Professional Documents
Culture Documents
ETECH QTR1 MODULE2
ETECH QTR1 MODULE2
EMPOWERMENT TECHNOLOGIES
RULES OF NETIQUETTE
Quarter 1 – Module 2
11
EMPOWERMENT TECHNOLOGIES
RULES OF NETIQUETTE
Quarter 1 – Module 2
Empowerment Technologies – Grade 11
Self-Learning Module
Quarter 1 – Module 2: Rules of Netiquette
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the
body of the module:
ii
For the learner:
1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other
activities included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with
it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you
are not alone.
We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!
iv
Let Us Learn!
Let Us Try!
Pre-Test
Write Yes if you agree the statement and No if you disagree on the blank
before each number.
_______ 1. My computer has an antivirus so it is okay to open most email
attachments like e-cards and video files.
_______ 2. Your friend told you that his college application was rejected due
to the fact that you posted a video of him doing crazy stuff at a
party. You posted the video several years ago but later took it
down to protect your friend’s reputation. Can your friendbe right
that the college found the video?
_______ 3. You and your best friend play a lot of video games. One time, she
asks you for your password so she can help you level up and get in
game money. She promises to keep your password a secret. Is it
okay to give away your password?
_______ 4. You received an email stating that your mother’s bank account is
going to be forfeited if you do not respond to the email. Is it safe to
reply?
_______ 5. You forgot that essay for English class is due tomorrow. While
doing your research, you found a website offering free essays. Is it
okay to use the essays from this free essay website?
_______ 6. A virus is a malware that multiplies and infects other computers
through flash drives.
_______ 7.Key loggers are software that shows pop-ups ads even if you are
not using your browser.
_______ 8. Search engines scan websites for search results even if you have
set your post to “private.”
_______ 9. There is a danger in posting information about a future vacation.
_______ 10.Letting people know your birthday is probably a must if you want
1
to get as many gifts as possible. But having it in your profile makes
you vulnerable to identity theft.
Let Us Study
Introduction
How many checks did you have for Shared? You probably answered
Shared in the first two items. If that is the case, try using a search engine
like Google then type your first and last name. Did you get links to your
profile page? Try switching to image search. Did your picture appear? If you
have a unique name, chances are it did. Do not feel bad if it bad not appears
though, in fact, it is probably for your best interest not to have pictures of
yourself in a search engine.
How many hours do you spend on the Internet per day? Can you live
without the Internet for a week? Can you live without the Internet for a
week? How many aspects of your life depend on the Internet? How many
times have you complained about your Internet connection speed?
As a teenager, you are all exposed to many things powered by the
Internet. Whether it is socializing, playing games, reading sports news,
shopping, etc., the internet has given you one of the most powerful tools
2
that your parents, during their teenage years, did not have. Because of this,
do you not think that it is also important to wield this powerful tool
properly? Without proper training, a swordsman can easily injure himself
when welding a sword; the same could be said for you whenever you use the
Internet.
3
Internet Etiquette is online communication that makes everyone
comfortable. The internet is a group of computers that are connected,
etiquette is a social code. That is the technical definition of the words.
Combing the words into a term enables it to become a philosophy or part of
one.
Online Etiquette
1. Whenever you work and communicate online, there are some basic rules
you should follow:
Think before you send.
If you send an email or post a message in anger, it could come back to
haunt you later. The same goes for pictures and videos you post
online. Even when something is deleted from a page, it may still be
out there waiting to be found when you least expect it.
2. Respect the time and bandwidth of others. Don’t pass along emails that
contain hoaxes, or send messages to the entire student body. The same goes
for sending large videos or attachments in an email message. It wastes
everyone's time when they have to wade through extra information to get to
the important stuff.
4
Tip1. Be Aware
The best tool to avoid spyware and stay safe on the Internet is your
own brain. Free software with no potential upgrades or strings attached,
websites that are covered in flashy ads, and free Wi-Fi in an unexpected
place are all signs that something may be wrong, and ignoring that intuition
can get you in trouble. By staying aware of what you are doing, and thinking
about your security while you live your online life, you stand a better chance
of avoiding potentially dangerous situations.
5
Tip 5: It's not all about spyware and scams
With all this talk about spyware, hackers and Internet security, it's
important to remember that most people with privacy issues on the Internet
put themselves in that position. Think about social networking sites and
just how much personal information you have posted there. If someone were
trying to steal your identity and needed your father's middle name or where
you went to elementary school — two commonly used security questions —
you need to think about how a thief could locate those facts. If you're
concerned about Internet privacy, you have to consider staying away from
social networking sites, minimizing the information you put out there, or
maximizing privacy settings on these sites.
Let Us Practice
Self-check 1
I. True or False. Write T if the statement is True and F if False. Write your answer
on the space provided.
6
Let Us Study
Internet Threats
Introduction
Java
Because Java is installed on over 3 billion devices – that are running
under various operating systems – exploits can be created to target
specific Java vulnerabilities on several different platforms / OSs.
Adobe Reader
Although Adobe Reader has been targeted by many attacks, Adobe
has implemented tools to protect the program against exploit activity –
so that it’s getting harder to create effective exploits for the
application. However, Adobe Reader was still a common target over
the past 18 months.
Windows and Internet Explorer
Active exploits still target vulnerabilities that were detected as far back
as 2010 – including MS10-042 in Windows Help and Support Center,
and MS04-028 which is associated with incorrect handling of JPEG
files.
Android
Cybercriminals use exploits to gain root privileges. Then, they can
achieve almost complete control over the targeted device.
7
Here are some of the threats you should be aware of when using
internet:
Botnets
If you've never heard of a botnet, it's likely because they go largely
undetected.
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
What it is:
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
8
What it can do:
The most common and obvious type of DDoS attack occurs when an
attacker “floods” a network with useless information. When you type a URL
into your browser, you are sending a request to that site's computer server
to view the page. The server can only process a certain number of requests
at once. If an attacker overloads the server with requests, it can't process
yours. The flood of incoming messages to the target system essentially forces
it to shut down, thereby denying access to legitimate users.
There are steps you can take to reduce the likelihood that an attacker
will use your computer to attack other computers:
Install and maintain anti-virus software.
Install a firewall, and configure it to restrict traffic coming into and
leaving your computer.
Follow good security practices when it comes to maintaining your
contact or email lists. Applying email filters may help you manage
unwanted emails, by automatically processing incoming messages
based on certain criteria that you set.
Be cautious if you notice that your Internet connection is unusually
slow or you can't access certain sites (and that your Internet
connection is not down).
Avoid opening email attachments, especially if they are from people
you don't know.
If you believe you are a victim of a DDoS attack, contact your Internet
Service Provider, as they will be able to help mitigate.
Hacking
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
What it is:
9
Malware
What it is:
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
Pharming
What it is:
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
Convince you that the site is real and legitimate by spoofing or looking
almost identical to the actual site down to the smallest details. You
may enter your personal information and unknowingly give it to
someone with malicious intent.
10
Phishing
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
What it is:
Fake emails, text messages and websites created to look like they're
from authentic companies. They're sent by criminals to steal personal and
financial information from you. This is also known as “spoofing”.
What it does:
Ransomware
What it is:
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
11
Ransom ware will display a notification stating that your computer or
data have been locked and demanding a payment be made for you to regain
access. Sometimes the notification states that authorities have detected
illegal activity on your computer, and that the payment is a fine to avoid
prosecution.
Do not pay the ransom. These threats are meant to scare and
intimidate you, and they do not come from a law enforcement agency. Even
if you submit payment, there is no guarantee that you will regain access to
your system.
If your computer has been infected (i.e. you are unable to access your
computer or your files have been encrypted), contact a reputable computer
technician or specialist to find out whether your computer can be repaired
and your data retrieved.
In order to lessen the impact of a ransomware infection, be sure to
regularly back-up your data with a removable external storage drive. It's
possible that your files might be irretrievable; having an up-to-date backup
could be invaluable.
Spam
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
What it is:
12
What it can do:
Spoofing
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
What it is:
What it does:
Spyware
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
13
What it is:
Collect information about you without you knowing about it and give
it to third parties.
Send your usernames, passwords, surfing habits, list of applications
you've downloaded, settings, and even the version of your operating
system to third parties.
Change the way your computer runs without your knowledge.
Take you to unwanted sites or inundate you with uncontrollable pop-
up ads.
Trojan Horses
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
What it is:
14
Viruses
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
Send spam.
Provide criminals with access to your computer and contact lists.
Scan and find personal information like passwords on your computer.
Hijack your web browser.
Disable your security settings.
Display unwanted ads.
When a program is running, the virus attached to it could infiltrate your
hard drive and also spread to USB keys and external hard drives. Any
attachment you create using this program and send to someone else could
also infect them with the virus.
15
Wi-Fi Eavesdropping
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
What it is:
Worms
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
16
WPA2 Handshake Vulnerabilities
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
Krack can affect both personal (home users, and small businesses)
and enterprise networks. Any devices that are connected to the network,
such as laptops, smartphones, smart devices, even an installed USB key,
can be read by the attacker. A malicious actor could use this vulnerability
to steal sensitive information, and also insert malware or ransomware that
would make a website unsafe to visit.
Krack does not divulge Wi-Fi passwords to attackers, nor does it
permit a malicious device to be connected to the network. Krack is unable to
compromise Virtual Private Networks (VPN) or HTTPS protocols used by
online shopping and banking sites.
Let Us Practice
Self-check 2
9. A part of the law, wherein you have the rights to your work, and
anyone who uses it without consent is punishable by law.
a. Copyright c. cybercrime
b. Fair use d. accessibility
10. This means that anyone has access to this highway, can place
information, and can grab that information.
a. Internet c. netiquette
b. Fair use d. spyware
18
Let Us Practice More
A B
19
Let Us Remember
Let Us Assess
1.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
________________________________________________________________________
________________________________________________________________________
______________________________________________________
20
2.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
________________________________________________________________________
________________________________________________________________________
______________________________________________________
3.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
4.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
_____________________________________________________________________
_____________________________________________________________________
___________________________________________________
21
5.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
Let Us Enhance
Rubric
Criteria Excellent Good Fair Incomplete
5 pts 4 pts 3 pts 0 pts
Use of class Use time Use time Use time Did not
time well on well and poorly and work at all
getting usually got or was not
poster done. focused on distracted able to
getting by others. finish in
poster done. class.
Visual Poster is Poster is The poster Poster is not
Impact exceptionally attractive, is poorly attractive at
attractive in though it designed all.
terms of might be a and lacks
color and little messy. neatness.
neatness.
Labels All words Almost all Words are No labels or
are clearly items in are very hard to unclear
22
written. clear. read. ones.
Spelling There are no There are There are It is full of
spelling very few many spelling
mistakes in spelling spelling errors.
the poster. errors. errors.
Let Us Reflect
You need to be safe online because if you put too much information
then people can figure out your login or password, that is why you never use
your school gmail for anything.
The more you know the safer you can be whether you’re using the
internet for a job , school or entertainment , its important to keep you, your
family and your personal information safe. Here, you’ll find useful lesson,
tips and tutorials all geared towards helping to navigate the internet safety.
23
Self-Assessment Guide
Subjects Empowerment Technologies
Introduction to Information and Communication Technologies
Instruction: Read each question and check the appropriate box to indicate
your answer.
Subjects Empowerment
Technologies
Introduction to Information and Communication Technologies
Instruction: Read each question and check the appropriate box to indicate
your answer.
Can I? Yes No
1. Learner’s ability to select an appropriate source and
assess the value of information.
2. Developing ideas and making things happen for
example using ICT to measure , record , to respond to
3. Exchanging and sharing information using ICT for
such purpose
4. Organizing and structuring using systematic
approaches to find things out
5. Developing ideas students ability to measure and
record
6. Exchanging information
7. Defining tasks ability to characterize that are being
asked to complete
8. Using technology to make things happen
9. Use ICT Information and communication technology as
a tool
10. Using forms of technology for the purpose of
presentation
11. Define information need
12. Access resources and information
13. Manage information
14. Integrate information through interpretation and
synthesis
15. Evaluate resources and information
16. Create new information or adapt existing
information
17. Communicate information to particular
audiences/learners
I agree to undertake assessment in the knowledge that
information gathered will used only for professional
development purposes and can only be accessed by
concerned assessment personnel and to my teacher
Student’s Signature : Date :
24
Answer key to Activities
Reference
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
https://prezi.com/lujxgo4qdw6w/online-safety-security-ethics-etiquette/
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
https://www.entrepreneur.com/article/287581
25
DISCLAIMER
Philippines
26
27