Module 3
Module 3
PRE-TEST
2 R3
Lesson Direction: Read each item carefully and circle the letter of the
correct answer.
3 1. What is Netiquette?
ICT in the
Online
Online a. The proper use of manners and etiquette on the
Context
Safety, of Internet.
Safety,
Global
Security
b. Using a net to catch fish.
___________
7. What type of online threat happens when the attacker impersonates another
individual or organization to gather personal or business information?
8. What type of information should you avoid giving when using the internet?
10. You get an email telling you that you won a hundred thousand without joining in
a competition. You should ____________.
ABS-
CBN
News
Topic Page on Identity-theft.
Retrieved from https://news.abs-cbn.com/list/tag/identity-theft
.
Reflect on the following questions:
Are your social media accounts secured enough that you may not be a victim
of these things?
_________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
NOTE: There's almost no limit to what you can do online. The Internet makes it
possible to access information quickly, communicate around the world, and much
more. Unfortunately, the Internet is also home to certain risks, such as malware,
spam, and phishing. If you want to stay safe online, you'll need to understand these
risks and learn how to avoid them.
3. Based from your answers above, do you think you are safe when using the
Internet? Why?
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is
a reputable business having a secure service. To make sure that you are in a
secured network, the website address should begin with “https://’ as opposed
to “http://”. Never access your accounts by following an email link, instead
type your URL by yourself.
Here are some ways you can check if a website is trustworthy.
Reliable Websites Unreliable Websites
Usually end in .edu or .gov Mind end in .com
Don’t have errors Have errors
Are up to date Are outdated
Use facts Use opinions
d. I have two similar passwords that I alternately use for all my accounts.
3. Your parents bought you your first cellphone. How will you share your cellphone
number?
5. Choose which image below describes how you feel about sharing your password
with your boyfriend/ girlfriend?
6. Spams - are unsolicited emails, instant messages coming from recipients that
are not granted verifiable permission for the message to be sent. Spam messages
can be damaging if you open or respond to it.
9. Spoofing -
happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.
PRACTICE
3 Show Me How You Hashtag!
Direction: Look at the following images and create a hashtag based on the type of
online threat represented by each image. Write your answers in the space provided
in each item.
1. #__________________________________ 2. #__________________________
3.
#_________________________________ 4. #__________________________
REFLECTIO
N
Direction: From all you have learned in lesson 3, why is there a need to
“think before you click?” Write your answer below.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
1. What type of malicious program is designed to replicate it and transfer from one
computer to another either through the internet or local networks or data storage
like flash drives and CDs?
2. What harmful online programs are designed to send you advertisements, mostly
pop-up ads?
3. What harmful online program is used to record keystrokes done by users to steal
passwords?
b. Creating a fake website that looks nearly identical to a real website in order
to trick users into entering their login information.
c. Sending someone a text message looks like a notification that the person
has won a contest.
6. Which of the following must NOT be done if you received an embarrassing picture
from your friend?
b. An expert programmer.
b. Strike first - post mean things about other people on your Wall on Facebook.
b. You are judged by what you do on the Internet and how it looks - by your
spelling, grammar, and netiquette.
c. You are judged by your intent - if you didn't mean to hurt someone's
feelings, then it is okay.
d. You are judged by how you look - your profile picture is important.