Module 1 Lesson 2 E Tech Black White No Answer Key 1 PDF
Module 1 Lesson 2 E Tech Black White No Answer Key 1 PDF
Module 1 Lesson 2 E Tech Black White No Answer Key 1 PDF
1
Lesson
Rules of Netiquette
2
What’s In?
Privacy, security, and good netizenship are essential words that you have to remember when you are on the Internet. Do you know your
limitations in social media? Do you feel responsible for what you are posting? Do you think first before you click? Let us find out!
Direction: Write YES if you agree with the statement and NO if you disagree on blank before each number.
_________ 1. My computer has an antivirus, so it is okay to open most email attachments like e-cards and video files.
_________ 2. You and your best friend play a lot of video games. One time, she asks you for your password so she can help
you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away
your password?
_________ 3. You received an email stating that your mother’s bank account is going to be forfeited if you do not respond
to the email. Is it safe to reply?
_________ 4. There is a danger in posting information about a future vacation.
_________ 5. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having
it in your profile makes you vulnerable to identify theft.
_________ 6. If someone insults and uses offensive language towards you online, you should reply in the same manner.
_________ 7. Give out personal information when chatting to someone you just met online.
_________ 8. It is ok to constantly give our friends e-mail or items online which they do not need.
_________ 9. Remember your audience. If you are putting something on a web page remember that everyone in the world
will have access to it.
_________ 10. You are responsible for your actions on the internet.
2
How many checks did you have for Shared? You probably answered Shared in the first two items. If that is
the case, try using a search engine like Google then type your first and last name. Did you get links to your profile
page? Try switching to image search. Did your pictures appear? If you have a unique name, chances are, it did.
Do not feel bad if it did not appear though; in fact, it is probably for your best interest not to have pictures of yourself
in a search engine.
Self-Check!
1. How many hours do you sped on the Internet per
day? Self-Check!
2. Can you live without the internet for a week?
3. How many aspects of your life depend on the Answer:
internet? 1. _____________
4. How many times have you complained about 2. _____________
your internet connection speed? 3. _____________
4. _____________
What Is It?
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends and stay in touch
with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But
like most things in the world, there is always the "other side of the coin." The Internet is one of the most dangerous places,
especially if you do not know what you are doing with it. But there is no need to worry, it is never that late. Hopefully, by the
end of this lesson, you are able to consider how you go about your use of the Internet.
The Internet is defined as the information superhighway. This means that anyone has access to this highway, can
place information, and can grab that information. Any information, even things that you have set privately, can be accessed
in one way or another. Therefore, social networking sites like Facebook continue to improve their security features. The
threats of cybercrimes are very real. While you might not experience the threat now, whatever information we share today
could affect our future.
Online Safety - also called as cyber safety or digital safety which refers to practices and precautions one should
observe when using the Internet.
Internet Security – security in relation to transactions made over the Internet. It encompasses the security of data entered
through a web form, browser security, & overall authentication and protection of data sent via Internet protocol.
Direction: Read the sentences carefully. Write FACT if the statement is the statement is true and BLUFF if it is
false. Then, explain what the risk is of sharing this information or why sharing this information is not risky at all.
______ 1. Sharing your first name only or last name only is riskier than sharing both your first and last name in
any social media platform.
______ 2. There is a small risk if you share your middle name alone.
______ 3. Your personal cellphone number should never be posted over the Internet.
3
______ 4. Mother’s maiden name when posted on your wall is not risky.
______ 5. There is nothing wrong with disclosing the name of your siblings on your social media account.
______ 6. Sharing or giving your address poses no risk at all.
______ 7. Scammers usually used your home telephone number to deceive you.
______ 8. It is okay to use your birthday as your password so that you will not forget it.
______ 9. Posting the name of your current school is not risky.
______ 10. Sharing your full name online is the riskiest information to share.
INTERNET THREATS
Here are some of the threats that you should be aware of when using the Internet:
1. Browser Hijacking - happens when malware or spyware replaces a web user's browser homepage that redirects
the user to unwanted websites while capturing sensitive private data for personal or business gain.
2. Malware - a malicious software that is intended to damage or disable computer systems which has codes to collect
information without one's knowledge.
Types of Malware:
a. Virus - a malicious program designed to replicate itself and transfer from one computer to another either
through the Internet and local networks or data storage like flash drives and CDs.
b. Worm - a malicious program that transfers from one computer to another by any type of meas. Often, it
uses a computer network to spread itself. For example, the ILOVEYOU worm (Love Bug Worm) create by a
Filipino.
c. Trojan - a malicious that disguise as a useful program but once downloaded or installed, leave your PC
unprotected and allows hackers to get your information.
Rogue Security Software - tricks a user into posing that it is security software. It asks the user to pay to
improved his/her security but in reality they are not protected at all.
d. Spyware - a program that runs in a background without you knowing it (thus called a "spy"). It has the
ability to monitory what you are currently doing and typing through keylogging.
Keyloggers - used to record the stroke done by the users. This is done to steal password or any other
sensitive information. It can record email, messages, or any information you type using your keyboard.
4
3. Spam - an irrelevant, inappropriate, unwanted, or junk e-mail that comes form legitimate companies mostly bots
or advertisers which, in the long run may be used for phishing, scams, and malware.
4. Phishing - its goal is to acquire sensitive information like passwords and credit card details. This is done by sending
you an email that will direct the user to visit a website and be asked to update his/her username, password, credit
card, or personal information.
