You are on page 1of 4

Onlin Learning

e-
Digita Guide
l SUBJECT: HELE 5
Learni QUARTER: 1
LESSONngTITLE: RESPONSIBLE ICT USER
Progra
OBJECTIVES:
m

In this lesson, you are expected to:


 Identify the different safety rules when using the Internet.
 Distinguish the dangers and threats on the Internet and the ways on how to avoid them.
 Post and share materials using blogs and other resources online in a safe and responsible way.
 Join in a video and audio conferencing in a safe and responsible way.

YOUR LEARNING TASKS

BEFORE THE LOC

To achieve the intended learning outcomes and experiential teaching-learning process for this week, please be guided of
the following:

 Prepare your HELE 5 notebook, pencils, pens, and eraser.


 Prepare your learning station.
 Explore and Read this Learning Guide below to have an overview of the lesson for this week. 
 Be on time within the scheduled Live Online Classes
 Download the attached Power Point Presentation. (Lesson)
 Listen and engage yourself within the Live Online Classes.
 Prepare the necessary materials for the lesson. (Chrome Browser and Microsoft Office)

AFTER THE LOC


 Review your notes/lesson.
 Answer the assignment shown in the Power Point presentation and upload your answers on your HELE 5 FOLDER in
Google Drive: FW – HELE 5 - SURNAME and share the file with me.
 Prepare for the Offline Quiz and Activity.
TEACHER’S NOTES:

RESPONSIBLE ICT USER

• Efficient Management and Increased Productivity


Technology can improve management efficiency in terms of monitoring, planning, accountancy, stock control, inventory, and,
thereby, increase productivity.

• Increased Collaboration
Technology facilitates the exchange of ideas and designs, saves time, energy, and resources, and allows increased
collaboration among people in business resulting in greater output.

• Increased Communication
Technology allows real time communication across continents and time zones. It facilitates better communication and
exchange of information between clients and providers with the use of email, social media, blogs, and websites.

• Better Customer Satisfaction


Technology allows for better management, recovery, recording, and reporting of clientele data and information. Information
technology helps build and maintain a system for managing customer data.

POPULAR ONLINE TOOLS

• WIKI
A wiki is a website that allows Internet users to contribute, delete, make changes, or correct information on the content by
signing up.

• BLOG SITES
A blog site is a kind of website that contains online personal reflections, comments, and hyperlinks provided by the writer or
contributor. A user can create a blog by making a page from a website that supports blogging and update it. A blogger is the
person who maintains a blog site.

• EMAIL
Email is short for electronic mail. It is an electronic message sent from one device to another. Through email, a person can
send and receive personal and business-related messages with attachments, such as images and documents.

• TELECONFERENCE
Teleconference is a type of meeting involving three or more people in different locations by using computer networks capable
of transmitting audio and video data.

INTERNET SAFETY
• Make sure all personal information and passwords are kept private. Never put any contact details online and ensure
passwords are difficult to guess.
• Never meet up with people you only know online. Meeting someone from chat rooms and social networking sites
could be dangerous.
• Do not open emails from strangers and unknown sources. Email and attachments may contain viruses or threats that
can harm your computer.
• Not all information online is reliable. There are lots of information on the Internet that are not true. Always check or
verify all information and data. The best way to do this is to check the website and make sure it is a reliable source.
Example of such are educational institutions, government offices, established business institutions, and the like.

DANGER AND THREATS IN THE INTERNET

• SPAM EMAIL
This is also known as junk email, which involve unsolicited commercial correspondence flooding your account.

• SPYWARE
This is a computer program installed secretly on a personal computer to collect information or even take control over the
computer without the owner’s knowledge.
#OpenDownloadPopUps

• COMPUTER VIRUS
This is a malicious program that infects and destroys a computer system.
• Downloading Programs. Programs that contains the downloadable files are the commonest source of malware such as
freeware, worms, and other executable files
• Pirated or Cracked Software
• Email Attachments
• Internet

 HACKER
This is a person who is entering and controlling other people’s computer system without permission to sabotage a person’s
website or steal personal information.

SAFETY AND RESPONSIBLE PRACTICES IN THE INTERNET


• Use the computer or mobile device for learning, studying, and researching for information.
• Keep your password safe.
• Follow age restrictions and policies. Participants usually need to be older than 13 years of age.
• Show respect for others online and their work.
• Do not copy other people’s work. If you want to use material from someone else, make sure to ask permission and cite
the author or source. (PLAGIARISM)
• When posting your own materials and pictures make sure to use a watermark to show ownership. Indicate your own
policies regarding use of these materials by others.
• Do not make untrue and/or damaging remarks that embarrass others.
• Do not use other people’s accounts.
• Do not share another person’s full name or send his or her photo without permission.
• Be careful in sharing your personal information.
• Use your time wisely; if you are finished, log out, and turn off the computer. Avoid playing unnecessary games.
• For computer security, install and use a good anti-virus or protection system especially for users who are always
online. You can download for free or purchase propriety anti-virus software that is suitable for your needs.
• Be cautious of the messages that you receive. Some of them may be scam or fake companies wanting to obtain money
from unsuspecting clients.

REMINDERS:

 Submission of Performance Task #1 and #2 on or before September 13, 2020


 Kindly prepare your Microsoft Office and Scientific Calculator to be used for the upcoming lesson and Performance
Task by Week 5.

You might also like