Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

E EMPOWERMENT TECHNOLOGIES EMPOWERMENT TECHNOLOGIES

SITUATION ANALYSIS: Read the given situation and identify what SITUATION ANALYSIS: Read the given situation and identify what
online etiquette is violated. Write the letter of the correct answer in online etiquette is violated. Write the letter of the correct answer in
the space provided before each number. the space provided before each number.

a. Always be courteous a. Always be courteous


b. Do not share or post offensive materials b. Do not share or post offensive materials
c. Appropriate your humor and avoid sarcasm c. Appropriate your humor and avoid sarcasm
d. Always acknowledge the owners of the ideas and materials d. Always acknowledge the owners of the ideas and materials
used used
e. Try to be understanding to a maximum tolerance. Be kind. e. Try to be understanding to a maximum tolerance. Be kind.
f. Respect others’ opinions. Deal with everyone with a f. Respect others’ opinions. Deal with everyone with a
humanitarian approach. humanitarian approach.
g. Do not use foul languages and incite anger by writing in g. Do not use foul languages and incite anger by writing in
uppercase and overusing the exclamation mark uppercase and overusing the exclamation mark

____1. John privately shared to Kenneth screenshots of confidential ____1. John privately shared to Kenneth screenshots of confidential
conversations of their other friends. conversations of their other friends.
____2. Gina forgot to credit the photographer of the photos she used ____2. Gina forgot to credit the photographer of the photos she used
in her online campaign. in her online campaign.
____3. Troy uses curses as expressions in online gaming. ____3. Troy uses curses as expressions in online gaming.
____4. Ken ignored the private message from his colleagues to ____4. Ken ignored the private message from his colleagues to
insinuate that he did not know what the message was all about. insinuate that he did not know what the message was all about.
____5. Mia argued with a person in social media as they have ____5. Mia argued with a person in social media as they have
different political opinions. different political opinions.
TRUE or FALSE: TRUE or FALSE:

_____ 1. It is good to use your actual birth date as passwords _____ 1. It is good to use your actual birth date as passwords
because it is easy to remember. because it is easy to remember.

_____2. Online security can be remedied by using firewalls. _____2. Online security can be remedied by using firewalls.

_____3. Plagiarism only happens when there is intentionality in the _____3. Plagiarism only happens when there is intentionality in the
act. act.

_____4. By regularly updating your antivirus software, your _____4. By regularly updating your antivirus software, your
computer will be safer from malware intrusion. computer will be safer from malware intrusion.

_____5. Whatever browser to be used in surfing the net is advisable _____5. Whatever browser to be used in surfing the net is advisable
since all browsers are safe. since all browsers are safe.

_____6. Conversations that are audible or visible in public can be a _____6. Conversations that are audible or visible in public can be a
cause of phishing. cause of phishing.

_____7. Spam mails can be harmful if the message contains links that _____7. Spam mails can be harmful if the message contains links that
may lead to data theft. may lead to data theft.

_____8. It is secure to post your identification card online because _____8. It is secure to post your identification card online because
we are protected by laws. we are protected by laws.

_____9. It is a wise move to inform your parents when someone _____9. It is a wise move to inform your parents when someone
bullies you. bullies you.

_____10. Huge amount of data poses ethical issues, as this can be _____10. Huge amount of data poses ethical issues, as this can be
used maliciously by the ones controlling this data. used maliciously by the ones controlling this data.

ASSESS YOUR LEARNING EXPERIENCE THROUGH ASSESS YOUR LEARNING EXPERIENCE THROUGH
EMOTICONS EMOTICONS
1.I feel that the information given is sufficient and 1.I feel that the information given is sufficient and
manageable. manageable.
2.I think that the activities are relevant and useful 2.I think that the activities are relevant and useful
when I transact online. when I transact online.
3.My encounters in the group activities improved my 3.My encounters in the group activities improved my
collaborative skills and sense of belongingness. collaborative skills and sense of belongingness.
4.I feel glad about my new learning. 4.I feel glad about my new learning.

5.I can now be a more responsible internet citizen 5.I can now be a more responsible internet citizen

You might also like