🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

MIL 1st Quarter.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

LESSON 1: RECALL LITERACY - use of skills to access knowledge through Communication technology and ability to apply knowledge towards - the act or process of using words, sounds, signs, or achieving a...

LESSON 1: RECALL LITERACY - use of skills to access knowledge through Communication technology and ability to apply knowledge towards - the act or process of using words, sounds, signs, or achieving a goal. behaviors to express or exchange information or to express your ideas, thoughts, feelings, etc., to someone Considering Technology Literacy: else. Until the early 1990s, most cell phones were too big for - the exchange of information and the expression of pockets. feeling that can result in understanding. Movies were unavailable on DVD until 1997. Google was launched in 1998 Transmission Models Facebook in 2004 1. Lasswell’s Communication Model (1948) Youtube in 2005 2. Shannon-Weaver’s Communication Model (1948) Twitter in 2006 3. Gerbner’s Model of Communication (1956) Instagram in 2010 4. Ritual or Expressive Model Communication as a Culture (1985) by James William Media and Information Literacy Carey - refers to the ability to understand messages, recognize views communication as "a representation of shared and use information, and apply appropriate technology beliefs" in completing a task. communication is defined as "a symbolic process whereby reality is produced, maintained, repaired, and Goals transformed". 1. give people the power to use their rights of free 5. Publicity Model expression communication as display and attention 2. help all voices be heard audience as “spectators” rather than participants or 3. to defend their access to information information receivers 4. to evaluate content 6. Reception Model “Encoding/ Decoding” model of communication by Basic Concept of Media Stuart Hall (1993) 1. Constructs our culture. 2. Use “the language of persuasion”. Messages are open to various interpretations. 3. Messages affect our thoughts, attitudes and actions. 7. Interactive Model – Westley and MacLean’s Model of 4. Media messages reflect the values and viewpoints of Communication (1957) media makers. Event or Information 5. Media literate youth and adults are active consumers of (X1, X2, X3 and X4…Xn) media. Feedback (f) 6. Individuals construct their own meanings from media. Advocate (A) Channel (C) Roles of Media Audience (B) - act as channels of information and knowledge. 8. Interactive Model – Osgood – Schramm Model of - Citizens communicate with each other. Communication - Citizens make informed decisions. - provide us with much of what we learn about the world Media Literacy beyond our immediate experience The ability to read, analyze, evaluate and produce - function as a watchdog of government in all its forms, communication in a variety of media forms. promoting transparency in public life and public scrutiny of those with power through exposing Information Literacy corruption, maladministration and corporate The ability to recognize when information is needed wrongdoing. and to locate, evaluate, effectively use and - essential facilitators of democratic processes and one of communicate information in its various formats. the guarantors of free and fair elections. Technology (Digital) Literacy LESSON 3: RESPONSIBLE USE OF MEDIA & The ability to use digital technology, communication INFORMATION tools or networks to locate, evaluate, use, and create Digital Citizenship information. - is the norms of appropriate, responsible technology use. - a holistic and positive approach to helping children LESSON 2: GOALS AND ROLES OF MEDIA learn how to be safe and secure, as well as smart and MEDIA - a channel or system of information or effective participants in a digital world. communication. Key Principles with Elements of Digital Citizenship Forms of media: television, radio, Internet, newspapers, 1. Respect Yourself/Respect Others magazines, books, billboards, video games, music, - Digital Etiquette packaging, marketing materials and others. - Digital Access - Digital Law INFORMATION - used to describe knowledge of specific 2. Educate Yourself/Connect with Others events that has been gathered or received by - Digital Literacy communication, intelligence or news. - Digital Communication - Digital Commerce 3. Protect Yourself/Protect Others - Less breakable, lightweight - Digital Rights and Responsibility - made in small sheets and then glued the sheets together - Digital Safety (Security) to make big pieces. - Digital Health and Welfare Cave Paintings (35,000 BC)) Netiquette - set of rules for behaving properly online. - In prehistoric art, the term "cave paintings" - respecting other users’ views and displaying common encompasses any parietal art which involves the courtesy when posting your views to online discussion application of color pigments on the walls, Floors or groups. ceilings of ancient rock shelters. - monochrome cave paintings (picture made with only Core Rules of Netiquette one color (usually black).) For instance: 1. REMEMBER THE HUMAN a. Chauvet Cave 2. ADHERE TO THE SAME STANDARDS OF - Famous prehistoric rock art sites in the world BEHAVIOR ONLINE THAT YOU FOLLOW IN - located in the Ardeche region of southern France, along REAL LIFE the bank of the river Ardeche near the Pont - d'Arc. 3. KNOW WHERE YOU ARE IN CYBERSPACE 4. RESPECT OTHER PEOPLE'S TIME AND Clay Tablets in Mesopotamia (2400 BC) BANDWIDTH - ancient Near East, Akkadian tuppu were used as a 5. MAKE YOURSELF LOOK GOOD ONLINE writing medium, especially for writing in cuneiform, 6. SHARE EXPERT KNOWLEDGE throughout the Broze Age and into the Iron Age. 7. HELP KEEP FLAME WARS UNDER CONTROL - Cuneiform characters were imprinted on a wet clay 8. RESPECT OTHER PEOPLE'S PRIVACY tablet with a stylus often made of reed (reed pen). 9. DON'T ABUSE YOUR POWER 10. BE FORGIVING OF OTHER PEOPLE'S MISTAKES Acta Diurna in Rome (130 BC) - (Latin: Daily Acts sometimes translated as Daily Digital Footprint – trail of data you create while using the Public Records) Internet. - daily Roman official notices, a sort of daily gazette. - carved on stone or metal and presented in message Fair Use Law - content from another creator may only boards in public places like the Forum of Rome. be used by other creators if it will be used for: - also called simply Acta History. 1. Education - The first form of Acta appeared around 131 BC during 2. News the Roman Republic. 3. Critique 4. Spoofing Dibao in China (2nd Century) - earliest and oldest newspaper in the world. Laws that Protect Intellectual Property 1. Copyright Law Codex in the Mayan Region (5th Century) - Lifetime of author + 50 years. - (singular codex) - Given to writers, authors - folding books written by the pre-Columbian Maya - For literary works, arts, music civilization in Maya hieroglyphic script on - Lifetime protection of intellectual property Mesoamerican bark cloth. - If author/creator dies, the creation is given 50 years to - The Maya developed their huun-paper around the 5th be protected under this law century, which is roughly the same time that the codex - After that, the creation is put into public domain became predominant over the scroll in the Roman 2. Patent world. - Inventive step - Exclusive and given to investors 2) Industrial Age (1700s – 1930s) - 20 years – non renewable - People used the power of steam, developed machine 3. Trademark tools, established iron production, and the - Logo, tagline, name of company manufacturing of various products including books - 10 years + renewable for another 10 years through the printing press). Industrial Design – upgraded or variant of a patented Telephone (1876) technology. - Alexander Graham Bell's Large Box Intellectual Property – creation of the mind. - On March 7, 1876, Alexander Graham Bell, scientist, inventor and innovator, received the first patent for an LESSON 4: EVOLUTION OF MEDIA "apparatus for transmitting vocal or other sounds 1) Pre-Industrial Age (before 1700s) telegraphically”. - people discovered fire, developed paper from plants, - First words spoken on the telephone: Mr. Watson, come and forged weapons and tools with stone, bronze, here, I want to see you. copper and iron. Typewriter (1800) Papyrus in Egypt (2500 BC) - first typewriter to be commercially successful was - by about 1000 BC people all over West Asia began invented in 1868 by Americans Christopher Latham buying pappus From Egypt and using it. Sholes, Frank Haven Hall, Carlos Glidden and - much more convenient than clay tablets. Samuel W. Soule in Milwaukee, Wisconsin - Sholes soon disowned the machine and refused to use, Punch Cards or even to recommend it. - originally invented by Herman Hollerith, was first used for vital statistics tabulation by the New York Newspaper – The London Gazette (1640) City Board of Health and several states. - one of the official journals of record of the British - After this trial use, punched cards were adopted for use government, and the most important among such in the 1890 census. official journals in the United Kingdom. - in which certain statutory notices are required to be 3) Electronic Age (1930s-1980s) published. - The invention of the transistor ushered in the electronic - claims to be the oldest surviving English newspaper. age. - People harnessed the power of transistors that led to the Printing Press for Mass Production (19th century) transistor radio, electronic circuits, and the early - device for applying pressure to an inked surface computers. In this age, long distance communication resting upon a print medium (such as paper or cloth), became more efficient. thereby transferring the ink. - invented in the Holy Roman Empire by the German Transistor (1930) Johannes Gutenberg around 1440, based on existing - transistors ushered in electronic age, and