Professional Documents
Culture Documents
Department of Education
Region VIII (Eastern Visayas)
Division of Leyte
RULES OF NETIQUETTE
QUARTER 1: Week 2
Objective/s
apply online safety, security, ethics, and
etiquette standards and practice in the use of
ICTs as it would relate to their specific
professional tracks (CS_ICT11/12-ICTPT-Ia-b2)
General Reminder: Use this activity sheet with care. Do not make unnecessary
mark/s on any part of this activity sheet. Use separate sheet of paper/s for
your solution/s. Read the directions carefully before answering each task.
Let your parents/guardian return this activity sheet during the retrieval and
distribution of LAS/Modules. Always follow personal hygiene protocol at all
times.
Let’s Explore
Most of us use the Internet every day. Sometimes, we do not pay attention on how
much information we share online. Below is a questionnaire about how much information
you have shared so far. Put a check (√) under Shared or Not shared.
Let’s Learn
As a teenager, you are all exposed to many things powered by the internet.
Whether it is socializing, playing games, reading sports news, shopping, etc., the internet
has given you one of the most powerful tools that your parents, during their teenage years,
did not have. Because of this, do you think that it is also important to wield this powerful tool
properly? Without proper training, a sword man can easily injure himself when wielding a
sword; the same could be said for you whenever you use the internet.
The internet is a public place and it is up to you to protect yourself. Here are some
tips to help you stay safe when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to a public network/Wi-Fi. Browsing in “incognito (or private) mode,”
a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers, whether online or face-to-face.
8. Never post anything about future vacation. It is similar to posting, “Rob my house at
this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in
peer-to-peer downloads (torrents) as the download is most likely not monitored by
the site owner.
14. Buy the software, do not use pirated ones.
15. Do not reply or click links from suspicious emails.
B. INTERNET THREATS
Here are some threats you should be aware of when using the internet.
1. Malware- stands for malicious software
- Is a set of instructions that run on your computer and make your system
do something than an attacker wants it to do?
What it is good for?
- Steal personal information
- Delete files
- Click fraud
- Steal software serial numbers
- Use your computer as relay
a. Virus
A malicious program designed to replicate itself
and transfer from one computer to another either
through the internet and local networks or data
like flash drives and CDs.
b. Worm
c. Trojan
d. Spyware
A program that runs in the background w/o knowing it (thus called
“spy”). It has the ability to monitor what you are currently doing and
typing through keylogging.
Keyloggers-used to record the stroke done by the users.
This is done to steal their password or any other sensitive
information. It can record email, messages, or any
information you type using your keyboard.
e. Adware
A program designed to send your advertisements, mostly as pop-
ups
2. Spam- unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing- its goal is to acquire sensitive personal information like passwords and credit
card details. This is done by sending you an email that will direct the user to visit a
website and be asked to update his/her username, password, credit card, or personal
information.
Pharming- a more complicated way of phishing where it exploits the DNS (Domain
Name Service) system.
D. COPYRIGHT INFRINGEMENT
-if you create something, an idea, an invention, a form of literary work, or a
research, you have the right as to how it should be used. This is called intellectual
property. In other words, the copyright law includes your rights over your work, and
anyone who uses it w/o your consent is punishable by law.
“No Part of this book may be copied or reproduced.” This is a copyright page.
2. BE RESPONSIBLE
- even if a material does not say that is copyrighted, it is not a valid defense
against copyright.
3. BE CREATIVE
-ask yourself whether what you are making is something that came from you
or something made from somebody else’s creativity.
4. KNOW THE LAW
There are some limitations to copyright law. For instance, in the
Philippines, copyrights only last a lifetime. There are also provisions for “fair
use” which mean that an intellectual property may be used w/o consent as
long as it is used in commentaries, criticisms, search engines, parodies, news
reports, research, library archiving, teaching and education.
Let’s Engage
Do the following tasks:
Visit a social networking site and look for the site’s privacy policy. The link is
typically found at the bottom of the page and sometimes labeled only as “Privacy.”
Write a summary on how the website handles both your private and public
information.
Research for several news and events related to cybercrime. Using your cellphone
or any video-recording device, report it as if you were a newscaster. Present it in 5
minutes recording.
1. Do you agree or disagree with the provisions of the copyright law? Defend
your answer.
Answer:
Answer:
Prepared by:
RHODABIE M. MACEDA
Subject Teacher