Professional Documents
Culture Documents
2020-2021
Quarter 3
2
Content Standard: Performance Standard:
The learners demonstrate an understanding of: ICT in The learners should be able to independently
the context of global communication for specific compose an insightful reflection paper on the nature
professional track of ICT in the context of their lives, society, and
Most Essential Learning Competency:
professional tracks
Learning Targets:
1. Consider one’s and others’ safety when sharing information using the Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper
referencing.
BRAIN TEASER
Directions: Write Yes if you agree with the statement and No if you disagree on the blank
before each number.
____ 1. My Computer has an antivirus so it is okay to open most email attachments like e-
cards and video files.
____ 2. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in-game money. She promises to keep
your password a secret. Is it okay to give away your password?
____ 3. Letting people know your birthday is probably a must if you want to get as many gifts as
possible. But having it in your profile makes you vulnerable to identity theft.
____ 4. You forgot that your essay for English class is due tomorrow. While doing your research,
you found a website offering free essays. Is it okay to use the essays from this free
essay website?
____ 5. Your friend told you that his college application was rejected because you posted a video of him
doing crazy stuff at a party. You posted the video several years ago but later took it down to
protect your friend’s reputation. Can your friend be right that the college found the video?
1
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
What’s In
1. Most of us use the internet every day. Sometimes, we do not pay attention on how much
information we share online. Below is a questionnaire about how much information you
have shared so far. Put (√) mark under Shared or Not Shared.
How Safe are you?
Information Shared Not Shared
First Name
Last Name
Middle Name
Current and previous school(s)
Cellphone number
Names of your mother and father
Names of your siblings
Address
Home phone number
Birthday
2
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like most
things in this world, there is always “another side of the coin.” The Internet is one of the most
dangerous places, especially if you do not know what you are doing.
3
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
Most people would dispute that there is no such thing as private over the internet and
they may be right. There are hackers who can find a backdoor even if your profile is
already set to private. You have no control of who whoever is looking at your friend’s
screen whenever they open your profile or chat with you. You have no control over
Core
people getting access to Rules of
your friend’s Netiquette
account and seeing your private stuff.
4
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
5
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
group could be compromised. Don't feed the flames; extinguish them by guiding the discussion
back to a more productive direction.
Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed to some private or personal information that
needs to be handled with care. Perhaps someone is sharing some medical news about a loved
one or discussing a situation at work. What do you think would happen if this information "got
into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others
to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of
caution when deciding to discuss or not to discuss virtual communication.
Rule 9: Don't abuse your power
Like in face-to-face situations, there are people in cyberspace who have more "power" than
others. They have more expertise in technology or have years of experience in a particular skill
or subject matter. Maybe it is you who possesses all of this knowledge and power! Just
remember: knowing more than others do or having more power than others may have does not
give you the right to take advantage of anyone. Think of Rule 1: Remember the human.
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience working in the virtual world. And not everyone
knows the rules of Netiquette. At some point, you will see a stupid question, read an
unnecessarily long response, or encounter misspelled words; when this happens, practice
kindness and forgiveness as you would hope someone would do if you had committed the same
offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to
a mistake, do so in a private email rather than a public forum.
Shea, V. (1994). Core Rules of Netiquette. Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html
6
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
CHALLENGE QUESTIONS
How did you know you know that your computers/systems had
a virus?
Internet Threats
Malware
a. Virus – a malicious program designed to replicate itself and transfer from one computer
to another.
b. Worm – a malicious program that transfers from one computer to another by any type of
means.
c. Trojan - a malicious program that is disguised as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hacker to get you information.
* Rouge security software
d. Spyware - a program that runs in the background without you knowing it.
* Keyloggers – used to record the keystroke done by the user.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
7
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
2. Your friends depend on you to protect their reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull
it down or report it as inappropriate.
Copyright Infringement
1. Understand. Copyright protect literary works, photographs paintings, drawings, films,
music (and lyrics), choreography, and sculptures.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid
defense against copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you
or something made from somebody else’s creativity.
4. Know the law. There are some limitations to copyright
laws. For instance, in the Philippines, copyrights only last a
lifetime (of the author) plus 50 years. There are also
provision for “fair use,” which means that an intellectual
property may be used without a consent as long as it used
in commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching, and
education.
If you have doubts that what you are doing does not fall under the policy of fair use, seek
permission first.
8
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
Online Research
The information that we need is more likely already on the internet. It is just a
matter of how to look for it and how to use information from the most credible source.
Here are some tips in conducting online research:
1. Have a question in mind. Focus on a question you want answered.
2. Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to
determine the most appropriate result for you.
3. Advanced Search. The best way to filter information you get from search engines is
by using the advanced search.
9
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
4. Look for a credible source. Some wikis, filled with updated information, are not a credible source. When
using wikis, check out the link of the cited text.
This is due to the fact that anyone can edit its content
5. Give
Name credit.
of the Give
person orcredit to the original
organization author
(the author of of
thethe page or information.
information). Title of theTohome
properly
pagesite a reference,
in Italics (title you
mayinuse
is shown thethe
barformat
but is below.
sometimes missing or unrelated). URL. Date last seen.
Examples:
Resources
Lessons: Rex Book Store, Empowerment Technologies innovative training Works, Inc. First Edition
Images: Google images
Fb pages: Empowerment Technologies (EmTech) for Teachers
LEONA G. ALICPALA
Subject Teacher
10
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
Attachment
Name: ______________________________ Score: ______________
Grade/ Section: _______________________ Date: ______________
1
Privacy Policy
Directions: Visit a social networking site and look for the site’s privacy policy. The link is typically found
at the bottom of the page and sometimes labelled only “Privacy”. Write a summary on how the website
handles both your private and public information.
Summary:
Summary:
Summary:
11
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021
Attachment
Name: ______________________________ Score: ______________
Grade/ Section: _______________________ Date: ______________
2
Accomplish the items below using what you have learned from the Ten Rules of Netiquette.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
3. Is it okay to read other people's files and emails without their permission? Why?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
5. What should you do about a newbie who continually makes the same error on the Internet?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________
12