long Tail. Services are offered on demand

rather than on a one-time purchase. In certain

cases, time-based pricing is better than file-

size-based pricing or vice versa. It is the

same as subscribing to a data plan that

charges you for the amount of bandwidth

you used.

4. User Participation. The owner of the website is not the only one who is able to put content.

Others are able to place a content of their own by means of comment, reviews, and evaluation.

Some websites allow reader to comment on

an article, participate in a poll, or review a

specific product. Shopee, Lazada,

Amazon.com and ebay are some of the

commonly used online stores that features

user participation.

4|P ag e
ADRB
5. Software as a Service. Users will subscribe to a software

only when needed rather than purchasing them. This is a

cheaper option of you do not always need to use a software.

For instance, Google Docs is a free web-based application

that allows the user to create and edit word processing and

spreadsheet documents online. When you need a software,

like a Word Processor, you can purchase it for one-time huge amount and install it in your

computer and it is yours forever. Software as service only allows you to “rent” a software for

a minimal fee.

6. Mass Participation. It is a diverse information sharing

through universal web access. Since most users can

use the internet, Web 2.0’s content is based on people

from various cultures.

Web 3.0 and the Semantic Web

The Semantic Web is a movement led by World Wide Web Consortium (W3C). The W3C

standard encourages web developers to include semantic content in their web pages.

According to W3C, “The Semantic Web provides a common framework that allows data to be

shared and reused across application, enterprise, and community boundaries”. The aim of Web 3.0

is to have machines or servers to understand the user’s preferences to be able to deliver web content

specifically targeting the user and refferd as “read-write-execute” web.

Several Problems of Web 3.0

1. Compatibility

HTML files and current web browsers could not support Web 3.0.

2. Security

5|P ag e
ADRB
The user’s security is also in questions since the machine is saving his or her preferences.

3. Vastness

The World Wide Web already contains billions of web pages.

4. Vagueness

Certain word are imprecise. The words “old” and “small” would depend on the user.

5. Logic

Since machines use logic, there are certain limitations for a computer to be able to predict

the user’s referring to at a given time.

Trends in ICT

1. Convergence

Technological Convergence is the synergy of

technological advancements to work on a similar goal

or task.

2. Social Media

A website, application, or online channels that enable web users to create, co-create,

discuss, modify, and exchange user generated content.

6|P ag e
ADRB
Six Types of Social Media

a. Social Networks. These are sites that allow you to

connect with other people with the same interest or

background.

b. Bookmarking sites. These are sites that allow you

to store and manage links to various websites and

resources.

c. Social News. These are sites that allow users to post their own news items or links to other

news sources.

d. Media Sharing. These are sites that allow you to

upload and share media content like images, music,

and video.

e. Microblogging. These are sites that focus on short updates from the user.

f. Blogs and Forums. These websites allow users to post

their content.

7|P ag e
ADRB
3. Mobile Technologies

The popularity of smartphone and tablets has taken a

major rise over the years. This is largely because of the

devices capability to do task that were originally found in

personal computers.

Kinds of Operating Systems

a. iOS

- Used in apple devices such as the iPhone and iPad.

b. Android

- An open source operating system developed by Google.

c. Blackberry OS

- Used in Blackberry OS

d. Windows Phone OS

- A closed source and proprietary operating system developed by Microsoft.

e. Symbian

- The original smart phone OS, used by Nokia devices.

f. Web OS

- Originally was used for smartphones, now used for Smart TV’s.

g. Windows Mobile

- Developed by Microsoft for smartphones and Pocket PC’s.

4. Assistive Media

A non-profit service designed to help people who have

visual and reading impairments. A data base of audio

recordings is used to read to the user.

8|P ag e
ADRB
Directions: There are 10 images below, create as many hashtags as you think per image.

1. 6.

2. 7.

3. 8.

4. 9.

10.
5.

9|P ag e
ADRB
Compose atleast 5 sentences, how does the Information and Communication Technology
affects your life?

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

Sources:

Empowerment Technologies Innovative Training Works Inc.

https://my2017net.wordpress.com/2017/10/07/philippines-ict-hub-of-asia/

https://www.ericsson.com/en/reports-and-papers/networked-society-insights/social-business/social-impact-of-
ict

https://aboutprojectict.wordpress.com/2017/01/26/ict-in-philippines/

10 | P a g e
ADRB
MULTIPLE CHOICE: Choose the correct answer.

