Etech11 - 12 - Q1mod2 - Online Safety - Eljim - Ramos - Bgo - v1
Etech11 - 12 - Q1mod2 - Online Safety - Eljim - Ramos - Bgo - v1
Etech11 - 12 - Q1mod2 - Online Safety - Eljim - Ramos - Bgo - v1
ELJIM V. RAMOS
Developer
i
Republic of the Philippines
DEPARTMENT OF EDUCATION
Cordillera Administrative Region
SCHOOLS DIVISION OF BAGUIO CITY
Military Cut-off, Baguio City
Published by:
DepEd Schools Division of Baguio City
Curriculum Implementation Division
COPYRIGHT NOTICE
2020
“No copyright shall subsist in any work of the Government of the Philippines.
However, prior approval of the government agency of office wherein the work is
created shall be necessary for exploitation of such work for profit.”
This material has been developed for the implementation of K-12 Curriculum
through the DepEd Schools Division of Baguio City - Curriculum Implementation
Division (CID). It can be reproduced for educational purposes and the source must be
acknowledged. Derivatives of the work including creating an edited version, an
enhancement or a supplementary work are permitted provided all original work is
acknowledged and the copyright is attributed. No work may be derived from this
material for commercial purposes and profit.
ii
ACKNOWLEDGEMENT
The developer wishes to express his gratitude to those who helped in the
development of this learning material. The fulfillment of this learning material would
not be possible without them.
Thank you all for your moral and technical support in the crafting of this learning
module. To my colleagues in our school for sharing your knowledge and expertise as
I developed this learning resource. Lastly, to the office of DepEd Division of Baguio
City for giving us the opportunity to discover our skills as module writers.
Development Team
Developer/s: Eljim V. Ramos
Layout Artist: Eljim V. Ramos
Illustrator: Eljim V. Ramos
CONSULTANTS
iii
PREFACE
This module is a project of the DepEd Schools Division of Baguio City through
the Curriculum Implementation Division (CID) which is in response to the
implementation of the K to 12 Curriculum.
iv
TABLE OF CONTENTS
Page
Copyright Notice ………………………………………………….……...….…. ii
Acknowledgement………………………………………………………………. iii
Preface……………………………………………………. …….…... iv
Table of Contents……………………………………………………….……. … v
Title Page…………………………………………………………………………. 1
Introduction ………………………………………………………………………. 2
Learning Objectives
Pretest………………………………………………………………….…………. 6
Lesson Proper……………………………………………………………………. 8
Review…………………………………………………………………………. 8
Activity 1……………………………………….……………….…………. 9
Activity 2…………………………………………………………………… 11
Activity 3…………………………………………………………………… 12
Activity 4 ………………………………………………………………….. 13
Activity 5…………………………………………………………………… 17
Post-Assessment …………………...…………………………………………… 18
Answer Key………………………………………………………………………. 20
Reference Sheet…………………………………………………...…….…….… 21
v
Online Safety, Security,
Ethics, and Research
Learner's Module in
Empowerment Technologies
Quarter 1 ● Module 2
ELJIM V. RAMOS
Developer
1
Introductory Message
For the facilitator:
Welcome to the Empowerment Technologies Grade 11 Alternative Delivery Mode
(ADM) Module on Online Safety, Security, Ethics, and Research !
This module was collaboratively designed, developed and reviewed by educators both
from public and private institutions to assist you, the teacher or facilitator in helping the
learners meet the standards set by the K to 12 Curriculum while overcoming their
personal, social, and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration their
needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the
module:
As a facilitator you are expected to orient the learners on how to use this module. You
also need to keep track of the learners' progress while allowing them to manage their
own learning. Furthermore, you are expected to encourage and assist the learners as
they do the tasks included in the module.
ELJIM V. RAMOS
Developer
2
For the learner:
Welcome to the ICT 11 Alternative Delivery Mode (ADM) Module on Online Safety,
Security, Ethics, and Research!
The hand is one of the most symbolized part of the human body. It is often used to
depict skill, action and purpose. Through our hands we may learn, create and
accomplish. Hence, the hand in this learning resource signifies that you as a learner
is capable and empowered to successfully achieve the relevant competencies and
skills at your own pace and time. Your academic success lies in your own hands!
This module was designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
3
This section provides an activity which will
What I Can Do
help you transfer your new knowledge or skill
into real life situations or concerns.
This is a task which aims to evaluate your
Assessment
level of mastery in achieving the learning
competency.
In this portion, another activity will be given to
Additional Activities
you to enrich your knowledge or skill of the
lesson learned. This also tends retention of
learned concepts.
This contains answers to all activities in the
Answer Key
module.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain
deep understanding of the relevant competencies. You can do it!
4
What I Need to Know
This module was designed and written with you in mind. This is developed to help you
master the nature of Empowerment Technology. The scope of this module permits it
to be used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.
Eljim V. Ramos
5
❖ WEEK 2
Lesson 2:
Empowerment Technologies: PRE-TEST
Week2/Day 1
What I Know
MULTIPLE CHOICE: Write the letter of the correct answer on the space provided.
____1. It refers to the online security or safety of people and their information when
using internet.
a. Internet Safety b. Netiquette c. Web d. Social Media
6
a. Exposure b. Inference c. Intrusion d. Interception
____13. acquires sensitive personal information like passwords and credits card
details.
a. Phishing b. Pharming c. Copyright d. Fair Use
____14. It is a more complicated way of phishing where it exploits the DNS system.
a. Phishing b. Pharming c. Copyright d. Fair Use
____15. It is a part of law, wherein you have the rights to work, anyone who uses it
w/o your consent is punishable by law.
a. Phishing b. Pharming c. Copyright d. Fair Use
7
Lesson 2: Empowerment Technologies: Introducing
Week 2/Day 2 Netiquette and online safety
What’s In
We are now in the 21st century generation and we can access to an unlimited
information worldwide. The Internet makes it possible to access information quickly
and communicate around the world, and much more. Unfortunately, the Internet is
also home to many risks, such as viruses and scams. If you want to stay safe
online, you'll need to understand these risks and learn how to avoid them.
In your own statement and understanding, write down the things you need to do to
be safe online.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
What’s New
INTERNET SAFETY- it refers to the online security or safety of people and their
information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
8
What is It
As a responsible internet user, think of the things you should do/should not do
online. Give at least five things.
1.________________________________________________
2.________________________________________________
3.________________________________________________
4._______________________________________________
5._______________________________________________
What’s In
Rule No. 2: Adhere to the same standards online that you follow in real life.
• You need to behave the same way online that you do in real life.
• You need to remember that you can get caught doing things you should not
be doing online just like you can in real life.
• You are still talking to a real person with feelings even though you can’t see
them.
9
Rule no. 3: Know where you are in cyberspace.
• Always take a look around when you enter a new domain when surfing the
web.
• Get a sense of what the discussion group is about before you join it.
10
What’s More
Rules Description
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
What I Have
Learned
11
Learning all the rules on how to be a responsible Netizen, write down the
advantages of following all these rules. (Minimum of two sentences)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
____________________________________________________________
What I Can Do
12
Lesson 2: Empowerment Technologies: The internet
Week 2/Day 4 Security
What’s In
Internet security
Security Requirement Triad
Confidentiality
Data confidentiality
Privacy
• Integrity
Data integerity System integrity
• Availability
13
Incapacitation: prevents or interrupts system
operation by disabling a system component.
Corruption: Undesirably alters system
operation by adversely modifying system
functions or data.
Disruption Obstruction: A threat action that interrupts
A circumstances or even that delivery of system services by hindering
interrupts or prevents the correct system operation.
operation of system services and Masquerade: An unauthorized entity gains
functions. access to a system or performs a malicious act
Deception by posing as an authorized entity.
A circumstance or event that may Falsification: False data deceive an
result in an authorized entity authorized entity.
receiving false data and believing it Repudiation: An entity deceives another by
to be true. falsely denying responsibility for an act.
Additional
Activities
1. Inference -
2. Exposure –
3. Falsification –
4. Deception –
5. Repudiation –
6. Masquerade -
14
Lesson 2: Empowerment Technologies: Understanding
Week2/Day 5 Cybercrime and Viruses
What’s In
Virus places an identical copy of itself into other programs or into certain system areas
on t the disk.
• Triggering phase
Virus is activated to perform the function for which it was intended. Caused by a variety
of system events
• Execution phase
Function is performed
Key Terms
15
Worms– a malicious program designed to replicate itself and transfer from one file folder
to another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware– a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card
details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o
your consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is
used in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal
passwords or any other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer, and manipulates them
into paying money for a fake malware removal tool.
AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
• Question
Features are offered on many engines by going to an “Advanced search” page and
making selections. Effective in narrowing search returns to a specific topic or phrase.
16
Additional
Activities
➢ ACTIVITY 5: Answer completely the question below.
Reflection: Write down all the things you have learned from this lesson in the
space provided. (Minimum of 5 sentences)
Answer:
17
Assessment
MULTIPLE CHOICE: Write the letter of the correct answer on the space provided.
____8. acquires sensitive personal information like passwords and credits card
details.
a. Phishing b. Pharming c. Copyright d. Fair Use
____9. It is a more complicated way of phishing where it exploits the DNS system.
a. Phishing b. Pharming c. Copyright d. Fair Use
____10. It is a part of law, wherein you have the rights to work, anyone who uses it
w/o your consent is punishable by law.
a. Phishing b. Pharming c. Copyright d. Fair Use
18
____11. It refers to the online security or safety of people and their information when
using internet.
a. Internet Safety b. Netiquette c. Web d. Social Media
19
20
Pre-Test Activity 1: Activity 3: Student Activity 5 Assessment
1. A Student answer Student 1. D
2. B Answer Answer 2. B
3. D Activity 4: 3. C
4. C Activity 2: 1. Inference: A threat 4. B
5. A Rule No. 1: action whereby an 5. D
6. D Remember unauthorized entity 6. C
7. B the human indirectly accesses 7. A
8. C Rule No. 2: sensitive data by 8. A
9. B Adhere to reasoning from 9. B
10. D the same characteristics or 10. C
11. C standards byproducts of 11. A
12. A online that communications. 12. B
13. A you follow in 2.Exposure: Sensitive 13. D
14. B real life. data are directly 14. C
15. C Rule no. 3: released to an 15. A
Know where unauthorized entity.
you are in 3. Falsification: False
cyberspace. data deceive an
Rule no. 4: authorized entity.
Respect 4. Deception
other A circumstance or
people’s time event that may result
and in an authorized entity
bandwidth. receiving false data
Rule no. 5: and believing it to be
Make true.
yourself look 5. Repudiation: An
good online.. entity deceives
Rule no. 6: another by falsely
Share expert denying responsibility
knowledge for an act.
Rule no. 7: 6. Masquerade: An
Help keep unauthorized entity
flame wars gains access to a
under control system or performs a
Rule no. 8: malicious act by
Respect posing as an
other authorized entity.
people’s
privacy.
Rule no. 9:
Don’t abuse
your power.
Rule no. 10:
Be forgiving
of other
people’s
mistake.
Answer Key
REFERENCES:
https://ictcom444251764.wordpress.com
https://edu.gcfglobal.org/en/computerbasics/basic-parts-of-a-computer/1
https://www.britannica.com/topic/World-Wide-Web
https://www.youtube.com/watch?v=xnobktms0TM
http://www.jkuat.ac.ke/departments/it/how-persons-with-visual-impairments-use-
computers-access-internet/
https://edu.gcfglobal.org/en/internetbasics/understanding-the-cloud/1/
https://www.webroot.com/us/en/resources/tips-articles/netiquette
21