0% found this document useful (0 votes)
66 views5 pages

Lesson 1 Intro Yo Ict

The document discusses introduction to information and communication technologies. It covers topics like web 1.0 versus web 2.0, trends in ICT like social media and mobile technologies, internet threats, copyright infringement, and online research techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views5 pages

Lesson 1 Intro Yo Ict

The document discusses introduction to information and communication technologies. It covers topics like web 1.0 versus web 2.0, trends in ICT like social media and mobile technologies, internet threats, copyright infringement, and online research techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Lesson 1

INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES

A. OBJECTIVES:
 Compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges
 apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks
 use the Internet as a tool for credible research and information gathering to best achieve
specific class objectives or address situational challenges.
B. LESSON OUTLINE:
1. The current state of ICT technologies (i.e., Web 2.0, 3.0, convergent technologies, social,
mobile, and assistive media)
2. 2.Online systems, functions, and platforms Online safety, security, ethics, and etiquette
3. Contextualized online search and research skills

C. LESSON CONTENT:

Information and Communication Technologies (ICT)

Deals with the use of different communication technologies such as mobile phones,
telephone, Internet, etc. to locate, save, send and edit information.

ICT in the Philippines

 Philippines as the “ICT Hub of Asia” because of the huge growth of ICT-related jobs
around the country like call centers or BPO (Business Process Outsourcing) centers.
 Most Filipinos own a cellphone or two.
 Filipinos like to take selfies and share it in social medias.

Web 1.0: Static or Flat Page/ Stationary Page


 The web page is as is and cannot be manipulated by the user and the content is also the
same for all users.
Web 2.0: Dynamic Web Pages
 The user is able to see a website differently than others. Examples are social networking
sites like blogs, wikis and video sharing sites.
 Allows the users to interact with the page, instead of just reading a page, the user is able
to comment or create a user account.
Features of Web 2.0
1. Folksonomy – allows users to categorize and classify/ arrange information using freely
chosen keywords. (ex. Tagging) by using the pound sign at the start of the word/s or also
known as the hashtag.
2. Rich User Experience – content is dynamic and responsive to user’s input.
3. User Participation – the owner of the website is not the only one who is able to put
content.
4. Long Tail – services that are offered on demand rather than on a one-time purchase.
5. Software as a Service – users will subscribe to a software only when needed rather than
purchasing them.
6. Mass Participation – diverse information from various cultures
Trends in ICT
1. Convergence – is using several technologies to accomplish a task conveniently. Example
is instead of using the personal computer we can use the mobile phone to type
documents, sync files using the cloud technologies.
2. Social Media – According to Nielsen, global information and Measurement Company,
Internet users spend more time in social media sites than in any other type of site. With
this, more and more advertisers use social media to promote their product.
3. Mobile Technologies – mobiles are in demand today because of the capabilities of it to
do tasks of a personal computer and being able to use high-speed Internet.
4. Assistive Media – is a non-profit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user. Visit
www.assistivemedia.org for several audio recordings.

Tips to Stay Safe Online


1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/ Wi-Fi. Browsing in private mode will not protect you
from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites
11. Install and update an antivirus software on your computer. Use only one antivirus program
to avoid conflicts.
12. Wi-Fi network should have a password
13. Avoid downloading from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or clicks links from suspicious emails.

Internet threats

1. Malware or Malicious Software


a. Virus – a program designed to replicate itself and transfer from one computer to another
either through the Net and flash drives.
b. Worm – a transferable program from one computer by any means.
c. Trojan – a program that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get information.
d. Spyware – programs that runs in the background and has the ability to monitor what is
typed through keylogging.
e. Adware – a program designed to send advertisements and send malware.
2. Spam – unwanted email mostly from advertisers and can be used to send malware.
3. Phishing – acquire sensitive personal information like passwords and credit card details. It
is done by redirecting a user to a website that asked to update username, password, credit
card and personal information.

How to Avoid Copyright Infringement


a. Understand – Ideas can be expressed in our own words, but original source should be
acknowledged.
b. Be Responsible – even though a material has not had a copyright on it, be responsible to
know if something has a copyright.
c. Be Creative – add creativity to the material since it will be credited to you.
d. Know the Law – provisions for “fair use” means that intellectual rights may be used
without consent as long as it is used in commentaries, criticisms, search engines, news
reports, research, library archiving, teaching and education.

Online Research

 Some symbols can be used to narrow down searches.

Symbol Function

+ Finds web pages that contain all the terms that are predicted by the + symbol;
include terms that are usually ignored

“” Finds the exact words in a phrase

() Finds or excludes web pages that contain a group of words

AND or Finds web pages that contain all the terms or phrase
&

NOT or - Excludes web pages that contain a term or phrase

OR or / Finds web pages that contain either of the terms or phrases.

Note: NOT and OR functions should be capitalized or else it will be ignored.

 Look for Credible Sources – some blogs or wikis are not credible because information
can be edited by anyone. Double check information by reading different source or
reference about the topic.
 Give Credits – if information will be used for educational purposes, give credit to the
original source by using the format:

Name of the person or organization (the author of the information). Title of


the home page in italics (title of the title bar but is sometimes missing or
unrelated. URL. Date last seen.

D. DISCUSSION QUESTIONS:

Guide Questions Objective

1. Differentiate between web 1.0 and 2.0. Compare and contrast the nuances of
varied online platforms, sites, and
2. Rephrase the meaning of static webpage and content to best achieve specific class
objectives or address situational
dynamic webpage challenges

3. How would you classify the differences of

online platforms and websites?

4. Can you list the differences of Web

1.0 and 2.0?

5. Base on what you know, how would you

compare the stationary webpage

to dynamic webpage?

6. Name some tips to stay safe online and apply online safety, security, ethics,
and etiquette standards and practice in
explain it. the use of ICTs as it would relate to
7. What is the most fatal internet threat among their specific professional tracks

the given list? Why?

8. How will you avoid copyright infringement?

9. How do you search online using symbols?

10. What if, a reference material you need to use

for a school requirement is copyright

protected, can you still use it as reference

material or not? If yes, how?

11. Do you think that copyrighting books or

articles are important? Why?

12. What are the advantage and disadvantage in Use the Internet as a tool for credible
using the internet? research and information gathering to
13. Asses the value and importance of internet in best achieve specific class objectives
data gathering. or address situational challenges.
14. what would happen if there will be no
internet?
15. Explain the value of internet in in terms of
research?

E. LESSON ACTIVITIES / TASKS:

Activities OBE-Source

1. Group Participation

 Vlogging LO1.1 Creative and Critical Thinking


Form the class into 3. Create an
account in www.blogged.com.
Create an essay and published it
online topics are as follows (choose
only one):
a. ICT in the Philippines
b. Benefits of online search
versus library search
c. Copyright infringement, a
crime?
d. Internet threats

F. LESSON EVALUATION

Quiz Question Objectives


ENUMERATION (15 ITEMS) Compare and contrast the nuances
of varied online platforms, sites,
1. list the differences of web 2.0 and web 3.0? and content to best achieve
specific class objectives or address
situational challenges

2. Suggest 5 Tips on how to stay safe online. apply online safety, security,
ethics, and etiquette standards and
practice in the use of ICTs as it
would relate to their specific
professional tracks

ESSAY (5 POINTS) Use the Internet as a tool for


credible research and information
3. How does the internet help you in your study? gathering to best achieve specific
class objectives or address
situational challenges

BIBLIOGRAPHY

REX Book Store Empowerment Technologies. Innovative Training Works, Inc. First Edition p.
5-30

You might also like