Lesson 1
Lesson 1
Lesson 1
Website is a combination of different web pages linked together in a certain fashion according to
the designer’s will and organizational need served through the same domain name server. The
A webpage ICT or Information and Communications Technology is the umbrella that includes
any communication device or application, encompassing: radio, television, cellular phones, computers,
etc.
It is a term that can be easily understood by subdividing the meaning further into the words that
Information is technically referred to as data (once processed in a computer) which is accurate and
timely committed and organized for a purpose. Communication, on the other hand, is the conveying of
information between two or more people through a specific medium. While Technology is the
acquisition, analysis, manipulation, storage and distribution of information; and the design and
The way we communicate has been greatly influenced by ICT in so many ways. In terms of
convenience, time, and money, ICT paved the way to these evolutions.
handled, thus enabling governments, organizations, industries and ordinary individuals to improve on
ICT- deals with the use of different communication technologies such as mobile phones, telephone,
Internet to locate, save, send and edit information. It is a study of computers as data processing tools.
Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which
is BPO, Business Process Outsourcing, or call centers. ICT Department in the Philippines is
responsible for the planning, development and promotion of the country’s information and
The first stage of World Wide Web when most webs were entirely made up of web pages connected
by hyperlinks more commonly described as static. Static (also known as flat page or stationary page)
in the sense that the page is “as is” and cannot be manipulated by the user. The content is also the
2. Web 2.0
The evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website differently
than others—and it provides a deep and rich experience. This pertains to the current state of online
technology as it compared to the early days of the Web, characterized by greater user interactivity
and collaboration, more pervasive network connectivity and enhanced communication channels.
1. Folksonomy.
It allows users to categorize and classify/arrange information using freely chosen keywords
(e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags
that start with the pound sign (#). This is also referred to as hashtag.
Content is dynamic and is responsive to user’s input. An example would be a website that
shows local content. In the case of social networking sites, when logged on, your account is used to
3. Long Tail.
Services are offered on demand rather than on a onetime purchase. In certain cases, timebased pricing
is better than file-size-based pricing or vice versa. This is synonymous to subscribing
to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that
4. User Participation.
The owner of the website is not the only one who is able to put content. Others are able to
place a content of their own by means of comment, reviews, and evaluation. Some websites allow
Users will subscribe to a software only when needed rather than purchasing them. This is a
cheaper option if you do not always need to use a software. For instance, Google Docs is a free
web-based application that allows the user to create and edit word processing and spreadsheet
documents online. When you need a software, like a Word Processor, you can purchase it for a onetime
huge amount and install it in your computer and it is yours forever. Software as a service allows
6. Mass Participation.
It is a diverse information sharing through universal web access. Since most users can use
the Internet, Web 2.0’s content is based on people from various cultures.
3. Web 3.0
This platform is all about semantic web. Semantic Web is a movement led by the World
According to the W3C, “The Semantic Web provides a common framework that allows data
The aim of Web 3.0 is to have servers (machines) understand the user’s preferences to be
able to deliver web content specifically targeting the user. For example, while using social media,
have you experienced being shown advertisements, pages or groups similar to what king of ads,
groups and pages you usually interacted with or liked. It’s labeled as based on groups or pages you
liked.
TRENDS IN ICT
1. CONVERGENCE
or task.
2. SOCIAL MEDIA
Social media is a website, application, or online channels that enable web users to create, cocreate,
1. Social Networks. that allow you to connect with other people of the same interest or background.
Example: Facebook, Google+
2. Bookmarking Sites. These are sites that allow you to store and manage links to various websites
3. Social News. These are sites that allow users to post their own news items or links to other news
4. Media Sharing. These are sites that allow you to upload and share media content like images,
5. Microblogging. These are sites that focus on short updates from the user. Example: Twitter
6. Blogs and Forums. These websites allow users to post their content. Example: Blogger,
WordPress, Tumblr
3. MOBILE TECHNOLOGIES
The popularity of smartphones and tablets has taken a major rise over the years. This is largely
because of the devices’ capability to do tasks that were originally found in personal computers.
b. Android – an open source OS developed by Google. Open source means mobile companies use
d. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft.
