Student'S Activity Sheet For Melc 1 (Modular Modality)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

1

Republic of the  Philippines 


Department of  Education 
Region IV (A) –  CALABARZON 
City Schools  Division Office of Antipolo 
District I – A 
 
ANTIPOLO CITY SENIOR HIGH SCHOOL 
(#342175 - SHS within Sta. Cruz Elementary School) 
Brgy. Sta. Cruz, Antipolo City 
Email add: ​[email protected] 
 
 
STUDENT’s ACTIVITY SHEET FOR ​EMPOWERMENT TECHNOLOGIES 
 

STUDENT’s ACTIVITY SHEET FOR MELC 1


​ (MODULAR MODALITY) 

TITLE/LESSON: ​CURRENT STATE OF ICT AND ONLINE PLATFORM 

. OBJECTIVES: ​At the end of the lesson, you are expected to: 

a. Identify the different online platforms, sites & content;  


b. Classify the online platforms, sites, and content; and  
c. Evaluate the importance of online platform in a reflection paper.  
 
A. Content Standard:  
   
​The learners demonstrate an understanding of ICT in the context of global communication for 
specific professional track  
 

B. Performance Standard: 

The learners shall be able to independently compose an insightful reflection paper on the nature 
of ICT in the context of their lives, society, and professional tracks (ABM, Tech Voc, Academic)​. 

C. Most Essential Learning Competency/ies: 

Compare and contrast the nuances of varied online platforms, sites, and content to best 
achieve specific class objectives or address situational challenges _ICT11/12-ICTPT-Ia-b-1)​. 

II: LEARNING RESOURCES  

A. Materials/IMs Needed  
Pen, clean sheet of paper 
B. References  
DepEd Empowerment Technologies Students reader 

1
2

C. Additional Materials and Learning Resources  

III: TIME FRAME: ​100 min or 2 days (30 min will be allotted for the lecture part) 

IV: INTRODUCTION/RATIONALE 

  The world is always in constant change and we must keep up with it. Along with this, we must 
also  understand  how  the  changes  work  –  specifically,  through  Information  and  Communication 
Technology (ICT) – and what are their implications in our modern society 

With this, we must learn and explore ICT and the online platform, sites, content and how it 
affects the way we think.  This will focus on the different online platform. The duration of this activity 
will be two (2) days. 

What is ICT? 

  ICT  (Information  and  Communication  Technology)-  deals  with  the  use  of  different 
communication  technologies  such  as  mobile  phones,  telephone,  internet  etc.  to  locate,  save,  send 
and edit information. 

 
V: PROCEDURE/DIRECTIONS/INSTRUCTIONS 
​The activities that will follow will test your knowledge and ability about online platform. 
Get a clean sheet of paper and label it as Empowerment Technology SAS 1 for week 1. You can cut 
and use the bubble sheet provided at the end of this activity sheet for Activity 5 and Activity 8. Your 
student ID is the last 9 digits of your LRN number EX: 109​321520145 

What I need to know? 


​After going through with this SAS, you will be able to …… 

b. Identify the different online platforms, sites & content;  


c. Classify the online platforms, sites, and content; and  
d. Evaluate the importance of online platform in a reflection paper. 

What I know? 
Activity 1.1 Find Me! 
Directions:​ With the use of the terms listed in the box, choose at least 5 ICT tools that you are familiar 
with. Write your response in your answer sheet.​(5 minutes)  
mouse  Skype  Pinterest  cable 

PowerPoint  keyboar Evernote  LinkedIn 


Facebook  Storify  Ring light  mouse 

Google  Dropbox  Prezi  charger 


docs 

2
3

1._____  2.______  3.______4._____ 


5._____ 
 

What is/are new? 


Activity 1.2 Do you know this? 
Directions:  Shown  in  the  figure  below  is  a  graph  showing  the  percentage  of  utilization  of  telephone, 
electricity  and  internet  of  different  countries.  Study  the  table  and  answer  the  questions  below.  Write 
your response in your answer sheet.​ (10minutes) 

1.​What can you say about the graph?  

2.Where is the Philippines belong? 


3.What are the type of Technology commonly used in the Philippines/ Developing country? 

4.What are the similarities of telephone and Internet?  


5.Can you use telephone and internet without electricity? Why or why not? 

What’s in? 
Activity 1.3 What am I? 
Directions:​ Identify what online platform is being described in the picture . Write your response in your 
answer sheet.​ (5 minutes) 

 
 
1.______  2._____  3._____  4._____ 
5._____ 
 
What is it?  
 

