Mil Module 5

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 39

Media and Information Literacy - Senior High School Alternative Delivery Mode

Quarter 1 - Module 5: Media Trends First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of
such work for profit. Such agency or office may, among other things, impose as a
condition the payment of royalty.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.

Published by the Department of Education – Region X – Northern Mindanao


Regional Director: Dr. Arturo B. Bayocot, CESO V

Development team of the moduleDevelopment Team of the Module:

Author: Ezra Mae T. Tuba


Author: Ezra Mae T. Tuba
Reviewers: Therese Mae C. Maandig
Editors:
Arian M. Edullantes
Reviewers: Therese Mae C. Maandig
Abihail L. Gimena
Illustrator: Arian M. Edullantes Jay Michael A. Calipusan
Abihail L. Gimena
Illustrator and Layout Artist:Management Team:
Jay Michael A. Calipusan
Management Team:
Chairperson: Dr. Arturo B. Bayocot, CESO III
Regional Director
Co-Chairpersons: Himaya B. SinataoDr. Victor G. De Gracia Jr., CESO V
Joel D. Potane Asst. Regional Director
Mala Epra B. Magnaong
CES, CLMD
Members: Dr. Bienvenido U. Tagolimot, Jr.
Regional ADM Coordinator
Elson C. Jamero
EPS-Designate-TLE
Printed in the Philippines by Department of Education - Alternative Delivery
Mode (DepEd-ADM)

Office Address: Printed in the Philippines by: Department of Education – Regional Office
10 Masterson Avenue, Upper Balulang, Zone 1, Cagayan de Oro
Office Address: Zone 1, Upper Balulang Cagayan de Oro City 9000
City, Cagayan
de Oro, Lalawigan ng Misamis Oriental
Telefax: (088) 880-7071, (088) 880-7072
Telefax: ________________________________________________
E-mail Address: region10@deped.gov.ph
E-mail Address: ________________________________________________
Senior High School

Media and Information


Literacy
Quarter 1 - Module 5:
Media Trends

This instructional material was collaboratively developed and reviewed by


educators from public and private schools, colleges, and or/universities. We
encourage teachers and other education stakeholders to email their
feedback, comments, and recommendations to the Department of Education
at action@ deped.gov.ph.

We value your feedback and recommendations.


Department of Education ● Republic of the Philippines
Table of Contents

What This Module is About......................................................................................................I


What I Need to Know.............................................................................................................. II
How to Learn from this Module...............................................................................................II
Icons of this Module............................................................................................................... III
What I Know.......................................................................................................................... IV

Lesson 1:
Opportunities, Challenges and Power of
Media and Information ................................................................1
What’s New ..................................................................................................2
What Is It ......................................................................................................2
What’s More .................................................................................................5
What’s More .................................................................................................6
What I Have Learned .................................................................................10

Lesson 2:
Current and Future Trends of Media and Information ...........11
What’s New ................................................................................................11
What Is It ....................................................................................................12
What’s More ...............................................................................................17

Summary ...........................................................................................................................21
Assessment: (Post-Test)....................................................................................................23
Key to Answers ..................................................................................................................24
References ........................................................................................................................28
What This Module is About

Welcome to Module 5!
This module is designed to introduce the core topics of Media and Information Literacy. The
students will acquire a knowledge about Opportunities, Challenges and Power of Media and
Information, Media and Information Literate Individual and People Media. The module
presents identified themes together with exemplar activities to assist the students in better
understanding of Media and Information Literacy. The content of this module focuses on
developing the knowledge and skills of the students towards emerging development of
Media and Information.
Module 5 contents nine (9) learning competencies. Learning competencies are the main
ideas or skills that the students to master these are also called goals. Thus, at the end of
every topic the students shall master the learning competencies with corresponding
activities, evaluation of learning thru performance tasks and case analyses.
This topic opportunities, challenges and power of media and information. Opportunities and
Challenges of media is the core topic of Media and Information Literacy. We shall look at
some examples of opportunities and challenges of media and information and to know the
power of media and information in the part of the student, business and in the society.
The first part of this topic is to answer first the given pre- test. This is to measure your
knowledge about Opportunities and Challenges of media and information and followed by
unlocking activities and deepening of the lesson.
Enjoy!

The following are the lessons contained in this module:


Lesson 1- Opportunities, Challenges and Power of Media and Information
Lesson 2- Current and Future Trends of Media and Information
Lesson 3- Media and Information Literate Individual
Lesson 4- People Media

What I Need to Know


At the end of this module, you should be able to:
1. Evaluate the opportunities and challenges in media and information.
(MIL11/12OCPIIIh24).
2. Examine the possible threats of the Internet to banking through phishing and
cybercrime. (MIL11/12OCP-IIIh24).
3. Cites recent examples of the power of media and information to affect change.
(MIL11/12OCP-IIIh25).
4. Evaluate the current and future trends of media and information. (MIL11/12CFT-IIIi-
26)

I
5. Describe what is massive open on-line course. (MIL11/12CFT-IIIi-26)
6. Produce a prototype about the future media innovation. (MIL11/12CFT-IIIi-27)
7. Synthesizes the overall knowledge about media and information with skills for
producing a prototype of what the learners think is a future media innovation.
(MIL11/12CFT-
IIIi-28)

How to Learn from this Module


To achieve the objectives cited above, you are to do the following:
• Take your time reading the lessons carefully.
• Follow the directions and/or instructions in the activities and exercises diligently.
• Answer all the given tests and exercises.

Icons of this Module


What I Need to This part contains learning objectives that
Know are set for you to learn as you go along the
module.

What I know This is an assessment as to your level of


knowledge to the subject matter at hand,
meant specifically to gauge prior relatedt
knowledge

What’s In This part connects previous lesson with that


of the current one.

What’s New An introduction of the new lesson through


various activities, before it will be presented
to you

What is It These are discussions of the activities as a


way to deepen your discovery and
understanding of the concept.

What’s More These are follow-up activities that are


intended for you to practice further in order to
master the competencies.

II
What I Have Activities designed to process what you have
Learned learned from the lesson

What I can do These are tasks that are designed to


showcase your skills and knowledge gained,
and applied into real-life concerns and
situations.

What I Know
Multiple Choice. Select the letter of the best answer from among the given choices.

1. It is a cybercrime in which the targets are contacted by email, telephone or text


message.
A. Phishing B. Cyberbullying
C. Cybercrime D. Hacking

2. It is the program which attach themselves to the computer or file and then circulate
themselves to other files and to other components on a network.
A. E-mail Spoofing C. Cyber Stalking
B. Virus D. Hacking

3. It is category of technology that can be worn by a consumer and often include


tracking for information.
A. Wearable technology C. Smart Watch
B. Smart phone D. MOOCs

4. It is an open access and interactive way to facilitate students’ online study.


A. Massive Open Online Course C. 4G
B. Holography D. Fitbit charge

5. A form of technology-mediated communication that enables the user of a mobile


device to communicate with someone in a different location.
A. Telephone C. Mobile Phone
B. Laptop D. Mobile Communication

6. It is online harassment and online abuse it involves following a person’s movement


across the internet by posting threatening messages to the victim.
A. Hacking C. Virus
B. Cyber Stalking D. E-mail Spoofing

7. A person who breaks in or trespasses a computer system and gaining unauthorized


access to the data.
A. Hacker B. TV Broadcaster

III
B. Call Center Agent D. Radio DJ

8. This is a mechanical robot having the characteristics that can-do things like humans.
A.5G C. Hologram
B. Smart Glass D. Avatar

9. It is a wireless handheld device that allows users to make and receive calls and to
send text messages, among other features.
A. Computer C. Mobile Phone
B. Telephone D. Laptop

10. A technology that will calculate and monitor your heart rate.
A. Misfit Phase Hybrid C. Fitbit Charge 2
B. Heart Rate Monitoring Device D. Avatar

IV
Lesso
Opportunities, Challenges and
n 1 Power of Media and Information

What’s New
Activity 1: Unlocking Words
Before we will discuss the opportunities and challenges, and power of media and
information let us begin our lesson with this activity. This activity will help you to understand
our topic today. Let us start!
The name of the activity is WORD CLOUD GUESSING! In this activity you need to guess
and arrange the scrambled letters to form a new word.

Process Questions

1. How do you find the activity?


2. What do you think is the connection of the activity in our lesson?

1
What Is It
Answering the activity, let us now discuss and explore the opportunities, challenges and
power of media and information. Let’s start!
In the world of media and information there are a lot of opportunities and challenges. What
is the meaning of the word’s opportunity and challenges? Below is the meaning of the two
words. Take a look!

Opportunity. A time or set of Challenge. A challenge is something


circumstances that makes it possible new and difficult which requires great
to do something. effort and determination.
Source: English Oxford living dictionaries Source: https://www.collinsdictionary.com/
2018. What Is opportunity? Acces at: http:// dictionary/english/challenge
www.en.oxforddictionaries.com

So, here are the opportunity and challenges in media and information. First, we will take a
look in the opportunity.
Television Broadcaster Mobile Communication
A television A means of technologymediated communication
presenter presents information that allows the user of a mobile device to connect
relating to subjects such as news and with someone else at a different location, such as
sports, and may also be responsible texting from a cell phone and sending email from a
for planning the creative content of a computer device equipped with WiFi (e.g. laptop,
series. Such experts will work with iPad).
news programs and help to discuss A mobile phone
important topics in reporting, as is a wireless portable well as
provide comments on device that allows users, various
events.to make and receive calls,
They might also formulate and send text messages. interview
questions, read scripts, The first mobile phone and reveal details
about the show, generation would only be such as commercial
breaks. able to make and receive
calls. Today’s mobile
Example: TV broadcaster

phones are packed with many additional features


like web browsers, games, cameras,
video players and even navigation systems.

2
Source: https://www.freepik.com/ free- https://www.freepik.com/free-vector/instagram-
vector/podcast- conceptwith-
conceptillustration_6203440.htm#page=1& smartphone_2584202.htm#page=1&query=mobile
query=broadcaster&position=5 communication&position=37
So, we have two opportunities in media and information, first television broadcaster and
mobile communication. But have you wondered, what makes television broadcaster and
mobile communication an opportunity in media and information.?
Let me share it to you, media plays a big role in sharing and disseminating information.
Through media, people now a day’s can easily catch up news and be updated because of
television broadcaster. In the other side, mobile communication can make our life easier. No
need to write a letter if you want to ask allowance to your mom instead just text and call.
How amazing isn’t?
Now, take a pause for a while, think in your own understanding, what is the reason why
television broadcaster and mobile communication is an opportunity and don’t forget to share
it to your friends. Share it!
And now let’s move on to the next topic. The next topic is the challenges in media and
information. Here are the two challenges, take a look!

Cybercrime
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate
crimes). Cybercriminals may use computer technology to access personal information,
business trade secrets or use the internet for exploitative or malicious purposes.
Source: Technopedia . 2018. Cybercrime Access at: https://www.techopedia.com/definition/2387/cybercrime

https://www.freepik.com/free-vector/anonymous- https://www.freepik.com/premiumhacker-concept-with-flat-
design_2785043. vector/cyber-thief_4717043. htm#page=1&query=cybercrime&position=0
htm#page=1&query=cybercrime&position=10

Do you know there are four different types of cybercrime? Here are the four types of
cybercrime.
Source: LinkedIn. June 22, 2017. Different Types of Cybercrime Access at: https://www.linkedin.com/pulse/

different-types-cyber-crime-avanzo-net Virus dissemination. Virus is the programs


which attach themselves to the computer or
Hacking is the most common type of file and then circulate themselves to other
cybercrime committed across the world. files and to other components on a network.
Hacking is a crime which entails cracking They usually affect the data on the
systems and gaining unauthorized access computer, either by altering or deleting it.
to the data stored in them. Hacker is a
person who breaks in to a computer Cyber stalking is use of internet or other
system. electronic means to stalk someone. It is

3
online harassment and online abuse. E-mail Spoofing. An e-mail that appears to
Mostly cyber stalking involves following a originate from one source but actually has
person’s movement across the internet by been sent from another source. This can
posting threatening messages to the victim also be termed as e-mail forging.
or by entering the chat rooms frequented by
the victim or by constantly bombarding the
victim with the e-mails etc.
Phishing
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or
text message by someone posing as a legitimate institution to lure individuals into providing
sensitive data such as personally identifiable information, banking and credit card details,
and passwords.
Source: Phishing.org. 2018. What Is Phishing? Accessed at: http://www.phishing.org/what-is-phishing

https://www.freepik.com/premium-vector/phishing-banner-set-isometric-set-phishing-vector-banner-
webdesign_4341984.htm#page=1&query=phishing&position=1
After you read about the two challenges, How about cybercrime? Cybercrime is
let us dig deeper what makes phishing and another problem that we are facing today.
cybercrime a challenge in media and Like phishing, the hacker can access your
information. Here is the answer. information’s over the internet. You should
always remember your personal information’s
Phishing is an illegal action or crime.
Where in the hacker will hack or get all are considered confidential.
your information’s over the internet. For Always remember, your
example, your bank account details, your personal information’s are always
personal information’s and even your credit confidential. No sharing and posting personal
card details. So, for you to be safe in information’s over the internet.
phishing avoid posting your personal
information’s over the internet. For the last topic, let me show you the
examples of the power of media and
information to affect change.
The Power of Media and Information

Student Business Society


The power of media While in business, the The power of media and
information in the power of media and and information in side of the students is

4
information is very our society is huge. that, now a days the strong. Using
media, Through media, the
information is easy to the business owner society can easily get get. Example, if
you can easily market their and understand the
have assignments you products. For example, information related to can use
your phone to posting your products what is happening.
search information. over the internet like in
social media.
Now, you have already knowledge about Opportunities, Challenges, and Power of Media
and Information. Please don’t forget to share to your friends and family about our topic for
the day. Share it!

What’s More
Activity 2: Matching Type
Match the column A to column B. Choose the best answer.

Column A Column B
1. It is a cybercrime in which a target or targets are A. Cyberstalking contacted by email,
telephone or text message by
B. Cybercri
minals
someone.
C. Hacker
2. A type of cybercrime that is the most common type
of cybercrime committed across the world. D. Hacking
3. It is the program which attach themselves to the E. Cyberbulling computer or
file and then circulate themselves to F. Virus other files and to other
components on a network.
G. E-mail Forging
4. These professionals may work for news programs and help research important
stories to discuss as H. Mobile Phone well as provide commentary about different
events. I. Phishing
5. It is online harassment and online abuse it involves J.
Mobile following a person’s movement across the
internet by posting threatening messages to the victim.
6. It is a wireless handheld device that allows users to
make and receive c It is a wireless handheld device
that allows users to make and receive calls and to send
text messages, among other features.

5
7. A form of technology-mediated communication that
enables the user of a mobile device to communicate
with someone in a different location messages, among
other features.
8. They use computer technology to access personal
information, business trade secrets or use the internet
for exploitative or malicious purposes.
9. A person who breaks in or trespasses a computer
system and gaining unauthorized access to the data.
10. The other name for e-mail spoofing.

What’s More
Activity 3: For Pics One Word
Directions:
1. You will be shown four photographs. These four photographs each have something
in common.
2. Below the pictures, you will see blank spaces indicating how many letters are in the
answer.
3. Guess what the word is and write your answer in the blank space.
4. Enjoy the activity!

6
Images from https://www.freepik.com

—————————————

7
Images from https://www.freepik.com

———————————

Images from https://www.freepik.com

————————————

8
Images from https://www.freepik.com

————————

Images from https://www.freepik.com

9
————————

What’s More

Activity 4: ?
Instructions: Search up, down, forward, backward, and on the diagonal to find the hidden
words. Hidden words to find: hacking, mobile phone, phishing, opportunity, challenge, TV
broadcaster, cybercrime, cyberstalking, cybercriminal, hacker, virus, e-mail forging, mobile
communication, internet and media.

What I Have Learned


Evaluation of Learning: Case Analysis
For your performance task. Make a mind mapping about our topic of the day. A mind map is
a diagram used to visually organized information and it shows relationship to the topic. So,
are you ready? Good luck!

10
Opportunities, Challenges, and Power of Media and Information

Opportunities and Power of media and information


Challenges to affect change

Lesso
Current and Future Trends of
n 2 Media and Information

What’s New
Activity 1: Unlocking Words
Hi there! How are you today? We are now in lesson 9, in this lesson we will talk about
the current and future trends of media and information.
But just hold on first, before we will discuss I want you to answer our motivational activity.
This is to help you discover and understand our topic. Are you ready? Let’s rock it!
The name of the activity is WORD RIDDLE. Riddle is something like puzzle, in that clues
properly put together create a mental picture that gives the answer to the riddle. You only
must understand the statement and guess. Here is the example. Take a look!

11
For example:
I am a small animal. I am grey. I like cheese. I rhyme with house. I’m a______.
The answer of this riddle is mouse. Now let’s start! Analyze the statement very well. You
can do it!

1. Look at the numbers on my face you won’t find 13 in any place. What am I?
2. You can play with it at night. It can give you text and call even information that you
want. Who am I?
3. I am a word. My name starts in letter I and ends in letter T. I am useful in opening
website like google, yahoo and Facebook. Can you guess me?
4. You can take me wherever you go. I can take all your precious moments with your
friends and family. I can take video too. Who am I?
5. I am something in your house in the living room I am seen. When you sit on the sofa,
you can watch things on my widescreen. Can you guess me?

Thank you for answering the first activity, for that give yourself 5 claps for a job well done!
Now let’s process the activity. I want you to answer the following process questions.

Process Questions:
1. How do you find the activity?
2. What do you think is the connection of this activity to our lesson?
3. Aside from your answer, can you enumerate other example of technology?

What Is It
Today, we will discuss about the current and future trends of media and information. I will
show you some examples of current technologies and even in the future.
Before we will start, I want you to think a technology that will help you in the future and write
it in the piece of paper. Describe what is the uses of that technology and how it works. Just
keep the paper.
Now, let’s move on to our discussion. We will evaluate current trends in media and
information and how it will affect/how they affect individuals and the society.
So, here are the examples of current trends in media and information. Let’s start!

Wearable technology (also called wearable gadgets) is a category of technology devices


that can be worn by a consumer and often include tracking information related to health and
fitness. Other wearable tech gadgets include devices that have small motion sensors to take
photos and sync with your mobile devices.
Source: Webopedia . 2018. Wearable Technology Access at: https://www.webopedia.com/TERM/W/wearable_
technology.html

12
Smartwatch is a wearable computing Pratical Uses of Smartwatch
device that closely resembles a wristwatch
1. Notifications. One of the main
or other time-keeping device. In addition to
reasons you would buy one is a
telling time, many smartwatches are
Smartwatch displaying notifications.
Bluetooth-capable. The watch becomes, in
It’s invaluableto have messages
effect, a wireless Bluetooth adaptor
sent to your wrist and to be able to
capable of extending the capabilities of the
recognize their significance without
wearer’s smartphone to the watch
removing your phone from a pocket
Source: Techtarget 2018. Smart Watch Access
or bag. It makes your life simpler,
at: https://internetofthingsagenda.techtarget.com/
definition/smartwatch and saves time.
2. Battery Life. A huge, highresolution
monitor is often one of the biggest
drains in battery life for your
smartphone. Use smartwatch this
reduces the amount of time, and it
can have a significant impact on
battery life.
3. Music. Most smartwatches come
with a music player feature in them,
enabling you to listen to music in
your pocket on the phone. For
example, if a music track comes on
https://www.freepik.com/freevector/four-flat- that you don not particularly like,
watches_900835.
htm#page=1&query=smartwatch&position=5
then you can simply hit ‘next’ on
your smartwatch.
Smartwatch is not only for checking time and date. Today, you can use smartwatch for
checking your email, if you have a text message or even a call. Let us dig deeper, the
following are some examples of wearable technology.
A Smartphone is a cellular phone with an embedded computer and other non-
telephone-related features such as an operating system, web browsing, and the ability to run
software applications.
Cellphone versus Smart Phone
Source: Techtarget 2018. Smart Phones Access
at: https://searchmobilecomputing.techtarget.com/definition/smartphone

Cellphone is simply a telephone that A smartphone has


doesn’t need a landline connection. It more advanced features,
enables the user to make and receive including web browsing,
phone calls. Some cellphones also software applications and a mobile OS.
offer text messaging. In turn, a smartphone also offers
capabilities such as support for
biometrics, video chatting, digital
assistants and much more.

13
Mind Mapping

The third wearable technology is fitness tracker. This technology will tell you how fit you
are. Take a look!
Fitness tracker is the best way to monitor your movement and health with unrivaled
accuracy and effortlessness. A wrist-worn device that can detect some combination of
walking steps, running distance, heart rate, sleep patterns and swimming laps. Fitness
bands interact via Bluetooth with an app in a mobile device that configures the device and
downloads the wearer’s activity data. Below are the list of the best fitness tracker.
Source: PC 2018. Fitness Tracker Access at: https://www.pcmag.com/encyclopedia/term/67469/fitness-tracker
Heart Rate Monitoring Device. A
technology that will calculate and monitor
your heart rate.

14
https://www.freepik.com/premium-
photo/youngcientific-caucasian-man-isolated-
pointing-templewith-finger-thinking-focused-
task_6557919.
htm#page=2&query=smart+glass&position=7

Fitbit Charge. This watch is good for


exercise. It can count your running time and
the distance.

https://www.freepik.com/free-

Now, let us explore the future technologies. Here are the following future technologies,
vector/flatsmartwatchset_841814.htm#page=1&quer
y=sports watch&position=10

Smartglass. This smart glass can collect


information’s from external and internal.
You can listen to music too while searching
informations.

https://www.freepik.com/premium-vector/ fitness-
https://www.freepik.com/free-
counter-phone-run-app-wrist-
vector/flatsmartwatchset_841814.htm#page=1&quer
bandbracelet_5599335.htm
y=sports watch&position=10
Misfit Phase Hybrid. This watch can
let’s take a look!
count your steps and your heart rate.

5G Smartphone and Network. 5G is the


fifth generation of internet speed. This is
the new fastest speed of internet
connection. The successor of 4G.

15
Avatars, Surrogates, Robotic.
This is a mechanical robot. It is having the
characteristics of a robot. They can do
things like humans.

https://www.freepik.com/free-psd/5g-wifinetwork-
connection-mock-up_6310422.
htm#page=1&query=5G Network&position=1

https://www.freepik.com/free-
vector/futuristicholographic-infographic-element-
Hologram. It is a pattern of interference collection_4798373. htm#page=1&query=hologram
produced by a split coherent beam. &position=1

Now you already know the different


examples of current and future trends of
media and information. Always remember
that the goal of these technologies is to
have an easy understanding of information.
Example, if you want to know your heart
rate you use heart rate monitoring device.
How amazing isn’t?
Before we will continue
our discussion, I want you to pause
for a while. Get some coffee or juice for you
to feel more relax as we discuss about the
MOOC or the Massive Open Online
Course. Are you ready? Let’s start.

https://unsplash.com/photos/DcKkpYS8nC8 So, what is MOOC or Massive Open


Online Course?

16
What is Massive Open Online
Course (MOOC)?

It is an open access and an interactive way to facilitate


students’ online study. It can provide participants with course
materials such as videos, lectures and study materials.

Massive Open Online course can cater a large mass of


participants. Where the participants can interact over the internet.

Mind Mapping: Advantages of MOOC Wh


at Is It

Explanation:
An e-learning program intended to cater students coming from different parts of the world.
The word MOOC was coined in 2008 by Dave Cormier. A MOOC may be patterned on a
college or university course or may be less structured. Not all MOOCs offer academic credits
when you finish a course such as diploma or certificate although it may be patterned on a
college or university course. With easier access to media like streaming and blogging sites,

17
most MOOCs are less structured, but they provide education that will help students acquire
certification, employment or proceed to other studies.
Now, are you ready to answer our activities? Let’s do it!

What’s More
Activity 2: Complete Me
Below is a mind map with corresponding topic about key features of smart phone. Supply
the missing features of smart phone. Enjoy!

