Unit 6
Unit 6
Unit 6 - Social, Ethical, and Legal Responsibilities in the Use of Technology Tools
and Resources
Submitted by:
Aguinaldo, Ana Marie U.
Batalla, Angel Trisha M.
Escartin, Dianne Faith Y.
Francisco, Floren Railey S.
Inocencio, Alice S.
Panganiban, Juliana Valerie A.
Roco, Mavie Joy G.
Santos, John Lloyd R.
Sebastian, Sheind S.
Tolentino, Lara Mikas C.
Submitted to:
Dianna S. Regalado, LPT
Date Submitted:
September 21, 2024
I. OBJECTIVES
A. identify the key terms connected to social, ethical and legal responsibilities in
technology;
B. encourage the sense of responsibility to promote positivity to the digital community
and advocating for inclusivity and fairness; and
C. apply ethical practice in using technology responsibly, respecting property and
ensuring privacy.
II. ACTIVITY
Instruction: We will form three groups from the class, and each group has three
representatives for the task entitled "organize the puzzle." The three representatives will
take turns organizing the puzzle to its original form. Each group of three will queue up
and solve the puzzle one by one until one group is complete. The team that finishes first
will receive a reward.
III. ANALYSIS
These days, we rely more and more on internet platforms for information seeking,
sharing, and searching. If we understand the proper responsibilities, policy, and laws of
having online platforms in our lives, then utilizing social media is not a problem or an
issue. It is true that technology greatly simplifies our lives, but we still need to
understand how to utilize it wisely for learning, living, and developing ourselves. We will
talk about and provide you with information on Social, Ethical, and Legal
Responsibilities in the Use of Technology Tools and Resources in this study. We will
also elaborate on the meaning of "Digital Netizens" by examining its nine components.
The Legal, Ethical, and Social Duties Associated with the Use of Technology by
Teachers on how using technology can help them impart knowledge to their students.
The last three are copyright law, copyright-related rights, and intellectual property rights
(IPR). This report will demonstrate how online resources and technology improve our
lives.
IV. ABSTRACTION
According to Tibble (2017), there are Nine (9) themes or elements in digital citizenship.
The Nine Elements of Digital Citizenship includes the following.
6. Digital Law (electronic responsibility for actions and deeds) – The digital
world is so huge that there should be order, discipline, and ethical use. This
focuses on the appropriate sharing and downloading of information and data
through digital resources. Examples of are issues on plagiarism, copyright, and
fair use.
The internet and technology has been part of our daily lives especially in this modern
times which all of us help by technology in everyday use and also in professional lives.
For educational purposes, it has been widely used in research, gathering data, and
learning lessons in various subjects.
There is no doubt that in this modern era, the internet plays a crucial role in our
education where everyone prefers searching on the internet on their queries and
problems and finding answers results in just seconds.
There are many benefits of the internet in the field of education. Some of these are:
The internet has been an advantage to all people over the world. So, it should be used
for a good purpose, especially to students, they have to use it with integrity since it has
had a great impact on imparting education to the children. If everyone uses the internet,
they can benefit and learn from it.
Since almost everyone has access now on the internet, even though the internet has
been a benefit and useful for everyone, we have to remember that it can also give
potential risk, threats, and danger if we use it improperly.
Here are some of the Internet safety rules to follow to help us avoid getting into trouble
online.
CYBERBULLYING
Cyber bullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or
online in social media, forums, or gaming where people can view, participate in, or
share content. Cyber bullying includes sending, posting, or sharing negative, harmful,
false, or mean content about someone else.
Technology can be a lot of fun but there are some risks and threats we should aware of,
cyber bullying is a form of bullying that takes place online it can happen anytime,
anyplace, anywhere and on any platform such as social media sites, messaging apps,
and even computer games it might start directly online or it might be a follow up form
offline bullying such as at school. Examples of cyber bullying include saying hurtful
things, spreading false rumors, leaving you out of things, humiliating your photos or
videos that make you feel bad of yourself or making you feel different and alone.
Someone who is being cyberbullied might start to think badly of themselves, sad,
nervous, lonely and they might lose confidence or have problems at school or with
friends. So, what should you do if you think you're being cyberbullied or if you know who
is? Cyber bullying is wrong, don't be afraid to talk to your parents, teachers or trusted
people, don't be afraid to ask for help.
These are the most common ones that are used to bully; social media is the first,
including Facebook, Instagram, and even Twitter. There are so many media that can be
used to spread information about you that will ruin your image. SMS is also used for
texting something; they can also use it for harassment. They even use email for
threatening or abusive messages. It's really cyberbullying that always happens on social
media, so it's hard for me to avoid it because you don't control people's minds; you don't
know what they can do to you.
