0% found this document useful (0 votes)
50 views9 pages

W1 em Tech 2024 2025

DASDASFAS

Uploaded by

veihn21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views9 pages

W1 em Tech 2024 2025

DASDASFAS

Uploaded by

veihn21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Learning Strand 6: DIGITAL CITIZENSHIP

MODULE 1: ETHICAL PRACTICES AND VALUES IN USING TECHNOLOGY


IN THE 21st CENTURY (WEEK 1)
First Name Cellphone Number Name of your siblings
Content Standard: ICT in the context of global communication for specific
professional task. Address Birthday Father’s Name/Mother’s Name

Performance Standard: Demonstrate ethical practices and values in using PROCESSING QUESTIONS:
technology in the 21st century. 1. How many information you have shared?

2. Did you get links to your profile page?


ALS Learning Competency:
 Apply online safety, security, ethics and etiquette standards and practice in the us 3. Is there any danger of being found by search engines?
e of ICTs as it would relate to their specific professional tracks. (CS_ICT11/12-
ICTPT-ia-b-2)
DISCUSSION:
LESSON AND COVERAGE
❑ETHICAL PRACTICES AND VALUES IN USING TECHNOLOGY IN THE 21st ONLINE SAFETY AND SECURITY
CENTURY The Internet, truly is a powerful tool. It can be used to promote your business,
gain new friends and stay in touch with the old one’s. It is also a source of entertainment
Module Objectives: through games, online communities and everything in between. But like most things in
At the end of this module, you should be able to: this world, there is always “other side of the coin”.
• Name the various online threats.
• Identify the online safety measures; and The Internet is one of the most dangerous paces especially if you do not know
•Consider one’s and others reputation when using the Internet. what you are doing with it. But there is no worry; it is never that late. Hopefully by the
end of this lesson, you can consider how you go about you use of the Internet.

The Internet is defined as the information superhighway. This means that anyone
has access to this highway, can place information, and can grab that information. This is
INTRODUCTION: why social networking sites like Facebook continue to improve their security features.
Most of us use the Internet every day. Sometimes, we do not pay attention to how much The threat of cybercrime is very real. Whatever information we share today could affect
information we share online. Identify which of the following information you have our future.
shared online.

Alternative Learning Program 1


Learning Strand 6: DIGITAL CITIZENSHIP

of means.
TIPS TO STAY SAFE ONLINE Exampe:
The Internet is a pubic place and it is up to you to protect yourself. Here are some The malware originated in the Pandacan neighborhood of Manila in the Philippines on
May5, 2000.
tips to help you to stay safe when using the internet.
C. Trojan- A malicious program that disguises as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hackers to get your information.
1. Be mindful of what you share online and what site you share it to. D. Spyware- A program that runs in the background without you knowing it (thus called
2. Do not just accept terms and conditions; read it. “spy”). It has the ability to monitor what you are currently doing and typing through
3. Know the security features of the social networking site you use. By keeping your keylogging.
profile private, search engines will not be able to scan your profile. E. Adware- A program designed to send you advertisements, mostly as pop-ups.
4. Do not share your password with anyone. F. Ransomware- or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim’s data or perpetually block access to it
5. Avoid logging into public networks/Wi-Fi. Browsing in “incognito (or private) mode
unless a ransom is paid.
will NOT protect you from hackers” 2. Spam- An unwanted email mostly from bots or advertisers. It can be used to send
6. Do not talk to strangers whether online or face-to-face. malware.
7. Never post anything about a future vacation. It is similar to posting, “Rob my house at 3. Phishing- It’s goal is to acquire sensitive personal information like passwords and
this date.” credit card details. This is done by sending you an e-mail that will direct the user to visit
8. Add friends you know in real life. a fake website and be asked to update his/her username, password, credit card or personal
9. Avoid visiting untrusted websites. information.
10. Install and update an antivirus software on your computer. Use only one anti-virus
PROTECTING REPUTATIONS ONLINE
software to avoid conflicts. Here are the things you might want to consider before posting something over the
11. If you ha Wi-Fi at home, make it private network by adding a password. internet:
12. Buy the software, do not use pirated ones. 1. Before you post something on the web, ask these questions to yourself: Would you
13. Do not reply or click links from suspicious emails. want your parents or grandparents to see it? Would you want your future boss to see it?
14. Make online purchase from secure sites. 2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.
INTERNET THREATS
COPYRIGHT INFRINGEMENT
Here are some of the threats you should be aware of when using the Internet:
It is the use of works protected by copyright law without permission for a usage where
1. Malware- or malicious software, is any program or file that is harmful to a computer such permission is required,
user.
Here are some tips that could help you avoid copyright infringement:
TYPES: 1. Always assume that the work is copyrighted.
A. Virus- A malicious program designed to replicate itself and transfer from one 2. Do not copy, share or alter without seeking permission.
computer to another (internet, local networks, FDs, CDs, etc.) 3. Review and retain licensing agreements.
B. Worms- A malicious program that transfer from one computer to another by any type 4. Consider buying content.

Alternative Learning Program 2


Learning Strand 6: DIGITAL CITIZENSHIP

5. Give credit to the original author of the page or information.

Congratulations on completing the module! ♡ ♡


Now let’s check your understanding by answering the activity sheet.

STUDENT ACTIVITY SHEET


LEARNING STRAND 6: DIGITAL CITIZENSHIP

NAME OF DATE:
STUDENT:

GRADE LEVEL GRADE 11 – GAS WEEK WEEK


& ALTERNATIVE LEARNING NO. 1
SECTION: SYSTEM

TEACHER: MS. GIAH-STAR F. SCORE:


SALAZAR

TASK I: ANSWERING THE FOLLOWING QUESTIONS

Directions: Answer the following questions.

1.

2. How does a virus infect a computer?

3. How do fraudsters use social media to steal information?

Alternative Learning Program 3


Learning Strand 6: DIGITAL CITIZENSHIP

TASK III: SHARING THE EXPERIENCE

Share an experience that you have always tended to do but later did you discover that is
4.What do fraudsters who practice phishing usually steal? not a standard of online safety, security, ethics, and etiquette.

5.When does copyright infringement occur?


______________________________________________________________
______________________________________________________________
______________________________________________________________
TASK III: IDENTIFICATION ______________________________________________________________
________________________________________________________
Directions: Identify the Internet threat described in each number.
_________________1. Jonathan is having a problem because his files were corrupted. He
discovered that most of his folders were replicated. RUBRICS:
_________________2. Ken was asked to pay a certain amount of money for him to
POINTS
retrieve his files. Ken might be a victim of ___________.
_________________3. Mari found a good application and she installed it on her Idea explanation 5pts
computer, but after the installation some of her files were deleted. Organization and format 5pts
_________________4. Jack is receiving several irrelevant messages every day and his e- (Paragraph and transition)
mail account has become almost unusable,
TOTAL 10 pts
_________________5. The network servors of KNCHS stopped responding and it was
found out that much of the systems’ memory was consumed by the malicious software.
What kind of malware is this?
________________6. Jewel is using a technique that tries to take information from the
user.she commonly takes things like credit cards, usernames, passwords, and home
addresses using a fake website. What type of threat is depicted in the scenario?
_________________7. This program can record all you enter on your keyboard.
_________________8. Eli received an unwanted email that contains advertisements.
What type of internet threat is depicted in the scenario?
_________________9. A kind of internet threat where the attackers use a fake website to
get your sensitive information.
_________________10. A program that runs in the background without you knowing it.
It has the ability to monitor what are currently doing.

Alternative Learning Program 4


Learning Strand 6: DIGITAL CITIZENSHIP

Learning Strand 5: UNDERSTANDING THE SELF AND SOCIETY

MODULE 1: NATURE AND ELEMENTS OF COMMUNICATION IN CONTEXT


(WEEK 1)

Content Standard: Strategic analysis and intuitive thinking.

Performance Standard: The learner draws a color-coded map of the networks of power
relations (political, economic, cultural, and kinship ties) within a particular community.

ALS Learning Competency:


Explain and apply the strategic analysis and intuitive thinking in solving a problem in the
community using a map of social networks.

LESSON AND COVERAGE


❑NATURE AND ELEMENTS OF COMMUNICATION IN CONTEXT

Module Objectives:
At the end of this module, you should be able to:
1. Explain strategic analysis and intuitive thinking.

Alternative Learning Program 5


Learning Strand 6: DIGITAL CITIZENSHIP

2); Deliberate thinking employs a detailed examination of a problem to come up


a. Define strategic analysis and intuitive thinking. with a solution. This involves looking at the context of the problem. The amount of time
b. Differentiate key components in strategic analysis and intuitive thinking. and
2. Apply strategic analysis; and resources are the primary factors in strategic analysis. The most common strategic
3. Apply intuitive thinking in solving a problem in the community using a map of analysis model used in decision-making follows five steps as illustrated in the diagram
social networks. below. (Arzadon, 2018)

INTRODUCTION:
Thinking is an important part of our human experience, and one that has
captivated people for centuries. Thinking skills are the mental activities you use to
process information, make connections, make decisions, and create new ideas. You use
your thinking skills when you try to make sense of experiences, solve problems, make
decisions, ask questions, make plans, or organize information. ("Thinking Skills -
Analytical, Critical and Creative Thinking", 2021)

Directions: Put a check (√ ) on each blank if the following is true to you. Write your
answers on a space before the number.
______1. I think several times before I do something.
______2. I often assume and it usually works.
______3. When people relay information to me, I easily believe it.
______4. I tend to believe what I read.
______5. I take responsibility to everything I hear and say.
______6. I verify and look for basis before concluding.
______7. I answer questions which I do not know.
______8. I randomly click Like in Facebook without any reason.
______9. I ask questions why I need to do my assigned tasks. STEPS EXPLANATION
______10. I just yield to whatever I am asked to do. 1. Identify Involves defining the problem and the factor or
conditions involved in the situation.
2. Analyze Examining the variables that will change state
situations, including the potential challenges and its
causes.
DISCUSSION: 3. Generate Setting practical, reasonable and creative criteria and
strategies to solve the problem.
Strategic Analysis and Intuitive Thinking Defined 4. Implement Execution of the plan
Strategic analysis refers to a system or method that requires deliberate, abstract, 5. Assess and reflect on the Draw lessons that will guide future decisions.
and effortful thinking that breaks down a complex problem into parts.

Alternative Learning Program 6


Learning Strand 6: DIGITAL CITIZENSHIP

outcome

Intuitive thinking is “quick and ready insight” (Websters New Collegiate


Dictionary). It is another approach to decision-making. This is the ability to understand
something instinctively without the need for conscious reasoning. Sometimes, it is
referred to as gut feeling, sixth sense, inner sense, instinct, inner voice, spiritual guide,
etc. Intuitive thinking is affected by how one feels and define a thing or event. Particular
norms and value systems within a community are considered when making decisions. USING INTUITIVE THINKING IN SOCIAL NETWORKS
For example, among some indigenous people, their farmers would not touch Each person engaged in a variety of networks associated with his or her multiple
certain places in the field like an anthill. When asked why they do avoid such places, they roles and interests in the community. According to Arzadon et.al. (2017), these networks
cannot cite any pragmatic reason. It was just intuition. Maybe they will say that nuno sa can be, among others, political, economic, and sociocultural.
punso (a mythical dwarf-like creature), lives in those places. Soil scientist said that such
is a sound practice because anthills are necessary to maintain the physical, chemical, and Your political networks are composed of relations with government officials,
biological health of the soil. student government, and community leaders, among others.
The economic networks you belong to cover the manufacturers, agents, and
Intuitive decision-making is far more than using common sense because it sellers of the goods you consume such as those in stores, groceries, markets, and malls as
involves additional sensors to perceive and get aware of the information from outside. In well as money lenders.
dealing with everyday life issues and situations, we are called to make immediate Your sociocultural or social networks are those belonging to your dance troupe,
decisions based on our gut feelings and prior knowledge and experiences. This type of choir, reading club, band, arts club, or theater company. Kinship ties, neighborhood
decision-making is evident in various situations: a doctor assessing an emergency case; a associations, friendship clubs, and veterans associations also belong to the social network
teacher determining the reason for a childs inattentiveness in class; a buyer examining wherein people constantly engage in close communication and interaction through visits,
which vegetable to buy; and a firefighter trying to rescue a fire victim. In these cases, one phone calls, text messages, and activities of common interest.
would not hesitate or delay making decisions because these situations need immediate Social networks appear as clusters and support groups of people who share
action. similar interests, backgrounds, and real-life connections. They are avenues for meeting

The Venn Diagram below shows some similarities and differences between strategic new friends, reuniting with old and lost friends, exchanging gifts and favors, and
analysis and intuitive thinking.
developing cooperation. The community is home to this web of interrelations and
interconnections of people and institutions. Community refers to a particular geographic
location with people living under the same set of laws and recognizing common leaders.
Studies of community linkages deal usually with who was seen interacting with whom.
INTUITIVE THINKING
STRATEGIC ANALYSIS
Another concept in the study of social ties is the center of influence. This is the
person to whom people gravitate around. This person who can give favors, can command
 Starts from an idea or concept and  Focuses on the idea or concept and make things happen. Examples of center of influence are the mayor, judge, barangay
moves on to what can be associated and its attributes. captain, school principal, and university president, among others. His or her influence
with it. Logical
mind
 Heart centered hunch, instinct, transcends the boundaries of social networks and thus reaches other kinds of networks. A
 Brain-centered, needed
gut feeling.
 Hard facts, data, instructions.
 Spontaneous, quick, finished at
 Need time to finishing one more
sittings or sessions. one time.
 Unplanned Alternative Learning Program 7
 Well-planned.
Learning Strand 6: DIGITAL CITIZENSHIP

center of influence has many people and institutions attached to him or her, thereby ______7. Holistic decision is attained when strategic analysis and intuitive thinking are
creating a substantial influence in the community. observed.
______8. Every individual is a decision maker.
______9. Community refers to a particular geographic location with people living under
Congratulations on completing the module! ♡ ♡ the same set of laws and recognizing common leaders.
Now let’s check your understanding by answering the activity sheet. ______10. Economic networks are composed of relations with government officials,
student government, and community leaders, among others.
LEARNING STRAND 5: UNDERSTANDING THE SELF AND SOCIETY
TASK III: IDENTIFICATION
NAME OF DATE: Directions: Identify five persons who work under the given
STUDENT: network.

GRADE LEVEL & GRADE 11 – GAS WEEK WEEK 1


SECTION: ALTERNATIVE LEARNING SYSTEM NO.

TEACHER: MS. GIAH-STAR F. SALAZAR SCORE:

POLITICAL ECONOMIC SOCIOCULTURAL


NETWORK NETWORK NETWORK
STUDENT ACTIVITY SHEET 1. 1. 1.
2. 2. 2.
TASK I: SA or IT 3. 3. 3.
Directions: Read and analyze the statements and identify if these statements pertain to a 4. 4. 4.
strategic analysis and intuitive thinking. Write SA if the statement pertains to the 5 5. 5.
descriptions of strategic analysis and IT if the statement pertains to intuitive thinking.
______1. It refers to a system or method that requires deliberate, abstract, and effortful
thinking that breaks down a complex problem into parts. ADDITIONAL ACTIVITIES:
______2. This involves looking at the context of the problem. Directions: Answer the following questions:
______3. It involves additional sensors to perceive and get aware of the information
from outside. 1. When and how do I apply strategic thinking?
______4. It is referred to as gut feeling, sixth sense, inner sense, instinct, inner voice, ________________________________________________________________________
spiritual guide, etc. _______________
______5. It is spontaneous, quick, and finished at one time. ________________________________________________________________________
TASK II: TRUE OR FALSE _______________
Directions: The following are statements about the concepts you have learned in ________________________________________________________________________
this module. Write TRUE if the sentence is correct, write FALSE otherwise. _______________
______6. Intuitive thinking follows specific standards, formula, and criteria.

Alternative Learning Program 8


Learning Strand 6: DIGITAL CITIZENSHIP

________________________________________________________________________
_______________
2. When and how do I apply intuitive thinking?
________________________________________________________________________
_______________
________________________________________________________________________
_______________
________________________________________________________________________
_______________
________________________________________________________________________
_______________
3. When and how do I employ the two?
________________________________________________________________________
_______________
________________________________________________________________________
_______________
________________________________________________________________________
_______________
________________________________________________________________________
_______________

Alternative Learning Program 9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy