You are on page 1of 7

Republic of the Philippines

Department of Education
Region VIII (Eastern Visayas)
Division of Leyte

Tahud National High School


Inopacan District

LEARNING ACTIVITY SHEETS IN EMPOWERMENT TECHNOLOGIES 11

Name of Learner: _____________________ Grade Level: ____________


Section: _____________________________ Date: __________________

RULES OF NETIQUETTE
QUARTER 1: Week 2

Objective/s
 apply online safety, security, ethics, and
etiquette standards and practice in the use of
ICTs as it would relate to their specific
professional tracks (CS_ICT11/12-ICTPT-Ia-b2)

General Reminder: Use this activity sheet with care. Do not make unnecessary
mark/s on any part of this activity sheet. Use separate sheet of paper/s for
your solution/s. Read the directions carefully before answering each task.
Let your parents/guardian return this activity sheet during the retrieval and
distribution of LAS/Modules. Always follow personal hygiene protocol at all
times.

Let’s Explore
Most of us use the Internet every day. Sometimes, we do not pay attention on how
much information we share online. Below is a questionnaire about how much information
you have shared so far. Put a check (√) under Shared or Not shared.

How Safe Are You?


Type of Information Shared Not Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and previous
school(s)
5. Your Cellphone Number
6. The name of your mother
and father.
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday

1. How many checks did you have for Shared?


Answer: ___________________________
2. Is it safety to show all your personal information online? Why/ why not?
Answer:
___________________________________________________________________
___________________________________________________________________.
3. How many hours do you spend on the internet per day?
Answer: ___________________________
4. Can you live without the Internet for a week? Why?
Answer: ____________________________________________________________
___________________________________________________________________
5. How many aspects of life depend on the internet?
Answer: ____________________________________________________________
6. How many times have you complained about your internet connection speed?
Answer: ____________________________________________________________

Let’s Learn
As a teenager, you are all exposed to many things powered by the internet.
Whether it is socializing, playing games, reading sports news, shopping, etc., the internet
has given you one of the most powerful tools that your parents, during their teenage years,
did not have. Because of this, do you think that it is also important to wield this powerful tool
properly? Without proper training, a sword man can easily injure himself when wielding a
sword; the same could be said for you whenever you use the internet.

ONLINE SAFETY AND SECURITY


The internet, truly is a powerful tool. It can be used to promote your business, gain
new friends, and stay in touch with the old ones. It is also a source of entertainment through
games, online communities, and everything in between. But most things in this world, there
is always the “other side of the coin”. The internet is one of the most dangerous place,
especially if you do not know what you are doing with it. But there is no need to worry; it is
never that late. Hopefully, by the end of this lesson, you are able to consider how you go
about your use of the internet.
A. TIPS TO STAY SAFE ONLINE

The internet is a public place and it is up to you to protect yourself. Here are some
tips to help you stay safe when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to a public network/Wi-Fi. Browsing in “incognito (or private) mode,”
a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers, whether online or face-to-face.
8. Never post anything about future vacation. It is similar to posting, “Rob my house at
this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in
peer-to-peer downloads (torrents) as the download is most likely not monitored by
the site owner.
14. Buy the software, do not use pirated ones.
15. Do not reply or click links from suspicious emails.

B. INTERNET THREATS

Here are some threats you should be aware of when using the internet.
1. Malware- stands for malicious software
- Is a set of instructions that run on your computer and make your system
do something than an attacker wants it to do?
What it is good for?
- Steal personal information
- Delete files
- Click fraud
- Steal software serial numbers
- Use your computer as relay
a. Virus
A malicious program designed to replicate itself
and transfer from one computer to another either
through the internet and local networks or data
like flash drives and CDs.

b. Worm

A malicious program that transfers from one


computer to another by any type of means.
Often, it uses a computer network to spread
itself. For example, the ILOVEYOU worm (Love
Bug Worm) created by a Filipino.

c. Trojan

a malicious program that is disguised as useful


program but once downloaded or installed \,
leaves your PC unprotected and allows hackers
to get your information.
 Rogue security software-tricks the user
into posing that is a security software. It
asks the user to pay to improve his/her
security but in reality, they are not
protected at all.

d. Spyware
A program that runs in the background w/o knowing it (thus called
“spy”). It has the ability to monitor what you are currently doing and
typing through keylogging.
 Keyloggers-used to record the stroke done by the users.
This is done to steal their password or any other sensitive
information. It can record email, messages, or any
information you type using your keyboard.
e. Adware
A program designed to send your advertisements, mostly as pop-
ups

2. Spam- unwanted email mostly from bots or advertisers. It can be used to send malware.

3. Phishing- its goal is to acquire sensitive personal information like passwords and credit
card details. This is done by sending you an email that will direct the user to visit a
website and be asked to update his/her username, password, credit card, or personal
information.
 Pharming- a more complicated way of phishing where it exploits the DNS (Domain
Name Service) system.

C. PROTECTING REPUTATIONS ONLINE


Think Before You Click
Here are things you might want to consider before posting something over the internet:
1. Before you post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your future
boss to see it? Once you post something on the web, you have no control of
who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.
3. Set your pot to “private”. In this way, search engines will not be able to scan that
post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.

D. COPYRIGHT INFRINGEMENT
-if you create something, an idea, an invention, a form of literary work, or a
research, you have the right as to how it should be used. This is called intellectual
property. In other words, the copyright law includes your rights over your work, and
anyone who uses it w/o your consent is punishable by law.
“No Part of this book may be copied or reproduced.” This is a copyright page.

TIPS TO AVOID COPYRIGHT INFRINGEMENT:


1. UNDERSTAND
-copyright protects literary works, photographs, paintings but does not protect
underlying ideas and facts.

2. BE RESPONSIBLE
- even if a material does not say that is copyrighted, it is not a valid defense
against copyright.
3. BE CREATIVE
-ask yourself whether what you are making is something that came from you
or something made from somebody else’s creativity.
4. KNOW THE LAW
There are some limitations to copyright law. For instance, in the
Philippines, copyrights only last a lifetime. There are also provisions for “fair
use” which mean that an intellectual property may be used w/o consent as
long as it is used in commentaries, criticisms, search engines, parodies, news
reports, research, library archiving, teaching and education.

Let’s Engage
Do the following tasks:
 Visit a social networking site and look for the site’s privacy policy. The link is
typically found at the bottom of the page and sometimes labeled only as “Privacy.”
Write a summary on how the website handles both your private and public
information.
 Research for several news and events related to cybercrime. Using your cellphone
or any video-recording device, report it as if you were a newscaster. Present it in 5
minutes recording.

 Note: Submit your output to this gmail account: rhodabie.melendres@deped.gov.ph


Let’s Apply

1. Do you agree or disagree with the provisions of the copyright law? Defend
your answer.
Answer:

2. How do you feel if someone posted something embarrassing about you?


What would you do?

Answer:

Prepared by:

RHODABIE M. MACEDA
Subject Teacher

You might also like