Understanding Online Platforms in ICT
Understanding Online Platforms in ICT
I. Learning Competency
Compare and contrast the nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges. (CS_ICT11/12ICTPT-Ia-b-1)
Web 1.0
The first development of the World Wide Web where web pages are static. It is also known as
a flat or stationary page, and it cannot be manipulated by users.
Web 2.0
It is a dynamic web page where users can interact with the page like creating a user account,
posting comments, uploading files and images, and others.
Trends in ICT
1. Convergence – it refers to the fusing of technological advancement to work on a similar
task.
Example. Using a smartphone as a camera in taking pictures instead of DSLR camera.
1
2. Social Media – an application and website where user can communicate, create and
share content and participate in online communities.
Types of Social Media
A. Social Network – A website where people with the same come together to share
information. Examples: Twitter, Instagram, Facebook
B. Social News – A website where users can post stories and are ranked based on
popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark
C. Bookmarking Sites – A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images, and others. Examples: Pinterest,
StumbleUpon, Dribble
D. Media Sharing – A website that allows you to share and store multimedia files
such as video, photos, and music. Examples: Instagram, YouTube, Flickr
E. Microblogging – a website that allows you to broadcast short messages.
Examples: Twitter, Tumblr, Meetme
F. Blogs and Forums – a discussion website that allows users to ask questions
and comments on a journal posted by an individual or group. Examples:
WordPress, Blogger
3. Mobile Technologies – a technology used in cellular and other devices such netbook,
laptop, tablet, smartphones, etc.
4. Assistive Media - A platform that assists people with disabilities. It will guide an
individual like a blind person by using an audio recording
Quiambao, A. (2019, Sep 8). Online platforms for ICT Content Development. Retrieved from
[Link]
development-169954837. Retrieved on May 20, 2020.
Activity 1: Compare the different versions of web-based on the given criteria. Identify their
differences by filling out the table below. Use a separate sheet of paper for this activity and label it
properly. The first two are done for you.
2
Activity 2: Match the items in column A with the correct answer in column B. Write only the letter
of your answer on your answer sheet.
Column A Column B
Activity 3: Identification. On your answer sheet, write SO if the social media website is a social
network, BS for bookmarking site, SN for social news, MS for media sharing, MI for microblogging,
and BF for blogs and forums.
Remember:
Empowering ICT is important for its innovative uses impacts our daily lives. It has affected
our ways of communicating, made our lives more convenient, and assisted countries
towards their modernization plans. Thus, there is a need to create a foundation of
understanding in the world of ICT
3
V. Reflection
1. In what ways can this activity help you in enriching your awareness on the recent trend in
Information and Communication Technology (ICT)?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
3. How will your Teacher / Learning Facilitator help in improving your task?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
4
QUARTER 1 WEEK 2
I. Learning Competency
Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs
as it would relate to their specific professional tracks. (CS_ICT11/12ICTPT-Ia-b-2)
5
The Internet is defined as the information superhighway. This means that anyone has access
to this highway, can place information, and can grab that information. Therefore, social networking
sites like Facebook continue to improve their security features. The threat of cybercrime is very real.
Whatever information we share today could affect our future.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware – or malicious software, is any program or file that is harmful to a computer
user.
Types of Malware:
a. Virus - a malicious program designed to replicate itself and transfer from one computer
to another (internet, local networks, FDs, CDs, etc.)
b. Worm - a malicious program that transfers from one computer to another by any type of
means. Ex. ILOVEYOU Worm - The malware originated in the Pandacan neighborhood of
Manila in the Philippines on May 5, 2000.
c. Trojan - a malicious program that disguises as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hackers to get your information.
d. Spyware - a program that runs in the background without you knowing it (thus called
“spy”). It can monitor what you are currently doing and typing through keylogging. Ex.
Keylogger – used to record keystrokes done by the user. This is done to steal their
password or any other sensitive information. The key logger software typically uses a log
file to store its recording.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware - or ransom software is a type of malicious software from crypto virology
that threatens to publish the victim's data or perpetually block access to it unless a ransom
is paid.
