E-TECH Q1-M2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

lOMoARcPSD|41564199

Empowerment Technologies Module 2

Information Literacy (Notre Dame of Marbel University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Angelica Abing ([email protected])
lOMoARcPSD|41564199

Empowerment
Technologies
Quarter 1 – Module 2:
Online Safety, Security, Ethics,
and Etiquette

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

Empowerment Technologies – Grade 11


Alternative Delivery Mode
Quarter 1 – Module 2: Online Safety, Security, Ethics, and Etiquette
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module

Writer: Cherryl D. Cordova


Editor: Geraldine A. Pinoy
Reviewer: Paulo F. De Guzman
Illustrator: -
Layout Artist: Cherryl D. Cordova
Cover Design: -

Management Team:
Schools Division Superintendent : Romeo M. Alip, PhD, CESO V
Asst. Schools Division Superintendent : Rolando M. Fronda, EdD, CESE
Chief Education Supervisor, CID : Milagros M. Peñaflor, PhD
Education Program Supervisor, LRMDS : Edgar E. Garcia, MITE
Education Program Supervisor, AP/ADM : Romeo M. Layug
Education Program Supervisor, Learning Area: -
District Supervisor, Assigned Subject : -
District LRMDS Coordinator, Assigned Subject: Pepito B. Hernandez
School LRMDS Coordinator, Assigned Subject: Cherryl D. Cordova
School Principal, Assigned Subject : Edgardo Jesus S. Basa II
Lead Layout Artist, Assigned Subject : -
Lead Illustrator, Assigned Subject : -
Lead Evaluator, Assigned Subject : -

Printed in the Philippines by Department of Education – Schools Division of Bataan


Office Address: Provincial Capitol Compound, Balanga City, Bataan
Telefax: (047) 237-2102
E-mail Address: [email protected]

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

Empowerment
Technologies
Quarter 1 – Module 2:
Online Safety, Security, Ethics,
and Etiquette

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

Introductory Message
For the facilitator:

Welcome to the Empowerment Technologies – Grade 11 Alternative Delivery Mode


(ADM) Module on Online Safety, Security, Ethics, and Etiquette!

This module was collaboratively designed, developed and reviewed by educators


both from public and private institutions to assist you, the teacher or facilitator in
helping the learners meet the standards set by the K to 12 Curriculum while
overcoming their personal, social, and economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of
the module:

Notes to the Teacher


This contains helpful tips or strategies
that will help you in guiding the learners.

As a facilitator you are expected to orient the learners on how to use this module.
You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

For the learner:

Welcome to the Empowerment Technologies – Grade 11 Alternative Delivery Mode


(ADM) Module on Online Safety, Security, Ethics, and Etiquette!

As our society faces the ‘new normal’, most of our daily tasks now need the
assistance of Information and Communication Technologies. Thanks to the
internet, because we can now meet and communicate with each other online.
Paying bills, buying goods, growing your network of friends and even learning can
be done online. Life now is almost turning to digital. And it is very important that
you not only know how to use and deal with these technologies but it is necessary
to know the different threats brought by the internet and be equipped on how to be
safe and be secured online. It is also necessary to apply ethics and etiquette online
to avoid problems in facing the digital media.
This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning resource while being an active
learner.

This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in
the module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.

What’s In This is a brief drill or review to help you link


the current lesson with the previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such as a
story, a song, a poem, a problem opener, an
activity or a situation.

What is It This section provides a brief discussion of


the lesson. This aims to help you discover
and understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.

What I Have Learned This includes questions or blank


sentence/paragraph to be filled in to

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

process what you learned from the lesson.

What I Can Do This section provides an activity which will


help you transfer your new knowledge or
skill into real life situations or concerns.

Assessment This is a task which aims to evaluate your


level of mastery in achieving the learning
competency.

Additional Activities In this portion, another activity will be given


to you to enrich your knowledge or skill of
the lesson learned. This also tends retention
of learned concepts.

Answer Key This contains answers to all activities in the


module.

At the end of this module you will also find:

References This is a list of all sources used in


developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.

We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

What I Need to Know

This module was designed and written for you to be able to apply online safety,
security, ethics, and etiquette standards and practice in the use of ICTs as it would
relate to your specific professional track (CS_ICT11/12-ICTPT-Ia-b2).

At the end of this module, you are expected to:

1. Identify the internet threats from the given scenario by choosing its name
from the choices.
2. Illustrate the power of netiquette by determining which internet threats will
be avoided.
3. Choose online safety and security measures for the given scenario
appropriately.

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

What I Know

MULTIPLE CHOICE: Select the best answer from the choices and write the letter
that corresponds to your answer on the answer sheet.
1. You received a comment from an unknown friend in one of your posts in Social
Media saying “YOU IDIOT!”. What do you call this kind of act?
a. Acting
b. Bullying
c. Blogging
d. Flaming
2. It is an internet threat that acquires sensitive personal information like
passwords and credit card credentials.
a. Malware
b. Phishing
c. Spam
d. Virus
3. It refers to a set of rules for an acceptable online behaviour.
a. Ethics
b. Good Moral
c. Nethics
d. Netiquette
4. This is one form of internet advertising used by advertisers to get the attention
of web users but sometimes has obscene or offensive content.
a. Adverts
b. Cards
c. Infographics
d. Pop-ads
5. It is a software that can see all the things you are doing in your computer.
a. Attacker
b. Hacker
c. Spyware
d. Tracker
6. It is a deceitful practice of getting your personal information using email or text
messages.
a. Blogging
b. Flaming
c. Pharming
d. Phishing

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

7. It is a small program or script that can negatively affect the health of your
computer.
a. Malware
b. Phisher
c. Spam
d. Virus
8. He is a clever or expert programmer who can gain unauthorized access to other
computers.
a. Attacker
b. Hacker
c. Spyware
d. Tracker
9. It is an act of following, secret surveillance, persistent and manipulative calling
and texting, and other means of approaching the victim unexpectedly using
online technology.
a. Cyberbullying
b. Cyber-crime
c. Cyberstalking
d. Tracking
10. It is an act of engaging an underage minor into inappropriate sexual
relationships through the internet.
a. Cyberbullying
b. Cyberstalking
c. Flaming
d. Online Predation
11. It focuses on the acceptable use of online resources in an online social
environment.
a. Good Moral
b. Nethics
c. Netiquette
d. Online Ethics
12. Dan has finished all the written reports. He saved it in a flash drive and he
submitted it to his manager. The manager called him and said that his flash
drive is empty. Dan’s flash drive was infected with ____________.
a. Computer Virus
b. Malware
c. Phisher
d. Spam
13. Precy has received an email from the bank asking her to update her personal
information for security purposes. She clicked the link and signed in.
Unknowingly, Precy is already a victim of ____________.
a. Blogging
b. Flaming
c. Pharming

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

d. Phishing
14. Devon is fund of taking photos. While they are practicing their play, he takes
an embarrassing photo of Lori who is a very shy girl. He then posts the photo on
social media and spread it to his friends. Lori is a victim of ___________________.
a. Cyberbullying
b. Cyberstalking
c. Flaming
d. Online Predation
15. Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in
the address bar and log in to the system. Unknowingly upon signing in, Lily’s
username and password has already been compromised and is now a victim of
___________.
a. Blogging
b. Flaming
c. Pharming
d. Phishing

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

What’s In

Let’s have a drill. Use your social media account like Facebook. For five minutes,
you are going to do a CLAMP (post a Comment in one (1) minute, one(1) minute to
Like, one (1) minute to Add friends, one (1) minute to Message your friends, and
one (1) minute to Post something with description). Set your timer in doing this.
After doing it, recall and write in a piece of paper all your comments, messages,
and your post. Review it and check whether you did it in an ethical way.

Notes to the Teacher


This module aims to prepare the students to be knowledgeable
in ICT in the context of global in our society’s new normal
state. It also empowers the students to be literate on how to
use digital tools without compromising their private
information by applying online safety, security, ethics, and
etiquette standards and practice in the use of ICT.

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

What’s New

Match A with column B. Choose from column B the name of the internet threat
being described in column A.

Column B
Column A

1. This is one form of internet advertising used by A. Computer


advertisers to get the attention of web users but
sometimes has an obscene or an offensive content. Virus
2. A 12-year old girl reported to her mother that an old
B. Cyberbullying
man appeared in her chat room asking and seducing
her to chat with him. The old man is doing an act of C. Cyberstalking
_____________.
3. Devon is fund of taking photos. While they are D. Flaming
practicing their play, he takes an embarrassing photo
of Lori who is a very shy girl. He then posts the photo E. Hacker
on social media and spread it to his friends. Lori is a
F. Online
victim of ___________________.
4. Because of what Devon did to Lori, Lori fought back by Predation
sending this message “YOU IDIOT! BASTARD!! GO TO
HELL!!!” to Devon. He received a _____________ words. G. Pharming
5. Mona is the most beautiful girl and very famous in
town. She has a suitor who is always following her. H. Phishing
One day, she wants to be free and wants to go to
I. Pop-ads
somewhere else alone. Nobody knows where she will
go. When she reached the place, she takes photo and J. Spyware
post it in social media. A few hours later, her avid
suitor is already in her place. So, the avid suitor is
_______________ Mona.
6. Lydia has learned how to transact online using her
credit card as a mode of payment. She is using her
laptop and since she is new, she browses the internet
and click something out of curiosity. She got a
problem when she received her credit card statement
because of the big amount she needs to pay. Lydia was
attacked by ______.

7. Dan has finished all the written reports. He saved it in


a flash drive and he submitted it to his manager. The
manager called him and said that his flash drive is
empty. Dan’s flash drive was infected with

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

____________.
8. Daine is fond of downloading pirated movies. Then
suddenly, there are pop-ups about upcoming movies
showing on his screen every now and then. And his
computer becomes slow. His computer is already
infected with ____________.
9. Precy has received an email from the bank asking her
to update her personal information for security
purposes. She clicked the link and signed in.
Unknowingly, Precy is already a victim of ____________.
10. Lily knows that the website of BPI Bank is
www.bpibank.com so she typed it in the address bar
and log in to the system. Unknowingly upon signing
in, Lily’s username and password has already been
compromised and is now a victim of ___________.

10

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

What is It

As our society faces the ‘new normal’, most of our daily tasks now need the
assistance of Information and Communication Technologies. Thanks to the
internet, because we can now meet and communicate with each other online.
Paying bills, buying goods, growing your network of friends and even learning can
be done online. Life now is almost turning to digital media. According to (Preston
n.d.), digital media is any form of media that uses electronic devices for
distribution. This form of media can be created, viewed, modified and distributed
via electronic devices. And it is very important that you not only know how to use
and deal with these technologies but it is necessary to know the different threats
brought by the internet and be equipped on how to keep your private information
safe and secure online. Private information is your sensitive personal information
or your identity such as your username and passwords or bank accounts. Even
though the government has already set a policy, the Republic Act 10173 or the
Data Privacy Act of 2012, that is to protect the fundamental human right of
privacy, of communication while ensuring free flow of information to promote
innovation and growth (Republic Act 10173 – Data Privacy Act of 2012 n.d.), it is
important to have the knowledge of maximizing your private information in order to
keep it safe and secure is called online safety or web safety or internet safety. It
is also necessary to apply ethics and etiquette online to avoid problems in facing
digital media.

The following are some of the internet threats you need to be aware of:

Email Scam/Junk Mail/Spam Mail - Usually unsolicited


commercial email sent from an unknown source with identical
message sent to multiple recipients. Usually not dangerous
but can be time and space consuming. Dangerous ones can
carry viruses and other malicious software or malware.

Email Spoofing - is the creation of emails with a forged sender


address. The goal of email spoofing is to get recipients to open,
respond and engage with the email message. Email spoofing
can greatly increase the effectiveness of phishing and other
email-based cyber-attacks by tricking the recipient into
trusting the email and its sender (Tunggal 2019). It is usually
used by spammers to hide the origin of the spam.

Phishing – is a deceitful practice of getting your personal


information using email or text messages. Scammers may try
to steal your passwords, account numbers, or Social Security
numbers. If they get that information, they could gain access
to your email, bank, or other accounts (Federal Tr. Comm. ’19)

11

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

Pharming - is a scamming practice in which malicious code is


installed on a personal computer or server, misdirecting users
to fraudulent Web sites without their knowledge or consent.
This happened when the code sent in an e-mail modifies local
host files on a personal computer. A computer with a
compromised host file will go to the fake Web site even if a
user types in the correct Internet address or clicks on an
affected bookmark entry (Rouse, Pharming n.d.).

Computer Viruses - are small programs or scripts that can


negatively affect the health of your computer. These malicious
little programs can create files, move files, erase files, consume
your computer's memory, and cause your computer not to
function correctly. Some viruses can duplicate themselves,
attach themselves to programs, and travel across networks. In
fact opening an infected e-mail attachment is the most
common way to get a virus (Christensson, Virus Definition
2011).

Spyware - is software that "spies" on your computer where it


captures information like Web browsing habits, e-mail
messages, usernames and passwords, and credit card
information. If left unchecked, the software can transmit this
data to another person's computer over the Internet. It can be
installed when you open an e-mail attachment containing the
malicious software. It can also be installed when you install
another program that has a spyware installer attached to it
(Christensson, Spyware Definition 2006).

Pop-ads - a type of window that appears on top of (over) the


browser window of a Web site that a user has visited (Pop-up
Ad n.d.). It is also called as pop-up ads. It can also be used by
hackers to steal your personal information (such as your bank
details). Clicking pop-up ads can redirect you to sites that can
infect your computer and system files (What Causes Pop-up
Ads and How to Remove Them 2019).

Hacker - a clever or expert programmer who can gain


unauthorized access to other computers. He can "hack" his
way through the security levels of a computer system or
network (Christensson, Hacker Definition 2006). And can
vandalizes the victims’ website, steals personal information,
obtains intellectual property, and performs credit card fraud.

12

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

There are also common threats to personal safety. They are the following:

Cyberstalking – is the same as physical stalking by giving


unwanted obsessive attention to a specific person like following,
secret surveillance, persistent and manipulative calling and
texting, and other means of approaching the victim
unexpectedly but cyber stalkers rely on online technology to do
it. Email, social networks, instant messaging, personal data
available online – everything on the Internet can be used by
cyberstalkers to make inappropriate contact with their victims
(Andrea 2020).

Cyberbullying - is bullying that takes place over digital devices


like cell phones, computers, and tablets. It can occur through
SMS, Text, and apps, or online in social media, forums, or
gaming where people can view, participate in, or share content.
It includes sending, posting, or sharing negative, harmful, false,
or mean content about someone else like sharing personal or
private information causing embarrassment or humiliation.
Some cyberbullying crosses the line into unlawful or criminal
behavior (What Is Cyberbullying 2020).

Online Predation - is the act of engaging an underage minor


into inappropriate sexual relationships through the internet.
Online predators may attempt to initiate and seduce minors
into relationships through the use of chat rooms or internet
forums. Online predators may try to lure kids and teens into
sexual conversations or even face-to-face meetings. Predators
will sometimes send obscene material or request that kids send
pictures of themselves (Internet Safety for Kids-Staying safe
from online predators n.d.).

Flaming - is the act of saying mean things online, usually in


ALL CAPS, and often in a public forum with the intention to
humiliate.

13

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

Online Ethics and Etiquette

In order for you to be safe and you can protect your private information while you
are working online, you need to know and apply online ethics and etiquette.

Online ethics focuses on the acceptable use of online resources in an online social
environment. Netiquette is a combination of the words network and etiquette and
is defined as a set of rules for acceptable online behaviour (What is Netiquette? A
Guide to Online Ethics and Etiquette n.d.).

10 Basic Rules of Netiquette

The rules of etiquette are just as important in cyberspace as they are in the real
world (Hartney 2020)

1. Make Real People a Priority


If you are talking personally and face to face with someone, stop browsing or
chatting with anybody else in your cellphone.

2. Use Respectful Language


Avoid name-calling, cursing, expressing deliberately offensive opinions. In
typing, don't use caps lock. Text in all caps is generally perceived as yelling or
flaming which cause misunderstanding and trouble. Please don't forget to say
please and thank you as appropriate.

3. Share With Discretion

Avoid sending naked sexy pictures, drunk pictures, drug use pictures or
unedited home video. If you would have a problem with your boss, your parents,
or your kids seeing it now, or at any point in the future, don't post it online.
Children should not post private information online. Do not also share your
location or picture where you are currently at. Keep your personal information
private.

4. Don't Exclude Others


Don’t let others feel that they are the one you are talking to in your
obscure comment to your Facebook status, forum or Instagram story. And if
you have an in-joke to share with one other person, or a small number of people
in a larger online group, send them a private message.

5. Choose Friends Wisely


It is insulting to be dropped from someone's friend list on a social media
site. So, think about it before sending a friend request or accepting an
invitation. If you don't want to be in touch with someone, don't add them in the
first place. This must be observed by kids or teens so they will not be a victim of
online predation. People sometimes are good in pretending just to get your
attention or use fake accounts.

14

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

6. Respect People's Privacy


One example is when you send email to multiple recipients, don’t send it
at once, you can send it privately individually or use BCC (blind carbon copy)
rather than CC (carbon copy). The same goes for uploading photos or videos
that include other people because others who are in this photo don’t want to be
viewed by unknown friends. This also applies for tagging people on Facebook
because others don’t want to be tagged. Another example is don't sign up for
newsletters and other communications using someone else's email address. If
you apply this rule, hackers might not have chance to enter and ruin your
digital life.

7. Fact Check Before Reposting


If you aren't sure of the facts that you’re going to repost, email it to
someone who does know or can find out. Or do a search on Google or
snopes.com. Because once you’ve reposted a fake news or false facts, many can
possibly believe it and spread once again. Don't forget also that many viruses
are circulated via chain letters and invitations. So forwarding or reposting this
kind of messages will not bring good luck but rather bad luck. Don’t forget to
cite the owner of the post or where it came from. And before posting, check
whether it is appropriate or inappropriate to others.

8. Respond to Emails Promptly


In doing this, you can easily check whether the emails you received are
spams, unsolicited messages or crafty stuffs and delete these right away. But if
you send your email to your friends or set it as public, then you need to respond
immediately. But double-check where it really came because there are people
who are fond of playing or making fake emails just to get in touch with you.
9. Update Online Information
Don't leave inaccurate information online that will mislead your friends
or your customers if you have an online business. If you have a business
website, update it regularly. Like your operating hours, if you are not available
for that time, change it right away.

10. Think before Click


Don’t hesitate to think before clicking because you might click an
unknown links or files that are likely to contain malware which will infect your
devices or a link to hacker’s website. Think before clicking Like in social media
posts because it might be a suicide post that will end to death because you
liked his suicidal post.

15

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

What’s More

In the table below, mark with a check ( ✓ ) the internet threats that can be
avoided in doing each netiquette. Internet threats are represented by letter in
the table under Internet Threats column.

a. Computer Virus f. Online Predation


b. Cyberbullying g. Pharming
c. Cyberstalking h. Phishing
d. Flaming i. Spam
e. Hacker j. Spyware

Internet Threats
Netiquette
a b c d e f g h i j

1. Make real people a priority


2. Use respectful language
3. Share with discretion
4. Don’t exclude others
5. Choose friends wisely
6. Respect people’s privacy
7. Fact check before reposting
8. Respond to emails promptly
9. Update online information
10. Think before you click

16

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

What I Have Learned

Every walk in our life nowadays deal with Information and Communication
Technologies and online or via the Internet. And it is very important to know how to
deal with these technologies and be aware with the different threats brought by the
internet. So that you can empower yourself on how to keep your private
information safe and secure online. _______________________ is your sensitive
personal information or your identity such as your username and passwords or
bank accounts. Having the knowledge of maximizing it in order to keep it safe and
secure is called _____________ or web safety or internet safety. It is also necessary to
apply __________ and ____________ to avoid problems in facing digital media.

You have learned that the different internet threats you need to be aware of are
computer viruses, spam _____________, email ______________, __________________,
_____________, __________________, ___________________, and spyware.

There are also internet threats that may affect your personal safety. These are
cyberbullying, ____________________, ____________________, and ____________________.

That’s why it is very important to know and apply online _______________ and
_______________. And in order for you to apply netiquette, you must always observed
the 10 netiquettes you have learned.

17

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

What I Can Do

Suppose that you have a cyberstalker and you want to get rid of him, and you want
to control who can see what you share, it is time for you to set your privacy
settings of your Facebook account. Just follow the steps.

For the Classic Facebook version:

1. Click in the top right of Facebook and select Settings.


2. Click Privacy in the left column.
1

3. Click Edit if you want to change the settings.


You can choose Public, if you want your post to be
seen by anyone,
Or restricted to your Friends only,
Or Friends except… you can deselect friends from the
list,
Or Specific friends, you can select few friends
Or Only me, you are the only one who can see your
post.

18

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

Assessment

MULTIPLE CHOICE: Select the best answer from the choices and write the letter
that corresponds to your answer on the answer sheet.
1. It is an act of engaging an underage minor into inappropriate sexual
relationships through the internet.
A. Cyberbullying B. Cyberstalking C. Flaming D. Online Predation
2. It focuses on the acceptable use of online resources in an online social
environment.
A. Good Moral B. Nethics C. Netiquette D. Online Ethics
3. Dan has finished all the written reports. He saved it in a flash drive and he
submitted it to his manager. The manager called him and said that his flash
drive is empty. Dan’s flash drive was infected with ____________.
A. Computer Virus B. Malware C. Phisher D. Spam
4. Precy has received an email from the bank asking her to update her personal
information for security purposes. She clicked the link and signed in.
Unknowingly, Precy is already a victim of ____________.
A. Blogging B. Flaming C. Pharming D. Phishing
5. You received a comment from an unknown friend in one of your posts in Social
Media saying “YOU IDIOT!”. What do you call this kind of act?
A. Acting B. Bullying C. Blogging D. Flaming
6. It is an internet threat that acquires sensitive personal information like
passwords and credit card credentials.
A. Malware B. Phishing C. Spam D. Virus
7. It refers to a set of rules for an acceptable online behaviour.
A. Ethics B. Good Moral C. Nethics D. Netiquette
8. This is one form of an internet advertising used by advertisers to get the
attention of web users but sometimes has an obscene or an offensive content
A. Adverts B. Cards C. Infographics D. Pop-ads
9. It is a software that can see all the things you are doing in your computer.
A. Attacker B. Hacker C. Spyware D. Tracker
10. It is an act of following, secret surveillance, persistent and manipulative calling
and texting, and other means of approaching the victim unexpectedly using an
online technology.
A. Cyberbullying B. Cyber-crime C. Cyberstalking D. Tracking
11. Devon is fund of taking photos. While they are practicing their play, he takes
an embarrassing photo of Lori who is a very shy girl. He then posts the photo on
social media and spread it to his friends. Lori is a victim of ___________________.
A. Cyberbullying B. Cyberstalking C. Flaming D.Online
Predation
12. Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in
the address bar and log in to the system. Unknowingly upon signing in, Lily’s

19

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

username and password has already been compromised and is now a victim of
___________.
A. Blogging B. Flaming C. Pharming D. Phishing
13. It is a deceitful practice of getting your personal information using email or text
messages.
A. Blogging B. Flaming C. Pharming D. Phishing
14. It is a small program or script that can negatively affect the health of your
computer.
A. Malware B. Phisher C. Spam D. Virus
15. He is a clever or expert programmer who can gain unauthorized access to
other computers.
A. Attacker B. Hacker C. Spyware D. Tracker

Additional Activities

Examine the message below and answer the questions that follows. Write your
answers in your notebook.

“Hello, STUPID! If you weren’t such an IDIOT, you’d understand why you’re
wrong about everything. But apparently you’re so RETARDED that you CAN’T
EVEN SPELL RIGHT. And also you’re FAT.” (Burnside 2019)

1. What kind of an internet threat do you think is this?


2. Why is this a threat to you?
3. What can you do to avoid this?
4. How will you reconstruct the message so it will not be hurtful?

20

Downloaded by Angelica Abing ([email protected])


Downloaded by Angelica Abing ([email protected])
21
Additional Activities: Assessment: What I Have
Learned:
It depends upon the 1. D 1. Private
answer of the 2. D information
student 3. A 2. Online safety
4. D 3. Ethics
5. D 4. Netiquette
6. B 5. Mail
7. D 6. Spoofing
8. D 7. Hacker
9. C 8. Pharming
9. Phishing
10. C
10. Pop-ads
11. A
11. Cyberstalking
12. C 12. Flaming
13. D 13. Online predation
14. D 14. Ethics
15. B 15. Netiquette
What’s More: What’s In: What I Know:
With check: 1. I 1. D
2. F 2. B
1. b, c, d, f 3. B 3. D
2. b, d 4. D 4. D
3. b, c, d, e, f 5. C 5. C
4. b, d 6. E
5. b, c, d, f 6. D
7. A
6. e, g, h, j 7. D
8. J
7. a, d, g, h, j 8. B
9. G
8. i 10. H 9. C
9. b 10. D
10. a, b, d, f, g, h, j 11. D
12. A
13. D
14. A
15. C
Answer Key
lOMoARcPSD|41564199
lOMoARcPSD|41564199

References
Andrea, Sybil. 2020. "Cyberstalking: definition and laws." NordVPN. February 11.
Accessed June 30, 2020. https://nordvpn.com/blog/cyberstalking/.
Boyd, Ashley. 2020. Which Video Call Apps Can You Trust? April 28. Accessed June
24, 2020. https://blog.mozilla.org/blog/2020/04/28/which-video-call-
apps-can-you-trust/.
Burnside, Keith. 2019. "Top 10 Internet Flame Wars." TopTenz. April 30. Accessed
July 2, 2020. https://www.toptenz.net/top-10-internet-flame-wars.php.

Christensson, Per. 2006. "Hacker Definition." TechTerms. Accessed June 30, 2020.
https://techterms.com/definition/hacker.
—. 2010. "ICT Definition." TechTerms. January 4. Accessed June 24, 2020.
https://techterms.com/definition/ict.

—. 2006. "Spyware Definition." TechTerms. Accessed June 30, 2020.


https://techterms.com/definition/spyware.

—. 2011. "Virus Definition." TechTerms. August 16. Accessed June 30, 2020.
https://techterms.com/definition/virus.
Department of Education. 2016. Empowerment Technologies: Student Reader.
Manila: DepEd Central Office.

Federal Trade Commission. 2019. "How to Recognize and Avoid Phishing Scams."
Federal Trade Commission Consumer Information. May. Accessed June 30,
2020. https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-
phishing-scams.

Hartney, Elizabeth. 2020. "10 Basic Rules of Netiquette or Internet Etiquette."


Verywellmind. January 13. Accessed July 1, 2020.
https://www.verywellmind.com/ten-rules-of-netiquette-22285.
n.d. "Internet Safety for Kids-Staying safe from online predators." GFCGlobal.
Accessed June 30, 2020.
https://edu.gcfglobal.org/en/internetsafetyforkids/staying-safe-from-
online-predators/1/.
OECD. 2019. "What is an “online platform”? in An Introduction to Online Platforms
and Their Role in the Digital Transformation." OECDiLibrary. May 13.
Accessed June 25, 2020. https://doi.org/10.1787/19e6a0f0-en.
n.d. "Pop-up Ad." Webopedia. Accessed July 1, 2020.
https://www.webopedia.com/TERM/P/popup_ad.html.

Preston, Lauryn. n.d. "What is Digital Media?" Digital Logic. Accessed June 30,
2020. https://www.digitallogic.co/blog/what-is-digital-
media/#:~:text=Digital%20media%20is%20any%20form,social%20media%2
C%20and%20online%20advertising.

Ramoran, Noel. 2011. "Internet Etiquette and Examples." Blogspot. September 6.


Accessed July 1, 2020. http://noel-

22

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

ramoran.blogspot.com/2011/09/internet-etiquette-and-
examples_2805.html.
n.d. "Republic Act 10173 – Data Privacy Act of 2012." National Privacy Commission.
Accessed July 22, 2020. https://www.privacy.gov.ph/data-privacy-act/.

Rouse, Margaret. n.d. "Pharming." TechTarget. Accessed June 30, 2020.


https://searchsecurity.techtarget.com/definition/pharming.

—. n.d. "Video Conferencing." TechTarget. Accessed June 25, 2020.


https://searchunifiedcommunications.techtarget.com/definition/video-
conference.
Seltzer, Diane. n.d. "Comparison Chart for Choosing Between Top Social Media
Sites for Marketing." Small Business Marketing Tools. Accessed June 27,
2020. https://www.sbmarketingtools.com/comparison-chart-for-choosing-
between-top-social-media-sites-for-marketing/.

Tino, Jessamen. 2016. "Online Ethics and Etiquette." SlideShare. August 23.
Accessed July 1, 2020.
https://www.slideshare.net/JessamenTino21/online-ethics-and-etiquette.

Tunggal, Abi Tyas. 2019. "What is Email Spoofing?" Upguard. December 9.


Accessed June 30, 2020. https://www.upguard.com/blog/email-spoofing.
2019. "What Causes Pop-up Ads and How to Remove Them." July 17. Accessed
July 1, 2020. https://www.hellotech.com/blog/what-causes-pop-up-ads-
how-to-remove.
2020. "What Is Cyberbullying." stopbullying.gov. May 7. Accessed June 30, 2020.
https://www.stopbullying.gov/cyberbullying/what-is-it.

n.d. "What is Netiquette? A Guide to Online Ethics and Etiquette." Webroot.


Accessed July 1, 2020. https://www.webroot.com/us/en/resources/tips-
articles/netiquette-and-online-ethics-what-are-they.

Images

https://img.favpng.com/12/2/20/spam-scalable-vector-graphics-email-icon-png-
favpng-cgZ3qpb3sSM9Td3zKsAA5JKxn.jpg
https://www.lifewire.com/thmb/i3UqlWLTVSUKcR-
JNmf_FJgt0qw=/768x0/filters:no_upscale():max_bytes(150000):strip_icc()/what-is-
email-spoofing-2483501-41bb3e27626f40c88e227ec6545120a8.jpg
https://cdn1.vectorstock.com/i/1000x1000/69/20/mail-phishing-icon-simple-
style-vector-22606920.jpg

https://www.cloudbric.com/wp-content/uploads/234.png
https://cdn.iconscout.com/icon/premium/png-256-thumb/computer-virus-9-
1105291.png

https://encrypted-tbn0.gstatic.com/images?q=tbn%3AANd9GcSZlQa-
NZyLPaQHa7poPqI3c4mePpvW2Ri76w&usqp=CAU

23

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

https://lh3.googleusercontent.com/proxy/FLzWcZesygYSNI3mr1O2aCVbb_laTwm
TLPYpvUH3ROZdsBNxjiY6z-
_sz9DASOuKsMiCDgqqO9eG9eUA9hj95Kstn5_8uS1B22gwfGc_4AZo8NsI1PThF3ax
5zwX9rNtQabwDw

https://icon2.cleanpng.com/20180715/zu/kisspng-cyberbullying-school-bullying-
mobbing-all-about-bu-cyber-bullying-
5b4c0fd499bda5.8432390615317114446297.jpg

https://img.favpng.com/10/20/1/cyberbullying-mobbing-school-bullying-png-
favpng-QPFDQZgMxiDrZ2GmWJ0CBXExS.jpg

https://encrypted-
tbn0.gstatic.com/images?q=tbn%3AANd9GcTvvBenogrwnYJQpLKKEdtnvQE4rts-
CEfv9A&usqp=CAU

24

Downloaded by Angelica Abing ([email protected])


lOMoARcPSD|41564199

For inquiries or feedback, please write or call:

Department of Education – Region III,


Schools Division of Bataan - Curriculum Implementation Division
Learning Resources Management and Development Section (LRMDS)

Provincial Capitol Compound, Balanga City, Bataan

Telefax: (047) 237-2102

Email Address: [email protected]

Downloaded by Angelica Abing ([email protected])

You might also like