it led to the screw presses. creation of other media tool. Motion Pictures Photography/Projection (1890) Television (1941) - The history of film technology traces the development of film technology from the initial development of Transistor Radio 1947) "moving pictures" at the end of 19th century to the - a small portable radio receiver that uses transistor-based present time. circuitry. - initially exhibited as a fairground novelty and - Following their development in 1954, made possible by developed into one of the most important tools of the invention of the transistor in 1947, they became the communication and entertainment in the 20th century. most popular electronic communication device in - Major developments in motion picture technology have history. included the adoption of synchronized motion picture sound, color motion picture film, and the adoption of Overhead Projector (OHP) (1950) digital film technologies to replace physical film stock - variant of slide projector that is used to display images at both ends of the production chain by digital image to an audience. sensors and projectors. UNIVAC 1 (Universal Automatic Computer) 1951 Chronophotography - a line of electronic digital stored-program computers - Eadward Muybridge starting with the products of the Eckert-Mauchly - In 1878 and 1879 Muybridge shot photographic Computer Corporation. sequences of animals in motion at the Palo Alto - Later the name was applied to a division of the racetrack in California. Remington Rand company and successor organizations. - In1881, he published a selection of the results in a hand- made folio book of circa 15 copies entitled "The Mainframe Computers (IBM 704) (1960) Attitudes of Animals in Motion". - first mass-produced computer with floating-point arithmetic hardware. Commercial Motion Pictures w/Sound (1913) - The IBM 704 Data Processing System was a large- - sound film: a motion picture with synchronized sound, scale computer designed for engineering and scientific or sound technologically coupled to image, as opposed calculations. to a silent film. - computer that reproduced the song "Daisy Bell". - The first known public exhibition of projected sound films took place in Paris in 1900, but decades passed Personal Computers before sound motion pictures were made commercially Hewlett-Packard 100A (1968) practical. - an early computer (or programmable calculator). - Reliable synchronization was difficult to achieve with the early sound-on-dise systems, and amplification and Floppy Disk recording quality were also inadequate. - a removable magnetic storage medium. - Innovations in sound-on-film led to the first - used for moving information between computers, commercial screening of short motion pictures using laptops or other devices. the technology, which took place in 1923. - Some early digital cameras, electronic music instruments and older computer game consoles use Telegraph floppy disks. - Developed in the 1830s and 1840s by Samuel Morse (1791-1872) and other inventors APPLE 1 (1976) - the telegraph revolutionized long-distance - a desktop computer released by the Apple Computer communication. Company in 1976. - It worked by transmitting electrical signals over a wire - It was designed and hand-built by Steve Wozniak. laid between stations. - Wozniak's friend Steve Jobs had the idea of selling the - released on May 27, 2003, by its founders, Matt computer. Mullenweg and Mike Little. Walkman (1980) Friendster (2002) - originally used for portable audio cassette players. - a social gaming site based in Kuala Lumpur, Malaysia. 4) Information Age (1900s-2000s) - It was originally a social networking service website. - Internet paved the way for faster communication and - Before Friendster was redesigned, the service allowed the creation of the social network. users to contact other members, maintain those contacts, - People advanced the use of microelectronics with the and share online content and media with those contacts. invention of personal computers, mobile devices, and - The website was also used for dating and discovering wearable technology. new events, bands and hobbies. - Moreover, voice, image, sound and data are digitalized. - Users could share videos, photos, messages and We are now living in the information age. comments with other members via profiles and networks. Web browsers: Mosaic (1993), Internet Explorer - considered one of the original social networks. (1995) - NCSA Mosaic Multiply (2003) - web browser that popularized the World Wide Web and - a social networking service with an emphasis on the Internet. allowing users to share media - such as photos, videos - It was also a client for earlier internet protocols such as and blog entries - with their "real-world" network. File Transfer Protocol, Network News Transfer Protocol, and Gopher. Facebook (2004) - The browser was named for its support of multiple - February 4, 2004, Mark Zuckerberg launched internet