ONLINE PLATFORMS (30 minutes) 

3
4

an online marketplace that places one party in touch with another, such as buyers and sellers. 

ONLINE PLATFORM CATEGORIES:  

- Social Media  

  Social Media are forms of electronic communication (as Websites for social networking and 
microblogging)  through  which  users  create  online  communities  to  share  information,  ideas,  personal 
messages, and other content (as videos). 

Social Networking  

  What  is  the  difference  between  social  media  and  social  networking?  These  are  forms  of 
media.  Essentially,  social media is a platform for broadcasting information, whereas social networking 
is  a  platform  for  communicating  with  one  another.  Social  media  is  a  communication  channel, 
whereas,  in  social  networking,  communication  has  a  two-way nature. Even with the distinction being 
given, some nuances can be pointed out. 

  As an example of how they differ and yet somewhat overlap, Facebook is a social networking 
site.  You  register  and  post  your  profile,  connect  with  friends,  and  comment  on  topics  in  a  generally 
interactive  way.  On  that  same  social  networking  site,  companies  set  up  a  presence  and  use 
Facebook as a way to promote their brand and gain followers. 

- Search Engines  

  It is a software system designed to search for information on the World Wide Web (WWW). The 
search  results  are  generally  presented  in  a  line  of  results  referred  to  as  Search  Engine  Results  Pages 
(SERPs). 

- Communications Services  

  These  are  outsourced  enterprise  communications  solutions that can be leased from a single 


vendor  or  provider.  A Communications Service Provider (CSP) is a provider that transports information 
electronically  and  can  encompass  public  and  private  companies  in  telecom,  internet,  cable, 
satellite, and managed services business.   

- Payment Systems  

  It is any system used to settle financial transactions through the transfer of monetary value and 
includes the institutions, instruments, people, rules, procedures, standards, and technologies. 

- Advertising Platforms 

  It  allows  users to create and manage advertising campaigns, generate reports, and retrieve 


information  about  the  ads,  campaigns,  and  organizations  associated  with  an  account.  With  the 
advent  of  technology,  these  types  of  payments  are  now  being  done  through  online  transactions.  It 
has  made  payments  and  sending  or  receiving  money  more  comfortable,  convenient,  less  hassle, 
and not time-consuming for people 

PLATFORM FOR ADVERTISING 


Facebook advertising is picking up speed in the business world. It uses social graph and 
activities to pinpoint those who fall into your buyer demographics, making Facebook ads incredibly 
useful. Facebook ads are more likely to bring in strong leads that are looking for your services. They 
help make sure your advertising budget is 8 not wasted on those who are not interested in what you 
4
5

are offering. Facebook makes your product or service put into the hands of the exact person who 
wants it. 
 
PLATFORM FOR HASHTAGGING  
Twitter is a fast-paced, concise, and easy way to connect with your audience. With over 
310 million registered users (and growing), Twitter is a sea of information of 140 characters or less 
content waiting to be read, clicked, followed, and re-tweeted. When marketing on Twitter, you need 
to have content that is enticing to stop and click through. People are usually scrolling quickly, to take 
more than just a simple text to stop them in their tracks. Make sure when you are constructing your 
tweets, you are making people want to click through 
 
PLATFORM FOR GROUPING  
LinkedIn is different from the rest of the social media outlets because it is specially designed 
for businesses and professionals. Users mainly go to LinkedIn to showcase their job experience and 
professional thoughts, making it one of the most important platforms to use for those in B2B. 
PLATFORM FOR TEACHING  
   
YouTube is the leading video-sharing platform in the world. On your channel, your brand 
can share and edit videos, create playlists, and prompt discussions. 
PLATFORM FOR ANALYZING BUSINESS  
Pinterest is one of the unique marketing platforms on this list. Instead of posting content for 
your audience to read, on Pinterest, you will post just a clickable picture and a short caption. 
Pinterest is a top-rated platform for brands with a tangible product, i.e., clothing and food brands, 
restaurants, those in eCommerce, etc 
 
 

5
6

What’s more? 
Activity 1.4 Read Me! 

Directions:  Read  the  selection  and  answer  the  questions  below.  Write  your  response  in  your  answer 
sheet. (10 minutes) 
 

6
7

Real world relevance of the topic ​Networked World​ – everything is connected through the Internet. In 
a publication by Marshall McLuhan, he coined the term “Global Village” 

- Due to the continuous spread of connection to the Internet, the world as we know it gets 
smaller and smaller. A lot more people are getting connected (virtually or online) to each other. 
And information is much easier to be accessed. 
- The rise of the Global Village (or the Networked World) causes a huge dilemma between: 
o Since a lot more people are connected over the Internet, there will be an inevitable risk to 
each users’ privacy. This is already seen in the events where hacking of personal and 
private information is prevalent.  
o The community’s need to know.  
 

As McLuhan stated in his 1967 book The Medium is the Message: ​“Electrical information devices for 
universal, tyrannical womb-to-tomb surveillance are causing a very serious dilemma between our 
claim to privacy and the community’s need to know.” 

GUIDE QUESTIONS:
1​.​What does the title tell the reader?__________________________________________________________ 

2.What is/are the effect/s of the media on how people think and perceive information and 
communicate 
information?__________________________________________________________________________________ 

3. As student, how does media and the Networked world affect your choice of track? 

______________________________________________________________________________________________ 

What I can do? 


Activity 1.5 Guess what? 

Directions:  Identify  the  different  trends  in ICT. Multiple Choice: Choose the letter of the best answer (5 


minutes) 

1. A web page that allows interaction from the user.  


A. Static B. Dynamic C. Social D. Comment  
 
2. This refers to the feature where users can categorize and locate information through tagging  
A. Hashtags B. Folksonomy C. Taxonomy D. Rich user experience  
 
3. A feature of a dynamic website that allows users to put their own content. 
A. Rich user experience B. Long tail C. User participation D. Mass participation  
 
4. It provides a common framework to allow data to be shared reused across platforms, enterprise 
and community boundaries.  
A. W3C B. Semantic web C. Web 1.0 D. Web 2.0  
 
5. This type of social media website focuses on short updates posted by the user.  
7
8

A. Blogging B. Microblogging C. Social media D. Hash tagging 


 

What other Enrichment activities can 


I engage in?​ (Additional Activities) 
 

Activity 1.6 Tweet it! 

Directions:  S​tudy  a  picture  and create a hashtag about it. Create a survey and let your relatives vote 


which hashtag they will choose : ​(10 minutes) 

   

 
   
Your hashtag. Your survey   
#____________ _____________ 
 
Answer the following Guide questions: Write your response in your answer sheet. 
 
​3.1. Why did you choose that kind of hashtags? 

3.1. What is the importance of hashtags? 

3.2. How does it feel when you receive likes for your hashtags 

What have I learned?​ (Application) 


Activity 1.7 Mind me! 
​Directions:​ Answer the questions below and make a mind map about online platform. Write your 
response in your answer sheet.​ (10 minutes) 
 
1. How the ICT changed their perception in life particularly in their chosen field in dealing with 
people and meeting the standard dictates by the society __________________________ 
2. . Show differences and likenesses of online platform by making a mind map 
__________________________ 
 
 

8
9

 
What I can do?​ (Assessment) 
Activity 1.8 Answer me!  
Quiz #1   

Directions: Read the statements and be able to answer it accurately.  


.  (​ 15  minutes)​Test  I.  True  or  False.  Write  True  if  the statement is correct otherwise write False. Write your 
response in your answer sheet. (1-9) 
1. Internet is a combination of all resources and users on the internet using http. 

2. WWW stands for wide world web. 

3. BPO stands for Business Process Outsourcing. 

4. Tim Berners-Lee was regarded as Father of www. 

5. Android is an open source Operating System Develop by Google. 

6. Web 2.0 is classified as dynamic webpage. 

7. Web 2.0 introduced static web pages that allow users to interact with the web page. 

8. Blackberry devices uses blackberry OS. 

9. Windows  Phone  OS  is  a  closed  source  and  proprietary  operating  system  developed  by 
Microsoft. 

Test  II.  Multiple  Choice.  Identify  what  is  being  describe  by  each  sentence.  Choose  the  letter  of  the 
correct answer (11-20) 

11.  A  key  features  of  Web  2.0  which  allows  users  to  categorize  and  classify/  arrange  information 
using freely chosen keyword (e.g. tagging) 

a. folksonomy b. rich user interface c. user participation d. long tail 


12. A key features of Web 2.0 which allow and respond to the user's input 
a. folksonomy b. rich user interface c. user participation  d. long tail 
13. A key features of Web 2.0 offered on demand service rather than one-time use. 
a. folksonomy b. rich user interface c.user participation d. long tail 
14. A web which is not yet fully realized because of compatibility and security issue. 
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0 
15.  A  media  which  provide  nonprofit  service,  designed to help people who have visual and reading 
impairments 
a. Mobile b. Assistive  c. convergent d. collaborative 
16.  It  is  a  technology  which  is  a  synergy  of technological advancements to work on a similar goal or 
task. 
a. Mobile b. assistive c. convergent d. collaborative 

9
10

17.  It  is  a  platform  and  a  category  of  business  software  that  adds  broad  social  networking 
capabilities to work processes. 
a.Mobile b. assistive c. convergent  d. collaborative 
18.  This  refers  to  media  devices  such  as  mobile  phones  and  PDA's  were  the  primary  source  of 
portable media from which we could obtain information and communicate with one another. 
a.Mobile b. assistive c. convergent d. collaborative 
19.  This  refer  to  a  websites,  applications  or  online  channels  that  enable  users  to  co-create,  discuss, 
modify, and exchange user generated content. 
a. Social media b. web 1.0 c. mobile d. online system 
20.  An  online  versions  of  information  systems  which  is  the  process  of and tools for storing, managing, 
using and gathering of data and communications in an organization. 
a.Social media  b. web 1.0 c. mobile  d. online system 
I. II.Direction: Answer the following questions. Write your response in answer sheet.
 
21-23. Based on your mind map, can you classify the online platforms, sites, and content? 
24-25. How will you determine the significance of online platform in your everyday lives? 
 
REFLECTION: (​ 5 minutes) 

​Base on the activity/ies conducted, complete the phrases 


✔ I understand that 
________________________________________________________________________________________
_____________________________________________________________.  
 
✔ I realize that 
_________________________________________​_______________________________________________
_____________________________________________________________. 
 
Prepared by:  
 
 
RACHELLE DIESTA/JOHN FRANCIS OLIVO/MAY LAPASTORA    
Teacher, Empowerment Technologies    
 
 
Checked by: 
 
 
MAY LAPASTORA 
Subject Specialist, EMPOWERMENT 
 
 
ZENAIDA P. CRISTOBAL 
Academic Coordinator 
 
 
Noted by: 

10
11

 
 
ROSA T. TAYAMORA 
School Head 
---------------------------------------------------------------you -----can-------cut-------from------here--------------------------------------------

11
12

Republic of the Philippines  

Department of Education 
Region IV (A) – CALABARZON 
City Schools Division Office of Antipolo 
District I – A 

 
ANTIPOLO CITY SENIOR HIGH SCHOOL 
(#342175 - SHS within Sta. Cruz Elementary School) 
Brgy. Sta. Cruz, Antipolo City 
Email add: ​[email protected] 
 
STUDENT’s ACTIVITY SHEET FOR ​EMPOWERMENT TECHNOLOGIES 
 

STUDENT’s ACTIVITY SHEET FOR MELC 2


​ (MODULAR MODALITY) 

TITLE/LESSON: ​ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE STANDARDS 

I.OBJECTIVES: ​At the end of the lesson, you are expected to: 

12
13

a. Explain online safety, security, ethics and etiquette standards & practice in the use of ICT 

I.   b.  Apply  online  safety,  security,  ethics  and  etiquette  standards  &  practice  in  the use of ICT as it 
would relate to their specific professional tracks. 

c.Recognize the importance of making judgment calls on possible implications and 


consequences of making certain information public   

A. Content Standard:  
   
​The learners demonstrate an understanding of ICT in the context of global communication for 
specific professional track  
 

B. Performance Standard: 

The learners shall be able to independently compose an insightful reflection paper on the 
nature of ICT in the context of their lives, society, and professional tracks (ABM, Tech Voc, Academic) 

C. Most Essential Learning Competency/ies: 

  Apply online safety, security, ethics and etiquette standards & practice ICT as it would relate to 
their specific professional tracks​. 

II: LEARNING RESOURCES  

A. Materials/IMs Needed  
Pen, clean sheet of paper 
B. References  
DepEd Empowerment Technologies Students reader 
C. Additional Materials and Learning Resources  

III: TIME FRAME: ​100 min or 2 days (30 min will be allotted for the lecture part) 

IV: INTRODUCTION/RATIONALE 

In this generation, people are dependent on the Internet. Like how people socialize face to 
face, we should always follow etiquette as it mirrors our personality. Being on different platforms, we 
should be aware of our actions and protect ourselves at the same time. Remember that once 
something has been shared online, it cannot be deleted.   

This lesson provides information about Netiquette. It will serve as your guide on how to behave 
appropriately online. It is vital to use Netiquette because communication online is non-verbal. Most 
often, online discussion consists of reading something someone else’s has type. The duration of the 
activity will be 2 days. 

 
V: PROCEDURE/DIRECTIONS/INSTRUCTIONS 

13
14

The activities that will follow will test your knowledge and ability about online platform. Get a 
clean sheet of paper and label it as Empowerment Technology SAS 2 for week 1. You can cut and 
use the bubble sheet provided at the end of this activity sheet for Activity 2, 4 and Activity 8. Your 
student ID is the last 9 digits of your LRN number EX: 109​321520145 

What I need to know? 


​After going through with this SAS, you will be able to …… 

a. Explain online safety, security, ethics and etiquette standards & practice in the use of ICT 

V.   b.  Apply  online  safety,  security,  ethics  and  etiquette  standards  &  practice  in  the use of ICT as it 
would relate to their specific professional tracks. 

c. Recognize the importance of making judgment calls on possible implications and 


consequences of making certain information public 
 

What I know? 
Activity 2.1 Agree or Disagree!! 

Directions:​ Choose A if Yes you agree with the statement and choose B if No you disagree on the 
statement.​ (5 minutes)  

_______ 1. My computer has an antivirus, so it is okay to open most email attachments like e-cards and video 
files. 
_______ 2. Your friend told you that his college application was rejected because you posted a video of him 
doing crazy stuff at a party. You posted the video several years ago but later took it down to protect your 
friend's reputation. Can your friend be right that the college found the video? 
_______ 3. You and your best friend plays a lot of video games. One time, she asks you for your password so she 
can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give 
away your password?  
_______ 4. You received an email stating that your mother's bank account is going to be forfeited if you do not 
respond to the email. Is it safe to' reply? 
_______ 5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a 
website offering free essays. Is it okay to use the essays from this free essay website? 
_______ 6. A virus is a malware that multiplies and infects other computers through flash drives. 
_______ 7. Keyloggers are software that show pop-up ads even if you are not using your browser. 
_______ 8. Search engines scan websites for search results even if you have set your post to "private"  
_______ 9. There is a danger in posting information about a future vacation.  
_______ 10. Letting people know your birthday is probably a must if you want to get as many 

What is/are new? 


Activity 2.2 Do you know this? 
Directions:  Below  is  a  table  of  different  type  of  information  that  you  shared  or  not  shared​.  Study  the 
table and answer the questions that follow.​(10minutes) 

Type of Information  Shared  Not shared 


14
15

1. First name     

2. Last name     

3. Middle name     

4. Current and previous     


school 

5. Your cellphone numbers     

6. The name of your mother     


and father 

7. The name of your siblings     

8. Your address     

9. Your home phone number     

10. Your birthday     

Guide Questions: 

1. How many checks did you have for Shared? Not Shared? __________________________________ 

2. If you search your first and last name, did you get links to your profile page? ________________ 

3. How can search engines locate you?_____________________________________________________ 

4. Is there any danger of being found by search engine? _____________________________________ 

5. How Safe are you?_______________________________________________________________________ 

What’s in? 
Activity 2.3 What am I? 
Directions:​ Study the picture below from there you will form a word from a given letters. Write your 
answer legibly . ​(5 minutes) 

 
1.P, R, I, C, Y, A, G, F, V - _________________ 2. A, C, G, H , D, E, Y, K , R-__________________

15
16

3. W, V, I, S, R, U, T -__________________  
4. E, R, I, N, C, S, I , T, U , Y-____________________

What is it?  
Read Me 
ONLINE SAFETY AND SECURITY (30 minutes) 

  ​Internet  is  defined  as  the  information  superhighway.  This  means that anyone has access to this 


highway,  can  place  info,  and  can  grab  that  info.  Are  you  safe  and  secured  online?  How  safe  and 
secure are you online? 

INFORMATION AT RISK 

​Mother’s and Father’s name 


Sibling’s name 
Address 
Birthday 
Email address 
First, Middle and Last name 
  
ONLINE SAFETY TIPS 

Be mindful on what you share online 


Do not just accept terms and conditions, read it. 
Do not share your password with anyone. 
Do not talk to strangers whether online or face-to-face 
Never post anything about a future vacation 
Add friends you know in real life 
Avoid visiting untrusted websites 
If you have WIFI at home, make it private by adding a password 
Install and update an antivirus software on your computer 
Avoid downloading anything from untrusted websites. 
Buy the software, do not use pirated ones 
Do not reply or click links from suspicious emails 
 

TEN CORE RULES OF NETIQUETTE 

16
17

  Netiquette,  or  network  etiquette,  is  concerned  with  the  "proper"  manner  of  communication  in 
the  online  environment.  Every  Time  you  communicate  in  the  virtual  world,  consider  the  following 
"rules," adapted from Virginia Shea's Core Rules of Netiquette. 

Rule 1: Remember the Human  

  When communicating electronically, whether through email, instant message, discussion 
post,  text, or another method, practice the Golden Rule: Do unto others as you would have others do 
unto  you.  Remember,  your  written  words  are  read  by  real  people,  all  deserving  of  respectful 
communication.  Before  you  press  "send"  or  "submit,"  ask  yourself,  "Would  I  be  okay  with  this  if 
someone else had written it?" 

​Rule 2: Adhere to the same standards of behavior online that you follow in real life 

  While it can be argued that standards of behavior may be different in the virtual world, 
they  certainly  should  not  be  lower.  You  should  do  your  best  to  act  within  the  laws  and  ethical 
manners  of  society  whenever  you  inhabit  "cyberspace."  Would  you  behave  rudely  to  someone 
face-to-face? On most occasions, no. Neither should you behave this way in the virtual world. 

Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain."(Shea, 1994)  

  Depending on where you are in the virtual world, the same written communication can 
be  acceptable  in  one area, where it might be considered inappropriate in another. What you text to 
a  friend  may  not  be  appropriate  in  an  email  to  a  classmate  or  colleague.  Can  you  think  of another 
example?  

Rule  4:  Respect  other  people's  time  and  bandwidth  Electronic  communication  takes  time:  time  to 
read and time in which to respond.  

  Most  people  today  lead  busy  lives,  just  like  you  do,  and  do  not  have  time  to  read  or 
respond  to  frivolous  emails  or  discussion  posts.  As a virtual world communicator, it is your responsibility 
to  make  sure  that  the  time  spent  reading  your  words  is  not  wasted.  Make  your  written 
communication  meaningful  and  to  the  point,  without  extraneous  text  or  superfluous  graphics  or 
attachments that may take forever to download. 

Rule 5: Make yourself look good online  

  One of the virtual world's best things is the lack of judgment associated with your physical 
appearance,  the  sound  of  your  voice,  or  the  clothes  you  wear  (unless  you  post  a  video  of  yourself 
singing  Karaoke  in  a  clown  outfit.)  The  quality  of  your writing will judge you, so keep the following tips 
in  mind:  Always  check  for  spelling  and  grammar  errors  Know  what  you  are talking about and state it 
clearly Be pleasant and polite  

Rule 6: Share expert knowledge  

  The  Internet  offers  its  users  many  benefits;  one  is the ease in which information can be 


shared  or  accessed,  and  in fact, this "information sharing" capability is one of the reasons the Internet 
was  founded.  So, in the spirit of the Internet's "founding fathers," share what you know! When you post 
a  question  and  receive  intelligent  answers,  share  the  results  with  others.  Are  you  an  expert  at 
something?  Post  resources  and references for your subject matter. You have recently expanded your 
knowledge about a subject that might be of interest to others? Share that as well.  

Rule 7: Help keep flame wars under control 

17
18

  What  is  meant  by  "flaming"  and  "flame  wars?"  "Flaming  is  what  people  do  when  they 
express  a  strongly held opinion without holding back any emotion."(Shea, 1994). As an example, think 
of  the  kinds  of  passionate  comments  you  might  read  on  a  sports  blog.  While  "flaming"  is  not 
necessarily  forbidden  in  virtual  communication,  "flame  wars,"  when  two  or  three  people  exchange 
angry  posts  between  one  another,  must  be  controlled,  or  the  camaraderie  of  the  group  could  be 
compromised.  Do  not  feed  the  flames;  extinguish  them  by  guiding  the  discussion  back  to  a  more 
productive direction.  

Rule 8: Respect other people's privacy  

  Depending on what you are reading in the virtual world, be it an online class discussion 
forum,  Facebook  page,  or  an  email,  you  may  be  exposed  to  some  private  or  personal  information 
that  needs  to  be  handled  with  care.  Perhaps  someone  is  sharing some medical news about a loved 
one  or  discussing  a  situation  at work. What do you think would happen if this information "got into the 
wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your 
privacy,  so  should  you  respect  the  privacy  of  others.  Be  sure  to  err  on  the  side  of  caution  when 
deciding to discuss or not to discuss virtual communication.  

Rule 9: Don't abuse your power  

  Like in face-to-face situations, there are people in cyberspace who have more "power" 
than  others.  They  have  more  expertise  in  technology  or  have  years  of  experience  in  a skill or subject 
matter.  Maybe  it  is  you  who  possesses  all  of  this  knowledge  and  power!  Just  remember:  knowing 
more  than  others  do or having more power than others may have does not give you the right to take 
advantage of anyone. Think of Rule 1: Remember the human.  

Rule 10: Be forgiving of other people's mistakes  

  Not everyone has the same amount of experience working in the virtual world. And not 
everyone  knows  the  rules  of  Netiquette.  At  some  point,  you  will  see  a  stupid  question,  read  an 
unnecessarily  long  response,  or  encounter  misspelled  words;  when  this  happens,  practice  kindness 
and forgiveness as you would hope someone would do if you had committed the same offense. If it is 
a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in 
a  private  email  rather  than  a  public  forum.  Shea,  V.  (1994).  Core  Rules  of Netiquette. Retrieved from 
http:/coursedesign.colostate.edu/obj/corerulesnet.html 

18
19

What’s more? 
Activity 2.4 Choose Me! 

Directions:​ Read the statements carefully and choose the letter of the correct answer.(10 minutes) 
 
1. What  code  of  behavior  that  delineates  expectations  for  social  behavior  according  to 
contemporary conventional norms within a society, social class, or group? 
a. Etiquette 
b. Mobile media 
c. Internet safety 
d. Social media 
2. What  do  you  call  the  knowledge  of  maximizing  the  user's  personal safety and security risks 
to  private  information  and  property  associated  with  using  the  internet,  and  the 
self-protection from computer crime in general? 
a. Etiquette 
b. Mobile media 
c. Internet safety 
d. Social media 
3. What  awareness  of  rules  that  either  punish  or  reward  us  for  doing  something:  younger 
children  are  most  motivated  by  a  fear  of  being  punished  for  bad  behavior,  but  become 
more concerned with the rewards of good behavior as they get older? 
a. Ethics 
b. Mail merge 

19
20

c. Research skills 
d. Online system 
4. Typing in all capitals in electronic communications means 
a. This message is very important 
b. You are shouting 
c. It’s okay to forward this message to others 
d. Nothing special typing in all CAPS is normal 
5. Before posting to a discussion group you should 
a. Read the FAQ 
b. Find the Frequently Asked Questions document 
c. Read some of the existing posts to get an idea of the tone and character of the group 
d. All of the above 
6. Knowledge and understanding of netiquette is useful because 
a. It will help you create a positive impression on those you meet in cyberspace 
b. It explains some of the technical limitations of online communications 
c. It explains the conventions already being used by millions of cybernauts. 
d. All of the above 
7. It  is  concerned with protecting personal data to avoid online exploitation either by bullying 
or identity theft 
a. Internet safety 
b. Internet bullying 
c. Internet theft 
d. Internet standards 
8. It  is  a  method  where  an  unauthorized  person  attempts  to  gather  personal  data,  such  as 
passwords and credit card details 
a. smishing 
b. phishing 
c. vishing 
d. fishing 
9. Is  a  computer  program  that  is  designed  to  damage  or  disrupt a computer system and the 
files that are stored on it. 
a. Hardware 
b. Software 
c. Malware 
d. Spyware 
10. A  malicious  computer program that disguises itself as another application, such as a game 
or a utility program. 
a. worm 
b. spyware 
c. adware 
d. Trojan horse 

What I can do? 


Activity 2.5 Did you know? 

Directions:​ Students will answer the following question​ (5 minutes) 

20
21

1.What is online security?____________________________________________________________ 


2.Why is online security important?___________________________________________________ 
3.How will you protect yourself online?________________________________________________ 
4.How will you observe online etiquette as you practice the use of ICT relating to your track? 

 
What other Enrichment activities can I 
engage in? ​(Additional Activities) 
Activity 2.6 Draw it!! 

Directions:  ​Draw  a  poster  about  netiquette  with  examples  of how you can use them in your daily life, 


primarily  online.  You  may  choose  from  any  of  the  Core  rules  of  Netiquette  as  your  baseline  idea  in 
crafting you posters.​ ​: (​ 10 minutes) 

POSTER RUBRIC 
Relevance to the topic  3 

Layout and design  4 

Originality  1 

Creativity  2 

  10 

What have I learned?​ (Application) 


Activity 2.7 Write it! 
​Directions:​ Answer the questions below and make a mind map about online platform. ​(10 minutes) 
 
Like any other rules, what you have learned from this lesson could be applied to any task you do. So start
doing your part as a student and as you take steps in preparing for your future.

What profession do you prefer to have in the future? In what way could you make an impact on society using
the Internet? Answer the following question in essay form.

