Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

5

EPP

Quarter 1 – Module 1/ Week 3-4:


“ Safe and Responsible use of ICT”

TABLE OF CONTENTS
Title Page

Introductory Message 2
For the Teacher 2
For the Students 2
Reminder 2
What I Need to Know 3
What I Know 4
What’s New 5
What is It 6
What’s More 8
What I Have Learned 8
What I Can Do 9
Assessment 9
Additional Activities 10
Answer Key 11
References 12
Introductory Message
For the teacher:
Welcome to the EPP 4 Alternative Delivery Mode (ADM) Module on Safe and
Responsible use of ICT
This module was collaboratively designed, developed and reviewed by the
teacher or facilitator of Mother of Perpetual Help School, Inc. in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal,
social, and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this also aims
to help learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.
For the learner:
Welcome to the EPP 4 Alternative Delivery Mode (ADM) Module on Safe and
Responsible use of ICT
This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
REMINDER:
The following are some reminders in using this module:
1. Use the module with care.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are not
alone.
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!
What I Need to Know

This module was designed and written with you in mind. It is here to help you will
find different activities where you can learn and show your understanding of the basic
concepts and principles of Importance of Entrepreneurship. The scope of this module
permits it to be used in many different learning situations. The language used
recognizes the diverse vocabulary level of students. The lessons are arranged to follow
the standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.

The module has only one lesson with the title:


 Safe and Responsible use of ICT

After going through this module, you are expected to:


1. discuss how to use the computer and internet safely
2. explain how to use antivirus in the computer.
3. explain the common security procedures related to use internet.

What I Know

Directions: Analyze the situations below. Identify what kind of internet threat is specified
in each situation. Write PH for phishing, IS for internet scam, CS for cyberstalking, CB
for cyberbullying, or ET for extortion. Write your answer on the lines.
__________1. Ara opens her email inbox and sees mail from an unknown organization
containing a link saying that she won a certain amount from a raffle draw.
The link leads to a fake login page that requires her personal information.
__________2. Angela became the object of harassment by strangers after someone
posted on a website an offer of sexual services in her name. The post
included her photo, phone number, and home address.
__________3. Jhaymiel receives an email that asks him for help to retrieve a large sum
of money from bank and paying initial amount/fee for processing the
documents and legal matters. In return for his help, the sender promises
him a very large sum of money.
__________4. Anna was convinced by a stranger she met online to do a photoshoot
that required her to pose in proactive ways. He later threatened her by
saying that if she does not got out on a date with him, he would post
her pictures online.
__________5. Dinah was forced to transfer a large amount of money in exchange for
keeping her sexy pictures from being posted on a website.

Lesson
EPP: Safe and Responsible use of
2 ICT

Nowadays, people rely on computers for various different purposes. Computer


softwares and programs suggest way it organize, research and save information. Some
applications even serve as a means to bring users closer to each other and make
transactions easier, less time consuming and more efficient.

What’s New

ACTIVITY: TASK EXPLORER

Directions: Give five ( 5 ) areas that show the usefulness of the internet in daily life.
Explain each briefly.

1.____________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

2.____________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

3.____________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
4.____________________________________________________________________
______________________________________________________________________
______________________________________________________________________
5.____________________________________________________________________
______________________________________________________________________
______________________________________________________________________

What is It

INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)


Information and Communication Technology or ICT refers to a set of technological
Tools and resources you can use to share, communicate, collaborates, manage, store
and retrieve information.
USING THE COMPUTER SAFELY
Computer usage is increasing all over the world. However, using computer can also be
dangerous. This lesson will tell you how to safely work on your computer.
1. Never touch any of the circuit boards inside the computer while it is turned on. You
will risk electrical shock and possibly ruin your computer.
2. Use your common sense. While working on your computer, never move, slide, bump
or pick-up the computer or your risk ruining the hard disks and possibly create other
problem.
3. Make sure you know what your doing while dealing with the software of your
computer.
4. Understand fully what needs to be done before tampering with settings and
properties and settings in any of your malfunctions programs.
5. If you cannot find the cause of the problem or fix it, try changing settings and
properties to see if that solves the problem.
6. Always make sure the electricity is off before touching any hardware.
7. When handling hardware, be careful to keep your fingers on the sides of the board or
on some sort of plastic to avoid getting oil from your fingers onto delicate electrical
circuits imprinted on the board.
8. Always be gentle with hardware. If something won’t go in check to see if it is the right
slot for that part.
9. Make sure to discharge your body of any static charge that might be build up on you.
10. Never have liquids or solids near a computer you are working on.Either of these
two things when introduced onto the hardware of computer will create damage.
11. Install ( or have somebody else install ) an anti-virus and an anti-spyware software.
It is best to check what files are infected before lettings the virus scanner delete the file.
12. Never share financial information over the internet. Always use some sort of privacy
program like encryption or anonymous IP when dealing with banking or anything that
requires a credit card number.

USING INTERNET SAFELY


The internet is a means of connecting your computer to another computer anywhere in
the world via routers and servers. It is a powerful tool that you use everyday at home or
in school. It has wide use in many areas. Below are some of them.

