0% found this document useful (0 votes)
9 views14 pages

Module 3

The document is a pre-test and practice material focused on online safety, security, and netiquette, aimed at educating students about proper online behavior and the risks associated with internet use. It includes questions on netiquette, types of online threats, and personal information security, as well as practical exercises for self-assessment. The content emphasizes the importance of maintaining privacy and being aware of online dangers such as phishing, malware, and cyberbullying.

Uploaded by

Aivan R. Manatad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views14 pages

Module 3

The document is a pre-test and practice material focused on online safety, security, and netiquette, aimed at educating students about proper online behavior and the risks associated with internet use. It includes questions on netiquette, types of online threats, and personal information security, as well as practical exercises for self-assessment. The content emphasizes the importance of maintaining privacy and being aware of online dangers such as phishing, malware, and cyberbullying.

Uploaded by

Aivan R. Manatad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

QUARTE

PRE-TEST
2 R3
Lesson Direction: Read each item carefully and circle the letter of the
correct answer.
3 1. What is Netiquette?

ICT in the
Online
Online a. The proper use of manners and etiquette on the

Context
Safety, of Internet.

Safety,
Global
Security
b. Using a net to catch fish.

c. Being mean to other people on Facebook.


Communic
Security & & d. Using proper manners at the dinner table.

Netiquett 2. What is considered shouting over the Internet?


Netiquette
Learning
e
Objectives: a. Screaming at your computer.
 identify what
Learning Objectives: b. Writing in all CAPS.
 constitutes
identify varied
online platforms c. Putting a lot of exclamation marks at the end of a
appropriate and sentence.
and sites
Learning Objectives:
 inappropriate
compare andonline d. Not answering a friend request on Facebook.
 identify what
contrast the
behavior.
nuances of varied
constitutes 3. It is OK to forward or post an email message that you
 apply
onlineinternet online
platforms, received
appropriate and
sites, and content
safety, security if __________
to best achieve
inappropriate
ethics andclass
specific etiquette
online behavior. a. the message is typed in all capitals.
objectives or
standards and
 applyaddress situational
internet b. the author of the message has given you permission to
practice in the use
challenges forward or post it.
online safety,
 evaluate existing
of ICTs.
onlineethics
security creation
and c. it does not contain any copyrighted material.
 discern possible
tools, platforms
etiquette d. the author of the message hasn't marked it as
and applications in
deceptive confidential.
developing
standards andICT
information
content and 4. What is a flame in cyberspace?
practice in the use
wrongly evaluated
of ICTs. a. A person who follows the rules of Netiquette.
data.
 discern possible b. An expert programmer.
deceptive c. An online chain letter.
information and
d. A post or email message that expresses a strong
wrongly evaluated opinion
data. or criticism.

5. Knowledge and understanding of netiquette is useful


because

___________

a. it will help you create a positive impression on those


you meet in cyberspace.

b. it explains some of the technical limitations of online


1|Page
communications.

c. it explains the conventions already being used by


millions of cybernauts.
6. What type of online threat happens when an attacker uses electronic devices to
do unwanted surveillance against its victim?

a. Cyberbullying b. Phishing c. Spamming d. Cyberstalking

7. What type of online threat happens when the attacker impersonates another
individual or organization to gather personal or business information?

a. Cyberstalking b. Spoofing c. Scamming d. Pharming

8. What type of information should you avoid giving when using the internet?

a. Phone number b. Profile Picture c. Shirt Size d. Religion

9. What is the golden rule of netiquette?

a. Remember the human. c. Use correct grammar.

b. Put a smiley in every message. d. Respect people’s time.

10. You get an email telling you that you won a hundred thousand without joining in
a competition. You should ____________.

a. Claim the prize. c. Return the email with response.

b. Ignore the email. d. Send rude message as revenge

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 2


PRACTICE
1
Direction: Read the headlines found below and try to reflect on the questions that
follow.

ABS-
CBN
News
Topic Page on Identity-theft.
Retrieved from https://news.abs-cbn.com/list/tag/identity-theft
.
Reflect on the following questions:

What is common among the headlines above?


_______________________________________________________________________________

Are your social media accounts secured enough that you may not be a victim
of these things?
_________________________________________________________________

What type of information do you share in your social media accounts?


_______________________________________________________________________________

_______________________________________________________________________________

_______________________________________________________________________________

NOTE: There's almost no limit to what you can do online. The Internet makes it
possible to access information quickly, communicate around the world, and much
more. Unfortunately, the Internet is also home to certain risks, such as malware,
spam, and phishing. If you want to stay safe online, you'll need to understand these
risks and learn how to avoid them.

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 3


PRACTICE
2 Shared or Not Shared? That is the Question.
Directions: Read and reflect each item carefully. Check the space whether you
have shared or not shared these pieces of information in all your social media
accounts.

Type of Information Shared Not Shared


First Name
Middle Name
Last Name
Current and Previous
School/s
Your cellphone number
Complete of Father and
Mother
Your parent’s cellphone
numbers
Name of Siblings
Your Address
Your Birthday
1. How many of this information have you shared? _________________________

2. How many of this information have you not shared? ________________________

3. Based from your answers above, do you think you are safe when using the
Internet? Why?
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 4


DISCUSSI
Online Safety, Security and Netiquette
ON
,

Online safety refers to the practices and precautions that should be


observed when using the internet to ensure that the users as well as their
computers and personal information are safe from crimes associated with using the
internet. Below are personal information that must be kept confidential. There are
numerous delinquencies that can be committed on the internet such as stalking,
identity theft, privacy violations, and harassment.

 To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
 Do not give any banking or sensitive information unless you are sure that it is
a reputable business having a secure service. To make sure that you are in a
secured network, the website address should begin with “https://’ as opposed
to “http://”. Never access your accounts by following an email link, instead
type your URL by yourself.
Here are some ways you can check if a website is trustworthy.
Reliable Websites Unreliable Websites
Usually end in .edu or .gov Mind end in .com
Don’t have errors Have errors
Are up to date Are outdated
Use facts Use opinions

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 5


Use experts Use unreliable sources

 Never open messages or attachments from someone you do not know.


 Regularly review your privacy settings in your online accounts to make sure
you are not sharing important personal information.
 When using a public computer terminal, be sure to delete your browsing data
before leaving.
 Keep your software updated to avoid security holes.
 Do not download or install software or anything on your computer or cell
phone that is unknown to you.

Netiquette is a combination of the words network and etiquette. It is a set of rules


for behaving properly online.

Below are the 10 rules of netiquette:

Flame war is a series of flame posts or


messages in a thread that are considered
derogatory in nature or are completely off-topic.
Often these flames are posted for the sole
purpose of offending or upsetting other users.
The flame becomes a flame war when other
users respond to the thread with their own flame
message.

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 6


PRACTICE
3
Can You Keep It Private?
Direction: Choose the most appropriate thing to do in the following situation. Circle
the letter of the correct answer.

1. Your family is going out on a vacation. What should you do?

a. Post pictures when you return home.

b. Post the dates you will be gone online.

c. Post updates of where you are currently checking in hotels or places.

d. Tell no one. Vacations are for getting away.

2. Do you have the same passwords for all your accounts?

a. Yes. That is how I remember all my passwords.

b. I have different passwords for all different accounts.

c. I keep it simple. I don’t have any passwords.

d. I have two similar passwords that I alternately use for all my accounts.

3. Your parents bought you your first cellphone. How will you share your cellphone
number?

a. Do not share your cellphone number to anyone.


b. Post your cellphone number in your social media account.

c. Share your cellphone number only in person.

d. Post your cellphone number in your group chat.

4. Your social media friends list should only be composed of ______________.

a. Your favorite brands c. Anyone who sends you a friend request

b. Family and friends d. Foreigners

5. Choose which image below describes how you feel about sharing your password
with your boyfriend/ girlfriend?

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 7


DISCUSSI
ON
Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on
vulnerabilities to attack computers and retrieve sensitive data from individuals. Half
the time, we aren’t even aware it is happening until it is too late. Online threat is
deemed any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners. These are usually done by
computer hackers who uses the World Wide Web to facilitate cybercrime. Web
threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS
protocols, but may also employ other protocols and components, such as links in
email or Instant Messaging apps, or any malware attachments on servers that
access the Web. They benefit cybercriminals by stealing information for subsequent
sale and help absorb infected PCs into botnets. Web threats pose a broad range of
risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking. The
following are the top kinds of online threats that you should be aware of:

1. Phishing - happens when an email is sent from an internet criminal disguised


as an email from a legitimate, trustworthy source. The message is meant to
lure you into revealing sensitive or confidential information.

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 8


2. Pharming - happens when a hacker (or “pharmer”) directs an internet user to a
fake website instead of a legitimate one. These “spoofed” sites can capture a
victim’s confidential information, including usernames, passwords, and credit card
data, or install malware on their computer. Pharmers usually focus on websites in
the financial sector, including banks, online payment platforms, or other e-
commerce destinations.

3. Internet Scam - generally refers to someone using internet services or software


to defraud or take advantage of victims, typically for financial gain. Cybercriminals
may contact potential victims through personal or work email accounts, social
networking sites, dating apps, or other methods in attempts to obtain financial or
other valuable personal information. Online scams may come in various forms such
as lottery scam, charity fraud scams, job offer scams, and online dating scams to
name a few.

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 9


4. Internet robots - are also known as spiders, crawlers, and web bots. It is a
software application that is programmed to do certain tasks. Bots are automated,
which means they run according to their instructions without a human user. Some
bots are useful, such as search engine bots that index content for search or
customer service bots that help users. Other bots are "bad" and are programmed to
break into user accounts, scan the web for contact information for sending spam, or
perform other malicious activities. If it's connected to the Internet, a bot will have an
associated IP address.

5. Malware or malicious software - is any program or file that is harmful to a


computer user. Here are the most common offenders in the rogues’ gallery of
malware:

 Adware (advertising supported software) - is unwanted software


designed to throw advertisements up on your screen. Example,
pop-up ads and banner ads.
 Spyware - is malware that secretly observes the computer user’s
activities without permission and reports it to the software’s
author. Example is a key logger.
 Virus and Worms - are malwares that attach to another program
and, when executed—unintentionally by the user—replicates itself
by modifying other computer programs and infecting them with its
own bits of code.
 Trojan, or Trojan horse - is one of the most dangerous malware
types. It usually represents itself as something useful in order to
trick you. Once it’s on your system, the attackers behind the
Trojan gain unauthorized access to the affected computer. From
there, Trojans can be used to steal financial information or install
threats like viruses and ransom ware.
 Ransomware - is a form of malware that locks you out of your
device and/or encrypts your files, then forces you to pay a ransom
to get them back.

6. Spams - are unsolicited emails, instant messages coming from recipients that
are not granted verifiable permission for the message to be sent. Spam messages
can be damaging if you open or respond to it.

7. Cyberstalking - refers to the use of the internet or other electronic device to


harass or stalk individuals or organizations.

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 10


8.Cyberbullying - refers to the act of tormenting, harassing, or embarrassing
another person using the internet.

9. Spoofing -
happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.

PRACTICE
3 Show Me How You Hashtag!
Direction: Look at the following images and create a hashtag based on the type of
online threat represented by each image. Write your answers in the space provided
in each item.

1. #__________________________________ 2. #__________________________

3.

#_________________________________ 4. #__________________________

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 11


5. #_____________________________

REFLECTIO
N
Direction: From all you have learned in lesson 3, why is there a need to
“think before you click?” Write your answer below.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 12


ASSESSME
NT
Directions: Read each item carefully and circle the letter of the correct answer.

1. What type of malicious program is designed to replicate it and transfer from one
computer to another either through the internet or local networks or data storage
like flash drives and CDs?

a. Adware b. Spyware c. Worms and Virus d. Ransomware

2. What harmful online programs are designed to send you advertisements, mostly
pop-up ads?

a. Adware b. Spyware c. Worms and Virus d. Ransomware

3. What harmful online program is used to record keystrokes done by users to steal
passwords?

a. Adware b. Spyware c. Worms and Virus d. Ransomware

4. What is ransomware based on?

a. Fear of hacker’s c. Fear of spyware

b. Fear of the Internet d. Fear of losing important files

5. Which of the following is an example of a “phishing” attack?

a. Sending someone an email that contains a malicious link that is disguised to


look like an email from someone reliable.

b. Creating a fake website that looks nearly identical to a real website in order
to trick users into entering their login information.

c. Sending someone a text message looks like a notification that the person
has won a contest.

d. Sending someone an email that records their keystroke activities while


using their computers.

6. Which of the following must NOT be done if you received an embarrassing picture
from your friend?

a. Tell your parents or teachers

b. Send the picture on to other friends

c. Talk to your friend about its negative outcomes.

d. Discourage your friend from sending pictures like that.

7. What is a flame in cyberspace?

a. A person who follows the rules of Netiquette.

b. An expert programmer.

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 13


c. An online chain letter.

d. A post or email message that expresses a strong opinion or criticism. 8.


What is considered shouting over the Internet?

a. Screaming at your computer.

b. Writing in all CAPS.

c. Putting a lot of exclamation marks at the end of a sentence.

d. Not answering a friend request on Facebook.

9. To avoid being cyber-bullied you should always __________.

a. Give out personal information to anyone who asks.

b. Strike first - post mean things about other people on your Wall on Facebook.

c. Observe proper netiquette rules.

d. Ignore any requests from people to be your friend online.

10. How are you judged in cyberspace?

a. No one can see you, so no one can judge you.

b. You are judged by what you do on the Internet and how it looks - by your
spelling, grammar, and netiquette.
c. You are judged by your intent - if you didn't mean to hurt someone's
feelings, then it is okay.

d. You are judged by how you look - your profile picture is important.

DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 14

You might also like