0% found this document useful (0 votes)
12 views6 pages

Tle Grade 8 Hand Outs

The document outlines essential tools and equipment used in Information and Communications Technology (ICT), including software types, programming tools, and digital citizenship concepts. It emphasizes the importance of digital security, online behavior, and the impact of digital footprints on personal identity. Additionally, it highlights key Philippine digital laws and the significance of responsible technology use.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views6 pages

Tle Grade 8 Hand Outs

The document outlines essential tools and equipment used in Information and Communications Technology (ICT), including software types, programming tools, and digital citizenship concepts. It emphasizes the importance of digital security, online behavior, and the impact of digital footprints on personal identity. Additionally, it highlights key Philippine digital laws and the significance of responsible technology use.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

TLE GRADE 8

● Repositories and Collaboration Platforms


QUARTER 1- INFORMATION AND
COMMUNICATIONS TECHNOLOGY (ICT) Examples: GitHub, GitLab, BitBucket
● Compilers and Interpreters: Tools that
WEEK 1 translate code into executable programs
TOOLS AND EQUIPMENT IN ICT Examples: GCC (GNU Compiler Collection),
Clang, Python Interpreter, Node
*Definition of Terms
● Debuggers: Tools to test and debug code.
COMPUTER- is a programmable device that stores, Examples: GDB (GNU Debugger), LLDB,
retrieves and processes data. built-in debuggers in IDEs.
ICT- information and communications technology is
● Package Managers: Tools to manage
the infrastructure and components that enable
modern computing. software libraries and dependencies
APPLICATION- in computing, an application, or app Examples: NMP (Node Package Manager),
for short, is a software program designed to help a PPI (Python Package Installer), Maven,
computer user accomplish a task. Gradle, NuGet
HARDWARE- consist of physical parts of a ● Build Automation Tools: Tools to automate
computer system. the process of compiling code, running
SOFTWARE- is collection of instructions, data, or tests, and deploying applications.
computer programs used to operate computers Examples: Jenkins, Travis Cl, Circle CI, Make,
and execute specific task. Ant
COMMON TOOLS AND EQUIPMENT USED IN COMMON TOOLS AND EQUIPMENT USED IN
COMPUTER PROGRAMMING COMPUTER SYSTEM SERVICING
1. HARDWARE HAND TOOLS
● Computer: The primary device used for - when servicing computers, students need
writing code, running programs and testing tools like screwdrivers, pliers and anti-static
software. wristbands. These tools help with hardware
installation, repair and maintenance
● Desktop or laptop: Depending on
preference and requirements. DIAGNOSTIC SOFTWARE
2. SOFTWARE - students can used software tools to
● Integrated Development Environments diagnose hardware issues, check system
performance and troubleshoot problems.
(IDEs): Comprehensive tools that provide
editing, debugging, and compilation in one CABLE TESTER AND MULTIMETERS
place. - these tools help verify cable connections
Examples: Visual Studio Code, IntelliJ IDEA, and measure electrical parameters.
PyCharm, Eclipse, Xcode
● Code Editors: Lightweight alternatives to CLEANING KITS
IDEs for quick coding and scripting. - keeping computer dust free is essential for
Examples: Sublime text, Atom, Notepad optimal performance

