Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

GLOBAL SITE FOR IT STUDIES, INC.

3rd Floor Rosario Uy Bldg., San Jose Street, Goa, Camarines Sur
S/Y 2020 - 2021

Self – Learning Module - 2

Name:____________________________________________ Rating: _______________

Course & Year level: ________________________________ Date: ________________

_____________________________________________________________________________________
1 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
CURRICULUM
CONNECTION

LIFE PERFORMANCE OUTCOME:

I am a Globalista – a student of Global Site for I.T. Studies, Inc., a conscientious, adept
performer, achievers, competently pursuing my mission in life.

PROGRAM OUTCOMES:

Explain and apply the fundamental elements of effective conflict resolution processes
and use to reduce group conflicts and divisions, foster agreement, and promote future
collaboration.

ESSENTIAL PERFORMANCE & INTENDED LEARNING OUTCOMES:

Describe and explain the new abilities they have developed as the result of self-initiated
learning experience and projects through analyzation and understanding every topic in the
chapter.

INSTRUCTION:

How to learn from this module:

1. Before working on this self-learning module, make sure you have a notebook, pen or
pencil and learning materials with you.

2. Read carefully the instructions given. Don’t hurry. Always review your answers.

3. If you are told to go and do something, do not hesitate to do so.

4. Accomplish tasks and complete worksheet seriously and correctly.

5. Submit outputs on or before the deadline at the agreed drop area like Barangay Hall or to
the assigned Barangay Official in your Barangay.

6. Guidance, support & encouragement of the parent/guardian are highly encouraged.

7. Enjoy learning.

_____________________________________________________________________________________
2 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Info source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate

Never open messages or attachments from someone you do not know.

Regularly review your privacy settings in your online accounts to make sure you are
not sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data before
leaving.

Keep your software updated to avoid security holes.


Do not download or install software or anything on your computer or cell phone that
is unknown to you.

Netiquette is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:

_____________________________________________________________________________________
3 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Flame war is a series of flame posts or messages in a thread
that are considered derogatory in nature or are completely off-
topic. Often these flames are posted for the sole purpose of
offending or upsetting other users. The flame becomes a flame
war when other users respond to the thread with their own flame
message.

Image from: https://twitter.com/Parkster00/status/1246347088625045504

Lesson
2 Kinds of Online Threats

There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities to
attack computers and retrieve sensitive data from individuals. Half the time, we aren’t even
aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are usually
done by computer hackers who uses the World Wide Web to facilitate cybercrime. Web
threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS
protocols, but may also employ other protocols and components, such as links in email or
Instant Messaging apps, or any malware attachments on servers that access the Web. They
_____________________________________________________________________________________
4 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
benefit cybercriminals by stealing information for subsequent sale and help absorb infected
PCs into botnets. Web threats pose a broad range of risks, including financial damages,
identity theft, loss of confidential information/data, theft of network resources, damaged
brand/personal reputation, and erosion of consumer confidence in e-commerce and online
banking.
The following are the top kinds of online threats that you should be aware of:

 Phishing happens when an email is sent from an internet criminal disguised as


an email from a legitimate, trustworthy source. The message is meant to lure you
into revealing sensitive or confidential information.

Image source: https://searchsecurity.techtarget.com/definition/phishing

 Pharming happens when a hacker (or ―pharmer‖) directs an internet user to a


fake website instead of a legitimate one. These ―spoofed‖ sites can capture a
victim’s confidential information, including usernames, passwords, and credit
card data, or install malware on their computer. Pharmers usually focus on
websites in the financial sector, including banks, online payment platforms, or
other e-commerce destinations.

_____________________________________________________________________________________
5 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html

 Internet Scam generally refers to someone using internet services or software to


defraud or take advantage of victims, typically for financial gain. Cybercriminals may
contact potential victims through personal or work email accounts, social networking
sites, dating apps, or other methods in attempts to obtain financial or other valuable
personal information. Online scams may come in various forms such as lottery scam,
charity fraud scams, job offer scams, and online dating scams to name a few.

_____________________________________________________________________________________
6 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
 Internet robots are also known as spiders, crawlers, and web bots. It is a software
application that is programmed to do certain tasks. Bots are automated, which
means they run according to their instructions without a human user. Some bots are
useful, such as search engine bots that index content for search or customer service
bots that help users. Other bots are "bad" and are programmed to break into user
accounts, scan the web for contact information for sending spam, or perform other
malicious activities. If it's connected to the Internet, a bot will have an associated IP
address.

 Malware or malicious software, is any program or file that is harmful to a computer


user. Here are the most common offenders in the rogues’ gallery of malware:

Adware (advertising supported software) is unwanted software designed to


throw advertisements up on your screen. Example, pop-up ads and banner
ads.

Spyware is malware that secretly observes the computer user’s activities


without permission and reports it to the software’s author. Example is a
keylogger.

Virus and Worms are malwares that attach to another program and, when
executed—unintentionally by the user—replicates itself by modifying other
computer programs and infecting them with its own bits of code.

Trojan, or Trojan horse, is one of the most dangerous malware types. It


usually represents itself as something useful in order to trick you. Once it’s on
your system, the attackers behind the Trojan gain unauthorized access to the
affected computer. From there, Trojans can be used to steal financial
information or install threats like viruses and ransomware.

Ransomware is a form of malware that locks you out of your device and/or
encrypts your files, then forces you to pay a ransom to get them back.
 Spams are unsolicited emails, instant messages coming from recipients that are not
granted verifiable permission for the message to be sent. Spam messages can be
damaging if you open or respond to it.

_____________________________________________________________________________________
7 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
 Cyberstalking refers to the use of the internet or other electronic device to harass
or stalk individuals or organizations.

 Cyberbullying refers to the act of tormenting, harassing, or embarrassing another


person using the internet.

_____________________________________________________________________________________
8 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
 Spoofing happens when someone or something pretends to be something else to
gain our confidence, get access to our systems, steal data, steal money, or spread
malware.

Lesson
3 Effective Internet Research

The Internet has made our lives easier especially in terms of doing research. By
browsing the internet, we can access limitless topics. Web-based catalogs are available in
many libraries to assist researchers in locating printed books, journals, government
documents and other materials. The biggest obstacle facing all researchers on the internet is
how to effectively and efficiently access the vast amount of information available (The
Internet: Research Tools, 2013).

Searching the Web

There are billions of information on the web and it is a challenge for us to truly find which
information is reliable and relevant. Here are some tips you may use to be able to look for
relevant and reliable sources:

Search Engines are websites used for retrieval of data, files, or documents from
data bases. Some search engines we use today are:

_____________________________________________________________________________________
9 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic term for
all types of names and addresses that refer to objects on the world wide web.
Knowing the URL endings will give you clues to who is sponsoring the website
and help evaluate the sources.

https://www.searchenginejournal.com/alternative-searchengines/271409/#close

4 5
1 2 3 6 7

1. Protocol 4. Top-level Domain 7. Named anchor

2. Subdomain 5. Folders/ Paths

3. Domain 6. Page

Popular Domains
Top- level Domains Country code top level domains

.edu – educational institution .ph – Philippines

.org – non-profit organization .eu – European Union

.gov – government site .uk – United Kingdom

.com – commercial site .au - Australia

.net - network

Search Skills and Tools


1. Boolean Logic – narrows, broadens, or eliminates search term.
a. Boolean “or” – this operator will find
pages that include either of the search
terms.
Ex. A or B

_____________________________________________________________________________________
10 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
b. Boolean “and” – this operator will
retrieve only pages containing both terms
Ex. A and B

A B
c. Boolean “not” – this operator will find
pages that do not include search term
immediately following it.
Ex. A not B

A B

2. Phase Searching – is used to search for famous quotes, proper names,


recommendations, etc. It encloses the phrase in quotation marks.
Ex. ―Jane Doe‖ ―To be or not to be‖

3. Plus (+) – indicates that the word after the sign is a required word must be
found in search. Example: +fire

4. Minus (–) sign – indicates to exclude a word from your search that is not
required on the result. Example: Jaguar speed –car

5. Ampersand (@) is used to find social tags. Example: @SteveJobs

6. Hashtag (#) is used to find popular hashtags. Example: #LawOfClassroom

7. Finding Documents – using the filetype refines the search for documents on
the web.
o filetype:pdf
o filetype:doc
o filetype:xls
Ex. ICT in the Philippines pdf
8. Searching Site – the sites find webpage from a website.
Ex.: National Geographic information in Australia
Search: Australia site: NationalGeographic.com

_____________________________________________________________________________________
11 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
RULES IN DOING THE ACTIVITY

1. Find a place in your home where you can study well.


2. Have a chair and table. Make sure you have the materials you need like paper, pen,
pencil, etc.
3. Read carefully and understand the lesson. Then, you can start answering the activity.

