LM Ict Computer 10 4th Q

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 23

INFORMATION & COMMUNICATION TECHNOLOGY (ICT) 10

CURRENT TRENDS AND ISSUES IN ICT


FOURTH QUARTER; 2021-2022

ONLINE INFLUENCE IN
THE DIGITAL SECURITY AND
TECHNOLOGY HEALTH AND
TRENDS AND DATA
AND OTHER ENVIRONEMNTAL
CAMERAS PROTECTION
TRENDS IN IMPACT OF ICT
ICT

VIDEO BLOGGING ON ADVANTAGES AND DISADVANTAGES OF


ICT

MODULE PRETEST:
Before learning on this module, let’s have first an initial activity in which it will
recall about your previous experiences and will assess your background/previous knowledge related
to the topic.

MULTIPLE CHOICE: Read each item carefully. Choose the BEST answer among the choices given. Write
your answer on the provided worksheet. Write only the letter of the correct answer on the worksheet provided.
1. It is the practice of storing and managing data using network and remote servers over the Internet.
a. Analytics b. Cloud Computing c. Mobile Application d. User Interfaces
2. It is the process which helps in discovering the informational patterns with data.
a. Analytics b. Cloud Computing c. Mobile Application d. User Interfaces
3. He is considered as one of the most important pillars of Information Technology. He is responsible for
building Microsoft, the most popular software company in the world.
a. Steve Jobs b. Larry Page c. Mark Zuckerberg d. Bill Gates
4. It signifies the process of making a copy of the original data (files or programs) into other storage.
a. User authentication b. Anti-Virus c. Backup d. Firewall
5. It records and stores photographic image in digital form.
a. Digital Camera b. Memory Card c. Monitor d. Scanner
6. This type of digital camera can be found in smartphones.
a. Point-and-shoot b. Camera phone c. Bridge camera d. DSLR
7. This element of ergonomics means alternating tasks within a job minimizes repetitive activities and
reduces wear and tear on the body.
a. Appropriate work pace b. Training and education c. Task variety d. Work breaks
8. This is an offense against the confidentiality, integrity, and availability of information or computer data.
a. cybersecurity b. cybercrime c. perjury d. libel
9. In ergonomics, this pertains to the acquisition of appropriate skills to do a job.
a. Training and education b. Appropriate work pace c. Work breaks d. Task variety
10. Possess the ability of self-replication; however, they cannot infect other programs.
a. Malware b. Worms c. Trojan d. Virus
11. This is the act of publishing false statements.
a. serendipity b. pardony c. perjury d. libel
12. This program secretly collects sensitive data about computer users.

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 1|Page


a. Spyware b. Malware c. Trojan d. Virus
13. A false message being spread by email in order to deceive users.
a. Spyware b. Malware c. Adware d. Hoax
14. Is used as protective measure to deter theft of laptops.
a. Security Cable b. Security Wire c. Antivirus d. Firewall
15. This is visual way to display and compare data, also known as graph.
a. Workbook b. Function c. Formula d. Chart

LESSON NO. 1
ONLINE TECHNOLOGY AND OTHER
TRENDS IN ICT

EXPLORE!
ACTIVITY 1: TRUE OF FALSE?
Direction: Write TRUE if the statement is correct, otherwise write FALSE. Write your
answer on the provided worksheet.
1. An online system is a state of connectivity to the cyberspace through the Internet or computer network.
2. The service industry uses online systems to attract clients and customers.
3. Social gaming is only played on mobile devices.
4. A person uses the mobile banking when he or she withdraws over the counter.
5. Hotel reservations can be done through an online system.

LESSON DISCUSSION

ONLINE TECHNOLOGY
Almost a hundred years since the first modern computer was created, we not only have
more powerful mobile computers, but we also have constant interconnectivity with millions
of people through our computers and mobile devices. We acquire and share information in
real time. This is the current reality of ICT – a world with exponentially increasing connectivity. We are users of
an online system.

An online system is a state of


connectivity to the cyberspace through the
Internet or computer network. The most
popular online system that you are aware
of is social media, where people connect
with each other to share information.
Examples of social media include social
networking sites (Facebook, Instagram,
Twitter) video-sharing sites (YouTube,
Vimeo, Dailymotion), blog sites
(Wordpress, Blogger, Tumblr), and social gaming platforms, among others.
However, there are other forms of online systems that you may be using. Carpooling services such as
Grab and Uber are examples of a service-oriented industry that use an online system to connect their partners
and their customers.
Online systems are widely used in different industries, such as the following:
 SERVICE INDUSTRY – The service industry includes major sectors such as business process
outsourcing, hotel and restaurant services, and airline industry, all of which are increasingly reliant on
online systems to attract clients and customers. For example, the hotel and the airline industry grow on
online bookings and online ticketing.

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 2|Page


 SOCIAL GAMING – With more and more people gaining access to the Internet every day, more people
also play games online against other players who are also connected to the same game platform.
Consoles, personal computers, and mobile devices can have Internet access and allow users to
connect to servers and play online games with each other.
 BANKING AND FINANCE – Banking institutions have introduced secure online systems for their
clients so that they can access their accounts and make electronic transactions 24 hours a day.
Through an online system, clients can check their balance, transfer funds, and make payments
anytime.

MODERN TRENDS IN ICT


Within Information and Communication Technology, there are other current trends. These may include:
 CLOUD COMPUTING
One of the most talked about concept in information technology is cloud computing. Cloud computing is
the practice of storing and managing data using a network of remote servers over the Internet.
 MOBILE APPLICATION
Mobile applications or mobile apps have become a success since their introduction. They are designed
to run on Smartphones, tablets, and other mobile devices. They are available for download using
various mobile operating systems such as Apple, Blackberry, Nokia, ect. Some of the mobile apps are
available free, while some cost money to download.
 USER INTERFACES
User interface has undergone a revolution since the rise in popularity of touchscreens. The touchscreen
has revolutionized how users interact with applications. It enables users to directly interact. With what is
displayed. It also removes any intermediate input tools such as the mouse and the stylus pen.
 ANALYTICS
The field of analytics has grown exponentially in recent years. Analytics is a process which helps in
discovering the informational patterns with data. The field of analytics is a combination of statistics,
computer programming; and operations research.
The ever-changing field of information technology has seen great advancement and changes in the last
decade. From the emerging trend, it can be concluded and its influence on business is evcer growing, and it
will help companies to serve customers better.

