Empowerment Technology: Senior High School Instructional Module
Empowerment Technology: Senior High School Instructional Module
Empowerment Technology: Senior High School Instructional Module
INSTRUCTIONAL MODULE
SCHOOL YEAR 2020-2021- FIRST SEMESTER
EMPOWERMENT TECHNOLOGY
1|Page
TABLE OF CONTENTS
FIRST QUARTER
LESSON 1
(Introduction: The current state of ICT technologies)……………. 3
LESSON 2
(ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE)...
…….…. 5
LESSON 3
(Advance Word Processing Skills) …………………………….………. 10
SECOND QUARTER
LESSON 1
(TITLE OF LESSON) ……………………....……………………………………….
20
LESSON PROPER
2|Page
I. Module Learning Competencies:
At the end of the module the students will be able to;
a. Compare the nuances of varied online platforms, sites, and content to best achieve specific
class objectives or address situational challenges
b. Contrast the nuances of varied online platforms, sites, and content to best achieve specific
class objectives or address situational challenges
c. Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as
it would relate to their specific professional tracks
d. Use the Internet as a tool for credible research and information gathering to best achieve
specific class objectives or address situational.
e. Uses common productivity tools effectively by maximizing advanced application techniques.
f. Creates an original or derivative ICT content to effectively communicate or present data or
information related to specific professional tracks.
g. Evaluate existing websites and online resources based on the principles of layout, graphic, and
visual message design.
ICT- Inf ormation
It deals with the use of different communication technologies such as mobile phones,
telephone, Internet to locate, save, send and edit information
Is a study of computers as data processing tools. It introduces students to the fundamental of
using computer systems in an internet environment.
3|Page
ICT in the Philippines
Philippines is dub as the ‘’ICT Hub of Asia” because
of huge growth of ICT-related jobs, one of which is BPO,
Business Process Outsourcing, or call centers.
ICT Department in the Philippines is responsible for the
planning, development and promotion of the country’s information
and communications technology (ICT) agenda in support of national
development.
Computer– an electronic device for storing and processing data,
typically in binary form, according to instructions given to it in a
variable program.
Internet– is the global system of interconnected computer networks that use the internet protocol suite
(TCIP/IP) to link billions of devices worldwide.
Means of connecting a computer to any other
computer anywhere in the world via dedicated routers
and servers.
Sometimes called simply ‘’the Net’’, is a
worldwide system of computer networks- a network of
networks in which the users at any one computer can
get information from any other computer.
World Wide Web
An information system on the internet that
allows documents to be connected to other documents by hypertext links, enabling the user to
search for information by moving from one document to another.
Is an information space where documents and other web resources are identified by
URLs, interlinked by hypertext links, and can be accessed via the Internet.
Invented by Tim-Berners Lee
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that
is suitable for the World Wide Web.
4|Page
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is
able to see website differently than others e.g. social networking sites, wikis, video sharing sites.
FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information using freely chosen keywords
e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews and evaluation e.g.
Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in the
internet.
5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.
TRENDS IN ICT
1. Convergence– is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now use your
smartphone.
5|Page
2. Social Media– is a website, application, or online channel that enables web users web users
to create, co-create, discuss modify, and exchange user generated content.
Six types of Social Media:
a) Social Networks – These are sites that allows you to connect with other people
with the same interests or background. Once the user creates his/her account, he/she
can set up a profile, add people, share content, etc
Example: Facebook and Google+
b) Bookmarking Sites – Sites that allow you to store
and manage links to various website and resources.
Most of the sites allow you to create a tag to others.
Example: Stumble Upon, Pinterest
d) Media Sharing – sites that allow you to upload and share media content like
images, music and video.
Ex. Flickr, YouTube and Instagram
f) Blogs and Forums – allow user to post their content. Other users are able to
comment on the said topic.
Ex. Blogger, WordPress and Tumblr
6|Page
3. Mobile Technologies– The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices capability to do
the tasks that were originally found in PCs. Several of these
devices are capable of using a high-speed internet. Today the
latest model devices use 4G Networking (LTE), which is
currently the fastest.
MOBILE OS
Android – an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.
7|Page
It has three components
1. Client computers – clients are the device that the end user
interact with cloud.
2. Distributed Servers – Often servers are in geographically
different places, but server acts as if they are working next to each
other.
3. Datacenters – It is collection of servers where application is
placed and is accessed via Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public
cloud may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers
increased security because of its private nature.
COMMUNITY CLOUD allows systems and services to be accessible by group of organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public cloud.
8|Page
VI. References:
https://novasexy1.blogspot.com/2017/03/ict-informationand-communication-it.html
INTERNET SAFETY- it refers to the online security or safety of people and their information when
using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
9|Page
TEN RULES OF NETIQUETTE
You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online just
like you can in real life.