1. A program designed to send you advertisements, mostly as pop-ups.

a. Spyware c. Spam

b. Adware d. Virus

2. Stands for malicious software.

a. Worm c. Phishing

b. Trojan d. Malware

3. Unwanted email mostly from bots or advertisers and it can be used to send malware.

a. Spam c. Pharming

b. Phishing d. Malware

4. Used to record the keystroke done by the users.

a. Adware c. Spam

b. Keyloggers d. Malware

5. A malicious program designed to replicate itself and transfer from one computer to another.

a. Worm c. Trojan

b. Virus d. Pharming

6. A crime committed or assisted through the use of the internet.

a. Copyright c. Privacy Policy

b. Fair use d. Cybercrime

7. A more complicated way of phishing where it exploits the DNS system.

a. Pharming c. Worm

b. Trojan d. CSS

11 | P a g e
ADRB
Lesson 2: Rules of Netiquette

Objectives:
Online Safety and Security
At the end of this module, the students
should be able to: The internet, is truly a powerful tool. It can
o consider one’s and others safety when be used to promote your business, gain new
sharing information using the internet;
friends, and stay in touch with the old ones. It
o consider one’s and others reputation
when using the internet; is also a source of entertainment. But like most
o determine and avoid the dangers of the things in this world, there is always “another
internet;
side of the coin”. The internet is one of the most
o be responsible in the use of social
networking sites and; dangerous places, especially if you do not
o browse the internet efficiently and know what you are doing.
properly through properly referencing.

12 | P a g e
ADRB
Below are different types of information that are usually present in social media. Put a
check ( ∕ ) on the box of Yes, if you disclose that information in your social media accounts and
put a check ( ∕ ) on the box of No, if you do not disclose that information on your social media
accounts.

Type of Information Yes No


1. First Name
2. Last Name
3. Middle Name
4. Current and Previous School
5. Your Cellphone Number
6. Who your Mother and Father are
7. Who your siblings are
8. Your address
9. Your Home phone number
10. Your Birthday

The following are the risks of disclosing those types of information above in your social
media accounts.

Type of Information Risks


1. First Name There is still a risk in sharing your first name. Chances are, a hacker
already knows plenty of stuff about you even if you only give out your
first name. You cannot just walk in a room and start introducing yourself
to everyone. You do not know whom can come across with.
2. Last Name If sharing your first name is a small risk, having both your first and last is
a more risky. You will be vulnerable to being searched for using search
engines, which include image search. Matching a name with a face can
lead to several cybercrimes like identity theft.
3. Middle Name Sharing just your middle name is probably not the most risky of these
shared information, but sharing your entire full name would be.
4. Current and Most people who steal identities study their subject. They can use this
previous school(s) information for verification purposes.
5. Your cellphone Your cellphone number should never be posted over the internet. The
number internet is a public place. It is the same as posting your number on a
billboard.

13 | P a g e
ADRB
6. Who your Mother Risky, yet as not risky as posting their full names, especially your
and Father are mother’s maiden name. In fact, if you have already encountered many
websites that require your mother’s maiden name as an answer to answer
to a secret question whenever you lose your password.
7. Who your siblings This is a huge risk, especially if you have younger siblings. Strangers
are may pretend or use their identity to dupe you.
8. Your address Hopefully you answered no to this one. Giving the internet your number
is one thing, giving them your address is a whole other level. It would be
much easier for criminals to find you.
9. Your home phone This shared information is more risky than sharing your personal phone
number number. Scams usually use this information to deceive you, one of which
is when a stranger pretends to know your parents or pretends to be you.
10. Your birthday Letting people know your birthday is probably a must if you want to get
as many gifts as possible. But having it in your profile makes you
vulnerable to identity theft.

Tips to stay Safe Online

1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions, read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode”, will
not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, “my house at this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one antivirus software to
avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-
peer downloads (torrents) as the download is the most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

