MIL NLC Finals - Melc1 2 LM AS
MIL NLC Finals - Melc1 2 LM AS
MIL NLC Finals - Melc1 2 LM AS
Title of the Lesson: Opportunities, Challenges, and Power of Media and Information
I. Learning Competencies
Cite an example of an issue showing the power of media and information to affect change.
So, here are the opportunity and challenges in media and information. First, we will
take a look in the opportunity.
Television Broadcaster
A television presenter presents information relating to subjects such as
news and sports, and may also be responsible for planning the creative content
of a series. Such experts will work with news programs and help to discuss
important topics in reporting, as well as provide comments on various events.
They might also formulate interview questions, read scripts, and reveal details
about the show, such as commercial breaks.
Mobile Communication
A means of technology mediated communication that allows the user of a
mobile device to connect with someone else at a different location, such as texting
from a cell phone and sending email from a computer device equipped with WiFi (e.g.
laptop, iPad).
A mobile phone is a wireless portable device that allows users, to make and
receive calls, and send text messages. The first mobile phone generation would only
be able to make and receive calls. Today’s mobile phones are packed with many
additional features like web browsers, games, cameras, video players and even
navigation systems.
https://www.freepik.com/free-vector/instagram-concept- with-smartphone_
2584202.htm#page=1&query=mobilecommunication&position=37Television
So, we have two opportunities in media and information, first television broadcaster and mobile
communication. But have you wondered, what makes television broadcaster and mobile
communication an opportunity in media and information?
Let me share it to you, media plays a big role in sharing and disseminating information.
Through media, people now a day’s can easily catch up news and be updated because of television
broadcaster. In the other side, mobile communication can make our life easier. No need to write a
letter if you want to ask allowance to your mom instead just text and call. How amazing isn’t?
Now, take a pause for a while, think in your own understanding, what is the reason why
television broadcaster and mobile communication is an opportunity?
Cybercrime
Cybercrime is defined as a crime in which
a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to
commit an offense (child pornography, hate
crimes). Cybercriminals may use computer
technology to access personal information,
business trade secrets or use the internet for
exploitative or malicious purposes.
Source: Technopedia. 2018. Cybercrime Access at: https://www.techopedia.com/definition/2387/cybercrimeHacking
Here are the four types of cybercrime:
Page 1 of 10
1. Hacking is the most common type of cybercrime committed across the world. Hacking is a crime
which entails cracking systems and gaining unauthorized access to the data stored in them.
Hacker is a person who breaks in to a computer system.
2. Virus dissemination. Virus is the programs which attach themselves to the computer or file and
then circulate themselves to other files and to other components on a network. They usually affect
the data on the computer, either by altering or deleting it.
3. Cyber stalking is use of internet or other electronic means to stalk someone. It is online
harassment and online abuse. Mostly cyber stalking involves following a person’s movement
across the internet by posting threatening messages to the victim or by entering the chat rooms
frequented by the victim or by constantly bombarding the victim with the e-mails etc.
4. E-mail Spoofing. An e-mail that appears to originate from one source but actually has been sent
from another source. This can also be termed as e-mail forging.
Phishing
Phishing is a cybercrime in which a target or targets
are contacted by email, telephone or text message by
someone posing as a legitimate institution to lure
individuals into providing sensitive data such as
personally identifiable information, banking and credit
card details, and passwords.
Always remember, your personal information’s are always confidential. No sharing and posting
personal information’s over the internet. This is to protect yourself from these cybercriminals.
Another, let me show you the examples of the power of media and information to affect change.
Fake News
Fake news is defined as stories that were circulated which have been determined to be
unambiguously false. Typically, stories were debunked by fact-checking websites. The majority of
fake news is produced and posted on small websites that do not have a significant presence other
than producing political stories that get shared on Facebook and other forms of social media. One
way or another people find these stories engaging and share them a lot with friends. The kind of
stories you’re likely to share are surpising or potentially important. In the survey, 14% of people said
social media was their most important source of election news information, and 14% is not nothing,
but it’s certainly not the case that social media was the main place where voters got information in
this election. Snopes.com and Politifact.com are examples of fact-checking sites. Intentionally
deceptive fakes news are news stories created entirely to deceive readers. The 2016 US election was
rife with examples claiming that “x celebrity has endorsed Donald Trump”, when that was not the
case. Humour sites such as the Onion or Daily Mash present fake news stories in order to satirize
the media. Issues can arise when readers see the story out of context and share it with others.
Cyberbullying
Cyberbullying is bullying that takes place using electronic technology. The use of technology
to harass, threaten, embarrass or target another person. School children, young girls, and women
can fail prey to onie attacks which can creae tension and distress. If one is a victim of cyberbullying,
it is encouraged to try to take appropriate legal action against the attacker.
Social Media Addiction
Many companies have blocked social networks on their office Internet as addicted employees
can distract themselves on such sites, instead of focusing on work. In fact, studies show that British
companies have lost billions of dollars per year in productivy because of social media addiction among
employees.
Privacy
If one is not careful, what one posts on the internet can come back to haunt him. Revealing
personal information on social sites can make users vulnerable to crimes like identity theft, stalking,
etc. Many companies perform a background check on the Internet before hiring an employee. If a
prospective employee has posted something embarrassing on social media, it can drastically affect
their chances of getting the job. The same holds true for our relationships too, as our loved ones and
friends may get to know if we post something undesirable on social networks.
Page 2 of 10
Social Media and Its Implications
Some of the impact of social media on politics are:
➢ It has inspired mass movements and political unrests in many countries.
➢ It has played important roles in elections.
➢ It served to rally people for a cause.
Freedom of Expression
It is one of our fundamental rights. It is our right to express our concerns to the government.
Freedom of expression is not absolute. Some of its limitations include obscenity, contempt, libel, and
right to privacy.
Freedom of Information
The right to information is also the right of the people to information on matters of public
concern. It also means that the people should also have access to official records, and to documnts
and papers pertaining to official acts, transactions, or decisions, and research data. FOI laws also
typically set lmits of access or grounds for refusal of requests.
Citizen Journalism
It is the collection, dissemination, and analysis of news and information by the generl public,
especially by means of the Internet. When private individuals do essentially what professional
reporters do – report information.
III. Directions/Instructions:
1. Write your name, grade, and section in the Activity Sheet. No name, no grade!
2. Always submit the Activity Sheets to your teacher. Write legibly and use black ink only.
3. Have your learning outputs signed by your parents or guardians for submission.
4. Be mindful of the standard rubric for scoring of your written works and performance tasks.
5. Keep this LAS for your ready-reference.
Page 3 of 10
IV. Activity: Refer to MIL AS, see Activity 1.1 A Creative Mind Map
Direction: Create a mind map showing the challenges brought by social media to yourself. You
can use colors, and symbols for your drawing on a 4-size bond paper or on a 1/8-size
illustration board. Be creative. Computerized output is encouraged.
Exercise 1 (Self-Check)
Direction: Match column A to column B. Choose the best answer, and write in the space provided
before each number.
Column A Column B
___ 1. It is a cybercrime in which a target or targets are contacted by email, A. Cyberstalking
telephone or text message by someone.
___ 2. A type of cybercrime that is the most common type of cybercrime B. Cybercriminals
committed across the world.
___ 3. It is the program which attach themselves to the computer or file and C. Hacker
then circulate themselves to other files and to other components on a
network.
___ 4. These professionals may work for news programs and help research D. Hacking
important stories to discuss as well as provide commentary about
different events.
___ 5. It is online harassment and online abuse it involves following a person’s E. Cyberbullying
movement across the internet by posting threatening messages to the
victim.
___ 6. It is a wireless handheld device that allows users to make and receive c It F. Virus
is a wireless handheld device that allows users to make and receive calls
and to send text messages, among other features.
___ 7. A form of technology-mediated communication that enables the user of a G. E-mail Forging
mobile device to communicate with someone in a different location
messages, among other features.
___ 8. They use computer technology to access personal information, business H. Mobile Phone
trade secrets or use the internet for exploitative or malicious purposes.
___ 9. A person who breaks in or trespasses a computer system and gaining I. Phishing
unauthorized access to the data.
___ 10. The other name for e-mail spoofing. J. Mobile
___ 11. It is a bullying that takes place using electronic technology. K. Fake news
___ 12. It is defined as stories that were circulated which have been determined to L. Cyberbullying
be unambiguously false.
___ 13. Growth of Niche-focused platforms M. Privacy
___ 14. Revealing personal information on social sites can make users vulnerable N. Citizen
to crimes like identity theft, stalking, etc. Journalism
___ 15. When private individuals do essentially what professional reporters do – O. Trends in
report information. social media
Page 4 of 10
Title of the Lesson: Trends in Digital Technology and the Massive Open Online Course
(MOOC)
I. Learning Competencies
Evaluate current trends in media and information and how it will affect/how they affect
individuals and society as a whole.
Describe the impact of massive open on-line.
If you do not have access to the internet, look at this picture created in the 1900s and answer
the questions on its left.
1. What “futuristic drawing” can you see in the picture?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
2. This picture was drawn in 1905, two years after Wilbur
and Orville Wright invented the first successful airplane.
Based on your knowledge in science, do you think that
this airplane model would materialize? Why or why not?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
"Harry Grant Dart: Aerostatic cabriolet of tomorrow, ca. 1905" by trialsanderrors is
licensed under CC BY 2.0
3. What do you think is the next major innovation in transportation technology? (Write your answer
in your personalized MIL Journal notebook)
We began our discussion of MIL with a look into the models of communication. I hope you can
still recall the concepts they represented. However, these are traditional models that were
conceptualized in the 20th century. Now that we are in the Digital Age (which some experts consider
as the Connected Age as you will learn later), our outlook on communication changes too. Orihuela
(2017) proposes 10 new paradigms or concepts that characterize communication now:
Page 5 of 10
PARADIGM 3. FROM MONOMEDIA TO MULTIMEDIA
The multimedia identity of the actual environment allows all media industries to converge online and
traditional media (press, broadcast, movies). Online media are multimedia, and multimedia is a new language.
Many of the technological advances we are seeing today will shape our daily lives in the future
– the way we relax, interact, communicate and conduct business. From virtual worlds, avatar
emotions, artificial intelligence, computer generated storytelling and narrative, interactive 360
holographic images, mixed reality, stress disorder virtual therapies and so much more. ICT will
continue to advance, empower and transform every aspect of our life. Here are some of these emerging
technologies and trends.
Haptics technology
It is a feedback technology (using computer applications) that takes
advantage of the user’s sense of touch by applying force, vibrations and/or
motions to the User. Simple haptics is used in game controllers, joysticks
and steering wheels and is becoming more common in Smartphones.
Haptics is gaining widespread acceptance as a key part of virtual reality
systems (i.e. computer simulated environments) - adding the sense of
touch to previously visual only solutions. It is also used in virtual arts,
such as sound synthesis, graphic design and animation. There are many
possibilities for Haptics to be applied to gaming, movies, manufacturing,
medical, and other industries. Imagine your doctor operating on your local hospital from his computer
in Australia.
Contextual awareness
By combining ‘hard sensor’ information such as where you are and the conditions around you,
combined with ‘soft sensors’ such as your calendar, your social network and past preferences - future
devices will constantly learn about who you are and how you live, work and play. As your devices
Page 6 of 10
learn about your life, they can begin to anticipate your needs. Imagine your PC advising you to leave
home 15 minutes early or take a different route to avoid a traffic jam on your way to work. Consider
a “context aware” remote control that instantly determines who is holding it and automatically selects
the Smart TV preferences for that person.
Internet glasses
Technology that can display images directly onto our retinas while not blocking our sight is
being developed. This technology can be used in eyeglasses and have uses ranging from e-Gaming to
military defense. In the next 10-20 years experts predict that Internet glasses will replace
Smartphones. Imagine these viewing experiences:
➢ Seeing building schematics and locations of others (especially useful for security or fire fighters)
➢ Giving a speech while information is streamed to your eyeglasses in real time
➢ Receiving turn by turn directions as you walk toward your destination
➢ Viewing virtual recipes while cooking without losing your rhythm
➢ Walking down the street, seeing one of your friends show up "on screen" 2 blocks and 1 cafe
away
Wearable Technology
Wearable technologies today are smart
watches. These watches are worn as a typical
wristwatch but do more than just tell time. Modern
smart watches perform the same functions as
smartphones.
Smart watches as a wearable are developed
for convenience, but its inability to function as an
independent gadget puts it at a distinct
disadvantage.
Another example is a Fitness tracker. It is
derived from smart watches in form and physical
design but serves health applications. Fitness
trackers aim to promote health and wellness among
its enthusiasts, unfortunately, issues in their
accuracy have been raised in several reviews.
"Wearable Technology" by ForbesOste is licensed under CC BY-NC-ND 2.0
Virtual Reality (VR) wearable technology is gradually growing in popularity among enthusiasts.
Wearable technology takes users to computer generated worlds and let them experience it as if they
were actually there. However, concerns were raised about VR technology’s potential to cause a total
disconnection from the physical world.
Page 7 of 10
The MOOC
What is Massive Open Online Course (MOOC)?
It is an open access and an interactive way to facilitate students’ online study. It can
provide participants with course materials such as videos, lectures and study materials.
Massive Open Online Course can cater a large mass of participants. Where the
participants can interact over the Internet.
Explanation:
An e-learning program intended to cater students coming from different parts of the world. The word MOOC
was coined in 2008 by Dave Cormier. A MOOC may be patterned on a college or university course or may be less
structured. Not all MOOCs offer academic credits when you finish a course such as diploma or certificate although
it may be patterned on a college or university course. With easier access to media like streaming and blogging
sites, most MOOCs are less structured, but they provide education that will help students acquire certification,
employment or proceed to other studies.
The media and information are in a constant change, and its development is a continuous
process. This development is highly dependent on how connected entities are. In fact, while some
books would refer to this age as the Age of Information, others would fittingly call this time as the
“Connected Age.” Oblinger (2013) provides explanation to the current ways of the world:
The change started with the network. Moving digital information instantly from one place to
another has reshaped delivery systems, business models, and economics and has led to the
globalization of almost every industry. However, this "network effect" is about more than the
dissemination of information. It is about connections. We are no longer in the information age—we
are in the connected age. Everyone and everything is interconnected. Anyone who can access the web
can participate. The connections magnify the reach and value of not just information but also our
relationships, creating opportunities for learning, working, and collaborating on an unprecedented
scale.
Keep in mind the concept of the spider’s web. A web cannot hang on its own with just a single
strand. For it to spread out, each of its strand must be interconnected, and a spider’s power to capture
its prey depends on how wide its web spreads and how many connections it has. With that said the
next matter to be considered is on how we as citizens of this age keep ourselves connected to the
worldwide network. It cannot be argued that getting updated as often as possible is the key to our
connectedness. Hence, the educating aspect of the connected age becomes a prime concern, and with
this, MOOC comes in the frontline.
The Massive Open Online Course (MOOC) is defined as a model for delivering learning content
online to any person who wants to take a course, with no limit on attendance. It can be characterized
by the following:
1. A revolutionary approach to education that moves away from the physical to the virtual.
2. A kind of learning that happens online, breaking the norm of traditional schools or universities
for higher education.
3. Utilizes information technologies like analytics to help instructors gauge their student’s
learning.
4. Emphasis on connectedness.
Page 8 of 10
The Consequences:
1. By taking learning into virtual space, attendance is no longer a determining factor in one’s
education. This makes MOOC learning a popular alternative for those whose life situations
make them unable to attend regular schools.
2. Managing MOOC is relatively cheaper than running educational institutions. By taking out the
experiences of Universities – which are passed down to students in exorbitant fees- MOOC
addresses the high cost of education.
3. Analytic provides information about the learning process of students. Through the use of data
collected through analytics, MOOC provides a means to improve learning.
4. Since it focuses on connectedness as part of the learning process, MOOC allows education to
take place on a global scale, connecting learners and instructors all over the world to one
another to maximize education.
III. Directions/Instructions:
1. Write your name, grade, and section in the Activity Sheet. No name, no grade!
2. Always submit the Activity Sheets to your teacher. Write legibly and use black ink only.
3. Have your learning outputs signed by your parents or guardians for submission.
4. Be mindful of the standard rubric for scoring of your written works and performance tasks.
5. Keep this LAS for your ready-reference.
IV. Activity: Refer to MIL AS, see Activity 1.2 Technology: Then, Now, and Beyond
VII. Reflection
Give your short reflection about this week’s discussion, with your comments, feelings,
and suggestions from the activity done.
IX. References
Media and Information Literacy-Senior High School (ADM) Alternative Delivery Mode Quarter 1-Module 5:
Media Trends, First Edition, 2020, Cagayan de Oro City – Region X
PERCDC Learnhub App, Offline Media and Information Literacy QuexBook.
Media and Information Literacy Grade 12 (SLM) Self-Learning Module Quarter 2-Module 1: Opportunities,
Challenges, and Power of Media and Information (Part 1)
First Edition, 2020, DepEd - Schools Division of Pasig City.
Media and Information Literacy (ADM) Alternative Delivery Mode Quarter 2-Module 2: Current and Future
Trends in Media and Information, First Edition, 2020, Region IV-A CALABARZON
School Evaluators:
Noted by:
VINA A. ROMANCE
School Principal
Page 9 of 10
NATIONAL LEARNING CAMP
EOSY Break 2022-2023
LOPE DE VEGA STAND ALONE SENIOR HIGH SCHOOL
Poblacion, Lope de Vega, Northern Samar
Scoring or Rubric:
Category 5 4 3 2
Centre The mind map Ideas radiate out from Some ideas radiate out Few ideas radiate
(central) demonstrates a centre in a clear picture from centre but are not out from centre.
Image and thorough understanding that involves imagination suitable to topic Not very clear
Ideas of graphic novels. and creativity
Links Concepts are well-linked Some concepts are well- Very few concepts are Concepts are not
linked well-linked linked at all
Layout Easy to understand Makes some sense Hardly makes sense No sense at all
Neatness and The mind map was well- The mind map was mostly The mind map was The mind map is
Presentation presented presented some what presented messy/disorganized
Use of Color Effectively uses colour, Clearly uses colour, codes, Obvious attempt is Little to no use of
codes, or links to or links to clarify made to use colour, color, codes, or
meaningfully clarify connections to codes or links to links to illustrate
connections for all assist with memory for enhance clarity and connections
aspects of Mind Map. most aspects of Mind memory. Still a bit between ideas.
Map. confusing.
Creativity With originality; Very Somewhat creative, with The mind map is not The mind map does
interesting design interesting design interesting not use pictures
Adjectival Accomplished Developing Beginning Needs
Rating (28-30 points) (25-27 points) (22-24 points) Improvement
(Below 24 points)
*Modified rubric (Copyright © 2008, McGraw-Hill Ryerson Limited, a subsidiary of the McGraw-Hill Companies)
(with drawing or picture here) (with drawing or picture here) (with drawing/sketch here)
Describe how the technology presented Identify the technology you will Write your predictions about how the
in the middle column was according to review and briefly describe its technology described in the middle
your elder source. Indicate also the features. column would be 10 years from now.
decade when the technology was used. Remember to include new features.
Prepared by: (Your Name, Grade & Section) Parent’s/Guardian’s Name and Signature:
Scoring or Rubric:
Criteria 10 9 8 7
Data Clearly define and describe Define and describe Define and describe No definitions and
Visualization all its features on (then, mostly of its features some of its features descriptions of its
of the choosen now, and beyond) its features
technology respective versions
Drawing or All features are Most of the features Some features are Does not depicts to
Picture represented to what was are represented to missing in the picture what was described
described what was described
Neatness and Well-prepared output, and Sufficiently prepared Output is common, Output is messy, and
Creativity with originality output, interesting to acceptably attractive hard to understand
the eye
Adjectival Accomplished Developing Beginning Needs Improvement
Rating (28-30 points) (25-27 points) (22-24 points) (Below 24 points)
Page 10 of 10