ICT Empowerment Technologies Quarter 1 Module 21

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 19

E1np w 1n nt

T hn 1 gies
Qurter-l■odale

Rules of Netiquette

1
Empowerment Technologies
Grade 11
Learner’s Material
Quarter 1 – Module 2

First Edition, 2020

Published by: Department of Education Division Rizal


Schools Division Superintendent: Cherrylou D. Repia

2
Content Standard:
 ICT in the context of global communication for specific professional track.

Performance Standard:

 Compose an insightful reflection paper on the nature of ICT in the context


of their lives, society, and professional tracks (Arts, TechVoc, Sports,
Academic).

Most Essential Learning Competency:

 apply online safety, security, ethics, and etiquette standards and practice

in the use of ICTs as it would relate to their specific professional tracks

Objective:

1. Learn that it is important to consider one’s and others’ safety &


reputation
when sharing information using digital media.

2. Determine and avoid the dangers of internet.

3
Activity 1: Pre-Assessment

Instructions: Write Yes if you agree with the statement and No if you disagree on the
blank before each number.

1. My computer has an antivirus so it is okay to open most email


attachments like e-cards and video files.

2. Your friend told you that his college application was rejected due to the
fact that you posted a video of him doing crazy stuff at a party. You posted the
video

several years ago but later took it down to protect your friend’s reputation. Can your
friend be right that the college found the video.

3. You and your best friend play a lot of video games. One time, she asks
you for your password so she can help you level up and get in-game money. She
promis- es to keep your password a secret. Is it okay to give away your
password?

4. You received an email stating that your mother’s bank account is going to be
forfeited if you do not respond to the email. Is it safe to reply?

5. You forgot that your essay for English class is due tomorrow. While doing
your research, you found a website offering free essays. Is it oaky to use the
essays from this free essay website?

4
Activity 2:

Instructions: Most of us use the Internet every day. Sometimes, we do not


pay attention on how much information we share online. Below is a questionnaire
about how much information you have shared so far. Put a check () under Shared
or Not Shared.

How Safe Are You?

Type of Information Shared Not Shared


1. First name

2. Last name

3. The name of your mother & father

4. Your address

5. Your home phone number

How many checks did you put for Shared? If you put checks on the first

two items under Shared then there is a big possibility that your profile page

can easily be located by search engines. Is there any danger of being found by

search engines?

5
Activity 3:

Instructions: Research for several news and events related to cybercrime.


Using your cellphone or any video-recording device, report it as if you were a
newscaster. Present in 1-2 minutes recording.

Note: Send your video files on my FB messenger for checking.

6
Activity 4: Reading Activity

Lesson Notes: Read and understand the lesson being presented.

Online safety and Security


Internet safety, or online safety, is the knowledge of maximizing the
user's personal safety against security risks to private information and property
associated with using the Internet, and the self-protection from computer crime in
general.

How Safe are You?


Let us visit each item and see how risky it is to share them.

TYPE OF INFORMATION RISKS


1. First name There is a risk in sharing your first
name. Chances are, a hacker may
already know plenty of stuff about
you even if you only give out your
first name.

2. Last name If sharing your first name is a


small risk, having both your first
and last is more risky. You will be
vulnera- ble to being searched for
using search engines, which
include im- age search. Matching
a name and a face is a modus to
several cyber-
crimes like identity theft.

7
3. The name of your mother and Risky, yet not as risky as posting their full
father names, especially your mother’s maiden
name. In fact, you may have already
encoun- tered many websites that require
your moth- er’s maiden name as an answer
to a secret question whenever you lose
your password.

4. Your address Hopefully, you answered no to this one.


Giv- ing the internet your number is one
thing; giving them your address is a whole
other level. It would be much easier for
criminals to find you.

5. Your home phone number This shared information is more risky than
sharing your personal phone number.
Scams usually use this information to
deceive you, one of which is when a
stranger pretends to know your parents or
pretend to be you.

8
Tips to Stay Safe Online

The internet is a public place and it is up to you to protect yourself. Here


are some tips to help you stay safe when using the internet.

1. Be mindful of what you share online.


2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website
handles the information you share.
1. Know the security features of the social networking site you use.
2. Do not share your password with anyone.
3. Avoid logging in to public network/Wi-Fi.
4. Do not talk to strangers online.
5. Never post anything about future vacation.
6. Add friends you know in real life.
7. Avoid visiting untrusted websites.
8. Install and update an antivirus software on your computer.
9. Make your Wi-Fi at home private by adding a password.
10. Avoid downloading anything from untrusted websites.
11. Do not use pirated software.
12. Do not click links from suspicious emails.

