ETIQQUITE
ETIQQUITE
ETIQQUITE
I. OBJECTIVES: At the end of the performance, the learners will be able to;
III. PROCEDURES:
A. PRAYER
B. GREETING
C. CHECKING OF ATTENDANCE
- The teacher will ask the classroom secretary about the attendance
D. Classroom management/ Rules and Netiquette
-CODE OF ETHICS-Educators must demonstrate impartiality, integrity, and ethical
behavior in the classroom, whether virtual or in-person
-Article 6 section 2: a teacher shall place premium upon self-respect and self
discipline as the principle’s behavior in all relationship with others and in all
situations.
F. LESSON PROPER
1. MOTIVATION
A. ANALYSIS
● Are you opening email attachments like e-cards and video files coming
from an unknown source?
● How often do you check your Privacy and Online Settings in Faceboook?
● Do you share your personal information in Social Media? (Full Name, Age,
Birthday, Contact Number,etc)
● Are you posting, commenting or sharing mean things online?
● Do your family and friends know your social media passwords?
B. ABSTRACTION
Internet Safety
- it refers to the online security or safety of people and their information when using
internet
Netiquette
- is network etiquette, the do’s and don'ts of online communication
Tips on how to be safe online
● Do not share your password with anyone.
● Add friends you know in real life.
● Do not visit untrusted websites.
● Add password to your WIFI at home to make it private.
● Install and update antivirus in your computer.
● Do not give your personal information to anyone
● Think before you click.
● Never post about your future vacation.
Internet Risks
1. Cyberbullying
2. Identity Theft 4. Sexting
3. Cyber Stalking
Internet Threats
Malware – also known as Malicious Software.
Types of Malware
1. Virus
2. Trojan Horse
3. Worm
4. Spyware
5. Adware
6. Keylogger
7. Botnet
8. Rootkit
9. Ransomware
Spam
- Also known as junk email or unwanted email sent by advertiser or bot. It can
be used to send malware.
Phishing
- A cyberattack method using deceptive emails and websites to acquiring
sensitive personal information.
Cybercrime
- A crime in which computer is used as object and tool in committing a crime such
hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and
others.
Cybercrime Law
- A law that deals with all forms of cybercrime.
C.APPLICATION:
Activity 1: #Wall
Suppose you have read a post like this “Strong men don’t cry” in social media. How
would you react? Post your reaction in comment section on our #Wall.
#Wall
Comment:
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________
Philosophy of teaching: Constructivism is based on the idea that people actively construct or make
their own knowledge, and that reality is determined by your experiences as a learner.
The activity above shows how we react on a post by expressing our opinions and feelings through
comments, likes, and emoticons. There are times that netizens will give compliments and positive
reactions on your post but there are also times that netizens will criticize or give negative reactions on
your post. Conflicts and misunderstanding occur in social media because netizens are not behaving well.
Ethics and etiquette should be practiced by people whenever they are in social media.
Rubrics:
IV. GENERALIZATION:
The importance of the internet plays a crucial part in human development. Life
becomes easy and comfortable because of this technology. Most of us are connected to the
internet via laptop, mobile phone, tablet, personal computer and other electronic gadgets.
Behind this technology there is a risk that everyone should be aware of. You could be at risk
of scam, bullying, and illegal activities if you will not take precautions in using the internet.
We need to keep ourselves safe and secure whenever we use the internet. That is why it is
very important to know and learn the ways on how to be safe and secure online.
VI. ASSESSMENT:
Directions: Choose the letter of the correct answer. Write your answer on the spaces given.
1. It refers to the online security or safety of people and their information when using the
internet.
A. Internet Safety B. Netiquette C. Ethics D. Etiquette
2. It aims to address legal issues concerning online interactions and the Internet in the
Philippines.
A. Republic Act no. 10175 B. Republic Act no. 10168
C. Republic Act no. 10165 D. Republic Act no. 10101
3. All of the following are common features of Phishing Email except for
A. Trusted Website B. Hyperlinks C. Attachments D. Sense of urgency
4. It is a more complicated way of phishing where it exploits the DNS System.
A. Phishing B. Pharming C. Malware D. Adware
5. It is a part of law, wherein you have the rights to work, anyone who uses it without your
consent is punishable by law.
A. Fair Use B. Keyloggers C. Copyright D. Boolean
Answer Key:
1. A
2. A
3. A
4. B
5. C
VII. ASSIGNMENT:
A. Follow Up Assignment:
Answer Activity 3 in Etech Module.
B. Advance Assignment
Prepared By:
Mrs.Ivy B. Padua
SHS- Teacher III