SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
Empowerment Technologies
Quarter 3 – Module 2:
Online Safety, Security, and
Netiquette
Empowerment Technologies – Grade 11
Quarter 3 – Module 2: Online Safety, Security, and Netiquette
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
Published by the Department of Education
Printed in the Philippines by Davao City Division Learning Resources Management
Development System (LRMDS)
Department of Education – Region XI
Office Address: Davao City Division, Region XI
Elpidio Quirino Ave., Poblacion District, Davao City, 8000 Davao del
Sur
Telefax: (082) 224-3274, (082) 222-1672
E-mail Address: davao.city@deped.gov.ph
Development Team of the Module
Writers: Melanio R. Florino Jr.
Editors:
Reviewers: Divilyn M. Rodriguez
Illustrator:
Layout Artist: Melanio R. Florino, Jr.
Template Developer: Neil Edward D. Diaz
Management Team: Reynaldo M. Guillena
Jinky B. Firman
Marilyn V. Deduyo,
Alma C. Cifra
May Ann M. Jumuad
Aris B. Juanillo
Empowerment Technologies
Quarter 3 – Module 2:
Online Safety, Security, and
Netiquette
ii
Introductory Message
For the facilitator:
As a facilitator, you are expected to orient the learners on how to
use this module. You also need to keep track of the learners' progress
while allowing them to manage their own learning at home.
Furthermore, you are expected to encourage and assist the learners as
they do the tasks included in the module.
For the learner:
As a learner, you must learn to become responsible of your own
learning. Take time to read, understand, and perform the different
activities in the module.
As you go through the different activities of this module be
reminded of the following:
1. Use the module with care. Do not put unnecessary mark/s on
any part of the module. Use a separate sheet of paper in
answering the exercises.
2. Don‟t forget to answer Let Us Try before moving on to the other
activities.
3. Read the instructions carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking
your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are
done.
If you encounter any difficulty in answering the tasks in this module,
do not hesitate to consult your teacher or facilitator. Always bear in
mind that you are not alone. We hope that through this material, you
will experience meaningful learning and gain deep understanding of
the relevant competencies. You can do it!
1
Let Us Learn!
Privacy, security, and good behavior online are essential words that
you have to follow when you are on the Internet. Do you know your
restrictions when using social media? Do you feel accountable for what you
are posting? Do you think first before you click? Let us find out!
This module was designed and written for you, our learners. It will help
you become aware of the behavior you are going to observe following online
safety, security, and netiquette.
At the end of this module, you will be able to:
 apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific
professional tracks (CS_ICT11/12-ICTPT-IA-B-2).
Let Us Try!
Directions: A. Write TRUE if the statement is correct, FALSE if the
statement is incorrect.
1. Writing an email in all capital letters means that you are smiling at the
other person.
2. It is okay to forward an email that someone has sent you.
3. It is okay to scroll the screen in a chat room.
4. It is okay to give out your address to strangers.
5. A flame is an online chain letter.
B. Write the letter that best describes your answer.
6. The abbreviation “brb” means:
a. Be right back b. Better run, bye! c. Boring, really boring
7. What does the term netiquette mean?
a. Nice etiquette b. Network Etiquette c. Nighttime Etiquette
8. What does “spam” mean?
a. Dripping raw meat juice on the keyboard.
b. Emailing or posting advertisements online to a bunch of people.
c. Emailing a chain letter to a bunch of people.
9. What should you do before posting a message to a chat room?
a. Read the chat room rules or FAQs.
b. Read some of the postings to see what people are chatting about and
whether or not it is interesting to you.
c. Both
10. The “golden rule” of netiquette is:
a. Never flame a friend.
2
b. Remember the human (treat others as you wish to be treated).
c. Never send a chain letter.
Let Us Study
Online Safety, Security, and Netiquette
With the country‟s biggest network data offerings for every
smartphone holder, online safety is one of the concerns most parents want
their children to remember these days. Every day, flash reports show
number of victims of malicious conduct like bullying, identity thief,
automatic teller machine fraud, online selling scam, face or body
manipulation to earn money and the worst is rape of victims of meet ups.
The infographic
at the right explains
why there is a need to
protect Philippine users
from online cyber
predators.
Why is it
important to stay safe
online? Most of us are
„connected‟ via our
laptops, mobile phones,
tablets, or personal
computer. The potential
for the internet to be a
valuable and a fun
resource for
entertainment, making
friends, keeping in
touch and learning is
huge. But if you use
the internet, you could
be at risk of illegal
activities or abuse - be
it bullying, fraud or
something more
serious. Unlike seeing someone face to face, on the net, people aren't always
what they first seem. In the same way you learn about safety when you leave
the house, it is important to learn how to stay safe online.
Photo credits:
https://www.pinterest.ph/pin/71987294014535665/
3
Some precautions on sharing personal information online:
Type of Information Risks
First name
There is still a risk in sharing your first
name. Chances are, a hacker already knows
plenty of stuff about you even if you only
give out your name. You cannot just walk in
a room and start introducing yourself to
everyone. You now know whom you can
come across with.
Last name
If sharing your name is a small risk, having
both your first and last is riskier. You will
be vulnerable to being searched for using
searched engine, which will include image
search. Matching a name with a face can
lead to several cybercrimes like identity
theft.
Middle name
Sharing just your middle name is probably
not the risky most risky of this shared
information, but sharing your entire name
would be.
Current and previous school(s)
Most people who steal identities study their
subject. They can use this information for
verification purposes.
Your Cellphone Number
Your cellphone number should never be
posted over the Internet. The Internet is a
public place. It is the same as posting your
name on a billboard.
Who your Mother and Father are
Risky, yet not as risky as posting their full
names, especially your mother‟s maiden
name. In fact, if you have already
encountered many websites that require
your mother‟s maiden name as an answer to
a secret question whenever you lose your
password.
Who your siblings are This is a huge risk, especially if you have
younger siblings. Stranger may pretend or
use their identity to dupe you.
Your address Hopefully you answered no to this one.
Giving the Internet your number is one
thing, giving your address is a whole other
level. It would be much easier for criminals
to find you.
Your home phone number
This shared information is riskier than
sharing your personal phone number.
Scams usually use this information to
deceive you, one of which is when a stranger
pretends to know your parents or pretends
to be you.
Your birthday
Letting people know your birthday is
probably a must if you want to get as many
gifts as possible. But having it in your profile
makes you vulnerable to identity theft.
Source: Empowerment Technologies First Edition.(2016).Sampaloc Manila:Rex
Bookstore, Inc
4
There are numerous delinquencies that can be committed on the
internet such as stalking, identity theft, privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
1. Never give any personal information out about yourself over the
internet.
2. Do not give any bank or sensitive information unless you are sure
that it is a reputable business having a secure service.
3. To make sure that you are in a secured network, the website
address should begin with “https://’ as opposed to “http://”. Never
access your accounts by following an email link, instead type your
URL by yourself.
Below are some ways to find if the website you are opening is legit.
Here are some ways you can check
if a website is trustworthy
Reliable websites Unreliable websites
Usually end in .edu or .gov Might end in .com
Don‟t have errors Have errors
Are up to date Are outdated
Use facts Use opinions
Use experts Use unreliable sources