COMMUNICATION
-People living far from each other used to communicate through phone calls letter
sent through postal system or telegram. Today, the Internet makes communication fast,
easy and convenient. People can communicate with each other by sending electronic
mail or by using social media applications to conduct video chats or send instant
messages.
RESEARCH
- The internet has become major source of information. Using a mouse button or
keys on the keyboard, you can find information you need about any subject through the
internet.
EDUCATION
- Teachers and pupils used to rely on available books for their resources. With the
advent of the internet, more resources and opportunities have become available to
make learning accessible, effective and enjoyable.
FINANCIAL TRANSACTIONS
- The internet has made online money transfer as convenient as checking your
email. There is a variety of online services for money transfer and bills payment using
your computer or mobile devices.
REAL-TIME NEWS AND INFORMATION
- You can be updated about news, issues and events in different parts of the
world. There are various websites that provide real-time updates in sports, politics and
finance business, entertainment, among others.
TRAVEL TRANSACTIONS
- The internet makes online transportation booking and ticket purchase possible. A
number of bus, airline, shipping and railway companies now have websites where you
can select from various destinations and scheduled trips, choose seats, purchase
tickets, and even arrange for port or station transfer and accommodations.
JOB SEARCH
- The internet is useful for people who are searching for jobs. There are several
websites that post current job openings in the Philippines and even in other countries.
ONLINE SHOPPING
- The internet is useful for shopping. There are numerous websites that offer home
appliances, electronic devices, car parts and accessories, beauty and fashion items,
toys, food and many other products and services.

INTERNET SAFETY AND SECURITY


Almost every information you need is available on the internet. You can do many tasks
through the internet. With the different possibilities in the use of the interne, you need to
understand your responsibility in observing safety rules.
Information security breaches and threats to personal safety have increased
exponentially with the number of users, applications and tools available online. You
should be aware of some practices related to these breaches and threats so that you
have safe and secure online experiences
Internet Scams
- These are schemes used by thieves to deceive and take advantages of users. An
example is an online shopping scam, where scammers pretend to be legitimate sellers
by using fake website.
Phishing
- This is a type of scam in which information thieves disguise themselves as other
people, friends relatives or even yourself obtain one’s personal information, such as
username, password and credit card details for malicious reasons.
Cyberbullying
- This is a form bullying using electronic devices such as cell phones or
smartphones, tablets and computer through communication tools such as instant
messaging, social media, email among others.
Cyberstalking
- This occurs when a user is being harassed or threatened by another user though
email, instant messaging, social media or chat rooms.

EXTORTION
- This is a form of blackmail. Extortion is the act of demanding money from victims in
exchange of keeping information or photos that will embarrass them or harm their
reputation.

HERE ARE SOME GUIDELINES FOR YOUR ONLINE SAFETY AND SECURITY:
1. Use strong password.
- A password is a secret code use to access an account or document.
2. Be Wise
- Be careful with the information you give online. Do not give personal information
such as your home address or telephone number, when someone asks for it or
when website requires you to enter them. Never give your private information.
Do not communicate with strangers online or accept anything that they offer.

3. Shop Safely
- Make sure that the online store you are accessing to shop uses security tools
before you purchase an item.

4. Watch out for scams


- Do not click links inside unwanted emails or website as this could lead to
phishing. By clicking the link, you will be directed to unwanted website that asks
for your personal information, which they can use to steal or extort money from
you.

5. Update your security software regularly


- Ask your parent or your teacher to make sure that antivirus or other security
software is updated to detect malicious software that can harm your computer.

What’s More
Activity 1.1 ADVANTAGES AND DISADVANTAGES
Directions: Do the following steps.
1. Launch your web browser.
2. Using your search engine, search on the advantages and disadvantages of using the
internet.
3. Fill the following table below:

DISADVANTAGES OF USING THE


ADVANTAGES OF USING INTERNET
INTERNET
What I Have Learned

1. Information and Communication Technology or ICT is a set of technological


tools and resources used to share, communicate, collaborate, manage, store
and retrieve information.
2. The internet is an electronic communications network that connects
computers, devices, and facilities around the world.
3. The internet is used in the following areas:
- communication
- research
- education
- financial transaction
- real-time news and information
- entertainment
- online booking
- online shopping
4. The following are some of the common practices that threaten safety in using the

Internet.

- phishing
- internet scams
- cyberstalking
-cyberbullying
-extortion
5. The following are tips to keep you safe online:

- Strong passwords in creating your online accounts.


- Be wise in giving personal information.
- Shop safely by checking the security option of online stores
-Watch out for scams
-Update your security software regularly

What I Can Do

ACTIVITY 1.2 HIGHEST NUMBER OF INTERNET USERS WORLD


WIDE
Directions: Using the internet, search for the top 10 countries with highest
number of internet users. Fill the table below:

Top 10 Countries with the Highest Number of Internet Users


Rank Country Population Internet Users

Assessment

Direction: Chooses the correct answer. Write the letter on space provided.
_________1. These are the schemes used by thieves deceive and take advantages of
users.
a. Internet Scams b. Phishing c. Cyber stalking
_________2. This is a type of scam in which information thieves disguise themselves
as the other people, friends, relatives or even yourself to obtain one’s
personal information.

a. Internet Scams b. Phishing c. Cyber stalking


_________3. This occurs when user is being harassed or threatened by another user
through instant messaging, social media or chat rooms.
a. Internet Scams b. Phishing c. Cyber stalking
_________4. This form of bullying using electronic devices such as cellphones or
smartphones, tablets and computers through communication tools such as
Instant messaging, social media, email, among others.
a. Cyberbullying b. Extortion c. Phishing
_________5. This is a form of blackmail. It is act of demanding money from the victim in
exchange of keeping information or photos that will embarrass them or
or harm their reputation.
a. Cyberbullying b. Extortion c. Phishing

Answer Key

What I know Assessment


1. IS 1. A
2. ET 2.B
3. PH 3.C
4. ET 4.A
5. ET 5.B
References
BOOK :
MY COMPUTER
Authors: NOLETTE C. GARCIA

You might also like