W1 em Tech 2024 2025
W1 em Tech 2024 2025
Performance Standard: Demonstrate ethical practices and values in using PROCESSING QUESTIONS:
technology in the 21st century. 1. How many information you have shared?
The Internet is defined as the information superhighway. This means that anyone
has access to this highway, can place information, and can grab that information. This is
INTRODUCTION: why social networking sites like Facebook continue to improve their security features.
Most of us use the Internet every day. Sometimes, we do not pay attention to how much The threat of cybercrime is very real. Whatever information we share today could affect
information we share online. Identify which of the following information you have our future.
shared online.
of means.
TIPS TO STAY SAFE ONLINE Exampe:
The Internet is a pubic place and it is up to you to protect yourself. Here are some The malware originated in the Pandacan neighborhood of Manila in the Philippines on
May5, 2000.
tips to help you to stay safe when using the internet.
C. Trojan- A malicious program that disguises as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hackers to get your information.
1. Be mindful of what you share online and what site you share it to. D. Spyware- A program that runs in the background without you knowing it (thus called
2. Do not just accept terms and conditions; read it. “spy”). It has the ability to monitor what you are currently doing and typing through
3. Know the security features of the social networking site you use. By keeping your keylogging.
profile private, search engines will not be able to scan your profile. E. Adware- A program designed to send you advertisements, mostly as pop-ups.
4. Do not share your password with anyone. F. Ransomware- or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim’s data or perpetually block access to it
5. Avoid logging into public networks/Wi-Fi. Browsing in “incognito (or private) mode
unless a ransom is paid.
will NOT protect you from hackers” 2. Spam- An unwanted email mostly from bots or advertisers. It can be used to send
6. Do not talk to strangers whether online or face-to-face. malware.
7. Never post anything about a future vacation. It is similar to posting, “Rob my house at 3. Phishing- It’s goal is to acquire sensitive personal information like passwords and
this date.” credit card details. This is done by sending you an e-mail that will direct the user to visit
8. Add friends you know in real life. a fake website and be asked to update his/her username, password, credit card or personal
9. Avoid visiting untrusted websites. information.
10. Install and update an antivirus software on your computer. Use only one anti-virus
PROTECTING REPUTATIONS ONLINE
software to avoid conflicts. Here are the things you might want to consider before posting something over the
11. If you ha Wi-Fi at home, make it private network by adding a password. internet:
12. Buy the software, do not use pirated ones. 1. Before you post something on the web, ask these questions to yourself: Would you
13. Do not reply or click links from suspicious emails. want your parents or grandparents to see it? Would you want your future boss to see it?
14. Make online purchase from secure sites. 2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.
INTERNET THREATS
COPYRIGHT INFRINGEMENT
Here are some of the threats you should be aware of when using the Internet:
It is the use of works protected by copyright law without permission for a usage where
1. Malware- or malicious software, is any program or file that is harmful to a computer such permission is required,
user.
Here are some tips that could help you avoid copyright infringement:
TYPES: 1. Always assume that the work is copyrighted.
A. Virus- A malicious program designed to replicate itself and transfer from one 2. Do not copy, share or alter without seeking permission.
computer to another (internet, local networks, FDs, CDs, etc.) 3. Review and retain licensing agreements.
B. Worms- A malicious program that transfer from one computer to another by any type 4. Consider buying content.
NAME OF DATE:
STUDENT:
1.
Share an experience that you have always tended to do but later did you discover that is
4.What do fraudsters who practice phishing usually steal? not a standard of online safety, security, ethics, and etiquette.
Performance Standard: The learner draws a color-coded map of the networks of power
relations (political, economic, cultural, and kinship ties) within a particular community.
Module Objectives:
At the end of this module, you should be able to:
1. Explain strategic analysis and intuitive thinking.
INTRODUCTION:
Thinking is an important part of our human experience, and one that has
captivated people for centuries. Thinking skills are the mental activities you use to
process information, make connections, make decisions, and create new ideas. You use
your thinking skills when you try to make sense of experiences, solve problems, make
decisions, ask questions, make plans, or organize information. ("Thinking Skills -
Analytical, Critical and Creative Thinking", 2021)
Directions: Put a check (√ ) on each blank if the following is true to you. Write your
answers on a space before the number.
______1. I think several times before I do something.
______2. I often assume and it usually works.
______3. When people relay information to me, I easily believe it.
______4. I tend to believe what I read.
______5. I take responsibility to everything I hear and say.
______6. I verify and look for basis before concluding.
______7. I answer questions which I do not know.
______8. I randomly click Like in Facebook without any reason.
______9. I ask questions why I need to do my assigned tasks. STEPS EXPLANATION
______10. I just yield to whatever I am asked to do. 1. Identify Involves defining the problem and the factor or
conditions involved in the situation.
2. Analyze Examining the variables that will change state
situations, including the potential challenges and its
causes.
DISCUSSION: 3. Generate Setting practical, reasonable and creative criteria and
strategies to solve the problem.
Strategic Analysis and Intuitive Thinking Defined 4. Implement Execution of the plan
Strategic analysis refers to a system or method that requires deliberate, abstract, 5. Assess and reflect on the Draw lessons that will guide future decisions.
and effortful thinking that breaks down a complex problem into parts.
outcome
The Venn Diagram below shows some similarities and differences between strategic new friends, reuniting with old and lost friends, exchanging gifts and favors, and
analysis and intuitive thinking.
developing cooperation. The community is home to this web of interrelations and
interconnections of people and institutions. Community refers to a particular geographic
location with people living under the same set of laws and recognizing common leaders.
Studies of community linkages deal usually with who was seen interacting with whom.
INTUITIVE THINKING
STRATEGIC ANALYSIS
Another concept in the study of social ties is the center of influence. This is the
person to whom people gravitate around. This person who can give favors, can command
Starts from an idea or concept and Focuses on the idea or concept and make things happen. Examples of center of influence are the mayor, judge, barangay
moves on to what can be associated and its attributes. captain, school principal, and university president, among others. His or her influence
with it. Logical
mind
Heart centered hunch, instinct, transcends the boundaries of social networks and thus reaches other kinds of networks. A
Brain-centered, needed
gut feeling.
Hard facts, data, instructions.
Spontaneous, quick, finished at
Need time to finishing one more
sittings or sessions. one time.
Unplanned Alternative Learning Program 7
Well-planned.
Learning Strand 6: DIGITAL CITIZENSHIP
center of influence has many people and institutions attached to him or her, thereby ______7. Holistic decision is attained when strategic analysis and intuitive thinking are
creating a substantial influence in the community. observed.
______8. Every individual is a decision maker.
______9. Community refers to a particular geographic location with people living under
Congratulations on completing the module! ♡ ♡ the same set of laws and recognizing common leaders.
Now let’s check your understanding by answering the activity sheet. ______10. Economic networks are composed of relations with government officials,
student government, and community leaders, among others.
LEARNING STRAND 5: UNDERSTANDING THE SELF AND SOCIETY
TASK III: IDENTIFICATION
NAME OF DATE: Directions: Identify five persons who work under the given
STUDENT: network.
________________________________________________________________________
_______________
2. When and how do I apply intuitive thinking?
________________________________________________________________________
_______________
________________________________________________________________________
_______________
________________________________________________________________________
_______________
________________________________________________________________________
_______________
3. When and how do I employ the two?
________________________________________________________________________
_______________
________________________________________________________________________
_______________
________________________________________________________________________
_______________
________________________________________________________________________
_______________