Professional Documents
Culture Documents
Com.-Sci1 Q4 Wk3 GLAK
Com.-Sci1 Q4 Wk3 GLAK
Com.-Sci1 Q4 Wk3 GLAK
COMPUTER SCIENCE 1
Guided Learning Activity Kit
Internet Ethics
Quarter 4 - Week 3
1|P age
Computer Science 1 – Grade 7
Guided Learning Activity Kit
Internet Ethics
Quarter 4 - Week 3
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Introduction
Learning Competency
Objectives
At the end of this guided learning activity kit, you will be able to:
a. discuss some risks in using the internet,
b. cite some ways on how to be safe in using the internet,
and
c. identify internet etiquettes and apply them in a given
situation.
1|P age
Review
Cite some services used on the internet that you learned from your
previous Guided Learning Activity.
1. ____________________________
2. ____________________________
3. ____________________________
4. ____________________________
5. ____________________________
6. ____________________________
7. ____________________________
8. ____________________________
Discussion
3. Pharming
It is an attack on a website, wherein, once you access that website
you will be redirected to a false website. Those people who do this
aim to collect log-in details or finance-related information that they
can use to access accounts and steal from them.
4. Computer Virus
It is a computer program that sometimes appears as a safe file but
once opened will reproduce itself and infect other installed programs
on your computer and caused harm to your system or files. It can
be introduced into your computers when downloading files from
untrusted sources or when using external devices that you insert
into your devices. It might cause you to lose files or makes your
computer malfunction.
These are just some internet threats that anyone of us may encounter, but
then, with the right knowledge and attitude, can surely be avoided. Here are
some tips on how to be safe in using the internet.
3|P age
your name or birthday. It may include other characters or symbols
aside from numbers and letters to make it stronger and unique.
3. When using social media networks, make sure to check their security
features first. Add friends on your social media that you personally
know and trusted and avoid giving information to people you barely
know. Also, do not post information that will allow people to track your
whereabouts.
5. Install genuine software packages and programs that are trusted and
will help you protect your computer from unwanted access or virus.
Always keep your programs/software updated and regularly check for
viruses or malicious programs that may harm your computer.
4|P age
3. Be respectful of other people’s time. For example, when sending email
or messages concerning your work, limit your messages on what is
necessary.
4. Make a good impression by making sure that your messages are of good
quality. And when sharing facts, make sure that it is credible and
accurate and always give credits to your resources.
5. When dealing with some discussions online, learn how to control your
emotions in expressing your opinion.
Activities
Guided Practice 1
Directions: Read each statement carefully. Write a checkmark on the items
that you agree to be safe from internet threats.
_____ 3. I will open all emails that I will receive even if I do not know
their sender.
5|P age
_____ 5. I will install a genuine antivirus on my computer to keep it safe.
_____ 6. I will access all websites and will give my information to find
new friends.
_____ 9. When I am using a public computer, I will make sure to log out
all my accounts on the sites that I visit.
Guided Practice 2
Directions: Read each statement carefully and tell whether each follows the
internet ethics discussed. Write E if it is ethical or U if it is not.
_____ 5. When sending files, I make sure to include only important and
necessary details.
6|P age
_____ 9. I think first of what people will feel before posting on my social
media accounts.
_____ 10. I am willing to extend my help to people when they are not
so familiar with the platform that we are using for meetings.
Independent Practice
Directions: Read each scenario carefully. Identify what threat is illustrated in
each. Below each scenario, write a paragraph on how you can avoid this
threat.
1. Ana is a music lover. She loves to download songs and videos on her
computer every time she hears a new song. One day, her computers
started to malfunction, and all her files were no longer accessible. What
do you think happened to Ana’s computer and what can you do to avoid
the same problem?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
2. Kiko loves to surf the internet and check on different websites. One day,
he received an email from an unknown source. When he opens it, he
was directed to a site and logged in using his credit card number. After
a few days, he learned that his card was used by someone in purchasing
an expensive item.
What internet threat did Kiko experience and what can you do to avoid
it?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
7|P age
Assessment
1. Jun loves to socialize with people online. There were also instances
that his friends confide with him about their personal problems
because he makes sure that his messages are respectful and would
not offend other people. Aside from Jun, some of his friends also
know his password and can access his accounts. One day, someone
shares with him a personal matter. Unfortunately, one of his friends
who knows his password seen it and shared it publicly.
Ethical: ________________________________________________________
Unethical: ______________________________________________________
Ethical: _________________________________________________________
Unethical: _______________________________________________________
8|P age
Reflection
Key point 1
_____________________________________________________________________
_____________________________________________________________________
Key point 2
_____________________________________________________________________
_____________________________________________________________________
Key point 3
_____________________________________________________________________
_____________________________________________________________________
References
https://grade12snhs.files.wordpress.com/2019/06/media-and-
information-literacy-tg.pdf
9|P age
10 | P a g e
Guided Practice 1
1.
Independent Practice 2. ∕
Answers may vary. 3.
4. ∕
Assessment 5. ∕
Answers may vary. 6.
7.
Reflection 8.
Answers may vary. 9. ∕
10.
Guided Practice 2
1. U
2. E
3. U
4. U
5. E
6. U
7. U
8. E
9. E
10. E
Key to Corrections
Acknowledgment
The Schools Division of Zambales would like to express its heartfelt gratitude
to the following, who in one way or the other, have contributed to the successful
preparation, development, quality assurance, printing, and distribution of the
Quarter 2 Guided Learning Activity Kits (GLAKs) in all learning areas across grade
levels as a response to providing the learners with developmentally-appropriate,
contextualized and simplified learning resources with most essential learning
competencies (MELCs)-based activities anchored on the principles of guided learning
and explicit instruction:
First, the Learning Resources (LR) Development Team composed of the writers
and graphic artists for devoting much of their time and exhausting their best efforts
to produce these indispensable learning kits used for the implementation of learning
delivery modalities.
Finally, the parents and other home learning facilitators for giving the learners
the needed guidance and support for them to possibly accomplish the tasks and for
gradually helping them become independent learners.