Em Tech#3
Em Tech#3
OF VICTORIA, INC.
ACADEMIC AFFAIRS Poblacion II, Victoria, Oriental Mindoro 5205
SENIOR HIGH SCHOOL DEPT. Telefax No.: (043) 285-5620 / Email.: [email protected]
MODULE
TOPIC: Rules of Netiquette
2
Content Standard: Performance Standard:
The learners demonstrate an understanding of: ICT in The learners should be able to independently
the context of global communication for specific compose an insightful reflection paper on the nature
professional track of ICT in the context of their lives, society, and
Most Essential Learning Competency:
professional tracks
Learning Targets:
1. Consider one’s and others’ safety when sharing information using the Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper
referencing.
BRAIN TEASER
Directions: Write Yes if you agree with the statement and No if you disagree on the blank
before each number.
____ 1. My Computer has an antivirus so it is okay to open most email attachments like e-
cards and video files.
____ 2. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in-game money. She promises to keep
your password a secret. Is it okay to give away your password?
____ 3. Letting people know your birthday is probably a must if you want to get as many gifts
as possible. But having it in your profile makes you vulnerable to identity theft.
____ 4. You forgot that your essay for English class is due tomorrow. While doing your
research, you found a website offering free essays. Is it okay to use the essays from
this free essay website?
____ 5. Your friend told you that his college application was rejected because you posted a
video of him doing crazy stuff at a party. You posted the video several years ago but
later took it down to protect your friend’s reputation. Can your friend be right that the
college found the video?
What’s In
Nice one! You did great today. Have you had a
challenging experience? I am sure that it will be
easier for you this time. Let’s do this test.
1. Most of us use the internet every day. Sometimes, we do not pay attention on how
much information we share online. Below is a questionnaire about how much
information you have shared so far. Put (√) mark under Shared or Not Shared.
If that is the case, try using search engine like Google Then type
your first and last name.
If you have a unique name, chances are, it did. Do not feel bad if
it did not appear thou; in fact, it is probably for your best
interest not to have pictures of yourself in search engine.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like most
things in this world, there is always “another side of the coin.” The Internet is one of the most
dangerous places, especially if you do not know what you are doing.
Most people would dispute that there is no such thing as private over the internet and
they may be right. There are hackers who can find a backdoor even if your profile is
already set to private. You have no control of who whoever is looking at your friend’s
screen whenever they open your profile or chat with you. You have no control over
people getting access to your friend’s account and seeing your private stuff.
CHALLENGE QUESTIONS
How did you know you know that your computers/systems had
a virus?
Internet Threats
Malware
a. Virus – a malicious program designed to replicate itself and transfer from one computer
to another.
b. Worm – a malicious program that transfers from one computer to another by any type
of means.
c. Trojan - a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get you
information.
* Rouge security software
d. Spyware - a program that runs in the background without you knowing it.
* Keyloggers – used to record the keystroke done by the user.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
In the past, doing something embarrassing was not much a big deal. Nowadays,
embarrassing moments are captured using any device you could imagine. This could impact
not only your reputation but also the people around you.
2. Your friends depend on you to protect their reputation online. Talk to your friends about
this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.
Copyright Infringement
1. Understand. Copyright protect literary works, photographs paintings, drawings, films,
music (and lyrics), choreography, and sculptures.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid
defense against copyright.
3. Be creative. Ask yourself whether what you are making is something that came from
you or something made from somebody else’s creativity.
4. Know the law. There are some limitations to copyright
laws. For instance, in the Philippines, copyrights only last a
lifetime (of the author) plus 50 years. There are also
provision for “fair use,” which means that an intellectual
property may be used without a consent as long as it used
in commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching, and
education. If you have doubts that what you are doing does
not fall under the policy of fair use, seek permission first.
Online Research
The information that we need is more likely already on the internet. It is just a matter of how to look for
it and how to use information from the most credible source. Here are some tips in conducting online research:
1. Have a question in mind. Focus on a question you want answered.
2. Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to determine the most
appropriate result for you.
3. Advanced Search. The best way to filter information you get from search engines is by using the
advanced search.
4. Look for a credible source. Some wikis, filled with updated information, are not a credible source. When
using wikis, check out the link of the cited text.
This is due to the fact that anyone can edit its content
Name of the person or organization (the author of the information). Title of the home page in Italics (title
is shown in the bar but is sometimes missing or unrelated). URL. Date last seen.
Examples:
Resources
Lessons: Rex Book Store, Empowerment Technologies innovative training Works, Inc. First Edition
Images: Google images
Fb pages: Empowerment Technologies (EmTech) for Teachers
Attachment
Name: ______________________________ Score: ______________
Grade/ Section: _______________________ Date: ______________
1 Privacy Policy
Directions: Visit a social networking site and look for the site’s privacy policy. The link is typically found
at the bottom of the page and sometimes labelled only “Privacy”. Write a summary on how the website
handles both your private and public information.
Summary:
Summary:
Summary:
Attachment
Name: ______________________________ Score: ______________
Grade/ Section: _______________________ Date: ______________
2
Directions: Answer the following questions.
1. Do you agree with the provisions of the copyright law? Defend you answer.
2. How would you feel if someone posted something embarrassing about you?
What would you do?