Mind Map Rubrics


Very Good (4 pts) Good (3 pts) Needs
Improvement (1-
2 pts)
Arrangement The main idea is The main idea is There is no
supported by details, the supported by details, but recognizable
categories have sense, some categories do not pattern to the
and the reader is able to make sense, and the ideas. The
follow and understand reader is able to follow and ideas are not
what is written. understand what is written. organized.
Depth It composes at least It composes at least 3 The map is
4 subtopics and a subtopics and a minimum of missing with
minimum of 2 ideas 1 ideas under each subtopic ideas
under each subtopic

18
Design The map is well layed The map is layed out fine, The layout is
out , the letter size is a the letter size is a good use poor and difficult
good use and easy to and can be read. to read.
read.
Creativeness The map is interesting to The map is interesting to the It is not
the eye and the eye. interesting to the
combination of colors eye.
works well together
Activity 3: Modified True or False
Write MIL if the statement is TRUE. Otherwise, change the underline word/s with the correct
answer and choose your answer in the box.

_____1. Wearable technology also called wearable gadgets is a category of


technology devices that can be worn by a consumer and often include tracking
information related to health and fitness.

_____2. A smartwatch is a wearable computing device that closely resembles a


wristwatch or other time-keeping device.

_____3. A smartwatch is a wearable computing device that closely resembles a


wristwatch or other time-keeping device.

_____4. 5G is the fourth generation of cellular mobile communications.

_____5. smartphone has more advanced features, including web browsing,


hardware

applications and a mobile OS.

_____6. A massive open online course (MOOC) is an offline course that has open
access and interactive participation by means of the Web.

_____7. Smart glasses may collect information from internal or external sensors.

_____8. A fitness tracker is the perfect way to monitor your activity and health
effortlessly and with unmatched accuracy.

_____9. Fitness tracker interact via Bluetooth with an app in a mobile device that
configures the device and downloads the wearer’s activity data.

_____10. A smartphone has more advanced features, including web browsing,


software applications and a mobile OS.

19
Activity 4: Connect Me
In this activity, you need to connect the image with its corresponding name. Write the letter
of your choice.
1. 2.

3. 4.

5.
6.

7.
8.

9.
10.

Images from pixabay.com

A. Holography B. 5G C. Smart Watch


D. Heart Rate Device E. Smart Phone F. Avatars

20
G. Smart Glass H. Fitbit Charge 2 I. Misfit Phase Hybrid
J. 4G
Activity 5: Performace Task
My Future Technology Prototype.
Produce a prototype about the future media
innovation. In this activity you need to draw
your own future technology prototype or
model. A technology that will help you in the
future.
For example, agricultural robot a robot that will
help the farmers to harvest, planting seeds,
weed control and even soil analysis.
Now, it’s your turn to create your own
prototype. Don’t forget to write a short
Image Sourece: https://en.wikipedia.org/wiki/
description and the uses of your prototype Agricultural_robot
model and use the format below. Think a better and useful
future technology.

My Future Prototype

My Future Prototype
Rubrics

21
Creativity (10 points) Clarity (20 points) Relevance (20 points)

Summary 1. Cybercrime

2 Opportunities in Media • Hacking

1. Television Broadcaster • Cyber Stalking

2. Mobile Communication 2. Phishing

2 Challenges in media • Virus Dissemination


• E-mail Spoofing
Wearable Techonologies is also called wearable gadgets is a category of technology
devices that can be worn by a consumer and often include tracking information related to
health and fitness. Below are the types of wearable technologies:
1. A smartwatch is a wearable computing device that closely resembles a wristwatch or
other time-keeping device. In addition to telling time, many smartwatches are
Bluetooth-capable. The watch becomes, in effect, a wireless Bluetooth adaptor
capable of extending the capabilities of the wearer’s smartphone to the watch.
2. A smartphone is a cellular telephone with an integrated computer and other features
not originally associated with telephones, such as an operating system, web browsing
and the ability to run software applications.
3. Smart glasses may collect information from internal or external sensors. It may
control or retrieve data from other instruments or computers. It may support wireless
technologies like Bluetooth, Wi-Fi, and GPS
4. A fitness tracker is the perfect way to monitor your activity and health effortlessly
and with unmatched accuracy.
• Heart Rate Monitoring Device is a technology that will calculate and monitor
your heart rate.
• Misfit Phase Hybrid counts steps and calories burned, tracks sleep, and
periodically vibrates to prompt you to move.
• Fitbit Charge 2 calculates steps taken, calories burned, elevation climbed, and
distance traveled, giving you a clear picture of how much you’re moving every
day.

Future Technologies
1. 5G Smart Phone and Network. 5G is the fifth generation of cellular mobile
communications. It succeeds the 4G (LTE/WiMax), 3G (UMTS) and 2G (GSM)
systems. 5G performance targets high data rate, reduced latency, energy saving, cost
reduction, higher system capacity, and massive device connectivity.
2. Avatars, Surrogates, and Robotics. While avatars (like this one from the game
Second Life) and surrogates were once just the stuff of games, virtual reality and
computer interfacing, now they’re taking on more active roles as replacements for
living, breathing humans.

22
3. Hologram in Retail Store. Stores of the future will offer increasingly immersive and
ultimately more reward experiences, rather than just being a place that customers
come to meet their material needs. This could include technology such as
holography.

Summary
A Massive Open Online Course (MOOC) is an online course that has open access and
interactive participation by means of the Web. MOOCs provide participants with course
materials that are normally used in a conventional education setting - such as examples,
lectures, videos, study materials and problem sets.

23
Assessment: (Post-Test)
Multiple Choice. Answer the question that follows. Choose the best answer from
among the given choices.
1. This is a mechanical robot having the characteristics that do can things like humans.
A.5G C. Hologram
B. Smart Glass D. Avatar
2. It is category of technology that can be worn by a consumer and often include
tracking for information.
A. Wearable technology C. Smart Watch
B. Smart phone D. MOOCs
3. A technology that will calculate and monitor your heart rate.
A. Misfit Phase Hybrid C. Fitbit Charge 2
B. Heart Rate Monitoring Device D. Avatar
4. A form of technology-mediated communication that enables the user of a mobile
device to communicate with someone in a different location.
A. Telephone C. Mobile Phone
B. Laptop D. Mobile Communication
5. It is an open access and interactive way to facilitate students’ online study.
A. Massive Open Online Course C. 4G
B. Holography D. Fitbit charge
6. It is a cybercrime in which a target or targets are contacted by email, telephone or
text message by someone.
A. Phishing C. Cybercrime
B. Cyberbullying D. Hacking
7. It is the program which attach themselves to the computer or file and then circulate
themselves to other files and to other components on a network.
A. E-mail Spoofing C. Cyber Stalking
B. Virus D. Hacking
8. It is online harassment and online abuse it involves following a person’s movement
across the internet by posting threatening messages to the victim.
A. Hacking C. Virus
B. Cyber Stalking D. E-mail Spoofing
9. A person who breaks in or trespasses a computer system and gaining unauthorized
access to the data.
A. Hacker C. TV Broadcaster
B. Call Center Agent D. Radio DJ

24
10. It is a wireless handheld device that allows users to make and receive calls and to
send text messages, among other features.
A. Computer C. Mobile Phone
B. Telephone D. Laptop

25
26
Pre-Test Lesson 1 Lesson 1
Unlocking Words Activity 1: Matching Type
1 . Cybercrime 1 .A
1. A
2 . Virus 2 .K
2. B
3 . Mobile Phone 3 .J
3. A
4 . Phishing 4 .E
4. A
5 .G
5. D
6 .I
6. B Lesson 1 7 .H
7. A Activity 2: Four Pics One Word 8 .F
8.1 D . TV Broadcaster 9 .D
9. 2C . Mobile Phone 10 .B
10. B3 . Cybercrime
4 . Phishing
5 . Computer
Lesson 1 Lesson 2
Activity 3: Word Puzzle Activity 1: Complete Me
1. Hacking 1. A mobile browsing
2. Mobile Phone 2. Unified Messaging
3. Phishing 3. Touch Screen
4. Opportunity 4. Gaming
5. Challenge 5. Internet Connectivity
6. TV Broadcaster 6. Digital camera with video capability
7. Cybercrime
8. Cyberstalking
9. Cybercriminal
10. Hacker
11. Virus
12. E-mail Forging
13. Mobile Communication
14. Internet
15. Media
Key to Answers
27
Lesson 2 Lesson 2
Activity 2: Modified True or False Activity 3: Connect Me
1. T 1. E. Smart Phone
2. T 2. C. Smart Watch
3. T 3. G. Smart Glass
4. Fifth 4. F. Avatars
5. Software Application 5. D. Heart Rate Device
6. Online Course 6. E. Smart Phone
7. F 7. I. Misfit Phase Hybrid
8. T 8. H. Fitbit Charge 2
9. Fitness Bands 9. B. 5G
10. T 10. A. Holography
Post-Test
1. D
2. A
3. B
4. D
5. A
6. A
7. B
8. B
9. A
10. C
Key to Answers
28
Lesso
n 1 Synthesizing your
Activity
( 5: Learning
Answers may vary, as this is) a
personal inventory.
Lesso
n 2 Situational
Activity
( 1:
PossibleSimulation
answers only. )
Response
1 What is your
may stand
vary. on the
. Reproductive
2 How Health Bill?
do you address the need for more information
. advocacy
Solid Waste on the Ecological
Management?
3 Where will this city be 4
. What
4 from
years is now?
your leadership doing on the need for housing
. relocation of our urban
illegal
settlers?
5 How do you alleviate traffic
. congestion in the city?
Lesso
n2
Activity
Social Media
( 2: Scenario
Possible )
answers
Informatio The situation of the parties involved in the video,
ut including b
( nWhat
needs not limited to the bully, the victim, the school administrators, the
nee
information do classmates, the parents, and the first-hand witnesses
d?)
you
Sources News sites, First-hand Sources of Information
( Where will
of )
you get
informati
them?
on
Access to Web Browsing, interview and or communicate intent to the
( How will )
the parties directly involved
you access
informatio
them?
n Evaluate
( How will you
information Check credibility of websites, do background check of the
quality of
check the sources of information
information?
)
Organize
( How will you
information Recordings of interviews and other means of correspondence
store
organize and
them?)
Communicate
( How will you
information Post on social media account, narratives, etc.
communicat
create and
e them?)
Key to Answers
29
Less
on 2 Informatio
Activit
( 3: n Ethics
yAnswers may vary based on personal inclination.
Ratings will be absed on the Rubrics
provi
ded.)
Less
on 2 Detecting Fake
Activi
( ty 4: News Online
Students can search a host of other possible
just
answers of
someonline. The answers below are
the websites.)
Website Address/ What it does
Name
https://adobochronicles. THE ADOBO is your source of
com/ to-date, unbelievable
CHRONICLES up-news. Everything
on this
you site is based on fact, except for
read
( thelifted
lies.https://adobochronicles.com/a )
from bout/
pinoypolitics.altervista.org This account has been suspended as
itcompliant
is not with the regulati.
community on
( lifted http://pinoypolitics.altervist)
from a.org/
thephilippinechronicle.com The Philippine Chronicle
satirical
is one ofwebsites,
the many
( Launched
lifted from just last July
hashtag/content/382094/th
https://www.gmanetwork.c
2014.
list-of-pinoy-fake-
ink-before-you-click-
om/news/
news-sites/story/).
sowhatsnews.wordpress.
com This website, which started -
out
sult in boredom
of 2011 as a in
“rethe office,”
commotion
has always among -
createdFilipino
( cia lifted from
netizens and politi
news/hashtag/content/382094/
ns https://www.gmanetwork.c
click-list-of-pinoy-fake-
think-before-you-
om/
news-sites/story/).
eritastimes.com An apparent pun of the Latin word “Veritas”
meaning truth and “irita” or annoy in Tagalog,
The Eritas Times needs more careful eyes to see
through its “authority and credibility.” Its layout
looks like that of a legitimate newspaper, so you
wouldn’t immediately realize it’s a fake news site
unless you see its copyright period way - down be
low: 2014-2070 (lifted from https://www.gmanet -
work.com/news/hashtag/content/382094/think-be -
fore-you-click-list-of-pinoy-fake-news-sites/story/).
Key to Answers
References
Learn.org. “How Can I Become a TV Broadcaster”. Accessed at January 17, 2020,
https://learn.org/articles/How_Can_I_Become_a_TV_Broadcaster.html

igi-global.” Mobile Communication”. Accessed at January 17, 2020,


https://www.igiglobal.com/dictionary/communicame/34130

techopedia.” What does Mobile Phone mean?” Accesed at January 17,2020,https://


www.techopedia.com/definition/2955/mobile-phone

techopedia. “ What does Cybercrime mean?” Accessed at January 17,2020, https://


www.techopedia.com/definition/2387/cybercrime

Phishing.org.” What is Phishing”. Accessed at January 17,2020, http://www.phishing.


org/what-is-phishing

Vangie, Beal. “Wearable Technology”. Access at January 17,2020, https://www.


webopedia.com/TERM/W/wearable_technology.html

Margareth , Rouse . “Smart Watch”. Access at January 16, 2020, https://


internetofthingsagenda.techtarget.com/definition/smartwatch

Margareth , Rouse . “Smartphone”. Access at January 16, 2020, https://


searchmobilecomputing.techtarget.com/definition/smartphone

James, Peckman. “ Best fitness tracker 2020:the top 10 activity bands on the planet”.
Accessed at January 17,
2020.https://www.techradar.com/news/wearables/10best-fitness-trackers-1277905

PC encyclopedia. “fitness tracker”. Accesed at January 16, 2020 ,


https://www.pcmag. com/encyclopedia/term/67469/fitness-tracker

Adam, Birkett. “fitbit”. Acceseed at January 17, 2020, https://unsplash.com/photos/


QRWAdBCqysc

Rozalynn S. Frazier. “17 Best Fitness Tracker” . Accessed at January 17, 2020.
https:// www.health.com/health/gallery/0,,20929976,00.html?slide=407559#40755

Wikipedia.”Smartglasses”. Accessed at January 17, 2020, https://en.wikipedia.org/


wiki/Smartglasses

Terri, Briseno. “10 Futurist Predixtions in the world of Technology”. Accessed at


January 17, 2020. https://electronics.howstuffworks.com/future-tech/10-futurist-
predictionsin-the-world-of-technology10.htm

techopedia.” Massive Open Online Course”. Accessed at January 17, 2020, https://
www.techopedia.com/definition/29260/massive-open-online-course-mooc
30

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy