Professional Documents
Culture Documents
Emtech - Lesson 2 Online Safety and Security
Emtech - Lesson 2 Online Safety and Security
Emtech - Lesson 2 Online Safety and Security
EMPOWERMENT TECHNOLOGY
DEMONSTRATOR:
GRETCHEN D. NUNEZ
SST 1
HEALTH AND SAFETY PROTOCOLS
https://www.sec.gov.ph/notice-2021/guidelines-on-the-health-and-safety
CLASSROOM
R espect each other
L isten attentively
S
peak up as needed
Review of the previous lesson
https://www.bing.com/images/security/search?view
Let us determine how much you already know about identifying online safety, ethics and etiquette. Take this test.
Directions: Mark [√] if you agree with the statement and [X] if you disagree on the space provided before each
number.
___1. Letting people know your birthday is probably a must but having it in your profile it makes you vulnerable to
identity theft.
___2. My laptop has an antivirus so it is okay to open most email attachments like videos and e-cards.
___3. There is a danger in posting information about your future plans like vacation.
___4. You received an email stating that your mother’s bank account is going to be forfeited if you do not respond to
the email, Is it safe to reply?
___5. A virus is a malware that multiples and infects other computers through flash drives.
___6. Key bloggers are software that show pop-up ads even if you are not using your browser.
___7. You friend would like to ask your security password to open account in a certain online game, will you give her
your password?
___8. You forgot to answer your assignment in English which is an essay, for you to have an answer you do research
and you found out a website offering free essays. Is it okay to use the essays from a free essay website?
___9. Search engines scan websites for search results even if you have set your post to “private”.
___10. Is it necessary to protect important work and personal information stored in a computer through creating
secure password?
ACTIVITY 1: How safe I am?
FB Account password
POST or ONLY ME ?
Current Location
POST or ONLY ME ?
Relationship Status
POST or ONLY ME ?
Cellphone number
POST or ONLY ME ?
Your Birthday
POST or ONLY ME ?
Fake news
Activity 2: What’s on your mind?
Instructions: Learning Objective 2 & 4
The students will formulate online safety, security, and ethics from the
situations given when using ICTs.
The class will be grouped into four(4). Each group will do roleplaying
through the scenario given.
• Each group will be given ten (10) minutes to formulate online safety,
security and ethical practices of the scenario given.
Activity 2: What’s on your mind?
Scenario #1:
Atasha forgot to make her assignment in English which is to make an
essay. So, she did research and found out a website offering free essay. As a
friend of Atasha, what advice will you give to her? Explain your answer.
Scenario #2:
Your co-worker asks for the template of Immersion activities that were
saved in your flash drive. Knowing that your flash drive has a virus, will you let
her borrow it? Why or why not.
Activity 2: What’s on your mind?
Scenario #3:
You received an email stating that your mother’s bank account is going to
be forfeited if you don’t respond to the email, is it safe to reply? Why or why
not?
Scenario #4:
Your friend would like to ask your security password to open account in
a certain online game, will you give her your password? What will be your
response?
What is Security?
What is Safety?
Safety is the condition of being protected from or unlikely to
cause danger, risk, or injury. Online Safety refers to the
practices and precautions that should be observed when
using Internet to ensure the users, computers and personal
information safe from crimes.
8. Know the security features of the social networking site you use. By securing your profile
private, search engines will not be able to scan your profile.
9. Install and updates an antivirus software on your computer. Use only one antivirus software
to avoid conflicts.
9. Thou shalt not think about the social consequences of the program you write
(Dili ka maghunahuna mahitungod sa sosyal nga mga sangputanan sa
programa nga imong gisulat)
10. Thou shall use a computer in ways that show consideration and respect
(Angay mogamit og kompyuter sa mga paagi nga nagpakita og
konsiderasyon ug pagtahud )
Activity 4: Let’s comment on this !
Instructions: Learning Objective 1
The students will answer as to how the following activities should be
responded through applying the learned online safety, security and ethics.
1. Asking for your password
2. Agreement of terms and conditions from a page/website
3. Suspicious link from email
4. Friend requests from unfamiliar profile/faces
5. Ask to share unverified news or information
Activity 5: Show me your reaction !
Instruction: The students will react on the statements by putting a happy face if
the statements corresponds to the computer safety, security and ethical
standards or sad face if not.
1. Nathan’s work was interrupted because of John’s flash drive contained virus.
2. Natasha always posting her future plans like vacation.
3. Nica automatically agree on terms and conditions of a website.
4. Kendra install antivirus software on her computer as many as she could.
5. Juancho does not reply on suspicious accounts.
Activity 5: Show me your reaction !
Instruction: The students will react on the statements by putting a happy face if the
statements corresponds to the computer safety, security and ethical standards or sad face
if not.
6. Since it’s already deadline, Grant copied a ready-made essay from Google.
7. I never check the security features of the social networking site I use.
8. Belle never take someone’s file or work without permission.
9. I shared my Facebook password with my friends since I trust them.
10. Amaia never click on pop-up ads.
Activity 6: Reflection time
https://quotefancy.com/media/wallpaper/1600x900/4768866-Jerry-Smith-
REFERENCES
Barsobia, JP. (2020). Commandments-computer-ethics. January 2020. Retrieved from
https://my-homeworkhelpersph.com/technology-and-home-economics/
Chanti, R. (2014). Safety and Security. Retrieved from https://techspirited.com/ten-
commandments-of- computer-ethics
https://www.bing.com/images-onlinesecurity/search
Thank you for your time !