INFORMATION AND
COMMUNICATION TECHNOLOGY
GRADE
8
WEEK 2
DAY 1
LEARNING
OBJECTIVES
EXPLAIN KEY CONCEPTS OF
DIGITAL CITIZENSHIP AND
RELATED LEGAL BASES
UNDERSTAND THE IMPACT OF
DIGITAL CITIZENSHIP ON
DAILY INTERACTIONS
APPLY RESPONSIBLE ONLINE
BEHAVIOR BASED ON
DIGITAL CITIZENSHIP
REVIEW
DIGITAL CITIZENSHIP
DIGITAL
CITIZENSHIP
Refers to the responsible use of technology by individuals who
engage with society through digital means. It encompasses
understanding the norms of appropriate, responsible behavior
concerning technology use.
DIGITAL
CITIZENSHIP
Examples:
• Respecting others' opinions in online discussions.
• Protecting personal information by using strong, unique
passwords.
• Reporting inappropriate or harmful content encountered
online
ELEMENTS OF DIGITAL
CITIZENSHIP
1. Digital Etiquette
Digital etiquette, or "netiquette," refers to the standards of
conduct expected by individuals when using digital technologies.
ELEMENTS OF DIGITAL
CITIZENSHIP
1. Digital Etiquette
Examples:
• Avoiding posting inflammatory or offensive comments
online.
• Respecting others' privacy by not sharing personal
information without consent.
• Using appropriate language and refraining from typing in all
caps, which can be interpreted as shouting.
ELEMENTS OF DIGITAL
CITIZENSHIP
2. Digital Law
Pertains to the legal rights and restrictions governing technology
use. It encompasses the ethical and legal responsibilities
associated with online actions and behaviors.
ELEMENTS OF DIGITAL
CITIZENSHIP
2. Digital Law
Examples:
• Refraining from downloading pirated software or media, as it
violates copyright laws.
• Recognizing that cyberbullying and online harassment can
have legal consequences.
ELEMENTS OF DIGITAL
CITIZENSHIP
3. Digital Rights and Responsibilities
Digital rights and responsibilities refer to the privileges and
freedoms extended to all digital technology users and the
behavioral expectations that come with them.
ELEMENTS OF DIGITAL
CITIZENSHIP
3. Digital Rights and Responsibilities
Examples:
• Rights:
⚬ Access to digital resources and content.
⚬ Freedom of expression in digital forums.
⚬ Privacy and protection of personal information.
ELEMENTS OF DIGITAL
CITIZENSHIP
3. Digital Rights and Responsibilities
Examples:
• Responsibilities:
⚬ Citing sources when using digital content created by
others.
⚬ Reporting inappropriate or illegal online activities.
⚬ Upholding online safety protocols to protect oneself and
others.
ELEMENTS OF DIGITAL
CITIZENSHIP
4. Digital Health and Wellness
Digital health and wellness involve the physical and psychological
well-being of individuals in the digital world. It emphasizes
maintaining a balanced and healthy approach to technology use.
ELEMENTS OF DIGITAL
CITIZENSHIP
4. Digital Health and Wellness
Examples:
• Taking regular breaks from screen time to prevent eye strain
• Engaging in physical activities to counteract the sedentary
nature of prolonged computer use.
• Being mindful of mental health by managing stress related to
online interactions or information overload.
ELEMENTS OF DIGITAL
CITIZENSHIP
5. Digital Security
Digital security refers to the measures and tools used to protect
one's online identity, data, and other digital assets. It
encompasses practices designed to safeguard information from
cyber threats.
ELEMENTS OF DIGITAL
CITIZENSHIP
5. Digital Security
Examples:
• Using antivirus software to detect and prevent malware
infections.
• Enabling two-factor authentication for online accounts to
add an extra layer of security.
• Regularly updating software and applications to patch
security vulnerabilities.
ELEMENTS OF DIGITAL
CITIZENSHIP
6. Digital Access
Digital access refers to the equitable opportunity for all
individuals to participate fully in the digital society, ensuring that
everyone has the necessary technology and internet connectivity.
ELEMENTS OF DIGITAL
CITIZENSHIP
6. Digital Access
Examples:
• Providing affordable internet services in underserved
communities to bridge the digital divide.
• Implementing assistive technologies for individuals with
disabilities to access digital content.
ELEMENTS OF DIGITAL
CITIZENSHIP
7. Digital Commerce
Digital commerce involves the buying and selling of goods and
services through digital platforms, emphasizing the importance of
secure and informed online commercial activities.
ELEMENTS OF DIGITAL
CITIZENSHIP
7. Digital Commerce
Examples:
• Purchasing products from reputable e-commerce websites
that use secure payment gateways.
• Being cautious of online scams and fraudulent sellers when
shopping online.
ELEMENTS OF DIGITAL
CITIZENSHIP
8. Digital Communication
Digital communication refers to the electronic exchange of
information, including emails, instant messaging, social media
interactions, and other forms of online correspondence.
ELEMENTS OF DIGITAL
CITIZENSHIP
8. Digital Communication
Examples:
• Using professional language and tone in work-related emails.
• Being mindful of the audience and context when posting on
social media platforms.
ELEMENTS OF DIGITAL
CITIZENSHIP
9. Digital Literacy
Digital literacy is the ability to find, evaluate, utilize, share, and
create content using digital technologies in a responsible and
effective manner.
ELEMENTS OF DIGITAL
CITIZENSHIP
9. Digital Literacy
Examples:
• Critically assessing the credibility of online information
before sharing it.
• Understanding how to use various digital tools and platforms
for educational purposes.
ROLE PLAYING
Scenario Description
• A student, Alex, posts a picture of their new project on a
school-related social media group. Another student, Sam, starts
posting negative comments about Alex's project, calling it
"stupid" and "a waste of time." Other students join in, and the
comments escalate to personal attacks on Alex’s
appearance and abilities. Alex feels hurt and embarrassed and
doesn't know how to respond.
ROLE PLAYING
Role-Play Instructions
Assign Roles:
Alex - (the victim) Other students - (bystanders)
Sam - (the bully) Teacher - (authority figure)
ROLE PLAYING
Guided Questions: Cyberbullying Incident Analysis
A. Understanding the Emotional Impact
1.How do you think Alex felt after reading the comments?
2.If you were Alex, what would you do in this situation?
B. Analyzing Behavior
3.Why do you think Sam chose to post negative comments instead of
giving helpful feedback?
4.What might be some reasons why other students joined in on the
bullying instead of stopping it?
ROLE PLAYING
C. Role of Bystanders
1.What role did the bystanders play in this situation? Did their actions (or
inaction) help or hurt Alex?
2.What could the bystanders have done differently to support Alex or stop the
bullying?
D. Digital Citizenship Reflection
3.Which elements of digital citizenship were ignored in this scenario? Why are
they important?
4.How could Sam and the other students have shown better digital etiquette?
ROLE PLAYING
E. Taking Action
1.If you were a teacher or classmate who witnessed this, how would you
intervene or help?
2.What rules or actions could the class agree on to promote respectful
behavior in school-related online groups?
F. Long-term Impact and Safety
3.What are the possible long-term effects of cyberbullying on a student like
Alex?
4.How can we protect ourselves and others from digital bullying or online
attacks?
ACTIVITY: UNDERSTANDING
DIGITAL CITIZENSHIP
Please refer to
your worksheet
for this activity:
GENERALIZATION
Learners’ Takeaways
In today’s lessons, I have learned that……
______________________________________________
______________________________________________
______________________________________________
______________________________________________
_______________________________
THANK YOU!!!!!
INFORMATION AND
COMMUNICATION TECHNOLOGY
GRADE
8
WEEK 2
DAY 2
LEARNING
OBJECTIVES
DEFINE DIGITAL FOOTPRINT
AND DIGITAL
IDENTITY
DIFFERENTIATE ACTIVE AND
PASSIVE DIGITAL
FOOTPRINTS
ANALYZE HOW DIGITAL
ACTIVITIES SHAPE ONLINE
IDENTITY
REVIEW
ACTIVITY
READ THE STORY FROM
CALAMEO ABOUT ONLINE
REPUTATION.
REFLECT: HOW CAN ONLINE
ACTIONS AFFECT YOUR
FUTURE? WRITE 5–7
SENTENCES.
ACTIVITY
1. WHAT DO YOU THINK MAKES
UP YOUR DIGITAL FOOTPRINT?