2. Spam - An unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing - its goal is to acquire sensitive personal information like passwords and credit
card details. This is done by sending you an e-mail that will direct the user to visit a fake
website and be asked to update his/her username, password, credit card, or personal
information.
6
Protecting Reputations Online
Here are the things you might want to consider before posting something over the internet:
1. Before your post something on the web, ask yourself these questions: Would you want your
parents or grandparents to see it? Would you want your future boss to see it?
2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it
down or report it as inappropriate.
Copyright Infringement
It is the use of works protected by copyright law without permission for a usage where such
permission is required. Here are some tips that could help you avoid copyright infringement:
1. Always assume that the work is copyrighted.
2. Do not copy, share, or alter without seeking permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or information.
Exercise 1: Case Study Read and understand the text and answer the question on the next page
using a separate sheet of paper.
One day I downloaded this program, and after that my computer seemed to be a lot slower. It
was taking forever for pages to load and even normal things like writing an email or writing a
Word document would take a long time. I didn’t think too much of it ‘cos my computer was
getting pretty old and I had heaps of stuff on it. But then my homepage got changed to some
free download site and when I checked my internet settings, I found that they had all been
changed. But things kept on getting worse. Whenever I went online to the internet I got
bombarded with pop-ups and, like, my computer would just crash, and I would have to
manually reset it.
Then things got serious. I could not log-in to my email account and I discovered that someone
was using my internet banking. I had anti-virus software installed onto my computer, but it just
was not picking up anything.
What I did not realize at the time was that when I had downloaded this free program a couple
of months ago, a smaller program downloaded and installed itself onto my computer. But I
had no idea.
7
This spyware program monitored all my internet activity and the keylogger recorded all the
keystrokes I made on the computer such as my log-in, my passwords, and all the emails I
sent to my mates. It then sent all this information to the software developer. I ended up taking
my machine to a computer specialist who was able to find and remove all the spyware. I had
to contact my bank and my ISP to change my account details.
You know, even free stuff comes at a cost nowadays and I know it sounds corny, but if it is
too good to be true then it probably is. Before I download anything now, I make sure there is
no adware or spyware associated with it and I read the user agreement statement. There are
websites online that, sort of, help you out with this and can offer great reviews and advice on
the program and company that you are downloading from. If it is free, there is usually a catch.
I guess I learned the hard way.” – Brian
1. Brian complains that his virus protection does not work. What do you think has gone wrong?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Exercise 2: Identify the Internet threat that is described in each number. Write your answer on a
separate sheet of paper.
1. Jonathan is having a problem because his files were corrupted. He discovered that most of his
folders were replicated.
2. Ken was asked to pay a certain amount of money for him to retrieve his files. Ken might be a
victim of ______.
3. Mari found a good application and she installed it on her computer. But after the installation, some
of her files were deleted.
4. Jack is receiving several irrelevant messages every day and his e-mail account has become
almost unusable.
5. The network servers of KNCHS stopped response and it was found out that much of the systems'
memory was consumed by the malicious software. What kind of malware is this?
6. Jewel is using a technique that tries to take information from the user. She commonly takes things
like credit cards, usernames, passwords, and home addresses using a fake website. What type
of threat is depicted in the scenario?
7. This program can record all you enter on your keyboard.
8. Eli received an unwanted email that contains advertisements. What type of internet threat is
depicted in the scenario?
9. A kind of internet threat where the attacker uses a fake website to get your sensitive information.
10. A program that runs in the background without you knowing it. It can monitor what you are
currently doing.
8
Exercise 3: Compare and contrast the scenario in the picture. Describe how Jimmy and Boggart
are the same and different and in using social media. Using a separate sheet of paper, plot your
answer in the Venn diagram.
9
Exercise 4:
Read and answer the following questions on a separate sheet of paper.
V. Reflection
1. In what ways can this activity help you in enriching your awareness on online safety, security,
ethics, and etiquette standards and practice in the use of ICTs?
