Professional Documents
Culture Documents
Rules of Netiquette: Communication Technology/ /intro - HTML Collaborate-The-Creative-The-Practical
Rules of Netiquette: Communication Technology/ /intro - HTML Collaborate-The-Creative-The-Practical
LESSON OUTLINE
Rules of Introducti
on/
Review
Solicitation of perceptions about Rules of
Nettiquette.
Netiquette
the etymological meaning of Netiquette and define
what the term means.
1. Discuss with the students the different types of information they should not publicly disclose
through the social media. Explain the risks of doing so.
Page 2|5
EMPOWERMENT TECHNOLOGIES TEACHING GUIDE
Teacher Tips
Page 3|5
EMPOWERMENT TECHNOLOGIES TEACHING GUIDE
3. CHALLENGE QUESTION: How is your digital media life like? Hint: You have to think
figuratively.
Think about your life with media.7 First consider the questions below. Use your responses to
help you finish the statement, “My media life is like a ...” This statement is a simile, a literary
device for comparing two unlike things. For instance, someone who does not use much media
might say that her media life is like a desert, because there is little life there. Someone might
say that his media life is like a track meet, because he is exhausted at the end of the day.
Finally, make a picture or drawing of the simile you created. The drawing can include text.
Questions to consider:
● Are digital media a big part of your life?
● What kind of impact do digital media have on you (a little, some, a lot)?
● What are your favorite and least-favorite things to do with digital media?
● Do you connect with others or create things with digital media? Finish this statement:
My media life is like ___________________________________________ because
1. ___________________________________________________________________
6. Lecture on the ways through which research may be free from infringement.
• As an activity, the teacher may divide the class into groups and ask each group to present an infommercial or a campaign with the
theme "Think before you click."
Page 4|5
EMPOWERMENT TECHNOLOGIES TEACHING GUIDE
1. Together with the group from Cyber News Reporting, ask the learners to create materials
promoting “Think Before You Click”. It could be a form of small posters and bulletin boards or
Graffiti Wall as approved by the school and shall be posted on their social media networking sites
such as Facebook and Twitter. This campaign is an awareness program for the younger batcher of
your school.
Directions: Identify the following based on the given description. Write the answer after each sentence.
1. This means that an intellectual property may be used without a consent as long as it is used in
commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and
education.
2. A more complicated way of phishing where it exploits the Domain Name Service system.
3. Acquires sensitive personal information like passwords and credit card details
4. It is a malicious program designed to replicate itself and transfer from one computer to another.
5. This stands for malicious software.
6. This is a crime committed or assisted through the use of internet.
7. A part of the law, wherein you have the rights to your work, and anyone who uses it without your consent
is punishable by.
8. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your
PC unprotected and allows hackers to get your information
9. This tells the users how the website will handle its data.
10. These are mostly pop-ups, a program designed to send an advertisements.
Page 5|5