SLHT2 ETech1stSem
SLHT2 ETech1stSem
MELC: Apply online safety, security, ethics, and etiquette standards in the use of Competency Code:
ICTs as it would relate to their specific professional tracks. CS_ICT11/12-ICTPT-Ia-b-2
Learning Objectives:
1) Identify online risks and threats.
2) Discover online safety procedures and etiquette.
3) Design safety tips when using the internet or when using online applications,
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime.
The following are the top kinds of online threats that you should be aware of:
B. EXERCISES/ ACTIVITY
ACTIVITY 1: Show Me How You Hashtag
Directions: Examine the following images and create a hashtag based on the type of
online threat presented by each image. Write your answers on the ANSWER SHEET.
Image source:https://www.gtmaritime.com/free-
Image source: https://dlpng.com/png/6702600
phishing-penetration-test/
3 4
C. Assessment/Application/Outputs
ASSESSMENT A
Directions: Read each item carefully and choose the letter of the correct answer. Write
your answer on the ANSWER SHEET.
1. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
2. Do you have the same passwords for all your accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
A B
C D
Image source: https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm
4. Your parents bought you your first cellphone. How will you share your cellphone
number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
5. Your social media friends list should only be composed of ______________.
A. Your favorite brands. C. Anyone who sends you a friend request
B. Family and friends D. Foreigners
6. What type of malicious program is designed to replicate itself and transfer from one
computer to another either through the internet or local networks or data storage like
flash drives and CDs?
A)Adware B)Worms and Virus C)Spyware D)Ransomeware
7. What harmful online programs are designed to send you advertisements, mostly pop-
up ads?
A)Adware B)Worms and Virus C)Spyware D)Ransomeware
8. What harmful online program is used to record keystrokes done by users to steal
passwords?
A)Adware B)Worms and Virus C)Spyware D)Ransomeware
PERFORMANCE
Directions: Based on what you have learned about online safety and security as well as
online threats, make a creative poster that gives atleast five (5) tips on how to be safe
online. Write your online safety tips poster on a separate bond paper – A4 in size. You
can put creative designs or background on your outputs. This performance will be rated
based on the rubrics given below.
RUBRICS
Relevance Coherence and Creativity Total
Grammar
4 3 3 10
Sample Output