___________________________________________________________________
___________________________________________________________________
3. How will your Teacher / Learning Facilitator help in improving your task?
___________________________________________________________________
___________________________________________________________________
10
QUARTER 1 WEEK 3
I. Learning Competency
Use the internet as a tool for reliable research and information gathering to best achieve
specific class objectives or address situational challenges. (CS_ICT11/12-ICTPT-Ia-b-3)
Internet Research is a research method in collecting and gathering information via the internet by
using a search engine such as Google. Search Engine is a program that allows users to search
for content on the internet.
Evaluating Websites
To help you evaluate the website’s credibility, here are the questions that you need to answer:
1. What is the domain type of the website?
11
If it is a personal website, then you should further evaluate the website.
2. Who wrote the article?
Check if the author’s credentials or affiliations are listed so you can tell whether the author is
qualified to write the topic. Also, check the publisher of the article if it is a reliable publisher.
Make sure that the author provides an e-mail or a contact address/phone number.
3. What is the purpose of the document and why was it produced?
It is also important to check the document’s purpose and why it was produced. The document
should provide accurate information and must be objective in presenting it. Some websites
produce documents to motivate users to buy products. If this is the case, information might be
biased. However, bias is not necessarily bad, but you need to investigate the author or
connections.
4. When was the document published and updated?
The document should be regularly updated. As to the freshness of the date, it depends on the
information needed. For some topics, you want current information. For others, you want
information near the time it became known. The links should also be up to date. There should
be no dead links.
Copyright Issues
There are millions of information that we can get from the internet. Some of this information is
free but others are not. They are protected by copyright law.
Copyright is a protection given to the owner of the rights in an original work such as books,
musical works, films, paintings, and other works, and computer programs. This original work is called
intellectual property which is protected under Republic Act 8293 known as the “Intellectual Property
Code of the Philippines”
Copyright Infringement
This happens when the copyrighted work is used by another person without the permission of
the author or copyright holder. Any person who is infringing the right protected work would be liable
under the law. An example of this is the case of M.Y. Intercontinental Trading Corporation (MITC),
Tedwin T. Uy, Allianz Marketing and Publishing Corp. (Allianz), and Fujian New Technology Color
Making and Printing Company, LTD (Fujian) against St. Mary’s Publishing Corporation (SMPC).
Manila regional trial court ordered Fujian and its partners to pay P24.7 million for the damages and
cost of litigation for copyright infringement to SMPC. Fujian and its three local partners were guilty
of printing, copying, reproducing, importing, distributing, and selling original and revised textbooks
that they have illegally sold to the Department of Education in Zamboanga, Municipality of Cabuyao
in Laguna, and Municipality of Matnog in Sorsogon without the approval of SMPC, the copyright
owner of the textbooks.
Fair Use
Research is important to the students and other people. Most of them rely on the information
that they can get online. Although this information is protected by copyright law, we can still use this
information without permission in a limited way under certain conditions and purposes.
Fair use is the use of copyrighted material for comment, teaching, criticism, news reporting,
research, scholarship, and another similar purpose is not an infringement of copyright. An example
of this is when you post a quote from a person on your Facebook wall. Include the name of the
person who owns the quote in your post. Another example is when you copy an image from the
internet, give credit to the creator of the image. The copied image should be used for educational
purposes not for commercial use. In fair use, 5% of the content of reference can only be copied. If
20% or less of reference is copied, there must be a secondary use agreement and fee. And if 20%
or more of the reference is copied, it requires purchasing of creative work.
12
III. Accompanying DepEd Textbook and Educational Sites
Tarun, I. M. (2016). Empowerment Technologies. Plaridel, Bulacan: St. Andres Publishing House.
Rey Panaligan, “Publisher awarded P24.7 M in damages for copyright infringement”,
Accessed January 30, 2020, [Link]
m-in-damagesforcopyright-infringement/
Activity 1: Explain thoroughly why the website below is not credible as a source of your data for
your research.