● Version Control System (VCS): Tools to


manage changes to source code over time.
Examples: Git, Subversion (SVN), Mercurial
● BASE STATIONS- equipment that connects
mobile devices to a network in cellular and
radio communication. Example: Cell towers
2. SOFTWARE
● NETWORK MANAGEMENT SOFTWARE-
tools for monitoring, managing and
COMMON TOOLS AND EQUIPMENT USED IN troubleshooting network performance and
VISUAL ART connectivity.
1. DIGITAL CAMERAS AND SCANNERS-
students can capture images of their ● COMMUNICATION PROTOCOLS- software
artwork to create digital versions. protocols that define rules for data
2. GRAPHIC DESIGN SOFTWARE- these exchange over a network.
tools allow students to manipulate
● TELEPHONY SOFTWARE- applications for
images, create digital art and design
graphics. Example: Adobe Photoshop managing voice communication over
3. TABLETS AND DRAWING PADS- artist networks. Example: Skype
can create digital illustrations and SOFTWARE- is a set of instructions, data or
paintings. programs used to operate computers and execute
4. 3D MODELING SOFTWARE- for students specific task. It is the opposite of hardware, which
interested in 3D art and animation. describes the physical aspects of a computer.
Examples: Blender, Autodesk Maya Software is a generic term used to refer
COMMON TOOLS AND EQUIPMENT USED IN applications, scripts and programs that run on a
TELECOMMUNICATIONS device. It can be thought of as the variable part of a
1. HARDWARE computer, while the hardware is the invariable
part.
● MODEMS AND ROUTERS- devices that TYPES OF SOFTWARE
modulate and demodulate signals for The two main categories of software are
transmission over telephone lines or cable application software and system software. An
systems and route data between devices on application is software that fulfills a specific need
a network. Examples: DSL modems, cable or performs tasks. System software is designed to
modems, wireless router run a computer’s hardware and provides a
● SWITCHES AND HUBS- networking devices platform for applications to run on top of.
1. APPLICATION SOFTWARE- the most
that connect multiple devices within a common type of software, application
network, facilitating communication software is a computer software package
between them. Examples: Ethernet that performs specific functions for a user,
switches, network hubs or in some cases, for another application.
● REPEATERS AND EXTENDERS- devices that An application can be self-contained, or it
amplify or regenerate signals to extend the can be a group of programs that run the
range of a network. Examples: Signal application for the user. Examples of
boosters, Wi-Fi extenders modern applications include office suites,
graphics software, databases and database
● ANTENNAS- devices that transmit and management programs, web browsers,
receive radio waves for wireless word processors, software development
communication. tools, image editors and communication
platforms.
2. SYSTEM SOFTWARE- these software
programs are designed to run computer’s
application programs and hardware. System technologies such as voice recognition and
software coordinates the activities and screen magnifiers, can comfortably use the
functions of the hardware and software. In software.
addition, it controls the operations of the 2. COMPATABILITY- the suitability of the
computer hardware and provides an software for use in a variety of
environment or platform for all the other environments, such as with different OS,
types of software to work in. The OS is the devices and browsers.
best example of system software; it 3. EFFICIENCY- the ability of the software to
manages all the other computer programs. perform well without wasting energy,
Other examples of system software include resources, effort, time or money.
the firmware, computer language 4. FUNCTUALITY- software’s ability to carry
translators and system utilities. out its specified functions.
3. DRIVER SOFTWARE- also known as device 5. INSTALLABILITY- the ability of the software
drivers, this software is often considered a to be installed in specified environment.
type of system software. Device drivers 6. LOCALIZATION- the various languages, time
control the devices and peripherals zones and other such features a software
connected to a computer, enabling them to can function in.
perform their specific task. Every device 7. MAINTAINABILITY- how easily the software
that is connected to a computer needs at can be modified to add and improve
least one device driver to function. features, fix bugs and others.
Examples include software that comes with 8. PERFORMANCE- how fast the software
any nonstandard hardware, including performs under a specific load.
special game controllers, as well as the 9. PORTABILITY- the ability of the software to
software that enables standard hardware be easily transferred from one location to
such as USB storage devices, keyboards, another.
headphones and printers. 10. RELIABILITY- the software ability to perform
4. MIDDLEWARE- the term middleware a required function under specific
describes software that mediates between conditions for a defined period of time
application and system software or without any errors.
between two different kinds of application 11. SCALABILITY- the measure of the software’s
software. For example, middleware enables ability to increase or decrease performance
Microsoft windows to talk to Excel and in response to changes in its processing
Word. It is also used to send a remote work demands.
request from an application in a computer 12. SECURITY- the software’s ability to protect
that has one kind of OS. It also enables against unauthorized access, invasion of
newer application to work with legacy ones. privacy, theft, data loss and malicious
5. PROGRAMMING SOFTWARE- computer software.
programmers used programming software 13. TESTABILITY- how easy it is to test the
to write code. Programming software and software.
programming tools enable developers to 14. USABILITY- how easy it is to use the
develop, write, test and debug other software.
software programs. Example of
programming software include assemblers, LESSON 2
compilers, debuggers and interpreters. DIGITAL CITIZENSHIP AND ONLINE SAFETY

CHARACTERISTICS OF QUALITY SOFTWARE DIGITAL CITIZENSHIP- refers to the responsible and


1. ACCESSABILITY- the degree to which a appropriate use of technology. It encompasses
diverse group of people, including skills, knowledge and behaviors that help
individuals who require adaptive individuals effectively participate in a digital world.
By practicing good digital citizenship, students can recognizing the importance of secure
protect their personal information and respect the transactions.
rights of others online. 3. DIGITAL COMMUNICATION- means
DIGITAL ETIQUETTE- also known as netiquette, exchanging information using digital tools
refers to the proper and respectful behavior like emails, text messages and social media
expected from individuals when interacting online. post. It is crucial to communicate clearly
This includes using polite language, respecting and respectfully online.
others opinions and following the rules of online 4. DIGITAL LITERACY- is the ability to
forums and social media platforms. effectively find,evaluate, create and
DIGITAL LAW- pertains to the legal rights and communicate information using digital
restrictions governing the use of technology. It technologies. This includes understanding
includes understanding copyright laws, how to use devices, software and internet
cyberbullying regulations and the consequence of responsibly.
illegal downloads or hacking. Adhering to digital 5. DIGITAL ETIQUETTE- refers to the standards
laws is crucial for maintaining a safe and fair digital of conduct expected by digital technology
environment. users, Practicing good digital manners helps
DIGITAL RIGHTS AND RESPONSIBILITIES- outline the maintain a positive and nurturing online
freedom and duties of individuals in the digital environment.
space. It includes the right to privacy and freedom 6. DIGITAL LAW- encompasses the digital
of expression, as well as the responsibility not to rights and restrictions governing technology
harm others or engage in cyberbullying. Knowing use. It entails understanding rules regarding
these rights and responsibilities helps students privacy, intellectual property, and behavior
navigate the internet safely and ethically. online.
DIGITAL HEALTH AND WELLNESS- emphasizes the 7. DIGITAL RIGHTS AND RESPONSIBILITIES-
physical and psychological well-being of individuals highlight the freedoms extended to
using technology. It covers a range of topics from everyone in the digital world, along with the
managing screen time to protecting oneself from responsibilities to use these rights
online predators. Encouraging balanced and appropriately and ethically.
mindful use of technology can prevent issues such 8. DIGITAL HEALTH AND WELLNESS- focuses
as eye strain, poor posture and internet addiction. on the physical and psychological well-being
DIGITAL SECURITY- involves protecting one’s in a digital world. It includes managing
personal information and data from unauthorized screen time, preventing eye strain and
access. Simple measures like using strong ensuring cyberbullying does not occur.
passwords, enabling two-factor authentication and 9. DIGITAL SECURITY- involves protecting your
being cautious about sharing personal information personal information and understanding
can significantly enhance online security. how to responsibly handle your data. It
Understanding digital security helps prevent includes practices like using strong
identity theft and cyberattacks. passwords and recognizing phishing
schemes.
ELEMENTS OF DIGITAL CITIZENSHIP
1. DIGITAL ACCESS- refers to the equitable DIGITAL FOOTPRINTS AND IDENTITY
distribution of technology and online
resources. All students should have equal DIGITAL FOOTPRINTS- is the trail of data that
opportunities to use technology for learning individuals leave behind when they use the
and growth. internet.
2. DIGITAL COMMERCE- involves buying and DIGITAL IDENTITY- refers to the online persona that
selling goods and services online. It includes is created through your digital footprints.
understanding safe buying practices and
A digital footprint is a trail of data that individuals when browsing the internet to protect your
