You are on page 1of 8

LEARNING MODULES

School Year 2021-2022


Subject/Course: EMPOWERMENT TECHNOLOGIES

Title UNIT 1: Introduction to Information and Communications Technology

Module No. 2

Date September 4-15, 2023

Topics  Lesson 2: Online Safety, Security, Ethics and Etiquette

 Lesson 3: Contextualized Online Search and Research Skills

Learning Outcomes At the end of the lesson, the learners are expected to:
 Determine the different online safety, security and ethics.

 Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to
their specific professional tracks.
 Know what internet research and its effective way of using search engines.
 Use the Internet as a tool for credible research and information gathering to best achieve specific class objec-
tives or address situational

Preparatory Activities Show video clip depicting a scenario where only safety, security, or ethical issues arise, and have a class discussion about it.

Content Online Safety, Security, Ethics and Etiquette

The importance of internet plays a crucial part in human development. Life becomes easy and comfortable because of this technology. Most of us are

connected to the internet via laptop, mobile phone, tablet, personal computer, and other electronic gadgets. Behind this technology there is a risk that

everyone should be aware of. You could be at risk on scam, bullying, and illegal activities if you will not take precautions

in using internet. We need to keep ourselves safe and secure whenever we use the internet. That is why it is very important to know and learn the

ways on how to be safe and secured online.

Risk of Sharing Personal Information Online

Content
Tips on how to be safe online

• Do not share your password with anyone.

• Add friends you know in real life.

• Do not visit untrusted websites.

• Add password to your WIFI at home to make it private.

• Install and update antivirus in your computer.

• Do not give your personal information to anyone

• Think before you click.

• Never post about your future vacation.

THE INTERNET AGE

Internet is truly a powerful tool. It can be used to promote business, gain new friends, and stay in touch with the old ones.

The Internet is defined as the information superhighway.

Internet Risk

Common threats faced by the netizens everyday include other netizens with malicious intent.

• Cyberbullying

It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.

• Identity Theft

It is a crime of stealing personal information for the purpose of assuming the person’s name or identity to make any form of transactions.

• Cyber Stalking

A criminal practice where electronic communication is used to stalk or harass individual or group.

• Sexting

The act of sending sexually explicit text messages, images, and videos.

Internet Threats

A. Malware – also known as Malicious Software.

Types of Malware

• Virus – a malicious program that replicate itself by copying itself to another program.

• Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your

computer.

• Worm – malicious program that copy’s itself and spreads to other computers.

• Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker.
• Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close

them.

• Keylogger – A program that runs in the background and steals user credentials and confidential information and send back to hack by

recording every keystroke that a user makes on their computer or device.

• Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of

malware.

• Rootkit –software tools used by hackers to gain control over a computer on a network without being exposed.

• Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online

method for the removal of the virus.

B. Spam

Also known as junk email or unwanted email send by advertiser or bot. It can

be used to send malware.

C. Phishing

A cyberattack method using deceptive emails and websites to acquiring

sensitive personal information.

D. Cybercrime

A crime in which computer is used as object and tool in committing a crime such

hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and

others.

E. Cybercrime Law

A law that deals with all forms of cybercrime.

WHAT IS NETIQUETTE?

It is a word that came from the two words “net” and “etiquette”. It is an etiquette

applied online that shows proper manner and behavior. If you are a member of an

online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is

acceptable to others in online community.

The Core Rules of Netiquette by Seth T. Ross

• Remember the human.

• Adhere to the same standards of behavior online that you follow in real life.

• Know where you are in cyberspace.

• Respect other people's time and bandwidth.

• Make yourself look good online.

• Share expert knowledge.

• Help keep flame wars under control.

• Respect other people's privacy.

• Don't abuse your power.

• Be forgiving of other people's mistakes.

Contextualized Online Search and Research Skills

What is Internet Research?

Internet Research is a research method in collecting and gathering information via internet by using search engine such as google.

Search Engine is a program that allows users to search for content on internet.
Examples of Search Engines

Searching the Web

Getting the correct and reliable information is our goal in internet research. We may rely on the capability of search engine but sometimes it may not

give us the correct information because of the keywords we entered a search engine. There are techniques in searching information that can be applied

in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of AND, OR, and NOT.

Online Research

• Have a question in mind. Focus on a question you want answered.

• Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for you.

• Advanced Search. The best way to filter information you get from search engines is by using the advanced search. This will allow you

to filter out information you do not need.

• Look for a credible sources. Some wikis, filled with updated information, are not a credible source. When using wikis, check out the

link of the cited text.

Tips for
Effective Internet Research by George Mathews

1. Know what kind of research you want to do.

2. Make a list of keywords you will use in your search.

3. Enclose keywords in quotation marks.

4. Use the minus sign (-).

5. Try specialized search engines.

6. Skim through search results web pages.

7. Bookmark

8. Review your bookmarks.

Copyright Issues

There are millions of information that we can get from the internet. Some of this information are free but others are not. They are protected by a

copyright law.

What is Copyright?

Copyright is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and

computer programs. This original work is called intellectual property which is protected under Republic Act 8293 known as the “Intellectual Property

Code of the Philippines”.

Copyright Infringement

This happens when the copyrighted work is use by other person without permission of the author or copyright holder. Any person who is infringing

the right protected work would be liable under the law.

FAIR USE

Fair use is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an

infringement of copyright.

Guidelines for Fair Use


Learning Activities Written Work #1
Direction: Students will reflect and comment to the Slogan “Connect with Respect”, in 2 paragraph ,write it in ½ yellow
paper

Scenario #1:
You were tasked to create and send out formal invitations for a Reunion of Batch ‘99. You were also initially
given a list of 100 names of participants to send out to.
1. From the scenario above, describe briefly how you would most likely complete the task of sending 100 invitations
with individual names of recipients using Microsoft Word.
2. Give examples of documents that you can personalize and send or distribute.

Assessment PERFORMANCE TASK 1


GROUP INFLUENCERS VIDEO
Read the instructions given below.

1. Create a video about Responsible use of internet.

2. Minimum of 3 minutes and maximum of 5 minutes

3. Be guided with the given rubrics on the next page.


Values Integration Explain the statement below.

1. Do you agree or disagree with this statement? Why? Why not?


____________________________________________________________________________________________________________________
____________________________________________________________________________________________________________________
____________________________________________________________________________________________________________________
______________________________________________________

Innovative Training Works Inc., (2016). Empowerment technologies. Manila: Rex Book Store Inc,.
References https://znnhs.zdnorte.net/wp-content/uploads/2021/03/signed-off_Empowerment-TechG12._q1-_Mod2_Empwerment-_.pdf

Prepared Mr. Ronie B. Del Barrio

Checked Ms. Maria Victoria Rowena Mejia

Noted Mr. Cristito M. Maclid

You might also like