0% found this document useful (0 votes)
45 views4 pages

Chapter 1 Lesson 2 Activity

The document is a student submission form that includes questions about online privacy and safety. It asks the student to answer questions about enabling private browsing, using strong passwords, keeping devices updated, and protecting younger siblings online. It also asks for advice on acting responsibly in digital relationships. Additional sections provide online safety trivia and have the student survey their family about their knowledge of terms like aggregators, avatars, blogs, and more. The student finds that most family members are unfamiliar with the terms while siblings have some knowledge.

Uploaded by

gugu ichinose
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views4 pages

Chapter 1 Lesson 2 Activity

The document is a student submission form that includes questions about online privacy and safety. It asks the student to answer questions about enabling private browsing, using strong passwords, keeping devices updated, and protecting younger siblings online. It also asks for advice on acting responsibly in digital relationships. Additional sections provide online safety trivia and have the student survey their family about their knowledge of terms like aggregators, avatars, blogs, and more. The student finds that most family members are unfamiliar with the terms while siblings have some knowledge.

Uploaded by

gugu ichinose
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Submit this page

Name: Al-Quin H. Juljani__________________ Section: 11 – STEM Abdul______________


Subject: ETech: ICT for Professional Tracks Date Submitted: ___________________
Teacher: Mr. Jerry James C. Deran

See if you can do this

ACTIVITY 1. Answer the following questions. (2pts. Each)

1. What can we do for us not to become victims of privacy violations?


Turn on private browsing
- If you don’t want anyone with physical access to your computer to see where
you’re hanging out online you should enable “private browsing,” a setting
available in each major web browser. It deletes cookies, temporary Internet files
and browsing history after you close the window.
Don’t fill out your social media profile.
- The more information you share online, the easier it’s going to be for someone to
get their hands on it. Don’t cooperate.

2. Cite five (5) safety practices to make sure you are safe online?
Make sure your devices are up to date.
Use strong passwords.
Don't open mail from strangers.
Don't click on strange-looking links.
Avoid using unsecured public Wi-Fi.
3. What are the things that you can do to protect your younger siblings from the worst
aspects of online safety?
Teach them to keep private info private, take advantage of your browser's parental
control and educate children on the risks of Social Media
4. What are the best banking practice stated by the rough guide to online safety?
Avoid saving your login information
Use strong passwords and change them often
Use two-factor authentication whenever possible.
Keep your computer updated

1
ACTIVITY 2. What are the advices that you may give to students like you on how to act responsibly
when carrying out relationships over digital media? (5pts.)

Advices that I can give to students like me on how to act responsibly


when carrying out relationships over digital media is do not always
open mail from strangers, click on strange-looking links and be choosy
about sharing your social security number even the last 4 digits.

2
Additional information

TRIVIA

1. Aggregator is a website or Web application where headlines and other content are collected
for easy viewing. Aggregators such as Google News compile news articles and posts.

2. An avatar is a two- or three-dimensional icon that represents a computer user or a gamer.


Avatar can be a cartoonish graphic, a photograph, a screen name, or a fully developed
character.

3. Blog, from the term “weblog”, is a type of website usually updated by an individual or a group
of bloggers. Some blogs provide news or opinions on a specific subject, while others are
more like online journals. Most blogs allow readers to leave comments on blog posts.

4. Flaming is the act of saying mean things online, usually in ALL CAPS, and often in a public
forum with the intention to humiliate. Flame wars can occur easily online, as it can be difficult
to figure out people’s intentions or emotions online.

5. Mash-up is a remix or blend of multiple songs, videos, or other media content into one
product. Fan fiction writing is one form of a mash-up, as writers take characters from a well-
known video game, movie, or book, and rewrite their actions or relationships.

6. Massively multiplayer online game (MMOG) is usually an online virtual world that multiple
players navigate and play in together. While in this virtual world, their avatars chat, cooperate,
and quest together, oftentimes towards a goal.

7. P2P, or Peer-to-Peer, network allows for sharing of mp3s, videos, and other digital files by
transferring information directly between two computers rather than by going through a central
server. P2P technology is also behind the popular Internet phone service Skype.

8. Phishing is the illegal act of sending emails or messages that appear to come from authentic
sources, but really come from spammers. Phishers often try to get people to send them their
personal information, everything from account numbers to passwords.

9. Podcast is a downloadable video or audio file. Podcasts can be verbal, based on a certain
topic, or can include music, video, and commentary. Most podcasts are updated regularly
through the addition of new episodes.

10. Short Message Service (SMS), or text message, is a short message of fewer than 160
characters sent from a cell phone. A Multimedia Messaging Service (MMS) is a text message
that contains an attached multimedia file, such as a picture or song.

Source: Department of Education. Empowerment Technologies Student Reader First


Edition. Pasig City: Department of Education-Bureau of Learning Resources, 2016.

3
Based on the trivia that you have read, do a survey to know how much members of your
household know about these media that are enabled by digital tools. Use the table below. (10 pts.)

Do you know what is….? ANSWERS


Grandparen Father Mother Sibling 1 Sibling 2 Sibling 3
t
1. aggregator? No No No No No No
2. avatar? No No No Yes Yes Yes
3. blog? No No No Yes Yes Yes
4. flaming? No No No Yes Yes Yes
5. mash-up? No No No Yes Yes Yes
6. MMOG? No No No No Yes Yes
7. P2P? No No No Yes Yes Yes
8. phishing? No No No No No No
9. podcast? No No No Yes Yes Yes
10. SMS? No Yes Yes Yes Yes Yes

Do you know more than most of them? Not really______________________________________

What does the result of the survey tells you?


To learn what is about these media that are enabled by digital tools
________________________________________________

What do you feel about it? Does this have to change? Why?
I don’t know what I feel, to be honest, No, because you do not even need to change it

You might also like