Etech11 - 12 - Q1mod2 - Online Safety - Eljim - Ramos - Bgo - v1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Online Safety, Security,

Ethics, and Research


Learner's Module in
Empowerment Technologies
Quarter 1 ● Module 2

ELJIM V. RAMOS
Developer

Department of Education • Cordillera Administrative Region

NAME:________________________ GRADE AND SECTION ____________


TEACHER: ____________________ SCORE _________________________

i
Republic of the Philippines
DEPARTMENT OF EDUCATION
Cordillera Administrative Region
SCHOOLS DIVISION OF BAGUIO CITY
Military Cut-off, Baguio City

Published by:
DepEd Schools Division of Baguio City
Curriculum Implementation Division

COPYRIGHT NOTICE
2020

Section 9 of Presidential Decree No. 49 provides:

“No copyright shall subsist in any work of the Government of the Philippines.
However, prior approval of the government agency of office wherein the work is
created shall be necessary for exploitation of such work for profit.”

This material has been developed for the implementation of K-12 Curriculum
through the DepEd Schools Division of Baguio City - Curriculum Implementation
Division (CID). It can be reproduced for educational purposes and the source must be
acknowledged. Derivatives of the work including creating an edited version, an
enhancement or a supplementary work are permitted provided all original work is
acknowledged and the copyright is attributed. No work may be derived from this
material for commercial purposes and profit.

ii
ACKNOWLEDGEMENT

The developer wishes to express his gratitude to those who helped in the
development of this learning material. The fulfillment of this learning material would
not be possible without them.
Thank you all for your moral and technical support in the crafting of this learning
module. To my colleagues in our school for sharing your knowledge and expertise as
I developed this learning resource. Lastly, to the office of DepEd Division of Baguio
City for giving us the opportunity to discover our skills as module writers.

Development Team
Developer/s: Eljim V. Ramos
Layout Artist: Eljim V. Ramos
Illustrator: Eljim V. Ramos

School Learning Resources Management Committee


Whitney A. Dawayen School Head/Principal
Cherielyn C. Espregante Subject / Learning Area Specialist
Erlinda V. Agabao School LR Coordinator

Quality Assurance Team


Mary Jane Malihod EPS – TLE/EPP
Santiago I. Bugtong PSDS – District

Learning Resource Management Section Staff


Loida C. Mangangey EPS – LRMDS
Victor A. Fernandez Education Program Specialist II - LRMDS
Christopher David G. Oliva Project Development Officer II – LRMDS
Priscilla A. Dis-iw Librarian II
Lily B. Mabalot Librarian I
Ariel Botacion Admin. Assistant

CONSULTANTS

JULIET C. SANNAD, EdD


Chief Education Supervisor – CID

SORAYA T. FACULO, PhD


Asst. Schools Division Superintendent

MARIE CAROLYN B. VERANO, CESO V


Schools Division Superintendent

iii
PREFACE

This module is a project of the DepEd Schools Division of Baguio City through
the Curriculum Implementation Division (CID) which is in response to the
implementation of the K to 12 Curriculum.

This Learning Material is a property of the Department of Education, Schools


Division of Baguio City. It aims to improve students’ performance specifically in
Mathematics.

Date of Development August 2020


Resource Location DepEd Schools Division of Baguio City
Learning Area ICT
Grade Level 11
Learning Resource Type Module
Language English
Q1/W2
Quarter/Week
CS_ICT11/12-ICTPT-Ia-b2
Learning Competency Code CS_ICT11/12-ICTPT-Ia-b3

Apply online safety, security, ethics, and


etiquette standards and practice in the
use of ICTs as it would relate to their
Learning Competency specific professional tracks.

Use the Internet as a tool for credible


research and information gathering to
best achieve specific class objectives or
address situational.

iv
TABLE OF CONTENTS

Page
Copyright Notice ………………………………………………….……...….…. ii
Acknowledgement………………………………………………………………. iii
Preface……………………………………………………. …….…... iv
Table of Contents……………………………………………………….……. … v
Title Page…………………………………………………………………………. 1
Introduction ………………………………………………………………………. 2
Learning Objectives
Pretest………………………………………………………………….…………. 6
Lesson Proper……………………………………………………………………. 8
Review…………………………………………………………………………. 8
Activity 1……………………………………….……………….…………. 9
Activity 2…………………………………………………………………… 11
Activity 3…………………………………………………………………… 12
Activity 4 ………………………………………………………………….. 13
Activity 5…………………………………………………………………… 17
Post-Assessment …………………...…………………………………………… 18
Answer Key………………………………………………………………………. 20
Reference Sheet…………………………………………………...…….…….… 21

v
Online Safety, Security,
Ethics, and Research
Learner's Module in
Empowerment Technologies
Quarter 1 ● Module 2

ELJIM V. RAMOS
Developer

Department of Education • Cordillera Administrative Region

1
Introductory Message
For the facilitator:
Welcome to the Empowerment Technologies Grade 11 Alternative Delivery Mode
(ADM) Module on Online Safety, Security, Ethics, and Research !
This module was collaboratively designed, developed and reviewed by educators both
from public and private institutions to assist you, the teacher or facilitator in helping the
learners meet the standards set by the K to 12 Curriculum while overcoming their
personal, social, and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration their
needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of the
module:

Notes to the Teacher


This contains helpful tips or strategies that
will help you in guiding the learners.

As a facilitator you are expected to orient the learners on how to use this module. You
also need to keep track of the learners' progress while allowing them to manage their
own learning. Furthermore, you are expected to encourage and assist the learners as
they do the tasks included in the module.

ELJIM V. RAMOS
Developer

2
For the learner:
Welcome to the ICT 11 Alternative Delivery Mode (ADM) Module on Online Safety,
Security, Ethics, and Research!
The hand is one of the most symbolized part of the human body. It is often used to
depict skill, action and purpose. Through our hands we may learn, create and
accomplish. Hence, the hand in this learning resource signifies that you as a learner
is capable and empowered to successfully achieve the relevant competencies and
skills at your own pace and time. Your academic success lies in your own hands!

This module was designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.

This module has the following parts and corresponding icons:

This will give you an idea of the skills or


What I Need to Know
competencies you are expected to learn in the
module.
This part includes an activity that aims to
What I Know
check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.
This is a brief drill or review to help you link
What’s In
the current lesson with the previous one.

In this portion, the new lesson will be


What’s New
introduced to you in various ways such as a
story, a song, a poem, a problem opener, an
activity or a situation.
This section provides a brief discussion of the
What is It
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent
What’s More
practice to solidify your understanding and
skills of the topic. You may check the answers
to the exercises using the Answer Key at the
end of the module.
This includes questions or blank
What I Have Learned
sentence/paragraph to be filled in to process
what you learned from the lesson.

3
This section provides an activity which will
What I Can Do
help you transfer your new knowledge or skill
into real life situations or concerns.
This is a task which aims to evaluate your
Assessment
level of mastery in achieving the learning
competency.
In this portion, another activity will be given to
Additional Activities
you to enrich your knowledge or skill of the
lesson learned. This also tends retention of
learned concepts.
This contains answers to all activities in the
Answer Key
module.

At the end of this module you will also find:

References This is a list of all sources used in developing


this module.

The following are some reminders in using this module:


1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.

3. Read the instruction carefully before doing each task.


4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.

6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain
deep understanding of the relevant competencies. You can do it!

4
What I Need to Know

This module was designed and written with you in mind. This is developed to help you
master the nature of Empowerment Technology. The scope of this module permits it
to be used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.

The module is divided into three lessons, namely:


• Day 1 – Pre-Test
• Day 2 – Introducing Netiquette and online Safety
• Day 3 – Safety, Security and Rules of Netiquette
• Day 4 – The Internet Security
• Day 5 – Understanding Cybercrime/Assessment

After going through this module, you are expected to:


Content Standard Demonstrate an understanding of: ICT in the
context of global communication for specific
professional track
Performance Standard Independently compose an insightful reflection
paper on the nature of ICT in the context of their
lives, society, and professional tracks (Arts,
TechVoc, Sports, Academic)
Most Essential Learning Apply online safety, security, ethics, and
etiquette standards and practice in the use of
Competencies ICTs as it would relate to their specific
professional tracks.

Use the Internet as a tool for credible research


and information gathering to best achieve
specific class objectives or address situational.
➢ Introducing Netiquette and online Safety
➢ Rules of Netiquette
➢ Appropriating Online/Internet Security
➢ Understanding Cybercrime

Eljim V. Ramos

5
❖ WEEK 2
Lesson 2:
Empowerment Technologies: PRE-TEST
Week2/Day 1

What I Know

MULTIPLE CHOICE: Write the letter of the correct answer on the space provided.
____1. It refers to the online security or safety of people and their information when
using internet.
a. Internet Safety b. Netiquette c. Web d. Social Media

____2. It is network etiquette, the do’s and don’ts of online communication.


a. Internet Safety b. Netiquette c. Web d. Social Media

____3. Which among the choices is not a rule of a netiquette?


a. Remember the human
b. Adhere to the same standards online that you follow in real life
c. Respect other people’s time and bandwidth
d. Do not respect other people’s privacy

____4. Which among the choices is a rule of a netiquette?


a. Be not forgiving of other people’s mistake.
b. You should abuse your power.
c. Adhere to the same standards online that you follow in real life.
d. Do not make yourself look good online.

____5. It is called ____________ Sensitive data are directly released to an


unauthorized entity.
a. Exposure b. Inference c. Intrusion d. Interception

____ 6. It is an unauthorized entity directly accesses sensitive data traveling


between authorized sources and destinations.
a. Exposure b. Inference c. Intrusion d. Interception

____7. It is a threat action whereby an unauthorized entity indirectly accesses


sensitive data by reasoning from characteristics or byproducts of communications.
a. Exposure b. Inference c. Intrusion d. Interception

____8. It is an unauthorized entity gains access to sensitive data by circumventing a


system’s security protections.

6
a. Exposure b. Inference c. Intrusion d. Interception

____9. It prevents or interrupts system operation by disabling a system component.


a. Disruption b. Incapacitation c. Corruption d. Obstruction
____10. It is a threat action that interrupts delivery of system services by hindering
system operation.
a. Disruption b. Incapacitation c. Corruption d. Obstruction

____11. Undesirably alters system operation by adversely modifying system


functions or data.
a. Disruption b. Incapacitation c. Corruption d. Obstruction

____12. It is a circumstances or even that interrupts or prevents the correct


operation of system services and functions.
a. Disruption b. Incapacitation c. Corruption d. Obstruction

____13. acquires sensitive personal information like passwords and credits card
details.
a. Phishing b. Pharming c. Copyright d. Fair Use

____14. It is a more complicated way of phishing where it exploits the DNS system.
a. Phishing b. Pharming c. Copyright d. Fair Use

____15. It is a part of law, wherein you have the rights to work, anyone who uses it
w/o your consent is punishable by law.
a. Phishing b. Pharming c. Copyright d. Fair Use

7
Lesson 2: Empowerment Technologies: Introducing
Week 2/Day 2 Netiquette and online safety

What’s In

We are now in the 21st century generation and we can access to an unlimited
information worldwide. The Internet makes it possible to access information quickly
and communicate around the world, and much more. Unfortunately, the Internet is
also home to many risks, such as viruses and scams. If you want to stay safe
online, you'll need to understand these risks and learn how to avoid them.

In your own statement and understanding, write down the things you need to do to
be safe online.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

What’s New

Defining Internet Safety and Netiquette

INTERNET SAFETY- it refers to the online security or safety of people and their
information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.

Netiquette is a combination of the words network and etiquette and is defined as a


set of rules for acceptable online behavior. Similarly, online ethics focuses on the
acceptable use of online resources in an online social environment.
Both phrases are frequently interchanged and are often combined with the concept
of a ’netizen’ which itself is a contraction of the words internet and citizen and refers
to both a person who uses the internet to participate in society, and an individual
who has accepted the responsibility of using the internet in productive and socially
responsible ways.

8
What is It

➢ ACTIVITY 1: Answer completely the question below.

As a responsible internet user, think of the things you should do/should not do
online. Give at least five things.

1.________________________________________________

2.________________________________________________

3.________________________________________________

4._______________________________________________

5._______________________________________________

Lesson 2: Empowerment Technologies: Online


Week 2/Day 3 Safety, Security and Rules of Netiquette.

What’s In

TEN RULES OF NETIQUETTE


Rule No. 1: Remember the human
• You need to remember that you are talking to a real person when you are
online.
• The internet brings people together who would otherwise never meet.
• Remember this saying when sending an email: Would I say this to the
person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.
• You need to behave the same way online that you do in real life.
• You need to remember that you can get caught doing things you should not
be doing online just like you can in real life.
• You are still talking to a real person with feelings even though you can’t see
them.

9
Rule no. 3: Know where you are in cyberspace.
• Always take a look around when you enter a new domain when surfing the
web.
• Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.


• Remember people have other things to do besides read your email. You are
not the center of their world.
• Keep your post and emails to minimum by saying what you want to say.
• Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.


• Be polite and pleasant to everyone.
• Always check your spelling and grammar before posting.
• Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge


• Ask questions online
• Share what you know online.
• Post the answers to your questions online because someone may have the
same question you do.

Rule no. 7: Help keep flame wars under control


• Netiquette does not forgive flaming.
• Netiquette does however forbid people who are flaming to hurt discussion
groups by putting the group down.

Rule no. 8: Respect other people’s privacy.


• Do not read other people’s mail without their permission.
• Going through other people’s things could cost you, your job or you could
even go to jail.
• Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.


• Do not take advantage of other people just because you have more
knowledge or power than them.
• Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.


• Do not point out mistakes to people online.
• Remember that you were once the new kid on the block.
• You still need to have a good manners even though you are online and
cannot see the person face to face.

10
What’s More

➢ ACTIVITY 2. Answer completely the question below.


Write down all the rules of Netiquette and give its respective description in your
own words.

Rules Description
1.

2.

3.

4.

5.

6.

7.

8.

9.

10.

What I Have
Learned

11
Learning all the rules on how to be a responsible Netizen, write down the
advantages of following all these rules. (Minimum of two sentences)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
____________________________________________________________

What I Can Do

➢ ACTIVITY 3: Answer completely the given question below


As a Filipino citizen, what are the things you can do to improve awareness of
doing the right things online. (Minimum of two sentences)

12
Lesson 2: Empowerment Technologies: The internet
Week 2/Day 4 Security

What’s In

Internet security
Security Requirement Triad

Confidentiality

Data confidentiality

Privacy
• Integrity
Data integerity System integrity
• Availability

Threat Consequence Threat Action ( Attack)

Exposure: Sensitive data are directly released


Unauthorized Disclosure to an unauthorized entity.
A circumstance or event whereby Interception: An unauthorized entity directly
an entity gains access to data for accesses sensitive data traveling between
which the entity is not authorized. authorized sources and destinations.

Inference: A threat action whereby an


unauthorized entity indirectly accesses sensitive data by reasoning from
characteristics or byproducts of communications.
Intrusion: an unauthorized entity gains
access to sensitive data by circumventing a system’s security protections.

13
Incapacitation: prevents or interrupts system
operation by disabling a system component.
Corruption: Undesirably alters system
operation by adversely modifying system
functions or data.
Disruption Obstruction: A threat action that interrupts
A circumstances or even that delivery of system services by hindering
interrupts or prevents the correct system operation.
operation of system services and Masquerade: An unauthorized entity gains
functions. access to a system or performs a malicious act
Deception by posing as an authorized entity.
A circumstance or event that may Falsification: False data deceive an
result in an authorized entity authorized entity.
receiving false data and believing it Repudiation: An entity deceives another by
to be true. falsely denying responsibility for an act.

Additional
Activities

➢ ACTIVITY 4: Answer completely the question below.


Write the definitions of the following:

1. Inference -

2. Exposure –

3. Falsification –

4. Deception –

5. Repudiation –

6. Masquerade -

14
Lesson 2: Empowerment Technologies: Understanding
Week2/Day 5 Cybercrime and Viruses

What’s In

Usurpation: A circumstances or event that results in control of system services or


functions by an unauthorized entity.

Misappropriation: An entity assumes unauthorized logical or physical control of a


system resource.

Misuse: Causes a system component to perform a function or service that is detrimental


to system security.
Types of System Intruders Parts of Virus Virus stages
• Masquerader • Infection • Dormant
• Hackers mechanism phase
• Clandestine • Trigger Virus is idle.
user • PayloaD • Propagation phase

Virus places an identical copy of itself into other programs or into certain system areas
on t the disk.
• Triggering phase
Virus is activated to perform the function for which it was intended. Caused by a variety
of system events
• Execution phase
Function is performed

Key Terms

Cybercrime- a crime committed or assisted through the use of the Internet.


Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its
data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any
means possible.

15
Worms– a malicious program designed to replicate itself and transfer from one file folder
to another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware– a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card
details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o
your consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is
used in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal
passwords or any other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer, and manipulates them
into paying money for a fake malware removal tool.

Four search strategies


• Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word
• Boolean

AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
• Question

a question may be entered in the search field of search engine


• Advanced

Features are offered on many engines by going to an “Advanced search” page and
making selections. Effective in narrowing search returns to a specific topic or phrase.

16
Additional
Activities
➢ ACTIVITY 5: Answer completely the question below.

Reflection: Write down all the things you have learned from this lesson in the
space provided. (Minimum of 5 sentences)

Answer:

17
Assessment

MULTIPLE CHOICE: Write the letter of the correct answer on the space provided.

____ 1. It is an unauthorized entity directly accesses sensitive data traveling


between authorized sources and destinations.
a. Exposure b. Inference c. Intrusion d. Interception

____2. It is a threat action whereby an unauthorized entity indirectly accesses


sensitive data by reasoning from characteristics or byproducts of communications.
a. Exposure b. Inference c. Intrusion d. Interception

____3. It is an unauthorized entity gains access to sensitive data by circumventing a


system’s security protections.
a. Exposure b. Inference c. Intrusion d. Interception

____4. It prevents or interrupts system operation by disabling a system component.


a. Disruption b. Incapacitation c. Corruption d. Obstruction

____5. It is a threat action that interrupts delivery of system services by hindering


system operation.
a. Disruption b. Incapacitation c. Corruption d. Obstruction

____6. Undesirably alters system operation by adversely modifying system functions


or data.
a. Disruption b. Incapacitation c. Corruption d. Obstruction

____7. It is a circumstances or even that interrupts or prevents the correct operation


of system services and functions.
a. Disruption b. Incapacitation c. Corruption d. Obstruction

____8. acquires sensitive personal information like passwords and credits card
details.
a. Phishing b. Pharming c. Copyright d. Fair Use

____9. It is a more complicated way of phishing where it exploits the DNS system.
a. Phishing b. Pharming c. Copyright d. Fair Use

____10. It is a part of law, wherein you have the rights to work, anyone who uses it
w/o your consent is punishable by law.
a. Phishing b. Pharming c. Copyright d. Fair Use

18
____11. It refers to the online security or safety of people and their information when
using internet.
a. Internet Safety b. Netiquette c. Web d. Social Media

____12. It is network etiquette, the do’s and don’ts of online communication.


a. Internet Safety b. Netiquette c. Web d. Social Media

____13. Which among the choices is not a rule of a netiquette?


a. Remember the human
b. Adhere to the same standards online that you follow in real life
c. Respect other people’s time and bandwidth
d. Do not respect other people’s privacy

____14. Which among the choices is a rule of a netiquette?


a. Be not forgiving of other people’s mistake.
b. You should abuse your power.
c. Adhere to the same standards online that you follow in real life.
d. Do not make yourself look good online.

____15. It is called ____________ Sensitive data are directly released to an


unauthorized entity.
a. Exposure b. Inference c. Intrusion d. Interception

19
20
Pre-Test Activity 1: Activity 3: Student Activity 5 Assessment
1. A Student answer Student 1. D
2. B Answer Answer 2. B
3. D Activity 4: 3. C
4. C Activity 2: 1. Inference: A threat 4. B
5. A Rule No. 1: action whereby an 5. D
6. D Remember unauthorized entity 6. C
7. B the human indirectly accesses 7. A
8. C Rule No. 2: sensitive data by 8. A
9. B Adhere to reasoning from 9. B
10. D the same characteristics or 10. C
11. C standards byproducts of 11. A
12. A online that communications. 12. B
13. A you follow in 2.Exposure: Sensitive 13. D
14. B real life. data are directly 14. C
15. C Rule no. 3: released to an 15. A
Know where unauthorized entity.
you are in 3. Falsification: False
cyberspace. data deceive an
Rule no. 4: authorized entity.
Respect 4. Deception
other A circumstance or
people’s time event that may result
and in an authorized entity
bandwidth. receiving false data
Rule no. 5: and believing it to be
Make true.
yourself look 5. Repudiation: An
good online.. entity deceives
Rule no. 6: another by falsely
Share expert denying responsibility
knowledge for an act.
Rule no. 7: 6. Masquerade: An
Help keep unauthorized entity
flame wars gains access to a
under control system or performs a
Rule no. 8: malicious act by
Respect posing as an
other authorized entity.
people’s
privacy.
Rule no. 9:
Don’t abuse
your power.
Rule no. 10:
Be forgiving
of other
people’s
mistake.
Answer Key
REFERENCES:
https://ictcom444251764.wordpress.com

https://edu.gcfglobal.org/en/computerbasics/basic-parts-of-a-computer/1

https://www.britannica.com/topic/World-Wide-Web

https://www.youtube.com/watch?v=xnobktms0TM

http://www.jkuat.ac.ke/departments/it/how-persons-with-visual-impairments-use-
computers-access-internet/

https://edu.gcfglobal.org/en/internetbasics/understanding-the-cloud/1/

https://www.webroot.com/us/en/resources/tips-articles/netiquette

21

You might also like