You are on page 1of 3

ANSWER SHEET IN

EMPOWERMENT TECHNOLOGIES
Module 2

Name: ______________________________________ Date:__________________


Grade and Section: _________________________
Lesson 2 Online Safety, Security, Ethics and Etiquette
What’s new: Fill in the blanks/page 4

1. 6.
2. 7.
3. 8.
4. 9.
5. 10.
What’s More Activity 1 : Case Study / page 9-10
Brian complains that his virus protection doesn’t work. What do you think has gone wrong?

Activity 2 Choose at least three of the mentioned online safety tips and explain.

What I Have Learned Answer the following questions / page 11


1. How does a virus infect a computer?

2. How do computer worms spread?

3. How do fraudsters use social media to steal information?


4. What do fraudsters who practice phishing usually steal?

5. When does copyright infringement occur?

What I Can Do/ page 12


Share an experience that you have always tend to do but later did you discover that it is not a
standard of ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE.

Assessment: Identification / page 13

1. 6.
2. 7.
3. 8.
4. 9.
5. 10.

You might also like