The document discusses a lesson on e-safety and responsible technology use. It includes a reflection on what was learned about protecting personal information and recognizing unethical online behaviors. It also contains a self-check quiz on e-safety topics like privacy, appropriate technology use, and risks of digital technologies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
90 views2 pages
Module 5
The document discusses a lesson on e-safety and responsible technology use. It includes a reflection on what was learned about protecting personal information and recognizing unethical online behaviors. It also contains a self-check quiz on e-safety topics like privacy, appropriate technology use, and risks of digital technologies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Module 5
Name: Kathleen B. Borja Course/Year: BTLED 1B Date: March 5, 2021
Task 1-Reflection
1. What have I learned?
This lesson was very timely, especially in this generation where technology was prominently used by everyone. Even kids under 3 years old can now have use internet and mobile phones. In this digital era, it is very important to understand and be aware of being safe online, and also being responsible in using technology. This topic, is a good example of teaching us how to be a responsible user of technology and how to become a digital literate person. In this topic, I learned a lot about e-safety rules. I understand the dangers of releasing personal information, as well as how to recognize unethical behaviors or prevent cyberbullying. I understand how important it is to be a responsible user of technology as well as implementing and executing the proper use of technology in the workplace. I’m now aware of the risks that technology can bring me if I didn’t follow these e-safety/online safety rules. 2. What I want to know more? I want to dig more about this different e-safety risk, how to forestall this issues and how to address this kind of hazard. I want to know how can we be truly safe online, because nowadays no matter how secure you are, online platforms are very vulnerable with our information’s. How can we avoid this things, without disconnecting from this platform? 3. What will I do with what I learned? The best thing for me to do, is to apply what I have learned and share this piece of information/advice to people, specially to my siblings. For them to be also aware about online safety and the proper use of technology. Because when will you apply it? It is better to prevent these things and be aware right now and safeguard themselves to avoid complications in the future, because we never know who’s out there. Technology is a useful servant but dangerous master.
Task 2- Self Check
Choose the correct answer from the options given
1. A friend would like to ask or your email password, because your email address was used for an urgent matter. As a rule in privacy, what action will you take? I. Voluntarily give my password to my friend. II. Deny the request of my friend even if it is urgent. III. Open my email by myself and print the email that is addressed to my friend.
A. I only C. III only
B. II only D. I, II and III only
2. Which of these is a mirror infraction in the use of technology?
A. Unauthorized taking of pictures or images with mobile phone camera B. Logging off when finished working C. Making sure that lighting is adequate D. Using anti-glare screen filters 3. Which is a risk in the use of ICT, thus a need to establish policies and rules for e-safety? I. Prolonged exposure to online technologies, particularly at an early age II. Cyberbullying in all forms III. Lifestyle websites like self-harms and suicides sites, and hate sites.
A. I only B. II only C. I, II and III
4. Which is NOT TRUE about e-safety in the use of digital technology? A. Restricts the use of digital technology B. Facilities better understanding how to use online facilities C. Protects young learners and adults from digital risks D. Helps users to understand the new technology 5. When working inside a computer laboratory, all of the choices EXCEPT one, is allowed. Which one is allowed?
A. Foods and drinks should be handy on the computer table
B. One external electrical outlet should have 5 computers connected C. Fire extinguishers should be made available D. Computer desks should be near each other to allow sharing of information.