You are on page 1of 16

Name: ___________________________ Barangay: ___________Date: _________

CLC: ____________________________ Level: Junior High School Score: _______


Learning Strand 6: Digital Citizenship
Module 7: Digital Ethics (Netiquette)

Pre-Test
I. Directions: Let’s have a self-check. Put a check mark (√) if you practice the
statement given in each number. If not, put (x). Write your answers on a separate
sheet of paper.

___1. I always type using all capital letters.


___2. I check emails every minute.
___3. I use courteous words like “good morning/afternoon/evening”, “thank you”,
“please”, “may I” or similar phrases in my emails or anything I post on the
internet.
___4. I fill in the subject box when I send emails.
___5. I pass on chain letters from unreliable sources.
___6. I send long and repetitive responses.
___7. I wait until I have calmed down before I reply to a message I don’t like.
___8. I do check what I write to make sure I have correct spelling and grammar.
___9. I follow “real world” laws and rules while I am using the internet.
___10. I am very sensitive in everything I post online

II. Directions: Read each statement and select the best answer. Encircle the letter
only.

1.The way in which one acts or conducts oneself, especially toward others
A. Behavior C. Bullying
B. Cautious D. Ethical

2.Harming or intimidating someone


A. Behavior C. Bullying
B. Cautious D. Ethical

3.Being careful to avoid potential problems


A. Behavior C. Bullying
B. Cautious D. Ethical

4.Thinking and doing the right thing


A. Behavior C. Bullying
B. Cautious D. Ethical

5.A wrongful or criminal deception intended to result in financial or personal gain


A. Fraud C. Gambling
B. Illegal D. Legal
6.Act of playing games of chance for money
A. Fraud C. Gambling
B. Illegal D. Legal

7.Something that is against the law.


A. Fraud C. Gambling
B. Illegal D. Legal

8.Something that is permitted by law.


A. Fraud C. Gambling
B. Illegal D. Legal

9.Something that is not morally correct


A. Unethical C. Privacy
B. Plagiarism D. Safety

10.The state of being free from public attention.


A. Unethical C. Privacy
B. Plagiarism D. Safety

11.The practice of taking someone else’s work or ideas and passing them off as
one’s own.
A. Unethical C. Privacy
B. Plagiarism D. Safety

12.The condition of being protected from or unlikely to cause danger.


A. Unethical C. Privacy
B. Plagiarism D. Safety

13.The state of being free from danger or threat.


A. Security C. Sensitivity
B. Violent D. Safety

14.The quality or condition of being sensitive.


A. Security C. Sensitivity
B. Violent D. Safety

15.Using or involving physical force intended to hurt, damage, or kill someone or


Something.
A. Security C. Sensitivity
B. Violent D. Safety

III. Directions: Read each question carefully and write the letter of your answer.

1. What is digital emotional intelligence?


A. Detects risk online
B. Includes being sensitive to the needs of others
C. Detects cyber threats
D. Creates digital content

2. Who among the following practices digital citizen identity?


A. Chester creates a healthy online identity.
B. Isabella communicates with humility.
C. Pia uses security tools for data protection.
D. Marky avoids cyber bullying.

3. One must communicate with others with humility and respect and in a constructive
manner. Which among the following does this statement refer to?
A. Digital rights
B. Digital citizen identity
C. Digital safety
D. Digital communication

4. How can you protect your data online?


A. Handle your personal information very well.
B. Use strong passwords and security tools.
C. Respect personal rights.
D. Discuss ways on how to avoid cyber bullying.

5. Why is it important to demonstrate safe and ethical practices in using the internet?
A. To reduce risks online
B. To manage risks online
C. To maximize opportunities online
D. All of the above

_____________________
Learner’s signature
Name: ___________________________ Barangay: ___________Date: _________
CLC: ____________________________ Level: Junior High School Score: _______
Learning Strand 6: Digital Citizenship
Module 7: Digital Ethics (Netiquette)

POST-
I. Directions: Distinguish which among Test
the following is ethical and unethical
behavior of a user of digital technology. Write the letters of your answer in the
appropriate box.

A. Clog other people’s mailbox.


B. Embarrass people online.
C. Respect other people’s privacy.
D. Keep your posts and emails short and straight to the point.
E. Do not follow the rules and policies of the websites you visit.
F. Steal someone else’s idea, property and rights.
G. Do not tag someone in an embarrassing photo.
H. Write a negative post about a person.
I. Do not participate in online discussions that will embarrass or hurt other person’s
feelings.
J. Do not steal personal information.
K. Avoid copying someone else’s work and declaring it is yours.
L. Secure information privacy.
M. Do not steal important information.
N. Say no to digital plagiarism.
O. Avoid using all capital letters when chatting someone.
P. Be sensitive to national and local cultures.
Q. Do not overshare your personal information.

II. Directions: Which among these online behaviors is present in the given
situation in each number? Write the letter of your answer.
A. pornography
B. internet addiction
C. meeting online strangers
D. exposure to violent conduct
E. online gambling
F. online sexual behaviors
G. cyber bullying
H. unwanted sharing of information online

____1. Kaloy spends too much time staying online. This affects his performance in
school.He always falls asleep during class hours.
____2. Mernilyn joined as a member of an online bingo and casino. She was
shocked
one day when she found out that she only has an available balance of three
pesos in her bank account.
____3. An advertisement popped up on your mobile device containing obscene
pictures of a man and a woman.
____4. Kim likes to log in to dating websites. She likes to meet new people online
and
meet them also in person. One day, she sets to meet a person she knew
online. From that day, Kim went missing.
____5. Symon is a bully at school. One day, he posted something in his social media
about someone from school. The post went viral. The tone of the post was
humiliating and embarrassing for his classmate. The principal learned about
this and called Symon to her office.
____6. Two people are sending each other sexually explicit messages describing a
sexual experience.
____7. Karla saw her 3-year-old brother watching a wrestling match online. A few
months after, she noticed her brother acting violently, punching and shouting
at his sibling most of the time.
____8. Joshua is using up all his money for the online casino and starts to borrow
money from others.
____9. Two teenagers brought their friend near a river and stabbed her 19 times.
When they were asked why they did that, they said that “Slenderman” on the
Internet made them do it.
____10. Bea visited a beauty products website and was asked to sign-up. She did
not
provide her detailed information though. As soon as Bea visits the website,
she also receives offers of different beauty products from other websites on
her email. She does not realize that she was being tracked online.

III. Directions: Choose the letter of the correct answer by encircling the letter.

1. What is digital ethics?


A. It is about managing oneself ethically online and digital mediums.
B. This refers to a person who participates in any activity online.
C. It is about sensitivity to national and local cultures.

2. What do you call the combination of the words “internet” and “etiquette” which
means observing good manners whenever we are online?
A. Netizen
B. Netiquette
C. Intiquette

3. Which among the choices below shows an ethical behavior in using digital
technology?
A. Clogging other people’s mailbox
B. Oversharing personal information
C. Following the rules and policies of the websites you visit

4. This refers to the positive well-being of internet users. What is it?


A. Cyber Wellness
B. Cyber Safety
C. Cyber Ethics

5. Which among the following is true about cyber bullying?


A. behavioral addiction in which a person becomes dependent on the use of
the internet
B. kind of bullying that takes place over the internet
C. obscene pictures, writings, drawings, motion pictures, videos, or the like

6. This is a behavioral addiction in which a person becomes dependent on the use of


the internet, or other online devices, as a maladaptive way of coping with life’s
stresses. What is it?
A. Internet Addiction
B. Online Gambling
C. Pornography

7. Why do we have to know how to detect cyber threats?


A. for data protection
B. to create digital content
C. for dealing with the needs of others

8. People will misinterpret you if you use in your entire message.


A. Capital letter
B. Emoticons
C. Underlined words

9. Which of the following means not doing what you don’t want others to do unto
you?
A. Citizen rule
B. Golden rule
C. Human rule

10. How are you going to properly correct a person online?


A. Comment in a nice and good way.
B. Tag someone who can correct the person.
C. Private message the person.

11. People who don’t want to stop playing and hate having to be without their game
are suffering from addiction. They think about it all the time. This addiction refers
to ____________ .
A. Cyber Online Relationship
B. Computer and Gaming
C. Social Media

12. Which of the following people will not tell their real identity and will sexually solicit
online, with children and teenagers as their main target?
A. Catfishers
B. Sexual Predators
C. Thief

13. This is an activity that involves criminals sending emails, texts, or pop-up
messages that appear to come from your bank, a government agency, an online
seller or another organization with which you do business. It is called .
A. Identity Theft B. Phishing C. Cyberbullying

14. Which of the following refers to the rules and regulations of the website where
you want to sign-in?
A. End-User License Agreement
B. Memorandum of Agreement
C. Protocol Agreement

15. This is an activity that involves insulting another person online


A. Phishing
B. Bullying
C. Flaming

___________________
Learner’s signature
PRE-TEST
I. II. III.
1. x 6. √ 1. A 6. C 11. B 1. B
2. x 7. √ 2. C 7. B 12. D 2. A
3. √ 8. √ 3. B 8. D 13. A 3. D
4. √ 9. √ 4. D 9. A 14. C 4. B
5. x 10. √ 5. A 10. C 15. B 5. D

POST-TEST
I. ETHICAL UNETHICAL
D A
G B
I C
J E
K F
L H
M
N
O
P
Q

II.
1. B 6. F
2. E 7. D
3. A 8. E
4. C 9. D
5. G 10. H

III.
1. A 6. A 11. B
2. B 7. A 12. B
3. C 8. A 13. B
4. C 9. B 14. C
5. B 10. C 15. C

ETHICAL - umaayon sa tinatanggap na mga propesyonal na pamantayan ng pag-uugali .


UNETHICAL - hindi umaayon sa mataas na pamantayang moral : mali sa moral : hindi

etikal. ilegal at hindi etikal na mga gawi sa negosyo. imoral at hindi etikal na pag-uugali.

hindi etikal
Name: ___________________________ Barangay: ___________Date: _________
CLC: ____________________________ Level: Junior High School Score: _______
Learning Strand 6: Digital Citizenship
Module 7: Digital Ethics (Netiquette)
Lesson 1: Ethical Use of Digital Technology

Activity 1
Directions: What have you understood about digital ethics? Why is it important to
people? Write your answer below.

CRITERIA SCORE
CONTENT
Ideas are on point, well-developed, and are expressed in own words. 30%
Conclusion is strong.
ORGANIZATION
Transition of ideas is smooth. All details given are relevant. 20%
TOTAL 50%

Name: ___________________________ Barangay: ___________Date: _________


CLC: ____________________________ Level: Junior High School Score: _______
Learning Strand 6: Digital Citizenship
Module 7: Digital Ethics (Netiquette)
Lesson 2: Responsible Use of Technology

Activity 2
Directions: Below are the different terminologies in safe and responsible use of
digital technology. Choose only one and explain the way you have understood it.
You may refer to the lesson. Write your answer on the box that you choose.

CYBER ETHICS CYBER WELLNESS

CYBER SAFETY CYBER SECURITY

CRITERIA SCORE
CONTENT
Ideas are on point, well-developed, and are expressed in own words. 30%
Conclusion is strong.
ORGANIZATION
Transition of ideas is smooth. All details given are relevant. 20%
TOTAL 50%

Name: ___________________________ Barangay: ___________Date: _________


CLC: ____________________________ Level: Junior High School Score: _______
Learning Strand 6: Digital Citizenship
Module 7: Digital Ethics (Netiquette)
Lesson 3: Safe & Ethical Practice in Digital Technology

Activity 3
Directions: List down your realizations in practicing safe and ethical use of digital
technology. As a learner, how is it helpful to you? Write your answer below.
Realizations in practicing safe and ethical use of digital technology.

How is it useful to me?


CRITERIA SCORE
CONTENT
Ideas are on point, well-developed, and are expressed in own words. 20%
ORGANIZATION
Transition of ideas is smooth. All details given are relevant. 20%
TOTAL 40%

Digital Ethics is the study of how to manage oneself ethically, professionally


and in a clinically sound manner via online and digital mediums.

 Why digital ethics is important?


One of the most immediate reasons why digital ethics are important is
because how we preOne of the most immediate reasons why digital ethics
are important is because how we present, indeed construct our persona(s)
effects the way in which our communication and intentions will be received.
The notion that individual ethics impact our arguments is nothing new.sent,
indeed construct our persona(s) effects the way in which our
communication and intentions will be received. The notion that individual
ethics impact our arguments is nothing new.

Isa sa mga pinaka-kagyat na dahilan kung bakit mahalaga ang digital ethics ay dahil

kung paano natin nauna ang isa sa mga pinaka-kagyat na dahilan kung bakit

mahalaga ang digital ethics ay dahil kung paano tayo naghaharap, talagang

nabubuo ang ating (mga) persona ay nakakaapekto sa paraan kung saan ang ating

komunikasyon at mga intensyon ay magiging. natanggap. Ang paniwala na ang

indibidwal na etika ay nakakaapekto sa ating mga argumento ay hindi na bago.

ipinadala, talagang bumuo ng ating (mga) katauhan ay nakakaapekto sa paraan

kung saan ang ating komunikasyon at mga intensyon ay matatanggap. Ang paniwala

na ang indibidwal na etika ay nakakaapekto sa aming mga argumento ay hindi bago

What is cyber ethics


Cyberethics are the ethics ,or the moral principles , applied to the o
nline environment.
Cyberethics is the philosophic study of ethics that pertain to the computers,
encompassing user behavior and what computers are programmed to do,
and how this affects individuals and society.
about cyber wellness
The three principles, 'Respect for Self and Others', 'Safe and Responsible
Use' and 'Positive Peer Influence' when adhered to will anchor a child's
well-being in cyberspace as he will then be able to make careful and well-
considered decisions.
What is the difference between cyber wellness and
cyber ethics?
Cyber ethics is the study of ethics pertaining to computers, covering user
behavior and what computers are programmed to do, and how this affects
individuals and society. For years, various governments have enacted
regulations while organizations have explained policies about cyber ethics.
With the increase of young children using the internet, it is now very
essential than ever to tell children about how to properly operate the
internet and its dangers. It is especially hard to talk to teens because they
do not want to be lectured about what is right and wrong. They seem to
think they have it all sorts out. That is why is it is important to instill
appropriate cyber etiquette at an early age but if you haven’t there is still
time to tell to your child.
Responsible Behaviors on the Internet
Cyber ethics concerns to the code of responsible behavior on the Internet.
Just as we are taught to act responsibly in everyday life. The responsible
behavior on the internet in many ways aligns with all the right behavior in
everyday life, but the results can be significantly different.
Some people try to hide behind a false sense of obscurity on the internet,
believing that it does not matter if they behave badly online because no one
knows who they are or how to search them. That is not all the time true;
browsers, computers and internet service providers may keep logs of their
activities which can be used to spot illegal or inappropriate behavior.
The Government has taken a positive role in making resources for parents
and children to learn about cyber ethics. This is a growing problem and
without parents and teachers using the resources available nothing can be
done to prepare future generations of internet users from being safe online.

What is cyber safety?


Cybersafety or e-safety is an important concept to be safe online. Internet is a boon to our lives, our
documents, e-wallets, and other confidential information is fed on the internet. A mere click will
lead to our bill payment, initiate communication, and many more.
Cyber Safety refers to the safe and responsible use of internet so as to
ensure safety and security of personal information and not posing threat to
anyone else's information.
It involves gaining knowledge about possible threats to personal safety and
security risk for the information along the measures to prevent and counter
them.
Cybersafety is the safe and responsible use of Information and
Communication Technologies (ICT). NetSafe's approach to cybersafety is
founded on:
Maintaining a positive approach about the many benefits brought by
technologies
Encouraging the public to identify the risks associated with ICT
Putting in place strategies to minimise and manage risks
Recognising the importance of effective teaching and learning
programmes.

What is cyber security?


Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks. ...
Application security focuses on keeping software and devices free of
threats. A compromised application could provide access to the data its
designed to protect.
Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks.

What are the responsibilities when using networked digital information to


demonstrate ethical and safe use?
Key Digital Responsibilities:
 Use appropriate language and behavior when interacting with others (i.e. no
cyberbullying)
 Respect the opinions and ideas of others.
 Obey all intellectual property laws.
 Do not use or share others' work without permission.
 Follow rules and/or codes of conduct for every Internet site.
  I will use technology well and wisely. I will use technology as a
medium in the learning process. technology is very useful in
providing learning materials to students. they can easily understand
the lessons that I convey because of the advanced technology.
 I will use technology both in preparing learning materials and in
teaching activities in the classroom. I will access learning resources
on the internet and share them with my students. I can access
images, sounds, and videos and share them with my students so that
they are more enthusiastic about learning. Technology is also able to
help me in accessing various information around the world.
 With technology, I will look for interesting and fun learning
methods. I will apply the learning method that I got from the internet
in my class. Of course, an interesting method can increase students'
willingness to learn. If they are interested and happy in learning, of
course they can easily understand the material that I convey.
 I will use technology in the use of the Online Question Practice
Platform. In addition to using online journals and video conferencing
as learning media, I can also use the online practice platform to get
various types of practice questions. This can improve students' ability
to solve problems and understand the material. Now there are many
online practice media that can be accessed by students from home.
This platform provides various types of practice questions, interactive
study summaries, as well as a tutor question feature that can help
students understand teaching materials.
 I will use technology in making Video Conferences for Distance
Learning Systems. Video conferencing is a technology that
combines audio and video telecommunications to bring people from
different places at one time to meet. Simply put, video conferencing
is a place to connect conversations between two or more people in a
virtual room at the same time even from different locations. Not only
delivering audio and video, this technology can also be used
simultaneously to exchange documents and type messages. Even
some video conferencing platforms can show the informant's
computer screen to the recipient of the message.
 Technological developments are so rapid that I have to be ready to
accept various possibilities, one of which is the application of
distance learning methods such as during the COVID-19 pandemic.
Even though the current status of the method is still carried out in an
emergency situation, when I become a teacher I will also face it in the
future. This video conference is very suitable to meet the needs of
real-time visual communication to replace the direct face-to-face
interaction between teachers and students that is lost in the distance
learning process. The video conferencing platform is very useful
because the platform can be accessed flexibly from home without
students having to go to school.

You might also like