Вы находитесь на странице: 1из 21

1

Empowerment Technologies
Grade 11
Learner’s Material
Quarter 1 – Module 2
_____________________________________
First Edition, 2020

Published by: Department of Education Division Rizal


Schools Division Superintendent: Cherrylou D. Repia

2
Content Standard:
• ICT in the context of global communication for specific professional track.

Performance Standard:

• Compose an insightful reflection paper on the nature of ICT in the context of


their lives, society, and professional tracks (Arts, TechVoc, Sports, Academic).

Most Essential Learning Competency:

• apply online safety, security, ethics, and etiquette standards and practice in

the use of ICTs as it would relate to their specific professional tracks

Objective:

1. Learn that it is important to consider one’s and others’ safety & reputation
when sharing information using digital media.

2. Determine and avoid the dangers of internet.

3
Activity 1: Pre-Assessment

Instructions: Write Yes if you agree with the statement and No if you disagree on the
blank before each number.

_____1. My computer has an antivirus so it is okay to open most email attachments


like e-cards and video files.

_____2. Your friend told you that his college application was rejected due to the fact
that you posted a video of him doing crazy stuff at a party. You posted the video

several years ago but later took it down to protect your friend’s reputation. Can your
friend be right that the college found the video.

_____3. You and your best friend play a lot of video games. One time, she asks you
for your password so she can help you level up and get in-game money. She promis-
es to keep your password a secret. Is it okay to give away your password?

_____4. You received an email stating that your mother’s bank account is going to be
forfeited if you do not respond to the email. Is it safe to reply?

_____5. You forgot that your essay for English class is due tomorrow. While doing
your research, you found a website offering free essays. Is it oaky to use the essays
from this free essay website?

4
Activity 2:

Instructions: Most of us use the Internet every day. Sometimes, we do not pay
attention on how much information we share online. Below is a questionnaire about
how much information you have shared so far. Put a check (✓) under Shared or Not
Shared.

How Safe Are You?

Type of Information Shared Not Shared


1. First name

2. Last name

3. The name of your mother & father

4. Your address

5. Your home phone number

How many checks did you put for Shared? If you put checks on the first

two items under Shared then there is a big possibility that your profile page can

easily be located by search engines. Is there any danger of being found by search

engines?

5
Activity 3:

Instructions: Research for several news and events related to cybercrime. Using
your cellphone or any video-recording device, report it as if you were a newscaster.
Present in 1-2 minutes recording.

Note: Send your video files on my FB messenger for checking.

6
Activity 4: Reading Activity

Lesson Notes: Read and understand the lesson being presented.

Online safety and Security


Internet safety, or online safety, is the knowledge of maximizing the user's
personal safety against security risks to private information and property associated
with using the Internet, and the self-protection from computer crime in general.

How Safe are You?


Let us visit each item and see how risky it is to share them.

TYPE OF INFORMATION RISKS


1. First name There is a risk in sharing your first
name. Chances are, a hacker may
already know plenty of stuff about
you even if you only give out your
first name.

2. Last name If sharing your first name is a small


risk, having both your first and last
is more risky. You will be vulnera-
ble to being searched for using
search engines, which include im-
age search. Matching a name and a
face is a modus to several cyber-
crimes like identity theft.

7
3. The name of your mother and Risky, yet not as risky as posting their full
father names, especially your mother’s maiden
name. In fact, you may have already encoun-
tered many websites that require your moth-
er’s maiden name as an answer to a secret
question whenever you lose your password.

4. Your address Hopefully, you answered no to this one. Giv-


ing the internet your number is one thing;
giving them your address is a whole other
level. It would be much easier for criminals
to find you.

5. Your home phone number This shared information is more risky than
sharing your personal phone number. Scams
usually use this information to deceive you,
one of which is when a stranger pretends to
know your parents or pretend to be you.

8
Tips to Stay Safe Online

The internet is a public place and it is up to you to protect yourself. Here are
some tips to help you stay safe when using the internet.

1. Be mindful of what you share online.


2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles
the information you share.
1. Know the security features of the social networking site you use.
2. Do not share your password with anyone.
3. Avoid logging in to public network/Wi-Fi.
4. Do not talk to strangers online.
5. Never post anything about future vacation.
6. Add friends you know in real life.
7. Avoid visiting untrusted websites.
8. Install and update an antivirus software on your computer.
9. Make your Wi-Fi at home private by adding a password.
10. Avoid downloading anything from untrusted websites.
11. Do not use pirated software.
12. Do not click links from suspicious emails.

9
Internet Threats

Here are some of the threats you should be aware of when using the internet:

1. Malware– stands for malicious software.


a. Virus-a malicious program designed to replicate itself and transfer from one
computer to another either through the internet and local networks or data storage
like flash drives and CDs.
b.Worm-a malicious program that transfer from one computer to another by
any type of means. Often, it uses a computer network to spread itself.
c.Trojan-a malicious program that is disguised as a useful program but once
downloaded or installed, leaves you PC unprotected anf allows hackers to get you
information.
*Rogue security software-tricks the user into posing that it is a security soft-
ware. It asks the user to pay to improve his/her security but in reality, they
are not protected at all.
d. Spyware-a program that runs in the background without you knowing it
(thus called “spy”). It has the ability to monitor what you are currently doing
and typing through keylogging.
*Keyloggers-used the record the keystroke done by the users. This is done to
steal their password or any other sensitive information.
e. Adware-a program designed to send you advertisements, mostly as pop ups

2. Spam– unwanted emails mostly from bots or advertisers. It can be used to


send malware
3. Phishing-Its goal is to acquire sensitive personal information like passwords
and credit cards details. This is done by sending you an email that will direct
the user to visit a website and be asked to update his/her username, pass-
word, credit card, or personal information.
*Pharming-a more complicated way of phishing where it exploits the DNS
(Domain Name Service) system.

10
Protecting Reputation Online

Make no mistake, you and your family's online reputation is a big deal.
There are myriad individuals, including business associates, neighbors, other fam-
ily members, and yes, even potential identity thieves searching for you on a regular
basis.

Think Before You Click

Here are things you might want to consider before posting something over the
Internet:

1. Before you post something on the web, ask these questions to yourself:
Would you want your parents or grandparents to see it?
2. Your friends depend on you to protect their reoutation online. Talk to your
friends about this serious responsibility.
3. Set your post to private. In this way, search engines will not be able to scan
that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that post can affect you or other’s reputation, ask the one who
posted iy to pull it down or report it as inappropriate.

11
Copyright Infringement

Copyright infringement pertains to the violation of someone's intellectual prop-


erty (IP). It is another term for piracy or the theft of someone’s original creation, es-
pecially if the one who stole recoups the benefits and not the creator of the
material.

Here are some tips that could help you avoid copyright infringement:

1. Copyright laws are designed to protect the creator of original works, which
are creative expressions from others using and profiting their work, without

permission.

2. Use Caution If It's Not Your Original Work.

3. Read, Read, Read.

4. Don't Believe the Urban Legends.

5. Look for Fair Use.

12
Activity 5:
Answer the following using Microsoft Word. Once done, save your file with your
name. Send it on my FB messenger for checking:

1. Do you agree or disagree with the provisions of the copyright law? Defend your
answer.
2. How would you feel if someone posted something embarrassing about you?
What would you do?

RUBRICS
10 pts – Ideas
5 pts – Understanding
5 pts – Sentence Structure
20 pts TOTAL

13
Activity 6:

Create campaign materials promoting “Think before you click.” It could be in a


form of small posters. When you are done, send your work as a pdf file on my FB mes-
senger.

RUBRICS

10 pts – Graphics-Relevance
5 pts – Attractiveness
5 pts – Grammar

20 pts TOTAL

14
Activity 7:

You are going to construct an essay about your digital media life like.
You will be graded by the given Rubric below.
.

“The Role of Social Media in my Life”

RUBRICS
10 pts – Ideas
5 pts – Understanding
5 pts – Sentence Structure
20 pts TOTAL

15
Activity 8:

Match Column A with Column B. Write the letter of the correct answer on
the space before each number.

A B

____1. virus a. designed to send your advertisements

____2. rogue b. tricks the user into posing that it is a security

software

____3. spam c. unwanted email mostly from bots

____4. fair use d. allows you to use copyrighted work without

consent with certain limitations.

____5. adware e. replicates and can transfer from one computer


to another

f. exploits the DNS system

16
can achieve

Activity 9:

I understand that __________________________


_______________________________________________
_______________________________________________
______________________________________________.

I realize that ______________________________


_______________________________________________
_______________________________________________
______________________________________________.

17
Books:
EMPOWERMENT TECHNOLOGIES, Innovative Training Works, INC. Second
Edition

Websites:

https://www.youtube.com/watch?v=lfiKA8REolg

18
Activity 1:
1. NO
2. YES
3. NO
4. NO
5. NO

Activity 2:
Answers vary

Activity 3:
Answers vary

Activity 4:
Reading

Activity 5:
Answers vary

19
Activity 6:
Answers vary

Activity 7:
Answers vary

Activity 8:
1. e
2. b
3. c
4. d
5. a

Activity 9:
Answers vary

20
Department of Education Region 4A CALABARZON Division Rizal

Office Address: DepEd Bldg.,Cabrera Rd.,Bgy. Dolores,Taytay,Rizal 1920

Landline: 02-8571-4284

Email Address: rizal@deped.gov.ph

21

Вам также может понравиться