Professional Documents
Culture Documents
MIL12WS7Q4W8
Senior HIGH SCHOOL DEPARTMENT Journal Entry
This material is intended for your personal use only. Please respect the intellectual property rights of the author,
including the references of the material. DO NOT SHARE OR POST this material to any social media or online
platforms
Direction: Read each statement carefully, write TRUE if the statement is correct and FALSE if not.
___True________________2. The golden rule “Do unto others as you would have others do unto you” adheres to the ten
rules of cyberbullying.
__True_________________3. Excessive use of technology that interferes activities in daily life refers to cybercrime.
_____True______________5. Identity theft refers to harvesting of personal details to ransack other’s bank accounts.
A B
_D__1. Economic in equality between groups in terms of access to, use of, or knowledge of A. PHISHING
ICT.
B. RA 10175
_F__2. Sending messages/ emails of insult, humiliating photos and fake profiles deliberately
shared across social media C. RA 8293
_E__3. Happens when sellers pretend to sell goods or services which, after payment, do not D. DIGITAL
show the promised attributes or are not delivered at all DIVIDE
_A_4. Harvesting bank details, in particular personal identification numbers with the intent E. COMMERCIAL
to ransack other people’s bank accounts. FRAUD
_B__5. A government act that aims to address legal issues concerning online transactions F. CYBER
and technology related concerns in the country. BULLYING
Activity 3: ESSAY
__Cybercrime refers to any illegal activity out using computers or the internet. The example of this were sending
hurtful texts o instant message, posting embarrassing photos.
We must protect our social media accounts, that we must make difficult passwords so that they can’t hacked your
account. We must not trust strangers in online when they’re messaging you some questions that they want you to
provide and sent some personal information.
_We can protect ourselves by securing our computer and mobile devices, so that they can block connections to
unknown or bogus sites and will keep various viruses and hackers. And We must use anti-virus prevent viruses
from infecting your computer by installing it.
__Computer addiction can result from people using it repeatedly as their main stress reliever instead of having a
variety of ways to cope with negative events and feelings._____________________________________________
Score
Name of the Learner: _Mary Roan C. Delos Santos____________
This material is intended for your personal use only. Please respect the intellectual property rights of the author,
including the references of the material. DO NOT SHARE OR POST this material to any social media or online
platforms
GLOBE: Congrats! You’re the one selected postpaid Plan given P150 discount billing,
to get your P150 discount billing, just text 150 then send to 29056509391.
Thank You Globe Postpaid Subscriber!
1. What is the tone of this fraudulent message? Enticing, scary, informative, formal, encouraging) Why do
you think so?
It’s very suspicious because the sender is saying that to your 150 discount billing you must text 150 then send to
the given number, it’s not very usual to have this kind of message that has sent to someone.
2. Do you think Filipinos fall for this kind of fraudulent or scam text message? Why?
It depends on them but mostly they will not going to pay attention on that kind suspicious message because
they can have the hint that it’s just a scam message.
Because the others can be encourage from that text scam because of its money that you can have that’s why
others can fall on that suspicious text scam.
I will not pay attention to it so that I can be safe from that scam message, and just going to leave out that
message and I am going to say to my family members so that they can be inform on any suspicious text message
on that they will be receiving at so that they can be safe from scam text messages.