NOTABLE ITS INNOVATORS AND THEIR CONTRIBUTIONS


Being passionate about improving the world though technology is the defining characteristic of the
following individuals. They made huge strides in transforming the world with technology. Do you know them?
Here are a list of some of these people.
1. Bill Gates – He is considered as one of the most important pillars of Information Technology. He is
responsible for building Microsoft, the most popular software company in the world. With the success of
his company, he has consistently ranked as the richest person in the world year after year. Through his
and his wife’s charitable foundation, the Bill and Melinda Gates Foundation, they have almost
eradicated polio worldwide.
2. Steve Jobs – While he lived, he was considered as one of the greatest tech innovators of the century.
He was the co-founder and CEO of Apple Inc., the company that produces iPhones. He revolutionized
the music industry with the iPod, and then changed the landscape of the entire cellphone industry when
he introduced the iPhone. Because of this innovation, smartphones quickly dominated the mobile
phone industry, changing the way we consume media.
3. Mark Zuckerberg – He created Facebook, the largest social networking site with an estimated 1 billion
active users worldwide. Through Facebook, he has grown social media as powerful front that promotes
connectivity and sharing of resources.
4. Tim Berners-Lee – He is the best known for inventing the World Wide Web. He is also the director of
the World Wide Web Consortium or W3C, which oversees the development of the Web.

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 3|Page


5. Larry Page – He is the co-founder and CEO of
Google, a multinational teach company that
specializes in Internet services and products. Apart
from being the largest and most successful search
engine in the world, Google has also expanded to
designing software for smartphones with its
Android OS, the most popular and most widely used
operating system for smartphones.

Mass media, information, and technology are


influential forces in society. New technologies aid the flow of
communication and information. Consequently, it greatly
impacts our perspective about the world. Today, various forms
of media are made available to the public. People can easily access information not just through television or
newspaper, but through social media.

As a person who reads or receives messages, it is an important skill to know how to deconstruct those
messages. This means that we should examine and think about them so we can understand the messages
very clearly and not misunderstand them. We need to learn how to construct them so people can easily
understand the messages we wish to send.

Media and information literacy is defined as a set of competencies that empowers people to access,
retrieve, understand, evaluate and use, create, as well as share information and media content in all formats,
using various tools, in a critical, ethical and effective way in order to participate and engage in personal,
professional, and social activities. The different types of media are print media, broadcast media, new media,
movies (films), and advertising.

Media Literacy and Information Literacy


Media is defined as a means of communication that
has the power to influence people. Radio, television,
magazines, and newspapers are some examples of media.
What does it have to do with media literacy? According to the
United Nations Educational, Scientific and Cultural
Organization or UNESCO, media literacy is the ability to
decode, analyze, evaluate, and produce communication in
varied forms. It also defines information literacy as the ability
to recognize when the information is needed and to locate,
evaluate, communicate, and effectively use information in its
various formats.
However, to be fully information literate, one has to be literate in the use of technology, especially
digital technology. They go hand in hand because information, nowadays, are gathered with the aid of
technology.
Digital literacy is defined by the Colorado Department of Education as the ability to responsibly use
appropriate technology to communicate, solve
problems, access, manage, integrate,
evaluate, design, and create information to
improve learning in all subject areas, and
acquire lifelong knowledge and skills in the 21st
century.

Types of Media
1. Print media is the oldest form of medium. This
medium relies on the technology involving the

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 4|Page


process transferring media text to paper in large quantities. Examples are magazines, journals, newsletters,
tabloids, and comics.

2. Broadcast Media can be defined as media that distribute audio and video content to a mass audience.
Examples are radio and television.

3. New media are those information and entertainment providers accessed via Internet or through mobile
communication. Examples are online newspapers, independent and alternative online news sources,
informational websites, and blogs.

4. Movies (films) are the oldest form of motion picture technology. They have been a popular entertainment
medium capable of capturing life-like video style images.
5. Advertising is the mass media content intended to persuade a targeted audience to take action toward a
product, service, or idea.

Five Major Concepts of Media Literacy


To be able to distinguish between
different media forms and know how to ask
basic questions about everything we see, read,
or hear, we need to understand the five core
concepts of media literacy to help us learn how
to deconstruct and construct media messages.

 Author - the origin of a piece of work, usually the


person or people who constructed it.
 Format - the way a communication is presented;
each type has a unique set of creative tools and
techniques to help form the message.
 Audience - the people who receive a message;
different people understand the message in
different ways.
 Content – a message or messages in a particular communication; some of these contain values and
ideas.
 Purpose – the reason a communication is made; it could be informing, persuading, selling, entertaining, or
a combination of any of these.

FIRM
UP!
ACTIVITY 2: WHO AM I?
Learning Competency: Know people behind ICT; (Critical Thinking, Computing
Technology-ICT)
Career Pathing: Researcher
I. IDENTIFICATION
Direction: Identify what is described in each item. Write directly your answer on the provided worksheet.
1. He is the co-founder of Google.
2. His tech company is the most popular software company in the world.
3. He has helped social media grow into a very powerful front that promotes connectivity and information
sharing.
4. He invented the World Wide Web.
5. He revolutionized the cellphone industry when he introduced smartphones to the world.
II. TABLE COMPLETION
Direction: List at least five notable IT innovators that you’ve known already. Write also their innovations and
contributions through filling out the table below. Use the worksheet provided in answering this activity.
INNOVATORS INNOVATIONS/CONTRIBUTIONS DESCRIPTION OF THEIR
INNOVATIONS/CONTRIBUTIONS

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 5|Page


DEE
P EN!
ACTIVITY 3: LET’S CHECK YOUR UNDERSTANDING!
Direction: Read each item carefully. Answer the following questions. Use the provided
worksheet in answering the questions.
Learning Comptency: Understand what online system and the current trends in ICT; and (Critical Thinking,
Computing Technology-ICT)
Career Pathing: IT Expert

1. What is an online system?


________________________________________________________________________________________
____________________________________________________________________________
2. List three innovators and their contribution to ICT.
________________________________________________________________________________________
____________________________________________________________________________
3. What transactions can you perform using online banking?
________________________________________________________________________________________
____________________________________________________________________________
4. What idea in ICT development has the most potential at present?
________________________________________________________________________________________
____________________________________________________________________________

VALUES INTEGRATION: REFLECTION

Values Integration: PRODUCTIVE


We people wanted to make our life more comfortable. Technology provided us
almost everything just to make our life easier and for us to become more productive.
Productive is one of the keys towards success.
Facing this pandemic, we must use wisely the available resources we have at
home. Apply all the learnings gained from this topic by using it wisely. Be productive
through using technology.

I learned that _______________________________________________________________________


________________________________________________________________________________________
____________________________________________________________________________

TRANSFER!

ACTIVITY 4: LET ME DRAW!


Direction: Through a drawing, imagine the world nowadays having the high technologies. Render your output
on the space provided below. It can be a form of poster-making. Use the space on the worksheet provided.
Learning Competency: Create a poster of a world equipped with high technologies. (Critical Thinking,
Computing Technology-ICT, Creativity and Innovation)
Career Pathing: Artist, Designer

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 6|Page


LESSON NO. 2
THE DIGITAL TRENDS OF CAMERAS

EXPLORE!
ACTIVITY 1: WHAT AM I?
Direction: Picture was presented below. Identify what is it and its uses based on your
own understanding and prior knowledge. Use the worksheet provided in answering this
activity.

For you, what is this? ______________________


What are its uses? __________________________________
_________________________________________________
_________________________________________________
_________________________________________________

LESSON DISCUSSION

Digital cameras have become more popular and affordable ever


since the rise in popularity of smartphones. People use the built-
in cameras of smartphones to take millions of pictures every
day. We can take very good photos even without
expensive cameras. What we need to learn is how to take a
photo with good composition.

DIGITAL CAMERA
A digital camera records and stores photographic
image in digital form. Many current models are also able to
capture sound or video, in addition to still images. Capture is
usually accomplished by the use of a photosensor, using a charged coupled device (CCD). Theses stored
images can be uploaded into a computer immediately or stored in the camera to be uploaded into a computer
or printer at a later time. Images may be archived on photographic compact disc or external hard disk. It can
also be shared via social media like Instagram, and Facebook.

There are many things you can do with a digital camera. Here are just a few examples:

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 7|Page


1. Capture Memories – You can take snapshots of your friends or document your family’s trip to your
hometown or province. You can print them on photo paper, or you can just view them on a computer,
TV, or digital photo frame.
2. Share your photos online – You can post your photos on Facebook, Flickr, Picasa, or other sites
using your smartphone for immediate uploading.
3. Use it as a scanner – You can simply take a photograph of a document. For example, you could take
a picture of your school forms to keep a record of them.
4. Capture data – You can use a camera to help you remember things. You could take pictures of things
like store hours, phone numbers, and more. A camera phone is ideal for this, since you’ll always have it
with you.
5. Start taking photos as a hobby – You can hone your photography skills, get creative, and even use
image-editing software to experiment on your photos.

TYPES OF DIGITAL CAMERAS


Most cameras can be grouped into five main types.
1. Camera phone – You may already have one. Many camera
phones take very good photos. They are easy and
convenient to use.

2. Point-and-shoot – This is a compact camera designed to be


affordable, convenient, and easy to use.

3. Bridge Camera – This camera bridges the gap between


point-and-shoot cameras and DSLRs. It is sometimes called
superzoom.

4. Mirrorless interchangeable-lens camera – This is a pocket- sized


alternative to DSLRs, with interchangeable lenses.

5. DSLR – Short for digital single-lens reflex, this is a large camera with
interchangeable lenses that can take very high-quality photos.

SPECIAL FEATURES
Digital cameras have special features designed to help you take better photos. Depending on what
types of photos you want to take, some of these features can be quite useful. Below are some things you may
want to look for:
1. Red-eye Correction: This automatically removes red-eye, which is useful if you’re taking photos with
the flash on.
2. Sports/Active Child Mode: This allows the camera to focus more quickly to capture action shots.
3. Anti-blink: This feature automatically detects whether someone has blinked and displays a warning
after the photo is taken so you can retake it.
4. Smile Detection: This uses face-recognition technology to take the photo right when the subject
smiles.
5. Blemish Reduction: This automatically retouches your photos to reduce blemishes and wrinkles.

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 8|Page


6. Artistic effects: This allows you to add brush stroke effects, lens distortion, or other effects to give
your photos a unique look.

TAKING PHOTOS WITH A SMARTPHONE


A smartphone is probably the most convenient camera you can have. You always have it with you, it
fits in your pocket, and it doesn’t require any manual adjustment before you can take a photo.
Common Features of a Smartphone Camera
1. Focusing – Many phones have basic cameras that use a
focus-free system. However, more and more phones are
starting to have high-quality cameras that require focusing.
2. Zooming – Many smartphones have a digital zoom you
can use to capture small or distant objects.
3. Scene modes – Scene modes are a great way to take
better photos in specific situations. For example, the
Landscape, Sports, Night Portrait, and Closeup/Macro
modes are each tailored to different situations.
Other features:
Some smartphones have additional features you can use
to take better photos. Here are few features your phone may
have:
1. Grid: The iPhone can display a rule of thirds grid on the
screen to help you compose your photo. You can access
this by tapping the Options button.
2. HDR (High Dynamic Range): This mode helps you capture more detail in the shadows and highlights of
your photos. Generally, it will only work when your subject isn’t moving because your phone needs to
take multiple shots at different exposures before it can layer these shots as one image.
3. Flash: Many smartphones have a flash to help you take low-light photos.
4. Effects: Some smartphones allow you to apply effects to your photos, which can include black-and-
white, tinted, or vintage filters.
5. Front-facing camera: This makes it easier to take a photo of yourself, since you can see the screen
while you are taking the photo.
Keep in mind that higher-end cameras such as DSLRs may not have these features. For everyday
snapshots, the convenience of point-and-shoot cameras and camera phones are often a more practical
choice.

FIRM UP!
ACTIVITY 2: IDENTIFICATION
Direction: Identify what is described in each statement. Choose your answer from
the options inside the box. Write only the letter of the correct answer on the worksheet provided.
Learning Competency: Identify the different types of cameras;
(Critical Thinking, Computing Technology-ICT)
Career Pathing: Photographer, Camera Expert

Point-and-shoot e. HDR i. digital camera


Bridge camera f. grid j. flash
DSLR g. sports mode
Camera phone h. blemish reduction

1. This feature takes multiple shots at different exposures and combines the shots into a single image.
2. This is a type of camera that is something between a point-and-shoot and a DSLR.
3. This camera is very common and convenient to use because it is always with you.
4. This is a compact camera that is affordable, convenient, and easy to use.
5. This provides a guide so you can take photos following the rule of thirds.
6. This makes your skin appear younger and more radiant.
7. This allows you to take photos of fast-moving subjects.
8. This device captures images and stores them digitally.

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 9|Page


9. This helps you take photos in darkly-lit places.
10. This camera takes very high-quality photos.

DEE
P EN!
ACTIVITY 3: QUESTIONS TO ANSWER
Direction: Read each question/statement carefully. Answer it concisely and
comprehensively.
Learning Competency: Explain the importance of camera and its features; (Critical Thinking, Computing
Technology-ICT)
Career Pathing: Spokesperson, Photographer
1. What can you do with a digital camera?
________________________________________________________________________________________
____________________________________________________________________________
2. What do you mean when someone says “against the light” to your snapshot?
________________________________________________________________________________________
____________________________________________________________________________
3. Which do you prefer for taking pictures? Common digital camera or smartphone? Why?
________________________________________________________________________________________
____________________________________________________________________________
4. Compare the features of digital and smartphone cameras.
________________________________________________________________________________________
____________________________________________________________________________

VALUES INTEGRATION: REFLECTION

LOVERS OF LIFE
“Life is like a camera. Focus on what's important. Capture the good times. And if things
don't work out, just take another shot.” - Ziad K. Abdelnour

TRANSFER!
ACTIVITY 4: PICTURE PERFECT
Direction: Using a digital camera or smartphone, take two (2) photos of the following area of
photography and make sure to apply filter or just camera settings to add effects to the image. You can also use
editing tools or apps for photo enhancement.

1. Child Photography 4. Selfie


2. Trick in Photography 5. Groupie
3. Scenery or Landscape 6. Fashion
Learning Competency: Take photos using various features of a smartphone camera. (Critical Thinking,
Computing Technology-ICT, Creativity and Innovation)
Career Pathing: Camera Man, Photographer, Camera Expert
Things to do to those students who have Android/Smartphones: Organize your photos using Microsoft
Word or WPS Application through inserting all the photos taken with proper labels per area. Use long bond
paper.
Options of Submitting the Output:
 Option 1: Save your output first, and send it directly to my Facebook Account: Jose Roosebert
Travero Torniado
 Option 2: Print your output and submit it during the Retrieval and Distribution of Modules.
Things to do to those students who DON’T have any Android/Smartphones: With the same area of
photography mentioned above, just cut pictures from old unused books, magazines, newspapers, etc., found in
your respective houses. Paste it in a long white bond paper. Do not forget to put labels per area. Submit your
output during the Retrieval and Distribution of Modules.

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 10 | P a g e


LESSON NO. 3
SECURITY AND DATA PROTECTION

EXPLORE!
ACTIVITY 1: MULTIPLE CHOICE
Direction: Write only the letter of the correct answer on the worksheet provided.
1. This program infiltrates an operating system in a seamless manner, with the intent of inflicting harm on the
computer or user.
a. system interference b. illegal access c. malware d. virus
2. This is a malicious program with the possibility of self-replication. In a computer, it seeks other files trying to
infect them and the ultimate goal is to spread to other computers.
a. Trojan horse b. spyware c. adware d. virus
3. This is a program that secretly collects data about computer users, typically to gain access to information
such as passwords, credit card numbers, etc.
a. intelligence theft b. Trojan horse c. spyware d. worm
4. This type of malware possesses the ability of self-replication; however, they cannot infect other programs.
Their usual intent is to take control of your computer and allow rernote control through backdoor methods.
a. adware b. spyrus c. worm d. virus
5. This is a program that uses collected data about a user in order to display advertisements in a way regarded
as intrusive. It usually manifests itself in the form of many pop-up windows that display ads.
a. adware b. spyrus c. Worm d. virus
6. This is the act of obtaining or retrieving information from a computer system without right.
a. system interference b. illegal access c. trespassing d. virus
7. This is the act of receiving electronic transmissions before they reach the intended recipient made by
technical means (such as hacking) and without right, of any private computer data.
a. illegal interception b. data interference c. cybercrime d. libel
8. This is the intentional acquisition and use of an identity belonging to another person without right.
a. computer-related identity theft b. computer-related forgery
c. computer-related posing d. computer-related theft
9. This is the act of using or manipulating computer data for the purpose of perpetuating fraudulent or
dishonest design.
a. computer-related identity theft b. computer-related forgery
c. computer-related posing d. computer-related theft
10. This is the act of publishing false statements with the use of computers or computer systems.
a. fake news b. perjury c. gossip d. libel
LESSON DISCUSSION

Now more than ever, people are more connected digitally with the aid of computers and mobile
communications technology. Computers are becoming smarter and more powerful, a new reality that
must be supported with the right platforms to advance a digitally connected world.

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 11 | P a g e


In an increasingly digital and
connected world, security remains to be a top
concern. While we must keep abreast of the
latest developments in computers, we
must also stay alert with the risks that
come with exposing ourselves to a more
connected cyberspace.
According to the Philippines’
Republic Act No. 10175 or the Cybercrime
Prevention Act of 2012, cybersecurity is the
collection of tools, policies, actions,
practices, and technologies that can be
used to protect the cyber environment.
It also defines cyber as any computer or computer network, the medium in which online communication
occurs. This law also specifies that a computer is an electronic, magnetic, electrochemical, or other data
processing or communications device that is capable of performing logical, arithmetic, routing, or storage
functions and which includes storage facility or communications facility that is directly related to the device. A
computer system is any device or group of interconnected or related devices that performs automated
processing of data.
Part of cybersecurity is information security. Information security or data security is the preservation
of information or computer data’s confidentiality, integrity, and availability. We began with a definition of terms
so that we could recognize a cybercrime when it is being committed. Cybercrime can be committed with the
use of cell phones, social media, and other platforms.
With these definitions, smartphones and other types of mobile phones are also considered as
computers and computer systems that are also part
of the cyber environment. On the other hand,
calculators, while they are considered as
computers in other uses, may not fit in this
definition because they do not carry a storage
facility or communications facility

CYBERCRIME OR COMPUTER CRIME


In general, a cybercrime is an offense
against the confidentiality, integrity, and
availability of information or computer data. The
following is a list of cybercrimes, with examples of each.

 LIBEL – This is the act of publishing false


statements with the use of computers or
computer systems. An example of this cybercrime includes defamatory false statements posted on social
media.
 ILLEGAL ACCESS – This is the access to a computer system without right. For example, it is considered
illegal access for some to take your phone without your permission and read the contents of your private
messages. Another example would be someone accessing your personal computer without your
permission.
 DATA INTERFERENCE – This is the intended alteration, damaging, deleting, or deteriorating of
computer data, electronic document, or electronic data message without authority. For example, if you
know that your storage device, like a flash drive, is infected with a virus yet intentionally let your friend
use it to damage his or her computer, then you committed a data interference. Another example is the
intentional sending or spreading of malware, the hacking of websites, and the baking down of websites
without authority.
 ILLEGAL INTERCEPTION – This is the obstruction from by technical means without right of any non-
public transmission of computer data to, from or within a computer system including electromagnetic
emissions from a computer system carrying such computer data. An example of illegal interception is
when you emails, text messages, or chats are monitored with the use of software without your knowledge
or permission.

