EmTech Week2
EmTech Week2
Department of Education
Region I
Division of Pangasinan II
Binalonan, Pangasinan
Flores Integrated School
San Manuel, Pangasinan
SELF-LEARNING MODULE IN
EMPOWERMENT TECHNOLOGY
Grade 11/12
First Quarter, Week 2
MELC:
LESSON 2: Online Safety, Security and Netiquette
Objectives:
Prepared by:
JAYSON M. SORIANO
SHS Teacher II
The internet is the guiding technology of the Information Technology Age just as the electrical engine was of
the Industrial Age. In these times, more and more people are already engaged in the use of technology. These people
who are raised in a digital, media-saturated world are called digital natives. No doubt, the Internet has been very
useful to us but with the rise of instant messaging, chat rooms, emails and social networking sites, it can also bring
trouble - from cyber bullying to more serious Internet dangers, including exposure to sexual predators. Thus, internet
safety is always our primary concern.
PRE-TEST:
Direction: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate
sheet of paper or on your notebook.
1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
2. What is considered shouting over the Internet?
A. Screaming at your computer. C. Putting a lot of exclamation marks at the end of a sentence.
B. Writing in all CAPS. D. Not answering a friend request on Facebook.
3. It is OK to forward or post an email message that you received if
A. the message is typed in all capitals.
B. the author of the message has given you permission to forward or post it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as confidential.
4. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.
5. Knowledge and understanding of netiquette is useful because
A. it will help you create a positive impression on those you meet in cyberspace.
B. it explains some of the technical limitations of online communications.
C. it explains the conventions already being used by millions of cybernauts.
D. All of the above.
6. What type of online threat happens when an attacker uses electronic devices to do unwanted surveillance
against its victim?
A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking
7. What type of online threat happens when the attacker impersonates another individual or organization to
gather personal or business information?
A. Cyberstalking B. Spoofing C. Scamming D. Pharming
8. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
9. What is the golden rule of netiquette?
A. Remember the human. C. Use correct grammar.
B. Put a smiley in every message. D. Respect people’s time.
10. You get an email telling you that you won a hundred thousand without joining in a competition. You
should______________. .
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge.
There's almost no limit to what you can do online. The Internet makes it possible to access information
quickly, communicate around the world, and much more. Unfortunately, the Internet is also home to certain risks,
such as malware, spam, and phishing. If you want to stay safe online, you'll need to understand these risks and learn
how to avoid them
WHAT’S IN
Read the headlines found below and try to reflect on the questions that follow.
ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.
Online safety refers to the practices and precautions that should be observed when using the internet to ensure
that the users as well as their computers and personal information are safe from crimes associated with using the
internet. Below is personal information that must be kept confidential.
There are numerous delinquencies that can be committed on the internet such as stalking, identity theft,
privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service. To make sure that you are in a secured network, the website address
should begin with “https://’ as opposed to “http://”. Never access your accounts by following an
email link, instead type your URL by yourself.
Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly
online. Below are the 10 rules of netiquette:
3. Based from your answer above, do you think you are safe when using the internet? Why?
There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the years, many
internet predators have been playing on vulnerabilities to attack computers and retrieve sensitive data from
individuals. Half the time, we aren’t even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a computer network without
authorization or permission from the owners. These are usually done by computer hackers who uses the World Wide
Web to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of which utilize HTTP or
HTTPS protocols, but may also employ other protocols and components, such as links in email or Instant Messaging
apps, or any malware attachments on servers that access the Web. They benefit cybercriminals by stealing information
for subsequent sale and help absorb infected PCs into botnets. Web threats pose a broad range of risks, including
financial damages, identity theft, loss of confidential information/data, theft of network resources, damaged
brand/personal reputation, and erosion of consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
INTERNET SCAM
generally refers to someone using
internet services orsoftware to defraud
or take advantage of victims,
typically for financial gain.
Cybercriminals may contact potential
victims through personal or work
email accounts, social networking
sites, dating apps, or other methods in
attempts to obtain financial or other
valuable personal information. Online
scams may come in various forms
such as lottery scam, charity fraud
scams, job offer scams, and online
dating scams to name a few.
INTERNET ROBOTS are also known as spiders, crawlers, and web bots. It is a software
application that is programmed to do certain tasks. Bots are automated, which means they run
according to their instructions without a human user. Some bots are useful, such as search engine bots
that index content for search or customer service bots that help users. Other bots are "bad" and are
programmed to break into user accounts, scan the web for contact information for sending spam, or
perform other malicious activities. If it's connected to the Internet, a bot will have an associated IP
address.
MALWARE or malicious software is any program or file that is harmful to acomputer user.
Here are the most common offenders in the rogues’ gallery of malware:
Adware (advertising supported software) is unwanted software designed to throw
advertisements up on your screen. Example, pop-up ads and banner ads.
Spyware is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author. Example is a keylogger.
Virus and Worms are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and infecting
them with its own bits of code.
Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Once it’s on your system, the attackers
behind the Trojan gain unauthorized access to the affected computer. From there, Trojans can be used
to steal financial information or install threats like viruses and ransomware.
Ransomware is a form of malware that locks you out of your device and/or encrypt files,
then forces you to pay a ransom to get them back.
SPAMS are unsolicited emails, instant messages coming from recipients that are not granted
EMPOWERMENT TECHNOLOGY WEEK 3 FOR QUARTER 1 Page 6
verifiable permission for the message to be sent. Spam messages can be damaging if you open or
respond to it.
CYBERSTALKING refers to the
use of the internet or other electronic device o
t
harass or stalk individuals or organizations.
A. C.
4. Your parents bought you your first cell phone. How will you share your cell phone number?
A. Do not share your cell phone number to anyone.
B. Post your cell phone number in your social media account.
C. Share your cell phone number only in person.
D. Post your cell phone number in your group chat.
5. Your social media friends list should only be composed of .
A. Your favourite brands. C. Anyone who sends you a friend request
B. Family and friends D. Foreigners
Directions: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate
sheet of paper or in your notebook.
1. What type of malicious program is designed to replicate itself and transfer from one computer to another
either through the internet or local networks or data storage like flash drives and CDs?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
4. What is ransomware based on?
A. Fear of hackers B. Fear of the Internet C. Fear of spyware D. Fear of losing important files
5. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from
someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering
their login information.
C. Sending someone a text message looks like a notification that the person has won a contest.
D. Sending someone an email that records their keystroke activities while using their computers.
6. Which of the following must NOT be done if you received an embarrassing picture from your friend?
A. Tell your parents or teachers C. Talk to your friend about its negative outcomes.
B. Send the picture on to other friends D. Discourage your friend from sending pictures like that.
7. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.
8. What is considered shouting over the Internet?
A. Screaming at your computer. C. Putting a lot of exclamation marks at the end of a sentence.
B. Writing in all CAPS. D. Not answering a friend request on Facebook.
9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
10. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and
netiquette.
C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay.
D. You are judged by how you look-your profile picture is important.
**Note: Pls. answer only the prepared test and activity listed below.
Pre-test Post-Assessment
1. 6. 1. 6.
2. 7. 2. 7.
3. 8. 3. 8.
4. 9. 4. 9.
5. 10. 5. 10.
Activity 2.1
Activity 2.2