Activity 2: Using the Internet, evaluate the given two web pages by answering the questions on
the table. Write your answer on a separate sheet of paper.
[Link] [Link]
octopus/ [Link]/animals/invertebra
tes/facts/common-octopus
What is the domain type?
Does the page list the author?
Does it provide accurate
information?
Does the page list the publisher?
Does it offer limited advertising?
Does its present information
objectively?
13
Is the page current?
Is it updated?
Are the links up to date?
Does it contain dead links?
FINAL EVALUATION: Is the
webpage valuable and credible?
Activity 3: True or False Directions: Write “True” if the statement is true and write “False” if the
statement is false.
Remember:
Website evaluation is an important skill that everyone should practice and master through time. It
is always important to learn which information are relevant and reliable to be able to avoid
misinformation and be a victim of fake news.
V. Reflection
14
QUARTER 1 WEEK 4
I. Learning Competency
Microsoft Word is a complex program which people use to perform various functions such as
composing and editing, formatting, and saving, and printing. With these functions you were able to
correct spelling, grammar, format your text using boldface and italics, and save your documents
electronically to the computer's hard drive.
Mail Merge
The automatic addition of names and addresses from a database to letters and envelopes to
facilitate sending mail, especially advertising, to many addresses.
This feature of Microsoft Word allows you to create documents and combine them with another
document or data file. It is commonly used when sending out advertising materials to various recipients.
The simplest solution for the previous scenario is to create a document and just copy and paste it
several times then just replace the details depending on whom you send it to. But what if you have
hundreds or thousands of recipients? Would not that take too many hours? What if you have a small
database of information where you can automatically generate those letters?
15
This is where the individual information or data that needs to be plugged in (merged) to our form
document is placed and maintained.
Mail Merge task pane appears on the right side of your screen.
16
5. Choose the type of document you want to create. If you want to
create a letter, select Letters. Six main steps in guiding you to
complete a merge will be displayed at the bottom.
7. Select Use the current document. Click Next: Select recipients to move to Step 3.
You will need an address list so Word can automatically place each address into the document. The list
can be in an existing file, such as an Excel workbook, or you can type a new address list from within
the Mail Merge Wizard.
8. From the Mail Merge task pane, select Type a new list, then click Create.
9. The dialog box of the New address list appears, displaying fields that Word assumes you need.
Select an entry that you don't need and click the Delete button. Use the TAB key to move from
cell to cell.
17
When you delete, a confirmation dialog box will appear.
To customize the address list, click Customize Columns button at the bottom of the window.
The dialog box of Customized Address List will appear. The resulting window lists the Field Names
provided. When you are done, click OK then customized fields appear as column headings in the New
Address List dialog box.
Fill in the recipient list by typing the record’s data. Type the information that is appropriate to each field,
then press Tab to enter the next field. After filling in the last field, and add another record just press the
Tab key after inputting the last field.
When you press the Tab key on the last field in a record, a new record is automatically created and
added on the next line.
18
[Link] OK after filling the recipient list. A special Save As dialog box pops up, allowing you to save
the recipient list. Type a name for the address list then click the Save button.
Return to your document. You are now ready to write your letter, each copy of the letter will mostly be
the same, except the recipient data (name and address). You must add placeholders for the recipient
data, so Mail Merge identifies correctly where to add the data. If you are using Mail Merge with an
existing letter, make sure the file is open.
[Link] Next: Write your letter. Click the Address Block button to insert an address block into
your letter.
12.A dialog box of Insert Address Block appears. Choose the desired format for the address block
and click OK. The placeholder of Address block will appear in the document.
Use the Match Fields button to match your field names with the required fields to correct problems. This
may be essential if you created the address list in another program, such as Excel.
19
[Link] Greeting Line from the Mail Merge task pane to insert a greeting line into your document.
Dialog box of Insert Greeting Line will appear.
[Link] view your merged data, click the Preview Results button on the Mail merge task pane or on
the ribbon to replace the merge fields with data from your recipient list.
Label Generation
It creates a blank form document that simulates either a blank label or envelope of pre-defined
size and will use the data file that you selected to print the information, typically, individual addresses.