You are still talking to a real person with feelings even though you can’t see them.
Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.
Remember people have other things to do besides read your email. You are not the center of their
world.
Keep your post and emails to minimum by saying what you want to say.
Know what you are talking about and make sense saying it.
10 | P a g e
Post the answers to your questions online because someone may have the same question you do.
Netiquette does however forbid people who are flaming to hurt discussion groups by putting the
group down.
Going through other people’s things could cost you, your job or you could even go to jail.
Do not take advantage of other people just because you have more knowledge or power than
them.
Treat others as you would want them to treat you if the roles were reversed.
Remember that you were once the new kid on the block.
You still need to have a good manner even though you are online and cannot see the person
face to face.
Internet security
Confidentiality
Data confidentiality
Privacy
11 | P a g e
Integrity
Data integrity
System integrity
Availability
Usurpation
12 | P a g e
Misuse: Causes a system component to perform a function or service that is detrimental to system
security.
Masquerader
Hackers
Clandestine user
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormantphase
Virus is idle.
Propagationphase
Virus places an identical copy of itself into other programs or into certain system areas on the
disk.
Triggeringphase
Virus is activated to perform the function for which it was intended. Caused by a variety of
system events
Executionphase
Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another
and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
13 | P a g e
Spyware– a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.
Rogue security software– is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word
Boolean
AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
Question
a question may be entered in the search field of search engine
Advanced
14 | P a g e
Features are offered on many engines by going to an “Advanced search” page and making selections.
Effective in narrowing search returns to a specific topic or phrase.
Direction: Read each statement of Ten (10) Rules of Netiquette below carefully and fill in the blank(s)
with the correct answer.
1. You still need to have a __________ even though you are online and cannot see the person
face to face.
2. Don’t __________ your power.
3. Not respecting other __________ is a bad netiquette.
4. __________ does however forbid people who are flaming to hurt discussion group by putting
the group down.
5. __________ what you know online.
6. Always check your __________ before posting.
7. Keep your post and emails to ________ by saying what you want to say.
8. Know where you are in __________.
9. Adhere to the same __________ that you follow in real life.
10. The internet __________ who would otherwise never meet.
III. References:
https://novasexy1.blogspot.com/2017/03/lesson-2-online-safety-security-and.html
https://canetealjblog.wordpress.com/2017/08/20/rules-of-netiquette/
LESSON 3: Advance
Word Processing
Skills
15 | P a g e
In the professional world, sending out information to convey important information is vital. Because of
ICT, things are now sent much faster than the traditional newsletters or postal mail. You can now send
much faster than the traditional newsletters or postal mail. You can now use the Internet to send out
information you need to share. What if we could still do things much faster – an automated way of
creating and sending uniform letters with different recipients? Would that not be more convenient?
A. Mail Merge
The simplest solution for the scenario above is to create a document and just copy and paste it
several times then just replace the details depending on whom you send it to. But what if you have
16 | P a g e
hundreds or thousands of recipients? Would not that take too many hours? What if you have a small
database of information where you can automatically generate those letters?
1. Form Document
The first component of our mail merged document is the form document. It is generally the
document that contains the main body of the message we want to
convey or send. The main body of the message is the part of the form document that remains the same
no matter whom you send it to from among your list.
Also included in the form document is what we call place holders, also referred to as data fields
or merge fields. This marks the position
on your form document where individual
data or information will be inserted. From
our sample document, the place holders
are denoted or marked by the text with
double-headed arrows (<< >>) on each
side and with a gray background. On a
printed standard form, this will be the
underlined spaces that you will see and
use as a guide to where you need to write
the information that you need to fill out.
In its simplest form, a form document is
literally a “form” that you fill out with
individual information. A common
example of a form document is your
regular tax form or application form.
17 | P a g e
list or data file. This is where the individual information or data that needs to be plugged in (merged)
to the form document is placed and maintained. One of the best things about the mail merge feature is
that it allows data file to be created from within the Microsoft Word application itself, or it gets data
from a file created in Microsoft Excel or other data formats. In this way, fields that needed to be filled
up on
the form document can easily be maintained without accidentally altering the form or main document.
You can also easily add, remove, modify, or extract your data more efficiently by using other data
management applications like Excel or Access and import them in Word during the mail merge
process.
B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes
sense that after you print out your form letters, you will need to send it to individual recipients in an
envelope with the matching
address printed directly on the
envelope or on a mailing label
to stick on. By using virtually
the same process as a standard
mail merge, Microsoft Word
will print individual addresses
to a standard form that it has
already pre-formatted. Simply
put, it creates a blank form
document that simulates either a
blank label or envelope of pre-
defined size and will use the
data file that you selected to
print the information, typically
18 | P a g e
II. Integrating Images and External Materials
Integrating or inserting pictures in your document is fun and it improves the impression of your
document. A common use of inserting a picture on a document is
when you are creating your resume. Though seemingly simple to do, your knowledge on the different
kinds of materials that you can insert or integrate in a Word document and its characteristics can help
you create a more efficient, richer document not only in content but also in physical form. A better
understanding of the physical form of your document as well as the different materials you would
integrate in it would allow you to be more efficient and versatile in using Microsoft Word.
