You are on page 1of 4

Republic of the Philippines INTERNET ETIQUETTES (NETIQUETTES)

Department of Education 1. The Golden Rule – treat others as you would like to be treated.
REGION VII, CENTRAL VISAYAS 2. NO Flaming – watch your posts or comments. FLAME – is a personal
DIVISION OF CEBU PROVINCE insult communicated through the internet.
LILOAN NATIONAL HIGH SCHOOL 3. Don’t Type in ALL CAPS – people may misinterpret it.
POBLACION, LILOAN, CEBU 4. Don’t Spam SPAM– it is any unsolicited email from unknown sources.
5. Don’t talk with people you do not know.
SELF-LEARNING HOME TASK (SLHT) 6. Obey Copyright Laws.
MIDTERM – 2ND SEMESTER 7. Follow the TOS – Terms of Service – rules and policy of the sites.
8. Use Proper Grammar and Spelling.
Subject: Empowerment Technology Grade Level: GRADE 12
9. Be HONEST / Be Yourself.
SLHT 2.4
10. Shop Secure Sites.
Learning Competency: Online safety, security, ethics, and etiquette standards
and practice in the use of ICTs of the K-12 (CS_ICT 11/12-ICTPT-Ia-b-2). Assessment
Activity I. Directions: Read the short selection below and answer the
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE questions that follow.
Readings: Bizarre Messages
TEN COMMANDMENTS OF INTERNET ETHICS Written by Elan G. Gerra
1. You shall not use the Internet to harm other people.
Athena went home around 6:00 o’clock in the evening and rushed to
2. You shall not interfere with other people’s Internet work. her room to change her clothes. As she sat down at her table, she turned on
3. You shall not snoop around in other people’s Internet files. her new computer and checked her Facebook Account. She received four
4. You shall not use the Internet to steal. message notifications.
5. You shall not use the Internet to bear false witness. Two were from her classmate named Hedes, the third message was
6. You shall not copy or use proprietary software for which you have not from her very close friend named Artemis, and the last message was from
paid (without permission). someone named Hercules. Athena could not
7. You shall not use other people’s Internet resources without remember anyone named Hercules in her classmates. With curiosity, she
authorization or proper compensation. opened the message. “I like you very much”. Kindly send me a picture of
8. You shall not appropriate other people’s intellectual output. yourself. Can you accept my friend request?”
9. You shall think about the social consequences of the program you are
That was the entire message. Athena still couldn’t figure out who
writing or the system you are designing.
Hercules was. When she’d created her Facebook account, she promised her
10. You shall always use the Internet in ways that ensure consideration and
respect for your fellow humans. mother that she’d never to a message from someone she didn’t know.
Meanwhile, Athena opened her assignment notebook in
Empowerment Technologies. Her assignment was to create a Gmail account 9. Do you have email account? Do you have Facebook account? If so, what are the
and send a message to her teacher after she made it. The platform was very rules regarding the use of your email or Facebook accounts?
useful in joining virtual classes. As she created the account, she was asked
to provide her first name, last name, username, password, birthday, and 10. List down at least five common online-related issues.
gender. She sent a message as part of the assignment after she successfully
Test I. Directions: Match column A with column B.
signed up.
COLUMN B
Out of knowing, she used her account to sign up with other
a person who uses computers to
applications she downloaded and installed in her device. After an hour, she
gain unauthorized access to data.
received an email with the link. She clicked the link and she was directed to
a certain website. As she opened it, a box popped up on the screen. Blinking the state of being free from danger
with text “Congratulations” You won Php 500, 000 from Shopee online or threat.
app. Please click OK to claim your reward before it expires.
malicious software program loaded
Athena did not know how she entered to any online contests. She onto a user's computer without the
would need to know how it could be possible to win that amount that she user's knowledge
never applied any raffles or online contests.
a global computer network
QUESTIONS: providing a variety of information
1. What are the different platforms/websites/applications mentioned in the and communication facilities
story?
refers to anything that has the
2. What are the basic information provided by Athena to successfully sign up with potential to cause serious harm to a
the platforms she opened? computer system.

3. Based on the story, what are the bizarre messages received by Athena? facts provided or learned about
something
4. Should Athena send picture to Hercules? Why or Why not?
the state of being free from public the fraudulent practice of sending
5. What should Athena do regarding the popped-up box message? attention. emails.

6. What might happen if Athena entered personal information just to claim the a string of characters that allows access to a computer system or service.
reward?
the control of recognized hazards in order to achieve an acceptable level of
7. List a few reasons why Athena’s messages are suspicious?
the collection of data or computer instructions.
8. Should Athena reply to the messages without a picture? Should she ask, “Who
is this? Why or why not?
TEST II. Directions: Examine the pictures below. Write the answers on your answer
sheets. Add friends you know in real life.

Do not reply or clicks from suspicious Use anti-virus protection & firewall.
emails.
Backup your data regularly.
You shall not interfere with other
people’s Internet work. Shop secure sites.

Install & update an antivirus software Follow rules & policy of the sites.
on your computer.
Avoid downloading anything from
Do not share your password with untrusted websites.
anyone.
Never post anything about a future
vacation.
3
Do not use public WIFI.
Activity II. Directions: With the icons below, complete the poster by constructing
your own tips in securing your personal data. Write the answers on the answer
sheet.
When commenting, use
small caps.

Use proper grammar &


spelling.

No Flaming-watch your
posts or comments.

Protect your sensitive


Personal Identifiable
Information.

You shall not use the


internet to bear false
witness.

You might also like