5. Pharming - a more complicated way of phishing where it exploits the DNS (Domain Name Service) system. It is a
technique which redirects a legitimate website's traffic to an illegitimate website to gain access to a user's personal
information.
6. Identify Theft - happens when a criminal impersonates a user by stealing his or her personal information to
withdraw money or pay goods online.
Here are some of the tools/activities that can protect you and your gadgets from all these risks:
Browser and Antivirus Installed & Updated Prepaid Credit Secure Sites Browsing
Clearing browser cache Firewalls User/Vendor Rating Systems
Reporting Online Crime E-mail encryption Filter your inbox
Check the URL Blacklist sites Updated OS
Report all suspicious e-mails Unsubscribe from unwanted mails
Avoid opening unknown files attached to email
Encryption is a process of converting data into an unreadable form to prevent unauthorized access and thus ensuring data
protection.
What’s More
Activity 1.3: Cyber Security
DIRECTIONS: Read and analyze carefully the given scenario below. Identify what risk or online threat is being portrayed in
each scenario. You also need to give at least TWO tools or activities that can protect the character/s or their computers
from these risks.
5
F. Andrew is a computer programmer who is an expert in
creating websites. He knows online threats are illegal, but k. _____________________
he still created a fake website that looks like nearly 6. _____________________
identical to a real one in order to trick users into entering l. _____________________
their login information.
G. Rose just installed a new search engine on her laptop.
Now whenever she searches the internet, she gets m. _____________________
several pop-up windows directing her to buy products.
7. _____________________
n. _____________________
What does rose have?
H. You were browsing the web on a questionable website,
and now you get a pop-up window stating that if you do o. _____________________
8. _____________________
not pay $100 within one hour, all files on your computer p. _____________________
will be destroyed. What is this an example of?
I. Rina regularly checked her Gmail account to check if the
companies she was applying already acknowledge her
applications. Upon browsing her account, she was q. _____________________
saddened to see that her e-mail account was already full
9. _____________________
r. _____________________
because of so many unsolicited e-mails containing
advertisements and sites asking for her bank accounts.
J. Ahlexie’s antivirus software was already expired. She
needs to finish her project using an application that can
only be downloaded via internet. She was already
s. _____________________
exhausted and accidentally downloaded an application 10. _____________________
from an unsecure site. She was not aware that the t. _____________________
application makes her computer unprotected and allowed
hackers to get her personal information.
6
Remember:
There is no such thing as private over the Internet. There are hackers who can find a backdoor even if your profile is already
private. You have no control of whoever is looking at your friends’ screen whenever they open your profile or chat with you. You
have no control over people getting access to your friend’s account and seeing your private stuff.
Always think before you post. Ask yourself these questions first: “Would I want my parents or grandparents to see it?” “Would I
want my future boss to see it?”
If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
COPYRIGHT INFRINGEMENT
Intellectual Property – creations of the mind such as invention, a form of literary and artistic works, a research, symbols,
drawings, photos, names and images used in commerce etc.
Copyright – legal right of the owner of intellectual property. The original creators have the exclusive right to make copies of
the creative work for a set period of time, and anyone who uses it without consent is punishable by law.
Copyright infringement – the use or production of copyright-protected materials without the permission of the copyright
holder.
Here are some tips that could help you avoid copyright infringement:
1. Understand. You can express something using your own words, but you should give credit to the source.
2. Be responsible. Be responsible enough to know if something has a copyright.
3. Be creative. It is important to add your own creative genius in everything that will be credited to you.
4. Know the Law. There is a provision for “fair use” which mean that an intellectual property may be used without a
consent as long as it is used in commentaries, criticisms, search engines, parodies, news report, research, library
archiving, teaching and education.
NETIQUETTE
Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly online.
7
Flame war is a series of flame posts or messages in a thread that
are considered derogatory in nature or are completely off-topic. Often
these flames are posted for the sole purpose of offending or upsetting
other users. The flame becomes a flame war when other users respond
to the thread with their own flame message.
Image from:
https://twitter.com/Parkster00/status/1246347088625045504
What I Have Learned? You are learning a lot! The best way to improve skills and get
the proper direction to express your feelings about your
learning is to write a self- reflection. Let’s do it.
From all you have learned in Lesson 2, why is there a need to “think before you click?”
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
8
What I Can Do?
Activity 1.5: Digital Poster Making
Now it’s time to show your creativity!
Create a poster showing the Netiquette rules with examples of how you can use them in your daily life, primarily online.
The poster should use an interactive online tool which is Canva. You may choose from any of the Core Rules of Netiquette
as you baseline idea in crafting your E-Posters.
Assessment
Direction: Read each item carefully and choose the letter of the correct answer. Write your answer in your
notebook.
1. What type of malicious program is designed to replicate itself and transfer from one computer to another either
through the internet or local networks or data storage like flash drives and CDs?
A. Adware
B. Spyware
C. Worms and Virus
D. Ransomware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware
B. Spyware
C. Worms and Virus
D. Ransomware
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware
B. Spyware
C. Worms and Virus
D. Ransomware
9
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login
information.
C. Sending someone a text message looks like a notification that the person has won a contest.
D. Sending someone an email that records their keystroke activities while using their computers.
5. Which of the following must NOT be done if you received an embarrassing picture from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
6. What is a flame in cyberspace?
A. person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.
7. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
8. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
9. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay.
D. Nobody knows ones identity online which only means that judging someone is not possible at all.
10. You've been sent a virus warning, what should you do now?
A. Ignore it.
B. Forward it within your company.
C. Forward it to everyone in your address book.
D. Go to a security Web site to learn if it is a real virus.
10