With the prevalence of social media and digital forums, comments, photos, posts, and
content shared by individuals can often be viewed by strangers as well as
acquaintances. The content an individual shares online both their personal content as
well as any negative, mean, or hurtful content creates a kind of permanent public record
of their views, activities, and behavior. This public record can be thought of as an online
reputation, which may be accessible to schools, employers, college, clubs, and others
who may be researching an individual now or in the future. Cyberbullying can harm the
online reputations of everyone involved that just the person being bullied, but those
doing the bullying or participating in it. Cyberbullying has unique concerns in that it can
be:
Anything you post on the internet - which could be a comment or a picture, for example
- tends to be permanent. Even if you delete something, it's probably still out there
because other people may have copied or forwarded it. This means that bad stuff put on
the internet may stick around and haunt things like college applications or job searches
later.
Hard to notice - because teachers and parents may not be over here or see
cyberbullying taking place it is harder to recognize.
Actually, cyberbullying often happens through private messaging or online forums that
teachers and parents may not read. Because of this, it's much harder for adults to
detect and assist in the situation since it's not as obvious as bullying occurring within
their presence.
One of the main concerns and problems that is becoming more widespread worldwide
is cyberbullying. Whether you are a kid, a teenager, or an adult, bullying can affect you
at any time, anywhere, or even based on your life status. We'll talk about the causes of
cyberbullying in one's life in this report.
● Lack of Empathy
● Revenge
It is asking for retribution from someone who has wronged or mistreated you.
Cyberbullying may result from it because, when someone uses social media to exact
revenge, harass, or hurt other people, other users may believe that person is correct
before taking into account or learning about the perspective of the other victim.
● Peer Pressure
It describes how a member of a social group believes and abides by the expectations,
rules, and conduct of that group. When a social group wishes to accept someone into
their group after they have harassed them online in order to gain acceptance from their
peers, it can result in cyberbullying.
● Escapism
It refers to using emotionally charged hobbies as a means of escaping both real life and
personal concerns. Cyberbullying can result from the misuse of social media by
someone who expresses their concerns online and spreads negativity to make others
feel the same as them.
● Seeking entertainment
If someone did make fun of other people's life by insulting, harassing, and embarrassing
them, it might be the root of cyberbullying.
● Inadequate regulation
It pertains to being aware of the applicable laws, norms, and guidelines pertaining to the
internet. Because it creates a climate that encourages disrespect and wrongdoing in
people without additional penalties, it can result in cyberbullying.
Effects of Cyberbullying
● Emotional Distress
Cyberbullying victims deal with stress, worry, and sadness in their daily lives.
● Changes in behavior
Bullying causes the victims to become frustrated and more irritated.
● Loss of interest
Their previous interests in life begin to diminish. They don't feel motivated to follow their
habits through it.
● Suicidal thoughts
Similar to bullying, this effect is one of the most disturbing things that a victim always
considers as a way out of what they are going through.
NETIZENS IN CYBERSPACE
A. Cyber rights
Are rules to protect the people as they use the internet. These include privacy, freedom
of speech, and the right to access information. So, these rights help keep our online
world safe and free for us. We should all know and respect cyber rights. It's through
making these rules that we can build an easier online world for everybody and make it
even safer.
● Living
Cyber rights means being able to live online comfortably, where you can freely
express yourself and not be harassed or harmed. It also includes protecting the
personal information and privacy of individuals from cyber threats and attacks.
● Liberty
Extends to the entire sphere of freedom of expression and information, but it also
includes taking responsibility for how one exercises this liberty. The more time we
spend in the digital realm, it is mandatory for us to realize that our words and
actions have many repercussions on others.
● Pursuit of Happiness
The pursuit of happiness involves freedom to pursue personal interests and
passions without interference, allowing individuals to live a life that brings joy and
satisfaction, ensuring they can pursue happiness in a meaningful way.
Life, liberty, and the pursuit of happiness means to otherwise enjoy the internet free
from fear or discrimination, able to have activities of joy and fulfillment. This means the
ability to connect with others, learn from others and engage in online communities
without prejudice or discrimination against anyone.
B. Cyber Privilege
It is within her powers for the internet and technology to connect with people and
information effortlessly. Today's globalized and digitized society has made
communication easier, sharing of knowledge more effective, teaching faster, and taking
in new concepts less complicated because of this medium.
C. Cyber Responsibilities
The ability to access the internet is a privilege. Having technology that provides us
access to cellular networks and the internet is a privilege. Being able to communicate
freely and allowing everyone to express their views to one another is a privilege.
While it's true that everyone can express themselves freely in the modern world today,
they still have to take responsibility for their own actions and every decision they make.
As the saying goes, "Think before you click." People should understand that they are
accountable for whatever they publish, post, and remark on the internet since it is their
duty as online citizens to take responsibility for their actions when anything bad
happens.