Kinds of Materials:
1. Pictures. Generally, these are electronic or digital pictures or photographs you have saved
in any local storage device.
2. Clip Art. This is generally a. GIF type; line art drawings or images are used as a generic
representation for ideas and objects that you might want to integrate into your document.
3. Shapes. These are printable objects or materials that you can integrate into your document
to enhance its appearance or to allow you to have some tools to use for composing and
representing ideas or messages.
4. Smart Art. Generally, these are predefined sets of different shapes grouped to form ideas
that are organizational or structural.
5. Chart. Another type of material that you can integrate into your Word document that allows
you to represent data characteristics and trends.
6. Screenshot. Sometimes, creating reports or manuals for training or procedure will require
the integration of a more realistic image of what you are discussing on your report or
manual.
20
Inserting Illustrations
An illustration in Microsoft Office is visualization or drawing that is in the form of pictures, Clip Art,
Shapes, SmartArt, charts, or screen clippings. You can insert illustrations easily using the Illustrations
group of the Insert tab.
Maria, Jose. 2016. Advance Word Processing Skills. May 23. Accessed October 12, 2019.
[Link]
Sernicul, Emmanuela. 2013. Advance Word Processing Skills. August 3. Accessed May 02, 2019.
[Link]
Activity 1: Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. Which is NOT one of the basic characteristics of life? What feature of Microsoft Word allows
you to efficiently create documents that have the same general content but may have different
recipients or purposes?
a. Mail Merge c. Send Merge
b. Print Merge d. View Merge
5. What tells Microsoft Word exactly where to place the information coming from the data file to
the main document?
a. Data Source b. Insertion Line c. Place Holder d. Insertion Tag
6. The following are types of document you can create using mail merge, except
a. Envelopes b. Letters c. Posters d. Labels
7. What button allows you to see the result of your mail merge even before you print or send it
out?
a. Preview results b. Insert merge fields c. Address block d. Greeting line
8. What file contains the information you need to merge with your main document?
21
a. Address block b. Contact list c. Data file d. Directory
9. What essential component of mail merge is required from users when generating?
a. Data file b. Form document c. Place holder d. Merge field
10. It is an application that allows users to create, edit, and print documents
a. Data file b. MS Word c. Word Processor d. Merge field
Activity 2: Read the given scenario below and answer the following questions concisely on a
separate sheet of paper.
Scenario 1: You were tasked to create and send out formal invitations for a promo campaign that
a company is running. You were also initially given a list of ten names of loyal customers to send
out to.
1. From the scenario above, describe briefly how you would most likely complete the task of
sending ten invitations with individual names of recipients using Microsoft Word.
2. Give examples of documents that you can personalize and send or distribute.
V. Reflection
1. In what ways can this activity help you in using common productivity tools effectively like Mail
Merge by maximizing advanced application techniques?
__________________________________________________________________
_________________________________________________________________
_________________________________________________________________
3. How will your Teacher / Learning Facilitator help in improving your task?
_________________________________________________________________
_________________________________________________________________
________________________________________________________________
22
QUARTER 1 WEEK 5
I. Learning Competency
Spreadsheet It is a software application that enables a user to save, sort and manage data in
an arranged form of rows and columns
Microsoft Excel provides an automated way of displaying any statistical data. It can be used
to automatically compute several factors that are not easy to notice especially when faced with
large data. Microsoft Excel includes several arithmetic and basic functions that help you
compute faster.
Beyond arithmetic operations, spreadsheets provide invaluable tools such as functions that are very
useful in calculating data. As a result, spreadsheets have become one of the widely used software
programs, and MS Excel is the most commonly used spreadsheet tool. Spreadsheets can be used to
determine statistical analysis, compute student’s grades, keep track of business accounts and
inventories, and manage databases. Spreadsheets are made up of the following:
23
Cells – are the intersection of rows and column
• Cell Reference – also known as cell address that identifies a cell on a worksheet.
