0% found this document useful (0 votes)
58 views9 pages

LAS - Empowerment Week 2.1

LAS - Empowerment Week 2

Uploaded by

Jaw Use Empuesto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views9 pages

LAS - Empowerment Week 2.1

LAS - Empowerment Week 2

Uploaded by

Jaw Use Empuesto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

EMPOWERMENT TECHNOLOGIES

(for Grade 11 students)

Name of Learner: ______________________________________Grade Level: ____________________


Section: ______________________________________________Date: __________________________

Activity 2
((Online Safety, Security, Ethics, and Etiquette)

After knowing the various ICTs that can improve our working productivity and efficiency, let us
learn the ethical con- duct and practices when using these ICTs.
This activity sheet covers the topics on the online safety, security, ethics and etiquette.
At the end of this module, the learners should be able to:
 define netiquette and know the ethical issues and threats related to the use of computer and
online resources.
 apply online safety, security, ethics, and etiquette standards and practices in ICT.

Competency code: CS_ICT11/12-ICTPT-Ia-b-2

INSTRUCTIONS:
In doing this activity sheet, please follow these reminders:
1. Take the pretest, before working or answering this activity sheet
2. Perform the activities as suggested
3. Answer all exercises
4. Take the post test

References for learners:


 Empowerment Technologies Learner’s Material pp. 17 – 22
PRE-TEST!

Directions: Identify whether the statements are True of False.

_________1. Netiquette is the proper manners and behavior


online.
___________2. It is alright to use all caps when chatting.
___________3. All personal information is good to put on a social
networking website because it enhances your
experience on the site.
___________4. The internet is secure.
___________5. Cyberbullying is a crime
___________6. It is alright to use someone’s photo as your profile
picture on social networking sites.
___________7. Always use your real name on social network- ing
sites.
___________8. Love bug is a virus.
___________9. Update your antivirus once a month.
___________10. Phishing is the term use to catch fish online.
___________11. Using your birthdate as your password is good.
___________12. Always think before you click.
___________13. It is alright to share your password with your
classmate.
___________14. Always open emails from someone you don’t
know.
___________15. Scanning someone’s flash drive before using
is a good practice.
STUDY TIME!

Netiquette is short for " Internet Etiquette “. It simply means the use of good manners in online
communications such as e-mail, forums, blogs, and other social networking sites.
Netiquette is important as most online communication are non-verbal. You have to follow Internet
etiquette because there are other people such as your friends, relatives, elders who are using the Internet for
all online communications. Hence it is correct to be- have properly and write politely to everyone.

10 Best Rules of Netiquette


1. The Golden Rule - Treat others as you would like to be treated.
2. No Flaming - Flame is a personal insult communicated through the internet.
3. Don’t type in ALL CAPS - People may misinterpret it like you’re
yelling or raising your voice.
4. Don’t SPAM - Do not send any unsolicited emails.
5. Respect Privacy - Respect others' privacy by not sharing personal information, photos, or videos without
their permission.
6. Obey Copyright Laws - Do not steal someone else’s idea,
property and rights.
7. Use Proper Grammar & Spelling - Don’t use shortcut words like “jejemon words”; Errors diminishes the
credibility of the message.
8. Be Honest / Be Yourself - Tell the truth, do not pretend to be
someone.
9. Follow the TOS (Terms of Service) - Rules & Policies of the sites.
10. Always Say Thank you - Always thank others who help you online.

Online Safety
- Is the knowledge of maximizing the user's personal safety and security risks on private information
and property associated with using the internet, and the self-protection from computer crime in
general.

Internet Threats
- Are malicious programs that can target you when you're using the Internet. These threats include a
range of malicious software programs that are designed to infect victims' computers and facilitate
cybercrime.

Common Internet Threats:


1. Malware
- stands for Malicious Software
- is a set of instructions that runs on your computer and make your systems do something that an
attacker wants it to do like stealing personal information, deleting files and stealing software
serial number.
Types of Malware:
A. Virus - a type of malware that, when executed, it replicates itself by modifying other computer
programs and inserting its own code.
B. Worm - a malicious program that transfers from one computer to another by any type of
means. It uses computer network to spread itself.
C. Trojan - a malicious program that disguised as a useful program but once downloaded or
installed, it leaves your PC unprotected and allows hackers to get your information.
D. Spyware - a program that runs in the background without your knowledge. It has the ability to
monitor what you are currently doing and typing through keylogging.
E. Adware - is a type of malware software that displays unwanted ads when a user is surfing
the internet. Ex. Pop-up advertisement
2. Spam
- refers to the transmission of unsolicited messages from various origins using electric messaging
systems/ email systems.

3. Phishing
- Is a software or program used by hacker to obtain personal information like passwords and
credit card details. Example is Pharming which is a more complex version of phishing that
exploits the DNS system. Pharmers of- ten create web pages mimicking that of a trustworthy
business, such as an online banking log-in page. Users will then enter their details, thinking they
are logging in to their usual service, and their details will be stolen by the pharmer.
Another example of phishing is Wi-Fi Eavesdropping. It is another method
used by cyber criminals to capture personal information. This is done by virtual “listening in” on
information that's shared over an unsecured (not encrypted) Wi-Fi network.
4. Rogue Security Software
- If you are ever downloading antivirus or antispyware pro- grams, make sure you have purchased
it from a legitimate source. Rogue security software will often ask you to pay for extra protection,
which is a huge con. The security software is completely useless and criminals have robbed you
of your money.

Copyright Infringement
- Is a violation of an individual or organization's copyright. It describes
the unauthorized use of someone’s intellectual proper- ties or
copyrighted material, such as text, photos, videos, music, software,
and other original content for commercial purposes.
- If you create something—an idea, an invention, a form of literary work, or a research, you have the
right of how it should be used by others. This is called intellectual property.

