You are on page 1of 66

EMPOWERMEN

T
TECHNOLOGIE
S
MODULE 2
How secure are
you online?
INSIGHTS
1. What do you feel about this
activity?
2. How many checks do you have for
Shared?
3. How many checks do you have for
Not Shared?
4. How safe are you when using the
Internet?
FIRST NAME
LAST NAME
MIDDLE
NAME
CURRENT AND
PREVIOUS
SCHOOLS
CELLPHONE
NUMBER
NAME OF
YOUR FATHER
AND MOTHER
NAME OF
YOUR
SIBLINGS
YOUR
ADDRESS
YOUR HOME
PHONE
NUMBER
YOUR
BIRTHDAY
NETIQUETTE
Netiquette, or network etiquette, is
concerned with the "proper" manner
of communication in the online
environment.
Whenever you communicate in the
virtual world, consider the following
CORE "rules," adapted from Virginia Shea's
Core Rules of Netiquette.
RULES OF
NETIQUET
TE
CORE RULES OF NETIQUETTE

Remember Adhere Know Respect Make

Rule 1: Rule 2: Adhere Rule 3: Know Rule 4: Respect Rule 5: Make


Remember the to the same where you are other people's yourself look
Human standards of in cyberspace time and good online
behavior online bandwidth
that you follow
in real life
CORE RULES OF NETIQUETTE

Share Help Respect Don't abuse Be

Rule 6: Rule 7: Help Rule 8: Rule 9: Rule 10: Be


Share expert keep flame Respect Don't abuse forgiving of
knowledge wars under other your power other
control people's people's
privacy mistakes
QUOTE OF THE DAY
“Passwords are like underwear, don’t
let people see it, change it very often,
and you shouldn’t share it with
strangers.”
Cite some instances that you have
shown “Netiquette” in your life.

What benefits can you get from it?

How can you promote the use of


these regulations?
ACTIVITY
Make a reflection on the importance
of using Netiquette in your daily
life.
SHORT QUIZ
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

1. What is Netiquette?
A. Using a net to catch fish.
B. Being mean to other people on Facebook.
C. Presenting proper manners at the dinner table.
D. Showing manners and etiquette on the Internet.

2. What should you do if you receive a text or email from someone you don't
know?
A. Call the police
B. Delete it without opening it
C. Open it immediately and reply
D. Leave it in your inbox until you figure out who it is
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

3. What should you never do if you get an embarrassing picture from someone?
A. Talk to the person again
B. Send it on to other friends
C. Tell your parents or a teacher
D. Discourage the person from sending pictures like that

4. What should you do if you feel you are being cyber-bullied?


A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Internet
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

5. It is OK to forward or post an email message that you received if_____________


A. The message is typed in all capital letters
B. It does not contain any copyrighted material
C. The author of the message has marked it as confidential.
D. The author of the message hasn’t given you permission to forward or post it

6. A flame is _____________________________
A. An online chain letter
B. An expert programmer
C. A person who consistently breaks the rules of Netiquette
D. a post or email message that expresses a strong opinion or Criticism
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

7. The Golden Rule of Netiquette is __________________________


A. Remember the human!
B. A smiley in every message
C. Don't follow the rules of netiquette.
D. Type in all caps when you're angry

8. You've been sent a virus warning, what should you do now?


A. Ignore it.
B. Forward it to your company.
C. Forward it to everyone in your address book.
D. Go to a security Web site to learn if it is a real virus.
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

9. As a common courtesy, when in a chat room you should:


A. Report disruptive users
B. Introduce yourself when you enter a room.
C. Make it clear when you are directing a question or response to a specific user.
D. All the above

10. Before posting to a discussion group you should _____________________


A. Read the FAQ
B. Find the Frequently Asked Questions (FAQ) document.
C. Read some of the existing posts to get an idea of the tone and character of the group.
D. All the above.
KEY ANSWER
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

1. What is Netiquette?
A. Using a net to catch fish.
B. Being mean to other people on Facebook.
C. Presenting proper manners at the dinner table.
D. Showing manners and etiquette on the Internet.

2. What should you do if you receive a text or email from someone you don't
know?
A. Call the police
B. Delete it without opening it
C. Open it immediately and reply
D. Leave it in your inbox until you figure out who it is
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

3. What should you never do if you get an embarrassing picture from someone?
A. Talk to the person again
B. Send it on to other friends
C. Tell your parents or a teacher
D. Discourage the person from sending pictures like that

4. What should you do if you feel you are being cyber-bullied?


A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Internet
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

5. It is OK to forward or post an email message that you received if_____________


A. The message is typed in all capital letters
B. It does not contain any copyrighted material
C. The author of the message has marked it as confidential.
D. The author of the message hasn’t given you permission to forward or post it

6. A flame is _____________________________
A. An online chain letter
B. An expert programmer
C. A person who consistently breaks the rules of Netiquette
D. a post or email message that expresses a strong opinion or
Criticism
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

7. The Golden Rule of Netiquette is __________________________


A. Remember the human!
B. A smiley in every message
C. Don't follow the rules of netiquette.
D. Type in all caps when you're angry

8. You've been sent a virus warning, what should you do now?


A. Ignore it.
B. Forward it to your company.
C. Forward it to everyone in your address book.
D. Go to a security Web site to learn if it is a real virus.
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.

9. As a common courtesy, when in a chat room you should:


A. Report disruptive users
B. Introduce yourself when you enter a room.
C. Make it clear when you are directing a question or response to a specific user.
D. All the above

10. Before posting to a discussion group you should _____________________


A. Read the FAQ
B. Find the Frequently Asked Questions (FAQ) document.
C. Read some of the existing posts to get an idea of the tone and character of the group.
D. All the above.
INTERNET THREATS
Data Privacy Act of 2012
Is to protect the fundamental human
right of privacy, of communication
while ensuring free flow of
information to promote innovation and
growth.
Internet Threats
1. Email Scam/Junk Mail/Spam Mail – unsolicited commercial
email sent from an unknown source with identical message sent to
multiple recipients.
2. Phishing – deceitful practice of getting your personal information
using email or text messages.
3. Pharming – scamming practice in which malicious code is installed
on a personal computer or server, misdirecting users to fraudulent
web sites without their knowledge or consent.
Internet Threats
4. Computer Viruses- these malicious little programs can create files,
move files, erase files, consume your computer’s memory, and cause
your computer not to function correctly.
5. Spyware- software that spies on your computer where it captures
information.
6. Pop-ads- type of window that appears on top of the browser window
of a Web site that a user has visited.
7. Hacker- clever or expert programmer who can gain unauthorized
access to other computers.
COT FILES
Common Threats to Personal Safety
1. Cyberstalking – crime of using the internet or other electronic
means to stalk, harass, or threaten another person.
2. Cyberbullying – act of intimidating, threatening, or coercing people
online through electronic methods.
3. Online predation – act of engaging an underage minor into
inappropriate sexual relationships through the internet.
4. Flaming- act of saying mean things online, usually in ALL CAPS. (
QUIZ
ONLINE
NAVIGATION
LESSON 1 (NAVIGATION)
How do you
obtain
information?
ONLINE NAVIGATION
The manner of collectively searching for and saving requested information through the
computer from databanks that are online

SEARCH ENGINES
Search engines are software systems that are designed to search for information on the
World Wide Web.
What is the most known and most used
search engine in the world?
STEPS IN ONLINE NAVIGATION
1. In your desktop, laptop or smartphones, open the browser and search
Google and type the word, phrase or thought you want to search.
STEPS IN ONLINE NAVIGATION
2. On the right part of the window, click setting and the google search
settings pop-up list will appear.
STEPS IN ONLINE NAVIGATION
3. Type the keywords that
you would like to search and
click the Advanced Search
button. You can search
through all the words that
you’ve typed, or you can
narrow it down to specific
words
The internet offers a great source of
information; however, how are you
going to make sure that these pieces of
information are reliable?
Why is it important to have a
good research skill?

LESSON 2 (NAVIGATION)
Are all the information you are
searching online are relatable and
exact on what you are looking for?
Critical Thinking

Research Data Organizing


Skills

Research Presenting
If the contents of the source are too

Here are impossible to happen, or too good to be


true, then there must be something wrong.

some tips in
identifying If the site started as a false site for public
good figures such as TV personalities or political
figures, then uploaded stories from
searches different sources, it is a satirical one.

from
satirical If the site is unfamiliar and continuously
searches popping ads, then it is satirical.
Examples of Satirical News

a. The 2 years in K-12 Curriculum for Senior High School has been removed.

b. President Duterte resigned as the leader of the Philippine nation.

c. You can win 1 million pesos just by answering a given survey form.

d. A certain actress/actor is alleged as pregnant being in another country for a


long time.
ACTIVITY
You will be allowed to use your
phones and internet for this activity.

“Give 5 satirical statements from the


internet.”
What do you think are the advantages and disadvantages of
relying on and applying online navigation in gathering
specific information?

3 advantage, 3 disadvantage
SHORT QUIZ
Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. This term refers to the type of information that is relatively considered as fake, untrue, and merely opinion based.
a. Spoof
b. Satirical
c. Sardonic
d. Sarcastic

2. It is the most known and most used search engine.


a. Baidu
b. Yahoo
c. Google
d. Ask.com
Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

3. Which of the following cannot be considered as a guide in identifying he good source from the
satirical source of information?
a. Check if the site is alleged as satirical.
b. Ask someone knowledgeable and get to know the site.
c. Always be cautious and read the contents of the source.
d. Click any sites that appeared as a source of information.

4. It is the process of interactively searching given words/terms to gather specific information.


a. Online Mission
b. Online Navigation
c. Online Expedition
d. Online Exploration
Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

5. Arrange the commands in the correct order when doing a contextualized


online navigation:

I. Open the Google site, on the upper right side of the window,
click the Google Apps icon and click search.
II. On the lower right part of the window, click Settings and the Google Search Settings pop-up list will appear.
III. Click Advanced search and the Advanced Search window will appear.
IV. Type the keywords that you would like to search for and click the Advanced Search button.

a. I, II, III, IV
b. I, III, IV, II
c. I, II, IV, III
d. I, IV, III, II
KEY ANSWER
Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. This term refers to the type of information that is relatively considered as fake, untrue, and merely
opinion based.
a. Spoof
b. Satirical
c. Sardonic
d. Sarcastic

2. It is the most known and most used search engine.


a. Baidu
b. Yahoo
c. Google
d. Ask.com
Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

3. Which of the following cannot be considered as a guide in identifying


the good source from the satirical source of information?
a. Check if the site is alleged as satirical.
b. Ask someone knowledgeable and get to know the site.
c. Always be cautious and read the contents of the source.
d. Click any sites that appeared as a source of information.

4. It is the process of interactively searching given words/terms to gather


specific information.
a. Online Mission
b. Online Navigation
c. Online Expedition
d. Online Exploration
Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

5. Arrange the commands in the correct order when doing a contextualized


online navigation:

I. Open the Google site, on the upper right side of the window,
click the Google Apps icon and click search.
II. On the lower right part of the window, click Settings and the Google Search Settings pop-up list will appear.
III. Click Advanced search and the Advanced Search window will appear.
IV. Type the keywords that you would like to search for and click the Advanced Search button.

a. I, II, III, IV
b. I, III, IV, II
c. I, II, IV, III
d. I, IV, III, II

You might also like