ESSAY RUBRIC 

Relevance to the topic  1 

Content  4 

Organization & format  1 

Word choice,  2 
sentence variety & 
structure 

Grammar &  2 
Mechanics 

21
22

  10 

What I can do?​ (Assessment) 


Activity 2.8. ​Quiz #2 

Directions: Read the statements and be able to answer it accurately.  


. (​ 15 minutes) 
 

1. What is Netiquette?  
A. Using a net to catch fish  
B. Being mean to other people on Facebook  
C. Presenting proper manners at the dinner table  
D. Showing manners and etiquette on the Internet  
 
2. What should you do if you receive a text or email from someone you don't know?  
A. Call the police  
B. Delete it without opening it  
C. Open it immediately and reply  
D. Leave it in your inbox until you figure out who it is 
 
3. Which of the following should you never give on the Internet?  
A. Your age  
B. Your name  
C. Your address  
D. All of the above  
 
4. What should you do to avoid being cyber-bullied?  
A. Observe proper netiquette rules   
B. Give out personal information to anyone who asks 
C. Ignore any requests from people to be your friend online  
D. Strike first - post mean things about other people on your Facebook Wall  
 
5. What should you do if you feel you are being cyber-bullied?  
A. Call the police  
B. Tell no one, it is embarrassing 
C. Tell a trusted adult like a parent or teacher  
D. Just delete anything referring to you on the Internet  
 
6. What should you never do if you get an embarrassing picture from someone?  
A. Talk to the person again  
B. Send it on to other friends  
C. Tell your parents or a teacher 
D. Discourage the person from sending pictures like that  
 
7. What should you avoid doing in a chat room?  

22
23

A. Posting your address  


B. Posting your phone number  
C. Revealing financial information  
D. All of the above. 
 
8. It is OK to forward or post an email message that you received if_____________ 
A. The message is typed in all capital letters 
B. It does not contain any copyrighted material  
C. The author of the message has marked it as confidential.  
D. The author of the message has not given you permission to forward or post it 
 
9. Before posting to a discussion group you should _____________________  
A. Read the FAQ  
B. Find the Frequently Asked Questions (FAQ) document  
C. Read some of the existing posts to get an idea of the tone and character of the group  
D. All of the above.  
 
10. A flame is _____________________________  
A. An online chain letter  
B. An expert programmer 
C. A person who consistently breaks the rules of Netiquette  
D. a post or email message that expresses a strong opinion or criticism  
 
11. The Golden Rule of Netiquette is __________________________  
A. Remember the human! 
B. A smiley in every message 
C. Don't follow the rules of netiquette  
D. Type in all caps when you are angry.  
 
12. Spamming is very poor Netiquette and means ____________________ 
A. Spilling the juice of meat-byproducts into your keyboard  
B. Sending in lines of nonsensical garbage in a chat conversation  
C. Posting or emailing unsolicited advertising messages to a wide audience.  
D. Posting a message that contains graphic descriptions of something really gross  
 
13. Knowledge and understanding of netiquette is useful because _________ 
A. It will help you create a positive impression on those you meet in cyberspace  
B. It explains the conventions already being used by millions of cybernauts  
C. It explains some of the technical limitations of online communications 
D. all of the above. 
 
14. You've been sent a virus warning, what should you do now?  
A. Ignore it.  
B. Forward it within your company.  
C. Forward it to everyone in your address book.  
D. Go to a security Web site to learn if it is a real virus.  
 
23
24

15. As a common courtesy, when in a chat room you should:  


A. Report disruptive users  
B. Introduce yourself when you enter a room  
C. Make it clear when you are directing a question or response to a specific user 
D. All of the above 
 
REFLECTION: (​ 5 minutes) 

​Base on the activity/ies conducted, complete the statement stated below: 


 
✔ I understand that 
________________________________________________________________________________________
_____________________________________________________________.  
 
✔ I realize that 
_________________________________________​_______________________________________________
_____________________________________________________________. 
 
Prepared by:  
 
 
RACHELLE DIESTA/JOHN FRANCIS OLIVO/MAY LAPASTORA    
Teacher, Empowerment Technologies    
 
 
Checked by: 
 
 
MAY LAPASTORA 
Subject Specialist, EMPOWERMENT 
 
 
ZENAIDA P. CRISTOBAL 
Academic Coordinator 
 
 
Noted by: 
 
 
ROSA T. TAYAMORA 
School Head 
 
-------------------------------------------------------------you—can---cut----from----here--------------------------------------------------------

24
25

25

You might also like