Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

OFFICE of the GOOD SHEPHERD ACADEMY

OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

MODULE
TOPIC: Rules of Netiquette
2
Content Standard: Performance Standard:
The learners demonstrate an understanding of: ICT in The learners should be able to independently
the context of global communication for specific compose an insightful reflection paper on the nature
professional track of ICT in the context of their lives, society, and
Most Essential Learning Competency:
professional tracks

Most Essential Learning Competency:


 Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would
relate to their specific professional tracks
Time frame: 2 weeks

Learning Targets:
1. Consider one’s and others’ safety when sharing information using the Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper
referencing.

BRAIN TEASER

Good Day! After having been informed on the objective of this


module, let us have the first activity that will gauge your
understanding of using ICT properly and avoiding the different
Internet threats.

Directions: Write Yes if you agree with the statement and No if you disagree on the blank
before each number.

____ 1. My Computer has an antivirus so it is okay to open most email attachments like e-
cards and video files.
____ 2. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in-game money. She promises to keep
your password a secret. Is it okay to give away your password?
____ 3. Letting people know your birthday is probably a must if you want to get as many gifts
as possible. But having it in your profile makes you vulnerable to identity theft.
____ 4. You forgot that your essay for English class is due tomorrow. While doing your
research, you found a website offering free essays. Is it okay to use the essays from
this free essay website?
____ 5. Your friend told you that his college application was rejected because you posted a
video of him doing crazy stuff at a party. You posted the video several years ago but
later took it down to protect your friend’s reputation. Can your friend be right that the
college found the video?

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

What’s In
Nice one! You did great today. Have you had a
challenging experience? I am sure that it will be
easier for you this time. Let’s do this test.

1. Most of us use the internet every day. Sometimes, we do not pay attention on how
much information we share online. Below is a questionnaire about how much
information you have shared so far. Put (√) mark under Shared or Not Shared.

How Safe are you?

Information Shared Not Shared


First Name
Last Name
Middle Name
Current and previous school(s)
Cellphone number
Names of your mother and father
Names of your siblings
Address
Home phone number
Birthday

How many checks did you have for shared?

You probably answered Shared in the first two items.

If that is the case, try using search engine like Google Then type
your first and last name.

Did you get links to your profile page?

Try switching to image search.

Did your Picture appear?

If you have a unique name, chances are, it did. Do not feel bad if
it did not appear thou; in fact, it is probably for your best
interest not to have pictures of yourself in search engine.

So how did these things happen?

How can search engines locate you?

Is there any danger of being found by search engine?

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like most
things in this world, there is always “another side of the coin.” The Internet is one of the most
dangerous places, especially if you do not know what you are doing.

Let go back to the “How Safe Are You?” test.


Let us visit each item and see how risky it is to
share personal information.

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

The internet is defined as information super


highway. This means that anyone has access to this
highway, can place information, and can grab that
information.

Any information, even things that you have set


privately. This is why social networking sites like
Facebook continue to improve their security
features.

The threat of cybercrime is very real

While you may not experience the threat now,

whatever information we share today


could affect us in the future.

Tips to stay safe Online


The internet is a public place and it is up to you to protect yourself. Here are some tips to help
you stay safe when using Internet.
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by
adding password.
13. Never post anything about future vacation.
14. Add friends you know in real life.
15. Avoid visiting untrusted websites.

Most people would dispute that there is no such thing as private over the internet and
they may be right. There are hackers who can find a backdoor even if your profile is
already set to private. You have no control of who whoever is looking at your friend’s
screen whenever they open your profile or chat with you. You have no control over
people getting access to your friend’s account and seeing your private stuff.

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

ACTIVITY 1: Privacy Policies


Directions: Visit a social networking site and look for the site’s privacy policy. The
link is typically found at the bottom of the page and sometimes labelled only
“Privacy”. Write a summary on how the website handles both your private and
public information.

Write your Answer on Attachment 1


(To be submitted on the 5th day of October)

CHALLENGE QUESTIONS

How did you know you know that your computers/systems had
a virus?

What have you done to prevent or remove the virus?

Internet Threats

1. Malware – stands for Malicious Software.


2. Spam – unwanted email mostly from bots or advertisers.
3. Phishing – its goal is to acquire sensitive personal information like passwords and credit
card details.

Malware
a. Virus – a malicious program designed to replicate itself and transfer from one computer
to another.
b. Worm – a malicious program that transfers from one computer to another by any type
of means.
c. Trojan - a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get you
information.
* Rouge security software
d. Spyware - a program that runs in the background without you knowing it.
* Keyloggers – used to record the keystroke done by the user.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.

Protecting Reputations Online

In the past, doing something embarrassing was not much a big deal. Nowadays,
embarrassing moments are captured using any device you could imagine. This could impact
not only your reputation but also the people around you.

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

Think Before You Click

1. Before you post something on the web, ask these


questions to yourself:

Would you want your parents or grandparents to see it?


Would you want your future boss to see it?

Once you post something on the web, you have no control of


who sees your posts.

2. Your friends depend on you to protect their reputation online. Talk to your friends about
this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.

Copyright Infringement
1. Understand. Copyright protect literary works, photographs paintings, drawings, films,
music (and lyrics), choreography, and sculptures.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid
defense against copyright.
3. Be creative. Ask yourself whether what you are making is something that came from
you or something made from somebody else’s creativity.
4. Know the law. There are some limitations to copyright
laws. For instance, in the Philippines, copyrights only last a
lifetime (of the author) plus 50 years. There are also
provision for “fair use,” which means that an intellectual
property may be used without a consent as long as it used
in commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching, and
education. If you have doubts that what you are doing does
not fall under the policy of fair use, seek permission first.

Another misconception is that fan-fiction is not copyright infringement. In reality, it is and


some copyright holders ignore them but they can opt to use their rights.

If you create something—an idea, an invention, a form of


literary work, or a research, you have the right of how it
should be used by others. This is called intellectual
property.

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

Online Research
The information that we need is more likely already on the internet. It is just a matter of how to look for
it and how to use information from the most credible source. Here are some tips in conducting online research:
1. Have a question in mind. Focus on a question you want answered.
2. Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to determine the most
appropriate result for you.
3. Advanced Search. The best way to filter information you get from search engines is by using the
advanced search.

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

4. Look for a credible source. Some wikis, filled with updated information, are not a credible source. When
using wikis, check out the link of the cited text.

This is due to the fact that anyone can edit its content

5. Give credit. Give credit to the original author of the page or


information. To properly site a reference, you may use the format below.

Name of the person or organization (the author of the information). Title of the home page in Italics (title
is shown in the bar but is sometimes missing or unrelated). URL. Date last seen.

Examples:

Lapis, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”


http://oleander.penz.com/random/bananalove/html.Lastview on September 7, 2015

“Accounting: What should know.” Jargon Online Network.


http://www.jargononline.com/accounting101.html. Last viewed on april 13, 2015

Performance task1: Cyber News Report


Directions: Search for several news and events related to cybercrime. Using your
cellphone or any video recording device, report it as if you were a newscaster.
Present in one- to two-minute recording.

(To be uploaded on the 5th day of October


in our google classroom)

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

Performance task2: Cyber News Report


Direction: Create an Infomercial about “think before you Click.”

(To be submitted on the 5th day of October


Save it in your flash drive)

Resources
Lessons: Rex Book Store, Empowerment Technologies innovative training Works, Inc. First Edition
Images: Google images
Fb pages: Empowerment Technologies (EmTech) for Teachers

Attachment
Name: ______________________________ Score: ______________
Grade/ Section: _______________________ Date: ______________
1 Privacy Policy

Directions: Visit a social networking site and look for the site’s privacy policy. The link is typically found
at the bottom of the page and sometimes labelled only “Privacy”. Write a summary on how the website
handles both your private and public information.

Name of Website: _________________________________________


URL: ______________________________________________________________________

Summary:

Name of Website: _________________________________________


URL: ______________________________________________________________________

Summary:

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

Name of Website: _________________________________________


URL: ______________________________________________________________________

Summary:

Rubrics: Content = 10 Organization = 6 Grammar = 4

Attachment
Name: ______________________________ Score: ______________
Grade/ Section: _______________________ Date: ______________
2
Directions: Answer the following questions.

1. Do you agree with the provisions of the copyright law? Defend you answer.
2. How would you feel if someone posted something embarrassing about you?
What would you do?

Mr. Hanzel R. Mangao


EmTech Teacher
OFFICE of the GOOD SHEPHERD ACADEMY
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: mygsa_66@yahoo.com

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11 S.Y. 2020-2021

Rubrics: Content = 10 Organization = 6 Grammar = 4

Mr. Hanzel R. Mangao


EmTech Teacher

You might also like