ETech Module1 Qtr1
ETech Module1 Qtr1
ETech Module1 Qtr1
TECHNOLOGY
Quarter 1 – Module 1
ICT in the Context of Global Communication
Information and Communications Technology (ICT) often deals with the use of
different technological inventions like mobile phones, telephones, computer, Internet,
and other devices, as well as software and applications to locate, save, send, and
manipulate information. ICT has greatly contributed to how easy our lives has been
today. Our gadgets have become part of our necessity that we check on them after
we wake up. It made communication easier. We can use cellular phones that are
designed for communicating with other people even they are miles away from us. It
has also assisted us in our work since there are Internet-based jobs. It has
revolutionized our education and in the modernization of our economy.
ACTIVITY 1.1: Internet and Computer Readiness Test
Directions: Read and reflect each item carefully. State whether you agree or
disagree to each of the statements by drawing a happy face ( ) if you agree and a
sad face () if you disagree. There are no right or wrong answers for this activity.
Write your answers on your notebook.
SITUATIONS
1. I have reliable access to a computer, mobile phone, tablet, or any gadget that
can act as substitute to computers.
account?
2. I have access to a high-speed internet connection with video streaming
capabilities.
3. I have experience using email: I can create, send, forward, reply to, and save
email messages and attachments.
4. I have experience in word processing: I can create, edit, save, and navigate
documents using software program such as Microsoft Word or Pages for Mac.
2. 7.
3. 8. Encyclopedia Britannica
5. 10.
LESSON 1.1: ONLINE PLATFORMS AND SITES
Because of the wide capacity of Web 2.0, it has helped in creating dynamic
online platform sites. Online platform is a specially developed platform using Internet
technology. Online platforms have revolutionized access to any information. Online
platforms currently include, but are not limited to:
Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Media
Bookmarking Sites. These are sites that allow you to store and
manage links to various websites and resources.
Social News. These are sites that allow users to post their own
news items or links to other news sources.
Media Sharing. These are sites that allow you to upload and share
media content like images, music, and video. Media sharing sites
can be specific for video sharing, photo sharing, slide sharing,
social bookmarking, and gaming.
Blogs and Forums. These are websites that allow users to post
their content. Other users can comment on the said topic.
Cloud Computing
File Management
Mapping
Social Networks
Social News
Microblogging
Blogs and
Forums
WHAT I HAVE LEARNED
Reflect on the following questions and answer them briefly on your
activity notebook. Please refer to the rubrics on the next page.
2. How do the different online platforms help you as a student in your chosen
track?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Criteria Score
Completeness (5 points)
Does your response directly answer 5 4 3 2 1
each part of the question(s)?
Knowledge (10 points)
Does your response clearly show you
have read and understand the lesson
content by correctly defining key
terms, key persons and summarizing 10 - 9 8-7 6-5 4-3 2-1
concepts?
Have you made inferences based on
this knowledge to personal or modern-
day applications?
Writing Skills (5 points)
Do you write clearly, in complete
sentences, with minimal errors in 5 4 3 2 1
grammar and spelling?
LESSON 2: Online Safety, Security and Netiquette
The internet is the guiding technology of the Information Technology Age just
as the electrical engine was of the Industrial Age. In these times, more and more
people are already engaged in the use of technology. These people who are raised
in a digital, media-saturated world are called digital natives. No doubt, the Internet
has been very useful to us but with the rise of instant messaging, chat rooms, emails
and social networking sites, it can also bring trouble - from cyberbullying to more
serious Internet dangers, including exposure to sexual predators. Thus, internet
safety is always our primary concern.
Read the headlines found below and try to reflect on the questions that follow.
ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.
First Name
Middle Name
Last Name
Current and Previous
School/s
Your cellphone number
Complete name of mother
and father
Your parents’ cellphone
numbers
Name of Siblings
Your Address
Your Birthday
3. Based from your answers above, do you think you are safe when using the
Internet? Why?
______________________________________________________________
______________________________________________________________
______________________________________________________________
Lesson 2.1: Online Safety, Security and Netiquette
Online safety refers to the practices and precautions that should be observed
when using the internet to ensure that the users as well as their computers and
personal information are safe from crimes associated with using the internet. Below
are personal information that must be kept confidential.
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is
a reputable business having a secure service. To make sure that you are in a
secured network, the website address should begin with “https://’ as
opposed to “http://”. Never access your accounts by following an email link,
instead type your URL by yourself.
Regularly review your privacy settings in your online accounts to make sure
you are not sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data
before leaving.
A C
B D
4. Your parents bought you your first cellphone. How will you share your
cellphone number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities
to attack computers and retrieve sensitive data from individuals. Half the time, we
aren’t even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which utilize
HTTP or HTTPS protocols, but may also employ other protocols and components,
such as links in email or Instant Messaging apps, or any malware attachments on
servers that access the Web. They benefit cybercriminals by stealing information for
subsequent sale and help absorb infected PCs into botnets. Web threats pose a
broad range of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
Phishing happens when an email is sent from an internet criminal disguised
as an email from a legitimate, trustworthy source. The message is meant to
lure you into revealing sensitive or confidential information.
1. #_______________________
2. # _____________________
3. # ________________________ 4. # _____________________
5. # ________________________
WHAT I HAVE LEARNED
Reflect on this and write your answers in your notebook.
From all you have learned in Lesson 2, why is there a need to “think before you
click?”
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
REFERENCES:
1. ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/
tag/identity-theft. Retrieved on May 22, 2020.
2. National Center for Missing and Exploited Children. (n.d.). NSTeens: Can you keep it private. Retrieved from
3. Netiquette Quiz. Retrieved from https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm. Retrieved on May 22,
2020.
4. Quiambao, Angelito. (2018, Jul. 23). Online safety, security, ethics, and etiquette. Retrieved from https://
www.slideshare.net/AngelitoQuiambao/online-safety-security-ethics-amp-etiquette. Retrieved on May 22, 2020.
5. Belcic, Ivan. (2019, Nov. 7). What is pharming and how to protect against attacks. Retrieved from https://
www.avg.com/en/signal/what-is-pharming. Retrieved on May 22, 2020.
Images
1. https://twitter.com/Parkster00/status/1246347088625045504
4. https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html
5. Chua, Ryan (2011, May 24). ABS-CBN News. Are you a victim of cyber-stalking. Retrieved from https://news.abs-
cbn.com/nation/05/24/11/are-you-victim-cyber-stalking. Retrieved on May 22, 2020.
6. Andrade, Jeannette. (2012, June 2). Teen arrested for Facebook blackmail. Retrieved from https://
technology.inquirer.net/11673/teen-arrested-for-facebook-blackmail. Retrieved on May 22, 2020.
7. https://www.avg.com/en/signal/what-is-spyware
8. https://itigic.com/tag/adware/
9. https://dlpng.com/png/6702600
10. https://www.gtmaritime.com/free-phishing-penetration-test/
11. http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-to-benefit-consumers-says-globe-
telecom/
12. https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
Lesson 3: Effective Internet Research
The Internet has made our lives easier especially in terms of doing research.
By browsing the internet, we can access limitless topics. Web-based catalogs are
available in many libraries to assist researchers in locating printed books, journals,
government documents and other materials. The biggest obstacle facing all
researchers on the internet is how to effectively and efficiently access the vast
amount of information available (The Internet: Research Tools, 2013).
There are billions of information on the web and it is a challenge for us to truly find
which information is reliable and relevant. Here are some tips you may use to be
able to look for relevant and reliable sources:
Search Engines are websites used for retrieval of data, files, or documents
from data bases. Some search engines we use today are:
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic
term for all types of names and addresses that refer to objects on the
world wide web. Knowing the URL endings will give you clues to who is
sponsoring the website and help evaluate the sources.
https://www.searchenginejournal.com/alternative-searchengines/271409/#close
4 5
1 2 3 6 7
Popular Domains
Top- level Domains Country code top level domains
.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network
Search Skills and Tools
1. Boolean Logic – narrows, broadens, or eliminates search term.
a. Boolean “or” – this operator will find
pages that include either of the
search terms.
Ex. A or B
A B
A B
URL: _______________________________________________________
Title of Article: _______________________________________________
6. Accuracy. It refers to the credibility of the website. Evaluating a web site for
accuracy:
Reliability: Is the author affiliated with a known, respectable institution?
References: do statistics and other factual information receive proper
references as to their origin?
Is the information comparable to other sites on the same topic?
Does the text follow basic rules of grammar, spelling and composition?
Is a bibliography or reference list included?
Activity 3.3: Evaluating Websites: Checklist
This activity is adapted from the University of Maryland: Evaluating Web Sites: A Checklist
www.lib.umd.edu/tl/guides/evaluating-checklist
Directions:
1. Using the Internet, research on topics under CoVid-19 in the Philippines.
2. Read through the checklist and answer each question in your notebook.
3. Attach a printout of the web site you are evaluating and paste in your
notebook:
1. What is the URL or web address of the web site you are evaluating?
http://_____________________________________________________
2. What is the title of the web site? ____________________________________
In your own words, briefly describe the purpose of the web site:
______________________________________________________________
______________________________________________________________
What does the web site provide? Check one:
I couldn’t tell
Yes
No