protocols. "Thefacebook". - The social networking service gradually expanded to Internet Explorer (1995) the most universities in Canada and USA. - Microsoft Internet Explorer and Windows Internet - On August, 2005, the company dropped 'The' from its Explorer name. - commonly abbreviated lE or MSIE) was a series of - September 26, 2006, Facebook was opened to everyone graphical web browsers (or, as of 2019, a at least 13 years old with a valid email address. "compatibility solution"). - developed by Microsoft and included in the Microsoft Twitter (2006) Windows line of operating systems, starting in 1995. - an American online news and social networking service on which users post and interact with messages known Blogs: Blogspot (1999), LiveJournal as "tweets". (1999), WordPress (2003) - Tweets were originally restricted to 140 characters, but - blog (a truncation of "weblog") is a discussion or on November 7, 2017, this limit was doubled to 280 for informational website published on the World Wide all languages except Chinese, Japanese, and Korean. Web consisting of discrete, often informal diary-style text entries (posts). Tumblr (2007) - Posts are typically displayed in reverse chronological - a microblogging and social networking website founded order, so that the most recent post appears first, at the by David Karp in 2007 and owned by Verizon top of the web page. Media. - Until 2009, blogs were usually the work of a single - The service allows users to post multimedia and other individual, occasionally of a small group, and often content to a short-form blog. covered a single subject or topic. - Users can follow other users' blogs. - Bloggers can also make their blogs private. Live Journal (1999) - For bloggers many of the website's features are - a Russian social networking service where users can accessed from a "dashboard" interface. keep - a blog, journal or diary. Video: YouTube – 2005 - American programmer Brad Fitzpatrick started Augmented or Virtual Reality LiveJournal on April 15, 1999, as a way of keeping his Video Chat: Skype – 2003, Google Hangouts – 2013 high school friends updated on his activities. Search Engines: Google – 1996, Yahoo – 1995 - In January 2005, American blogging software company Portable Computers: Laptops – 1980, Netbooks – Six Apart purchased Danga Interactive, the company 2008, tablets – 1993. that operated LiveJournal, from Fitzpatrick. 5) New Age (1900s-2000s) WordPress (2003) Smartphones - a free and open-source content management system Wearable Technologies (CMS). - most associated with blogging but supports other types Industrial Revolution of web content including more traditional mailing lists Industry 1.0 and forums, media galleries, and online stores. - Mechanization, steam power, weaving loom. Industry 2.0 Intellectual Property – creations of the mind (inventions, - Mass production, assembly line, electrical energy literary and artistic works, designs, symbols, names and Industry 3.0 images used in commerce). - Automation, computers and electronics Industry 4.0 Types of Intellectual Property - Cyber physical systems, internet of things, systems. 1. COPYRIGHT - Legal term used to describe the rights that creators have LESSON 5: DEFINING INFORMATION NEEDS AND over their literary and artistic works and gives the LOCATING, ACCESSING, ASSESSING, creator the sole right to publish and sell that work. ORGANIZING, AND COMMUNICATING - Protects the form of material expression and is only INFORMATION available for works that are fixed in tangible form. Information Literacy – skill necessary to distinguish, assess, and utilize information ethically. 2. PLAGIARISM - Act or instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author’s work as one’s own, as by not crediting the original author. 3. PATENT - Exclusive right granted for an invention, which is a product or a process that provides a new way of doing Information Needs something or offers a new technical solution to a - Call for information for the purpose of furthering any problem. job or research. (Nicholas & Herman, 2009) - Provides the right to consent on the invention or a way Determining Sources of Information for others to use it functionally. - Sets the bar for the kind of information one may find 4. TRADEMARK Primary Sources – original source. - Distinguished sign of goods or services that identifies Research reports and differentiates from one enterprise to another: Sales receipts signature mark. Speeches Registered Trademark - R Email Unregistered Trademark - TM Original artwork Unregistered Service Trademark - SM Manuscripts Photos 5. INDUSTRIAL DESIGN Diaries - Protects only the appearance or aesthetic features of a Personal letters product, such as shape, surface, patterns, lines or color. Spoken stories Interviews or diplomatic records 6. GEOGRAPHICAL INDICATIONS AND Secondary Sources - Interpreted, analyzed, and APPELATIONS OF ORIGIN summarized - Signs used on products possessing qualities, a