Ict111 Module 02

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

ASIAN INSTITUTE OF COMPUTER STUDIES-CEBU

SENIOR HIGH SCHOOL


1ST SEMESTER SY 2022-2023
SUBJECT: EMPOWERMENT IT TECHNOLOGIES

MODULE 02:
Empowerment IT Technologies
Name: ______________________________ Section/Strand: ______________________

Good Day Grade 11 HUMSS, GAS, & AMB!  We


are Mr.Rovicr & Ms. Irish your ICT Instructor. READ
and STUDY this module. We did not indicate any
activity to be accomplished; we simply want you to read
and comprehend the subject. Don't waste your time, and
please be responsible!
For further instruction, questions, and clarifications,
you can contact us through our messenger: Aics Irish &
Aics Rovicr.

Prepared by: Mr. Rovic Manubag & Ms. Irish B. Bacalso


ASIAN INSTITUTE OF COMPUTER STUDIES-CEBU
SENIOR HIGH SCHOOL
1ST SEMESTER SY 2022-2023
SUBJECT: EMPOWERMENT IT TECHNOLOGIES

I. Learning Objectives
At the end of the lesson, the learners will be able to:
a. Consider one’s and other’s safety when sharing information using the
internet;
b. Consider one’s and other’s reputation when using the internet;
c. Determine and avoid the dangers of the internet;
d. Be responsible in the use of social networking sites; and
e. Browse the internet efficiently and properly through proper referencing.

II. Abstraction

LESSON 2:

RULES OF NETIQUETTE
Most of us use the internet every day. Sometimes, we do not pay attention on
how much information we share online. Below is a questionnaire about how
much information you have shared so far. Put a check (✓) under shared or not
shared.

How safe you are?


Type of information Shared Not Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and previous School(s)
5. Your cell phone number
6. The name of your mother and
father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday

How many checks did you have for shared? You probably answered shared
in the first two items. If that is the case, try using a search engine like Google
then type your first and last name. Did you get links to your profile page? Try
switching to image search. Did your pictures appear? If you have a unique name,
chances are, it did. Do not feel bad if it did not appear though; in fact, it is
probably for you best internet not to have pictures of yourself in a search engine.

Prepared by: Mr. Rovic Manubag & Ms. Irish B. Bacalso


ASIAN INSTITUTE OF COMPUTER STUDIES-CEBU
SENIOR HIGH SCHOOL
1ST SEMESTER SY 2022-2023
SUBJECT: EMPOWERMENT IT TECHNOLOGIES

The internet, truly, is a powerful tool. It can be used to promote your


business, gain new friends, and stay in touch with the old ones. It is also a source
of entertainment through games, online communities, and everything in
between. But like most things in this world, there is always the “other side of the
coin.” The internet is one of the most dangerous places, especially if you do not
know what you are doing with it. But there is no need to worry; it is never that
late. Hopefully, by the lesson, you are able to consider how you go about your
use of the internet.

What is Internet?

“The information superhighway” This means that anyone has access to


this highway, can place information, and can grab that information.

The INTERNET, sometimes called simply “the Net,” is a worldwide system


of computer networks – a network of networks in which users at any one
computer can, if they have permission, get information from any other computer
(and sometimes talk directly to users at other computers).

What is Netiquette?

The word netiquette is combination of “Net” (from Internet) and etiquette.


It means respecting other users’ views and displaying common courtesy when
posting your views to online discussion groups. Netiquette thus describes the
rules of conduct for respectful and appropriate communication on the internet.
Netiquette is often referred to as etiquette for the internet. These are not legally
binding rules, but recommended rules of etiquette.

Online Safety and Security

Prepared by: Mr. Rovic Manubag & Ms. Irish B. Bacalso


ASIAN INSTITUTE OF COMPUTER STUDIES-CEBU
SENIOR HIGH SCHOOL
1ST SEMESTER SY 2022-2023
SUBJECT: EMPOWERMENT IT TECHNOLOGIES

The knowledge of maximizing the user’s personal safety and security risks to
private information and property associated with using the internet, and the self-
protection from computer crime in general. It encompasses all technological
devices which have access to the internet from PCs and laptops to smartphones
and tablets.

Tips to Stay Safe Online

1. Be mindful of what you share online and what site you share it to
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles
the information you share.
4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public network/Wi-Fi. Browsing in “incognito (or private)
mode,” a feature of the browser, will not protect you from hacker.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation. It is similar to posting, “Rob my
house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one
antivirus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is most likely
not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

Internet Threats

A WEB THREAT is any threat that uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which
utilize HTTP or HTTPS protocols, but may also employ other protocols and
components, such as links in email or IM, or malware attachments or on servers
that access the web.

Prepared by: Mr. Rovic Manubag & Ms. Irish B. Bacalso


ASIAN INSTITUTE OF COMPUTER STUDIES-CEBU
SENIOR HIGH SCHOOL
1ST SEMESTER SY 2022-2023
SUBJECT: EMPOWERMENT IT TECHNOLOGIES

Here are some of the threats you should be aware of when using the internet:

1. Malware- Stands for malicious software


a. Virus- a malicious program design to replicate
itself and transfer from one computer to another
either through the internet and local networks
or data storage like flash drives and CDs.

b. Worm- a malicious program that transfer from one computer to another


by any type of means. Often, it uses a computer network to spread itself.
For example, the ILOVEYOU worm (Love Bug Worm) created by a
Filipino.

c. Trojan- a malicious program that is disguised as a useful program but


once downloaded or installed, leaves you PC unprotected and allows
hackers to get your information.

Rogue security software- tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality, they
are not protected at all.

d. Spyware- a program that runs in the background without you knowing it


(thus called “spy”). It has the ability to monitor what you are currently doing
and typing through keylogging.

*Keyloggers- used to record the keystroke done by the users. This is done
to steal their password or any other sensitive information. It can record
email, message, or any information you type using your keyboard.

e. Adware- a program designed to send you advertisements, mostly as pop-


ups.

2. Spam- unwanted email mostly from bots or advertisers. It can be used to


send malware.

3. Phishing- Its goal is to acquire sensitive personal


information like passwords and credit card details. This is
done by sending you an email that will direct the user to
visit a website and be asked to update his/her username,
password, credit card, or personal information.

*Pharming- a more complicated way of phishing where it exploits the DNS


(Domain Name Service) system.

Prepared by: Mr. Rovic Manubag & Ms. Irish B. Bacalso


ASIAN INSTITUTE OF COMPUTER STUDIES-CEBU
SENIOR HIGH SCHOOL
1ST SEMESTER SY 2022-2023
SUBJECT: EMPOWERMENT IT TECHNOLOGIES

Copyright Infringement

If you create something an idea, an invention, a form of literary work, or a


research, you have the right as to how it should be used by others. This is
called intellectual property. In other words, the copyright law includes your
rights over your work, and anyone who uses it without your consent is
punishable by law. Try grabbing any book then browse its first few pages and
you will find a page with a disclaimer with the words: “No part of this book may
be copied, reproduced “that is a copyright page.

Here are some tips that could help you avoid copyright infringement:

1. Understand. Copyright protects literary works, photographs,


painting, drawings, film, music (and lyrics), choreography, and
sculptures, but it generally does not protect underlying ideas and
facts. This means that you can express something using your own words, but
you should give credit to the source.

2. Be responsible. Even if material does not say that it is copyrighted, it is not


a valid defense against copyright. Be responsible enough to know if something
has a copyright.

3. Be creative. Ask yourself whether what you are making is


something that came from you or something made from somebody
else’s creativity. It is important to add your own creative genius in
everything that will be credited to you.

4. Know the law. There are some limitation to copyright laws. For instance in
the Philippines, copyrights only last a lifetime (of the author) plus 50 years.
There are also provisions for “fair use” which mean that an intellectual property
may be used without a consent as long as it is used in commentaries,
criticisms, search engine, parodies, news reports, research, library archiving,
teaching, and education. If you have doubts that what you are doing does not
fall under the policy of fair use, seek permission first.

Example of Copyright Infringement include

1. Downloading movies and music without proper payment for use.

Prepared by: Mr. Rovic Manubag & Ms. Irish B. Bacalso


ASIAN INSTITUTE OF COMPUTER STUDIES-CEBU
SENIOR HIGH SCHOOL
1ST SEMESTER SY 2022-2023
SUBJECT: EMPOWERMENT IT TECHNOLOGIES

2. Recording movies in theater.


3. Using others’ photographs for a blog without permission.
4. Copying software code without giving proper credit.
5. Creating videos with unlicensed music clips.
6. Copying books, blogs or podcast without permission.
7. Anything where you are copying someone else’s original work without an
agreement.

III. Resources
 Empowerment Technologies Innovative pg. 17-33
 Innovative Training Works, Inc.
 https://tinyurl.com/2795t5xe
 https://tinyurl.com/3naymbkr

Prepared by: Mr. Rovic Manubag & Ms. Irish B. Bacalso

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy