Professional Documents
Culture Documents
Empowerment Technologies: Quarter 1 - Module 2
Empowerment Technologies: Quarter 1 - Module 2
Empowerment Technologies: Quarter 1 - Module 2
Technologies
Quarter 1 – Module 2:
Online Safety, Security, Ethics, and
Etiquette
Empowerment Technologies – Grade 11
Alternative Delivery Mode
Quarter 1 – Module 2: Online Safety, Security, Ethics, and Etiquette
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Management Team:
Schools Division Superintendent : Romeo M. Alip, PhD, CESO V
OIC-Asst. Schools Division Superintendent : William Roderick R. Fallorin
Chief Education Supervisor, CID : Milagros M. Peñaflor, PhD
Education Program Supervisor, LRMDS : Edgar E. Garcia, MITE
Education Program Supervisor, AP/ADM : Romeo M. Layug
Education Program Supervisor :
District Supervisor :
Division Lead Book Designer : Jenelyn D. Rivero
District LRMDS Coordinator : Pepito B. Hernandez
School LRMDS Coordinator : Cherryl D. Cordova
School Principal, Assigned Subject : Edgardo Jesus S. Basa II
District Lead Layout Artist :
District Lead Illustrator :
District Lead Evaluator :
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this also
aims to help learners acquire the needed 21st century skills while taking into
consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the
body of the module:
As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.
1
For the learner:
As our society faces the ‘new normal’, most of our daily tasks now need the
assistance of Information and Communication Technologies. Thanks to the internet,
because we can now meet and communicate with each other online. Paying bills,
buying goods, growing your network of friends and even learning can be done online.
Life now is almost turning to digital. And it is very important that you not only know
how to use and deal with these technologies but it is necessary to know the different
threats brought by the internet and be equipped on how to be safe and be secured
online. It is also necessary to apply ethics and etiquette online to avoid problems in
facing the digital media.
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning resource while being an active
learner.
What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in the
module.
2
What I Have Learned This includes questions or blank
sentence/paragraph to be filled in to process
what you learned from the lesson.
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.
We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!
3
What I Need to Know
This module was designed and written for you to be able to apply online safety,
security, ethics, and etiquette standards and practice in the use of ICTs as it would
relate to your specific professional track (CS_ICT11/12-ICTPT-Ia-b2).
1. Identify the internet threats from the given scenario by choosing its name from
the choices.
2. Illustrate the power of netiquette by determining which internet threats will
be avoided.
3. Choose online safety and security measures for the given scenario
appropriately.
4
What I Know
MULTIPLE CHOICE: Select the best answer from the choices and write the
letter that corresponds to your answer on the answer sheet.
1. You received a comment from an unknown friend in one of your posts in Social
Media saying “YOU IDIOT!”. What do you call this kind of act?
a. Acting
b. Bullying
c. Blogging
d. Flaming
2. It is an internet threat that acquires sensitive personal information like passwords
and credit card credentials.
a. Malware
b. Phishing
c. Spam
d. Virus
3. It refers to a set of rules for an acceptable online behaviour.
a. Ethics
b. Good Moral
c. Nethics
d. Netiquette
4. This is one form of internet advertising used by advertisers to get the attention of
web users but sometimes has obscene or offensive content.
a. Adverts
b. Cards
c. Infographics
d. Pop-ads
5. It is a software that can see all the things you are doing in your computer.
a. Attacker
b. Hacker
c. Spyware
d. Tracker
6. It is a deceitful practice of getting your personal information using email or text
messages.
a. Blogging
b. Flaming
c. Pharming
d. Phishing
7. It is a small program or script that can negatively affect the health of your
computer.
a. Malware
b. Phisher
c. Spam
5
d. Virus
8. He is a clever or expert programmer who can gain unauthorized access to other
computers.
a. Attacker
b. Hacker
c. Spyware
d. Tracker
9. It is an act of following, secret surveillance, persistent and manipulative calling
and texting, and other means of approaching the victim unexpectedly using online
technology.
a. Cyberbullying
b. Cyber-crime
c. Cyberstalking
d. Tracking
10. It is an act of engaging an underage minor into inappropriate sexual
relationships through the internet.
a. Cyberbullying
b. Cyberstalking
c. Flaming
d. Online Predation
11. It focuses on the acceptable use of online resources in an online social
environment.
a. Good Moral
b. Nethics
c. Netiquette
d. Online Ethics
12. Dan has finished all the written reports. He saved it in a flash drive and he
submitted it to his manager. The manager called him and said that his flash drive
is empty. Dan’s flash drive was infected with ____________.
a. Computer Virus
b. Malware
c. Phisher
d. Spam
13. Precy has received an email from the bank asking her to update her personal
information for security purposes. She clicked the link and signed in.
Unknowingly, Precy is already a victim of ____________.
a. Blogging
b. Flaming
c. Pharming
d. Phishing
14. Devon is fund of taking photos. While they are practicing their play, he takes an
embarrassing photo of Lori who is a very shy girl. He then posts the photo on social
media and spread it to his friends. Lori is a victim of ___________________.
a. Cyberbullying
b. Cyberstalking
c. Flaming
d. Online Predation
6
15. Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in
the address bar and log in to the system. Unknowingly upon signing in, Lily’s
username and password has already been compromised and is now a victim of
___________.
a. Blogging
b. Flaming
c. Pharming
d. Phishing
What’s In
Let’s have a drill. Use your social media account like Facebook. For five
minutes, you are going to do a CLAMP (post a Comment in one (1) minute, one(1)
minute to Like, one (1) minute to Add friends, one (1) minute to Message your friends,
and one (1) minute to Post something with description). Set your timer in doing this.
After doing it, recall and write in a piece of paper all your comments, messages, and
your post. Review it and check whether you did it in an ethical way.
7
What’s New
Match A with column B. Choose from column B the name of the internet threat
being described in column A.
Column B
Column A
8
8. Daine is fond of downloading pirated movies. Then
suddenly, there are pop-ups about upcoming movies
showing on his screen every now and then. And his
computer becomes slow. His computer is already
infected with ____________.
9. Precy has received an email from the bank asking her
to update her personal information for security
purposes. She clicked the link and signed in.
Unknowingly, Precy is already a victim of ____________.
10. Lily knows that the website of BPI Bank is
www.bpibank.com so she typed it in the address bar
and log in to the system. Unknowingly upon signing in,
Lily’s username and password has already been
compromised and is now a victim of ___________.
9
What is It
As our society faces the ‘new normal’, most of our daily tasks now need the
assistance of Information and Communication Technologies. Thanks to the internet,
because we can now meet and communicate with each other online. Paying bills,
buying goods, growing your network of friends and even learning can be done online.
Life now is almost turning to digital media. According to (Preston n.d.), digital media
is any form of media that uses electronic devices for distribution. This form of media
can be created, viewed, modified and distributed via electronic devices. And it is very
important that you not only know how to use and deal with these technologies but it
is necessary to know the different threats brought by the internet and be equipped
on how to keep your private information safe and secure online. Private
information is your sensitive personal information or your identity such as your
username and passwords or bank accounts. Even though the government has
already set a policy, the Republic Act 10173 or the Data Privacy Act of 2012, that
is to protect the fundamental human right of privacy, of communication while
ensuring free flow of information to promote innovation and growth (Republic Act
10173 – Data Privacy Act of 2012 n.d.), it is important to have the knowledge of
maximizing your private information in order to keep it safe and secure is called
online safety or web safety or internet safety. It is also necessary to apply ethics
and etiquette online to avoid problems in facing digital media.
The following are some of the internet threats you need to be aware of:
10
Phishing – is a deceitful practice of getting your personal
information using email or text messages. Scammers may try
to steal your passwords, account numbers, or Social Security
numbers. If they get that information, they could gain access
to your email, bank, or other accounts (Federal Tr. Comm.
’19)
11
Hacker - a clever or expert programmer who can gain
unauthorized access to other computers. He can "hack" his
way through the security levels of a computer system or
network (Christensson, Hacker Definition 2006). And can
vandalizes the victims’ website, steals personal information,
obtains intellectual property, and performs credit card fraud.
12
There are also common threats to personal safety. They are the following:
13
Online Ethics and Etiquette
In order for you to be safe and you can protect your private information while
you are working online, you need to know and apply online ethics and etiquette.
The rules of etiquette are just as important in cyberspace as they are in the
real world (Hartney 2020)
Avoid sending naked sexy pictures, drunk pictures, drug use pictures or
unedited home video. If you would have a problem with your boss, your parents,
or your kids seeing it now, or at any point in the future, don't post it online.
Children should not post private information online. Do not also share your
location or picture where you are currently at. Keep your personal information
private.
14
6. Respect People's Privacy
One example is when you send email to multiple recipients, don’t send it
at once, you can send it privately individually or use BCC (blind carbon copy)
rather than CC (carbon copy). The same goes for uploading photos or videos that
include other people because others who are in this photo don’t want to be viewed
by unknown friends. This also applies for tagging people on Facebook because
others don’t want to be tagged. Another example is don't sign up for newsletters
and other communications using someone else's email address. If you apply this
rule, hackers might not have chance to enter and ruin your digital life.
15
What’s More
In the table below, mark with a check ( ) the internet threats that can be
avoided in doing each netiquette. Internet threats are represented by letter in
the table under Internet Threats column.
Internet Threats
Netiquette
a b c d e f g h i j
16
What I Have Learned
Every walk in our life nowadays deal with Information and Communication
Technologies and online or via the Internet. And it is very important to know how to
deal with these technologies and be aware with the different threats brought by the
internet. So that you can empower yourself on how to keep your private information
safe and secure online. _______________________ is your sensitive personal
information or your identity such as your username and passwords or bank
accounts. Having the knowledge of maximizing it in order to keep it safe and secure
is called _____________ or web safety or internet safety. It is also necessary to apply
__________ and ____________ to avoid problems in facing digital media.
You have learned that the different internet threats you need to be aware of
are computer viruses, spam _____________, email ______________, __________________,
_____________, __________________, ___________________, and spyware.
There are also internet threats that may affect your personal safety. These are
cyberbullying, ____________________, ____________________, and ____________________.
That’s why it is very important to know and apply online _______________ and
_______________. And in order for you to apply netiquette, you must always observed
the 10 netiquettes you have learned.
17
What I Can Do
Suppose that you have a cyberstalker and you want to get rid of him, and you
want to control who can see what you share, it is time for you to set your privacy
settings of your Facebook account. Just follow the steps.
18
Assessment
MULTIPLE CHOICE: Select the best answer from the choices and write the
letter that corresponds to your answer on the answer sheet.
1. It is an act of engaging an underage minor into inappropriate sexual relationships
through the internet.
A. Cyberbullying B. Cyberstalking C. Flaming D. Online Predation
2. It focuses on the acceptable use of online resources in an online social
environment.
A. Good Moral B. Nethics C. Netiquette D. Online Ethics
3. Dan has finished all the written reports. He saved it in a flash drive and he
submitted it to his manager. The manager called him and said that his flash drive
is empty. Dan’s flash drive was infected with ____________.
A. Computer Virus B. Malware C. Phisher D. Spam
4. Precy has received an email from the bank asking her to update her personal
information for security purposes. She clicked the link and signed in.
Unknowingly, Precy is already a victim of ____________.
A. Blogging B. Flaming C. Pharming D. Phishing
5. You received a comment from an unknown friend in one of your posts in Social
Media saying “YOU IDIOT!”. What do you call this kind of act?
A. Acting B. Bullying C. Blogging D. Flaming
6. It is an internet threat that acquires sensitive personal information like passwords
and credit card credentials.
A. Malware B. Phishing C. Spam D. Virus
7. It refers to a set of rules for an acceptable online behaviour.
A. Ethics B. Good Moral C. Nethics D. Netiquette
8. This is one form of an internet advertising used by advertisers to get the attention
of web users but sometimes has an obscene or an offensive content
A. Adverts B. Cards C. Infographics D. Pop-ads
9. It is a software that can see all the things you are doing in your computer.
A. Attacker B. Hacker C. Spyware D. Tracker
10. It is an act of following, secret surveillance, persistent and manipulative calling
and texting, and other means of approaching the victim unexpectedly using an
online technology.
A. Cyberbullying B. Cyber-crime C. Cyberstalking D. Tracking
11. Devon is fund of taking photos. While they are practicing their play, he takes an
embarrassing photo of Lori who is a very shy girl. He then posts the photo on social
media and spread it to his friends. Lori is a victim of ___________________.
A. Cyberbullying B. Cyberstalking C. Flaming D.Online Predation
12. Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in
the address bar and log in to the system. Unknowingly upon signing in, Lily’s
username and password has already been compromised and is now a victim of
___________.
19
A. Blogging B. Flaming C. Pharming D. Phishing
13. It is a deceitful practice of getting your personal information using email or text
messages.
A. Blogging B. Flaming C. Pharming D. Phishing
14. It is a small program or script that can negatively affect the health of your
computer.
A. Malware B. Phisher C. Spam D. Virus
15. He is a clever or expert programmer who can gain unauthorized access to other
computers.
A. Attacker B. Hacker C. Spyware D. Tracker
Additional Activities
Examine the message below and answer the questions that follows. Write your
answers in your notebook.
20
21
Additional Assessment: What I Have
Activities: Learned:
1. D 1. Private
It depends upon 2. D information
the answer of the 3. A 2. Online safety
student 4. D 3. Ethics
5. D 4. Netiquette
6. B 5. Mail
7. D 6. Spoofing
8. D 7. Hacker
9. C 8. Pharming
10.C 9. Phishing
11.A 10. Pop-ads
11. Cyberstal
12.C
king
13.D 12. Flaming
14.D 13. Online
15.B predation
14. Ethics
15. Netiquette
What’s More: What’s In: What I Know:
With check: 1. I 1. D
2. F 2. B
1. b, c, d, f 3. B 3. D
2. b, d 4. D 4. D
3. b, c, d, e, f 5. C
4. b, d 5. C
6. E 6. D
5. b, c, d, f 7. A
6. e, g, h, j 7. D
8. J
7. a, d, g, h, j 8. B
9. G
8. i 10.H 9. C
9. b 10.D
10. a, b, d, f, 11.D
g, h, j 12.A
13.D
14.A
15.C
Answer Key
References
Andrea, Sybil. 2020. "Cyberstalking: definition and laws." NordVPN. February 11.
Accessed June 30, 2020.
https://nordvpn.com/blog/cyberstalking/.
Boyd, Ashley. 2020. Which Video Call Apps Can You Trust? April 28. Accessed June
24, 2020.
https://blog.mozilla.org/blog/2020/04/28/which-video-call-apps-
can-you-trust/.
Burnside, Keith. 2019. "Top 10 Internet Flame Wars." TopTenz. April 30. Accessed
July 2, 2020.
https://www.toptenz.net/top-10-internet-flame-wars.php.
Christensson, Per. 2006. "Hacker Definition." TechTerms. Accessed June 30, 2020.
https://techterms.com/definition/hacker.
Federal Trade Commission. 2019. "How to Recognize and Avoid Phishing Scams."
Federal Trade Commission Consumer Information. May. Accessed June 30,
2020.
https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-
phishing-scams.
Hartney, Elizabeth. 2020. "10 Basic Rules of Netiquette or Internet Etiquette."
Verywellmind. January 13. Accessed July 1, 2020.
https://www.verywellmind.com/ten-rules-of-netiquette-22285.
n.d. "Internet Safety for Kids-Staying safe from online predators." GFCGlobal.
Accessed June 30, 2020.
https://edu.gcfglobal.org/en/internetsafetyforkids/staying-safe-from-
online-predators/1/.
Preston, Lauryn. n.d. "What is Digital Media?" Digital Logic. Accessed June 30,
2020.
https://www.digitallogic.co/blog/what-is-digital-
22
media/#:~:text=Digital%20media%20is%20any%20form,social%20media%2
C%20and%20online%20advertising.
23
Ezez. 2020. Image.
https://img.favpng.com/12/2/20/spam-scalable-vector-graphics-email-
icon-png-favpng-cgZ3qpb3sSM9Td3zKsAA5JKxn.jpg
Ezez. 2020. Image.
https://www.lifewire.com/thmb/i3UqlWLTVSUKcR-
JNmf_FJgt0qw=/768x0/filters:no_upscale():max_bytes(150000):strip_icc()/what-is-
email-spoofing-2483501-41bb3e27626f40c88e227ec6545120a8.jpg
Ezez. 2020.Image.
https://www.cloudbric.com/wp-content/uploads/234.png
24
For inquiries or feedback, please write or call: