Nothing Special   »   [go: up one dir, main page]

Empowerment Technology Module 1 Week 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 44

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region I
SCHOOLS DIVISION OFFICE I PANGASINAN
BOLINAO SCHOOL OF FISHERIES
Arnedo, Bolinao, Pangasinan
Email: bolinaobsof@gmail.com/bolinaobsof@yahoo.com
www.bolinaosof.com

EMPOWERMENT
TECHNOLOGY

Quarter 1 Information and Communication Technology


Module 1
QUARTER Lesson 1 Week 1

1 Information and Communications Technology?

WHAT YOU ARE EXPECTED TO LEARN FROM THIS MODULE


This module is designed to introduce you to the current state of ICT
technologies and the online systems, function and platforms

After going through this module, you are expected to:


1. Compare and contrast the nuances of varied online platforms,
sites, and content to best achieve specific class objectives or
address situational challenges.
2. Apply online safety security, ethics and etiquette standards and
practice in the use of ICTs as it would relate to your specific
professional tracks.

What is Information and Communications Technology?

Look at the following icon, how many of the items or icons in the image are you
familiar with?
Which ones are you unfamiliar with?
What do these mean to you?
So do you think you are ready for the Networked World? Or better yet, is your
community ready for the Networked World?

Whatever your answer, take a closer look at the Trivia/Glossary of Terms.


The list contains some key phrases that characterize the ICT tools that, when used
properly, can empower users to make positive social change.

TRIVIA/GLOSSARY OF TERMS
1
1. Assistive Media - a component under Assistive technology (AT), which is a
generic term used to refer to a group of software or hardware devices by
which people with disabilities can access computers. Assistive Media is also
a name of a company: “the Internet's first audio solution for persons with
print reading/access barriers. The audio recordings of the literary works
produced by Assistive Media are now easily accessible, on-demand, to the
ever-growing number of persons with disabilities who now use the Internet .”
( Deped LR Portal. 2017. LR Portal. [online] Available at:
<https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].
2. Collaborative platforms - “is a category of business software that adds broad
social networking capabilities to work processes.” .” ( Deped LR Portal. 2017. LR
Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July
2020].
3. Convergent Technologies - an extension of the term convergence, which
means a “coming together of two or more disparate disciplines or
technologies. For example, the so-called fax revolution was produced by a
convergence of telecommunications technology, optical scanning
technology, and printing technology.” Convergent Technologies also refers
to an American computer company formed by a small group of people who
left Intel Corporation and Xerox PARC in 1979. .” ( Deped LR Portal. 2017. LR
Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July
2020].
4. Information and Communications Technology (ICT ) - ICT is an umbrella
term that includes any communication device or application, encompassing:
radio, television, cellular phones, computer and network hardware and
software, satellite systems and so on, as well as the various services and
applications associated with them, such as videoconferencing and distance
learning. ICTs are often spoken of in a particular context, such as ICTs in
education, health care, or libraries. The term is somewhat more common
outside of the United States. It may also be defined as, Information and
Communication Technologies (ICT or ICTs) are digital forms of
communication including tools available on the Internet, such as blogging
and email, as well as computer software, such as Microsoft PowerPoint and
Word. .” ( Deped LR Portal. 2017. LR Portal. [online] Available at:
<https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].\
5. Mobile Media - This refers to “media devices such as mobile phones and
PDA’s were the primary source of portable media from which we could
obtain information and communicate with one another. More recently, the
smartphone (which has combined many features of the cell phone with the
PDA) has rendered the PDA next to obsolete.5 The growth of new mobile
media as a true force in society was marked by smartphone sales outpacing
2
personal computer sales in 2011.” ( Deped LR Portal. 2017. LR Portal. [online]
Available at: <https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].
6. Online systems - are online versions of information systems, which is “the
process of and tools for storing, managing, using, and gathering of data and
communications in an organization. An example of information systems are
tools for sending out communications and storing files in a business.” ( Deped
LR Portal. 2017. LR Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691>
[Accessed 31 July 2020].
7. Social Media - “are computer-mediated tools that allow people or companies
to create, share, or exchange information, career interests, ideas, and
pictures/videos in virtual communities and networks.” .” ( Deped LR Portal. 2017.
LR Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July
2020]
8. .Web 2.0 - “describes World Wide Web sites that emphasize user generated
content, usability, and interoperability. The term was popularized by Tim
O'Reilly and Dale Dougherty at the O'Reilly Media Web 2.0 Conference in
late 2004, though it was coined by Darcy DiNucci in 1999 .” ( Deped LR Portal.
2017. LR Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691> [Accessed 31
July 2020].
9. Web 3.0 - “a phrase coined by John Markoff of the New York Times in 2006,
refers to a supposed third generation of Internet-based services that
collectively comprise what might be called ‘the intelligent Web’— such as
those using semantic web, microformats, natural language search, data-
mining, machine learning, recommendation agents, and artificial intelligence
technologies—which emphasize machine facilitated understanding of
information in order to provide a more productive and intuitive user
experience.” (Deped LR Portal. 2017. LR Portal. [online] Available at:
<https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].

Search anything about Information and Communications Technology (ICT)


or digital tools that interest you. Find out the latest about them or something similar
to them that you have used so far.

CHALLENGE QUESTION:
A survey called “Networked World Readiness” an educational resource that describes
the determinants of a community’s Readiness for the Networked World, and a diagnostic
tool that systematically examines those factors to assess a community’s Readiness. It
contains 5 categories, namely: Access, Learning, Society, Economy, and
Policy.
Among these category which is most important to you?

3
As you continue your work using this module, you may realize that digital
tools, such as those appearing in the following image would give you an idea of
the range of possibilities to discover, disclose, connect, and co-create, in a
Networked World.

ACTIVITY 1

Readiness is the degree to which a community is prepared to participate in


the Networked World. It is gauged by assessing a community’s advancement in
the areas that are most critical to the adoption of information and communication
technologies. An assessment of a community’s Readiness can be used to help the
community identify its strategic priorities.
The assessment section of the Guide asks participants to place their
community on a scale from one to four (lowest to highest) in nineteen categories,
grouped in five sections.
Explore the content of the Networked World Readiness assessment.
Answer the assessment by writing 1-4 in the last column base on the given stages.
(Cyber.harvard.edu. 2020. Getting Started. [online] Available at:
<https://cyber.harvard.edu/readinessguide/forward.html> [Accessed 27 July 2020].)

Network Access
Stage *Fewer than half of all domestic telephone calls are
1.Network 1 successful.
Speed & *For voice telephony, sound quality is often not acceptable
Quality for regular conversation.
*More than 100 faults are reported per year for each 100
telephone mainlines.
*No services beyond limited electronic mail capabilities are
Scale: supported by the *local telecommunications infrastructure.
________ *Large businesses which want access must link their
networks directly to infrastructure backbone outside their
community.
Stage *50-70% of domestic telephone calls are successful.
2 *Dropped connections are frequent and extremely disruptive.
4
*For voice telephony, sound quality is acceptable for regular
conversation.
*Between 50 and 100 faults are reported per year for each
100 mainlines.
*The telecommunications infrastructure in most areas of the
community supports dial-up modem transfer speeds of 9.6
Kbps or less. Some areas may support speeds of 14.4Kbps.
*Large businesses and ISPs can link their networks to a
local infrastructure backbone, but backbone capacity is
frequently inadequate to support user demands.
*Packet loss is significant and regularly disruptive for any
online activities.
Stage *70-90% of domestic telephone calls are successful.
3 *Connections are dropped with noticeable frequency and are
somewhat disruptive.
*Fewer than 50 faults are reported per year for each 100
mainlines.
*Users have access to dial-up modem transfer speeds of up
to 28.8 Kbps.
*Leased lines with transfer speeds of up to 64 Kbps are
widely available for businesses and ISPs. Limited higher-
speed lines are available in some areas.
*Backbone facilities serving the community are usually
sufficient, although regular peak demand periods result in
slower network response times.
*Packet loss by the network may occur but is not generally
disruptive.
Stage *Dropped connections are fairly infrequent and not a major
4 disruption.
*Over 90% of domestic telephone calls placed are
successful.
*Fewer than 10 faults are reported per year for each 100
mainlines.
*There is widespread access to dial-up modem transfer
speeds up to 56 Kbps, with some access to high speed
solutions such as DSL, cable modems and wireless
solutions.
*High speed services of 1.5 Mbps are common, with higher
speeds available in some areas.
*Adequate backbone capacity exists to support community

5
needs without significant transmission delays except during
infrequent periods of high demand.
*Packet loss by the network is below 10%.
2.Service Stage *Telephone mainlines take at least four years to be installed
and 1 from the time their orders are placed.
Support *It takes over six months for reported mainline problems to
be resolved, if ever.
*Very few or no software developers, programmers or
computer technicians are present in the community.
Stage *Mainlines take at least six months for installation.
Scale: 2 * It takes over one month for reported mainline problems to
______ be resolved. Providers pay no explicit attention to customer
service.
*A small community of software developers, web designers,
network administrators and other technical personnel exists.
Stage *Mainlines take at least one month to be installed.
3 * It takes over one week for reported mainline problems to
be resolved. There is a growing customer service ethic
among service and support providers, although it is not a
priority for most. Some ICT maintenance and technical
support services are available.
* A nascent software industry is present in the community,
and there is a growing number of hardware technicians, web
designers and network administrators.
Stage *Mainline installation is usually completed within a few days.
4 * Service providers can be contacted in a number of ways
(e-mail, telephone, mail). Reported problems are usually
resolved within 48 hours. Online help is available and may
allow for immediate resolution. Customer service is
considered a source of competitive advantage for the
service provider. ICT maintenance and technical support are
widely available.
*A competitive and sophisticated web design market exists,
incorporating the latest development technology.
3.Internet Stage *There are no Internet Service Providers (ISPs) offering local
Availability 1 dial-up access.
*There is no public Internet access.
*Businesses are unable to lease dedicated lines from the
Scale: local telephone operator, or there is a multi-year wait to do
______ so
6
Stage *A limited number of Internet Service Providers offers local
2 dial-up access. There are more than 1,000,000 inhabitants
per local ISP. Some providers offer only e-mail services.
*There are limited opportunities for public Internet access.
*Users often have difficulty establishing a dial-up connection
to a local ISP.
*There is no competition in commercial leased line provision.
Businesses may only lease lines from a single telephone
operator
Stage *There are between 500,000 and 1,000,000 inhabitants per
3 local ISP. ISPs provide full Internet access.
*Subscribers may have some options between various
Internet service packages.
*There are some opportunities for public Internet access.
*It is normally possible for users to establish a dial-up
connection to a local ISP, except during peak hours.
*One or two private providers leased lines to businesses.
There are between 500,000 and 1,000,000 inhabitants per
local ISP. ISPs provide full Internet access.
*Subscribers may have some options between various
Internet service packages.
*There are some opportunities for public Internet access.
*It is normally possible for users to establish a dial-up
connection to a local ISP, except during peak hours.
*One or two private providers leased lines to businesses
Stage *There are more than two local ISPs per 1,000,000
4 inhabitants.
*Higher bandwidth solutions such as DSL (digital subscriber
line) and cable modem access are available. Most
customers can tailor services to meet different demands for
speed, service, security, quality and cost.
*ISPs provide web hosting services to their subscribers.
*There are adequate opportunities for public Internet access
for those without access at home, school or work.
*Users are able to establish a dial-up connection to a local
ISP on a reliable basis.
*Multiple private providers leased lines to businesses.
Wireless solutions may be available in addition to fixed line
solutions.
4.Informati Scale *There are no distribution/sales points for ICT