Activity 1. Multiple Choice Test.


Instruction: Read and analyze each statement below and carefully choose the letter that best
describe the statement. Encircle the letter of the correct answer.
1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.

2. What is considered shouting over the Internet?


A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.

3. It is OK to forward or post an email message that you received if __________


A. the message is typed in all capitals.
B. the author of the message has given you permission to forward or post it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as confidential.

4. What is a flame in cyberspace?


A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.

5. Knowledge and understanding of netiquette is useful because ___________


A. it will help you create a positive impression on those you meet in cyberspace.
_____________________________________________________________________________________
12 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
B. it explains some of the technical limitations of online communications.
C. it explains the conventions already being used by millions of cybernauts.
D. All of the above.

6. What type of online threat happens when an attacker uses electronic devices to do
unwanted surveillance against its victim?
A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking

7. What type of online threat happens when the attacker impersonates another
individual or organization to gather personal or business information?
A. Cyberstalking B. Spoofing C. Scamming D. Pharming

8. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion

9. What is the golden rule of netiquette?


A. Remember the human. C. Use correct grammar.
B. Put a smiley in every message. D. Respect people’s time.

10. You get an email telling you that you won a hundred thousand without joining in a
competition. You should ____________.
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge

11. What type of malicious program is designed to replicate itself and transfer from
one computer to another either through the internet or local networks or data
storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

12. What harmful online programs are designed to send you advertisements, mostly
pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

13. What harmful online program is used to record keystrokes done by users to steal
passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

14. What is ransomware based on?

A. Fear of hackers C. Fear of spyware


_____________________________________________________________________________________
13 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
B. Fear of the Internet D. Fear of losing important files

15. Which of the following is an example of a ―phishing‖ attack?


A. Sending someone an email that contains a malicious link that is disguised to
look like an email from someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order
to trick users into entering their login information.
C. Sending someone a text message looks like a notification that the person
has won a contest.
D. Sending someone an email that records their keystroke activities while
using their computers.

16. Which of the following must NOT be done if you received an embarrassing picture
from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.

17. What is a flame in cyberspace?


A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.

18. What is considered shouting over the Internet?


A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.

19. To avoid being cyber-bullied you should always...


A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on
Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.

20. How are you judged in cyberspace?


A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your
spelling, grammar, and netiquette.

_____________________________________________________________________________________
14 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
C. You are judged by your intent - if you didn't mean to hurt someone's
feelings, then it's okay.

Activity 2. Shared or Not Shared? That is the Question


Instruction: Read and reflect each item carefully. Answer and check the space whether you
have shared or not shared these pieces of information in all your social media accounts.

TYPE OF INFORMATION SHARED NOT SHARED

First Name

Middle Name

Last Name

Current and Previous School/s

Your cellphone number


Complete name of mother and
father
Your parents’ cellphone numbers

Name of Siblings

Your Address

Your Birthday

1. How many of these information have you SHARED?


__________________________________________________________
__________________________________________________________
________________________________________

2. How many of these information have you NOT SHARED?


__________________________________________________________
__________________________________________________________
________________________________________

3. Based from your answers above, do you think you are safe when using the Internet?
Why?
__________________________________________________________
__________________________________________________________
________________________________________
_____________________________________________________________________________________
15 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Activity 3. Show Me How You Hashtag
Instruction: Look at the following images and create a hashtag based on the type of online
threat represented by each image. Write your answers on the space provided.

1. #__________________ 2. # _________________

3. # __________________ 4. # _________________

5. # _________________

HONESTY PLEDGE:

I hereby pledge that I took this tasks with all honesty and integrity.
______________________________ ____________________________
Student’s Signature over Printed Name Parent’s Signature over Printed Name

_____________________________________________________________________________________
16 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester
Key to Correction

Activity 1. Multiple Choice Test.

1. A
2. B
3. B
4. D
5. D
6. D
7. B
8. A
9. A
10. B
11. C
12. A
13. B
14. D
15. A
16. B
17. D
18. B
19. C
20. B

Activity 2. Shared or Not Shared? That is the Question

Note: Answer may vary

Activity 2. Show Me How You Hashtag

1. #Spyware 3. #Worms #Virus 5. #Pharming


2. #Adware 4. #Phishing

_____________________________________________________________________________________
17 | Page GLOBAL I.T. – GOA CAMPUS
Self – Learning Module, Second Semester

You might also like