You are on page 1of 13

Department of Education Region III

JHS
DIVISION OF AURORA
Brgy. Bacong, San Luis, Aurora

Learning Activity Sheet


in

LEARNING STRAND 6
RESPONSIBLE USE OF
TECHNOLOGY
Learning Competency
(LS6DC-DE-PSF-AE/JHS-4)
Subject: LS6 Digital Citizenship
Learning Activity Sheet
First Edition, 2023

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education


Schools Division Superintendent: DANTE G. PARUNGAO CESO V
Assistant Schools Division Superintendent: DANILO M, JACOBA PhD

Development Team of the LAS


Writer: CHERRY LOU E. ARAGON
Editors: JONALYN C. CALLADO

Reviewers: MAREEN LEI QUIRIJERO

Illustrator: CHERRY LOU E. ARAGON


Layout Artist: MARY JOY Z. PERSIA
Management Team:
CHARLAW G. QUIBEN PhD, CID Chief
ESTRELLA D. NERI, Division EPS in-charge of LRMS
PAUL ALVIN D. FACELO PhD, Division ALS Focal Person
Learning Supervisor

Department of Education Region III – Learning Resource Management and


Development Section (LRMDS) - Schools Division of Aurora
Office Address: Sitio Hiwalayan, Brgy. Bacong, San Luis, Aurora
E-mail Address: aurora@deped.gov.ph
This Learning Activity Sheet is designed for your advancement.This will
guide you to identify different terminologies in the safe and responsible use of
digital technology and enumerate how to minimize the risks of negative online
behaviors.

At the end of this lesson, you are expected to:


a. identify different terminologies in the safe and responsible use of
digital technology and;
b. enumerate the risks of negative online behaviors and how to
minimize it.

Direction: Identify which among the following is ethical and unethical behaviour of
a user of digital technology. Write your answer in the provided sheet of paper

1. Follow the rules and policies of the website

2. Humiliate other people online


3. Respect other people’s privacy.
4. Keep information private
5. Use negative words in comment section
6. Sensitive to other norms and cultures
7. Share other’s photo without his/her permission
8. Oversharing personal information to public
9. Having dual authentication in social media account.
10. Using capital letters when chatting other people
RESPONSIBLE USE OF TECHNOLOGY
Online safety is a serious concern. Widen the knowledge on this by learning
the terminologies associated with the safe and responsible use of digital technology.
Such terms are:

Cyber Wellness is the positive well-being of internet users that involves an


understanding of online behavior, and awareness of how to protect oneself in
cyberspace which focuses on promoting everyone to become a responsible user of
digital technology.

Cyber Safety is the responsibility to behave in cyberspace and reduce danger


online, which includes protecting personal information, not giving away passwords,
keeping computers and browsers up-to-date, using antivirus software, maintaining
a firewall, and learning what antisocial online behavior looks like (storypark.com).

Cyber Security is the practice of defending computers, servers, mobile devices,


electronic systems, networks, and data from malicious attacks (also known as
information technology security or electronic information security).

Cyber Ethics is the code of responsible behavior on the internet and/or acceptable
behavior in the real world that should also be observed in cyberspace.

There are dangers in engaging in negative or irresponsible online behaviors.


Such dangers are:

a. Pornography is printed or visual material containing the explicit description or


display of sexual organs or activity intended to stimulate erotic rather than
aesthetic or emotional feelings (e.g. obscene pictures, writings, drawings,
motion pictures, videos, or the like).

b. Internet Addiction, is a behavioral addiction in which a person becomes


dependent on the use of the internet, or other online devices, as a maladaptive
way of coping with life’s stresses.

Examples of Internet Addiction are:

(a) Relationship Addiction, is the act of individuals deeply involved with


finding and maintaining relationships online, often forgetting and neglecting
real-life family and friends. The relationships are often formed in chat rooms
or different social networking sites but can occur anywhere you can interact
with people online.

(b) Computer or Gaming Addiction, which involves online and offline activities
that can be done with a computer or mobile device. People who are addicted
don’t want to stop and hate having to be without their game. They think
about it all the time.
(c) Social Media Addiction, a behavioral addiction that is defined by being
overly concerned about social media, driven by an uncontrollable urge to log
on to or use social media, and devoting so much time and effort to social
media that it impairs other important life areas.

c. Meeting Online Strangers. There is nothing wrong with this, but the danger
comes if the person meets a sexual predator online. These are people who will
not tell their real identity and will sexually solicit online. They target children
and teenagers; hence, they visit websites that are for younger people and leave
sexually suggestive comments.

d. Exposure to Violent Conduct has something to do with someone’s exposure to


violence. This is a serious matter because if a person is exposed to this, they
might be affected mentally and emotionally.

e. Online Gambling. The negative effects of excessive online gambling may include
neglecting daily responsibilities (work, school, family) to play online; using
internet gambling to numb or avoid negative feelings such as anxiety,
loneliness, or depression; becoming moody when online access is not available
or denied; borrowing money to ‘win back’ previous gambling losses and stealing
money from family or friends; or engaging in other types of criminal behavior to
support online gambling habits.

f. Unwanted Sharing of Information Online. Criminals or hackers get personal


information online by lying about who they are, to convince people to share
account numbers, passwords, and other information so they can purchase
things in your name.

g. Online Sexual Behaviors. It is a virtual sex encounter in which two or more


people are connected through the internet. People involved here send each
other sexually explicit messages describing a sexual experience.

h. Cyberbullying. This is the kind of bullying that takes place over the internet.
This includes sending, posting, or sharing negative, harmful, false, or mean
content about someone that can cause embarrassment or humiliation.
Direction: Fill in the blanks with the correct letters to complete the word. Use the
set of pictures as a clue. Use the provided sheet of paper for you.

4 PICS 1 WORD

https://www.bing.com https://www.bing.com
1. 2.
S _ _U_ _T_ _ E _ _ _ E_S

https://www.bing.com
https://www.bing.com

3. 4.
_TH_ _ S
S_ F _ _ Y
Direction: Answer the following questions. Write your answer in the separate sheet

1. In your own idea/ word explain in 3 sentences what is digital technologies.

2. In your personal experience, how important is knowing the different


terminologies used in digital technology? Write at least three sentences of your
answer.

Rubrics:

6 4 2
List 3 explanation on # List 3 explanation on # List 2 explanation on #1
1 and 3 on #2 1 & 2 on # 2. & # 2.

Direction: Match the correct definitions of a word from Column A to Column B.


Write the letter of your answer on a separate sheet of paper.

Column A Column B

1.Cyber Safety A. It is related to or characteristic of the culture of


computers, information technology, and virtual
reality.

2. Cyber Wellness B. It is the protection of internet-connected


systems such as hardware, software, and data
from cyber threats. The practice is used by
individuals and enterprises to protect against
unauthorized access to data centers and other
computerized systems.
3. Cyber C. It measures promoting the safe usage of the
internet, especially in order to protect against
viruses, fraud, or other forms of attack.

4. Cyber Security D. It refers to the positive well-being of Internet


users. It involves an understanding of online
behavior and awareness of how to protect oneself in
cyberspace.
the Internet. The temperament of gambling may
5. Internet Addiction vary
E. Itfrom sports
is the bets to study
philosophic casino-style games.
of ethics Some
pertaining
examples are roulette,
to computers, poker, slots,
encompassing userlotteries,
behaviorbingo,
and
what computers are programmed to do, and how
this affects individuals and society
F. It is printed or visual material containing the
6. Pornography
explicit description or display of sexual organs or
activity, intended to stimulate erotic rather than
aesthetic or emotional feelings.
7.Online Gambling G. It is commonly known as Internet gambling,
which is typically betting on casino or sports-type
games over the Internet. The temperament of
gambling may vary from sports bets to casino-style
games. Some examples are roulette, poker, slots,
lotteries, bingo, and keno.
H. It is defined as an unhealthy behavior that
8. Cyber Ethics
interferes with and causes stress in one's personal,
school, and/or work life. Like other addictions,
compulsive Internet usage completely dictates a
person's life.

9. Cyber Bullying I. The use of electronic communication to bully a


person, typically by sending messages of an
intimidating or threatening nature.

10. Online Strangers J. Anyone you have met and got to know on the
internet but never in real life.

Direction: Read the story and answer the following given questions below. Use the
separate sheet of paper.

Carlota’s Experience in Social Media


Carlota, a senior high school student, is the president of the Supreme Student
Government (SSG) of the University of San Isidro. She spends most of her time in
school doing several activities such as meeting with her officers, printing activities,
monitoring and organizing events, and other extra-curricular activities. She is
famous because of her position in school. She is also active in social media and has
many followers. She gets thousands of like and share in every reel and video she
posted. All of her activities in life that are shared in social media attract more
followers. Through social media, she gained more fans and more followers in and
outside the school. The semester break came - her family went on a trip in Baguio.
They rented a hotel room for 5 days. On the first day of their vacation, they visited
different tourist sites: Burnham Park, Camp John Hay, Botanical Garden, and
Strawberry Farm. In the evening, her family went to the night market while Carlota
stayed in the hotel with her cell phone alone. After 5 minutes, a message popped
up from one of her follower named Louis. She was bored, so she exchanged
messages with the guy. They talked about personal life and she felt at ease with the
guy even though they haven’t yet seen each other personally.

As days passed by, she refused to go with her family to enjoy other tourists’
spots and chose to stay in the hotel and chat with the guy the whole day. Their
exchange of messages became intimate and the boy requested Carlota to send
photos of tourist spots she visited then later requested to send photos of herself -
naked. Before the end of their trip, her dad saw her phone ringing on the table
while she is taking a bath. He read the name of the caller but he is not familiar
with it. Her dad ask Carlota about the caller and she said, ”It’s just a follower,
Dad.”

A few days after, her friend, Jenny, sent screenshots of her photos circulating
online. It was posted by Louis. Carlota tried contacting him asking to turn the
posts down but he already blocked her in all of his social media accounts. Carlota
was left with nothing to do. She files a lawsuit against Louis

Answer the following:

1. Based on the story, what are the negative online behaviours practiced by
Carlota?

6 4 2
List 3 online negative List 2 online negative List 1 online negative
behaviours and explain behaviours and explain behaviour and explain it
each in three sentences each in two sentences in 1 sentence once
and give once suggestion once suggestion each. suggestion each.
each.

2. Give 3 negative behavior practiced by Carlota in the story and explain how it
is done in three sentences and give one suggestion on how to minimize the
risk of the negative behavior reflected on the story.

Rubrics:
Direction: Read and analyse the following sentences then identify the terminology
in the safe and responsible use of digital technology that reflected on the situation
on the sentences. Write your answer on a separate sheet of paper.

1. John put a password in his laptop to being portray in each situation protect
his files from intruders.
2. Margarita installed an anti-virus application in her
3. Andrea double checks the content of her post before uploading.
4. Harry keeps his company’s data secure
5. Joanna do not spread computer viruses or conduct any hacking activities on
other computers.
Learning Activity Sheet in Subject
(LS6DC-DE-PSF-AE/JHS-4)

Key to Corrections
Let’s Recall Let’s Practice Let’s Enrich Let’s Think Let’s Assess
1. Ethical 1. SECURITY 1. Cyber Ethics, 1. C 1.Cyber Security
2. Unethical 2. WELLNESS Cyber Security, 2. D 2.Cyber Safety
3. Ethical 3. SAFETY Cyber 3. A 3.Cyber wellness
4. Ethical Wellnes,Cyber 4. B 4.Cyber Security
4. ETHICS
5. Unethical Ethics 5. H 5.Cyber Ethics.
6. Ethical 6. F
7. Unethical 2. Answer may 7. G
8. Unethica vary. 8. E
9. Ethical 9. I
10. Unethical 10. J

.
References

United Nations Educational, Scientific and Cultural Organization UNESCO Office,


Jakarta Jalan Galuh II No. 5, Kebayoran Baru, Jakarta, Indonesia
Publication,2020.

Https//www.bing.com
For inquiries or feedback, please write or call:
Department of Education – Region III
Schools Division of Aurora
Learning Resource Management and Development Section (LRMDS)
Sitio Hiwalayan, Brgy. Bacong, San Luis, Aurora
Telefax:
E-mail Address: aurora@deped.gov.ph

You might also like