status, or Scholarly books characteristics that are essentially attributable to that Journals magazines location of origin. Criticism Interpretations FAIR USE Tertiary Sources – compilations, indexes, and organized - Legal principle stating that one can use a copyrighted sources. work without license for the following purposes: commentary, criticism, reporting, research, teaching Abstracts Bibliographies SPECTRUM OF RIGHTS Handbooks Copyright (All Rights Reserved) – re-use requires the Encyclopedias permission from the copyright owner. Indexes Creative Commons (Some Rights Reserved) – re-use Chronologies is permitted without permission under the specifications Databases shared in the license. Public Domain (No Rights Reserved) – may be used LESSON 6: DEMONSTRATE ETHICAL without permission. CONSIDERATIONS Digital Citizenship Common Issues on Data Privacy - Ability to find, access, use, and create information 1. Hacking effectively, engage with other users and with content in - Involves activities that seek to compromise digital an active, critical, sensitive and ethical manner, navigate devices (computers, smartphones, tablets, and even the online and ICT environment safely and responsibly, entire networks). being aware of one’s own rights. - Attempt to exploit a computer system or a private network inside a computer. - Unauthorized access to or control over computer Netiquette network security systems for some illicit purpose. - Set of rules for proper and acceptable online behavior. - Denotes the proper attitude that one should have and 2. Phishing observed when communicating online. - Type of social engineering attack often used to steal user data, including login credentials and credit card LESSON 7: INFORMATION LITERACY numbers. - set of skills and knowledge that helps individuals find, - Doesn’t require particularly sophisticated technical evaluate, and use information effectively. expertise. - These skills are essential in today's world, where information is readily available but not always reliable. 3. Identity Theft - When a criminal obtains or uses the personal Importance of Information Literacy in Digital Age information of someone else to assume their identity or - Individuals are bombarded with information from access their accounts for the purpose of committing various sources. fraud, receiving benefits, or gaining financially in some - Information Literacy helps individuals navigate this way. information overload by providing them with the skills - Data Privacy Act of 2012 (RA No. 10173) to discern credible information from unreliable sources. Cybercrime or Computer Crime 1. Critical Thinking - Any criminal activity that involves use of a computer, - fosters critical thinking by enabling individuals to networked device, or a network as an instrument to evaluate information sources for bias, accuracy, and further illegal ends. relevance. Other forms of cybercrimes: 2. Effective Communication Piracy and Illegal Downloads - equips individuals with the ability to communicate Cybersquatting information effectively, using appropriate language and Online Drug Trafficking formats. Cyber libel or Cyber Defamation Online Harassment 3. Problem-Solving Internet Pornography - enhances problem-solving skills by enabling individuals to identify relevant information and apply it to solve Online Predators problems. Sex Crimes 4. Lifelong Learning Fake Information – news, stories, or hoaxes created to - Is an ongoing process, as new technologies and deliberately misinform or deceive readers and created to information sources emerging constantly. either influence people’s view, push a political agenda, or - can adapt to these changes and continue to learn cause confusion and can often be a profitable business for throughout their lives. online publishers. Key Information Literacy Competencies Types of False Information 1. Locate Information 1. Clickbait - Finding relevant and reliable information is a crucial 2. Propaganda step. Knowing how to use search engines, databases, 3. Satire/Parody and other information sources is essential. Computer Addiction 2. Evaluate Sources - Overdependence or a damaging need to do something - Critical evaluation of information sources is paramount. on computer or internet. Individuals must consider the author's credibility, the - Excessive use of computers to the extent that it source's purpose, and the information's accuracy. interferes with daily life. 3. Synthesize Information Triggers for Computer Addiction - Bringing together information from multiple sources 1. Computer Games and drawing conclusions is an essential skill. This 2. Online Shopping involves identifying connections, analyzing data, and 3. Social Media forming arguments. Effects of Computer Addiction 4. Use Information Ethically 1. Sleep deprivation - Understanding ethical considerations when accessing, 2. Anxiety using, and sharing information is crucial. This includes 3. Depression respecting copyright, avoiding plagiarism, and 4. Relationship problems maintaining privacy. Digital Divide Evaluating Information Sources - Digital inequality or gap between groups in terms of - crucial for determining their credibility and reliability. knowledge, usage, and access to ICT due to - This process involves considering several key factors. circumstances like location, income, and age. 1. Author’s Credibility 3. Practice Skills - Continuously apply your IL skills in Is the author an expert in the field? various contexts to strengthen and refine them. What are their qualifications and credentials? 2. Source’s Purpose LESSON 8: TYPES OF MEDIA What is the purpose of the source? 1) PRINT MEDIA Is it to inform, entertain, or persuade? - media consisting of paper and ink, reproduced in a 3. Information’s Accuracy printing process that is traditionally mechanical Does the information align with other reliable sources? - may include text, graphics, or a combination of both. Is it supported by evidence? a. Text Media - A simple and flexible format for conveying ideas, Effective Search Strategies whether handwritten or printed. - Developing effective search strategies is essential for - Newspaper, textbook, novel finding relevant information quickly and efficiently. b. Visual Media - The way you phrase your search query can greatly - Pictures, photos, images and graphics are used to impact your results. channel communication using the sense of sight. Use specific keywords - Poster and billboard Use quotation marks Use Boolean operators Graphic Design: Use wild card characters - The process of visual communication that organizes and presents information developed through a creative Citing Sources and Avoiding Plagiarism process for a particular purpose. - important for acknowledging the original authors of Examples of Visual Design information and avoiding plagiarism. Infographic - is a visual representation of information - involves providing clear and accurate references to the to understand the high-volume and complex data easily, sources you use. e.g., graphs, charts. 1. Identify Sources Cartoons - a sketch or drawing intended as satire, - Make a list of all the sources you used in your work. caricature, or humor, e.g., comic strip, editorial cartoons 2. Choose Citation Style in newspapers and magazines. - Select a citation style that aligns with your field or Photography - an image created by light captured on a assignment requirements. light-sensitive surface, which is usually photographic 3. Format Citations film. - Use the correct format for in-text citations and references. 2) BROADCAST MEDIA 4. Use Citation Tools - Type of media that reaches target audiences using - Take advantage of citation tools to help you format airwaves as the transmission medium citations correctly. - includes radio and television. a. Audio Media Ethical Use of information - uses audio or voice recording as a medium in the - crucial for maintaining academic integrity, protecting delivery of information. privacy, and ensuring fairness. b. Multimedia - should guide all aspects of information access, use, and - concerned with the computer-controlled integration of sharing. text, graphics, drawings, still and moving images 1. Respect Copyright (video), animation, audio, and any other media where - Respecting copyright means obtaining permission every type of information can be stored, communicated, before using copyrighted material. and handled digitally 2. Protect Privacy - Avoid sharing personal information without consent and 3) NEW MEDIA be mindful of data privacy regulations. - used to integrate the different technologies emerging on 3. Ensure Accuracy one digital platform and distribute content. - Double-check information sources for accuracy and reliability. Media Convergence 4. Maintain Integrity - Refers to the merging of different equipment and tools - Be honest and transparent in your use and attribution of for producing and distributing news through digitization information. and computer networking. - The co-existence of print media, broadcast media (radio Lifelong Learning & Information Literacy and television), the internet, mobile phones, as well as - not a one-time endeavor but rather an ongoing process. others, allowing media content to flow across various - Individuals must continuously develop their IL skills to platforms. adapt to the evolving landscape of information and Examples: technology. Communication – social networks (Facebook, 1. Stay Informed - Stay updated on the latest Instagram, etc.) developments in information sources and technologies. Education - Learning Management System (Moodle, 2. Seek Opportunities - Take advantage of learning Google Classroom, Edmodo, etc.) opportunities, such as workshops, online courses, and Advertising – digitized print ads across different professional development programs. platforms. News – news agencies (CNN, Inquirer, etc.)

Use Quizgecko on...
Browser
Browser