Source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate
Online Security
The standard definition of online security calls it the mix of rules that
are followed and actions that are taken to make sure online user data and
privacy aren‟t compromised by cybercriminals. Online security can be
something as complex as a system that‟s designed to prevent credit card
theft, or something as simple as you using antivirus software to protect your
device from malware and viruses.
When you are online, treat the Internet a public place and it is up to
you to protect yourself.
Here are some tips to help you stay safe when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By
keeping your profile private, search engines will not be able to scan
your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito
(or private) mode will NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face.
7. Never post anything about a future vacation. It is similar to posting,
“Rob my house at this date.”
5
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update antivirus software on your computer. Use only
one antivirus software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a
password.
12. Avoid downloading anything from untrusted websites.
13. Do not use pirated software.
14. Do not reply or click links from suspicious emails.
15. Make online purchases from secured sites
Netiquette is a combination of the words network and etiquette. It is a set
of rules for behaving properly online.
Below are the 10 rules of netiquette:
The Core Rules of Netiquette
The Core Rules of Netiquette are excerpted from the book Netiquette by
Virginia Shea
1: Remember the Human Rule.
2: Adhere to the same standards of behavior online that you follow in real
life.
3: Know where you are in cyberspace.
4: Respect other people's time and bandwidth.
5: Make yourself look good online.
6: Share expert knowledge.
7: Help keep flame wars under control.
8: Respect other people's privacy.
9: Don't abuse your power.
10: Be forgiving of other people's mistakes.
Source: http://www.albion.com/netiquette/corerules.html
Let Us Practice
Directions: Find out if you have understood the lesson. Choose the letter
that best describes your answer.
1. You are all going for a field trip and none would be left in the house. What
should you do?
A. Post pictures when you return home.
B. Post the dates when you will be going online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
6
2. Should you have the same password in all your digital transactions?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don‟t have any passwords.
D. I have two similar passwords that I alternately use for all me
accounts.
3. Choose which best describes how you feel about sharing your
password with your boyfriend/ girlfriend?
A. Forget about it.
B. I‟ll share if he/she will.
C. BFFs share everything.
D. I don‟t believe in passwords.
4. Your parents bought you your first cellphone. How will you share your
cellphone number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only to your family.
D. Post your cellphone number in your group chat.
5. Your social media friends list should only be composed of ______________.
A. your favorite brands
B. family and friends
C. anyone who sends you a friend request
D. foreigners
Let Us Practice More
Directions: Measure your understanding by answering the following
questions. Choose the letter that best describes your answer.
1. Which of the following is not an advantage in using social media network?
a. crime against children b. worldwide connectivity
c. real time information sharing d. sharing political beliefs
2. Below are disadvantages of using social media network, except-
a. time waster b. risk of fraud
c. identity theft d. increase new circle of friends
3. Personal details when revealed in the Internet is -
a. an advantage. b. a disadvantage.
4. What should you do in case on cyberbullying?
a. Respond to the bully and fight back if necessary.
b. Block the cyberbully from the contact list and talk to a trusted
adult.
c. Wait in silence until things get better.
7
5. Someone is behaving inappropriately on one of the sites you‟re using. You
should-
a. Report to the moderator of the site.
b. Shut down your pc.
c. Tell the person to shut up.
Let Us Remember
 When you are online or using the Internet, keep in mind that the