9
Internet Threats

Here are some of the threats you should be aware of when using the
internet:

1. Malware– stands for malicious software.


a. Virus-a malicious program designed to replicate itself and transfer from
one computer to another either through the internet and local networks or data
storage like flash drives and CDs.
b. Worm-a malicious program that transfer from one computer to another
by any type of means. Often, it uses a computer network to spread itself.
c. Trojan-a malicious program that is disguised as a useful program but
once downloaded or installed, leaves you PC unprotected anf allows hackers to
get you information.
*Rogue security software-tricks the user into posing that it is a security
soft- ware. It asks the user to pay to improve his/her security but in reality,
they are not protected at all.
d. Spyware-a program that runs in the background without you knowing it
(thus called “spy”). It has the ability to monitor what you are currently doing
and typing through keylogging.
*Keyloggers-used the record the keystroke done by the users. This is done
to steal their password or any other sensitive information.
e. Adware-a program designed to send you advertisements, mostly as pop ups

2. Spam– unwanted emails mostly from bots or advertisers. It can be used


to send malware
3. Phishing-Its goal is to acquire sensitive personal information like
passwords and credit cards details. This is done by sending you an email
that will direct the user to visit a website and be asked to update his/her
username, pass- word, credit card, or personal information.
*Pharming-a more complicated way of phishing where it exploits the DNS
(Domain Name Service) system.

1
Protecting Reputation Online

Make no mistake, you and your family's online reputation is a big deal.
There are myriad individuals, including business associates, neighbors, other
fam- ily members, and yes, even potential identity thieves searching for you on
a regular basis.

Think Before You Click

Here are things you might want to consider before posting something over the
Internet:

1. Before you post something on the web, ask these questions to


yourself: Would you want your parents or grandparents to see it?
2. Your friends depend on you to protect their reoutation online. Talk to your
friends about this serious responsibility.
3. Set your post to private. In this way, search engines will not be able to
scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that post can affect you or other’s reputation, ask the one who
posted iy to pull it down or report it as inappropriate.

1
Copyright Infringement

Copyright infringement pertains to the violation of someone's intellectual


prop- erty (IP). It is another term for piracy or the theft of someone’s original
creation, es- pecially if the one who stole recoups the benefits and not the
creator of the material.

Here are some tips that could help you avoid copyright infringement:

1. Copyright laws are designed to protect the creator of original works,


which are creative expressions from others using and profiting their work,
without
permission.

2. Use Caution If It's Not Your Original Work.

3. Read, Read, Read.

4. Don't Believe the Urban Legends.

5. Look for Fair Use.

1
Activity 5:
Answer the following using Microsoft Word. Once done, save your file with your
name. Send it on my FB messenger for checking:

1. Do you agree or disagree with the provisions of the copyright law? Defend
your answer.
2. How would you feel if someone posted something embarrassing about you?
What would you do?

RUBRICS
10 pts – Ideas
5 pts – Understanding
5 pts – Sentence Structure
20 pts TOTAL

1
Activity 6:

Create campaign materials promoting “Think before you click.” It could be in a


form of small posters. When you are done, send your work as a pdf file on my FB
mes- senger.

RUBRICS

10 pts – Graphics-Relevance
5 pts – Attractiveness
5 pts – Grammar

20 pts TOTAL

1
Activity 7:

You are going to construct an essay about your digital media life like.
You will be graded by the given Rubric below.
.

“The Role of Social Media in my Life”

RUBRICS
10 pts – Ideas
5 pts – Understanding
5 pts – Sentence Structure
20 pts TOTAL

1
Activity 8:

Match Column A with Column B. Write the letter of the correct answer on
the space before each number.

A B

1. virus a. designed to send your advertisements

2. rogue b. tricks the user into posing that it is a security

software

3. spam c. unwanted email mostly from bots

4. fair use d. allows you to use copyrighted work

without consent with certain limitations.

5. adware e. replicates and can transfer from one


computer to another

f. exploits the DNS system

1
can achieve

Activity 9:

I understand that

I realize that

1
Books:
EMPOWERMENT TECHNOLOGIES, Innovative Training Works, INC. Second
Edition

Websites:

https://www.youtube.com/watch?v=lfiKA8REolg

1
Department of Education Region 4A CALABARZON Division Rizal

Office Address: DepEd Bldg.,Cabrera Rd.,Bgy. Dolores,Taytay,Rizal 1920 Landline: 02-8571-4284


Email Address: [email protected]

You might also like