Probably a better way to describe cyber citizenship is as civil behavior. There are
certain ways civilized human beings should behave toward others. They have to know
how to appreciate different points of view on the internet, be courteous in all they do,
and be sensitive to cultural diversity.
D. Laws
The most important area of respect we should demonstrate as a cyber citizen is for the
law. There are several legal issues related to online activity.
The first is intellectual property rights. This includes the written word, ideas and
products like music. The example of this is If you download music without paying for it,
you have violated the property rights of the artist.
R.A. 8293
An Act prescribing the Intellectual Property Code and establishing the Intellectual
Property Office, providing for its powers and functions, and for other purposes.
This act shall protect and secure the exclusive rights of scientists, inventors, artists and
other gifted citizens to their intellectual property and creations, particularly when
beneficial to the people, for such periods as provided in this Act.
E. Cyber Stalking
Cyberbullying, cyberstalking, and cyber harassment are other areas with legal
protections. A person's right to be free from harassment is violated when someone uses
electronic methods to threaten, harass, or intimidate them.
These things have been widely publicized in print and digital media alike. As these
things continue to spread, people suffer physically, intellectually, and emotionally.
Degrading others with hurtful remarks, abusing minors for undesirable activities, making
fake accounts or posters using other people's data and images—all of these things
spiral out of control when millions of people use the internet without understanding the
true purpose of it or their own actions.
Pornography also is regulated by law. Most other forms of pornography occupy a grey
area that is in part protected as free speech and in part whether it violates community
standards of decency. This basically indicates that it is unregulated or uncontrolled. A
more recent aspect of pornography is what has been called revenge porn. For people
over 18, a slimy former partner or, as likely, someone who has hacked your kid’s
account, may provide nude images to sites that solicit this kind of material. It can be
done without the consent of the person in the images.
Making a false web site under another person’s name and otherwise using their
personally identifying information is both a state crime that is punishable by law.
F. Cyber Crimes
• Copyright infringement
The legal term "copyright," often known as "author's right," refers to the ownership rights
that authors and artists have over their creative works. Books, music, paintings,
sculptures, films, computer programs, databases, ads, maps, and technical drawings
are among the works that fall under the scope of copyright protection.
Section 2. Declaration of State Policy. - It shall protect and secure the exclusive rights
of scientists, inventors, artists and other gifted citizens to their intellectual property and
creations, particularly when beneficial to the people, for such periods as provided in this
Act.
• Plagiarism
This, according to the Department of Justice, means that plagiarism itself is not a crime
but that plagiarism that also amounts to copyright infringement is. Such plagiarism now
carries a penalty of 3-6 years imprisonment and a fine of P50,000 - P150,000 ($1,200 -
$3,600), if prosecuted under the law.
This falls under the legislation of copyright infringement, which states that using or
downloading a song without paying for it constitutes a forbidden action and may be
considered a crime.
• Profiting from others’ creative efforts or products
This can also be considered copyright infringement if someone profits from another's
work or products. This can also result in the unauthorized use of someone else's
products and works in order to generate money or profit from it.
Bullying and harassment are daily challenges that people experience on social media.
People are becoming increasingly impolite and disrespectful when sharing their ideas
and perspectives online. That is why numerous individuals are suffering psychologically,
socially, physically, and emotionally as a result of what they read, see, and receive
online. Bullying and harassment carry legal consequences that are equivalent for
compensation and imprisonment.
Child pornography, in criminal law, any visual depiction of a minor (a person who has
not reached the age of consent) engaging in sexually explicit activity according to
Britannica.
● Photographs
● Videos
● Digital images or videos
● Undeveloped film
● Computer generated images indistinguishable from an actual minor
Child pornography is a severe problem that is only getting worse as the Philippines'
poverty rate rises. This has made the Philippines a global hub for live-streamed sexual
abuse of children. Child pornography is a severe subject that affects the lives of young
children who are incapable of making their own decisions. Some are forced by their
parents, while others do it out of poverty. People also use children's identities, images,
and videos to commit crimes and fulfill their own sexual wants.
The term sexting stands for a combination of sex and texting. Sexting is the act of
sending sexual text messages. It often also involves sending nude, seminude, or
suggestive photos. Sometimes, the messages also include sexual or explicit videos.
Sexting can happen via messaging on cell phones or other messaging services. It also
can happen through apps or direct messaging on social media sites.
Now that we live in the technological world that even minors have access to the internet
can be invasive and abusive as they don’t understand the consequences of their actions
until after they have done it.
• Internet stalking
Cyberstalking is the use of the internet and other technologies to harass or stalk
someone online. This online harassment, which is a kind of cyberbullying and in-person
stalking, can take the shape of e-mails, text messages, social media posts, and more,
and it is frequently methodical, purposeful, and persistent.