whole world is looking at you. People or netizens as what we call those
persons present online, are there to react or participate positively or
negatively. Some of these netizens behave the way you treat them.
 Your words or moving animation are enough for them to cause
actions. While many believe the law “do not do unto others what you
do not like them do unto you”, it is safe to follow what is “safe” and
proper manner even if you are not facing these netizens in real time.
 Like begets like and it would be nice to stand up after doing stuff
online without harming others.
Let Us Assess
Directions: Apply what you have learned about online safety,
security, and netiquette. Choose the letter that best describes your
answer.
1. Which of the following is NOT a way of evaluating information found
online?
a. Looking at the brand name….is it a trusted brand?
b. Making sure the source is a governmental agency.
c. Checking the website‟s internal information.
d. Comparing the information with the same information from an
established media company or with original source of material.
2. What is your habit when it comes to newspaper and current events
online?
a. I pay attention to news when there is a juicy story that grabs my
interest.
b. I avoid mainstream/dominant news media.
c. I try to read news everyday relying on media I trust and respect.
d. I should pay more attention to the news but I do not have time.
Give your best answer (1 point each)
4. Why is netiquette useful?
5. When is it okay to email a chain letter?
6. What should you do if someone sends you a “hate message”?
8
7. What should you do if an online friend asks to meet you after school?
8. Why is punctuation so important on the Internet?
Let Us Enhance
Poster making. Your parents want you to make a poster about
online safety, security, and netiquette since you have knowledge on
this. Your parents want that this poster would remind your younger siblings
on what to do when they are using the Internet. Use an A4 size paper for
your poster. Below is the rubric in making the poster.
Source: eworkshop.on.ca/poster-rubric
Let Us Reflect
In this module you have learned how to use the internet safely,
security, and netiquette. May you always remember what you have
learned about this topic hence, these learnings will keep you safe and
protected in using the Internet.
9
Answer key to Activities
Let
us
Try
1.
False
2.
True
3.
False
4.
False
5.
False
6.
A
7.
B
8.
B
9.
C
10.B
Let
us
practice
1.
D
2.
B
3.
A
4.
C
5.
B
Let
us
practice
more
1.
a
2.
d
3.
b
4.
b
5.
a
Let
us
Assess
Possible
answers
1.
Why
is
Netiquette
useful
(it
can
help
you
treat
others
with
respect
and
protect
you
from
online
predators)
2.
When
is
it
okay
to
email
a
chain
letter?
(Never-
chain
letters,
hoaxes,
and
virus
warnings
should
not
be
forwarded)
3.
What
should
you
do
if
someone
sends
you
a
flame?
(Stay
calm.
Ignore
the
message,
or
write
back
asking
the
person
to
explain
what
they
really
meant)
4.
What
should
you
do
if
an
online
friend
asks
you
to
meet
them
after
school?
(Tell
your
parents
or
teacher
immediately.
Your
“
friend”
may
not
be
a
friend
at
all
and
could
be
someone
who
wants
to
hurt
you)
5.
Why
is
punctuation
so
important
on
the
Internet?
(Punctuation
is
important
because
the
other
person
can‟
t
see
you
and
it‟
s
the
only
tool
you
have
of
expressing
your
feelings
or
thoughts).
10
References
https://www.freepik.com/premium-photo/protection-network-security-
computer-safe-your-data-concept-digital-crime-by-anonymous
hacker_5065674.htm#page=1&query=cyber%20security&position=44
https://www.pinterest.ph/pin/71987294014535665/
https://www.wikihow.com/Find-if-a-Website-Is-Legitimate
http://www.albion.com/netiquette/corerules.html
https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm
https://www.eworkshop.on.ca/poster-rubric
http://rubistar.4teachers.org/index.php?ts=1610870563
Alou Camille B. Sabado, and Jenirose C. Castillo “Online Safety, Security,
Ethics, and Etiquette” Empowerment Technology. Quarter 1 Module 2.
SOCCSKSARGEN Region
11
For inquiries or feedback, please write or call:
Department of Education – Region XI Davao City Division
Elpidio Quirino Avenue, Davao City, Davao del Sur, Philippines
Telephone: (082) 224 0100 / 228 3970
Email Address: info@deped-davaocity.ph /
lrmds.davaocity@deped.gov.ph