2. CAN YOU THINK OF A TIME
WHEN SOMEONE'S ONLINE
ACTIONS AFFECTED THEIR
REAL LIFE?
DIGITAL FOOTPRINTS
DIGITAL
FOOTPRINTS
A digital footprint is the data trail left by online activities,
including shared information through social media, websites,
emails, and online shopping. It can be classified into two types.
TYPES OF DIGITAL
FOOTPRINTS
1. Active Digital Footprints
These are the data trails you leave intentionally, such as posts on
social media, blog entries, or any other content you actively
upload or share online.
TYPES OF DIGITAL
FOOTPRINTS
2. Passive Digital Footprints
These are the data trails you leave unintentionally, such as
cookies that track your browsing habits, IP addresses, and other
metadata collected by websites and online services.
IMPORTANCE OF
DIGITAL FOOTPRINTS
Privacy and Security
The data you leave behind can be used to build a profile about
you, which can be exploited for malicious purposes such as
identity theft or targeted cyber-attacks (Solove,
2007).
IMPORTANCE OF
DIGITAL FOOTPRINTS
Reputation Management
Your digital footprint can affect your reputation. Employers,
colleges, and other entities often search for online information
about candidates, and inappropriate content can have negative
consequences (Berkelaar, 2014).
IMPORTANCE OF
DIGITAL FOOTPRINTS
Personalization
Companies use digital footprints to personalize user experiences,
such as recommending products or content based on browsing
history (Turow, 2011).
IMPORTANCE OF
DIGITAL FOOTPRINTS
Think Before You Post
Consider the long-term impact of the content you share online.
Once something is posted, it can be difficult to remove it
completely.
IMPORTANCE OF
DIGITAL FOOTPRINTS
Search Yourself - Periodically search for your own name on
search engines to see what information is publicly accessible.
IMPORTANCE OF
DIGITAL FOOTPRINTS
Privacy Settings - Regularly review and adjust the privacy settings
on your social media accounts and other online services to
control who can see your information.
IMPORTANCE OF
DIGITAL FOOTPRINTS
Use Secure Connections
Ensure that you are using secure (HTTPS) connections when
browsing the internet to protect your data from being
intercepted.
IMPORTANCE OF
DIGITAL FOOTPRINTS
Use Secure Connections
Ensure that you are using secure (HTTPS) connections when
browsing the internet to protect your data from being
intercepted.
DIGITAL IDENTITY
DIGITAL IDENTITY
Digital identity refers to the online persona that is created
through your digital footprints. It encompasses all the
information available about you online, including social media
profiles, online transactions, and any other digital interactions.
Your digital identity can influence how others perceive you and
can have real-world implications.
COMPONENTS OF
DIGITAL IDENTITY
• Personal Information - This includes your name, date of birth,
address, and other identifying
details.
• Professional Information - This includes your employment
history, professional skills, and educational background, often
found on platforms like LinkedIn.
COMPONENTS OF
DIGITAL IDENTITY
• Social Information - This includes your social media activity,
such as posts, likes, comments,
and the networks you are part of.
• Behavioral Information - This includes your browsing habits,
purchase history, and other online
behaviors that can be tracked and analyzed.
RISKS ASSOCIATED
WITH DIGITAL IDENTITY
• Identity Theft - Cybercriminals can use your personal
information to steal your identity and commit fraud (Newman &
McNally, 2005).
• Reputation Damage - Negative information or inappropriate
content associated with your digital identity can harm your
personal and professional reputation.
RISKS ASSOCIATED
WITH DIGITAL IDENTITY
• Data Exploitation - Companies can exploit your digital identity
for targeted advertising and other
commercial purposes without your explicit consent (Acquisti &
Gross, 2006)
PROTECTING YOUR
DIGITAL IDENTITY
• Strong Passwords - Use strong, unique passwords for different
online accounts and change them regularly.
• Two-Factor Authentication - Enable two-factor authentication
(2FA) for an added layer of security.
PROTECTING YOUR
DIGITAL IDENTITY
• Be Skeptical of Phishing - Be cautious of emails, messages, or
websites that ask for personal information.
• Regular Monitoring - Keep an eye on your online accounts for
any suspicious activity.
WORKED EXAMPLE
Analyze the scenario below and answer the following guide
questions:
1.What impact did the situation have on the student’s digital
footprint and online identity?
2.How could the situation have been handled better by the
people involved?
WORKED EXAMPLE
Sarah, a high school student, posts a photo on her Instagram
account during a weekend party with friends. In the background
of the photo, there are some students drinking from red cups,
which are commonly associated with alcoholic beverages,
although the cups actually contain soda. Sarah captions the
photo, "Crazy night with the best people! #PartyHard.
WORKED EXAMPLE
Analyze Sarah’s situation using the following guide questions:
1.What mistakes did Sarah make in terms of digital etiquette,
rights and responsibilities, security, and reputation
management?
2.How could Sarah have handled the situation more
responsibly as a digital citizen?
ACTIVITY: DIGITAL FOOTPRINT
DIARY
Please refer to
your worksheet
for this activity:
GENERALIZATION
Learners’ Takeaways
In today’s lessons, I have learned that……
______________________________________________
______________________________________________
______________________________________________
______________________________________________
_______________________________
THANK YOU!!!!!
INFORMATION AND
COMMUNICATION TECHNOLOGY
GRADE
8
WEEK 2
DAY 3
LEARNING
OBJECTIVES
EXPLAIN THE RELEVANCE OF
PHILIPPINE ICT-RELATED LAWS
IDENTIFY LEGAL RIGHTS AND
RESPONSIBILITIES ONLINE
APPLY KNOWLEDGE OF DIGITAL
LAWS IN REAL-LIFE
SCENARIOS
REVIEW
ACTIVITY
USE THE PADLET LINK
PROVIDED. READ THE
SUMMARIES OF RA 10844, RA
10627, RA 10173, AND RA
8293. REFLECT ON HOW THESE
LAWS PROTECT AND REGULATE
DIGITAL BEHAVIOR.
ACTIVITY
1. WHAT DO YOU KNOW
ABOUT THESE LAWS?
2. CAN YOU THINK OF A
SITUATION WHERE THESE
LAWS MIGHT APPLY?
ICT-RELATED LEGAL
BASES
REPUBLIC ACT NO.
10844
Republic Act No. 10844 – Department of Information and
Communications Technology (DICT) Act of 2015
This law created the DICT, a government agency that handles all
things related to information and communications technology in
the Philippines. It aims to make sure Filipinos have access to safe,
reliable, and affordable digital services.
REPUBLIC ACT NO.
10844
Why it matters:
• It promotes digital inclusion, helping people in remote areas
access the internet.
• It encourages the use of safe and secure technology in
government, education, and daily life.
• It bridges the digital divide, making technology accessible to
all.
REPUBLIC ACT NO.
10844
How it protects you:
• Implements cybersecurity policies to protect users from
online threats like hacking and scams.
• Works with other government offices to enforce data
protection and privacy.
• Sets standards for internet and digital services (such as
speed, safety, and reliability).
REPUBLIC ACT NO.
10844
Real-Life Example:
The Free Wi-Fi for All program provides internet access in
schools, parks, and terminals. This allows students and
communities to connect online without extra costs.
REPUBLIC ACT NO.
10627
Republic Act No. 10627 – Anti-Bullying Act of 2013
This law protects students from all forms of bullying—including
cyberbullying, which happens online through texts, posts, and
messages. It makes sure schools take bullying seriously.
REPUBLIC ACT NO.
10627
Why it matters:
• Children and teens spend a lot of time online—this law helps
keep them safe from harmful behavior in digital spaces.
• It creates a supportive and respectful school environment.
REPUBLIC ACT NO.
10627
Why it matters:
• Requires all schools to have clear anti-bullying policies,
including steps to report incidents.
• Ensures victims and offenders receive counseling or support.
• Involves parents, teachers, and school officials in solving
bullying cases.
REPUBLIC ACT NO.
10627
Real-Life Example:
A student who was bullied through social media reported it to
the school. Under this law, the school took action by
investigating, disciplining the offenders, and counseling the
student. This restored peace and highlighted how laws can
protect us online.
REPUBLIC ACT NO.
10173
Republic Act No. 10173 – Data Privacy Act of 2012
This law protects the privacy of your personal information—such
as your name, phone number, photos, and location—when you
share them online or in forms.
REPUBLIC ACT NO.
10173
Why it matters:
• In a digital world, we share personal data all the time—
signing up for apps, filling out forms, shopping online, etc.
• This law ensures that your data is handled with care and not
abused.
REPUBLIC ACT NO.
10173
How it protects you:
• Companies must ask for your consent before collecting or
using your information.
• You can access, correct, or delete your data if necessary.
• In case of a data breach, companies must notify you and the
National Privacy Commission (NPC).
• Violations lead to penalties or fines.
REPUBLIC ACT NO.
10173
Real-Life Example:
A large telecom company had a data breach. The NPC
investigated and required them to improve their cybersecurity
and compensate affected users. This event showed the
importance of data protection.
REPUBLIC ACT NO.
8293
Republic Act No. 8293 – Intellectual Property Code of the
Philippines
This law protects intellectual property (IP)—creations of the mind
—such as books, movies, songs, apps, designs, and inventions. It
ensures that creators are respected and rewarded for their work.
REPUBLIC ACT NO.
8293
Why it matters:
• People often download or share music, videos, or games
online. This law helps remind everyone to respect original
content.
• It supports Filipino artists, writers, inventors, and developers
by protecting their rights.
REPUBLIC ACT NO.
8293
How it protects you and others:
• Prevents piracy and plagiarism—illegal copying or sharing of
someone else's work.
• Encourages fair use (e.g., using materials for education with
credit).
• The Intellectual Property Office of the Philippines (IPOPHL)
makes sure this law is followed.
REPUBLIC ACT NO.
8293
Real-Life Example:
The IPOPHL shut down websites sharing pirated movies and
shows. This action helped protect the hard work of creators and
reminded the public not to use or support illegal content.
SCENARIO:
CYBERBULLYING INCIDENT
Maria, a high school student, starts receiving hurtful messages on
her social media accounts. The messages come from anonymous
accounts and include insults about her appearance and false
rumors about her personal life. The situation escalates when
someone creates a fake profile using her name and photos,
posting inappropriate content that further tarnishes her
reputation. Maria feels distressed and helpless, unsure of how to
stop the harassment.
SCENARIO:
CYBERBULLYING INCIDENT
Analyzing the Scenario Using Republic Act No. 10627 (Anti-Bullying Act of
2013)
Step 1: Identifying the Cyberbullying
• Hurtful Messages: Maria receives insulting messages about her appearance
and false rumors about her personal life.
• Anonymous Accounts: The messages come from unidentified sources,
making it difficult for Maria to confront the bullies.
• Fake Profile: Someone creates a fake profile using Maria's name and
photos, posting inappropriate content to damage her reputation.
SCENARIO:
CYBERBULLYING INCIDENT
Step 2: Understanding Maria's Protections Under the Law Protections
Outlined in Republic Act No. 10627
• Definition of Bullying: The law defines bullying to include any severe or
repeated use of written, verbal, or electronic expression that causes physical
or emotional harm, fear, or damage to a person's reputation.
• School Responsibility: Schools are required to adopt policies to address
bullying and cyberbullying. These policies must include procedures for
reporting, investigating, and responding to bullying incidents.
SCENARIO:
CYBERBULLYING INCIDENT
Step 2: Understanding Maria's Protections Under the Law Protections
Outlined in Republic Act No. 1062
• Reporting Mechanisms: The law mandates that schools provide clear
mechanisms for students to report bullying incidents safely and
confidentially.
• Support and Intervention: Schools must offer support and intervention
programs for both victims and perpetrators of bullying to promote behavioral
change and conflict resolution
SCENARIO:
CYBERBULLYING INCIDENT
Step 3: Maria's Responsibilities and Steps to Take
• Report the Incident: Maria should report the cyberbullying to a trusted
teacher, school counselor, or administrator. She can provide screenshots or
other evidence of the hurtful
messages and fake profile.
SCENARIO:
CYBERBULLYING INCIDENT
Step 3: Maria's Responsibilities and Steps to Take
• Document the Bullying: Maria should keep a record of all bullying
incidents, including dates, times, and descriptions of the messages and
actions taken by the bullies.
• Seek Support: Maria should seek emotional support from friends, family, or
a school counselor to help cope with the stress and emotional impact of the
cyberbullying.
SCENARIO:
CYBERBULLYING INCIDENT
Step 3: Maria's Responsibilities and Steps to Take
• Document the Bullying: Maria should keep a record of all bullying
incidents, including dates, times, and descriptions of the messages and
actions taken by the bullies.
