Lesson 2 Module
Lesson 2 Module
2|E-Tech
CONTENT STANDARD:
1. The learners demonstrate an understanding of: ICT in the context of global
communication for specific professional track
PERFORMANCE STANDARD:
1. The learners shall be able to: independently compose an insightful reflection paper on
the nature of ICT in the context of their lives, society, and professional tracks (Arts, Tech Voc, Sports,
Academic)
2. apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks
3. use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational
3|E-Tech
The internet is the guiding technology of the Information Technology Age just as the electrical engine
was of the Industrial Age. In these times, more and more people are already engaged in the use of
technology. These people who are raised in a digital, media-saturated world are called digital natives.
No doubt, the Internet has been very useful to us but with the rise of instant messaging, chat rooms,
emails and social networking sites, it can also bring trouble - from cyber bullying to more serious
Internet dangers, including exposure to sexual predators. Thus, internet safety is always our primary
concern.
WHAT I KNOW
I bet you are ready to know if you have practiced online safety, aren’t you? But before that, take time
to answer the pre-test to gauge how much you know about the lesson.
Direction: Read each item carefully and choose the letter of the correct answer. Write your
answers on a separate sheet of paper or on your notebook.
1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
4|E-Tech
3. It is OK to forward or post an email message that you received if __________
A. the message is typed in all capitals.
B. the author of the message has given you permission to forward or post it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as confidential.
6. What type of online threat happens when an attacker uses electronic devices to do unwanted
surveillance against its victim?
A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking
7. What type of online threat happens when the attacker impersonates another individual or
organization to gather personal or business information?
A. Cyberstalking B. Spoofing C. Scamming D. Pharming
8. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
10. You get an email telling you that you won a hundred thousand without joining in a competition.
You should ____________.
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge
5|E-Tech
ACTIVITY 2.1: Shared or Not Shared? That is the Question
DIRECTIONS: Read and reflect each item carefully. Copy the table below on your notebook and
check the space whether you have shared or not shared these pieces of information in all your social
media accounts.
3. Based from your answers above, do you think you are safe when using the Internet? Why?
____________________________________________________________________________
____________________________________________________________________________
__________________________________
6|E-Tech
WHAT I NEED TO KNOW
Online safety refers to the practices and precautions that should be observed when using the internet
to ensure that the users as well as their computers and personal information are safe from crimes
associated with using the internet. Below are personal information that must be kept confidential.
7|E-Tech
There are numerous delinquencies that can be committed on the internet such as stalking, identity
theft, privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service. To make sure that you are in a secured network, the website
address should begin with “https://’ as opposed to “http://”. Never access your accounts by
following an email link, instead type your URL by yourself.
Regularly review your privacy settings in your online accounts to make sure you are not sharing
important personal information.
When using a public computer terminal, be sure to delete your browsing data before leaving.
Do not download or install software or anything on your computer or cell phone that is unknown
to you.
8|E-Tech
Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:
9|E-Tech
WHAT I CAN DO
ACTIVITY 2.2: Can You Keep It Private?
DIRECTIONS: Choose the most appropriate thing to do in the following situation. Write the letter of the correct
answer in your notebook.
A C
B D
4. Your parents bought you your first cellphone. How will you share your cellphone number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
10 | E - T e c h
There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the
years, many internet predators have been playing on vulnerabilities to attack computers and retrieve
sensitive data from individuals. Half the time, we aren’t even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners. These are usually done by computer hackers
who uses the World Wide Web to facilitate cybercrime. Web threats use multiple types of malware and
fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and
components, such as links in email or Instant Messaging apps, or any malware attachments on
servers that access the Web. They benefit cybercriminals by stealing information for subsequent sale
and help absorb infected PCs into botnets. Web threats pose a broad range of risks, including financial
damages, identity theft, loss of confidential information/data, theft of network resources, damaged
brand/personal reputation, and erosion of consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
Phishing happens when an email is sent from an internet criminal disguised as an email from a
legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or
confidential information.
11 | E - T e c h
Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website
instead of a legitimate one. These “spoofed” sites can capture a victim’s confidential
information, including usernames, passwords, and credit card data, or install malware on their
computer. Pharmers usually focus on websites in the financial sector, including banks, online
payment platforms, or other e-commerce destinations.
Internet Scam generally refers to someone using internet services or software to defraud or
take advantage of victims, typically for financial gain. Cybercriminals may contact potential
victims through personal or work email accounts, social networking sites, dating apps, or other
methods in attempts to obtain financial or other valuable personal information. Online scams
may come in various forms such as lottery scam, charity fraud scams, job offer scams, and
online dating scams to name a few.
12 | E - T e c h
Internet robots are also known as spiders, crawlers, and web bots. It is a software application
that is programmed to do certain tasks. Bots are automated, which means they run according to
their instructions without a human user. Some bots are useful, such as search engine bots that
index content for search or customer service bots that help users. Other bots are "bad" and are
programmed to break into user accounts, scan the web for contact information for sending
spam, or perform other malicious activities. If it's connected to the Internet, a bot will have an
associated IP address.
Malware or malicious software, is any program or file that is harmful to a computer user. Here
are the most common offenders in the rogues’ gallery of malware:
Adware (advertising supported software) is unwanted software designed to throw
advertisements up on your screen. Example, pop-up ads and banner ads.
Spyware is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author. Example is a keylogger.
Virus and Worms are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and
infecting them with its own bits of code.
Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Once it’s on your system, the
attackers behind the Trojan gain unauthorized access to the affected computer. From
there, Trojans can be used to steal financial information or install threats like viruses and
ransomware.
Ransomware is a form of malware that locks you out of your device and/or encrypts
your files, then forces you to pay a ransom to get them back.
Spams are unsolicited emails, instant messages coming from recipients that are not granted
verifiable permission for the message to be sent. Spam messages can be damaging if you open
or respond to it.
Cyberstalking refers to the use of the internet or other electronic device to harass or stalk
individuals or organizations.
13 | E - T e c h
Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using
the internet.
Spoofing happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.
14 | E - T e c h
WHAT I HAVE LEARNED
ACTIVITY 2.3: Show Me How You Hashtag
Direction: Look at the following images and create a hashtag based on the type of online threat
represented by each image. Write your answers in your activity notebook.
Image source: https://www.avg.com/en/signal/what-is-spyware Image source: https://itigic.com/tag/adware/
1. #_______________________
2. # _____________________
3. # ________________________ 4. # _____________________
telco-player-to-benefit-consumers-says-globe-telecom/
5. # ___________________________
15 | E - T e c h
Reflect on this and write your answers in your notebook.
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write your
answers on a separate sheet of paper or in your notebook.
1. What type of malicious program is designed to replicate itself and transfer from one computer to
another either through the internet or local networks or data storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
16 | E - T e c h
5. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look like
an email from someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick
users into entering their login information.
C. Sending someone a text message looks like a notification that the person has won a
contest.
D. Sending someone an email that records their keystroke activities while using their
computers.
6. Which of the following must NOT be done if you received an embarrassing picture from your
friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
17 | E - T e c h