leave behind when they use the internet. This data from being intercepted.
includes all the information that is shared both COMPONENTS OF DIGITAL IDENTITY
intentionally and unintentionally, through various ● PERSONAL INFORMATION- this includes
online activities such as social media interactions, your name, date of birth, address and other
website visits, emails and online shopping. identifying details.
Digital footprints can be categorized in two types: ● PROFESSIONAL INFORMATION- this includes
1. ACTIVE DIGITAL FOOTPRINTS- these are your employment history, professional
data trails you leave intentionally, such as skills, and educational background, often
posts on social media, blog entries, or any found on platforms like LinkedIn.
other content you actively upload or share ● SOCIAL INFORMATION- this includes your
online. social media activity, such as posts, likes,
2. PASSIVE DIGITAL FOOTPRINTS- these are comments and the networks you are part
data trials you leave unintentionally, such as of.
cookies that track your browsing habits. IP ● BEHAVIORAL INFORMATION- this includes
addresses and other metadata collected by your browsing habits, purchase history and
websites and online services. other online behaviors that can be tracked
and analyzed.
IMPORTANCE OF DIGITAL FOOTPRINTS
● PRIVACY AND SECURITY- the data you leave RISK ASSOCIATED WITH DIGITAL IDENTITY
behind can be used to build a profile about ● IDENTITY THEFT- cybercriminals can use
you, which can be exploited for malicious your personal information to steal your
purposes such as identity theft or targeted identity.
cyber-attacks. ● REPUTATION DAMAGE- negative
● REPUTATION MANAGEMENT- your digital information or inappropriate content
footprint can affect your reputation. associated with your digital identity can
Employers, colleges and other entities often harm your personal and professional
search for online information about reputation.
candidates and inappropriate content can ● DATA EXPLOITATION- companies can
have negative consequences. exploit your digital identity for targeted
● PERSONALIZATION- company used digital advertising and other commercial purposes
footprints to personalized user experiences without your explicit consent.
such as recommending products or content PROTECTING YOUR DIGITAL IDENTITY
based on browsing. ● STRONG PASSWORDS- use strong, unique
MANAGING YOUR DIGITAL FOOTPRINT passwords for different online accounts and
● PRIVACY SETTINGS- regularly review and change them regularly.
adjust the privacy setting on your social ● TWO-FACTOR AUTHENTICATION- enable
media accounts and other online services to two-factor authentication for an added
control who can see your information. layer of security.
● SEARCH YOURSELF- periodically search for ● BE SKEPTICAL OF PHISHING- be cautious of
your own name on search engines to see emails, messages or websites that ask for
what information is publicly accessible. personal information.
● THINK BEFORE YOU POST- consider the long ● REGULAR MONITORING- keep an eye on
term impact of the content you share your online accounts for any suspicious
online. Once something is posted, it can be activity.
difficult to remove it completely.
● USE SECURE CONNECTIONS- ensure that THE PHILIPPINE DIGITAL LAWS
you are using secure (HTTPS) connections
ICT-RELATED LEGAL BASES
RELEVANCE AND IMPACT OF KEY PHILIPPINE
DIGITAL LAWS
1. REPUBLIC ACT NO. 10844-DEPARTMENT OF
INFORMATION AND COMMUNICATIONS
TECHNOLOGY ACT OF 2015- this law
created the department of Information and
Communications Technology (DICT), which
is responsible for planning, developing and
promoting the national ICT development
agenda. It ensures that there is adequate
infrastructure to support digital activities,
including digital access, cybersecurity
measures and ICT services. It is tasked to
promote digital literacy and ensure that ICT
services are accessible to all Filipinos.
Protection and Regulation
The DICT is responsible for implementing
cybersecurity policies and programs to protect
users from cyber threats. It works in conjunction
with other agencies to ensure the protection of
personal data.

You might also like