11
Empowerment Technology
Quarter 1 - Module 1
EMPOWERMENT TECHNOLOGIES MODULE 1
By the end of this lesson, you should be able to:
• differentiate Web 1.0, Web 2.0 and 3.0; and
• compare and contrast nuances of varied online platforms, sites, and content to best
achieve specific class objectives or address situational challenges.
The 21st Century is described as the Digital Age because of the emergence and development of
different technologies that have helped people accomplish tasks in a more effective and efficient
way. A common example is the use of smartphones for communication via text messaging voice
call, or video call. You can use smartphones to send an email or post on a website.
Are you a digital native? Let’s find out.
Directions: Answer the following questions honestly.
1. How many times have you checked your phone this morning?
2. How many status updates have you posted in Facebook or Twitter today?
3. Did you use the Internet for an hour after you woke up this morning?
4. Do you follow a celebrity via his/her social media account?
If you happen to be “guilty as charged” in most of these questions, chances are, you are a digital
native. And chances are, from the moment you were born, you were surrounded by technology.
You are surrounded by ICT.
Digital Native is a person born or brought up during the age of digital technology and therefore
familiar with computers and the Internet from an early age.
Empowerment Technology: A Definition
Empowerment refers to the process of giving yourself, or the other people, the
c a p a c i t y t o a c h i e v e a s p e c i f i c e n d - g o a l . For example, you want to learn how to cook a dish, you
start by studying the steps detailed in cookbooks or by watching tutorial videos on YouTube. By doing so,
you are empowering yourself with the necessary knowledge, tools, and skills you need to be able to achieve
the end-goal: Learn how to cook dish.
Likewise, empowerment technology refers to computer technology that we use almost every day, which
enables us to do tasks that, in the past, require professional help. Examples:
• A fifteen-year-old owner of bakeshop wanted to sell her cookies online. Knowing that web
development is a complex subject, she checked online for free website creation tools. She found
Wix and she was able to put up her own website in just an hour.
• A businessman is running late for a meeting. To find the fastest route from his office to his
home, he uses Waze and he is able to tell his estimated time of arrival to the people waiting for
him at the office.
Nowadays, there are applications that can be accessed and used for free. In the examples given, each
individual is able to solve his or her problem with less cost, less time, and less effort.
World Wide Web
• The World Wide Web, commonly referred to as WWW, W3, or simply the Web is an
interconnected system of public webpages accessible through the Internet. It was
invented Sir Tim Berners-Lee in 1989.
• Web pages are what make up the world wide web and it can either be static or
dynamic.
Web 1.0
• Referred to as the “Read-only web”
• Web pages are static and not interactive. You can’t post comments or create an
account.
1
EMPOWERMENT TECHNOLOGIES MODULE 1
Example of Websites in Web 1.0
Web 2.0
• term used to describe the present generation of the World Wide Web that
concentrates on its capability of providing people the means to collaborate and
share information online.
• The second stage in World Wide Web that refers to as “Read-and-write Web”
• Dynamic Website
• The content of the website changes
• Interactive
• The user may be able to comment or create user account
• enables an increased user participation in the web
• Darcy DiNucci, an information architecture consultant, coined the term Web 2.0 in
her 1999 article, “Fragmented Future”.
Example of Websites in Web 2.0
Image Source: https://freepngimg.com/png/24818-social-icons-photos/icon
Web 3.0
• also called as Semantic Web
• Semantics – ability of Web technologies to understand and interpret human-
generated content
• The aim of Web 3.0 is to have machines understand the user’s preferences to be
able to deliver web content specifically targeting the user.
• The Internet is able to predict the best possible answers to your question by
“learning from your previous choices
2
EMPOWERMENT TECHNOLOGIES MODULE 1
Trends in ICT
As the world of ICT continues to grow, the industry has focused on several innovations. These
innovations cater to the needs of the people that benefit most out of ICT. Whether it is for
business or personal use, these trends are current front runners in the innovation of ICT.
1. Convergence
• Technological convergence is the combination of two or more different entities of
technologies to create a new single device.
• Example: Using of smartphone to create word documents that was previously can
only be created using desktop computer.
2. Social Media
• It is a website, application, or online channel that enables web users to create, co-
create, modify, and exchange user-generated content.
• Types of Social media:
1. Social Networks - sites that allow you to connect with other people with same
interests or background.
Examples: Facebook, Google+
2. Bookmarking Sites - sites that allow users you to store and manage links to
various websites and resources, and to tag
Examples: StumbleUpon, Pinterest
3. Social News - sites that allow users to post their own news items or links to
other news sources.
Examples: reddit, digg
4. Media Sharing - sites that allow you to upload and share media content like
images, music, and video.
Examples: Flickr, YouTube, and Instagram
5. Microblogging - sites that focus on short updates from the user. Those who are
subscribed will receive updates.
Examples: Twitter Plurk
6. Blogs and Forums - sites that allow users to post their content.
Examples: Blogger, WordPress, Tumblr
3. Mobile Technologies
• The popularity of smartphones and tablets has taken a major rise over the years.
This is largely because of the devices’ capability to do tasks that were originally
found in personal computers.
• Different types of mobile operating systems:
1. iOS – used in Apple devices such as the iPhone and iPad
2. Android – an open source operating system developed by Google. Being
open source means several mobile phone companies use this OS for free.
3. Blackberry OS – used in blackberry devices
4. Windows Phone OS – a closed source and proprietary operating system
developed by Microsoft
5. Symbian – the original smartphone OS used by Nokia devices
6. WebOS – originally used for smartphones; now used for smartTVs
7. Windows Mobile – developed by Microsoft for smartphones and pocket PCs.
4. Assistive Media
• a component under Assistive technology (AT), which is a generic term used to refer
to a group of software or hardware devices by which people with disabilities can
access computers.
5. Co l l abo ra ti ve P l a tf o r m s
• is a category of business software that adds broad social networking capabilities to
work processes.
6. O n li n e Sy s t em s
• Are online versions of information systems which is “the process of and tools for
storing, managing, using and gathering of data and communications in an
organization. An example of information systems are tools for sending out
communications and storing files in a business.”
3
EMPOWERMENT TECHNOLOGIES MODULE 1
By the end of this lesson, you should be able to:
• name the various online threats;
• identify the online safety measures; and
• consider one’s and others’ reputation when using the Internet.
Most of us use the Internet every day. Sometimes, we do not pay attention to how much
information we share online. Identify which of the following information you have shared online
and list down your answers on the separate sheet of paper.
First Name Last Name Middle Name
Address Mothers Name Fathers Name
Name of your Siblings cellphone number
Birthday Home Phone number
How many information you have shared? You probably shared the first two items. If that is the
case, try using a search engine like Google then type your first and last name. Did you get links
to your profile page? Try switching to image search. Did your pictures appear? If you have a
unique name, chances are, it did. Do not feel bad if it did not appear though; in fact, it is probably
for your best interest not to have pictures of yourself in a search engine.
So how did these things happen? How can search engines locate me? Is there any danger of being
found by search engines?
Online Safety and Security
It is the knowledge of maximizing the user's personal safety and security risks to private
information and property associated with using the internet, and the self-protection
from computer crime in general.
Verification of Online Source Materials
It is best to do your research far ahead of the deadline to allow yourself some time to evaluate and verify
the sources of your homework. Follow the criteria below when evaluating your source material.
• Currency – Is the information up-to-date?
• Security – Does the site ask too much personal information?
• Scope – Is the information in-depth?
• Authority – Does the information come from a trusted expert?
Tips to Stay Safe Online
The Internet is a public place and it is up to you to protect yourself. Here are some tips to help
you stay safe when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode
will NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face/
7. Never post anything about a future vacation. It is similar to posting, “Rob my house
at this date.”
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
4
EMPOWERMENT TECHNOLOGIES MODULE 1
11. If you have Wi-Fi at home, make it private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. But the software, do not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites
Most people would dispute that there is no such thing as private over the Internet and they
may be right. Some hackers can find a backdoor even if your profile is already set to private.
You have no control whoever is looking at your friend's screen whenever they open your profile
or chat with you.
NETIQUETTE – rules about the proper and polite way to communicate with other people when
you are using the Internet.
Threats that can be acquired from World Wide Web
• Spam
- Transmission of unsolicited messages from various origins using electronic
messaging systems such as email and chat messages
- Tool for advertisement
- Known as unsolicited bulk e-mail (UBE)
• Phishing
- Defined as a software or program to obtain personal information
- Targets user password to hack and take control of user account
• Malware
- Short term for Malicious Software
- To inflict chaos on a computer’s operation and processes
- Disguised as enticing web sites
- Spy upon the activity of the computer and steal information
Types:
a. Virus - a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks, FDs, CDs, etc.)
b. Worm - a malicious program that transfers from one computer to another by
any type of means.
Ex. ILOVEYOU Worm - The malware originated in the Pandacan neighborhood of
Manila in the Philippines on May 5, 2000.
c. Trojan - a malicious program that disguises as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get
your information.
d. Spyware - a program that runs in the background without you knowing it (thus
called “spy”). It has the ability to monitor what you are currently doing and
typing through keylogging.
Ex. Keylogger – used to record keystrokes done by the user. This is done to
steal their password or any other sensitive information. The key logger software
typically uses log file to store its recording.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware - or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim's data or perpetually block
access to it unless a ransom is paid.
Copyright Infringement
It is the use of works protected by copyright law without permission for a usage where such
permission4 is required.
Here are some tips that could help you avoid copyright infringement:
1. Always assume that the work is copyrighted.
2. Do not copy, share or alter without seeking permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or information.
5
EMPOWERMENT TECHNOLOGIES MODULE 1
Government Provisions for Online Courtesy and Etiquette
• Republic Act 10627 or Anti-bullying Act of 2013
- aims to protect children enrolled in kindergarten, elementary, and secondary
schools and learning centers (collectively, “Schools”) from being bullied
• Republic Act 10175 or Cybercrime Prevention Act of 2012
- Protects individual from various unwanted online and cyber acts that may harm or
invade one’s privacy and integrity
- Law in the Philippines approved on Sep. 12, 2012.
- It aims to address the legal issues concerning online interactions and the internet in
the Philippines.
- Among the cybercrime offenses included in the bill are cybersquatting, cybersex,
child pornography, identity theft, illegal access to data and libel
By the end of this lesson, you should be able to:
• use precise keywords to improve online searches; and
• evaluate website’s credibility.
Did you know that Google is not the only search engine in the web?
There was a point not long ago when you could easily divide the people between those that used
Google, Yahoo, Ask Jeeves, Alta Vista. Now it’s got to the point where if you’re not using Google,
you’re not really using the internet properly.
Right now, though we maybe we should be paying more attention to the alternatives. Maybe our
daily lives and, for some of us, careers shouldn’t need to balance on the fickle algorithm changes
of the world’s most valuable company.
Information is just literally just a click away. Information can be accessed through personal
computers, smartphones, and other digital devices anytime and anywhere. However, most of the
Internet users are experiencing an information overload which oftentimes affects the quality of
information that they take. They often take information online as facts even if it is just the
author’s opinion.
What is Research?
In our world of expanding access to the Internet, research has become common term that is used
when “looking for something” online. One of the ideal applications laid down for ICT and the
World Wide Web is for RESEARCH and EDUCATION.
By definition, research is a systematic inquiry that attempts to provide solution to existing
problems and questions using facts and data. This is usually presented in a form where all
methods and procedures conducts are recorded so that they can be viewed and accessed by
others.
What are the Research Skills I Need to Develop?
You need to have proper skills that will enable you to gather useful and credible information
online. According to Scholastic, the following are the online research skills students need
(Hudson, 2017).
Check your sources
Evaluate the information you gather from your sources, whether they are from books, online
articles, news sites, or websites. Consider the benchmarks for evaluating a website: currency (is
it up to date?), security (does it ask for too much private information from you?), scope (is the
content in-depth or too shallow?) and authority (who wrote the content? Is he an expert?).
6
EMPOWERMENT TECHNOLOGIES MODULE 1
Ask good questions
Be specific when entering queries into search engines. It gives the search engine proper context
regarding what you are looking for, therefore enabling the engine to give you better search results.
Be patient
There are times when the Internet does not provide the information you are looking for. You may
not find the exact answer to your query, but bits of data are scattered all over the Internet. You
just need to think critically and synthesize the data you have gathered until you yourself can
formulate your own conclusion.
Respect ownership
Everything in the Internet has its own respective owner, be it text, images, ideas, audio or any
other form of information. Illegal acquisition, distribution, or reuse of any of these may result in
copyright infringement.
Use your networks
Sources like Wikipedia, should be evaluated before you use the information from it. The sources
are cited in the Wikipedia, however, are a practical starting point in gathering credible
information.
Information sources over the Internet:
1. Web Search Engines
- Designed to search or mine the world wide web based on keywords provide by the user.
- Return search results such as Web sites, files, photos or other media files.
- Examples: Google, DuckDuckGo, Bing, Yahoo
GOOGLE is NOT the ONLY search engine in the Web
Let’s see what else is out there in the non-Google world.
1. Bing
- Microsoft Engine is the 2nd most popular search engine in the world, with 15.8% of the
search market.
- powers Yahoo search engine.
- Plus Points for Bing:
• Bing’s video search is significantly better than Google’s, giving you a grid of large
thumbnails that you can click on to play or preview if you hover over them.
• Bing often gives twice as many autocomplete suggestions than Google does.
• Bing can predict when airfares are about to go up or down if you’re searching for flights.
• Bing also has a feature where if you type linkfromdomain:[site name] it will highlight
the best ranked outgoing links from that site, helping you figure out which other sites
your chosen site links to the most.
2. DuckDuckGo
- The key feature of DuckDuckGo is that it doesn’t retain its users’ data, so it won’t track
you or manipulate results based on your behavior.
- So, if you’re particularly spooked by Google’s all-seeing, all-knowing eye, this might be
the one for you.
3. Quora
- As Google gets better and better at answering more complicated questions, it will never
be able to match the personal touch available with Quora.
- Ask any question and its erudite community will offer their replies. Or you can choose
from any similar queries previously asked.
4. Dogpile
- It may look like a search engine you cobbled together with clip-art, but that’s rather the
point as it pulls in and ‘curates’ results from various different engines including Google,
Yandex and Yahoo, but removes all the ads.
7
EMPOWERMENT TECHNOLOGIES MODULE 1
5. Wolfram Alpha
- WolframAlpha is a ‘computational knowledge engine’. Ask it to calculate any data or ask
it about any fact and it will give you the answer. Plus, it does this awesome ‘computing’
thing while it thinks about your answer (which can take a short while.)
6. Start Page
- Another search engine that puts privacy at the forefront, StartPage (originally Ixquick)
was the first search engine to allow its users to search privately.
- With StartPage, none of your details are stored (including your IP address) and no
cookies are used, save for a single, anonymous cookie that’s used to remember your
preferences. (For those who want to go “cookie-free”, StartPage has a URL generator
alternative to save your settings).
- Uniquely, StartPage also offers a proxy for those who want to not just search, but browse,
the web in full privacy.
7. Creative Common Search
- CC Search is particularly handy if you need to find copyright free images for your website.
- Just type your query in then click on your chosen site you want to search.
2. Research Indexing Sites
- Dedicated to compile and index researches done by academic researchers, engineers,
social scientist, and so on.
- Examples: Institute of Electrical and Electronics Engineers (IEEE), Google Scholar,
Research Gate
3. Massive Online Open Course (MOOC) Site or Tutorial Sites
- Dedicated to teach and inform users focused on different areas.
- Similar to a classroom lecture setup (lectures and assignments are delivered and
submitted, online)
- Examples: Coursera, EdX, Udemy
4. Employment websites
- Enable companies to post job vacancies
- Accommodate job seekers by providing resume-submission facility
- Ability to match qualification of the applicant in a certain job vacancy
- Examples: JobsDB, Jobstreet, Best Jobs, LinkedIn
5. Electronic commerce (e-commerce)
- Used electronic to trade products and currencies
- Introduces ease in business management and customer convenience
- Examples: Reebok or any international brand of products, Lazada, Zalora, OLX, etc.
How to be a Google Power User:
Search exact phrase – If you’re looking for an exact phrase, use quotation marks.
“search” e.g. “let them eat cake”
Exclude a word – Add a hyphen before a word to exclude a search term. This is useful if you are
searching for a word with several meanings.
-search e.g. inception -movie
Search within a site – Get results from certain domains.
site: e.g. recipes site:theguardian.com
Search similar – Find sites with similar content to a URL you already know.
related: e.g. related:visual.ly
Search for words in text
Find pages where the all terms appear in the text.
allintext: e.g. allintext: holidays hot bargain
Find pages where the one term appears in the text, and other terms appear elsewhere in
the document (e.g. title or URL)
intext: e.g. jhon lennon intext:liverpool
Search for words in title
Find pages whose title contains all words in the search
allintitle: e.g. allintitle: the big Lebowski review
Find pages whose title contains a particular word in the title, with other terms appearing
elsewhere in the document (e.g. in the txt or URL)
Intitle: e.g. flu shot intitle:help
Search for words in URL – Find pages with the search query mentioned in the URL
allinurl e.g. allinurl: bbc news
8
EMPOWERMENT TECHNOLOGIES MODULE 1
Find news related to a particular location – Use this on Google News to find stories coming from
a particular location.
location: e.g. prince George location:auckland
Search for a particular filetype – Google will restrict results to pages that end in suffix.
Filetype:suffix e.g. annual report 2014 filetype:pdf
Blank – An asterisk works as a wildcard, and helps you find the missing word in a phrase.
* e.g. there is a * that never goes *
Either word – If you want to find pages with one of several words, use a capitalized OR. Without
OR, results would show pages that include all the terms.
OR e.g. Olympics 2012 OR 2016
Google doesn’t usually recognize punctuation and grammar. However, punctuation and symbols
that do work in Google search include:
+ when searching for things such as blood type
@ when searching for social tags
& when searching for strongly connected ideas and phrases
% when searching for percent values
$ when searching for prices
# when searching for trending topics that use hashtags
- when searching for words that are strongly connected
Image Tools
TinEye Reverse Image
- A reverse-image search engine.
- Allows you to find out where an image came from, how it is being used, if modified version
exist, or to find higher resolution versions.
- The first image search engine to use image-identification technology rather than keywords,
metadata or watermark.
- It is free to use for non-commercial searching.
Google Lens
- Google Lens is an AI-powered technology that uses your smartphone camera and deep
machine learning to not only detect an object in front of the camera lens, but understand
this and offer actions such as scanning, translation, shopping, and more.
Labnol.org -Reverse Image Search
- Labnol.org is a technology blog started in 2004 by Amit Agarwal, India's first professional
blogger
- https://www.labnol.org/reverse/
Ref er e n ce s :
Juanillo, Melissa P., et. al. E—Tech Technology Empowerment in a Connected,
Digital, First Edition, TechFactors Inc., 2017.
Yuvienco, Joel C. Empowerment Technologies, Making small Shift Towards A BIG
Difference for Senior High School, C & E Publishing, Inc., 2017.
Empowerment Technologies First Edition. (2016). Sampaloc Manila:Rex Bookstore,
Inc.