Академический Документы
Профессиональный Документы
Культура Документы
Empowerment Technologies
Grade 11
Learner’s Material
Quarter 1 – Module 2
_____________________________________
First Edition, 2020
2
Content Standard:
• ICT in the context of global communication for specific professional track.
Performance Standard:
• apply online safety, security, ethics, and etiquette standards and practice in
Objective:
1. Learn that it is important to consider one’s and others’ safety & reputation
when sharing information using digital media.
3
Activity 1: Pre-Assessment
Instructions: Write Yes if you agree with the statement and No if you disagree on the
blank before each number.
_____2. Your friend told you that his college application was rejected due to the fact
that you posted a video of him doing crazy stuff at a party. You posted the video
several years ago but later took it down to protect your friend’s reputation. Can your
friend be right that the college found the video.
_____3. You and your best friend play a lot of video games. One time, she asks you
for your password so she can help you level up and get in-game money. She promis-
es to keep your password a secret. Is it okay to give away your password?
_____4. You received an email stating that your mother’s bank account is going to be
forfeited if you do not respond to the email. Is it safe to reply?
_____5. You forgot that your essay for English class is due tomorrow. While doing
your research, you found a website offering free essays. Is it oaky to use the essays
from this free essay website?
4
Activity 2:
Instructions: Most of us use the Internet every day. Sometimes, we do not pay
attention on how much information we share online. Below is a questionnaire about
how much information you have shared so far. Put a check (✓) under Shared or Not
Shared.
2. Last name
4. Your address
How many checks did you put for Shared? If you put checks on the first
two items under Shared then there is a big possibility that your profile page can
easily be located by search engines. Is there any danger of being found by search
engines?
5
Activity 3:
Instructions: Research for several news and events related to cybercrime. Using
your cellphone or any video-recording device, report it as if you were a newscaster.
Present in 1-2 minutes recording.
6
Activity 4: Reading Activity
7
3. The name of your mother and Risky, yet not as risky as posting their full
father names, especially your mother’s maiden
name. In fact, you may have already encoun-
tered many websites that require your moth-
er’s maiden name as an answer to a secret
question whenever you lose your password.
5. Your home phone number This shared information is more risky than
sharing your personal phone number. Scams
usually use this information to deceive you,
one of which is when a stranger pretends to
know your parents or pretend to be you.
8
Tips to Stay Safe Online
The internet is a public place and it is up to you to protect yourself. Here are
some tips to help you stay safe when using the internet.
9
Internet Threats
Here are some of the threats you should be aware of when using the internet:
10
Protecting Reputation Online
Make no mistake, you and your family's online reputation is a big deal.
There are myriad individuals, including business associates, neighbors, other fam-
ily members, and yes, even potential identity thieves searching for you on a regular
basis.
Here are things you might want to consider before posting something over the
Internet:
1. Before you post something on the web, ask these questions to yourself:
Would you want your parents or grandparents to see it?
2. Your friends depend on you to protect their reoutation online. Talk to your
friends about this serious responsibility.
3. Set your post to private. In this way, search engines will not be able to scan
that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that post can affect you or other’s reputation, ask the one who
posted iy to pull it down or report it as inappropriate.
11
Copyright Infringement
Here are some tips that could help you avoid copyright infringement:
1. Copyright laws are designed to protect the creator of original works, which
are creative expressions from others using and profiting their work, without
permission.
12
Activity 5:
Answer the following using Microsoft Word. Once done, save your file with your
name. Send it on my FB messenger for checking:
1. Do you agree or disagree with the provisions of the copyright law? Defend your
answer.
2. How would you feel if someone posted something embarrassing about you?
What would you do?
RUBRICS
10 pts – Ideas
5 pts – Understanding
5 pts – Sentence Structure
20 pts TOTAL
13
Activity 6:
RUBRICS
10 pts – Graphics-Relevance
5 pts – Attractiveness
5 pts – Grammar
20 pts TOTAL
14
Activity 7:
You are going to construct an essay about your digital media life like.
You will be graded by the given Rubric below.
.
RUBRICS
10 pts – Ideas
5 pts – Understanding
5 pts – Sentence Structure
20 pts TOTAL
15
Activity 8:
Match Column A with Column B. Write the letter of the correct answer on
the space before each number.
A B
software
16
can achieve
Activity 9:
17
Books:
EMPOWERMENT TECHNOLOGIES, Innovative Training Works, INC. Second
Edition
Websites:
https://www.youtube.com/watch?v=lfiKA8REolg
18
Activity 1:
1. NO
2. YES
3. NO
4. NO
5. NO
Activity 2:
Answers vary
Activity 3:
Answers vary
Activity 4:
Reading
Activity 5:
Answers vary
19
Activity 6:
Answers vary
Activity 7:
Answers vary
Activity 8:
1. e
2. b
3. c
4. d
5. a
Activity 9:
Answers vary
20
Department of Education Region 4A CALABARZON Division Rizal
Landline: 02-8571-4284
21