14 | P a g e
ADRB
Internet Threats
1. Malware. Stands for malicious software
a. Virus. A malicious program designed to replicate itself and transfer from one computer to
another either through the Internet and local networks or data storage like flash drives and
CD’s.
b. Worm. A malicious program that transfer from one
computer to another by any type of means. Often it
uses a computer network to spread itself. An
example is the ILOVEYOU worm (Love Bug
Worm) which infected over ten million windows
personal computers on and after May 4, 2000, it
started spreading as an email message with the
subject line “ILOVEYOU” and the attachment
“LOVE-LETTER-FOR-YOU.txt.vbs”. The ILOVEYOU worm infected computers all
over the world and it was created by a Filipino.
c. Trojan. A malicious program that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information.
❖ Rogue security software. Tricks the user into posing that is a security software. It asks
the user to pay to improve his/her security but in reality, they are not protected at all.
d. Spyware. A program that runs in the background without you knowing it (thus called
“spy”). It has the ability to monitor what you are currently doing and typing through
keylogging. Keyloggers used to record the keystroke done by the users. This is done to
steal their password or any other sensitive information. It can record email, messages, or
any information you type using your keyboard.
e. Adware. A program designed to send you advertisements, mostly as pop-ups.
2. Spam. Unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing. Its goal is to acquire sensitive personal information like password and credit card
details. This is done by sending you an email that will direct the card, or personal information.
The user will be ask to visit a website and update his/her username, password and credit card
pin.
❖ Pharming. A more complicated way of phishing where it exploits the DNS (Domain
Name Service) system.

15 | P a g e
ADRB
Protecting Online Reputations and Think before you Click
Remember the following:

❖ Before you post something on the web, ask these questions to yourself:
o Would you want your parents or relatives see it?
o Would you want your future boss to see it?

Once you post something on the web, you have no control of who sees your posts.

❖ Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.
❖ Set your post to “private’. In this way, search engines will not be able to scan that
post.
❖ Avoid using names. Names are easy for search engines to scan.
❖ If you feel that a post can affect you or other’s reputation, ask the one who posted it
to pull it down or report it as inappropriate.

Copyright Infringement

If you create something, an idea, an invention, a form of literary work, or a research you
have the right of how it should be used by others. This is called intellectual property.
1. Understand. Copyright protects literary works, photographs, painting, drawings, films, music
(and lyrics), choreography and sculptures but does not generally protect underlying ideas and
facts.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not valid against
copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you or
something made from somebody else’s creativity.
4. Know the Law. There are some limitations to copyright laws. In the Philippines, lifetime (of
the creator) plus 50 years and Fair Use provisions.

Online Research

Information that we need is more likely already in the Internet. It is just a matter of how
to look.

16 | P a g e
ADRB
1. Have a question in mind. Focus on a question you want answered. If it is a series of
questions, start with one. Never search everything on one go.
2. Narrow it down. Use filters to determine the most appropriate result.
3. Advance search. It is the best way to filter information

4. Look for Credible Source. Some wikis, filled with updated information, are not credible
source. When using wikis, check out the link of the cited texts and read references.
5. Give Credit. Give credit to the original author of the page or information.

17 | P a g e
ADRB
As a student how will you show your sense of responsibility in using the internet and social
media platforms?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

Sources:

Empowerment Technologies Innovative Training Works Inc.

https://prezi.com/p/ohjjvo6vqt65/lesson-2-rules-of-netiquette/

18 | P a g e
ADRB
MULTIPLE CHOICE: Choose the correct answer.

1. What types of documents can you create using mail merge?


a. Envelops c. Posters
b. Letters d. Labels
2. The button that allows you to see the result of your mail merge even before you print/send it out?
a. Preview result c. Address block
b. Insert merge fields d. Greeting line
3. What image file type is capable of displaying simple animation?
a. .bmp c. .jpg
b. .gif d. .png
4. In inserting charts on your document, what application pops up to allow you to enter and manage
your chart?
a. Access c. Excel
b. Note d. Word
5. Which image type allows you to display images in full color just like digital pictures?
a. .gif c. .tiff
b. .bmp d. .jpg
6. Line art drawings or images used as generic representation for ideas and objects.
a. Clipart c. Chart
b. Smart Art d. Shapes
7. Adjusts how the image behaves around other objects or text.
a. Smart Art c. Wrap Text
b. Chart d. Picture

19 | P a g e
ADRB
Lesson 3: Advanced Word Processing
Skills

Word
Objectives:
At the end of this module, the students
should be able to: In the professional world, sending out
information to convey important information is
o Use some advanced capabilities of
Microsoft Word used to increase vital. Because of ICT, things are now sent much
productivity and efficiency; faster than the traditional newsletter or postal
o Effectively use these features to help
mail. You can now send much faster than the
improve the productivity of an
organization through maximizing the traditional newsletter of postal mail. You can
potential of MS Word; now use the Internet to send out information you
o Create form letters or documents for
need to share. What if we could still do things
distribution to various recipients;
o Create labels and envelops for much faster – an automated way of creating and
distribution and; sending uniform letters with different
o Create media rich documents for
recipients? Would that not be more convenient?
printing or publishing.