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologies
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment Technologies
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5
 
Lesson 3 advanced word processing skills
Lesson 3 advanced word processing skillsLesson 3 advanced word processing skills
Lesson 3 advanced word processing skills
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Imaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment TechnologiesImaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment Technologies
 

Similar a Q3 G11 Empowerment Technologies Module 2.pdf

Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
sabrinacotta
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 

Similar a Q3 G11 Empowerment Technologies Module 2.pdf (20)

Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Users guide
Users guideUsers guide
Users guide
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptxlesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

Último

IATA GEOGRAPHY AREAS in the world, HM111
IATA GEOGRAPHY AREAS in the world, HM111IATA GEOGRAPHY AREAS in the world, HM111
IATA GEOGRAPHY AREAS in the world, HM111
2022472524
 
Sample sample sample sample sample sample
Sample sample sample sample sample sampleSample sample sample sample sample sample
Sample sample sample sample sample sample
Casey Keith
 
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girlsbhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
mountabuangels4u
 
Four Famous Temples In Jammu and Kashmir
Four Famous Temples In Jammu and KashmirFour Famous Temples In Jammu and Kashmir
Four Famous Temples In Jammu and Kashmir
SuYatra
 

Último (20)

Rudrapur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Rudrapur Call Girls 🥰 8617370543 Service Offer VIP Hot ModelRudrapur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Rudrapur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Explore Dubai with - Forever Tourism
Explore  Dubai  with  -  Forever  TourismExplore  Dubai  with  -  Forever  Tourism
Explore Dubai with - Forever Tourism
 
IATA GEOGRAPHY AREAS in the world, HM111
IATA GEOGRAPHY AREAS in the world, HM111IATA GEOGRAPHY AREAS in the world, HM111
IATA GEOGRAPHY AREAS in the world, HM111
 
Pithoragarh Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Pithoragarh Call Girls 🥰 8617370543 Service Offer VIP Hot ModelPithoragarh Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Pithoragarh Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Sample sample sample sample sample sample
Sample sample sample sample sample sampleSample sample sample sample sample sample
Sample sample sample sample sample sample
 
Paschim Medinipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Paschim Medinipur Call Girls 🥰 8617370543 Service Offer VIP Hot ModelPaschim Medinipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Paschim Medinipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Raiganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Raiganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelRaiganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Raiganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Pauri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Pauri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot ModelPauri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Pauri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girlsbhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
 
Purba Bardhaman Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Purba Bardhaman Call Girls 🥰 8617370543 Service Offer VIP Hot ModelPurba Bardhaman Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Purba Bardhaman Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Four Famous Temples In Jammu and Kashmir
Four Famous Temples In Jammu and KashmirFour Famous Temples In Jammu and Kashmir
Four Famous Temples In Jammu and Kashmir
 
Chamba Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Chamba Call Girls 🥰 8617370543 Service Offer VIP Hot ModelChamba Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Chamba Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptx
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptxElevate Your Busy Season Email Marketing, Holly May Webinar.pptx
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptx
 
Top places to visit, top tourist destinations
Top places to visit, top tourist destinationsTop places to visit, top tourist destinations
Top places to visit, top tourist destinations
 
Mehsana Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mehsana Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMehsana Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mehsana Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Bhadrachalam Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Bhadrachalam Call Girls 🥰 8617370543 Service Offer VIP Hot ModelBhadrachalam Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Bhadrachalam Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot ModelUdhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Lahaul Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Lahaul Call Girls 🥰 8617370543 Service Offer VIP Hot ModelLahaul Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Lahaul Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Discover Mathura And Vrindavan A Spritual Journey.pdf
Discover Mathura And Vrindavan A Spritual Journey.pdfDiscover Mathura And Vrindavan A Spritual Journey.pdf
Discover Mathura And Vrindavan A Spritual Journey.pdf
 
Hooghly Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Hooghly Call Girls 🥰 8617370543 Service Offer VIP Hot ModelHooghly Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Hooghly Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Q3 G11 Empowerment Technologies Module 2.pdf

  • 1. Empowerment Technologies Quarter 3 – Module 2: Online Safety, Security, and Netiquette
  • 2. Empowerment Technologies – Grade 11 Quarter 3 – Module 2: Online Safety, Security, and Netiquette First Edition, 2020 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this module are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Printed in the Philippines by Davao City Division Learning Resources Management Development System (LRMDS) Department of Education – Region XI Office Address: Davao City Division, Region XI Elpidio Quirino Ave., Poblacion District, Davao City, 8000 Davao del Sur Telefax: (082) 224-3274, (082) 222-1672 E-mail Address: davao.city@deped.gov.ph Development Team of the Module Writers: Melanio R. Florino Jr. Editors: Reviewers: Divilyn M. Rodriguez Illustrator: Layout Artist: Melanio R. Florino, Jr. Template Developer: Neil Edward D. Diaz Management Team: Reynaldo M. Guillena Jinky B. Firman Marilyn V. Deduyo, Alma C. Cifra May Ann M. Jumuad Aris B. Juanillo
  • 3. Empowerment Technologies Quarter 3 – Module 2: Online Safety, Security, and Netiquette
  • 4. ii Introductory Message For the facilitator: As a facilitator, you are expected to orient the learners on how to use this module. You also need to keep track of the learners' progress while allowing them to manage their own learning at home. Furthermore, you are expected to encourage and assist the learners as they do the tasks included in the module. For the learner: As a learner, you must learn to become responsible of your own learning. Take time to read, understand, and perform the different activities in the module. As you go through the different activities of this module be reminded of the following: 1. Use the module with care. Do not put unnecessary mark/s on any part of the module. Use a separate sheet of paper in answering the exercises. 2. Don‟t forget to answer Let Us Try before moving on to the other activities. 3. Read the instructions carefully before doing each task. 4. Observe honesty and integrity in doing the tasks and checking your answers. 5. Finish the task at hand before proceeding to the next. 6. Return this module to your teacher/facilitator once you are done. If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult your teacher or facilitator. Always bear in mind that you are not alone. We hope that through this material, you will experience meaningful learning and gain deep understanding of the relevant competencies. You can do it!
  • 5. 1 Let Us Learn! Privacy, security, and good behavior online are essential words that you have to follow when you are on the Internet. Do you know your restrictions when using social media? Do you feel accountable for what you are posting? Do you think first before you click? Let us find out! This module was designed and written for you, our learners. It will help you become aware of the behavior you are going to observe following online safety, security, and netiquette. At the end of this module, you will be able to:  apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks (CS_ICT11/12-ICTPT-IA-B-2). Let Us Try! Directions: A. Write TRUE if the statement is correct, FALSE if the statement is incorrect. 1. Writing an email in all capital letters means that you are smiling at the other person. 2. It is okay to forward an email that someone has sent you. 3. It is okay to scroll the screen in a chat room. 4. It is okay to give out your address to strangers. 5. A flame is an online chain letter. B. Write the letter that best describes your answer. 6. The abbreviation “brb” means: a. Be right back b. Better run, bye! c. Boring, really boring 7. What does the term netiquette mean? a. Nice etiquette b. Network Etiquette c. Nighttime Etiquette 8. What does “spam” mean? a. Dripping raw meat juice on the keyboard. b. Emailing or posting advertisements online to a bunch of people. c. Emailing a chain letter to a bunch of people. 9. What should you do before posting a message to a chat room? a. Read the chat room rules or FAQs. b. Read some of the postings to see what people are chatting about and whether or not it is interesting to you. c. Both 10. The “golden rule” of netiquette is: a. Never flame a friend.
  • 6. 2 b. Remember the human (treat others as you wish to be treated). c. Never send a chain letter. Let Us Study Online Safety, Security, and Netiquette With the country‟s biggest network data offerings for every smartphone holder, online safety is one of the concerns most parents want their children to remember these days. Every day, flash reports show number of victims of malicious conduct like bullying, identity thief, automatic teller machine fraud, online selling scam, face or body manipulation to earn money and the worst is rape of victims of meet ups. The infographic at the right explains why there is a need to protect Philippine users from online cyber predators. Why is it important to stay safe online? Most of us are „connected‟ via our laptops, mobile phones, tablets, or personal computer. The potential for the internet to be a valuable and a fun resource for entertainment, making friends, keeping in touch and learning is huge. But if you use the internet, you could be at risk of illegal activities or abuse - be it bullying, fraud or something more serious. Unlike seeing someone face to face, on the net, people aren't always what they first seem. In the same way you learn about safety when you leave the house, it is important to learn how to stay safe online. Photo credits: https://www.pinterest.ph/pin/71987294014535665/
  • 7. 3 Some precautions on sharing personal information online: Type of Information Risks First name There is still a risk in sharing your first name. Chances are, a hacker already knows plenty of stuff about you even if you only give out your name. You cannot just walk in a room and start introducing yourself to everyone. You now know whom you can come across with. Last name If sharing your name is a small risk, having both your first and last is riskier. You will be vulnerable to being searched for using searched engine, which will include image search. Matching a name with a face can lead to several cybercrimes like identity theft. Middle name Sharing just your middle name is probably not the risky most risky of this shared information, but sharing your entire name would be. Current and previous school(s) Most people who steal identities study their subject. They can use this information for verification purposes. Your Cellphone Number Your cellphone number should never be posted over the Internet. The Internet is a public place. It is the same as posting your name on a billboard. Who your Mother and Father are Risky, yet not as risky as posting their full names, especially your mother‟s maiden name. In fact, if you have already encountered many websites that require your mother‟s maiden name as an answer to a secret question whenever you lose your password. Who your siblings are This is a huge risk, especially if you have younger siblings. Stranger may pretend or use their identity to dupe you. Your address Hopefully you answered no to this one. Giving the Internet your number is one thing, giving your address is a whole other level. It would be much easier for criminals to find you. Your home phone number This shared information is riskier than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you. Your birthday Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft. Source: Empowerment Technologies First Edition.(2016).Sampaloc Manila:Rex Bookstore, Inc
  • 8. 4 There are numerous delinquencies that can be committed on the internet such as stalking, identity theft, privacy violations, and harassment. To avoid these online crimes, follow the following online safety measures: 1. Never give any personal information out about yourself over the internet. 2. Do not give any bank or sensitive information unless you are sure that it is a reputable business having a secure service. 3. To make sure that you are in a secured network, the website address should begin with “https://’ as opposed to “http://”. Never access your accounts by following an email link, instead type your URL by yourself. Below are some ways to find if the website you are opening is legit. Here are some ways you can check if a website is trustworthy Reliable websites Unreliable websites Usually end in .edu or .gov Might end in .com Don‟t have errors Have errors Are up to date Are outdated Use facts Use opinions Use experts Use unreliable sources Source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate Online Security The standard definition of online security calls it the mix of rules that are followed and actions that are taken to make sure online user data and privacy aren‟t compromised by cybercriminals. Online security can be something as complex as a system that‟s designed to prevent credit card theft, or something as simple as you using antivirus software to protect your device from malware and viruses. When you are online, treat the Internet a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using the internet. 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile. 4. Do not share your password with anyone. 5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT protect you from hackers. 6. Do not talk to strangers whether online or face-to-face. 7. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date.”
  • 9. 5 8. Add friends you know in real life. 9. Avoid visiting untrusted websites. 10. Install and update antivirus software on your computer. Use only one antivirus software to avoid conflicts. 11. If you have Wi-Fi at home, make it private network by adding a password. 12. Avoid downloading anything from untrusted websites. 13. Do not use pirated software. 14. Do not reply or click links from suspicious emails. 15. Make online purchases from secured sites Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly online. Below are the 10 rules of netiquette: The Core Rules of Netiquette The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea 1: Remember the Human Rule. 2: Adhere to the same standards of behavior online that you follow in real life. 3: Know where you are in cyberspace. 4: Respect other people's time and bandwidth. 5: Make yourself look good online. 6: Share expert knowledge. 7: Help keep flame wars under control. 8: Respect other people's privacy. 9: Don't abuse your power. 10: Be forgiving of other people's mistakes. Source: http://www.albion.com/netiquette/corerules.html Let Us Practice Directions: Find out if you have understood the lesson. Choose the letter that best describes your answer. 1. You are all going for a field trip and none would be left in the house. What should you do? A. Post pictures when you return home. B. Post the dates when you will be going online. C. Post updates of where you are currently checking in hotels or places. D. Tell no one. Vacations are for getting away.
  • 10. 6 2. Should you have the same password in all your digital transactions? A. Yes. That is how I remember all my passwords. B. I have different passwords for all different accounts. C. I keep it simple. I don‟t have any passwords. D. I have two similar passwords that I alternately use for all me accounts. 3. Choose which best describes how you feel about sharing your password with your boyfriend/ girlfriend? A. Forget about it. B. I‟ll share if he/she will. C. BFFs share everything. D. I don‟t believe in passwords. 4. Your parents bought you your first cellphone. How will you share your cellphone number? A. Do not share your cellphone number to anyone. B. Post your cellphone number in your social media account. C. Share your cellphone number only to your family. D. Post your cellphone number in your group chat. 5. Your social media friends list should only be composed of ______________. A. your favorite brands B. family and friends C. anyone who sends you a friend request D. foreigners Let Us Practice More Directions: Measure your understanding by answering the following questions. Choose the letter that best describes your answer. 1. Which of the following is not an advantage in using social media network? a. crime against children b. worldwide connectivity c. real time information sharing d. sharing political beliefs 2. Below are disadvantages of using social media network, except- a. time waster b. risk of fraud c. identity theft d. increase new circle of friends 3. Personal details when revealed in the Internet is - a. an advantage. b. a disadvantage. 4. What should you do in case on cyberbullying? a. Respond to the bully and fight back if necessary. b. Block the cyberbully from the contact list and talk to a trusted adult. c. Wait in silence until things get better.
  • 11. 7 5. Someone is behaving inappropriately on one of the sites you‟re using. You should- a. Report to the moderator of the site. b. Shut down your pc. c. Tell the person to shut up. Let Us Remember  When you are online or using the Internet, keep in mind that the whole world is looking at you. People or netizens as what we call those persons present online, are there to react or participate positively or negatively. Some of these netizens behave the way you treat them.  Your words or moving animation are enough for them to cause actions. While many believe the law “do not do unto others what you do not like them do unto you”, it is safe to follow what is “safe” and proper manner even if you are not facing these netizens in real time.  Like begets like and it would be nice to stand up after doing stuff online without harming others. Let Us Assess Directions: Apply what you have learned about online safety, security, and netiquette. Choose the letter that best describes your answer. 1. Which of the following is NOT a way of evaluating information found online? a. Looking at the brand name….is it a trusted brand? b. Making sure the source is a governmental agency. c. Checking the website‟s internal information. d. Comparing the information with the same information from an established media company or with original source of material. 2. What is your habit when it comes to newspaper and current events online? a. I pay attention to news when there is a juicy story that grabs my interest. b. I avoid mainstream/dominant news media. c. I try to read news everyday relying on media I trust and respect. d. I should pay more attention to the news but I do not have time. Give your best answer (1 point each) 4. Why is netiquette useful? 5. When is it okay to email a chain letter? 6. What should you do if someone sends you a “hate message”?
  • 12. 8 7. What should you do if an online friend asks to meet you after school? 8. Why is punctuation so important on the Internet? Let Us Enhance Poster making. Your parents want you to make a poster about online safety, security, and netiquette since you have knowledge on this. Your parents want that this poster would remind your younger siblings on what to do when they are using the Internet. Use an A4 size paper for your poster. Below is the rubric in making the poster. Source: eworkshop.on.ca/poster-rubric Let Us Reflect In this module you have learned how to use the internet safely, security, and netiquette. May you always remember what you have learned about this topic hence, these learnings will keep you safe and protected in using the Internet.
  • 13. 9 Answer key to Activities Let us Try 1. False 2. True 3. False 4. False 5. False 6. A 7. B 8. B 9. C 10.B Let us practice 1. D 2. B 3. A 4. C 5. B Let us practice more 1. a 2. d 3. b 4. b 5. a Let us Assess Possible answers 1. Why is Netiquette useful (it can help you treat others with respect and protect you from online predators) 2. When is it okay to email a chain letter? (Never- chain letters, hoaxes, and virus warnings should not be forwarded) 3. What should you do if someone sends you a flame? (Stay calm. Ignore the message, or write back asking the person to explain what they really meant) 4. What should you do if an online friend asks you to meet them after school? (Tell your parents or teacher immediately. Your “ friend” may not be a friend at all and could be someone who wants to hurt you) 5. Why is punctuation so important on the Internet? (Punctuation is important because the other person can‟ t see you and it‟ s the only tool you have of expressing your feelings or thoughts).
  • 15. 11 For inquiries or feedback, please write or call: Department of Education – Region XI Davao City Division Elpidio Quirino Avenue, Davao City, Davao del Sur, Philippines Telephone: (082) 224 0100 / 228 3970 Email Address: info@deped-davaocity.ph / lrmds.davaocity@deped.gov.ph