You are on page 1of 33

11

Media and Information


Literacy
Quarter 1 – Module 7:
Digital Divide, Addiction, and
Bullying
Media and Information Literacy – Grade 11
Alternative Delivery Mode
Quarter 1 – Module 7: Digital Divide, Addiction, and Bullying
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Writers: Gevilyn P. Montemayor
Editors: Dr. Cynthia B. Tablang Benedicta B. Santos
Reviewers: Dr. Orlando I. Guerrero Dr. Robert V. Flores Rojel B. Teodoro
Illustrator:
Layout Artist: Jestoni H. Amores
Management Team: Dr. Ronald B. Radoc
Dr. Orlando I. Guerrero
Dr. Rosario O Cabrera
Dr. Lorna G. Bugayong

Printed in the Philippines by Schools Division of Alaminos City

Department of Education – Region I

Office Address: Flores St. Catbangen, San Fernado City, La Union


Telefax: (072)682-2324; (072) 607-8137; 607-8136(f); 607-8133
E-mail Address: region1@deped.gov.ph
11

Media and
Information
Literacy
Quarter 1 – Module 7:
Digital Divide, Addiction, and
Bullying
Introductory Message
For the facilitator:

Welcome to the Media and Information Literacy Alternative Delivery Mode (ADM)
Module on Digital Divide, Addiction, and Bullying!

This module was collaboratively designed, developed and reviewed by educators


both from public and private institutions to assist you, the teacher or facilitator in
helping the learners meet the standards set by the K to 12 Curriculum while
overcoming their personal, social, and economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of
the module:

Notes to the Teacher


This contains helpful tips or strategies
that will help you in guiding the learners.

As a facilitator you are expected to orient the learners on how to use this module.
You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.
For the learner:

Welcome to the Media and Information Literacy Alternative Delivery Mode (ADM)
Module on Digital Divide, Addiction, and Bullying!

The hand is one of the most symbolized part of the human body. It is often used to
depict skill, action and purpose. Through our hands we may learn, create and
accomplish. Hence, the hand in this learning resource signifies that you as a
learner is capable and empowered to successfully achieve the relevant
competencies and skills at your own pace and time. Your academic success lies in
your own hands!

This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning resource while being an active
learner.

This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in
the module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.

What’s In This is a brief drill or review to help you link


the current lesson with the previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such as a
story, a song, a poem, a problem opener, an
activity or a situation.

What is It This section provides a brief discussion of


the lesson. This aims to help you discover
and understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.

What I Have Learned This includes questions or blank


sentence/paragraph to be filled in to
process what you learned from the lesson.

What I Can Do This section provides an activity which will


help you transfer your new knowledge or
skill into real life situations or concerns.

Assessment This is a task which aims to evaluate your


level of mastery in achieving the learning
competency.

Additional Activities In this portion, another activity will be given


to you to enrich your knowledge or skill of
the lesson learned. This also tends retention
of learned concepts.

Answer Key This contains answers to all activities in the


module.

At the end of this module you will also find:

References This is a list of all sources used in


developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.

We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!
What I Need to Know

This module was designed and written with you in mind. It is here to help you
master the Digital Divide, Addiction, and Bullying. The scope of this module
permits it to be used in many different learning situations. The language used
recognizes the diverse vocabulary level of students. The lessons are arranged to
follow the standard sequence of the course. But the order in which you read them
can be changed to correspond with the textbook you are now using.

The module is divided into four topics, namely:

 1: Digital Divide
 2: Addiction
 3: Bullying
 4: Netiquette

Most Essential Learning Competency (MELC)

 Create a campaign add to combat digital divide, addiction, and bullying

After going through this module, you are expected to:

1. put into action personal resolve to combat digital divide, addiction, and bullying
2. demonstrate proper conduct and behavior online
3. explain actions to promote ethical use of media and information.
What I Know

As a preliminary, answer the questions below in order to measure your


readiness in studying this lesson. This will help you determine the content of this
module.

Activity 1: Pre-Test
Directions: Read each item carefully and then WRITE the letter that corresponds
to the best answer in a separate sheet of paper.

1. It refers to the economic, educational, and social inequalities experienced by


those who cannot afford to have computer and Internet access.
A. digital divide
B. Digital skills
C. Digital Literacy
D. digital advancement
2. This is based on individuals who know how to use these technologies and those
who do not.
A. Age divide
B. used divide
C. access divide
D. Occupation divide
3. It is sometimes they have the digital skills to find their way around the Internet,
but do not have the knowledge to make good use out of it.
A. digital divide
B. digital skills
C. quality use gap
D. digital advancement
4. Types of digital divide that based on the difference between individuals with
access and those without access to ICTs.
A. age divide
B. used divide
C. access divide
D. Occupation divide
5. Which of these is one of the three factors that affects the digital divide?
A. Test Scores
B. Student Behavior
C. Geographical location
D. A teacher's ability to use technology
6. It refers to the inability to control the desire of using the technology like
computers, smartphones and internet.
A. Digital skills
B. Digital divide
C. Cyberbullying
D. Computer addiction
7. Which factor helps you avoid computer addiction?
A. loneliness
B. depression
C. social acceptance
D. spend more time with family
8. It is a type of computer addiction which spent much time in online gaming or
gambling.
A. cybersex
B. compulsion
C. Cyber relationship
D. Computer addiction
9. These are symptoms of a person experiencing computer addiction except one.
A. anxiety and distress
B. defensive and dishonesty
C. sleep disorder and backpain
D. social acceptance and compulsion
10. It is a way to fight computer addiction.
A. Spend more 5 hours a day in computer
B. keeps listening to a music while playing online games
C. turns off the cellphone when somebody call to avoid using the gadgets
D. spends more time to family and friends and do non- computer related
activities
11. If you get a message from someone you don't know, what should you do?
A. Write them back
B. It's funny - so click on it
C. Send them your information
D. Don't click on anything and don't write back
12. What information should you not give out?
A. your pet’s name
B. your favorite color
C. your phone number
D. your favorite Korean artist
13. What do you do when a stranger approach you online?
A. Ignore the stranger
B. Arrange to meet the stranger
C. Give your address to the stranger
D. Chat with the stranger to find out more about him/her
14. Which of the following is considered risky online behavior?
A. Playing Games
B. Typing A Fairy Tale
C. Watching YouTube.
D. Talking to people you don't know
15. What is a digital footprint?
A. an app
B. a website
C. an online game
D. a trail of data you create while using the Internet

How was the pretest? Was it easy? Difficult? For you to be able to get a
perfect score continue taking this module.
Lesson
Digital Divide, Addiction,
1 and Bullying
“The media’s most powerful entity on earth. They have the power to make the
innocent guilty and make the guilty innocent, and that’s power. Because thy control
the minds of the masses”. – Malcom X
In this lesson, you will create a campaign add to combat digital divide,
addiction, and bullying. Let us all figure it out, in this study journey, starting with
the activity below.

What’s In

Activity 2.
I. Identification
Directions: Read each statement carefully, write True if the statement is correct
and False if not. Write your answer in a separate sheet of paper.
__________1. RA 8293 is the law that gives protection against cyberbullying.
__________2. The golden rule “Do unto others as you would have others do unto
you” adheres to the ten rules of cyberbullying.
__________3. Excessive use of technology that interferes activities in daily life refers
to cybercrime.
__________4. Protecting oneself while online is everyone’s responsibility.
__________5. Identity theft refers to harvesting of personal details to ransack other’s
bank accounts.
II. Matching Type. Match each concept in column A with those of column B.

Column A Column B
6. Economic inequality between groups in terms of A. Phishing
access to, use of, or knowledge of ICT.
7. Sending messages/emails of insult, humiliating B. RA 10175
photos and fake profiles deliberately shared across social
media. C. RA 8293
8. Happens when sellers pretend to sell goods or services
which, after payment, either do not show the promised D. Digital divide
attributes or are not delivered at all.
9. Harvesting bank details, in particular personal E. Commercial fraud
identification numbers with the intent to ransack other
people’s bank accounts. F. Cyberbullying
10. A governing act that aims to address legal issues
concerning online interactions and technology related
concerns in the country.
Were you able to get the correct answers? The words you just unlocked
will be the words to be discussed in this module. Familiarizing to the terms
will help you understand and be immersed more.

What’s New

Activity 3. Poster Analysis

Directions: Study the poster then answer the following questions below. Write your
answer in a separate sheet of paper.

Process Questions:

1. What issues do you see in the poster?


2. Which ones do you understand? Which ones do you not know?
3. What possible dangers and issues of unguarded use of the internet are
depicted in the picture?
4. Which of these issues have happened to you or to your friends? Why did
they happen?
What is It

TOPIC 1. DIGITAL DIVIDE

Even if we live in the Digital age, there are still parts of the world that do not
have access to Internet because it is either in a remote area or in extreme poverty.

Digital Divide

 Refers to the economic, educational, and social inequalities experienced by


those who cannot afford to have computer and Internet access.
 Also pertain to the gap on the kind of information which can be accessed,
and the available form of communication that is allowed to be distributed.

Three types of digital divides:


1. access divide – based on the difference between individuals with access
and those without access to ICTs;
2. used divide – based on individuals who know how to use these
technologies and those who do not;
3. quality of use gap – sometimes they the digital skills to find their way
around the Internet, but not the knowledge to make good use of and get
the most out of it. For example, with regard to access quality of
information.

There are other areas where access to communication is restricted


like Communist countries such as China, restrict the public from using
social media websites like Facebook because in nations under this type of
government, the leaders have the complete control of the state.

In Philippines we do not have experience restriction when it comes to


acquisition of information and choosing the mode of communication we want.
However, we are one of the slowest Internet connections compared to its
other Asian counterparts.

As we live in the 21st century, having information and technology


skills is necessary. Therefore, digital divide could hinder a person to become
information, media, and technology literate.
Activity 4. Think of It!

Directions: Aside from the above examples, give at least 5 reasons of digital divide.
Write your answer in a separate sheet of paper.

1.
2.
3.
4.
5.

TOPIC 2. COMPUTER ADDICTION

How often do you:


 stay online longer than you intended?
 hear other people in your life complain about how much time you spend
online?
 say or think, “Just a few more minutes” when online?
 try and fail to cut down on how much time you spend online?
 your education, relationship of the family and friends or works affected by
using the internet?
 escaping meal or sleep late in using the internet?

If any of these situations are coming up on a daily basis, you may be


experiencing Computer Addiction.
In these modern times, more and more people are being inclined in using
social media such as Facebook, Twitter and Instagram. They tend to neglect their
responsibilities and more important needs due to their obsession with such social
networking sites. This habit can result to serious consequences like computer
addiction and vulnerability to online crimes.

Computer Addiction

Computer Addiction means the inability to control the desire of using the
technology (like computers, smartphones and internet) or an extreme use of the
computer which makes the person uneasy or anxiety in the absence of the gadgets.
Wherein the daily routine in life like work, eating or sleep are affected that could
lead to social problem, change in behavior, relationships and though process. The
three reason why computer addiction exist are depression, loneliness and social
acceptance where young people commonly experience.

TYPES OF INTERNET ADDICTION


Activity 5: What’s Your Point!
Directions: Read and analyze the paragraph below, then answer the following
questions that follows. Write your answer in a separate sheet of paper.
Computer Addiction
Computer gaming addiction is the modern problem especially in high
school students nowadays. It is a challenging part to the teachers to let
students stay focused in their everyday lesson. It greatly affects the mental
health of every student who is involved in this kind of activity. Computer
gaming addiction by nature is the irresistible addiction and abusive use of
computer for gaming purposes and even sometimes resulting to harmful
effects to the part of the user.

Guide questions:
1. What are the effects of computer addiction to students?
2. Do you think these behaviors are a result of only the young men's
engagement with the Internet? Discuss.
3. Given these circumstances, why might the teens be driven to a
virtual/digital world?
4. In your eyes, do the young men and women have a computer addiction, or
are they simply participating in the "social phenomenon" of digital
engagement? Explain.
Rubric:

Criteria 5 4 3 2
Content Answer is Answer is Content relates Content
appropriate to the appropriate to the peripherally to unrelated to
question. Content question. Content the question; question.
is factually may have one or contains
correct. two factual significant
errors. factual errors.
Organization Clear sense of May lack a order of Logic of Lacks clear
order. Supporting sentence, but argument is organizational
points are points are minimally plan. Reader is
presented in a presented in a perceivable. confused.
logical logical progression.
progression.
Development Develops each Each point Lacking details Statements are
point with may supported with or evidence. unsupported
specific details. some details and Question only by any detail or
Answers question evidence. partially explanation.
completely. answered.
Topic 3: BULLYING
“Bullying” shall refers to any severe, or repeated use by one or more
students of a written, verbal or electronic expression, or a physical act or gesture,
or any combination thereof, directed at another student that has the effect of
actually causing or placing the latter in reasonable fear of physical or emotional
harm or damage to his property; creating a hostile environment at school for the
other student; infringing on the rights of another student at school; or materially
and substantially disrupting the education process or the orderly operation of a
school.

Types of Bullying
1. Verbal bullying is saying or writing mean things. Verbal bullying includes:
 Teasing
 Name-calling
 Inappropriate sexual comments
 Taunting
 Threatening to cause harm
2. Social bullying, sometimes referred to as relational bullying, involves
hurting someone’s reputation or relationships. Social bullying includes:
 Leaving someone out on purpose
 Telling other children not to be friends with someone
 Spreading rumors about someone
 Embarrassing someone in public
3. Physical bullying involves hurting a person’s body or possessions. Physical
bullying includes:
 Hitting/kicking/pinching
 Spitting
 Tripping/pushing
 Taking or breaking someone’s things
 Making mean or rude hand gestures
4. Relational Aggression sometimes referred to as emotional bullying,
relational aggression is a type of social manipulation where tweens and teens
try to hurt their peers or sabotage their social standing.
 ostracize others from a group
 spread rumors
 manipulate situations
 break confidences.
5. Cyberbullying, bullying that takes place online, or using electronic
technology such as cell phones, computers, and tablets over communication
tools including social media sites, text messages, chat, and websites.
 text messages or emails composed to insult or demean;
 rumors or false statements spread by email or posted on social
networking sites
 humiliating photos, videos, websites, or fake profiles deliberately
shared across social media.

6. Sexual bullying consists of repeated, harmful, and humiliating actions that


target a person sexually.
 sexual name-calling
 crude comments
 vulgar gestures
 uninvited touching
 sexual propositioning
 pornographic materials

7. Prejudicial bullying is based on prejudices tweens and teens have toward


people of different races, religions, or sexual orientation. This type of
bullying can encompass all the other types of bullying. When prejudicial
bullying occurs, kids are targeting others who are different from them and
singling them out.

RA 10627 - This Act is an “Anti-Bullying Act of 2013” an act requiring all


elementary and secondary schools to adopt policies to prevent and address the acts
of bullying in their institutions.
Activity 6. Let’s Ponder
Directions: Discuss the following questions based on your insights and
understanding, refer to the rubric as your guide. Write your answer in a separate
sheet of paper.

Guide questions:

1. From the different types of bullying that you have learned, select at least one
and discuss based on your objective insight and understanding.
2. If any of the above happened to you, what actions will you take? Why?
3. How would you connect the learning with your role in the school?
Rubric:

Criteria 5 4 3 2
Content Answer is Answer is Content relates Content
appropriate to the appropriate to the peripherally to unrelated to
question. Content question. Content the question; question.
is factually may have one or contains
correct. two factual significant
errors. factual errors.
Organization Clear sense of May lack a order of Logic of Lacks clear
order. Supporting sentence, but argument is organizational
points are points are minimally plan. Reader is
presented in a presented in a perceivable. confused.
logical logical progression.
progression.
Development Develops each Each point Lacking details Statements are
point with may supported with or evidence. unsupported
specific details. some details and Question only by any detail or
Answers question evidence. partially explanation.
completely. answered.
TOPIC 4. NETIQUETTE

Netiquette is a combination of the words network and etiquette and is


defined as a set of rules for acceptable online behavior. Similarly, online ethics
focuses on the acceptable use of online resources in an online social environment.

Both phrases are frequently interchanged and are often combined with the
concept of a ’netizen’ which itself is a contraction of the words internet and citizen
and refers to both a person who uses the internet to participate in society, and an
individual who has accepted the responsibility of using the internet in productive
and socially responsible ways.

THE CORE RULES OF NETIQUETTE


(The Core Rules of Netiquette. Shea, V. (1994). Core rules of netiquette. Netiquette
(Online ed., pp. 32-45). San Francisco: Albion Books.)

Rule 1: Remember the human


 Online or in life remember The Golden Rule
 There are only words online, no nonverbal cues, making it easy to
misinterpret meaning
 Typing in all capitals indicates you are SHOUTING to your audience
 Test before sending/posting: Would you say it to the person’s face? If not,
reword and reread.
 Words are written - they may come back and you don’t know where they
might go
Rule 2: Adhere to the same standards of behavior online that you follow in
real life
 Be ethical
 Standards of behavior may be different in some areas of cyberspace but they
are not lower than in real life
 Do your best to act within the laws of society and cyberspace
 It is okay to post a message from someone else only if the author of the
message has given his/her permission
 Breaking the law is bad netiquette
Rule 3: Know where you are in cyberspace
 Netiquette varies from domain to domain
 Lurk before you leap
 Look around in new domains, listen to the chat, read the archives, figure out
how people already their act, then join in and participate.
Rule 4: Respect other people's time and bandwidth
(the amount of data that can be passed along a communications channel in a given
period of time)
 Ensure the time people spend reading your information isn’t wasted
 You are not the center of cyberspace
 Before copying people in on your messages ask yourself if they really need to
know
 No spamming - widely posting junk mail
 It is never okay to scroll a chat screen (type a single letter or symbol and
keep hitting send)
Rule 5: Make yourself look good online
 Take advantage of your anonymity
 Don’t post flame-bait (don’t use offensive language or be confrontational for
the sake of confrontation)
 You will be judged on the quality of your writing - spelling and grammar do
count
 Know what you are talking about and make sense
Rule 6: Share expert knowledge
 Share the results of your questions with others
 Post resource lists and bibliographies in the area of your expertise
 The Internet was created for sharing information - help make the world a
better place
Rule 7: Help keep flame wars under control
 Flaming can be fun and is both traditional and okay
 Flame wars (series of angry letters between two or three people) are
forbidden
Rule 8: Respect other people's privacy
 You wouldn’t look through a coworker’s desk, don’t look through personal e-
mail
Rule 9: Don't abuse your power
 Just like in face-to-face situations, there are people in cyberspace who have
more "power" than others. They have more expertise in technology or they
have years of experience in a particular skill or subject matter. Maybe it's
you who possesses all of this knowledge and power! Just remember:
knowing more than others do or having more power than others may have
does not give you the right to take advantage of anyone. Think of Rule 1:
Remember the human.
Rule 10: Be forgiving of other people's mistakes
 Everyone was a beginner, or network newbie, at some point
 Pointing out Netiquette violations are often examples of poor Netiquette
 Think twice before pointing out mistakes and do it privately and politely
 Ignore minor errors

Digital Footprints

A digital footprint is a trail of data you create while using the Internet. It
includes the websites you visit, emails you send, and information you submit to
online services

https://safesitter.org/digital-footprints/
Activity 7. #ThinkTwice - Your Digital Footprint Matters
Directions: Study the poster below then answer the guide questions based on your
perception and understanding. Write your answer in a separate sheet of paper.

Guide questions:
1. Open your Facebook account, reflect, are your posts is something that your
parents make proud of? Why?
2. What is your digital footprint?
3. What do you want your digital footprint to say about you?
4. Is a positive digital reputation important? Why?

Rubric:

Criteria 5 4 3 2
Content Answer is Answer is Content relates Content
appropriate to the appropriate to the peripherally to unrelated to
question. Content question. Content the question; question.
is factually may have one or contains
correct. two factual significant
errors. factual errors.
Organization Clear sense of May lack a order of Logic of Lacks clear
order. Supporting sentence, but argument is organizational
points are points are minimally plan. Reader is
presented in a presented in a perceivable. confused.
logical logical progression.
progression.
Development Develops each Each point Lacking details Statements are
point with may supported with or evidence. unsupported
specific details. some details and Question only by any detail or
Answers question evidence. partially explanation.
completely. answered.
What’s More

To deepen your understanding, here are some activities for you to work on.

Activity 8: Discuss
Directions: Read and discuss each question below. Write your answer in a
separate sheet of paper.

Guide Questions:
1. Discuss how cybercrime becomes a national concern.
2. What makes computer addiction a problem?
3. Explain how somebody can be a victim of cyber bullying?

Rubric:
Criteria 5 4 3 2
Content Answer is Answer is Content relates Content
appropriate to the appropriate to the peripherally to unrelated to
question ask. question ask. the question question ask.
Content is Content may ask; contains
factually correct. have one or two significant
factual errors. factual errors.
Organization Clear sense of May lack a order of Logic of Lacks clear
order. Supporting sentence, but argument is organizational
points are points are minimally plan. Reader is
presented in a presented in a perceivable. confused.
logical logical progression.
progression.
Development Develops each Each point Lacking details Statements are
point with may supported with or evidence. unsupported
specific details. some details and Question only by any detail or
Answers question evidence. partially explanation.
completely. answered.

What I Have Learned


Congratulations! Your almost done with this module. Now, let’s summarize
what you have learned from the lesson and activities by answering the following
questions. Do it in a separate sheet of paper.

Activity 9. 3 Circle Venn Diagram.

Give the similarities and difference of he given words. Write your answer in a
separate sheet of paper.

1 2
3

Rubric:

CATEGORY 5 4 3 2

Concept Each section of Each section of Each section of Each section of


Arrangement the diagram the diagram the diagram the diagram
contains four contains three contains two contains very
facts easily facts easily facts that are few facts that
identified. identified. somewhat are not easily
identified. identified.

Content Reflects factual Most of the Reflects some Contains non


information information is factual factual
that factual and information and information
corresponds seemingly attempts to put that does not
with corresponds it in correspond to
appropriate with corresponding the appropriate
section of appropriate section of section of
diagram. section of diagram. diagram. (
diagram.

Presentation of Clean, neat Fairly neat and Not well Messy and
Product and well clean. Some organized. A unorganized.
organized. organization. little cluttered. Not well put
together.

What I Can Do

Activity 10. Campaign Ad Making


1. You are going to create a Campaign Ad (it is a set of advertisement which
focus in a single message with a certain objective need to achieve). You can
create the Ad in a form of video or poster slogan or infographics.
2. The main objective of the Ad Campaign is to combat the problems of digital
divide, computer addiction and cyber bullying.

Rubric

CRITERIA Excellent Very Good Fair (8 points)


(10 points) (9 points)
MESSAGE The information of The information of The information of
the Ad is complete, the Ad can be the Ad is difficult
clear and easy to grasp understood but there is to comprehend and
its ideas by the some point that can clear but shows effort
viewers. bring confusion to the to deliver the message.
viewers.
INFORMATIVE/ The data is all The data is almost The data has a few
IMAGERY supported with supported with supported references
references and has references and the and has a less images
images which are images are average connected to the Ad.
greatly connected to connection to the Ad.
the Ad.
PERSUASIVENESS The Ad clearly uses The Ad has much The Ad has a glimpse
a persuasive tool in more sustainable of a persuasive tool;
delivering a tone of persuasive tool. however, the delivery
conviction. of the Ad makes it lack
of conviction.
Assessment

Activity 11. Post Test

Directions. Choose the letter of the best answer. Write the chosen letter in a
separate sheet of paper.

1. It refers to the inequalities of the different sectors in the community to access,


use of or knowledge of information and communication technology.
A. Digital skills
B. digital divide
C. Digital Literacy
D. digital advancement

2. Which of the following is NOT a factor that create digital divide?


A. Age
B. Education
C. Occupation
D. internet provider

3. Which of the following actions does NOT bridge digital divide?


A. Increase digital literacy
B. Attend technological trainings to develop the skills
C. Read a lot of books in the library to access information
D. Manipulate technology like smartphone, computer and internet

4. The following statements are reasons why digital divide exist except one.
A. The person cannot afford to access the technology.
B. The person refuses to have knowledge of the advance technology
C. The person has less information about the benefits of technology.
D. The person has a strong motivation to learn how use the technology.
5. The group of individuals having high opportunity to acquire digital skills.
A. grandparents at home
B. professional and students
C. group of disabled persons
D. people living in rural areas

6. It refers to the excessive use of technology like gaming.


A. Digital divide
B. Digital skills
C. Cyberbullying
D. Computer addiction

7. The following is a factor which leads to computer addiction, EXCEPT.


A. depression
B. loneliness
C. close family ties
D. social acceptance

8. It is a type of computer addiction which spent much time in online gaming or


gambling.
A. cybersex
B. compulsion
C. cyber relationship
D. computer addiction

9. These are symptoms of a person experiencing computer addiction except one.


A. anxiety and distress
B. defensive and dishonesty
C. sleep disorder and backpain
D. social acceptance and compulsion

10. It is a way to fight computer addiction.


A. unlimited social media use
B. keeps listening to a music while playing online games.
C. turns off the cellphone when somebody call to avoid using the gadgets
D. spends more time to family and friends and do non- computer related activities
11. It refers to the act of harassing other people using technology like computer,
laptop, or cellphone.
A. bullying
B. compulsion
C. cyberbullying
D. cyber relationship

12. Which of the following is an example of cyber bullying.


A. hurting someone through punching
B. sending inspirational messages through messenger
C. posting encourages quotes to uplift the spirits of our frontliners
D. deceives or persuades other online users to harass a target child

13. It is a law which protect the bullied from a bully individual known as
Antibullying Act
A. Republic Act 10627
B. Republic Act 10175
C. Republic Act 10672
D. Republic Act 10762

14.The way you can do to avoid being a victim of cyber bullying.


A. avoid using social media like Facebook
B. share your password to your best friend
C. post the places where you usually hangouts
D. Sign out your account after using specially in public places

15.The best way you can do when you are cyber bullied is______.
A. Keep quiet so that no one will know.
B. Find a person that you trust and seek for help.
C. Fight back by doing the same what he/she did.
D. Do nothing and keep it to yourself because you are afraid of them
Additional Activities

Activity 12. Taking Action!

Directions: Write an action that you can do using the acronym “P.R.O.M.I.S.E.”
which contains ways/tips you can do in order to avoid the negative effects of digital
divide, computer addiction and cyber bullying. Do it in a separate sheet of paper.

P –

R –
O –
M –
I –
S –
E –
Answer Key
References

Printed Materials:

 Media and Information Literacy Curriculum Guide by DepEd

 Media Information Literacy Teacher’s Guide by DepEd

 Media Information Literacy (Enhancing Education through Effective


Communication) by Christine Marie Magpili

Websites:
 Christensson, P. (2014, May 26). Digital Footprint Definition. Retrieved 2020,
Sep 11, from https://techterms.com

 Media and Information Literacy presentation by Arniel Ping, retrieved

 https://www.facebook.com/groups/230985000654384/files/

 https://www.verywellmind.com/internet-addiction-4157289

 https://www.addictioncenter.com/drugs/internet-addiction/

 https://www.iberdrola.com/social-commitment/what-is-digital-divide

 https://www.officialgazette.gov.ph/2013/09/12/republic-act-no-10627/

 https://www.stopbullying.gov/bullying/what-is-bullying

 http://www.albion.com/netiquette/corerules.html
For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

Ground Floor, Bonifacio Bldg., DepEd Complex


Meralco Avenue, Pasig City, Philippines 1600

Telefax: (632) 8634-1072; 8634-1054; 8631-4985

Email Address: blr.lrqad@deped.gov.ph * blr.lrpd@deped.gov.ph

You might also like