LAS - Empowerment Week 2.1
LAS - Empowerment Week 2.1
Activity 2
((Online Safety, Security, Ethics, and Etiquette)
After knowing the various ICTs that can improve our working productivity and efficiency, let us
learn the ethical con- duct and practices when using these ICTs.
This activity sheet covers the topics on the online safety, security, ethics and etiquette.
At the end of this module, the learners should be able to:
define netiquette and know the ethical issues and threats related to the use of computer and
online resources.
apply online safety, security, ethics, and etiquette standards and practices in ICT.
INSTRUCTIONS:
In doing this activity sheet, please follow these reminders:
1. Take the pretest, before working or answering this activity sheet
2. Perform the activities as suggested
3. Answer all exercises
4. Take the post test
Netiquette is short for " Internet Etiquette “. It simply means the use of good manners in online
communications such as e-mail, forums, blogs, and other social networking sites.
Netiquette is important as most online communication are non-verbal. You have to follow Internet
etiquette because there are other people such as your friends, relatives, elders who are using the Internet for
all online communications. Hence it is correct to be- have properly and write politely to everyone.
Online Safety
- Is the knowledge of maximizing the user's personal safety and security risks on private information
and property associated with using the internet, and the self-protection from computer crime in
general.
Internet Threats
- Are malicious programs that can target you when you're using the Internet. These threats include a
range of malicious software programs that are designed to infect victims' computers and facilitate
cybercrime.
3. Phishing
- Is a software or program used by hacker to obtain personal information like passwords and
credit card details. Example is Pharming which is a more complex version of phishing that
exploits the DNS system. Pharmers of- ten create web pages mimicking that of a trustworthy
business, such as an online banking log-in page. Users will then enter their details, thinking they
are logging in to their usual service, and their details will be stolen by the pharmer.
Another example of phishing is Wi-Fi Eavesdropping. It is another method
used by cyber criminals to capture personal information. This is done by virtual “listening in” on
information that's shared over an unsecured (not encrypted) Wi-Fi network.
4. Rogue Security Software
- If you are ever downloading antivirus or antispyware pro- grams, make sure you have purchased
it from a legitimate source. Rogue security software will often ask you to pay for extra protection,
which is a huge con. The security software is completely useless and criminals have robbed you
of your money.
Copyright Infringement
- Is a violation of an individual or organization's copyright. It describes
the unauthorized use of someone’s intellectual proper- ties or
copyrighted material, such as text, photos, videos, music, software,
and other original content for commercial purposes.
- If you create something—an idea, an invention, a form of literary work, or a research, you have the
right of how it should be used by others. This is called intellectual property.
Plagiarism
- Is presenting someone else’s work or ideas as your own, with or without their consent, by
incorporating it into your work without full acknowledgement.
Cyberbullying
- Refers to the act of cruelty committed using the Inter- net or any
form of electronic media or technology that has the effect of strip-
ping one’s dignity or causing reasonable fear or physical or
emotional harm. This usually occurs on online media platforms
such as social media and public websites.
A. Read and understand carefully the following statements. Identify which rule of netiquette has
been violated base on the Best 10 Rules of Netiquette given in this module. Write your answer on
the space provided.
1. Lando posted a rant post on Facebook because he did not receive financial assistance.
Answer:
2. John uses someone else’s photo as his profile picture on Instagram.
Answer:
3. Eric sends a chained message to his Facebook friends. Answer:
4. Nick loves to use shortcut words when chatting. Answer:
5. Respect others as you want to be respected online. Answer: _____
6. Hackers use malwares and other programs to get personal information of others.
Answer:
7. Downloading movies and sell it to others.
Answer:
8. Listening to other’s conversation.
Answer:
9. Messaging someone in all caps letter.
Answer:
10. Marco uses cracked software instead of buying the licensed one.
Answer:
B. Find and encircle all the words that are hidden in the grid. The words can be found in
any direction.
Hidden Words:
Netiquette Pharming
Malware Spyware
Cyberbullying Phishing
Security Password
Spamming Privacy
C. Complete the crossword puzzle by using the hints be- low.
Across:
2. short for Malicious Software
4. short for Internet Etiquette
6. owning someone else’s work or ideas
8. type of malware that disguised as a useful program
10. type of malware that can replicate itself once executed
Down:
1. keylogging
3. term used for personal insult communicated online
5. transmission of unsolicited messages
6. harassing someone online
9. mostly combination of numbers and letters
POST TEST!
Direction: Encircle the best answer for the following questions or statements.
1. What is the Golden Rule of Netiquette?
A. Treat others as you would like to be treated.
B. Use smiley in every message
C. Never flame a friend
D. Don’t use all caps
2. Spamming is very poor netiquette and it means
A. Sending in lines of nonsensical garbage in a chat conversation.
B. Posting a message that contains graphic descriptions of something really gross.
C. Spilling the juice of meat-byproducts into your keyboard.
D. Posting or emailing unsolicited advertising messages to a wide audience.
3. What is the importance of Netiquette?
A. It helps you create a positive impression on those you
meet in cyberspace.
B. It explains some of the technical limitations of online communications.
C. It explains the conventions already being used by millions of netizens.
D. All of the above.
4. Which of the following you should never give out on the Internet?
A. Your name C. Your address
B. Your age D. All of the above
5. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
6. What does Malware stands for?
A. Malfunctioned Hardware C. Malicious Welfare
B. Malicious Software D. Delicious Software
7. A software or program used by hacker to obtain personal in- formation.
A. Virus B. Worm C. Trojan D. Phishing
8. What makes a good password?
A. Easy for you to remember but difficult for others to figure out.
B. It is long and usually consist of your name.
C. Use the name of your favorite super hero character.
D. Just type 1234.
9. What do you do if you feel you are being cyber-bullied?
A. Tell a trusted adult like a parent or teacher.
B. Tell no one, it's embarrassing.
C. Just delete anything referring to you on the internet.
D. Call the police.
10. What does TOS stands for?
A. Terms of Service C. Terms of Security
B. Table of Specifications D. None of the above
11. Refers to the transmission of unsolicited messages.
A. Spamming C. Keylogging
B. Phishing D. Malware
12. This method is used by cyber criminals to capture personal information by virtual “listening in” on
information that's shared over an unsecured Wi-Fi network.
A. Pharming C. Wi-Fi Eavesdropping
B. Spamming D. Phishing
13. A more complex version of phishing that exploits the DNS system.
A. Pharming C. Wi-Fi Eavesdropping
B. Spamming D. Phishing
14. An act of harming or harassing a person via information
technology networks in a repeated and deliberate manner.
A. Copyright Infringement C. Cyberbullying
B. Flaming D. Phishing
15. The unauthorized use of someone’s intellectual property.
A. Copyrighting C. Copy-Paste
B. Copyright Infringement D. Patenting
“We don’t receive wisdom; we must discover it ourselves after a journey that no one can take for us or
spare us.”
-Marcel Proust
Prepared by:
JULIUS M. EMPUESTO
Subject Teacher