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 12 | P a g e


 SYSTEM INTERFERENCE – This is the purposeful alteration or reckless hindering or interference with
the functioning of a computer or computer network. This is done when someone inputs, transmits,
damages, deletes, alters, deteriorates, or suppresses computer data or program, electronic document, or
electronic data message without authority.
 COMPUTER-RELATED FORGERY – Tis is the act of intentionally using computer data for the purpose
of creating a fraudulent or dishonest design. For example, a person built a website that pretends to be
the homepage of a bank or another organization.
 COMPUTER-RELATED IDENTITY THEFT – This is the intentional possession, misuse, use, transfer,
deletion, or change of an identifying information belonging to another person without authority. An
example is when someone uses your profile picture to pose as a different person on social media. It can
be also considered identity theft when another person uses your name and pictures and pretend to be
you on social media.

MALWARE
Malware, short for malicious software, is a program that do unwanted actions or damage to an
operating system in a seamless manner, with the intent of harming the computer or user. It is a product of
cybercrimes, particularly by data interference and
system interference. The following are the
different types of malware.
 VIRUS – is a malicious program with the
possibility of self-replication. In a
computer, it seeks other files trying to
infect them and the ultimate goal is to
spread to other computers. Depending on what
malicious code it contains, it may cause more
or less damage to your computer.
 WORMS – like viruses, possess the ability of
self-replication; however, they cannot
infect other programs. Their usual intent is to
take control of your computer and allow
remote control through backdoor methods.
 TROJAN HORSE OR TROJAN – is a program that supports to be useful or good to mislead users of
its true intent. It can be presented in a form of games or files in e-mail attachments. It infiltrates the
computer that deals negative effects, such as controlling your computer, deleting data, spreading
viruses, sending spam, ect. It does not replicate and it needs to be executed. Users need to download
or install Trojans for them to take effect.
 SPYWARE – is a program that secretly collects data about computer users (passwords, credit card
numbers, ect.); therefore, it spies on users. The most common spyware infections usually occur while
visiting suspicious sites.

 ADWARE – is a program that uses collected data about user in order to display advertisements in a
way regarded as intrusive. It usually manifests itself in the form of many pop-up windows that display
ads.

BEST PRACTICES AGAINST CYBERCRIME AND MALWARE


The following are simple guidelines we can follow to
secure ourselves from malicious intent from cyberspace.
1. Report issues to the web admin. If you find
yourself a victim of cybercrime, immediately report
the issue to the web admin, particularly the site
where the cybercrime occurred. If you see anyone
committing identity theft online, especially on social
media, report this to the web administrator.
2. Always log out. Never leave your account logged
in especially when you are going away. This will
prevent security breaches such as illegal access.
SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 13 | P a g e
3. Use anti-malware defenses. Install antivirus software and set up a firewall.
4. Regularly scan for viruses. A weekly or even daily check-up of your files and programs will help clean
up or delete infected files from your computer.
5. Avoid visiting suspicious sites. Viruses often come from these websites. Consider blocking access
to these websites.
6. Always scan external storage devices. Before opening the contents of storage devices in your
computer, scan them first for malware. Never use a storage device that you just picked up from
somewhere.
7. Clear your history. Clear your browsing history, your cookies, cache, and data after using a computer.
Do this when you use a public computer. This way, you protect your privacy and personal information
from being stolen.
8. Backup your files. Have a hard drive where you can regularly back up your files. This is precaution so
that if your computer needs to be rebooted for any reason, your files are secure from loss of data.
9. Strengthen your passwords. When creating passwords, never use a recognizable word. Always use
a combination of letters and special characters. Your passwords must vary for different accounts. Never
use your birthday or any other personal information as your password. Most importantly, never reveal
your password to anyone.
10. Never download content from unverified sources. Make sure to download from official distributors,
manufacturers, or creators. If you use a smartphone, avoid downloading from third-party sources.
11. Use two-step verification. This security feature adds another layer of protection

Other Guidelines
While the aforementioned guidelines help protect you from cyber-attacks, the following guidelines will
help keep you from violating the Cybercrime Prevention Act.

1. Never read chat messages that are not yours. Unless you were given the permission to view these
messages, it is against the law to access the private messages of another person without their permission.
2. Always verify the source of information. Be very critical or doubtful of any information or news that you
see on the Internet. Only rely on reputable and veritable sources, and not on blog sites pretending to be news
sites.
3. Never spread false information. Do not share information that did not pass a thorough critical analysis. If
you are baited by a sensational headline, take time to read the whole content of the news, only then should
you make an objective, informed opinion about it.
4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never pick a fight in
cyberspace, especially on social media.

FIRM UP!
ACTIVITY 2: IDENTIFICATION
Direction: Identify what cybercrime is committed in the following situations.
Choose your answer from the options in the box. Write only the letter of the correct answer on the worksheet
provided.
Learning Competency: Identify what cybersecurity and cybercrime is; (Critical Thinking, Computing
Technology-ICT)
Career Pathing: IT Expert
a. libel e. system interference
b. illegal access f. computer-related forgery
c. data interference g. computer-related identity theft
d. illegal interception

1. Someone accessed your personal computer without permission and copied some personal information.
2. Using social media, your friend spreads rumors about someone but you know this is false.
3. Hackers used signal jammers to prevent government computers from accessing the Internet.
4. Without your knowledge, someone created a profile on social media using your pictures.
5. A hacker designed a website to make it look like a government website. It aims to lure users to provide
personal information.
SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 14 | P a g e
6. Without your knowledge, your friend installed an app on your smartphone so that all messages you send
and receive are also sent to your friend's phone.
7. Someone passed you a USB flash drive knowing it has a virus so your computer will get infected.
8. A friend you met online whom you have gotten close to but never met turned out to be a different person
who used another person's pictures.
9. Someone hacked and stole your social media account and deleted it.
10. Someone hacked and stole your social media account and uses it, while you no longer have access to it.

DEE
P EN!
ACTIVITY 3: QUESTIONS TO ANSWER
Direction: Read each question/statement carefully. Answer it concisely and
comprehensively.
Learning Competency: Explain the importance of protecting oneself and computer data from any
cyber-attacks and hackers; (Critical Thinking, Computing Technology-ICT)
Career Pathing: Spokesperson
1. How can you protect yourself and your computer data from cyber attacks or hackers?
________________________________________________________________________________________
____________________________________________________________________________
2. What things can you do to avoid the loss of data or file?
________________________________________________________________________________________
____________________________________________________________________________
3. What is the significance of always logging out of your different accounts?
__________________________________________________________________________________
__________________________________________________________________________________
4. What steps can you take to protect your privacy in case your smartphone is stolen?
__________________________________________________________________________________
__________________________________________________________________________________
5. Why is it important to avoid posting false information online, especially if this false information is about a
person?
__________________________________________________________________________________
__________________________________________________________________________________

VALUES INTEGRATION: REFLECTION

Values Integration: LOVERS OF LIFE, RESPECTFUL


“Privacy – like eating and breathing – is one of life’s basic requirements.”
– Katherine Neville

Expound the statement of Katherine Neville. Make it brief.


________________________________________________________________________________________
____________________________________________________________________________

TRANSFER!
ACTIVITY 4: MY CYBERSECURITY POSTER
Direction: Create a poster that raises awareness on cybersecurity and data protection.
Illustrate different malicious software and cybercrimes you want to emphasize. Use the space on the provided
worksheet.

Learning Competency: Create a cybersecurity poster that raises awareness on cybersecurity and data
protection. (Critical Thinking, Computing Technology-ICT, Creativity and Innovation)

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 15 | P a g e


Career Pathing: Artist, Designer

LESSON NO. 4
INFLUENCE IN HEALTH AND
ENVIRONMENTAL IMPACT OF ICT

EXPLORE!
ACTIVITY 1: LET ME KNOW!
I. TRUE OR FALSE
Direction: Write TRUE on the worksheet provided if the statement is correct. Otherwise, write FALSE.
1. Ergonomics is the study of designing and positioning computer equipment to reduce health problems.
2. Electronic waste or e-waste includes all electronic and electronic products that are no longer wanted or
useful.
3. Smart card is a device used to keep track of energy use minute by minute
4. Flexibility is a major component of economics and an important feature of computer devices.
5. Alternating tasks within a job minimizes repetitive activities and reduces wear and tear on the body.

II. MATCHING TYPE


Direction: Match the descriptions in Column A with elements of ergonomics in Column B. Write directly the
letter of the correct answer on the worksheet provided.

Column A Column B
1. Recovery time between repetitive or a. Appropriate work pace
forceful movements in every pace of work
2. Acquiring the appropriate skills to do a job b. Rest breaks
safely and efficiently
3. Stopping work for a period of time during the day c. Training and education
4. Alternating tasks within a job d. Task variety
5. Resting stretching or changing position between tasks e. Work breaks
LESSON DISCUSSION

The computer is a vital tool in many different jobs and activities, for adults and children. However, long
periods of using a computer can increase your chance of developing an injury. Inappropriate computer use can
cause muscle and joint pain and eyestrain. Many of the technologies use a lot more resources and power.
Using and manufacturing them can create problems in the environment. However, technology takes the lead in
solving this issue to avoid complications.

EFFECTS OF ICT ON HEALTH

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 16 | P a g e


Many computer-related health
problems are minor and caused by a poorly
designed work environment. Keyboards and
computer screens may be fixed in place or difficult
to move. Desks and chairs may also be
uncomfortable. The computer screen may be
hard to read, with problems of glare and poor
contrast. The hazardous activities
associated with these unfavorable
conditions are collectively referred to as work
sensors. Although these problems may not be of
major concern to casual users of computer systems, continued stressors such as eyestrain, awkward posture,
and repetitive motion, may cause more serious and long-term injuries. If nothing else, these problems can
severely limit productivity and performance.
Ergonomics, or the study of designing and positioning computer equipment, has suggested a number
of approaches to reduce these health problems. Ergonomics is an approach which puts human needs and
capabilities at the focus of designing technological systems.
The objective of ergonomics is to ensure that humans and technology work in complete harmony, with
the equipment and tasks aligned to human characteristics. The placement and design of computer tables and
chairs, the positioning and design of display screens, and the slope of the keyboard are carefully studied.
Flexibility is a major component of ergonomics and an important feature of computer devices. People
of differing sizes and preferences require different positioning of equipment for best results. Some people, for
example, want to have the keyboard on their laps; others prefer to place the keyboard on a solid table.
Because of these individual differences, computer designers attempt to develop systems that provide a great
flexibility.

ELEMENTS IN ERGONOMICS

Work that is ergonomically designed includes these


important elements:
1. Task variety - Alternating tasks within a job
minimizes repetitive activities and reduces wear and tear
on the body.
2. Appropriate work pace - When the pace of work is too
fast, the body has very little recovery time between
repetitive or forceful movements.
3. Work breaks - Resting, stretching, or changing
position between tasks helps prevent muscle fatigue and
injury.
4. Rest breaks - Stopping work for a period of time
during the day provides an important physical and
mental break.
5. Training and education - Acquiring the appropriate skills to do a job safely and efficiently prevents
accidents and injury.

Tips to Help You Improve the Ergonomics at Your Working Area


Simple changes can make a big difference. Here are some tips to help you improve the ergonomics of
your work area:
 Keep tools, materials, and equipment within easy reach.
 Work at proper heights in relation to your body; use adjustable workstations (chairs, tables, platforms).
 Work with a good, comfortable posture.
 Reduce excessive repetition in tasks and activities.
 Avoid excessively forceful movements - e.g., striking computer keys with too much force and lifting
heavy loads.
 Minimize general fatigue by taking appropriate work and rest breaks.
 Avoid direct pressure on legs, feet, and hands.
 Maintain a comfortable environment (heat, light, humidity).

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 17 | P a g e


 Organize your work processes efficiently. .
ENVIRONMENTAL IMPACT OF ICT

Many computer components can be recycled. Specialized companies that recycle computers sell
usable materials and safely dispose of hazardous materials. Some computer manufacturers offer recycling
possibility by offering old for new computer exchanges.
In case you have electronic trash, you can search online to find out which companies offer electronic
waste management services. All you need to do is type the words "electronic waste" or "disposal of electronic
waste" in the search field. We should also consider minimizing the use of paper. We can use electronic
documentation in order to save on paper. Toners and ink cartridges should also be excluded from regular
rubbish, since they can be reused.

USING ICT TO REDUCE ENERGY

 Energy Management
Today, there is an estimated 7 billion people. We consume a lot of energy and resources. Without
energy, it would be difficult to imagine today's society. It is one of the key factors in our survival and way of life.
Therefore, effective energy management needs special emphasis and it is done on both macro and micro
levels. In terms of computers, energy management is integrated into an operating system, which allows users
to make adjustments in order to save energy.

 Building Management
 Modern buildings have computer-controlled environment systems in place.
 An air-conditioning system keeps the temperature at a reasonable level. There may also be
automatic window openers and sun screens to control the effect of sunlight and cool down the
building.
 Solar panels reduce the consumption of electricity from the national grid.
 Energy monitoring displays help staff know what is using up the power.
 LED lighting uses only a fraction of energy without sacrificing luminance or brightness.
 Water conservation systems are designed to reuse water, especially in industrial factories.

 Smart Meters
In general, people at home do not know how much energy is being used at any moment and what is
using it. The idea of a smart energy consumption meter is to keep track of energy use minute by minute. A
display in the home then shows what is going on.

 E-Waste
Electronic waste or e-waste can include all electronic and electronic products that are no longer
wanted or useful. Computers and computer equipment including printers, scanners, keyboards, mouse,
monitors, as well as televisions, are the most common forms of e-waste. Other e-waste includes DVD and CD
players, stereo and sound systems, photocopiers, fax machines, digital cameras, game consoles, and mobile
phones.

FIRM UP!
ACTIVITY 2: QUESTIONS TO ANSWER
Direction: Answer the questions briefly. Use the worksheet provided for this
activity.
Learning Competency: Identify ergonomics, its objectives and components; (Critical Thinking,
Computing Technology-ICT)
Career Pathing: Spokesperson, IT Expert

1. What are the objectives of ergonomics?


________________________________________________________________________________________
____________________________________________________________________________
2. Why is flexibility a major component of ergonomics?
________________________________________________________________________________________
____________________________________________________________________________

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 18 | P a g e


3. How can we say that an equipment is ergonomically designed?
________________________________________________________________________________________
____________________________________________________________________________
4. How can ICT help reduce the consumption of energy?
________________________________________________________________________________________
____________________________________________________________________________
5. How can you minimize your impact on the environment when you use technology?
________________________________________________________________________________________
____________________________________________________________________________

DEE
P EN!
ACTIVITY 3: ESSAY
Direction: Read the question carefully. Answer it concisely and comprehensively. Make
an essay composed of 7-10 sentences. Use the worksheet provided in answering this
activity.

Learning Competency: Explain his/her understanding on the impact of technology in the environment;
(Critical Thinking, Computing Technology-ICT)
Career Pathing: Spokesperson, Debater, IT Expert

WHAT IS YOUR UNDERSTANDING ON THE IMPACT OF TECHNOLOGY IN OUR ENVIRONMENT?


________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________

VALUES INTEGRATION: REFLECTION

Values Integration: RESPONSIBLE


As responsible users of technology, we should be aware of the limitations
of using the Internet. Always remember, THINK BEFORE YOU CLICK!

Expound the statement “Think Before You Click.”. Make it brief.


________________________________________________________________________________________
____________________________________________________________________________

TRANSFER!
ACTIVITY 4: DRAWING
Direction: Draw the proper ergonomics when handling ICT. Use the space provided in your
worksheet.

Learning Competency: Appy ergonomics in ICT. (Critical Thinking, Computing Technology-ICT,


Creativity and Innovation)
Career Pathing: Artist, Designer

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 19 | P a g e


MODULE POST-ASSESSMENT
Congratulations! It seems that you are now equipped with knowledge from the lessons
presented and tackled in this module, it’s time for you to summarize all the lessons through answering
this post-assessment.

MULTIPLE CHOICE: Read each item carefully. Choose the BEST answer among the choices given. Write
your answer on the provided worksheet. Write only the letter of the correct answer on the worksheet provided.
1. It is the practice of storing and managing data using network and remote servers over the Internet.
a. Analytics b. Cloud Computing c. Mobile Application d. User Interfaces
2. It is the process which helps in discovering the informational patterns with data.
a. Analytics b. Cloud Computing c. Mobile Application d. User Interfaces
3. He is considered as one of the most important pillars of Information Technology. He is responsible for
building Microsoft, the most popular software company in the world.
a. Steve Jobs b. Larry Page c. Mark Zuckerberg d. Bill Gates
4. It signifies the process of making a copy of the original data (files or programs) into other storage.
a. User authentication b. Anti-Virus c. Backup d. Firewall
5. It records and stores photographic image in digital form.
a. Digital Camera b. Memory Card c. Monitor d. Scanner
6. This type of digital camera can be found in smartphones.
a. Point-and-shootb. Camera phone c. Bridge camera d. DSLR
7. This element of ergonomics means alternating tasks within a job minimizes repetitive activities and
reduces wear and tear on the body.
a. Appropriate work pace b. Training and education c. Task variety d. Work breaks
8. This is an offense against the confidentiality, integrity, and availability of information or computer data.
a. cybersecurity b. cybercrime c. perjury d. libel
9. In ergonomics, this pertains to the acquisition of appropriate skills to do a job.
a. Training and education b. Appropriate work pace c. Work breaks d. Task variety
10. Possess the ability of self-replication; however, they cannot infect other programs.
a. Malware b. Worms c. Trojan d. Virus
11. This is the act of publishing false statements.
a. serendipity b. pardony c. perjury d. libel
12. This program secretly collects sensitive data about computer users.
a. Spyware b. Malware c. Trojan d. Virus
13. A false message being spread by email in order to deceive users.
a. Spyware b. Malware c. Adware d. Hoax
14. Is used as protective measure to deter theft of laptops.
a. Security Cable b. Security Wire c. Antivirus d. Firewall
SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 20 | P a g e
15. This is visual way to display and compare data, also known as graph.
a. Workbook b. Function c. Formula d. Chart

GUIDED GENERALIZATION

TEXT 1
“Technology can support administration in providing instructional leadership, managing learning environments
and professional learning communities, and making decisions that support proficiency in 21st century skills.
Networking technologies, for example, can support administrators in communicating with staff members,
parents and community members. Data management systems enable states, districts and schools to make
sense of the mountains of data they collect, monitor technology and other resources, and track trends in
student achievement. In this sense, technology is a “data tool for education to better understand and inform
educational and instructional decision making” (Maximizing the Impact, 2007, p. 13).

Process Questions:
1. What is the advantage and disadvantage of ICT?
2. In what way do these trends in ICT help you in your daily life?
3. How does ICT affect your personal life?
4. How should technology be used?

TEXT 2
“Such technologies as videoconferencing, online learning, networking, and instant messaging can support
professional development and professional learning communities. Using technologies like these, educators can
learn and collaborate with peers, mentors, experts and community members routinely. They can build ongoing
professional relationships, develop capacity in teaching 21st century skills, benefit from just-in-time
communications, and reduce the time and expense of travel” (Maximizing the Impact, 2007, p. 13).

Process Questions:
1. What is the advantage and disadvantage of ICT?
2. In what way do these trends in ICT help you in your daily life?
3. How does ICT affect your personal life?
4. How should technology be used?

TEXT 3
Technology ushers in fundamental structural changes that can be integral to achieving significant
improvements in productivity. Used to support both teaching and learning, technology infuses classrooms with
digital learning tools, such as computers and hand-held devices; expands course offerings, experiences, and
learning materials; supports learning 24 hours a day, 7 days a week; builds 21 st century skills; increases
student engagement and motivation; and accelerates learning. Technology also has the power to transform
teaching by ushering in a new model of connected teaching. This model links teachers to their students and to
professional content, resources, and systems to help them improve their own instruction and personalize
learning.

Process Questions:
1. What is the advantage and disadvantage of ICT?
2. In what way do these trends in ICT help you in your daily life?
3. How does ICT affect your personal life?
4. How should technology be used?

PERFORMANCE TASK

CREATING A BLOG WITH A VLOG


Learning Competency: Create a vlog (video) with a blog post on the advantages and disadvantages of ICT.
(Critical Thinking, Computing Technology-ICT, Creativity and Innovation)
SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 21 | P a g e
Career Pathing: Designer, Community-Builders, Influencer, Change Maker, Editor

The ICT-Department of Sto. Niño Institute of Getafe, Bohol, Inc. informed everyone that they will have a
contest regarding the advantages and disadvantages of ICT and its possible impact to our society. This
contest would be a great help to everyone especially to the students, for them to realize how ICT works
nowadays. As a young influencer and a young student of Sto. Niño Institute who would like to be part of the
said event, you approached the department head to join the said contest since you found it more interesting
wherein the blog with vlog that you are going to make would be a great help in molding one’s individual. Your
task is to create a blog with a vlog about the advantages and disadvantages of ICT and its impact to our
society. Talk about its positive and negative impacts and the youth’s role in helping promote its responsible
use. It is optional to insert pictures, background music, subtitles, effects or ect. in your video. Your output will
be evaluated using these criteria: Content and Organization, Usefulness, Creativity and Elements of Design,
Grammar and Content, and Oral Presentation Skills.
ANALYTIC RUBRIC IN SCORING THE OUTPUT (VLOG WITH A BLOG POST)

Vlog or Video Presentation Rubric


Beginning Developing Accomplished Distinguished
1-5 6-10 11-14 15-20
Content & Not organized. Portions may be Fairly well Vlog or video shows a
Organization Difficult to follow. poorly documented and continuous progression
Poor quality shows documented organized. of ideas and tells a
poor effort. and/or organized. Format is easy to complete, easily
Hard to follow the follow. Good followed story of the
progressions of explanation learning gained. Well
the learnings you shows good documented and
gained. effort. organized. Excellent,
Explanation well thought out
shows some explanation shows
effort. superior effort.
Usefulness Output’s usefulness Output Output is focused Output is focused and
is in question. Does demonstrated and informative; very informative;
not inform; does not development of promotes the use promotes the use of
stay focused on the computer of computer computer technology to
topic. technology; has technology to create the video and
problems staying create the video makes others want to
focused on topic. to deliver use the same type of
information. format in delivering
information to an
audience.
Creativity & Use of elements Minimal use of Good use of Excellent sense of
Elements of detracts from video. design elements. graphics and/or design. Effective
Design Too many or too No transitions. other design camera techniques
gaudy graphics; Sound is lacking elements. Some used for the video and
transitions, too many or inappropriate transitions are pictures. Video and
clips, backgrounds or scratchy. inappropriately pictures are I focus and
and/or sounds Some pictures or placed. Sound of good quality.
detract from content. video clips may quality is OK. Smooth transitions are
Pictures or video be out of focus or Video clips or appropriate and aid in
clips may be out of “shaky”. pictures are clear delivery of the
focus or “shaky”. and in focus. presentation.
Grammar and Includes five or more Includes 3 – 4 Includes 2 – 3 Grammar is correct;
Content grammatical errors. grammatical grammatical content of the video
Content of the video errors; some errors; content of coincides with the blog
doesn’t coincide with content of the the video created.
the blog created. video coincides coincides with
with the blog the blog created.
created.
Oral Great difficulty Some difficulty Fairly fluid Well-rehearsed. Voice,
Presentations communicating communicating delivery. eye contact and pacing
ideas. Poor voice ideas. Poor voice Communicates hold interest and
SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 22 | P a g e
Skills projection; no eye projections; some ideas with proper attentions of audience;
contact; no eye contact; no voice projection; introduced self and
introduction; introduction; perhaps one project. Responded
mispronounced mispronounced a mispronounced easily to questions.
words; stopped or few words; long work; made eye
had long pauses; pauses; contact;
confused. somewhat introduced self
confused. and project.
Respond to
questions.

GLOSSARY OF TERMS:
- Online System - is a state of connectivity to the cyberspace through the
Internet or computer network.
- Service Industry – it includes major sectors such as business process
outsourcing, hotel and restaurant services, and airline industry, all of which
are increasingly reliant on online systems to attract clients and customers.
- Digital Camera – records and stores photographic image in digital form
- Cybersecurity – the collection of tools, policies, actions, practices, and
technologies that can be used to protect the cyber environment.
- Information Security – is the preservation of information or computer data’s confidentiality, integrity,
and availability.
- Libel – is the act of publishing false statements with the use of computers or computer systems.
- Malware – is a program that do unwanted actions or damage to an operating system in a seamless
manner, with the intent of harming the computer or user.
- Ergonomics – an approach which puts human needs and capabilities at the focus of designing
technological systems.

REFERENCES AND WEBSITE LINKS USED IN


THIS MODULE:
TECH BOOK SERIES 7
Mastering Information and Multimedia Technology:
Computer Concepts with Office Productivity Tools
Copyright © 2017 by the Library Publishing House Inc.
and by Julius P. Claour

SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 23 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy