Technical Vocational Livelihood: Brief Introduction
Technical Vocational Livelihood: Brief Introduction
Technical Vocational Livelihood: Brief Introduction
ACTIVITY SHEET 2
BRIEF INTRODUCTION
Welcome again guys! I hope you had learned a lot from our previous lesson about the
introduction of Information and Communications Technology. Today we will discuss about
online safety, security and rules of netiquettes in order for you to answer the questions “Are
you safe and secured online?” and “How safe and secured are you online?”. This module will
give you an idea how to behave properly online and what are the different threats that you
might encounter while you are online. Are you ready? I hope you are all excited as we started
working on this module.
Objectives
At the end of this module, you are expected to:
1. Apply online safety, security, ethics, and etiquette standards while using the
internet.
2. Use the Internet as a tool for credible research and information gathering.
Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.
To start with this module, let us first understand why Internet is considered to be a
powerful tool and yet a dangerous place if you do not know what you are doing with it.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain
new friends, and stay in touch with the old ones. It is also a source of entertainment. But like
most things in this world, there is always “another side of the coin.” The Internet is one of the
most dangerous places, especially if you do not know what you are doing.
Below are the list of information and I want you to make a self-check if these
information of yours are shared online or not. Let us start!
Are you finished? Ok! Very good. For now, set aside your answers and at the end of
the module let us assess if you are a smart and responsible user of internet or not.
Online safety refers to the practices and
precautions that should be observed when using the
internet to ensure that the users as well as their
computers and personal information are safe from
crimes associated with using the internet. There are
numerous delinquencies that can be committed on
the internet (1) Stalking (2) Identity Theft (3) Privacy
violations and (4) Harassments.
Online Safety Measures
• Never give any personal information about yourself over the internet.
• Do not give any banking or sensitive information. To make sure you’re in a secured
network the website address should begin with “https://”.
• Never open messages or attachments from someone you do not know.
• Regularly review your privacy settings in your online accounts.
• When using a public computer terminal, be sure to delete our browsing data before
leaving.
• Keep your software updated to avoid security holes.
• Do not download and install software that is unknown to you.
Online threats are act performed by knowledgeable computer user sometimes referred to
as hackers that illegally browses or steal someone’s information.
Types of Internet threats
Netiquette is a term came from network etiquette is a set of rule and norms for acceptable
conduct or behavior online.
Ten Rules of Netiquettes
Rule No. 1: Remember the human
Remember that you are talking to a real person when you are online. The internet
brings people together who would otherwise never meet. Remember this saying when sending
an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life. You need to remember
that you can get caught doing things you should not be doing online just like you can in real
life. You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
Always take a look around when you enter a new domain when surfing the web. Get a
sense of what the discussion group is about before you join it.
Let’s Apply
DIRECTION: Identify what is being asked and write your answer on the space provided.
1. A malicious website that resembles a legitimate website, used to gather username and
password.
2. An unsolicited email and instant message.
3. A malfunction on a computer system through its runtime.
4. The use of the internet or other electronic device to harass or stalk individual, group or
organization.
5. Describes a criminal who impersonates another individual or organization, with the intent
to gather personal or business information.
6. Can be injected into a network by any types of means.
7. A type of scam that misleads the users in many ways attempting to take lead of them.
Let’s Analyze
DIRECTION: Match column A with column B. Write your answer before the number
A B
1. Internet scam a. A malicious website that resembles a legitimate
2. Virus
website, used to gather information.
3. Online safety
4. Cyber Bullying b. The use of electronic device to harass or stalk
5. Phishing individual or group.
6. Online threats c. Stands for malicious software.
7. Internet bots d. A network zombie that performs large scale
8. Malware malicious acts for the creator of the bot net.
9. Cyber Stalking
e. Act performed by knowledgeable computer
10. Pharming
user sometimes referred to as hackers.
f. Its goal is to acquire sensitive personal
information like passwords.
g. The act of tormenting, threatening, harassing or
embarrassing another person using the internet
or other technologies.
h. Refers to the practices and precautions that
should be observed when using the internet.
i. Is a program designed to replicate by attaching
itself into other computer program.
j. A type of scam that misleads the users in many
ways attempting to take lead of them.
1. To make sure you’re in a secured network the website address should begin with
“http://”.
2. According to Rule 5, post the answers to your questions online because someone may
have the same question you do.
3. Keep your post and emails to minimum by saying what you want to say.
4. It is okay to read other people’s mail without their permission.
5. Rule 7 states that help keep flame wars under control.
6. Respecting other people’s privacy is a bad netiquette.
7. Do not take advantage of other people just because you have more knowledge or
power than them.
8. Treat others as you would want them to treat you if the roles were reversed.
9. Always take a look around when you enter a new domain when surfing the web.
10. Remember that you are talking to a real person when you are online.
.
Let’s Create
DIRECTION: Create/compose a 1-2 minute jingle about the concepts that you had learned on
this module. The rubric below will be used to evaluate your output.
Criteria Points
Message/Relevance of the output
The message of the song is timely and relevant. 4 points
The message of the song is somehow timely and relevant. 3 points
1 point
The message of the song has nothing to do with the concepts
discussed in the module.
Knowledge on the concept
The output showcased the correct concept of the topic. 4 points
The output showcased the somehow correct concept of the topic. 3 points
The output does not manifest the correct concept of the topic. 1 point
Originality and Musicality
The output presented showcased originality. 2 points
The output presented does not showcased originality. 1 point
TOTAL 10 points