• Seek Support: Maria should seek emotional support from friends, family, or
a school counselor to help cope with the stress and emotional impact of the
cyberbullying.
SCENARIO:
CYBERBULLYING INCIDENT
Step 3: Maria's Responsibilities and Steps to Take
• Avoid Retaliation: Maria should avoid responding to the bullies or
retaliating, as this could
escalate the situation.
SCENARIO:
CYBERBULLYING INCIDENT
Step 4: School's Role and Responsibilities
• Investigate the Report: The school must promptly investigate Maria's
report of cyberbullying, ensuring that the investigation is thorough and
confidential.
• Take Disciplinary Action: If the investigation confirms the cyberbullying, the
school should take appropriate disciplinary action against the perpetrators,
in accordance with their anti bullying policy.
SCENARIO:
CYBERBULLYING INCIDENT
Step 4: School's Role and Responsibilities
• Provide Support: The school should offer counseling and support services
to Maria to help her recover from the emotional impact of the bullying.
• Educate the Community: The school should conduct awareness programs
to educate students, teachers, and parents about the dangers of
cyberbullying and the importance of respectful online behavior.
GENERALIZATION
Learners’ Takeaways
In today’s lessons, I have learned that……
______________________________________________
______________________________________________
______________________________________________
______________________________________________
_______________________________
THANK YOU!!!!!
INFORMATION AND
COMMUNICATION TECHNOLOGY
GRADE
8
WEEK 2
DAY 4
LEARNING
OBJECTIVES
RESEARCH PHILIPPINE ICT-
RELATED LAWS AND REAL-LIFE
APPLICATIONS
CREATE POSTERS TO EXPLAIN
AND PROMOTE UNDERSTANDING
OF DIGITAL LAWS
DEMONSTRATE CRITICAL
THINKING AND CREATIVITY
THROUGH VISUAL COMMUNICATION
REVIEW
ACTIVITY
RESEARCH YOUR ASSIGNED
LAW (RA 10844, RA 10627,
RA 10173, OR RA 8293).
IDENTIFY ITS KEY POINTS,
REAL-LIFE EXAMPLES, AND
PLAN AN ADVOCACY POSTER
TO SUMMARIZE YOUR
FINDINGS.
ACTIVITY: CREATING POSTERS
ON PHILIPPINE DIGITAL LAWS
Please refer to
your worksheet
for this activity:
GENERALIZATION
Learners’ Takeaways
In today’s lessons, I have learned that……
______________________________________________
______________________________________________
______________________________________________
______________________________________________
_______________________________
FORMATIVE
ASSESSMENT
1. REPUBLIC ACT NO. 10173 (DATA PRIVACY ACT OF
2012) IS DESIGNED TO PROTECT PERSONAL DATA IN
INFORMATION AND COMMUNICATIONS SYSTEMS BOTH
IN THE GOVERNMENT AND THE PRIVATE SECTOR.
WHICH OF THE FOLLOWING IS NOT A RIGHT PROVIDED
BY THIS ACT?
A. RIGHT TO BE INFORMED
B. RIGHT TO DATA PORTABILITY
C. RIGHT TO ERASURE OR BLOCKING
D. RIGHT TO FREEDOM OF SPEECH
FORMATIVE
ASSESSMENT
2. THE CYBERCRIME PREVENTION ACT (REPUBLIC ACT
NO. 10175) INCLUDES A CONTROVERSIAL PROVISION
ABOUT ONLINE
LIBEL. WHICH STATEMENT BEST REFLECTS THE
IMPLICATION OF THIS PROVISION?
A. IT DECRIMINALIZES LIBEL WHEN COMMITTED ONLINE.
B. IT IMPOSES A HIGHER PENALTY FOR LIBEL COMMITTED
ONLINE THAN WRITTEN LIBEL.
C. IT ONLY APPLIES TO LIBEL AGAINST INDIVIDUALS, NOT
GROUPS.
FORMATIVE
ASSESSMENT
4. THE INTELLECTUAL PROPERTY CODE (REPUBLIC ACT
NO. 8293) PROTECTS THE RIGHTS OF CREATORS OVER
THEIR CREATIONS.
WHICH OF THE FOLLOWING IS NOT PROTECTED UNDER
THIS ACT?
A. LITERARY WORKS
B. MATHEMATICAL FORMULAS
C. MUSICAL COMPOSITIONS
D. ARTISTIC ILLUSTRATIONS
FORMATIVE
ASSESSMENT
5. REPUBLIC ACT NO. 10844, WHICH CREATED THE
DEPARTMENT OF INFORMATION AND
COMMUNICATIONS TECHNOLOGY (DICT), AIMS TO
ENSURE THE PROVISION OF STRATEGIC, RELIABLE,
AND COST-EFFICIENT ICT INFRASTRUCTURE. WHAT IS
A POTENTIAL CONSEQUENCE OF THIS ACT FOR
EDUCATIONAL INSTITUTIONS?
A. MANDATORY USE OF DICT-APPROVED SOFTWARE IN
SCHOOLS
B. INCREASED ACCESS TO ONLINE LEARNING PLATFORMS
FORMATIVE
ASSESSMENT
6. THE MAGNA CARTA FOR PHILIPPINE INTERNET
FREEDOM (SENATE BILL NO. 3327) PROPOSES
SEVERAL PROVISIONS.
WHICH OF THE FOLLOWING IS NOT INCLUDED IN THE
BILL?
A. PROTECTION OF INTERNET USERS FROM CENSORSHIP
B. ENSURING NETWORK NEUTRALITY
C. REGULATION OF CONTENT CREATION ON THE INTERNET
D. PROMOTION OF INTERNET RIGHTS AND GOVERNANCE
FORMATIVE
ASSESSMENT
7. THE FREE INTERNET ACCESS IN PUBLIC PLACES ACT
(REPUBLIC ACT NO. 10929) PROVIDES FREE INTERNET
ACCESS IN PUBLIC PLACES. HOW MIGHT THIS LAW AFFECT
STUDENTS’ ONLINE BEHAVIOR?
A. IT MAY INCREASE INSTANCES OF CYBERBULLYING DUE TO
WIDER INTERNET ACCESS.
B. IT COULD LEAD TO A DECREASE IN THE USE OF INTERNET
CAFES.
C. IT MIGHT IMPROVE RESEARCH CAPABILITIES WITH INCREASED
ACCESS TO INFORMATION.
D. IT COULD REDUCE THE DIGITAL DIVIDE AMONG STUDENTS
FORMATIVE
ASSESSMENT
8. THE CHILD ONLINE SAFETY ACT AIMS TO PROTECT
CHILDREN FROM HARMFUL ONLINE CONTENT. WHICH
OF THE FOLLOWING
STRATEGIES IS NOT TYPICALLY INCLUDED IN SUCH
LEGISLATION?
A. IMPLEMENTING AGE VERIFICATION SYSTEMS
B. MANDATING ‘SAFE SEARCH’ FILTERS ON SCHOOL
COMPUTERS
C. BANNING THE USE OF SMARTPHONES BY MINORS
D. EDUCATING CHILDREN ABOUT RESPONSIBLE ONLINE
FORMATIVE
ASSESSMENT
9. THE E-GOVERNMENT ACT (REPUBLIC ACT NO.
10844) PROMOTES THE USE OF ICT IN GOVERNMENT
SERVICES. WHICH
OF THE FOLLOWING IS A LIKELY BENEFIT FOR
CITIZENS?
A. REDUCTION IN THE NEED FOR PHYSICAL GOVERNMENT
OFFICES
B. INCREASED TAXES TO FUND THE ICT INITIATIVES
C. MANDATORY ICT TRAINING FOR ALL CITIZENS
D. DECREASED TRANSPARENCY IN GOVERNMENT
FORMATIVE
ASSESSMENT
10. THE ACCESS TO INFORMATION AND
COMMUNICATIONS TECHNOLOGY ACT AIMS TO BRIDGE
THE DIGITAL DIVIDE. WHICH
OF THE FOLLOWING ACTIONS WOULD BEST SUPPORT
THIS GOAL?
A. PROHIBITING THE USE OF SOCIAL MEDIA IN SCHOOLS
B. PROVIDING TAX INCENTIVES FOR ICT INVESTMENTS IN
RURAL AREAS
C. LIMITING INTERNET ACCESS TO GOVERNMENT-APPROVED
SITES
THANK YOU!!!!!