You are on page 1of 2

Jeah S.

Quilantang BSED 3 Mathematics

A. Questions for Discussion

1. How can you practice the processes of internet exploration, source citation, research and data-
gathering protocols and website evaluation?

I practice the processes of internet exploration, source citation, research and data-gathering
protocols and website evaluation by being aware the right and wrong doings while accessing the
internet and doing it. I always put citation when using information from internet or other sources and
before using it I make sure that the sources is legit.

2. Cite ways on how you are going to integrate digital/cyber literacy in the teaching- learning process in
your specific discipline.

I am going to integrate digital/cyber literacy in the teaching- learning process in my specific


discipline by teaching the proper use of technology, using a social media and a digital school tools for
learning, providing guidance how to avoid plagiarism, teaching how to manage students online identity
for to avoid fishing and farming their information.

3. Share a personal experience/s wherein you encountered digital risk and consequences. What life
lessons and values have you realized and learned?

When I was at my Junior High School it was the rampant of using social media especially
facebook and no one teach us how to used it properly so sometimes I posted my problem in the
facebook or something negative to my fellow classmate, commenting not so nice like we’re bullying
classmate. One time we got called by our adviser.

Posting your personal problem in social media is really not a good idea. This is one of the worst
thing to do. If you have a problem in your classmate talk to them privately and be matured enough. I
believe that always think before you click.
B. Choose any type of cyberbullying. Describe it and write its purpose, procedure, principles and
prospective target indicated in the table below.

L Cyberbullying Type Purpose Procedures Principles Prospective


E Target
A Cyberstalking- Is a It involves a series Perpetrators can engage Cyberstalking Most
R particularly serious of behaviors and in cyberstalking directly involves the use of cyberstalking
N form of actions over a by emailing, instant information and victims were
I cyberbullying that period of time messaging, calling, communications found to be
N can extend to that are intended texting, or utilizing other technology (ICT) to female, aged 30
G threats of physical to intimidate, forms of electronic perpetrate more years or older
harm to the child alarm, frighten, or communications to than one incident and with a good
R being targeted. harass the victim communicate obscene, intended to level off
E and/or the vulgar, and/or repeatedly harass, education.
F victim’s family, defamatory comments annoy, attack,
L partner and and/or threats to the threaten, frighten
E friends. victims and/or the and/or verbally
C victim’s family, partner abuse
T and friends and use individuals((UNODC,
I technologies. 2015;Maras,2016).
O
N

You might also like