4. ASSISTIVE MEDIA
Assistive media is a nonprofit service designed to help people who have visual and reading
5. CLOUD
Distributed computing on the internet or delivery of computing service over the internet. Example:
Gmail, Yahoo!
VI. Agreement
For Learning Activity please write your answer on the Worksheet/Activity sheet provided or
on a one whole sheet of paper. You will pass the activity on Friday. You may also take a photo of
You should also check your LMS account for some announcement and or/ online quizzes.
VII. Assessment
online at the time of our online learning which is listed on the assignment section.
VIII. Reference
Rex publishing. (2016). Empowerment Technologies (1st ed., pp. 2-15). Manila.
DepEd. (2020). K-12 Most Essential Learning Competencies with Corresponding Codes [Ebook]
Prepared by:
Subject Teacher
Checked by:
Recommended by:
Approved by:
Being a vast sea of information is one of the key features of the Internet. it is such a big repository of
data that
is believed that one could find out something about anything on the internet. Developing the necessary
knowledge
and skills in online searching, however, is the key to maximizing its use.
SEARCH ENGINE
A search engine is a software system designed to search the Internet for documents related to the
keyword
or search word used or entered into the system. Users are able to maximize the potential of search
engines by
• Crawler-based search engine - It uses a spider or a crawler to search the Internet. The crawler digs
through individual web pages, pulls out keywords, and then adds the pages to the search engine's
• Directories - depend on human editors to create their listings or database. There are two types of
directories: (1) academic and professional directories which are often created and maintained by subject
experts to support the needs of researchers; and (2) commercial and portal directories that cater to the
• Hybrid search engine uses both crawler based searches and directory searches to obtain their results.
• Meta search engines - transmit user supplied keywords simultaneously to several individual search
engines to carry out the search. In this type of search engine, duplicates can be eliminated and
clustering
ONLINE RESEARCH
In the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also provisions
for
“fair use”.
• Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine the most
• Advanced Search- The best way to filter information you get from search engines is by using the
advanced
search.
• Look for a credible source- Some wikis, filled with updated information, are not a credible source.
When using
wikis, check out the link of the cited texts.
• Give credit- Give credit to the original author of the page or information. To properly site a reference,
you may
document type.
7. Mail Merge – a feature that allows you to create a document and merge them with
8. Text Wrap – adjusts how the image behaves around other objects or text
Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It
features
calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for
Applications.
• Column Heading – the box at the top of each column containing a letter
• Cell Reference – the cell address of the cell usually combine letter and number (ex. A1, B4, C2)
• =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the numbers within the range)
• =PRODUCT(x,y) – returns the product of x and y
OTHER FUNCTIONS
• =COUNTIF(range, criteria) - count the number of cell that fits with the criteria within the range
Presentation Software – is an application software that allows users to create visual aids for
presentations
• OpenOffice.org Impress
• LibreOffice Impress
• Powerdot
• Microsoft PowerPoint
as a slide deck.
• Design Template – pre-designed graphic styles that you can apply to your slides.
• Slide Show – a collection of pages arranged in sequence that contain text and images for presenting to
an
audience.
• Animation – is a set of effects which can be applied to text or graphics within a slide.
• Transition – are motion effects that when in Slide Show view add movement to your slides as you
advance
• Normal View - simplified layout of the page so you can quickly key, edit, and format the test.
• Notes Page View - displays your slides on the top portion of the page, with the speaker notes for each
slide
• Outline View - displays all of the text in a PowerPoint slide show in outline form regardless of the
design,
Presentation Software – is an application software that allows users to create visual aids for
presentations
below:
▻ Click Blank.
2. Draw two objects in the form of a man using PowerPoint’s shapes. To do this, follow the
steps below:
▻ Click Shapes and select the appropriate shapes as shown on the figure using a black fill color for the
two
men, dark red for the ball and green for the rectangular ground.
3. Right-click the slide thumbnail on the Slides pane and click Duplicate Slide.
4. Move the right hand of the first man a little backward as shown :
5. Right-click the first slide thumbnail on the Slides pane and click Copy.
6. Paste the slide after the second slide on the Slides pane.
9. Click Add Animation and then select More Motion Paths. Add Motion Path dialog box will appear.
10. Click Arc Up and then click OK. The motion path will look similar to the one below. Adjust the motion
path
such that the arrow is extended up to the hands of the second man.
11. Make sure the motion path is still selected. Click Animation Pane on the Advanced Animation group.
12. On the Animation pane, click the drop-down arrow on the Oval animation and then select Effect
Options.
3. Click OK.
second). Make sure that the same timing is selected to the other two slides.
6. Check your output > Go to the first slide and click Slide Show view button.
Empowerment
I. Content Standard
a. Ethical issues in society and various ways to protect the moral of personal information Various
types of websites.
b. Risks and safeguards associated with Internet and network attacks, unauthorized access and use,
software theft, information theft, and hardware theft, vandalism, and failure.
a. Independently compose an insightful reflection paper on the nature of ICT in the context of their lives,
b. Problem Solving exercises by seeking solutions to practical problems with technology that students
a. Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it
a. PowerPoint Presentation
b. Links
c. Worksheets
V. Routinary Activities
a. Prayer
May the darkness of sin and the night of unbelief vanish before the light of the Word and the Spirit
of grace and may the Heart of Jesus live in the hearts of all. Amen.
b. Attendance
The subject teacher checks the attendance on their meeting day through the classroom attendance
The subject teacher will recap the past lesson that has been discussed last meeting about the
d. Motivation
What should we do in order to be safe from the negative impact of using Internet?
_______________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
✓ A digital security risk is any event or action that could cause a loss of or damage to a computer
✓ Any illegal act involving the use of a computer or related devices generally is referred to as a
computer crime.
as a zombie
Cracker Someone who accesses a computer or network illegally but has the intent of
s Has the same intent as a cracker but does not have the technical skills and
knowledge?
Corporate Spies Unlawful theft/acquisition of intellectual property, such as key trade secret
Unethical Employees an action that falls outside of what is considered morally right or proper for a
technology infrastructure.
Cyber Terrorist Someone who uses the Internet or network to destroy or damage computers
for political reasons.
✓ A back door is a program or set of instructions in a program that allow users to bypass security
controls.
✓ Spoofing is a technique intruder use to make their network or Internet transmission appear legitimate
✓ A firewall is hardware and/or software that protects a network’s resources from intrusion
✓ Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities
➢ Access controls define who can access a computer, device, or network; when they can access
➢ The computer, device, or network should maintain an audit trail that records in a file both
-User name
-Password
associated with a user name that allows access to certain computer resources
✓ A PIN (personal identification number), sometimes called a passcode, is a numeric password, either
✓ A possessed object is any item that you must possess, or carry with you, in order to gain access to a
code that is compared with a digital code in a computer or mobile device verifying a physical or
behavioral
characteristic.
➢ Hand geometry
✓ Digital forensics is the discovery, collection, and analysis of evidence found on computers and
networks.
✓ Law Enforcement
✓ Criminal prosecutors
✓ Military Intelligence
✓ Insurance Agencies
SOFTWARE THEFT
Many manufacturers incorporate an activation process into their programs to ensure the
During the product activation, which is conducted either online or by phone, users provide
the software product’s identification number to associate the software with the computer or mobile
INFORMATION THEFT
✓ Encryption is a process of converting data that is readable by humans into encoded characters
✓ A website that uses encryption techniques to secure its data is known as a secure site.
• There are a number of security concerns related to computers that users should be aware of,
including:
✓ Having a PC stolen
• Hardware loss: Can occur when a portable PC, USB flash drive, mobile device, or other piece of
✓ Hardware can be stolen from homes, businesses, cars, airports, hotels, etc.
✓ Often for the value of the hardware, but increasingly for the information that might be contained
on the hardware.
Failure
equipment locks
✓ Cable locks
✓ Security slots
✓ Use encryption to protect data
o Increasingly used with USB flash drives, notebook PCs, hard drives, etc.
✓ Most often used with PCs but also available for other devices.
✓ Kill switch: Software used to destroy sensitive data on a stolen or lost PC.
• Other precautions:
✓ Common sense
hardware.
⚫ Uninterruptible power supply (UPS): Provides continuous power to a computer system for a period of
✓ Continuous data protection (CDP): Enables data backups to be made on a continual basis.
a disruptive event.
o Hot sites
✓ Occurs when:
o Large-scale operations in which programs and packaging are illegally duplicated and
• Digital counterfeiting: The use of computers to make illegal copies of currency, checks, collectibles,
✓ Holograms: Printed text or images attached to a product that change their appearance when the
product is tilted.
✓ Digital watermarks: Subtle alteration to a digital item that is not noticeable but that can be
retrieved to identify the owner of the item.
Information privacy: Rights of individuals and companies to control how information about them is
Many data breaches recently due to lost or stolen hardware, carelessness with documents
Businesses need to be concerned with the expense, damage to reputation, and possible
lawsuits.
Marketing database: Collection of data about people, used for marketing purposes Data obtained
Government database: Collection of data about people, collected and maintained by the government
Tax information, Social Security earnings, personal health records, marriage and divorce information
Electronic profiling
✓ Ads from companies a person has done business with are also considered to be spam by many.
• Other annoyances
✓ Pop-up ads
✓ Pop-under ads
✓ Telemarketing
✓ Use a throw-away e-mail address (an extra e-mail address that you can use for activities that might
result in spam).
➢ Get a second e-mail address from your ISP or from Hotmail, Yahoo! Mail, or Gmail.
✓ Can use privacy software, such as the free Privacy Bird program.
✓ Delete your browsing history and e-mail settings when using a public computer.
Use an e-mail filter to automatically route possible spam into a special folder to deal with later.
✓ Do Not E-Mail Registry: May be a possibility for the future, but more difficult to implement.
✓ Automatic encryption systems for e-mail can help sensitive data from accidentally being
revealed.
✓ Wipe (not just delete) data on hard drives before disposing of a computer or hard drive.
✓ Can be used by hacker to capture usernames, passwords, and other sensitive information
✓ Public streets
Employee monitoring: Observing or reviewing employees’ actions while they are on the job.
✓ Video cameras
✓ Proximity cards
Presence technology: Enables one computing device to locate and identify the current status of another
device on the same network.
✓ Can use antispyware software to detect if someone is monitoring your computer usage.
✓ Employers have a responsibility to keep employee and customer information private and
secured.
✓ Employees should be familiar with their company’s employee policy and avoid personal activities
at work.
Technology ethics are the guidelines that govern the use of computers, mobile devices,
✓ Intellectual property refers to unique and original works such as ideas, inventions, art, writings,
✓ Intellectual property rights are the rights to which creators are entitled to their work.
✓ Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies,
INFORMATION PRIVACY
✓ Information privacy refers to the right of individuals and companies to deny or restrict the collection,
✓ Websites often collect data about you, so that they can customize advertisements and send you
Technology Module 4
Ellaine M. Lacatan
Subject Teacher
____________________
Name of Student
I. Lesson Proper
1. Evaluate existing online platforms and applications in developing ICT content in your own specific
Presentation or Visualization – this is an online platform that allows you to present and share
presentations,
groups of remote servers are networked so as to allow sharing of data-processing tasks, centralized data
storage,
Cloud Computing is a platform often referred to simply as “the cloud”. In other words, instead of using
your
computer’s hard drive, you store and access your data and programs over the Internet.
• Social Media – dictionary.com also defines Social Media as “websites and other online means of
communication
that are used by large groups of people to share information and to develop social and professional
contacts”.
Social Media –The information shared can be in the form of ideas, pictures, videos or anything that you
want to create and share to the virtual communities. The information you share will be the basis of the
people to interact, share content and collaborate with you and the large group of people.
• Web Page Creation – this is an online platform that lets you build a web page that includes colors, text,
images,
and often contain links to media such as video and audio. The platform does not require any web
programming
skill as they provide a drag and drop interface and free hosting as well.
• File Management – this is an online platform that allows you to convert and manage files like images,
video,
documents, audio and more to other formats without downloading software tool.
The most important factor in web design is the end user. So, in designing your own web pages,
remember the
following principles:
• Use contrasting colors between text and background (dark over light or vice versa). Create the most
contrast in
• Avoid too large or too small font size. Avoid too many typefaces too.
• Use common font style to similar items across the web pages.
• Images used should follow the rule of thirds as a rough guideline. “The rule of thirds states than an
image is most
pleasing when its subjects or regions are composed along imaginary lines which divide the image into
thirds —
• There should be a balance distribution of heavy and light elements on the page.
• Proper alignment of text and images in a web page helps maintain consistency in design.
• Create a pattern which will make your page easier to use, remember and understand
• “Paradox of choice means the more choices you provide, the easier for others to choose nothing.”
Hence, you
• Know the purpose of your web page so you could match the content with the purpose.
• Content should be updated. Always add something new to your content. If you have nothing to add,
you can pick
http://www.web-source.net/free_articles.htm or
http://www.web-source.net/free_ebooks.htm
• Just make sure to acknowledge the author or include the author’s resource box.
• Minimal design does not always mean an effective design. However, when choosing between simple
and the
opposite, the former is always a better choice than the latter. Hence, strive to have a simple design.
Web design elements are building blocks of a webpage. Here are the basic elements that were
handpicked and
• Illustrations include lines, shapes, texture and color which are fundamental
• Lines are used to organize, connect, and separate information and design
elements. Combined with shapes, color, and texture they give us a visual
• Links are the most basic interface on web pages. Links should be distinctive in color from other types
of text in a
webpage. Keep links and regular text styled consistently to avoid users from thinking whether or not the
text is a
link.
• Just like links, buttons and menus are also essential to web pages and they too need consistent styles.
• Images also aids in communicating your message to the viewers. Aside from being used as fillers,
images also
• Use specific images that are related to your content so that it will draw attention not only to the
content but to
• In this kind of platform, no coding skills are required. Instead, you manipulate with design components
using an
editor window and get the chance to choose what elements are placed on your page.
• Web templates are unique full page layout that contains generic information which can be replaced by
the users
• Slideshare – you can use this to upload and share your professional videos and slide presentations.
• Google Drive – you can use this to backup your files in the cloud and access them anywhere. You can
also use
• Tumblr – you can use this to share text, photos, quotes, links, music, and videos from your browser,
phone,
desktop, email or wherever you happen to be. This is a microblogging service that has recently become a
popular
• Wix – you can use this to create your web site or mobile site.
d. Click Signup.
e. When the signup is successful, the page below will be displayed and you’re on your way to become
one of the
Sliders.
f. For the meantime, log out to your SlideShare account by hovering to the face and then click Logout.
If you already have a Gmail account, then you don’t need to create another account since Google
implements a
a. Go to Google and type www.google.com in the address bar of your browser. The homepage of Google
will
appear as shown:
e. Fill out your profile information. At the end of the form, do not forget to click the “I Agree…” check
box.
Welcome Page will appear. This means that you are now ready to use Google Drive. In Google Drive, you
can
create a folder, upload a file, create Google Docs, Sheets and Slides, and even Google Forms, Drawings
and
Maps. Before you can do that, click Google Apps and select Drive Click New and everything follows.
Google offers
• Play - is the official app store of Google for Android smartphones and tablets.
• News - is a computer-generated news site of Google whose news is aggregated from sources all over
the world.
• Translate - is a multilingual service provided by Google to translate text, speech, images, or real-time
video from
• Photos - is the newest app of Google which provides a photograph and video sharing and storage
service for
Google users.
a. Go to Tumblr by typing www.tumblr.com in the address bar of your browser. The Tumblr homepage
will appear
as shown:
b. Click Next.
c. Click I’m not a robot box and then answer what is asked.
d. Welcome page will be displayed. You will be asked to select and follow five blogs to get started.
However, to
e. You will be asked to verify your email address as shown below. So create a new tab and go to your
gmail
i. Click Done. Your gmail account will be loaded and a welcome message will appear. Close the welcome
message.
j. In your Inbox, click the message of Tumblr asking for your confirmation.
l. The page below will appear when the verification is successful. Click skip to your web dashboard.
m. Close the tab and go back to your gmail account. Sign out to your gmail account, close the tab and
then go
back to Tumblr.
n. To log out your Tumblr account, click the face account and then click Log out.
a. Go to Wix by typing www.wix.com in the address bar of your browser. Wix homepage will appear as
shown
below:
c. If you want to sign in using your social media account on Facebook or Google, click the corresponding
button.
However, you can also sign in using your available email. Enter your email and password and then click
Go.
f. Select a category. Customizable templates will be displayed for you to choose from according to the
selected
category. If you are not decided on what category to use, choose anything and the selection can be
changed later.
h. To log out to your Wix account, hover to the arrow beside your username and then click Logout.