7
on 1 hardware/software within the community.
Structure *ICT hardware and software are too expensive for all but
large businesses and a small minority of citizens and small
and medium-sized businesses.
Scale: Scale *Some off-the-shelf hardware and software solutions are
______ 2 available locally, but there are none or very few in the native
language of the community.
*Basic hardware and software are affordable for some
citizens and small and medium-sized businesses.
Scale *Most ICT products are sourced from abroad, but there is a
3 strong and growing localization industry to adapt products to
local needs.
*Some software appropriate to local needs and languages is
available.
*A variety of hardware and software solutions are available
and affordable to most small and medium-sized businesses,
as well as many individuals.
Scale *A vibrant marketplace exists for software and hardware with
4 a competitive retail and wholesale market for these products.
*Hardware and software appropriate to local needs and
languages are widely available and affordable
5.Informati Scale *Access to telecommunications infrastructure is very poor.
on 1 (Roughly: There are very few shared facilities for
Structure telecommunications access. Telephone penetration is very
low, with a teledensity of less than 2 mainlines per 100
people. Mobile wireless penetration is below 0.5% of the
population. No cable services are available.)
Scale *A small minority in the community has good access to the
Scale: 2 telecommunications network, but most of community does
______ not.
(Roughly: Teledensity is between 2 and 8 mainlines per 100
people. Mobile wireless penetration is between 0.5% and
3%. Cable penetration is below 5% of all households in the
community.)
Scale *A sizeable portion of the community has good access to
3 telephone services. Growth in mobile wireless telephony is
accelerating.
(Roughly: Teledensity is between 8 and 40 mainlines per
100 people. Mobile wireless penetration is between 3% and
14%. Between 5 and 10% of households in the community
8
subscribe to cable services.)
Scale *There is widespread access to telecommunications and
4 network services.
(Roughly: There is high teledensity of 40 mainlines or more
per 100 people. Penetration of mobile wireless telephony is
high and growing, with at least 14% of the community
subscribing. Cable penetration is high, at 10% of households
or higher.)
6.Internet Scale *Most users are charged long distance or international rates
Affordabilit 1 for dial-up access.
y *ISP rates are so high that few individuals can afford Internet
access
Scale *Rates for local telephone calls are high enough to
2 discourage extensive Internet use via local ISPs, even
among most who can afford Internet access.
*Local access solutions exist, but rates for ISP services are
Scale: high enough to discourage extensive Internet use.
______ *The lack of competition in the provision of commercial
leased lines is reflected in prohibitively or very high leasing
fees.
Scale *Telephone charges for Internet access reflect emerging
3 competition in the telecoms market, yet they are high
enough to discourage extensive use by some users.
*Internet access is priced within reach of the majority of
citizens.
*Competition in leased line provision for businesses has
been introduced, and prices are falling but are still high.
Scale *Prices for telephone usage are set competitively and are
4 affordable for nearly all citizens.
*Flat rate pricing may be in effect for local telephone calls.
*Prices for Internet access are set competitively and are
affordable for nearly all citizens. Flat rate pricing may be
available. Free ISP services may be available, particularly in
communities with time-metered pricing of local phone calls.
*Higher bandwidth solutions such as DSL services and cable
modem access are priced competitively, which may include
tiered pricing based on speed of access or usage-based
pricing based on total volume. "Always-on" connections are
available without time-metered pricing.
*Pricing for leased business lines is set in a competitive
9
environment featuring multiple vendors.
B. Networked Learning
1.School’s Scale There are no computers in schools
Access to 1
ICTs Scale *Where there are ICTs in schools, it is primarily at the
2 university level, and there are generally fewer than five
computers in a school or faculty.
Scale: *Access to the computer(s) is limited to computer teachers
______ and/or administrators.
*Computers tend to be older generation models, such as
stand-alone 486 PCs or the equivalent.
*Where there are multiple computers installed, they are not
networked.
*Use of the computer(s) is limited to electronic documents
that are available on the hard drive or diskettes.
*There may be connectivity for store-and-forward e-mail.
Scale *Computers can be found at the university level as well as in
3 primary and secondary schools.
*Up to 10 to 15 computers can be found in laboratories for
classroom group work, with about four students per
computer.
*Computer labs are generally only open for computer studies
during the day and closed after school, or may be open to
teachers for class preparation but closed to students.
*Computers tend to be older generation models, such as
486 PCs or higher, and they may be networked with a file
and mail server.
*There may be an internal Local Area Network (LAN) in
place. If there are multiple computer labs, they may be
connected through the school network.
*Where there are stand-alone PCs, they may have a limited
CD-ROM library.
*The networked lab achieves connectivity through a dial-up
connection to the Internet, which supports limited World
Wide Web access.
Scale *Most schools at all educational levels have access to
4 computers.
*There may be a number of computer labs in each school,
and computers may be found in the classroom. In some
cases, students and teachers may have individual laptop
10
computers.
*Computer labs are open to students and reserved for
subject matter classes to use, and are open after school
hours. The lab may be open to the community and other
schools after school and on weekends.
*There may be an internal Web server on the school network
- computers as well as other devices are connected to the
network.
*Classrooms may be wired and connected to the school's
Wide Area Network (WAN). Clusters of schools may be
connected to a regional WAN to share electronic resources.
A national school network may be in place.
*Connectivity may be obtained through a leased line or
wireless connection with at least 64 to 128 Kbps of
dedicated access.
2.Enhanci Scale *Computers are not used by any teachers or students
ng 1
Education Scale *Only a few teachers use computers in a very limited
with ICTs 2 fashion. Teachers' basic computer literacy involves skills
such as use of the keyboard and mouse, a basic
understanding of the computer's operating system,
manipulation of files, and cutting and pasting.
*Computers are mainly used at the university level
Scale *Teachers and students use computers to support traditional
Scale: 3 work and study.
______ *Teachers who use computers are generally proficient with
word processing applications and may access information
offline from CD-ROMs. They may employ computers in
some basic drill-and-practice lessons.
*In some cases, teachers access and organize information
from the World Wide Web in their work, share information
using e-mail, and create information in electronic format to
share with others both inside and outside the school.
Scale *Information and communication technologies are fully
4 integrated into the curricula, are used in the classroom and
are essential to the learning process. The curricula may
feature collaborative, project-based learning activities that
enable students to use the Internet and advanced software
skills to work with other students and teachers in their
school, outside their community and internationally.

11
*Teachers are well-trained in methods for incorporating
computers and ICTs into their instruction and curricula
3.Develoin Scale *Training opportunities for programming, maintenance,
g the ICT 1 support, Web design and other ICT professions are virtually
Workplace non-existent
Scale *There are limited opportunities for training in ICT skills
2 development
Scale *Technical classes and programs on ICT-related subjects
Scale: 3 are available from a variety of public and private centers.
______ *Some limited online access to training is available.
*Some employers offer training in the use of information and
communication technologies to their employees.
Scale *There are many technical schools with specialized curricula
4 in information and communication technologies and
computer science.
*There are a variety of training opportunities relating to
information and communication technologies available
through vendor certification programs, employers,
educational institutions, private training centers and distance
learning courses.
*Online resources and courses are widely available for the
development of technical skills.
C. Networked Society
1.People Scale *Most of the population has never heard of the Internet.
and 1 *Less than 0.05% of the population has used the Internet at
Organizati any time during the past three months.
ons Online *No business entity in the community has a registered
Internet domain name
Scale *Much of the population has never heard of the Internet, and
2 most people do not know anyone who has ever used it.
*Less than 0.5% of the population has used the Internet
recently, and few are regular users.
*Some local businesses and institutions have registered
domain names. There are fewer than two of these domains
Scale: per 1000 inhabitants.
______ *There is no advertising in traditional media for online
companies or resources.
Scale *Most of the population has heard of the Internet, although
3 few have used it.
*Less than 10% of the population uses the Internet regularly.
12
*The overwhelming majority of Internet users are males
between the ages of 10 and 35.
*The number of registered domains locally is at least 2 per
1000 people.
*Advertising in traditional media for online companies or
resources is infrequent.
Scale *Most of the population is interested in using the Internet and
4 knows others who do.
*At least 10% of the population accesses the Internet with
some regularity.
*Males between the ages of 10 and 35 no longer represent
the overwhelming majority of Internet users.
*The number of registered local domains is at least 20 per
1,000 population.
*Advertising in traditional media for online companies or
resources is fairly common.
2.Locally Scale *No websites exist providing information on local topics.
Relevant 1 *Few or no websites are available in local languages or a
Content dominant Web language spoken locally. No websites exist
providing information on local topics.
Scale: *Few or no websites are available in local languages or a
______ dominant Web language spoken locally.
Scale *Few websites covering local topics exist, and most of them
2 are created and hosted outside the community.
*Some websites are available in local languages or a
dominant Web language spoken locally.
*There is little use of online bulletin-board systems, Usenet
groups, newsletters, and/or listservs. Few websites covering
local topics exist, and most of them are created and hosted
outside the community.
*Some websites are available in local languages or a
dominant Web language spoken locally.
*There is little use of online bulletin-board systems, Usenet
groups, newsletters, and/or listservs.
Scale *Some local websites are available, though most carry static
3 content and are updated infrequently. Websites carry
diverse types of information relevant to different groups
within the community.
*Many websites are available in local languages or a
dominant Web language spoken locally.

13
*There is some use of online bulletin-board systems, Usenet
groups, newsletters, and/or listservs.
*There are opportunities for Web-related training, although
they may be expensive and accessible only in certain areas.
Scale *Many websites provide dynamic information on local topics
4 and are updated at least several times per week.
*Local content is generated by citizens at all levels of
society, including websites and online bulletin-board
systems, Usenet groups, newsletters, and/or listservs.
*A significant amount of information is available through
websites in local languages or a dominant Web language
spoken locally.
*Many affordable opportunities exist for Web-related training.
3.ICTs in Scale *Members of the community do not normally employ
Everyday 1 information and communication technologies in their daily
life lives. Most social communication is paper based and/or oral.
Scale *Information and communication technologies (telephones,
Scale: 2 fax machines, pagers, computers) are used to a limited
______ degree by some members of the community.
*Public telephones are available in some parts of the
community and are used regularly by many community
members.
*Personal computers with e-mail capability are made publicly
available by some businesses, but most users are from
outside the community (e.g. tourists and visiting
businesspeople).
Scale *Public telephones may be found in most parts of the
3 community and are heavily used.
*Some members of the community have Internet access at
home.
*Growing numbers of community members use telecenters,
cybercafes and other businesses that offer computer use
and online services to the public for a fee.
Scale *Many members of the community use information and
4 communication technologies (wireless phones, digital
assistants, pagers, personal computers) to assist in their
personal lives.
*Many members of the community use information and
communication technologies for household commerce
(online shopping, banking, investing) and for a variety of
14
social and commercial interactions with other people
(including bartering, consumer-to-consumer trade, online
chat).
*Citizens without access through home, school or work use
a variety of public and private Internet access options,
including online cafes and community centers.
4. ICTs in Scale *Employees have limited access to telephones.
the 1 *A small minority of business and government offices have
Workplace at most a few computers, none of which are networked.
*Most business communication takes place in person or by
Scale: mail. A small number of businesses use telephone and fax.
______ Scale *Organizations achieve sporadic efficiency gains through
2 limited deployment of ICT systems in their internal workings.
*Some employees have access to telephones.
*Few offices have computers that are networked for internal
file sharing and basic enterprise applications.
*In offices where there are computers, only some employees
use them for their work, though not for electronic
communications.
Scale *Organizations achieve some efficiency gains through some
3 degree of deployment of ICT systems in their internal
workings.
*Many computers in business offices are internally
networked for data processing, management reporting, and
other enterprise applications.
*Some employees conduct research and business
transactions over the Web, though most often they use a
shared workstation to do so. Some employees use e-mail for
internal communications.
Scale *Organizations achieve major efficiency gains through
4 widespread deployment of ICT systems in their internal
processes.
*Computers in offices are fully networked. Different office
locations are connected to each other through external
networks. These networks may extend nationally or
internationally.
*Most employees have Internet access from their own
workstations.
*Most employees have their own e-mail accounts for internal
and external communications.

15
*Workers commonly list their e-mail and website addresses
on their business cards.
D. Networked Economy
1.Employ Scale *Few, if any, local businesses hire workers on the basis of
ment 1 their technical background.
Opportuniti Scale *Although there are some employment opportunities that
es 2 call for technical skills, most workers with ICT experience
either must leave the community to find employment or are
unable to find work in their field
Scale *Technical skills in the community are becoming a source of
3 competitive advantage and are beginning to attract
investment and employment opportunities by companies
Scale: from outside the community.
______ Scale *A significant number of employees in the community require
4 technical skills to perform their jobs.
*A sizeable portion of the community's economy is based on
the management of and trade in information, employing a
large number of "knowledge workers."
*Information and communication technologies are
considered central to the strategies of many organizations.
2.Business Scale *No businesses in the community operate websites.
-to- 1 *There is little awareness of online business, and all
Consumer dealings between businesses and consumers consist of oral
and/or paper-based transactions.
Scale *Some local businesses operate websites. The basic
2 information they provide is static and infrequently updated.
*Some businesses accept orders placed by telephone or fax.
Scale: *Some businesses distribute hard-copy catalogs for remote
______ browsing of goods and services.
Scale *Many businesses post key information on websites.
3 Information is often not kept current and relevant.
*Websites provide information on goods and services for
sale. Purchases take place primarily in person, by fax or by
telephone, though electronic mail may expedite the process.
Some businesses may have introduced online ordering.
Scale *Many businesses in the community have incorporated the
4 World Wide Web into their sales, marketing, and customer
service systems.
*The total volume of online retail is a noticeable component
of the community's commercial activity, as may be
16
evidenced by advertisements for commercial websites in
traditional media and other indicators.
3.Business Scale *Businesses have few sources of market information. The
-to- 1 efficiency of most B2B interactions is hampered by this lack
Business of transparency, as are prospects for new business
opportunities.
*B2B transactions are carried out in person or remotely
through paper-based transactions.
Scale: Scale *B2B interactions remain inefficient with little transparency.
______ 2 *Faxes and telephones are commonly used to facilitate
orders or for remote client support, although some paper-
based transaction (e.g. signature) is required.
Scale *The deployment of electronic systems has increased
3 efficiency and transparency and lowered transaction costs in
B2B interactions.
*Some B2B transactions are supported by electronic
systems (e.g. proprietary systems and databases), but some
paper-based transaction (e.g. signature) is usually required
at some point.
*Electronic B2B transactions are a small percentage of
overall B2B commerce.
Scale *Many efficiencies in B2B transactions are apparent as a
4 result of the deployment of electronic systems. These
efficiencies have changed market structures and redefined
industry practices.
*Many businesses have incorporated the Web into sales,
procurement and inventory management. Some transactions
occur online over automated, fully-integrated systems.
*Order processing and delivery may be executed
electronically and monitored through online tracking
systems.
*Overall levels of electronic B2B transactions are a
noticeable and growing percentage of total B2B transactions
within the community.
4.E- Scale *No government resources are online.
Governme 1 *There is no awareness of online government, and all
nt dealings between government and citizens or businesses
are in person or paper-based. There is limited information
available by phone
Scale *A few governmental websites exist, providing basic
17
Scale: 2 information, often directed at parties outside of the
______ community. This information i static and infrequently
updated.
*Some limited interaction with the government is possible by
telephone or fax.
*The government distributes some information about
services, procedures, rights and responsibilities in hard
copy.
Scale *Some governmental agencies post key information on
3 websites, including directories of services, hours of
operation, and downloadable forms. Information is often not
kept current and relevant. Transactions take place primarily
in person, by fax or by telephone, though electronic mail
may expedite the process.
*The government manages relationships with some
contractors and suppliers online or with other electronic
mediation.
Scale *All governmental agencies post key information on websites
4 and some have incorporated the Web into their strategy for
interaction with the public.
*Interactive government websites allow the public to conduct
transactions (e.g. apply for permits, pay taxes) online.
*Much government procurement and many interactions with
suppliers take place online or with other electronic
mediation.
E. Network Policy
1.Telecom Scale *There are no plans for the liberalization of the community's
munucatio 1 telecommunications sector.
n *There are no regulatory provisions which promote universal
Regulation access to telecommunications services.
*All services are provided by a single operator, whether
private or state-owned.
*Voice and data service offerings are limited.
Scale *Plans for the liberalization of telecommunications services
Scale: 2 are in place or are being formulated.
______ *Provisions for universal access to services have been
established, though they are ineffective.
Scale *Plans for the liberalization of the telecommunications sector
3 are in place and are being implemented.
*Progress is being made in achieving universal access, but
18
there are many hurdles in implementation.
*Services such as data, paging and mobile telephony are
available from competing private providers.
*Alternative carriers compete for private network services,
leased lines and other telecommunications services for
businesses.
*Incumbent provider networks are being opened to
competition through interconnection and/or unbundling
obligations.
Scale *The telecommunications sector has been liberalized, with a
4 regulatory regime in place to promote open competition.
*Regulation is effective in promoting universal access.
*An independent regulatory body sets and enforces
telecommunications regulations.
*Citizens and businesses have a number of options for their
telecommunications and data services.
*Incumbent networks have been opened to competitors, and
new competing carriers are taking advantage of these
arrangements to offer services.
*There is vibrant competition among mobile wireless
providers. Spectrum has been allocated consistently with
international standards, and licensing arrangements
encourage new market entrants.
*The provision of value-added services such as broadband
Internet is recognized as a source of competitive advantage.
2.ICT Scale *Trade in equipment for information and communication
Trade 1 technologies is impeded by high tariffs and other restrictions,
Policy including cumbersome technical standards or licensing
requirements.
*Service sectors are not open to trade, creating a barrier for
electronic commerce and the building and operation of ICT
Scale: networks.
______ *Domestic regulations may create de facto trade barriers for
ICT use.
*There is little or no foreign direct investment.
Scale *Trade barriers for ICT equipment have been reduced, but
2 are still relatively high.
*There has been some opening in service sectors related to
electronic commerce and ICT networks.
*Foreign direct investment is allowed in network sectors

19
under certain conditions.
Scale *Trade in ICT equipment is not restricted through
3 unnecessary standards or licensing requirements, and tariffs
are low and uniform.
*The community has at least temporarily agreed not to apply
disproportionate tariffs on electronically delivered products.
*There has been significant opening in services that facilitate
electronic commerce and building and operations of ICT
networks, but some restrictions remain.
*Foreign direct investment in the ICT sector is encouraged
with some restrictions.
Scale *If tariffs exist on ICT goods, they are low and uniform.
4 *Trade in services is fully liberalized, including services
delivered electronically.
*The community has explicitly affirmed that it will not apply
disproportionate tariffs on electronically delivered products.
*Foreign investment in the ICT sector is encouraged and
subject to few or no restrictions.

20
ACTIVITY 2

Compare and contrast the implications of varied online platforms,


sites and content; to best achieve specific needs, objectives; or to best
address the challenges in the classroom or that of your community.

Online Content Similarities Difference Benefits to


Platfor with other with other me as learner
m platform platform
Facebo  Facebook is a social
ok networking site that
makes it easy for you
to connect and share
with family and
friends online.
Originally designed
for college students,
Facebook was
created in 2004 by
Mark Zuckerberg
while he was
enrolled at Harvard
University. By 2006,
anyone over the age
of 13 with a valid
email address could
join Facebook.
Today, Facebook is
the world's largest
social network, with
more than 1 billion
users worldwide.(
GCFGlobal.org.
2020. Facebook:
What Is Facebook?.
[online] Available at:
<https://edu.gcfgloba
l.org/en/facebook101
/what-is-
21
facebook/1/>
[Accessed 27 July
2020].
Google Originally known as
BackRub. Google is
a search engine that
started development
in 1996 by Sergey
Brin and Larry Page
as a research project
at Stanford
University to find files
on the Internet. Larry
and Sergey later
decided the name of
their search engine
needed to change
and chose Google,
which is inspired
from the term googol.
The company is
headquartered in
Mountain View,
California.
(Cyber.harvard.edu.
2020. Getting
Started.
[online]Available
at:<https://cyber.harv
ard.edu/readinessgui
de/forward.html>
[Accessed 27 July
2020])
Youtub YouTube is a video
e sharing service that
allows users to watch
videos posted by
other users and
upload videos of their
own. The service

22
was started as an
independent website
in 2005 and was
acquired by Google
in 2006. Videos that
have been uploaded
to YouTube may
appear on the
YouTube website
and can also be
posted on other
websites, though the
files are hosted on
the YouTube server
(Techterms.com.
2020. Youtube
Definition. [online]
Available at:
<https://techterms.co
m/definition/youtube
> [Accessed 9
August 2020].

23
Lesson 2 Week 1
Online Safety, Security, Ethics, and Etiquette
WHAT YOU ARE EXPECTED TO LEARN FROM THIS MODULE
At the end of the lesson, you will be able to understand better the 24/7,
social nature of digital media. In particular, you will be able to:

1. Explore your digital life; and


2. Learn that it is important to act responsibly when carrying out
relationships over digital media

Direction: On a piece of Paper answer the questions below.


Encircle the letter of your choice.
1. Which is okay to give out over the Internet?
a. My last name d. My favorite TV show
b. My school name e. My address  
c. My teacher’s name
2. While surfing the Internet, you see a website that makes you feel
uncomfortable. What should you do?  
a. Write down the name and don’t go there again.
b. Tell your friends, so they can avoid it too.
c. Go tell a parent, guardian or teacher.
d. Unplug the computer.
3. If someone online tells you they are in 6th grade and their name is Katie,
they are probably how old?  
a. 12 b. 13 c. 35 d. There’s no way to tell!   
4. If you have been talking on the Internet to a person for a long time, and they
want to meet, which is okay to do?  
a. Meet them, as long as you bring a friend.
b. Meet in a public place.
c. Tell someone where you will be before you go.
d. Ask your parent or guardian first and have them go with you.
5. If someone online sends you a message that is mean or makes you feel
uncomfortable, you should:  
a. Erase them from your friends list.
b. Delete the message.
c. Insult them back
24
d. Tell a responsible adult
6. You are talking to someone online, and they know some of the same people
you know. Since they have many of the same friends as you, is it ok to give
them your phone number if they ask?  
a. Yes b. No
7. It is okay to send someone online your picture when:  
a. They send you theirs first
b. You send them an old picture
c. As long as you don’t send them your address too
d. Only if a parent or guardian is with you and says it is okay

CHALLENGE QUESTION:
How is your digital media life like?
Hint: You have to think figuratively.

Think about your life with media. First consider the questions below. Use
your responses to help you finish the statement, “My media life is like a...” This
statement is a simile, a literary device for comparing two unlike things. For
instance, someone who does not use much media might say that her media life is
like a desert, because there is little life there.
Someone might say that his media life is like a track meet, because he is
exhausted at the end of the day. (Google Docs. 2020. HO-Media Life.Pdf. [online] Available
at: https://docs.google.com/document/d/1uxrujHzMjr9Tk_7oI12MBTiFTOZzH3nsnjkHSj_v-Vg/edit>
[Accessed 9 August 2020].

Finally, make a picture or drawing of the simile you created. The drawing
can include text.
Questions to consider:
 Are digital media a big part of your life?
_______________________________________________
 What kind of impact do digital media have on you (a little, some, a
lot)?
_______________________________________________________
______________________________________
 What are your favorite and least-favorite things to do with digital
media?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_____________________
25
 Do you connect with others or create things with digital media?
_____________________

Finish this statement: My media life is like


_________________________________________
because___________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
___________________________
Illustrate your simile ( illustration of your comparison of yourself with anything)
inside the box.

26
You might be interested to know that digital media can be interchanged with
more popular terms such as social media or social networking sites. At the same
time, you might wonder: “What is social media’s role in your life?”
Now, consider the following
statement. ”Instead of promoting social behavior,
social media promotes
disengagement, self-absorption,
loneliness and sadness.”

Do you agree?
Now think about this:
Social media or media enabled by digital tools are 24/7 and socially
connected as demonstrated by popular ICT.
“Watch the video “Digital Life 101,” (https://www.youtube.com/watch?
v=MkwmD6OQrWQ) to better appreciate the 24/7 and social nature of digital
media—a major change from the media consumption culture of the past.
Check the Glossary of Terms (under this lesson) to get a list of digital media
and related concepts, which you can use to survey how much members of your
household or friends, know about these media that are enabled by digital tools. Do
you know more than most of them do?
TRIVIA/GLOSSARY OF TERMS

Flaming is the act of saying mean things online, usually in ALL CAPS, and often in
a public forum with the intention to humiliate. Flame wars can occur easily online,
as it can be difficult to figure out people’s intentions or emotions online . (Deped LR
Portal. 2017. LR Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691> [Accessed 31
July 2020].

Mash-up is a remix or blend of multiple songs, videos, or other media content into
one product. Fan fiction writing is one form of a mash-up, as writers take
characters from a well-known video game, movie, or book, and rewrite their
actions or relationships. (Deped LR Portal. 2017. LR Portal. [online] Available at:
<https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].

Massively multiplayer online game (MMOG) is usually an online virtual world that
multiple players navigate and play in together. While in this virtual world, their
avatars chat, cooperate, and quest together, oftentimes towards a goal . (Deped LR
27
Portal. 2017. LR Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691> [Accessed 31
July 2020].

P2P, or Peer-to-Peer, network allows for sharing of mp3s, videos, and other digital
files by transferring information directly between two computers rather than by
going through a central server. P2P technology is also behind the popular Internet
phone service Skype. (Deped LR Portal. 2017. LR Portal. [online] Available at:
<https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].

Phishing- acquires sensitive personal information like passwords and credits card
details. is the illegal act of sending emails or messages that appear to come from
authentic sources, but really come from spammers. Phishers often try to get
people to send them their personal information, everything from account numbers
to passwords. (Deped LR Portal. 2017. LR Portal. [online] Available at:
<https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].

Pharming- a more complicated way of phishing where it exploits the DNS system.
(Deped LR Portal. 2017. LR Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691>
[Accessed 31 July 2020].

Podcast is a downloadable video or audio file. Podcasts can be verbal, based on


a certain topic, or can include music, video, and commentary. Most podcasts are
updated regularly through the addition of new episodes. (Deped LR Portal. 2017. LR
Portal. [online] Available at: <https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].

Short Message Service (SMS), or text message, is a short message of fewer than
160 characters sent from a cell phone. A Multimedia Messaging Service (MMS) is
a text message that contains an attached multimedia file, such as a picture or
song. (Deped LR Portal. 2017. LR Portal. [online] Available at:
<https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].

Cyber crime- a crime committed or assisted through the use of the Internet .
( Empowerment Technology. 2020. Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle
its data. .( Empowerment Technology. 2020. Empowerment Technologies LESSONS 1-15. [online]
Available at: <https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-
lessons-1-15/> [Accessed 2 August 2020].)

Malware- stands for malicious software. .( Empowerment Technology. 2020. Empowerment


Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

28
Virus- a malicious program designed to transfer from one computer to another in
any means possible. .( Empowerment Technology. 2020. Empowerment Technologies LESSONS
1-15. [online] Available at: <https://ictcom444251764.wordpress.com/2018/03/31/empowerment-
technologies-lessons-1-15/> [Accessed 2 August 2020].)

Worms– a malicious program designed to replicate itself and transfer from one file
folder to another and also transfer to other computers. .( Empowerment Technology.
2020. Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Trojan-a malicious program designed that is disguised as a useful program but


once downloaded or installed, leaves your PC unprotected and allows hacker to
get your information. .( Empowerment Technology. 2020. Empowerment Technologies LESSONS
1-15. [online] Available at: <https://ictcom444251764.wordpress.com/2018/03/31/empowerment-
technologies-lessons-1-15/> [Accessed 2 August 2020].)

Spyware– a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through key logging. .
( Empowerment Technology. 2020. Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Adware- a program designed to send you advertisement, mostly pop-ups . .


( Empowerment Technology. 2020. Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Spam– unwanted email mostly from bots or advertisers. .( Empowerment Technology.


2020. Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Copyright- a part of law, wherein you have the rights to work, anyone who uses it
w/o your consent is punishable by law . .( Empowerment Technology. 2020. Empowerment
Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Fair Use- means that an intellectual property may be used w/o consent as long as
it is used in commentaries, criticism, parodies, research and etc . .( Empowerment
Technology. 2020. Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

29
Keyloggers- used to record the keystrokes done by user. This is done to steal
passwords or any other sensitive information. .( Empowerment Technology. 2020.
Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Rogue security softwares– is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer, and manipulates
them into paying money for a fake malware removal tool. .( Empowerment Technology.
2020. Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Online Safety, Security, Ethics, and Etiquette

Online/ Internet Safety

This refers to the online security or safety of people and their information
when using internet. It refers to the practices and precautions that should be
observed when using the internet to ensure that the users as well as their
computers personal information are safe from using associated with using the
internet

In using internet, there’s almost no limit to what we can do. We can access
information quickly, communicate around the world and even transact bank and
other important offices. Unfortunately, the Internet is also home to certain risks,
such as phishing, malware and spam. Understanding these risks and learn how to
avoid them will surely make you safe online. .( Empowerment Technology. 2020.
Empowerment Technologies LESSONS 1-15. [online] Available at:
<https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/>
[Accessed 2 August 2020].)

Adopt a safer Mindset

30
Computers can often give us a false sense of security. After all, no one can
physically harm you through a computer screen. But to stay safe online, you’ll
need to be more cautious. Here’s one way to think about it: “Treat the Internet as
you would a shopping mall.
Most people don’t consider a mall to be an especially dangerous place. You
can go shop and meet up with friends. But there are also small things you may do
to stay safe, even if you don’t think about them very often. Example, you probably
wouldn’t leave your car unlocked or give your credit card number to a stranger.
Apply this same mindset whenever you’re online. You shouldn’t be afraid to use
the Internet, but remember that it comes with many of the same risks you’d face in
the real world. .( Empowerment Technology. 2020. Empowerment Technologies LESSONS 1-15.
[online] Available at: <https://ictcom444251764.wordpress.com/2018/03/31/empowerment-
technologies-lessons-1-15/> [Accessed 2 August 2020].)

How to be safe online (Empowerment Technology. 2020. Empowerment Technologies LESSONS


1-15. [online] Available at: <https://ictcom444251764.wordpress.com/2018/03/31/empowerment-
technologies-lessons-1-15/> [Accessed 2 August 2020].)

1. Creating a strong password. To protect yourself and


your information. Never give any personal information
about yourself over internet. Do not leave your
computer or other personal electronics gadgets
unattended while logged in. You’ll need to use
passwords that are long, strong, and difficult for
someone else to guess while still keeping them
relatively easy for you to remember.

Why do I even need a strong password anyway? 


The truth is that even though most websites are secure, there's
always a small chance someone may try to access or steal your information.
This is commonly known as hacking. A strong password is one of the best
ways to defend your accounts and private information from hackers.

Tips for creating strong passwords. A strong password is one that's easy for you
to remember but difficult for others to guess. Some of the most important things
to consider when creating a password.
 Never use personal information such as your name, birthday, user
name, or email address. This type of information is often publicly
available, which makes it easier for someone to guess your
password.

31
 Use a longer password. Your password should be at least six
characters long, although for extra security it should be even longer.
 Don't use the same password for each account. If someone
discovers your password for one account, all of your other accounts
will be vulnerable.
 Try to include numbers, symbols, and both uppercase and lowercase
letters.
 Avoid using words that can be found in the dictionary. For
example, swimming1 would be a weak password.
 Random passwords are the strongest. If you're having trouble
creating one, you can use a password generator instead.

2. Check the web address


Regularly review your privacy settings in your online accounts to
make sure you are not sharing important personal information.  When
using a public computer terminal be sure to delete your browsing data
before leaving
Your computer faces different threats whenever you browse the
Web, including viruses, malware, and spyware. Malicious websites often
use deceptive web addresses to trick users. For example,
www.wellfargo.com looks similar to www.wellsfargo.com, but it's missing the
s in the middle.
Double-checking the domain name is a good way to ensure
you're going to the real, trusted site—not a phony site with a similar web
address. Some web browsers will even try to make the domain name easier
to read. In the example , you can see that wellsfargo.com uses a darker
color in the address bar.

Look at the security symbol


Some websites will display a lock symbol in the address bar. This is
most commonly seen with certain types of websites, like online stores and
banking sites. This means the website is using an HTTPS connection, which

32
makes it safe to enter your personal information. You'll also see https at the
beginning of the URL

You won't see this symbol on all websites, and that's OK—not all
websites need this extra layer of security. However, you should avoid
entering any sensitive information, such as your credit card number, if you
don't see this symbol in the address bar
3. Avoid Spam and Phishing
To protect yourself from email scams, malicious software, and
identity theft, you'll need to understand how to identify and avoid potentially
dangerous content in your inbox, including spam and phishing attempts
Deal with spam using Spam filter
Spam messages can clutter your inbox and make it more difficult to
find the emails you actually want to read. Even worse, spam often includes
phishing scams and malware, which can pose a serious risk to your
computer. Fortunately, most email services now include several features to
help you protect your inbox from spam.
Whenever you receive an email, most email providers will check to
see if it's a real message or spam. Any likely spam messages will be placed
in the spam folder so you don’t accidentally open them when checking your
email. Spam-blocking systems aren’t perfect, though, and there may be
times when legitimate emails end up in your spam folder. Checking your
spam folder regularly to make sure you aren’t missing any important emails.
Phishing scams are messages that try to trick you into providing
sensitive information. These often appear to come from a bank or another
trusted source, and they'll usually want you to re-enter a password, verify a
birth date, or confirm a credit card number. Phishing messages may look
real enough at first glance, but it’s surprisingly easy for scammers to create
convincing details.
Spam and phishing are common problems, but there are many other
types of email scams you may encounter. Some will promise to give you a
lot of money if you advance a small amount upfront. Others may pretend to
be from people you know in real life, and they'll often ask you to send
money or download an attached file.

33
As with spam and phishing scams, remember to trust your best
judgement. You should never send someone money just because you've
received an email request. You should also never download email
attachments you weren't expecting because they might contain malware
that could damage your computer and steal your personal information.

Spam, scams, and phishing schemes will continue to evolve and


change. But now that you know what to look for—and what to avoid—you
can keep your inbox and computer that much safer.
4. Secure your computer to avoid malwares
Malware is one of the most common hazards to your computer
when you're online, but it's easy to avoid. Developing safe and smart
browsing habits can protect you from malware and other threats, like
viruses. Securing your computer and learning how to identify and avoid
suspicious links are the fundamentals of safe browsing habits.
You can protect your computer by running antivirus and antimalware
software like Bitdefender or Norton. These programs can block malware
from being installed and can remove it if it does get onto your computer.
Even if you don't see signs of malware on your computer, running regular
scans can catch any malware that has escaped notice.
Many malware programs take advantage of security flaws in
Windows and other software. Keeping your OS, browser, and other
programs updated is an important step in protecting your computer. The
security patches in these updates make your computer immune to many
threats.
5. Shop from home
Online shopping is a convenient way to buy almost anything from
the comfort of your home. And while there are some risks with shopping
online, there are also many ways to protect yourself and your financial
information. To protect sensitive information like credit card numbers, you'll
want to shop from your home Internet connection if possible. Try to avoid
shopping when connected to a public Wi-Fi network or when using a public
computer, such as a library computer. Public computers and Wi-Fi networks
are at a slightly greater risk for hacking, which could put your information at
risk.
6. Use secure payment methods
Credit cards are generally the safest way to pay for items online.
Avoid options like direct wire transfer, bank transfers, or sending cash or
checks through the mail. And if you don't like the idea of giving your credit
card information to different retailers, you could try an online payment
service like PayPal or Google Wallet.
34
Do not give any banking or sensitive information unless you are sure
that it is a reputable business having a secure service
7. Trust your instincts
Never open massages or attachment from someone you do not
know. In the end, use your common sense and trust your instincts. If a deal
seems too good to be true, it probably is. And if anything seems suspicious,
remember that you don't have make the purchase.
8. Think before you share
Be careful on. What you say or post online to protect your
reputation. Social media sites like Facebook, Instagram, and Twitter have
made it easier than ever to share things online. But sharing something on
social media is a bit different from other types of online communication.
Unlike email or instant messaging, which are relatively private, the things
you share on social media are more public, which means they'll usually be
seen by lots of other people.
While social media sites offer privacy tools to help you limit who
can see the things you share, it's important to realize that they are
fundamentally more open and social than traditional communication tools.
Whether or not you realize it, the things you share online also can affect
how you're perceived by others. That's why you'll always want to think
carefully about what you share over social media

ELECTRONIC LIBEL AND CYBERCRIME PREVENTION ACT OF 2012


Libel is defined under the Revised Penal Code Section 355.
1930 – Art. 355. Libel means by writing or similar means. – A libel committed by
means of writing, printing, lithography, engraving, radio, phonograph, painting,
theatrical exhibition, cinematographic exhibition, or any similar means, shall be
punished by prison correctional in its minimum and medium periods or a fine
ranging from 200 to 6,000 pesos, or both, in addition to the civil action which may
be brought by the offended party
Decriminalizing libel requires amending the Revised Penal Code 2000 – E-
Commerce Law (Republic Act 8792) empowered all existing laws to recognize
electronic documents as evidence (commercial/non-commercial)
Libel is a crime in Cybercrime Law Section 4c(4)
2012 – LIBEL the unlawful or prohibited acts of libel as defined in Article 355 of
the Revised Penal Code, as amended committed through a computer system or
any other similar means which may be devised in the future.
 “if a case is filed by a complainant, only 1 case to be prosecuted under
Cybercrime Law.
ELECTRONIC LIBEL AND CYBERCRIME PREVENTION ACT OF 2012

35
file:///C:/Users/admi
n/Downloads/lesson
1-2-
191118094620.pdf

ACTIVITY 1 : Stay Safe Online


In the space provided, answer the following questions.

1. What are some examples of personal information?

____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
2. How can you protect your personal information?
________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
3. Who is a stranger?(in online platform)

_______________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
4. Whom should you share password with? Why?

36
_______________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________

5. In your own word what is cyber bullying

_______________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
6. Is cyber bullying the same as real life bullying? Why?
_______________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________

7. What will you do if you or someone on your family is a victim of cyber


bullying?
_______________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
8. What are some ways you stay safe when using computer, tablet, phone or
other device?
_______________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________

37
NETIQUETTE

Are you sure you want to say that? Do we really want a media page to be our go-
to place for venting frustration? Is the picture of us complaining, fuming, or
shouting from a soapbox really what we want the world to see?

Let’s consider our etiquette on the web, sometimes called netiquette.

Network etiquette, the do’s and don’ts of online communication. Netiquette is a set
of guidelines for communicating online. Using good netiquette helps to ensure that
the things you say aren't misinterpreted.

Online Communication Tips: (https://www.pcninja.us/netiquette-tips)

1.TYPING IN ALL CAPS = SHOUTING. Unless you want the party on the other
end to feel like you have a bullhorn in their ear, don’t type in all caps. People have
even been fired for this kind of aggressive communication. Read of one such case
here.(Gummo, S., 2020. Netiquette: Online Communication Tips - PC Ninja.
[online] PC Ninja. Available at: <https://www.pcninja.us/netiquette-tips)>
[Accessed 9 August 2020].
2. Don’t forward chain emails. They’re annoying. Your luck does not depend on
how many people you forward that message to, unless your luck turns sour
because you irritated the recipients. “Like and Share if you agree”-type memes are
the social media equivalent of chain emails. Consider if it’s really worth posting
those things. Sharing a post is not the same as making a difference for a cause
you believe in by getting involved. .(Gummo, S., 2020. Netiquette: Online
Communication Tips - PC Ninja. [online] PC Ninja. Available at:
<https://www.pcninja.us/netiquette-tips)> [Accessed 9 August 2020].
3. Be careful when using humor or sarcasm, as these can easily be misread,
especially if the recipient doesn’t know you very well. When it comes to
communication, the majority of meaning is actually derived from facial expressions,
body language, and tone of voice, all of which are lacking from texts and
messages. Choose your wording carefully so as not to offend. .(Gummo, S., 2020.

38
Netiquette: Online Communication Tips - PC Ninja. [online] PC Ninja. Available at:
<https://www.pcninja.us/netiquette-tips)> [Accessed 9 August 2020].
4. Decide on the most appropriate way to contact someone, whether an email,
post, IM, private message, text, phone call, or in-person conversation. Long,
complicated matters are best resolved with a call or personal meeting. Consider
how the person on the other end would prefer to be contacted, whether texting
about a work issue is appropriate after hours (or any time), or if the recipient might
prefer to answer a quick question in an IM as opposed to cluttering up an email
inbox. .(Gummo, S., 2020. Netiquette: Online Communication Tips - PC Ninja.
[online] PC Ninja. Available at: <https://www.pcninja.us/netiquette-tips)>
[Accessed 9 August 2020].
5. Would I say this if I were face-to-face with this person? Would I use this tone
and these words, or even broach the subject at all? If not, then you probably
shouldn’t use them in email either. If you’re angry or frustrated, it’s better to pause
and give yourself time to process your emotions and frame your response before
replying or initiating a heated exchange, even if you’re already on the receiving
end of nasty communications.
The most important netiquette tip to remember is that though it may
seem like we’re operating in a virtual world, at the other end of our network
connection are very real human beings, people with feelings, backstories, and
struggles. The golden rule of doing unto others as you would have them do unto
you is just as applicable on the web as it is anywhere else. Take care not to
become a cyberbully or behave in a regrettable manner. Keep in mind that
anything you send or post is logged in cyberspace forever, even if you think you
can delete it.
Be a responsible digital citizen by practicing these communication tips as you
interact online, displaying good netiquette. This will help to keep the Internet a
safer, more enjoyable place for all. .(Gummo, S., 2020. Netiquette: Online Communication
Tips - PC Ninja. [online] PC Ninja. Available at: <https://www.pcninja.us/netiquette-tips)> [Accessed 9
August 2020].

39
ACTIVITY 2 TEXTING: DO’S AND DON’TS

Write 5-10 thing you should do when communicating online inside the right box
and 5-10 thing you should not do when communicating online inside the left box

DO DO NOT

40
1. Which is okay to give out over the Internet?
a. My last name
b. My school name
c. My teacher’s name
d. My favorite TV show
e. My address  
2. While surfing the Internet, you see a website that makes you feel uncomfortable.
What should you do?  
a. Write down the name and don’t go there again.
b. Tell your friends, so they can avoid it too.
c. Go tell a parent, guardian or teacher.
d. Unplug the computer.
3.If someone online tells you they are in 6th grade and their name is Katie, they are
probably how old?  
a. 12 b.13 c.35 d.There’s no way to tell!   
4.If you have been talking on the Internet to a person for a long time, and they
want to meet, which is okay to do?  
a. Meet them, as long as you bring a friend.
b. Meet in a public place.
c.Tell someone where you will be before you go.
d. Ask your parent or guardian first and have them go with you.
5.If someone online sends you a message that is mean or makes you feel
uncomfortable, you should:  
a. Erase them from your friends list.
b. Delete the message.
c. Insult them back
d. Tell a responsible adult
6.You are talking to someone online, and they know some of the same people you
know. Since they have many of the same friends as you, is it ok to give them your
phone number if they ask?  
a. Yes b. No
7.It is okay to send someone online your picture when:  
a. They send you theirs first
b. You send them an old picture
41
c. As long as you don’t send them your address too
d. only if a parent or guardian is with you and says it is okay

KEY ANSWER:

1.  d    
2.  c     
3. d     
4.  d    
5.  d    
6.  b    
7.   d

REFERENCES:
Gummo, S., 2020. Netiquette: Online Communication Tips - PC Ninja. [online] PC
Ninja. Available at: <https://www.pcninja.us/netiquette-tips)> [Accessed 9 August
2020].

Deped LR Portal. 2017. LR Portal. [online] Available at:


<https://lrmds.deped.gov.ph/detail/12691> [Accessed 31 July 2020].

42
43

You might also like