Even when the recipient shows displeasure or begs the offender to stop, the encounters
usually continue. The information intended toward the target is frequently unsuitable
and even frightening, leaving the person feeling afraid, distressed, apprehensive, and
worried.
Some indicators of cyberstalking include someone sending you too many messages,
sending you inappropriate messages, like all of your previous social media posts,
tricking you into communicating with them online, or trolling you. Cyberstalking
behaviors include online impersonality, GPS tracking, threatening communications,
catfishing, and doxing.
• Identity theft
Identity theft occurs when someone takes your identity and personal information (such
as your social security number) and uses it without your consent to open new accounts,
access existing accounts, or seek medical services. When an identity thief is
apprehended, he may even provide law enforcement agents with your name and
identity. This is the process of obtaining or using your personal information in order to
defraud others and engage in illicit activities for financial gain. This can happen to
anyone who has given their information to an untrustworthy source or through the
internet.
Identity theft has serious consequences for you and your family. It can harm your credit,
get you sued for debts you don't owe, add inaccurate and even harmful information to
your medical records, and potentially put you in prison. It happens when someone
steals your personal information and uses it without your knowledge to commit fraud or
other crimes. Identity theft can also ruin your reputation as it might create situations that
may endanger persons close to you.
G. Cyber Identity
There are a range of ways we can be identified and recognized online. It starts with
online names we use for various accounts as well as our online addresses (e.g., email,
texting number, social media accounts, etc.).
H. Cyber Foot-printing
Every time we go online to transmit anything over a cellular network, we live a trace of
that activity. This is known as a cyber footprint. Two types of cyber footprint: the first one
intentional; thing they have known posted or entered online. Footprint including things
like:
● Photo
● Video
● Texting
● Emails
● Tagged photos
● Social media account
I. Cyber Property
Anything that is posted online automatically becomes the copyright protected product of
the creator. This includes music, photos, videos and written material.
J. Relational Aggression
The internet and cellular networks can be used to express frustration, anger and cruelty
to other people. The most common form of relational aggression is represented by
insensitive comments, crude and awkward remarks or attempts at playful humor.
Here are ten (10) examples of rules to follow for good netiquette;
4. Show good sportsmanship when playing online games, whether you win or
lose - showing good sportsmanship builds a good enjoyable experience for both
players, whether they win or lose. We should congratulate the opponent and
accept the defeat wholeheartedly.
7. Don’t swear or use offensive language - It’s important for us not to swear or
use an offensive language when we communicate online that may offend and
distract other people. We should keep respectful and formality to maintain a good
interaction.
8. Avoid replying to negative comments with more negative comments. - We
should stop replying negative comments to other negative comments that may
lead to more conflict and create a toxic environment. Instead, make a positive
reply and promote respectful online communication in that way we can break a
cycle of negativity.
9. If someone asks question and you know the answer, offer to help - It’s
important to offer help when someone has a question or need. Don’t just ignore
and seen their chat. If we know the answer, let them know and offer help. By
doing this we can create a supportive community online and promote learning by
helping each other.
10. Thanks others who help you online - If someone provides you a helping hand,
always thank them, show that we appreciate their effort and time. In that way we
build a positive relationship and maintain good communication.
Knowing this netiquette is very important for the reason that we know how to properly
interact online with respect and effectively and may it also help to avoid
misunderstandings, or conflicts when communicating online. Understanding this
netiquette may lead to a more enjoyable and safe online experience for everyone.
Educational site is an online platform that provides users with access to different
resources including articles, instructional videos, quizzes, interactive activities, and
practice to support the learning and educational needs. With the advancement of
technology, educational websites have become popular and accessible, making it easier
for us to learn. Whether you are a student, teacher, or someone. Different websites will
help to expand your knowledge.
A survey of over 63,700 US undergraduate and 9,250 graduate students over this
course of three years (2002-2005) revealed the following:
Copyright
Copyright is the concept that original works such as writing, photo, and music belong to
the people who create them. It is the legal right given to the owner of the original work
or intellectual property and that you cannot use, copy, modify or publish that work
without permission. This is the example works that protected by copyright:
The internet is a very rich source of such material, and we should make proper use of
them. These works are protected by their creation, regardless of their form or mode of
creation as well as their content, quality, and purpose. Now that copy and paste are
highly accessible commands in our computer toolbars, we should try not to violate the
copyright laws otherwise we could be accused of copyright infringement.
Copyright infringement
These are the guidelines on online use of copyrighted materials by Smaldino, Lowther
and Russel (2012):
1. Contrary to popular opinion, all material on the internet is copyrighted unless stated
otherwise: It is copyrighted even if it does not display the copyright symbol.
- Many will believe it's free if it's on the internet, but that is not true. Almost all
content online is copyrighted, which means that even without a copyright symbol
or warning, it's not true. This means that the person who has made the content
picture, video and article automatically holds the legal rights to whatever is done
with it when made. Unless the creator says their work is to be free-for-all, like
through a public domain notice or a creative commons license, you need
permission from that creator to use it.
- An email is original writing and thus protected automatically, like all other written
work. Being a creation of the individual and in a fixed form, it is covered by
copyright laws. If the sender does not permit forwarding his or her email, this may
be a violation of the rights of the sender. Sending other people's emails without
their permission might also violate privacy since the original content might
include personal or sensitive information. Respect of copyright and private
information requires that people seek permission from others before sending
other's emails or forwarding to other people.
- This means that if you download an article from a newspaper’s website, you are
allowed to make copies and give them to your students for a class discussion, as
long as you follow the current rules about photocopying for educational use.
However, if the article is individually copyrighted, you may not be allowed to
make copies and distribute it to your students without permission. In those cases,
reproducing the material for classroom use would likely violate the copyright
laws. To distribute material of this nature legally you will need to acquire
permission and pay for permission to print.
4. You cannot post students’ essays, poems, or other works on the school websites
unless you have permission of the students and their parents or guardians.
- You cannot publish on the school's website students' essays or poems without
permission from both the students and their parents or guardians. These works
are covered by copyrights, being the student's unique creation, and only the
creator can decide how their work is accessed. Apart from this, posting a
student's work may also raise privacy issues. Request permission: Always seek
permission, both at copyright and privacy level, before uploading any form of
work by students online.
5. Educators should treat copyrighted materials from the internet the same way they do
print formats. The best guideline is to always obtain permission. When in doubt, ask!
- Internet materials must be used under the same copyright rule as printed
materials, books, articles or magazines. The best policy is always to ask
permission to use them. However, if you are not sure if something can be used or
shared, then one must ask permission. This way to avoid copyright issues while
using it legally and responsibly.
Plagiarism refers to using someone else’s words, ideas, or any work from another
person as your own without proper credit that can be done either on purpose or it can
be accidental. It is a serious academic dishonesty that may lead to serious
consequences.
1. copying media like images from other websites to paste them into your own
papers or websites.
2. Making a video using footage from other videos or using copyrighted music as a
part or soundtrack.
3. Composing a piece of music that borrows heavily from another composition.
In other words, copyright is a right to the original creators of work like books, music, or
art whereby such creative works are protected against unfair use or use without
permission. Copyright ensures that the owner's control over how his or her work will be
shared and used while in plagiarism is taking somebody else's work, ideas, words etc.
without giving the appropriate permission, and publishing them as their own. Plagiarism
is a matter of ethics and honesty in how others' work is used.
V. APPLICATION
Synthesis/Learning insights
This lesson highlights the importance of digital citizenship that focuses on how
responsible and ethical we are to use technology. The integration of technology in
education enhances our communication and accessibility of numerous resources from
the internet while practicing ethical behavior in cyberspace. This connection fosters the
learning environment where learners collaborate with their peers and at same time to
their teachers. Cyberbullying is the most common form of bullying that many people
encounter in digital space. As netizens, we should be vigilant in our actions and words
before we comment on certain posts of others. Understanding the cyber rights, laws,
and responsibilities attains a respectful online environment. Online etiquette and privacy
protection are important factors in the growth of virtual communities and the learning
process has been entirely transformed with the help of educational websites and
portals.
In addition, educational platforms such as EdX and Coursera are being used for our
learning and to access high-quality education for everyone. It highlights also the
leveraging of these digital tools responsibly, particularly in the context of intellectual
property rights (IPR) and copyright laws, which maintain academic integrity, through
this, we will have a respectful digital space. It also discussed how to address plagiarism
and copyright infringement, as well as the importance of proper citation to avoid
unethical behavior. In this way, we could create a digital environment that encourages
creativity and original work, ensuring that everyone benefits from it, without breaking or
violating any rules, but rather to do it with proper use in our future works.
Technology-Integrated Assessment
Quizizz link:
https://quizizz.com/join/quiz/66ec22f995da7a3583886aa6/start?studentShare=true
Reflection
In today's digital age, teachers are given great social, ethical, and legal responsibilities
as they use technology. These responsibilities are all grounded by the principles of
digital citizenship, which emphasizes respectful, ethical, and legal use of digital tools.
More significant in these elements of digital citizenship are digital rights, law, and
security. Teachers need to model proper online behavior, data privacy, and intellectual
property protection in creating a culture of responsibility.
1. Christian is planning to buy Christmas decorations for the upcoming Christmas. With
a limited budget and uncertainty about the quality of decorations and their prices, what
key aspect of digital citizenship should Christian focus on to make informed purchasing
decisions?
A. Digital Access
B. Digital Commerce
C. Digital Communication
D. Digital Security
3. While Ms. Castro is using her cellphone, she receives an email from an unknown
sender that asks her to click a link and enter her personal information. What key aspect
of digital citizenship should Ms. Castro prioritize to protect herself?
A. Digital Communication
B. Digital Etiquette
C. Digital Health and Wellness
D. Digital Security
4. Marco has been feeling tired and strained after long hours of studying and reviewing
for the upcoming midterm examination. She decided to rest for about an hour. What key
aspect of digital citizenship is he addressing?
A. Digital Etiquette
B. Digital Health and Wellness
C. Digital Rights and Responsibilities
D. Digital Security
5. Class presentation is the final requirement in the 1st semester in the art lesson of
Noah. During a class presentation, Noah’s classmates notice that he used images from
the internet without giving credit to the original creators. What aspect of digital
citizenship is he neglecting?
A. Digital Access
B. Digital Law
C. Digital Literacy
D. Digital Security
6. In an online class, Ms. Reyes encourages students to share their thoughts, ideas,
and insights freely, ensuring that their students’ opinions are respected and valued.
What aspect of digital citizenship is the teacher promoting?
A. Digital Communication
B. Digital Law
C. Digital Literacy
D. Digital Rights and Responsibilities
7. During a group project, Lorenz prefers to communicate with his teammates through
instant messaging rather than email. What key aspect of digital citizenship is she
utilizing to enhance collaboration with their classmates?
A. Digital Communication
B. Digital Etiquette
C. Digital Law
D. Digital Security
8. It is the basic rules of conduct that technology users should adhere to be responsible
online citizens, promoting appropriate behavior and ethical decision-making.
A. Digital Communication
B. Digital Etiquette
C. Digital Literacy
D. Digital Rights and Responsibilities
11. What is the importance of keeping on your privacy setting in your social media
accounts?
A. It will make your social media look professional by not posting random
information.
B. To hide from your social life such as friends and relatives
C. For better security and limit the people who can see and access your
personal information
D. To prevent social media friends to see what you post
15. Which of these is the most important rule to protect your personal data online?
A. By making all of your personal details available online
B. Posting pictures and videos of everyday happened
C. Limitations of engagements in social media
D. Limiting and being aware of social media access to your personal details
18. How do you think artificial intelligence (AI) will likely impact education in future?
A. It will replace teachers and other professional workers because of its abilities
B. It will be a powerful tool to help us in many meaningful ways
C. It will be possibly banned in the future because everyone will be scared of the
things it can do
D. It will be just be out of date in the future
19. What do you think is the potential negative consequences of excessive use of
internet in education
A. It will reduced social interaction and physical activity
B. Enhanced academic performance
C. Multiple data can be collected everywhere for free
D. It will foster students critical thinking
32. What is the sign that a victim has been harassed or bullied?
A. The victim is isolated from everyone around them.
B. Want to have engagement with their peers.
C. Have energy to do their homework or tasks.
D. Motivated to participate in the classroom discussion.
36. What are you going to do for others to be aware in the causes and effects of
cyberbullying?
A. Don't share the information that you have acquired.
B. Share your knowledge about the causes and effects of cyberbullying in the
use of online platforms.
C. Let them know the causes of cyberbullying by themselves.
D. Don't participate in the seminars regarding cyberbullying.
38. In the effects of cyberbullying, what are the disturbing things that victims might do?
A. Changes in sleep patterns
B. Self-esteem issues
C. Obsession with online activity
D. Suicidal Thoughts
51.This act shall protect and secure the exclusive rights of scientists, inventors, artists
and other gifted citizens to their intellectual property and creations, particularly when
beneficial to the people, for such periods as provided in this Act.
A. Republic Act 10627 The Anti-Bullying Act
B. Republic Act 7877 The Anti – Sexual Harassment Act
C. Republic Act 9775: Anti-Child Pornography Act of 2009
D. Republic Acts 8293 The Philippines law on Intellectual Property
52. Liza takes Cloe’s identity and personal information (such as your social security
number) and uses it without her best friend’s consent to open new accounts, access
existing accounts, or seek medical services. What kind od cyber crime did Liza did on
her best friend?
A. Abuse of Connection
B. Bullying and Harassment
C. Identity theft
D. Internet Stalking
54. The following are the three (3) Types of Intellectual Property Rights according to
“Kiteworks.com expect,
A. Exclusive Rights
B. Moral Rights
C. Personal Rights
D. Statutory Rights
55. According to the University of Oxford, it is “Presenting work or ideas from another
source as your own, with or without consent of the original author, by incorporating it
into your work without full acknowledgement.
A. Copyright infringement
B. Piracy
C. Plagiarism
D. Stealing
56. ________ can happen via messaging on cell phones or other messaging services. It
also can happen through apps or direct messaging on social media sites.
A. Bullying
B. Harassments
C. Pornography
D. Sexting
57. The legal term "copyright," often known as "_________," refers to the ownership
rights that authors and artists have over their creative works.
A. Author’s Right
B. Person’s Right
C. Individual’s Right
D. Freedom of Rights
58. The most important area of respect we should demonstrate as a cyber citizen is for
the _______.
A. Environment
B. Law
C. People
D. Technology
59. Your daughter Lylia violated a cyber crime against an artist, as a mother would you
tolerate Lylia’s actions even if you would benefit from it.
A. No, because I will kick her out of our house.
B. No, because she benefits from something that she did not work for.
C. Yes, because I will receive money from Lylia’s earnings.
D. Yes, because she is my daughter and I’m supposed to support her.
60. James wrote and created a song for their adviser on Teachers' Day and showed it to
Mathew, who was scheduled to perform during the event. Mathew then copied and
played his best friend's original song without permission from the owner, James. What
Mathew did was?
A. Bullying and harassment
B. Copyright infringement
C. Unforgivable
D. Crime
Alice Inocencio
61. Cyber identity there are a range of ways we can be identified and recognized online.
A. True
B. False
64. The internet and cellular networks can be used to express frustration, anger and
cruelty to other people.
A. True
B. False
68. Netizens in cyberspace have a right and privacy to protect their identities.
A. True
B. False
69. Using identities of the person is legal to use without any consent.
A. True
B. False
70. The cyber foot-print can be identified and recognized online. It can start on your
name and to get your addresses
A. True
B. False
71. It is a guideline that advises people on how to communicate and treat others when
interacting online
A. Ethics
B. Netiquette
C. Good communication
D. Online rules
72. Avoiding this kind of behavior online maintains a respectful and can create creative
environment
A. Don’t troll people in web forums or website comments by repeatedly nagging or
annoying them
B. Avoid replying to negative comments with more negative comments.
C. If someone asks question and you know the answer, offer to help
D. Avoid posting inflammatory or offensive comments online
73. Which of the following does the term “netiquette” refer to?
A. The laws about using technology
B. Skills that need to operate internet
C. Behavior and etiquette in online that should follow while communicating
online
D. The rules for correcting grammar
76. It is an online platform that provides users with access to different resources
including articles, instructional videos, quizzes, interactive activities, and practice to
support the learning and educational needs.
A. Technology
B. Educational site and portal
C. Website
D. Internet
77. Their mission is to provide free access to a world-class education for everyone.
Whether you are looking to explore a new topic or advance your knowledge.
A. Internet Archive: archive.org
B. Big Think: bigthink.com
C. Futures Channel: thefuturechannel.com
D. Academic Earth: academicearth.org
78. This platform is designed for high school students. It offers thousands of study
videos that are related to their subjects such as math, science, and English. It helps
students to understand complex topics easier.
A. Coursera: courser.org
B. EdX: edx.org
C. Brightstorm: brigthstorm.com
D. Internet Archive: archive.org:
79. The primary goal of this website is to connect students with real-world applications
of STEM (Science, Technology, Engineering, and Mathematics) . They provide a variety
of multimedia content like micro-documentaries and lesson plans to help educators to
engage students and how STEM is used in various careers.
A. Brightstorm: brigthstorm.com
B. Futures Channel: thefuturechannel.com
C. Coursera: courser.org
D. Internet Archive: archive.org
Sheind Sebastian
81. An Act prescribing the Intellectual Property Code and establishing the Intellectual
Property.
A. Republic Act 8392
B. Republic Act 9382
C. Republic Act 8293
D. Republic Act 9283
82. What percentage of graduate students reported paraphrasing or copying sentences
from written sources without footnoting?
A. 14%
B. 25%
C. 38%
D. 25%
84. What percentage of graduate students reported submitting work done by another
person as their own?
A. 3%
B. 7%
C. 2%
D. 4%
85. According to WIPO, intellectual property rights refer to creations of the mind. Which
of the following is NOT included in this definition?
A. Inventions
B. Literary works
C. Financial assets
D. Designs
86. Which organization is responsible for protecting intellectual property rights in the
Philippines?
A. Department of Education
B. Department of Trade and Industry
C. Intellectual Property Office of the Philippines (IPOPHIL)
D. World Intellectual Property Organization (WIPO)
89. What is the primary role of the Intellectual Property Office of the Philippines
(IPOPHIL)?
