Ict111 Module 02
Ict111 Module 02
Ict111 Module 02
MODULE 02:
Empowerment IT Technologies
Name: ______________________________ Section/Strand: ______________________
I. Learning Objectives
At the end of the lesson, the learners will be able to:
a. Consider one’s and other’s safety when sharing information using the
internet;
b. Consider one’s and other’s reputation when using the internet;
c. Determine and avoid the dangers of the internet;
d. Be responsible in the use of social networking sites; and
e. Browse the internet efficiently and properly through proper referencing.
II. Abstraction
LESSON 2:
RULES OF NETIQUETTE
Most of us use the internet every day. Sometimes, we do not pay attention on
how much information we share online. Below is a questionnaire about how
much information you have shared so far. Put a check (✓) under shared or not
shared.
How many checks did you have for shared? You probably answered shared
in the first two items. If that is the case, try using a search engine like Google
then type your first and last name. Did you get links to your profile page? Try
switching to image search. Did your pictures appear? If you have a unique name,
chances are, it did. Do not feel bad if it did not appear though; in fact, it is
probably for you best internet not to have pictures of yourself in a search engine.
What is Internet?
What is Netiquette?
The knowledge of maximizing the user’s personal safety and security risks to
private information and property associated with using the internet, and the self-
protection from computer crime in general. It encompasses all technological
devices which have access to the internet from PCs and laptops to smartphones
and tablets.
1. Be mindful of what you share online and what site you share it to
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles
the information you share.
4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public network/Wi-Fi. Browsing in “incognito (or private)
mode,” a feature of the browser, will not protect you from hacker.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation. It is similar to posting, “Rob my
house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one
antivirus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is most likely
not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Internet Threats
A WEB THREAT is any threat that uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which
utilize HTTP or HTTPS protocols, but may also employ other protocols and
components, such as links in email or IM, or malware attachments or on servers
that access the web.
Here are some of the threats you should be aware of when using the internet:
Rogue security software- tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality, they
are not protected at all.
*Keyloggers- used to record the keystroke done by the users. This is done
to steal their password or any other sensitive information. It can record
email, message, or any information you type using your keyboard.
Copyright Infringement
Here are some tips that could help you avoid copyright infringement:
4. Know the law. There are some limitation to copyright laws. For instance in
the Philippines, copyrights only last a lifetime (of the author) plus 50 years.
There are also provisions for “fair use” which mean that an intellectual property
may be used without a consent as long as it is used in commentaries,
criticisms, search engine, parodies, news reports, research, library archiving,
teaching, and education. If you have doubts that what you are doing does not
fall under the policy of fair use, seek permission first.
III. Resources
Empowerment Technologies Innovative pg. 17-33
Innovative Training Works, Inc.
https://tinyurl.com/2795t5xe
https://tinyurl.com/3naymbkr