Week 2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Division of Masbate

NABONGSORAN HIGH SCHOOL


Nabongsoran, Aroroy, Masbate

Name of Learner: ________________ Learning Area: ____________________


Grade Level & Section: _________________ Date: _______________________

LEARNING ACTIVITY SHEET


Quarter 3 Week 2 (Empowerment Technologies)
(Online Safety, Security and Netiquette)

I. Introductory Concepts

The internet is the guiding technology of the Information Technology Age just as the electrical
engine was of the Industrial Age. In these times, more and more people are already engaged in the
use of technology. These people who are raised in a digital, media-saturated world are called digital
natives. No doubt, the Internet has been very useful to us but with the rise of instant messaging, chat
rooms, emails and social networking sites, it can also bring trouble - from cyberbullying to more
serious Internet dangers, including exposure to sexual predators. Thus, internet safety is always our
primary concern.

II. Learning Skill from the MELCs:


Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it
would relate to their specific professional tracks (CS_ICT11/12-ICTPT-Ia-b-2)

Learning Outcomes
At the end of this activity, the learners will be able to;
1. Identify what constitutes appropriate and inappropriate online behavior.
2. Apply internet online safety, security ethics and etiquette standards and practice in the use of ICTs.
3. Discern possible deceptive information and wrongly evaluated data.

III. ACTIVITIES

Activity 1: TEST MY MEMORY!

Directions: Read and analyze the questions carefully. Choose and encircle the letter of the
correct answer.

1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
2. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
3. It is OK to forward or post an email message that you received if __________
A. the message is typed in all capitals.
B. the author of the message has given you permission to forward or post it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as confidential.
4. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.
5. Knowledge and understanding of netiquette is useful because ___________
A. it will help you create a positive impression on those you meet in cyberspace.
B. it explains some of the technical limitations of online communications.
C. it explains the conventions already being used by millions of cybernauts.
D. All of the above.
6. What type of online threat happens when an attacker uses electronic devices to do unwanted
surveillance against its victim?
A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking
7. What type of online threat happens when the attacker impersonates another individual or
organization to gather personal or business information?
A. Cyberstalking B. Spoofing C. Scamming D. Pharming
8. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
9. What is the golden rule of netiquette?
A. Remember the human. C. Use correct grammar.
B. Put a smiley in every message. D. Respect people’s time.
10. You get an email telling you that you won a hundred thousand without joining in a competition.
you should ____________.
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge

ACTIVITY 1: Shared or Not Shared? That is the Question

DIRECTIONS: Read and reflect each item carefully. On the table below check () the space
whether you have shared or not shared these pieces of information in all your social media accounts.

TYPE OF INFORMATION SHARED NOT SHARED


First Name
Middle Name
Last Name
Current and Previous School/s
Your cellphone number
Complete name of mother and father
Your parents’ cellphone numbers
Name of Siblings
Your
Address
Your Birthday

1. How many of these information have you SHARED?

Ans:_________________________________________________________________________

2. How many of these information have you NOT SHARED?

Ans:___________________________________________________________________________

3. Based from your answers above, do you think you are safe when using the Internet? Why?
Ans:_____________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

Online Safety, Security and Netiquette


Online safety refers to the practices and precautions that should be observed when using the internet
to ensure that the users as well as their computers and personal information are safe from crimes
associated with using the internet. Below are personal information that must be kept confidential.
There are numerous delinquencies that can be committed on the internet such as stalking, identity
theft, privacy violations, and harassment. To avoid these online crimes, follow the following online
safety measures: Never give any personal information out about yourself over the internet.

Do not give any banking or sensitive information unless you are sure that it is a reputable business
having a secure service. To make sure that you are in a secured network, the website address should
begin with “https://’ as opposed to “http://”. Never access your accounts by following an email link,
instead type your URL by yourself.

Never open messages or attachments from someone you do not know.

Regularly review your privacy settings in your online accounts to make sure you are
not sharing important personal information.

When using a public computer terminal, be sure to delete your browsing data before
leaving.

Keep your software updated to avoid security holes.

Do not download or install software or anything on your computer or cell phone that
is unknown to you.

Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:
Flame war is a series of flame posts or messages in a thread
that are considered derogatory in nature or are completely
off-topic. Often these flames are posted for the sole purpose
of offending or upsetting other users. The flame becomes a
flame war when other users respond to the thread with their
own flame message.
Image from:
https://twitter.com/Parkster00/status/1246347088625045504

ACTIVITY 2: Can You Keep It Private?


DIRECTIONS: Choose the most appropriate thing to do in the following situation. Encircle the
letter of the correct answer.
1. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
2. Do you have the same passwords for all your accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my accounts.
3. Choose which image below describes how you feel about sharing your password with your
boyfriend/ girlfriend?

C.
A.

.
D.
B.

4. Your parents bought you your first cellphone. How will you share your cellphone number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
5. Your social media friends list should only be composed of ______________.
A. Your favorite brands. C. Anyone who sends you a friend request
B. Family and friends D. Foreigners

Kinds of Online Threats


There is no doubt that you need to be vigilant online. As the World Wide Web evolved over
the years, many internet predators have been playing on vulnerabilities to attack computers and
retrieve sensitive data from individuals. Half the time, we aren’t even aware it is happening until it is
too late.

Online threat is deemed any malicious act that attempts to gain access to a computer
network without authorization or permission from the owners. These are usually done by computer
hackers who uses the World Wide Web to facilitate cybercrime. Web threats use multiple types of
malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other
protocols and components, such as links in email or Instant Messaging apps, or any malware
attachments on servers that access the Web. They benefit cybercriminals by stealing information for
subsequent sale and help absorb infected PCs into botnets. Web threats pose a broad range of risks,
including financial damages, identity theft, loss of confidential information/data, theft of network
resources, damaged brand/personal reputation, and erosion of consumer confidence in e-commerce
and online banking.
The following are the top kinds of online threats that you should be aware of:
Phishing happens when an email is sent from an internet criminal disguised as an
email from a legitimate, trustworthy source. The message is meant to lure you into revealing
sensitive or confidential information.

Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake
website instead of a legitimate one. These “spoofed” sites can capture a victim’s
confidential information, including usernames, passwords, and credit card data, or install
malware on their computer. Pharmers usually focus on websites in the financial sector,
including banks, online payment platforms, or other e-commerce destinations.
IV. Reflection:
What is the best lesson I learned from the task?
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

V. Rubrics
(Activity 1-2 & Activity 4)
5 4 3 2 1
All answers are correct With 1 error With 2 errors With 3 errors With 4 or more
errors

VI. Answer KEY


Activity 1: Test My Memory
1. A 6. C
2. B 7. A
3. A 8. D
4. B 9. C
5. A 10. C
Activity 2: 4 PICS 1 WORD
1.WEBSITE
2. COMPUTER
3. TWITTER
4. CELLPHONE
5. MEDIA
6. NETWORK

Activity 3: Where do I belong?


1. Web 3.0 6. Web 3.0
2. Web 3.0 7. Web 2.0
3. Web 1.0 8. Web 1.0
4. Web 2.0 9. Web 1.0
5. Web 2.0 10. Web 1.0
Activity 4. Which Website Is It?
Answers may vary.

VII. References:
(Empowerment Technology for Senior High School Alternative Delivery Mode
Quarter 1 – Module 1: ICT in the Context of Global Communication First Edition,
2019)
SlideShare

Prepared by:
JECK D. GOMEZ
T-III(SHS) Checked by:
ROSA M. BULANON
HT-I/TIC

You might also like