A. Provide legal counsel to students
B. Administer and implement state policies related to intellectual property
C. Conduct surveys on plagiarism
D. Monitor academic performance of students
90. This is the rights given to persons over the creations of their minds.
A. World Intellectual Property Organization
B. Intellectual Property Rights
C. Exclusive Rights
D. Digital Rights and Responsibilities
91. Which of the following statements is true about the use of online content?
A. Which of the following statements is true about the use of online content?
B. Incorporate internet content, but only if the copyright symbol is not present.
C. Most online content is copyrighted, even if there's no copyright symbol.
D. Content from education websites is automatically free to use.
96. The teacher wants to show copyrighted materials in class. What should she do?
A. Download and distribute any content online without charge
B. Comply with photocopied materials rules and obtain copyright owner
permission
C. Upload copyrighted materials on the school website
D. Do not use any online resources
98. You have copyrighted music in a video and do not have the creator's permission.
What is the consequence?
A. Automatically legal if it's personal use
B. It could be considered copyright infringement
C. Just must give credit to the artist in the video description
D. Doesn't count as a violation if it's edited
99. Which of the following is true about posting student work online?
A. Fine so long as posted on a school site. No permission necessary.
B. Posting the children's writing will only be okay if you have permission from
the students and their parents or guardians first.
C. Everything created by the kids falls into the public domain.
D. Fine if work is posted online but anonymously.
100. Which of the following statements is TRUE about copyright and internet materials?
A. All internet content is automatically allowed as long as it's for personal use.
B. You can freely use and share any online material without permission.
C. Internet materials are protected by copyright and require permission to
use.
D. Only materials that indicate copyright symbols are protected by copyright.
Book:
Technology for Teaching and Learning 1 by Bilbao et al., n.d.: From this
comprehensive book, a lot of our discussions use this book as our reference.
Website:
Alwin Asuncion, Lesson 7 Social Ethical and Legal Responsibilities in The Use of
Technology Tools and Resources,
https://www.scribd.com/document/501883213/Lesson-7-Social-Ethical-and-Legal-Respo
nsibilities-in-the-Use-of-Technology-Tools-and-Resources
We utilized this website to get information from a certain topic because it covers a lot
from our topic.
ANSWER KEY
1. Cyber Rights
2. Plagiarism
3. Educational Sites and Portal
4. Copyright
5. Child pornography
Evaluation 33. A 67. A
34. A 68. A
1. C 35. C 69. B
2. A 36. B 70. A
3. D 37. A 71. B
4. B 38. D 72. D
5. B 39. A 73. C
6. D 40. B 74. D
7. A 41. A 75. A
8. B 42. D 76. B
9. D 43. C 77. D
10. A 44. C 78. C
11. C 45. B 79. B
12. D 46. B 80. D
13. D 47. B 81. C
14. C 48. C 82. D
15. D 49. D 83. C
16. C 50. A 84. A
17. C 51. D 85. C
18. B 52. B 86. C
19. A 53. B 87. C
20. A 54. C 88. B
21. B 55. C 89. B
22. B 56. D 90. C
23. C 57. A 91. C
24. C 58. B 92. B
25. B 59. B 93. C
26. A 60. A 94. A
27. B 61. A 95. B
28. C 62. B 96. B
29. C 63. A 97. C
30. C 64. A 98. B
31. C 65. B 99. B
32. A 66. A 100. C
VIII. REFERENCES
Binar, M. (2024, July 25). Intellectual property: everything you need to know to protect it
from theft or misuse. Kiteworks | Your Private Content Network.
https://www.kiteworks.com/risk-compliance-glossary/intellectualproperty/#:~:text=
Consequences%20of%20Intellectual%20Property%20Infringement,punitive%20d
amages%2C%20and%20attorney's%20fees.
Bhattacharya, S., & Saha, C. (2011). Intellectual property rights: An overview and
implications in pharmaceutical industry. Journal of Advanced Pharmaceutical
Technology Amp Research, 2(2), 88. https://doi.org/10.4103/2231-4040.82952
Copyright. (n.d.).
https://www.wipo.int/copyright/en/#:~:text=Copyright%20(or%20author's%20right)
%20is,%2C%20maps%2C%20and%20technical%20drawings.
Indeed editorial team, (2024). What Is Netiquette? (With 10 Basic Rules To Follow) |
Indeed.com
Leighton, M. (2021). What Is edX and How Does It Work? We Break Down the FAQs.
(businessinsider.com)
Internet Archive, (2014). Internet Archive: Digital Library of Free & Borrowable Books,
Movies, Music & Wayback Machine
Coursera, (2024)
Coursera | Online Courses & Credentials From Top Educators. Join for Free
Purita B. Bilbao, EdD, Ma. Asuncion Christine V. Dequilla, PhD Technology for Teaching
and Learning 1: Intellectual Property Rights on the Development and Use of
Digital Materials
Zayed, A., MD. (2024, May 1). Cyberbullying and internet addiction: causes, signs, and
https://diamondrehabthailand.com/cyberbullying-and-internet-addiction/
YouTube.
https://www.youtube.com/watch?v=_QF0VNG6x0s