• Active Cell – the currently selected cell in a spreadsheet and is indicated by a bold outline that
surrounds the cell
• Text or labels – It identifies the purpose of a cell, it can be a brief instruction, a title or caption.
• Number data or constant – a value that doesn’t change and is directly inserted into a cell.
• Formula (mathematical equations) – an expression that calculates the value of a cell.
• Functions – These are pre-defined formulas that are already available in MS Excel.
• Mathematical Operators – MS Excel uses standard operators for formulas.
• Average – a function used to compute for the average of the number of a range.
• COUNTIF – a function used to count the cells with a specified content within a range.
• SUMIF – a function used to compute for the summation of a range if a certain condition is met
• AVERAGEIF – a function used to compute for the average of a range if a certain condition is met
A PowerPoint presentation is a collection of electronic slides that can have text, pictures,
graphics, tables, sound and video. This collection can run automatically or can be controlled
by a presenter.
• HYPERLINKS - In PowerPoint Hyperlinks are similar to links you might have seen on a website. They
allow you to jump back and forth between specific slides in your presentation, to movie files that don't
work on PowerPoint slides, to other files, or to a webpage (if you are connected to the internet).
24
2. Go to Insert > Hyperlinks (under links category) or use the shortcut key Ctrl + K.
The insert Hyperlink dialog box would appear.
Link to Options:
a. Existing File or Web Page – creates a hyperlink to a website or a local file saved in your hard
drive. Just browse your file in the dialog box or type the web address.
b. Place in This Document – creates a hyperlink that allows you to jump to a specific slide in your
presentation.
c. Create a New Document – creates a hyperlink that once clicked, creates a new document on your
specified location.
d. E-mail Address – creates a hyperlink that opens Microsoft Outlook that automatically adds your
specified recipient to a new email.
25
III. Accompanying DepEd Textbook and Educational Sites
Parmar, Jahnavee. 2017. Empowerment Technology. February 28. Accessed July 12, 2019.
[Link]
72626911?qid=747c8785-147c-46ed-a98d-10ca601f71b4&v=&b=&from_search=10.
Activity 1: – ARRANGE ME! Directions: Arrange the scrambled letters to form the correct word or
words. Write your answer on a separate sheet.
1. FTIONSNCU ___________________________
2. CLEL RFEENCERE ___________________________
3. CNSOTTAN ___________________________
4. ORWKSETSHE ___________________________
5. EETDAEPRSHS ___________________________
6. EGRAEVA ___________________________
7. AURFLOM ___________________________
8. WKBROKOO ___________________________
9. ELLC AGENR ___________________________
10. TVEICA LELC ___________________________
Activity 2 – Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. Luke wants to include videos in his presentation. He wants to play those videos without going
out from his current presentation. Which of the following could be his best option?
a. Use a hyperlink to navigate those videos.
b. Use another computer in playing the videos.
c. Open the presentation and the videos to be played and then use Alt + Tab.
d. Embed those videos as an object in your slides.
3. Jethro was tasked to report a topic in one of his subjects. He wants to apply one of the
hyperlink options where he could jump to a specific slide in his presentation. Which of the
following hyperlink options will he use?
a. Create a New Document
b. Existing File or Web Page
c. Place in This Document
d. E-mail Address
26
d. makes a presentation more enjoyable
5. PowerPoint is best described as _______________.
a. Presentation Software c. Publishing Software
b. Drawing Software d. Database Software
6. A spreadsheet program used to organize and perform calculations on data.
a. MS Excel b. MS PowerPoint c. MS Publisher d. MS Word
9. Which among the following is not part of the syntax for AVERAGEIF?
a. Average Range b. Range c. Logical Test d. Criteria
Activity 3 – Explain Briefly: Answer the following questions and write your answer on a separate
sheet ofpaper. (5pts. Each)
V. Reflection
1. In what ways can this activity help you in creating an original or derivative ICT content to
effectively communicate or present data or information?
2. What part of the activity did you find easy/difficult?
3. How will your Teacher / Learning Facilitator help in improving your task?
27