You are on page 1of 4

IMMACULATE CONCEPTION HIGH SCHOOL OF PITOGO, INC.

7033, Pob. Pitogo, Zamboanga del Sur


S.Y. 2020 - 2021
Student’s Learning Activity in Empowerment Technologies

Learners Name: Activity No.: 2


Values: Honesty Quarter: 1
Reference/s: Internet Grade Level: 11
Teacher: Aurelio E. Buco Jr.
CONTENT STANDARD/S: The learners demonstrate an understanding of ICT in the context of global communication for
specific professional track.
PERFORMANCE STANDARD/S: The learners shall be able to independently compose an insightful reflection paper on
the nature of ICT in the context of their lives, society, and professional tracks.
Objectives: At the end of the lesson, the students will be able to:
 Describe netiquette and online safety
 Familiarize online safety, security and rules of netiquette

I. INTRODUCTION

CONCEPT NOTES / ESSENTIAL IDEAS

ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information when using internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.

TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human

You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.

You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online just like you can in
real life.
You are still talking to a real person with feelings even though you can’t see them.

Rule no. 3: Know where you are in cyberspace.

Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.

Remember people have other things to do besides read your email. You are not the center of their world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.

Be polite and pleasant to everyone.


Always check your spelling and grammar before posting.
· Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge

Ask questions online


Share what you know online.
Post the answers to your questions online because someone may have the same question you do.

Rule no. 7: Help keep flame wars under control

Netiquette does not forgive flaming.


Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.

Rule no. 8: Respect other people’s privacy.

Do not read other people’s mail without their permission.


Going through other people’s things could cost you, your job or you could even go to jail.
Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.

Do not take advantage of other people just because you have more knowledge or power than them.
Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.

Do not point out mistakes to people online.


Remember that you were once the new kid on the block.
You still need to have good manners even though you are online and cannot see the person face to face.

Internet security
Types of System Intruders

 Masquerader
 Hackers
 Clandestine user

Cyber crimes
- a crime committed or assisted through the use of the Internet.

Malware- stands for malicious software.

 Virus- a malicious program designed to transfer from one computer to another in any means possible.

 Worms– a malicious program designed to replicate itself and transfer from one file folder to another and also
transfer to other computers.

 Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hacker to get your information.

Spyware– a program that runs in the background without you knowing it. It has the ability to monitor what you are
currently doing and typing through key logging.

Adware- a program designed to send you advertisement, mostly pop-ups.

Spam– unwanted email mostly from bots or advertisers.

Phishing- acquires sensitive personal information like passwords and credits card details.

Pharming- a more complicated way of phishing where it exploits the DNS system.

Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by
law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism,
parodies, research and etc.

Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive
information.

Rogue security softwares– is a form of malicious software and internet fraud that misleads users into believing there
is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.

II. INTERACTION

LEARNING EXPERIENCE
1. Clarifying Understanding:

 Describe netiquette and online safety in your own idea.

 Choose at least 1 rule of netiquette you are familiar with then explain it in your own.

2. Processing Question:

 Why do we need to be familiar with online safety, security and the netiquettes? Cite some
consequences if not following those online safety tips and guidelines?

3. Assessment:
Direction: Identify and write the appropriate answer on the space provided before the number.

_______________ 1. A more complicated way of phishing where it exploits the DNS system.
_______________ 2. Unwanted email mostly from bots or advertisers.
_______________ 3. A crime committed or assisted through the use of the Internet.
_______________ 4. Used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.
_______________ 5. A malicious program designed to transfer from one computer to another in any means
possible.
III. INTEGRATION

A. FRAMING CONCEPTS

Write down the things that you learn from this topic
___________________________________________________
___________________________________________________
___________________________________________________

Write down the things that need clarification


___________________________________________________
___________________________________________________
___________________________________________________

B. LIFELONG LEARNING

As a student of this subject, how will you spread awareness about the threats and dangers and educate the
proper netiquettes in using the internet to your family, friends, or anyone especially now that almost all the
people including the oldies and young ones are using this and not very particular with the netiquettes and the
safety measures in using the internet?

You might also like