20 | P a g e
ADRB
Word Processing is the use of computer to create, edit and print document. Word processor
is a software program that is capable in creating and printing document. Microsoft Word is a
widely used commercial word processor designed by Microsoft. Microsoft Word is a component
of the Microsoft Office suite of productivity software, but can also be purchased as stand-alone
product. It was initially launched in 1983 and has since been revised numerous times.

Mail Merge and Label Generation

Mail Merge. Allows to create documents or merge them with another document or data file.

21 | P a g e
ADRB
Two Components of Mail Merge

1. Form Document. It is generally the document that contains the main body of the message we want
to convey or send. The main body of the message is the part of the form document that remains
the same no matter whom you send to from among your list. Data or merge fields marks the
position on your form where individual data or information will be inserted. It id denoted by the
symbol (<<>>).

2. List or Data File. This where the individual information or data that needs to be plugged in
(merged) to form document is placed and maintained. Mail merge allows data file to be created
within the Microsoft Word application itself, or it gets data from a file created in Microsoft Excel
or other formats.

22 | P a g e
ADRB
Label Generation. It creates a blank form document that simulates either a blank label of pre-
defined size and will use the data file that you selected to print the information, typically individual
addresses.

You may visit the link below for the step by step procedure on how to mail merge in Microsoft
Word.
Link: https://www.youtube.com/watch?v=4dozr7K2_9Y

Integrating/Inserting images and External Material

Kinds of Materials
1. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in
any local storage device.
3 Types of Picture Files
a. .JPG (Joint Photographic Experts Group). It does not work well on lettering, line, drawings
or simple graphics. .JPG are relatively small in file size and supports 16 million colors.
b. .GIF (Graphics Interchange Format). It is capable of displaying simple animation. .GIF is
much better for logos, small text, black and white images, or low resolution files. It
supports 256 colors.
c. .PNG (Portable Network Graphics). Its development was basically for the purpose of
transporting images on the internet at faster rates. .PNG support
23 | P a g e
ADRB
2. Clip Art. This generally a .GIF type, line art drawings or images used as generic representation
for ideas and objects that you might want to integrate in your document.
3. Shapes. Printable objects or material that you can integrate in your document to enhance its
appearance or to allow you to have some tools to use for composing and representing ideas or
messages.
4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form
ideas that are organizational or structural in nature.

5. Chart. Another type of material that you can integrate in your Word document that allows you
to present data characteristics and trends.

6. Screenshot. In creating manual for training or procedure will require the integration of a more
realistic image of what you are discussing on your report or manual.
Image Placement

Text Wrap. Adjusts how the image behaves


around the other objects or text.

24 | P a g e
ADRB
a. In line with text. This is the default setting for images that are inserted or integrated in your
document. It treats your image like a text font with the bottom side totally aligned with the text
line. This setting is usually used when you need to place your image at the beginning of a
paragraph. When placed between texts in a paragraph or a sentence, it distorts the overall
appearance and arrangement of the texts in the paragraph because it will take up the space it
needs vertically, pushing whole line of texts upward.
b. Square. This settings allows the image you inserted to be placed anywhere with the paragraph
with the text going around the image in a square pattern like a frame.
c. Tight. It is almost the same as the Square setting, but here the text “hug” or conforms to the
general shape of the image. This allows you to get a more creative effect on your document.
This setting can mostly be achieved if you are using an image that supports transparency like
.GIF or .PNG file.
d. Through. This setting allows the text on your document to flow even tighter taking the contours
and shape of the image. Again, this can be best used with .GIF or .PNG type of image.
e. Top and Bottom. This setting pushes the texts away vertically to the top and/or the bottom of
the image so that the image occupies a whole text line on its own.
f. Behind Text. This allows your image to be dragged and placed anywhere on your document
but with all the texts floating in front of it. It effectively makes your image look like a
background.
g. In Front of Text. This setting allows your image to be placed right on top of the text a s if your
image was dropped right on it. That means whatever part of the text you placed the image on,
it will be covered by the image.

25 | P a g e
ADRB
You are task to apply what you have learned about mail merge. Below is the form document
that will serve as your pattern for this activity. Create atleast 10 recipients and complete all the
information needed base on the form document. Make sure to save 2 documents such as the list or
data file and the merged document, name your file as your Last name and send it to me through
email.

Sources:

Empowerment Technologies Innovative Training Works Inc.

https://www.coursehero.com/file/32710444/Lesson-3pptx/

https://elenakitcats.wordpress.com/2018/02/23/the-journey-begins/

26 | P a g e
ADRB

You might also like