Plagiarism
- Is presenting someone else’s work or ideas as your own, with or without their consent, by
incorporating it into your work without full acknowledgement.

Cyberbullying
- Refers to the act of cruelty committed using the Inter- net or any
form of electronic media or technology that has the effect of strip-
ping one’s dignity or causing reasonable fear or physical or
emotional harm. This usually occurs on online media platforms
such as social media and public websites.

Ten (10) Tips to Stay Safe

1. Create Complex Passwords. Use strong & unique


password.
2. Boost Your Network Security. When at home or work, use a password-protected router that
encrypts your data. If you’re using public wi-fi make sure you’re using Virtual Private Network
(VPN).
3. Use a Firewall. Is an electronic barrier that blocks unauthorized access to your computers and
devices.
4. Click Smart. “Think Before You Click.” Always be cautious in clicking links, downloading and
opening suspicious files.
5. Be a Selective Sharer. Don’t just share your personal information to anybody online or to any
websites unless you trust them.
6. Keep Your Privacy Settings On. Marketers love to know all about you, and so do
hackers.
7. Practice Safe Surfing & Shopping. When shopping online or visiting websites for online
banking or other sensitive transactions, always make sure that the sites are secured and legit.
8. Keep up to date. Keep all your software updated so you have the latest security patches
specially your anti- virus.
9. Lookout for the latest scams. Online threats are evolving all the time, so make sure you know
what to look out for.
10. Keep your guard up. Always be cautious about which sites you visit, what you do online and
specially to whom you are chatting with since we really don’t know who's in the other side.
PRACTICE TIME!

A. Read and understand carefully the following statements. Identify which rule of netiquette has
been violated base on the Best 10 Rules of Netiquette given in this module. Write your answer on
the space provided.

1. Lando posted a rant post on Facebook because he did not receive financial assistance.
Answer:
2. John uses someone else’s photo as his profile picture on Instagram.
Answer:
3. Eric sends a chained message to his Facebook friends. Answer:
4. Nick loves to use shortcut words when chatting. Answer:
5. Respect others as you want to be respected online. Answer: _____
6. Hackers use malwares and other programs to get personal information of others.
Answer:
7. Downloading movies and sell it to others.
Answer:
8. Listening to other’s conversation.
Answer:
9. Messaging someone in all caps letter.
Answer:
10. Marco uses cracked software instead of buying the licensed one.
Answer:

B. Find and encircle all the words that are hidden in the grid. The words can be found in
any direction.

Hidden Words:

Netiquette Pharming
Malware Spyware
Cyberbullying Phishing
Security Password
Spamming Privacy
C. Complete the crossword puzzle by using the hints be- low.

Across:
2. short for Malicious Software
4. short for Internet Etiquette
6. owning someone else’s work or ideas
8. type of malware that disguised as a useful program
10. type of malware that can replicate itself once executed

Down:
1. keylogging
3. term used for personal insult communicated online
5. transmission of unsolicited messages
6. harassing someone online
9. mostly combination of numbers and letters

POST TEST!
Direction: Encircle the best answer for the following questions or statements.
1. What is the Golden Rule of Netiquette?
A. Treat others as you would like to be treated.
B. Use smiley in every message
C. Never flame a friend
D. Don’t use all caps
2. Spamming is very poor netiquette and it means
A. Sending in lines of nonsensical garbage in a chat conversation.
B. Posting a message that contains graphic descriptions of something really gross.
C. Spilling the juice of meat-byproducts into your keyboard.
D. Posting or emailing unsolicited advertising messages to a wide audience.
3. What is the importance of Netiquette?
A. It helps you create a positive impression on those you
meet in cyberspace.
B. It explains some of the technical limitations of online communications.
C. It explains the conventions already being used by millions of netizens.
D. All of the above.
4. Which of the following you should never give out on the Internet?
A. Your name C. Your address
B. Your age D. All of the above
5. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
6. What does Malware stands for?
A. Malfunctioned Hardware C. Malicious Welfare
B. Malicious Software D. Delicious Software
7. A software or program used by hacker to obtain personal in- formation.
A. Virus B. Worm C. Trojan D. Phishing
8. What makes a good password?
A. Easy for you to remember but difficult for others to figure out.
B. It is long and usually consist of your name.
C. Use the name of your favorite super hero character.
D. Just type 1234.
9. What do you do if you feel you are being cyber-bullied?
A. Tell a trusted adult like a parent or teacher.
B. Tell no one, it's embarrassing.
C. Just delete anything referring to you on the internet.
D. Call the police.
10. What does TOS stands for?
A. Terms of Service C. Terms of Security
B. Table of Specifications D. None of the above
11. Refers to the transmission of unsolicited messages.
A. Spamming C. Keylogging
B. Phishing D. Malware
12. This method is used by cyber criminals to capture personal information by virtual “listening in” on
information that's shared over an unsecured Wi-Fi network.
A. Pharming C. Wi-Fi Eavesdropping
B. Spamming D. Phishing
13. A more complex version of phishing that exploits the DNS system.
A. Pharming C. Wi-Fi Eavesdropping
B. Spamming D. Phishing
14. An act of harming or harassing a person via information
technology networks in a repeated and deliberate manner.
A. Copyright Infringement C. Cyberbullying
B. Flaming D. Phishing
15. The unauthorized use of someone’s intellectual property.
A. Copyrighting C. Copy-Paste
B. Copyright Infringement D. Patenting

“We don’t receive wisdom; we must discover it ourselves after a journey that no one can take for us or
spare us.”
-Marcel Proust

STAY AT HOME. WASH YOUR HANDS. MAINTAIN PHYSICAL DISTANCING.

Prepared by:
JULIUS M. EMPUESTO
Subject Teacher

You might also like