Answer Lesson 9

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

EDUC 206- BUILDING AND ENHANCING NEW LITERACIES ACROSS THE CURRICULUM

LEARNING REFLECTION
Name of Activity

Direction: Choose any type of cyberbullying. Describe it and write its Prospective Target,
Principles. Procedures, Purpose, Cyberbullying Type indicated in the tablets provided below.

PROSPECTIVE TARGET PROCEDURES CYBER BULLYING TYPE

target or targets are the phisher exploits the web phishing


contacted by email, session control mechanism
telephone or text message to steal information from the
by someone posing as a user. In a simple session
legitimate institution to lure hacking procedure known
individuals into providing as session sniffing, the
phisher can use a sniffer to
sensitive data such as
intercept relevant
personally identifiable
information so that he or
information, banking and
she can access the Web
credit card details, and server illegally.
passwords.

PRINCIPLE PURPOSE
Phishing is a form of fraud
in which an attacker The first and
masquerades as a foremost benefit of phishing 
reputable entity or person in simulation is the decreased
email or other forms of security risks to your
communication. Attackers organization due to social
will commonly use phishing engineering attacks
emails to distribute involving human
malicious links or manipulation and deception.
attachments that can
perform a variety of
functions. Some will extract
login credentials or account
information from victims.
LET SAMPLERS: Taking the Examination
Read and analyze each item carefully. Choose the letter of the best answer.

A 1. If you plan to produce a digital tool as a learning material, which of the following

aspects will you consider first?

A. Validity, relevance and appropriateness

B. Quality, effective and technicality

C. Economic value, durability and long-term usability

D. User-friendliness, convenience, accessibility and visual impact

C 2. To avoid risk and consequences brought about the technology in the use of social

media, which ethical principle is the most important and which encompasses other principles?

A. Choose the social media account that you will keep.

B. Be careful in responding to messages while threading to an issue.

C. Think before you click

D. Select the best type of media to be utilized.

B 3. Which of the following instructional strategies can be used effectively in presenting

lessons on cyberbullying and cybercrime?

A. Discuss the provisions of the law and administer a short quiz after.

B. Research on how the law was amended and how it would impact both the victim’s and

the culprit’s lives.

C. Analyze related cases guided by legal provisions to be presented in class using jury trial

technique.

D. Report to class the status of cybercrime in the country taken from Internet source.
B 4. When you receive a suspicious e-mail asking you to withdraw big amount from a

prestigious bank upon winning the grand prize in an automated raffle draw, which you know you

have not participated in, what would be your first and immediate move?

A. Ignore the email, do not open and delete it right away.

B. Take the e-mail and verify it to the concerned bank and relevant agencies.

C. Contact the owner of the e-mail and ask him to discuss with you the content of the

message.

D. Take the e-mail and transact immediately the given message, there’s no harm in trying,

anyway.

D 5. When researching data from the Internet, which of the following reminders should be

taken into account to avoid complications, risk and negative consequences?

I. Choose creditable and reputable source of data that you need.

II. Apply proper citation of the source/reference.

III. Rephrase statement while retaining its original concept and meaning.

IV. Include pictures and graphics to be downloaded, copied and pasted in the report.

A. I and II only

B. I, II, IV

C. I, II and III

D. I, II, III and IV

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy