Professional Documents
Culture Documents
MELC 2: The learner applies online safety, security, ethics, and etiquette standards and practices in the
use of ICTs as it would relate to their specific professional tracks
MELC 3: The learner uses the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational
Semester:________1ST ____________ Week No._______2_________ Day:_____1-4_____
Lesson: Online safety, security, ethics, and etiquette standards
The following are the top kinds of online threats that you should be aware of:
These “spoofed” sites can capture a victim’s confidential information, including usernames,
passwords, and credit card data, or install malware on their computer.
Make sure to check with your bank the certified and legit websites and numbers.
1
3. Internet Scam generally refers to someone
using internet services or software to defraud or
take advantage of victims, typically for financial
gain.
Online scams may come in various forms such as lottery scams, charity fraud scams, job offer
scams, and online dating scams to name a few.
Other bots are "bad" and are programmed to break into user accounts, scan the web for contact
information for sending spam, or perform other malicious activities. If it is connected to the
Internet, a bot will have an associated IP address.
5. Malware or malicious software, is any program or file that is harmful to a computer user.
Here are the most common offenders in the rogues’ gallery of malware:
a. Adware (Advertising-supported
software) is unwanted software designed
to throw advertisements up on your
screen.
2
c. Virus and Worms are malwares that
attach to another program, and when
executed unintentionally by the user—
replicate themselves by modifying other
computer programs and infecting them with
their bits of code.
https://www.google.com/search?
q=cyber+crime&source=lnms&tbm=isch&sa=X&ved=2ah
UKEwj7r4K7zvXxAhUGEogKHeVCALkQ_AUoAXoECAEQA
w&biw=1371&bih=690#imgrc=ONklSOgn0lMm5M
7. Cyberstalking refers to the use of the internet or other electronic device to harass or stalk individuals
or organizations
.
https://www.google.com/
search?
q=cyber+crime&source=lnms&t
bm=isch&sa=X&ved=2ahUKEwj
8. Cyberbullying refers to the act of
7r4K7zvXxAhUGEogKHeVCALkQ
tormenting, harassing, or embarrassing
_AUoAXoECAEQAw&biw=1371
another person using the internet.
&bih=690#imgrc=ONklSOgn0lM
m5M https://www.google.com/search?
q=cyber+crime&source=lnms&tbm=
isch&sa=X&ved=2ahUKEwj7r4K7zvX
xAhUGEogKHeVCALkQ_AUoAXoECA
EQAw&biw=1371&bih=690#imgrc=
ONklSOgn0lMm5M
3
9. Spoofing happens when someone or
something pretends to be something else to
gain our confidence, get access to our
systems, steal data, steal money, or spread
malware.
There's almost no limit to what you can do online. The Internet makes it possible to access
information quickly, communicate around the world, and much more. Unfortunately, the Internet is also
home to certain risks, such as malware, spam, and phishing. If you want to stay safe online, you'll need to
understand these risks and learn how to avoid them.
Numerous delinquencies can be committed on the internet such as stalking, identity theft, privacy
violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
- Name, Address, School, and even your phone number are the most important
details that you should not be posting online. It may also lead to any serious
problem that you may encounter internet threats.
Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service.
- To make sure that you
are in a secured network,
the website address
should begin with “https://’
as opposed to “http://”.
Never access your
accounts by following an
email link, instead, type
your URL by yourself.
Never open messages or attachments from someone you do not know.
- Do not communicate with someone you don’t know
4
Facebook post of someone who is not even on your friends' list.
https://www.google.com/
search?
q=cyber+stalking&source=lnms
&tbm=isch&sa=X&ved=2ahUKE
wj7r4K7zvXxAhUGEogKHeVCALk
Q_AUoAXoECAEQAw&biw=137
When using a public computer terminal, be sure to delete your browsing data before
leaving.
- Go to the browser, click the
settings, and go to history. Clear
History always. Do not leave any
traces of your login details.
https://www.google.com/
search?
q=cyber+stalking&source=lnms
&tbm=isch&sa=X&ved=2ahUKE
wj7r4K7zvXxAhUGEogKHeVCAL
Do not download or install software or anything on your computer or cell phone that is
unknown to you.
- For example, in Google Play, you
will be asked first upon installation if
you allow it or not.
https://www.google.com/searc
h?q=cyber+stalking&source=ln
ms&tbm=isch&sa=X&ved=2ahU
KEwj7r4K7zvXxAhUGEogKHeVC
ALkQ_AUoAXoECAEQAw&biw=
1371&bih=690#imgrc=ONklSOg
n0lMm5M
Netiquette is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:
The Internet has made our lives easier especially in terms of doing research. By browsing the
internet, we can access limitless topics.
Web-based catalogs are available in many libraries to assist researchers in locating printed books,
journals, government documents, and other materials. The biggest obstacle facing all researchers on the
internet is how to effectively and efficiently access the vast amount of information available.
5
Searching the Web
Popular Domains
Top-level Domains Country code top-level domains
.edu – educational institution .ph – Philippines
.org – a non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network
Ex. A or B
A B
Boolean “not” – This operator will find pages that do not include search terms immediately
following them.
Ex. A not B
A B
6
recommendations, etc. It encloses the phrase in quotation marks.
Ex. “Jane Doe” “To be or not to be”
Plus (+) – It indicates that the word after the sign is a required word must be found in
search. Example: +fire
Minus (–) sign – It iindicates to exclude a word from your search that is not required on
the result. Example: Jaguar speed –car
Finding Documents – using the filetype refines the search for documents on the web.
filetype:pdf ofiletype:doc o
filetype:xls