Вы находитесь на странице: 1из 10

Lourdes College

Inc.
Integrated Basic Education Department
Macasandig, Cagayan de Oro City

Module for Online Learning

General Instructional Guidelines

SUBJECT: EMPOWERMENT TECHNOLOGIES for Grade 12

Greeting: Good morning / afternoon everyone! Praised be Jesus and Mary! Welcome to our
module for this session. You will find here our general instructional guidelines, then
the components of our module. You will be guided one step at a time through the
specific instructions of the learning tasks given below, which intend to develop our
cognitive skills as well as our values, considering current social realities. Let joy and
peace abound in your mind and heart as you genuinely and responsibly respond to
the learning processes that this module offers.

I. General Instructional Guidelines


1.1 Please refer to the Unit Plan for the Subject description, minor and major performance
tasks, and criteria for grading. Consultation will be provided through our group chat,
email, Gmail, SMS, Edmodo or other social network. I will monitor your participation
in our learning activities through these chosen media. In addition, you are always
encouraged to voice any concerns on internet connections so that appropriate
adjustments can be done.
1.2. Your honesty and integrity are few of the most important component to whatever
outputs asked from the module. A plagiarism-checker tool will be utilized as one of the
measures in assessing your outputs. Use in-text citation (citing the author and year) when you
mention a statement coming from a source other than the list of references that can be found in
your paper.
1.3. Feedback is an essential component in this mode of delivery. You will be asked of your
assessment of your learning experience in this subject so that we will be able to improve our
learning processes in the succeeding instructional delivery.

B.2 Specific Instructions for the Learning Activity

You are reminded that at the end of the module, you are expected to comply all the required
tasks/activities, and answer post-test showing all your solutions for the activities.

Note: Kindly upload your output in our Google Classroom using your account. File name must
be: FamilyName_Activtity_A.
Example: Salugsugan_Activity_A. Deadline will be on August 10, 2020, 6PM sharp. If you have
considerable concerns or problems, feel free to communicate about it.

Module No. 3: Rules of Netiquette

Module Overview: This module allows you to be aware on how to be safe and secured
through ICT. In the past, safety and security is all about protecting our computers from
different types of various attacks. Today, online safety and security has been a big issue
because of the Internet’s vast reach, constantly and fast changing technology.
Nowadays, knowing online safety as well as security is indeed a must to protect one
from numerous online hazards.

LESSON 3: ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE

TRANSFER GOAL/LEARNING OUTCOME:


The students in the long run and on their own will be able to effectively use online
platforms and sites in their everyday lives to help the nation by considering innovations
as God’s design in aiding society’s ways of communication.

OBJECTIVES:
In these lessons, you will learn the following:
1. consider one’s and other’s safety when sharing information using the Internet;
2. consider one’s and other’s reputation when using the Internet;
3. determine and avoid the dangers of the Internet; and

4. be responsible in the use of social networking sites.

CONTENT FOCUS:

ENRICH YOUR KNOWLEDGE


Familiarity with online terminologies help users to better understand and navigate their
way around the Internet. The following are common terms that you will encounter on the
web. Here’s a link for additional terms to remember
https://quizlet.com/144314453/lesson-2-online-safety-security-ethics-etiquette-flash-
cards/
 Internet Safety or Online Safety – It refers to the online security or safety of
people and their information when using the Internet.
 Internet Security – a very broad issue covering security in relation to transaction
made over the Internet. It encompasses the security of data entered through a
web form, browser security, and overall authentication and protection of data
sent via Internet protocol.
 Ethics – refers to a set of moral principles that govern an individual or a group on
what is considered as acceptable behaviour while using a computer.

 Netiquette – means acceptable rules for online behavior.

ONLINE SAFETY TIPS:


For more examples on online safety, open this link below.
 https://enelsonbalneg.weebly.com/uploads/8/5/5/6/85567274/unit_2_lesson_2-
4__14-43__second_week.pdf
 https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-
safety-rules-and-what-not-to-do-online

 Be mindful on what you share online.


 Do not just accept terms and conditions, read it.
 Do not share your password with anyone.
 Do not talk to strangers whether online or face-to- face.
 Never post anything about a future vacation.
 Add friends you know in real life.
 Avoid visiting untrusted websites.
 If you have WiFi at home, make it private by adding a password.
 Install and update an antivirus software on your computer.
 Avoid downloading anything from untrusted websites.
 Buy the software, do not use pirated ones.
 Do not reply or click links from suspicious emails.
To help you better understand, please watch this Youtube video,
https://www.youtube.com/watch?v=0-9X110ln_I

INTERNET THREATS
1. Malware – stands for malicious software, it is intended to damage or disable
computer systems which has codes to collect information without one’s knowledge.
Kinds of Malware:
a. Virus – a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks, FDs, CDs, etc.)
b. Worm – a malicious program that transfers from one computer to another by
any types of means. Ex. ILOVEYOU Worm
c. Trojan – a malicious program that disguises as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get
your information.
d. Spyware – a program that runs in the background without you knowing it (thus
called “spy”). It has the ability to monitor what you are currently doing and typing
through keylogging.
e. Adware – a program designed to send you advertisements, mostly as pop-
ups.
f. Ransomware – or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim's data or perpetually block
access to it unless a ransom is paid.
2. Spam – an unwanted email mostly from bots or advertisers. It can be used to send
malware.
3. Phishing – an unwanted acquisition of sensitive personal information like passwords
and credit card details.

To help you better more understand about Internet threats, please read this file from the
given link below.
https://www.kaspersky.com/resource-center/threats/computer-viruses-and-malware-
facts-and-faqs

Government Provisions for Online Courtesy and Etiquette


Republic Act 10627 or Anti-Bullying Act of 2013
Republic Act 10175 or Cybercrime Prevention Act of 2012
Copyright – is a form of protection for an author’s original piece of work or IPR
(Intellectual Property Rights). This protection gives the owner of the copyright the
“exclusive right” to decide who can sell or reproduce their work.
TAKE ACTION:

TASK 1: BOOST YOUR KNOWLEDGE


Conduct a research on different online threats or computer viruses that caused
major problem to computers and even to computer networks in the recent past. List
them below and write the important details about each.

TASK 2: TAKE THE CHALLENGE!


Using any available online photo editing platforms, create a campaign poster
promoting “Think before you click” This campaign is an awareness program for our
society. Print the poster or attach a softcopy of it.
TASK 3: CYBER NEWS REPORT
Research and read several news and events related to cybercrime. Using
Microsoft Word, design and create a simple newsletter about the topic you have
chosen. Insert some designs and graphics of your output.

Note: Send your final outputs in our Google Classroom following the given file name
format.

TASK 4: EXPRESS YOURSELF!


Answer the following questions. Limit your answer in 3-5 sentences only. Your
answer will be rated through a criteria.
Criteria:
Content - 5
Organization - 3
Neatness - 2
10

1. How can you apply safety, security, ethics and etiquette standards and practice in the
use of ICT?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

2. Why should users of social media observe netiquette?


______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

INTEGRATION:
Ignacian Core/Related Value
Core Values: Excellence
Related Values: Discipline
Question: The Internet is a vast world filled with numerous data. What would the user
lose when s/he has a bad record online and this would always pop up in search results?

b. Social Orientation: Disseminating of Fake News


Question: In our current situation, what would you lose when you disseminate fake
news all over your social media accounts?

c. Lesson Across Discipline: Personality Development


Question: The moment that you have connected online, you are part of the Internet. To
protect and develop your personality in an ambiguous environment, what are the
necessary steps that you should take? Should you also take care of your identity online
like taking care of your identity in the real world?
d. Faith Biblical Reflection:
“Do not steal. “Do not lie. “Do not deceive one another.” - Leviticus 19:11
PERFORMANCE TASK: EXPRESS YOURSELF!
As prophets of hope and evangelizers of God’s word, make a creative and
informative video on the topic “Online Safety, Security and Ethics”. You can use
your cell phone or any video-recording device. A minimum of 2 min. and maximum of 3
min. video presentation.

Category Exemplary Proficient Partially Incomplete Points


Proficient
(10) (8) (5) (3)
Concept Has clear Has a fairly Has Little effort has
picture of what clear picture of brainstormed a been spent on
to achieve. what to concept but no brainstorming
Adequate achieve. clear focus has on the concept.
description. emerged.

Content/ Has clear Information is The content Content lacks a


Organizatio statement of presented as a does not present central theme,
n purpose or connected a clearly stated clear point of
theme and is theme with theme, is vague, view and
creative, accurate, and some logical
compelling and current information does sequence of
clear. Has rich supporting not seem to fit information.
variety of information. the main idea. Information is
supporting incorrect or
information. incomplete.
Quality Video was Video was Video was made, There was no
completed and completed and but had very little video unedited
had all required contained all if any editing. with no
elements. The required items. Many poor shots transitions or
video was well Editing was not remain. Video audio support
edited and done as well as was very of any kind.
moves it should have fragmented and
smoothly from been. Some choppy.
scene to scene poor shots
with proper remain.
transitions.
Final Score

Note: Send your final outputs in our Google Classroom following the given file name
format.
Summing up what I learned in my journey through this lesson:

I learned that
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

I realized that
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

I promise to
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

FEEDBACK
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
REFERENCES:
“McAfee teen Safety Test: How Safe Is Your Surfing? “McAfee, n.d. Web. 22 May 2020.
Norman AS. “Top 10 Internet Threats.” Norman.com, n.d. Web. 22 May 2020.
ANON. Empowerment Technologies Innovative Training Works, First Edition, REX, 2016.
ANON. Empowering ICT Empowerment Technologies-Senior High, CAD, 2017.

LUJERO, R., Empowerment Technologies, VIBAL Group, Inc., 2018.

Вам также может понравиться