A. Kinds of Materials
There are various kinds of materials Microsoft Word is capable of integrating to make the
documents richer, more impressive, and more informative.
1. Pictures
a. .JPG/JPEG
This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic Experts
Group. Like all the rest of the image file extensions, it identifies the kind of data compression process
that it uses to make it more compatible and portable
through the Internet. This type of image file can support 16.7 million colors that is why it is suitable
for use when working with full color photographic images. Unfortunately, it does not support
transparency and therefore, images of this file type can be difficult to integrate in terms of blending
with other materials or elements in your document. But if you are looking for the best quality image to
integrate with your document then this is the image file type for you. .JPG does not work well on
lettering, line drawings, or simple graphics. .JPG images are relatively small in file size.
19 | P a g e
b. .GIF
This stands for Graphics Interchange Format. This type of image file is capable of displaying
transparencies. Therefore, it is good for blending with other materials or elements in your document. It
is also capable of displaying
simple animation. Apparently,
this may not be too useful on a
printed document but if you are
sending documents electronically
or through email, or even post
documents into a website, then
this could be quite impressive.
The downside is that it can only
support up to 256 colors so it is
good mostly on logos and art
decors with very limited, and
generally solid colors. .GIF is
much better for logos, drawings,
small text, black and white
images, or low-resolution files.
c. .PNG
20 | P a g e
Example of .png format picture.
Microsoft Word has a library of clip arts that is built in or can be downloaded and used freely. There
are still other clip arts that you can either purchase or freely download and use that come from third-
party providers.
3. Shapes
These are printable objects or materials that you can integrate in your document to enhance its
appearance or allow you to have some tools to use for composing and representing ideas or messages.
If you are designing the layout for a poster or other graphic material for advertising, you might find
this useful.
4. Smart Art
21 | P a g e
Generally, these are predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature. If you want to graphically represent an organization, process,
relationships, or flow for infographic documents, then you will find this easy and handy to use.
Smart Art
5. Chart
6. Screenshot
Sometimes, creating reports or manuals for training or procedures will require the
integration of a more realistic image of what you are discussing on your report or
manual. Nothing can get you a more realistic image than a screenshot. Microsoft
Word even provides a snipping tool for your screen shots so you can select and
display only the part that you exactly like to capture on your screen.
22 | P a g e
Layout of text wrapping options.
This is the default setting for images that are inserted or integrated in your document. It treats your
image like a text font with the bottom side totally aligned with the text line. This setting is usually used
when you need to place your image at the beginning of a paragraph. When placed between texts in a
paragraph or a sentence, it distorts the overall appearance and arrangement of the texts in the
paragraph because it will take up the space it needs vertically, pushing whole lines of texts upward.
B. Square
This setting allows the image you inserted to be placed anywhere with the paragraph with the text
going around the image in a square pattern like frame.
C. Tight
This is almost the same as the Square setting, but here the text “hug” or conforms to the general shape
of the image. This allows you to get a more creative effect on your document. This setting can mostly
be achieved if you are using an image that supports transparency like a .GIF or .PNG file.
D. Through
This setting allows the text on your document to flow even tighter taking the contours and shape of the
image. Again, this can be best used with .GIF or .PNG type of image.
This setting pushes the texts away vertically to the top and/or the bottom of the image so that the
image occupies a whole text line on its own.
F. Behind Text
23 | P a g e
This allows your image to be dragged and placed anywhere on your document but with all the texts
floating in front of it. It effectively makes your image look like a background.
G. In Front of Text
As it suggests, this setting allows your image to be placed right on top of the text as if your image was
dropped right on it. That means whatever part of the text you placed the image on, it will be covered
by the image.
Mail Merge – a feature that allows you to create documents and combine or merge them with another
document or data file.
Form Document – the document that contains the main body of the message we want to convey or
send.
Merge Field/Place Holder – marks the position on your form document where individual data or
information will be inserted.
.JPG – file extension for the Joint Photographic Experts Group picture file.
Clipart – line art drawings or images used as a generic representation for ideas and objects.
Smart Art – predefined sets of different shapes grouped together to form ideas that are organizational
or structural in nature.
Text Wrap – adjusts how the image behaves around other objects or text.
24 | P a g e
of Post-test and also to know if the learner really understands the discussion.)
III.References:
https://elenakitcats.wordpress.com/2018/02/23/the-journey-begins/
25 | P a g e