100% found this document useful (2 votes)
2K views32 pages

Safe & Ethical Use of Mobile Devices

Module on ALS Learning Strand 6 ( Digital Citizenship)

Uploaded by

rieginald subito
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
2K views32 pages

Safe & Ethical Use of Mobile Devices

Module on ALS Learning Strand 6 ( Digital Citizenship)

Uploaded by

rieginald subito
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Elementary Elementary `

Senior High School


Elementary

Learning Strand 6
DIGITAL CITIZENSHIP
SAFE & ETHICAL USE OF MOBILE DEVICES
Accreditation and Equivalency (A&E) Program Module
Book Record

School: District:

Division: Region: Date Received by School:

To the Learner
Use the table below by following the instructions:
1. Write your name clearly under the column Name of Borrower.
2. Use the following letters in recording the condition of the book before and after borrowing:

A. new C. used book in Fair Condition


B. used book in Good Condition D. used book in Poor Condition

Date
Name of Borrower Date Issued Condition Condition
Returned

Take Care of Your Book

Dos: Don’ts:
1. Cover your book using a plastic cover, 1. Do not fold the pages.
manila paper, old newspaper, or magazine. 2. Do not write on the cover or pages.
2. Be sure your hands are clean when you 3. Do not cut out any picture.
handle or turn the pages. 4. Never detach or tear any page.
3. When using a book for the first time, lay it 5. Do not leave it open or lying face down
on its back and open only a few pages at a when not in use.
time. 6. Do not use pencils, ballpens, or thick
4. Use a piece of paper or cardboard for objects as bookmarks.
bookmarks. 7. Do not force the book into a packed
5. Paste or tape immediately any torn pages. schoolbag.
Always take care of damaged book. 8. Do not use it to cover your head when it is
6. Handle the book with care when passing raining.
from one person to another. 9. Do not sit on it.
7. Always keep your book in a clean dry place.
8. When your book is lost, report it to your
teacher right away.
Elementary

Learning Strand 6
DIGITAL CITIZENSHIP
SAFE AND ETHICAL USE OF
MOBILE DEVICES

Accreditation and Equivalency (A&E) Program Module


Learning Strand 6 – Elementary
Alternative Learning System
Safe and Ethical Use of Mobile Devices
First Edition, 2023

Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this module are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission to use
these materials from their respective copyright owners. The publisher and authors
do not represent nor claim ownership over them.

Published by the Department of Education


Secretary: Sara Z. Duterte
Undersecretary: Gina O. Gonong, Phd

Development Team of the Module

Writer: Joecy C. Sanggumay

Editors: Ronel L. Jamarolin, Romel O. Eguia

Reviewers/LREs: Raymel M. Godinez, Joel T. Baje, Aldrin Ferdinand P. Hadlos


Jay Michael Calipusan, Irish P. Ga-a, Ivy Coney Gamatero

Illustrators: Joel T. Baje/ Aldrin Ferdinand P. Hadlos

Layout Artist: Ruby V. Paguntalan

Management Team: Bureau of Alternative Education (BAE)

Bureau of Learning Resources (BLR)

Regional Office IX

Schools Division Office of Dapitan

Printed in the Philippines by ____________________

Office Address: ___________________________


Telefax: ___________________________
E-mail Address: ___________________________

iii
User’s Guide
For the ALS Learner:

This module was designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.

This module has the following parts and corresponding icons:

What Is This Module This will give you an idea of the skills or
competencies you are expected to learn in the
About?
module.

Let’s See What You This part includes an activity that aims to
Already Know check what you already know about the lesson.
If you get all the answers correct (100%), you
may decide to skip
What Will You Learn This contains objective/s or the learning
from This Module? competencies in a lesson. This may include a
brief rationale on what you will learn.

Let’s Do This This part gives instruction to the learner to


perform the activity/ies as mentioned-above to
ensure learning the competencies or the
objectives.

Let’s Study and This section provides a brief discussion of the


Analyze lesson. This aims to help you discover and
understand new concepts and skills.

Let’s Try This This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the answers
to the exercises using the Answer Key at the
end of the module.

Let’s See What You This section provides an activity that will
Have Learned help you transfer your new knowledge or
skill in real-life situations or concerns.

Let’s Remember and This contains key concepts taken from all the
Review lessons covered in every module.

Explore More This is an activity in a form that increase the


strength of the response and tends to induce
repetitions of actions/learning.

What Have You This is a task which aims to evaluate your level
Learned? of mastery in achieving the given learning
competency.

ii
iii
This contains answers to all activities in the
Answer Key module.

This portion gives information about the


Glossary meanings of the specialized words used in the
module.

Reference This is a list of all sources used in developing


this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer the Pre-assessment before moving on to the other
activities included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your ALS Teacher/Instructional Manager/Learning
7. Facilitator once you are through with it.

If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your ALS Teacher/Instructional Manager/Learning Facilitator.
Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can

iv
iii
Table of Contents

What Is This Module About? ....................................................................... 1


Let’s See What You Already Know................................................................ 2
The Mobile Devices...................................................................................... 5
What Will You Learn From This Module? ..................................................... 5
Let’s Do This ............................................................................................... 5
Let’s Study and Analyze .............................................................................. 6
Mobile devices ..................................................................................................... 6
Let’s Try This ............................................................................................ 11
Let’s See What Have You Learned .............................................................. 12
Practicing Safe and Ethical Use of Mobile Devices ..................................... 13
What Will You Learn From This Module? ................................................... 13
Let’s Do This ............................................................................................. 14
Let’s Study and Analyze ............................................................................ 15
Let’s Try This ............................................................................................ 16
Let’s See What You Have Learned .............................................................. 17
Let’s Remember and Review ...................................................................... 18
What Have You Learned? .......................................................................... 19
Answer Key ............................................................................................... 21
Glossary ................................................................................................... 23
References ................................................................................................ 24

iv
v
What Is This Module About?

As 21st century learners, you often use digital devices/mobile devices


for entertainment and for educational purposes in terms of communication,
at work and any other leisure activities.

These mobile devices, often known as portable devices, may be compact


and handy for persons who need to do computer related jobs. These are
capable of carrying out nearly all tasks that were intended for conventional
desktop computers anywhere they may be. It is no wonder why people from
all walks of life, no matter the age and gender are into these modern mobile
devices are fond of having this.

Today, you will learn about the use of mobile devices in terms of access,
information and communication and even help you solve problems in daily
life. The safe and ethical use of mobile devices shall be discussed on this
module.

This module consists of two lessons namely:

• Lesson 1 - The Mobile Device

• Lesson 2 - Practice Safe and Ethical Use of Mobile Devices

1
Let’s See What You Already Know

Before going through this module, try to answer the following questions
by ticking the box or the choices of each statement.

1. Which of the following is not a safe practice when using a mobile


device?

Downloading apps only from official app stores.

Using strong and unique passwords for all accounts.

Keeping the device's operating system and apps up to date.

Sharing personal information and passwords with friends


and family.

2. What does practice ethical use of mobile devices mean?

Hacking into other people's devices for fun.

Ignoring others' privacy and security concerns.

Using the device for personal gain at the expense of others.

Using the device responsibly and respectfully towards others.

3. Which of the following is a good practice for protecting your privacy


on a mobile device?

Disabling unnecessary app permissions.

Sharing your device's location with social media apps.

Using public Wi-Fi networks without any security measures.

Enabling automatic backup of all your data.

2
4. How can you prevent unauthorized access to your mobile device?

Using a simple and common PIN or password.

Sharing your passcode with friends and family.

Leaving your device unattended in public places.

Enabling biometric authentication, such as fingerprint or


face recognition.

5. Which of the following is not a safe practice when it comes to mobile


device battery usage?

Overcharging the device overnight.

Using a genuine charger and accessories.

Avoiding extreme temperature conditions.

Minimizing background app activity and notifications.

6. What should you do if you receive a suspicious or unsolicited


message or email on your mobile device?

Click on any links or attachments to investigate further.

Forward the message to all your contacts to warn them.

Delete the message without opening any links or


attachments.

Reply with personal information to verify the sender's


identity.

7. What is the purpose of regularly backing up the data on your mobile


device?

It improves the battery life of the device.

It increases the device's processing speed.

It frees up storage space for new apps and files.

It allows you to restore your data if the device is lost, stolen,


or damaged.

3
8. Which of the following is an example of cyberbullying?

Sharing positive and uplifting messages online.

Posting constructive criticism on social media.

Participating in online discussions respectfully.

Sending threatening or harassing messages to someone


through mobile devices.

9. Why is it important to respect others' privacy when using mobile


devices?

It maintains trust and fosters healthy relationships.


It helps in gaining popularity and more followers on social media.

It allows you to share personal information without consequences.

It provides access to others' personal information for


personal gain.

10. What should you do if you no longer need a mobile device?

Throw it in the trash.

Give it to a stranger without erasing your data.


Recycle it properly or donate it after securely wiping your data.

Sell it without removing your accounts and personal


information.

Well, how was it? Do you find it difficult to answer? Please see the Answer Key
at the back of this module. You may still study the module to review what you
already know. Who knows, you might learn a few more new things as well and
help you understand more concepts that you can apply in your daily life.

4
Lesson

1 The Mobile Devices

What Will You Learn From This Module?

Mobile devices are very essential in our lives. This has been a part of
our daily lives when it comes to access in information, communication and
even in problem solving. However, one must also be safe and secure and to
be aware of scams and most importantly we must safeguard our personal
information and privacy.

After studying you will be able to;

• employ the use of mobile devices to access information, communicate


with others, and solve problems in daily life. (LS6DL-DD-
PSELE/AE/LS/AE-5)

Let’s Do This

Before you begin studying this module, answer the following questions.
Write your answer in a paragraph form.

1. What can a mobile device do?


________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
2. How important is a smartphone in your life?
_______________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
3. Are mobile phones necessary? Why?
_______________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

5
Let’s Study and Analyze

Mobile device, is a portable device that allows users to make calls, send
messages, access the internet, and use various applications.

It has evolved to include features like touchscreens, cameras, GPS, and


the ability to download important apps which can be helpful in our day to day
life. Mobile devices have become essential tools for communication,
information access, and multitasking in our daily lives.

Mobile devices served as communication tools, provided access to the


internet, offered entertainment through games and multimedia, assisted in
navigation, enabled online shopping, and supported various productivity
tasks. Examples of these mobile devices are mobile phones, mobile computer,
camera/ camcorder and pager/ beeper and Personal Navigation Device (PND).

Let me give you a background or the uses of applications in a mobile


phone. These features may also be seen in the other mobile devices. The
following are the uses of mobile phones.

1. Communication - using a mobile phone, you have


the ability to communicate with others effortlessly.
Whether it's a friend, family member, spouse, or
teacher, you can initiate conversations with them at
your convenience. Today's mobile phones offer two
primary methods of communication, as outlined
below:
Figure 01. Communication

a. Video Call- most of the updated and advanced versions of phones,


people can actually engage in video calls, allowing both
participants to see each other virtually, facilitating a face-to-face
interaction.

b. Voice Call- Usual communication is through voice calls, which are


available on all types of mobile phones. This enables the user to
converse through audio. With these two communication options,
mobile phones have revolutionized the way people connect and
communicate with one another.

6
2. Convenient size- mobile phones are commonly preferred by people due to
their compact size. Infact today's smartphones can be aptly referred to as
portable computers or devices since it is designed to be small and
lightweight. This allows individuals to conveniently carry their
smartphones with ease, enhancing mobility and facilitating various tasks
on the go.

3. Photos- mobile phones are widely utilized for capturing special moments
through photography. This is primarily due to the excellent cameras found
in modern smartphones, which have the capability to produce high-quality
photos. As a result, taking a photo with a smartphone results in impressive
image quality, enhancing the overall visual appeal of the captured
photograph.

4. Making Video- most of the mobile phones are equipped with exceptional
cameras capable of recording videos into high-definition (HD) quality. The
presence of a high-quality camera in smartphones is particularly favored
by individuals such as reporters, vloggers, and more. They opt to use their
mobile phones to capture videos due to the lightweight nature of these
devices, which ensures minimal strain on their hands during video
recording.

5. Making e-notes- using a mobile phone, you can generate electronic notes,
commonly known as e notes. In the present day, learners rely on mobile
phones to take notes for all their subjects. These notes offer the advantage
of being accessible anytime and anywhere. The term "e-notes" refers to
electronic notes that can be viewed on portable devices as well as computer
systems.

6. Sending Text Message - mobile phones have the ability to send text
messages to other individuals even without an internet connection. Text
messaging is a remarkable feature of mobile phones that enables you to
communicate with friends, family members. To utilize this feature, you
only require a mobile phone equipped with a SIM card, which should have
a sufficient balance or messaging plan.

7. Entertainment - mobile phones also serve as a source of entertainment.


They offer the convenience of accessing entertainment content anywhere
and at any time. Nowadays, people extensively use mobile phones to watch
videos, and updated entertainment videos utilizing social media can
conveniently view and manage schedules anytime and anywhere.

8. Calendars- mobile phones, media platforms have a calendar feature. With


the calendar on your mobile device, there is no longer a need for a physical
calendar and manage schedule anytime and anywhere.

7
9. Maps- the feature map is now available on every modern smartphone.
Nowadays, people heavily rely on this application to navigate and explore
maps. By utilizing their mobile devices, individuals can effortlessly find
their way to the correct destination without having to seek assistance from
others.

10. Online Banking- this digital approach to banking brings flexibility and
efficiency to everyday financial activities, empowering individuals to handle
their banking needs with ease and convenience. Online banking has
revolutionized the way people manage their finances by providing a range
of convenient functions accessible from the comfort of their homes.
Through online banking, individuals can perform a multitude of banking
tasks without the need to visit a physical bank branch. They can open new
accounts, review electronic passbooks, transfer funds, and receive
payments, all through online platforms. Moreover, online banking offers
additional conveniences such as mobile recharge, electricity bill payment,
and landline phone bill settlement, which can be conveniently accessed
and utilized.

11. Address Book- the address book function of mobile phones serves a
vital role in organizing and managing contact information. Mobile phones
provide a convenient platform for users store and access the phone
numbers and addresses of others.

12. Contact- the use of mobile phones greatly facilitates communication


through the contact feature. Contact features on mobile phones allow
users to conveniently store and manage the phone numbers of family and
friends. This enables easy access to contact individuals in the future,
ensuring seamless and efficient communication.

13. Remote Working- mobile phones play a crucial role in remote working,
granting individuals the ability to perform their tasks from any place and
at any given time. Whether one is on the go or working outside a traditional
office environment, mobile phones empower them to efficiently accomplish
their work. The flexibility offered by these devices ensures convenient and
effective work operations, regardless of the individual's location.

14. Alarm Clock - with multiple alarm options, accessibility, and


portability, mobile phones ensure reliable alarms wherever users need
personalized wake-up calls. The diverse alarm sounds, including custom
options, cater to individual preferences. Snooze functionality offers a gentle
transition from sleep to wakefulness.

15. Calculator - users of mobile phones now have a convenient tool for
performing mathematical calculations with the capabilities of a calculator.

8
Users can conduct several calculations on their mobile devices, such as
addition, subtraction, multiplication, and division, with an integrated
calculator app. Scientific operation, memory storage, and percentage
calculations are common extras on calculators.

16. Flashlight/Torch - One of the practical tools of mobile phones is it has


built-in flashlights or torches, offering illumination. With a simple tap, the
flashlight feature on mobile phones provides immediate light in dark
environments. The mobile phone's flashlight can also function as a signal
or emergency beacon in case of emergencies and provide a useful utility in
day-to-day life.

17. Access to News, Sports, and Live Events - mobile phones offer instant
access to news, sports updates, and live events, keeping users informed
and engaged. Through news apps, websites, and social media platforms,
users can stay updated with current events, breaking news, and
personalized news preferences. Sports enthusiasts can follow their favorite
teams, track scores, and watch live matches through dedicated sports
apps or streaming services.

18. Web Browse - with mobile web browsers, users can access websites,
search for information, and browse online content. Mobile-friendly
versions of websites ensure optimized viewing and navigation on smaller
screens.

19. Edit & Scan Documents -mobile phones provide convenient tools for
editing and scanning documents, offering practical solutions for
productivity on the go. Document editing apps enable users to create,
modify, and format text documents, spreadsheets, and presentations
directly on their mobile devices.

Another example of mobile


devices is the laptop or tablet. A
mobile computer is a portable
gadget user may take with them
wherever they go. If there is a
wireless internet connection, one
can do many things remotely. Figure 2. Laptop

During the pandemic in 2020-2021 where there is closure of schools,


learners are required to study at home. Laptops and mobile computers are
good examples of mobile computers where one can create, edit and save

9
documents and eventually send their works through online submission. If
there is a wireless internet connection, you can use this gadget with it.

Lastly, another example of mobile


devices is thePersonal Navigation Devices
(PND). These Personal Navigation Devices,
or PND, are portable devices built to run
Road Navigation applications.

Figure 3. Pagers and beepers

However, the capabilities of


PND is not limited to just locating
the user since it also has other
functionalities such as mobile
hands-free system, multimedia
player, games, external application
support, travel utilities (world time,
currency converter, measurement
converter, calculator, etc.).

Figure 4. Personal Navigation Devices, or PND

Well how was it? Truly mobile devices are very vital in our life. Our
access to information is very broad due to technology. As years passed by,
these mobile devices have evolved and continue to improve their ability to
share information and a variety of data that is needed in our daily lives.

10
Let’s Try This

The pie graph on the right is an


example of the result of a survey
conducted in the Barangay Nangka,
Marikina City. What would be your
conclusion why mobile phones are
the most common mobile device used
in the access of information,
communication and solving
problems in daily life. Can you cite at
least two possible reasons why the
mobile phone got the highest
respondents?

_________________________________ Figure 5. Pie Graph

_________________________________

Being an ALS learner, what do you think is the most important


application from the mobile devices that you can use in your education?

___________________________________________________________________________

___________________________________________________________________________

How about in your daily life?

___________________________________________________________________________

___________________________________________________________________________

11
Let’s See What Have You Learned

Answer the following questions below by choosing the best answer.

1. What feature of a mobile devices is widely used which can generate


electronic notes?
a. eNotes c. text message
b. calculator d. address book

2. One of the practical tools of mobile phones that offers illumination and
provides immediate light in dark environments.
a. calculator c. photos
b. flashlight d. web browser

3. This apps is used to look for the location of the destination you are
looking for.
a. calculator c. maps
b. photos d. calendar

4. Which feature on a mobile phone allows users to perform mathematical


calculations?
a. calculator
b. making video
c. wed (typo, assuming you meant "Web")
d. entertainment

5. Which icon on a mobile phone allows users to capture and store visual
a. photos c. making e-notes
b. Making video d. sending text message

12
Lesson
Practicing Safe and Ethical
2 Use of Mobile Devices

What Will You Learn From This Module?

You have learned in lesson 1 regarding mobile devices, samples and its
important applications that you can use in your daily life. It is also important
that one must practice safe use of mobile devices especially using this kind of
technologies that are susceptible to cybercrime.

Nowadays, cybercrime is a profitable business of scammers. This is


because many individuals are not aware of these issues and concerns. Being
an ALS learner, you can practice safe and ethical use of mobile devices and
you might be one of the saviors of your loved ones against cybercrime.

After studying you will be able to;

• practice safe and ethical use of mobile devices. (LS6DL-DD-


PSEBL/LE/AE/LS/AE-6)

• phishing

• identity theft

• cyber laws awareness

13
Let’s Do This

Before you begin studying this module, read the situation below and
check Yes if you have practiced it and No if you have not practiced it.

Activity

Yes No

Elsa is careful about not clicking on suspicious


links or opening attachments from unknown
sources in emails or messages.

Enting did not ask permission from others


before taking and sharing their photos or videos
using his mobile device.

Daniel avoids participating in or promoting


illegal activities, such as phishing and identity
theft using his mobile device.

Ethan respects others' privacy by not snooping


on their mobile devices or accessing their
personal information without their consent.

Mario calls his friend and begins recording their


conversation without his friend’s consent.

14
Let’s Study and Analyze

As mentioned from this module, cybercrime is a profitable business of


scammers nowadays. All of us are prone to be the victims of this cybercrime.
Due to the demand of technology and increasing number of criminal activities
which take place within cyberspace, one should be informed on the common
cyber activities. This could be a traumatic experience and difficult experience
which can severely bring harm. Let us all be vigilant and learn how we can
avoid it.

One of the examples of cybercrime is Phishing, this is a cybercrime


practice where most of the victims were contacted via email, text messages
and pretending they are from a reliable institution/company. Common
phishing emails/text messages are too good to be true. Same may send
messages to the victims that they won in the lottery, won a gadget and some
other lavish prizes. Sometimes they will send emails containing hyperlinks or
attachments from unusual senders. If you have received suspicious
emails/text, just ignore it because you might be one of their victims.

Another one is, Identity Theft. This is the fraudulent or dishonest


transactions and use of someone else 's identity, such as their name,
identification numbers, or financial details, typically for financial gain. The
victim ends up being sued for non-payment of purchase or loan transactions
or he/she ends up paying for the amount of goods purchased or loan taken
out. It involves impersonating the victim to commit various crimes, such as
fraudulent financial transactions or accessing sensitive accounts without
authorization.

In the Philippines, Cyber Laws are hereby implemented through


Republic Act 10175, the Cybercrime Prevention Act of 2012.This cybercrime
Prevention Act was signed by President Aquino on September 12, 2012. The
purpose of this law is to monitor the online behavior of Filipino internet users
so that they do not become unintentional victims of online predation or
victims themselves. This Law covers several types of cybercrime and
corresponding penalties. Offenses relating to computer systems, data entry
and computer hacking are also under the law. Depending on the severity of
the crime, they could face jail time and fines. This also provides guidelines for
the investigation and prosecution of cybercrime, including the preservation
and storage of digital evidence. It strives to advance cyber security skills while
protecting the availability, privacy and integrity of computer systems.

15
If you defame someone when you write comments that damage the good
reputation of someone and involves defamatory or prejudicial statements that
harm the integrity, reputation, or character of an individual on the different
networking sites, (e.g., thru FB page post, Twitter, emails, blogs, etc.) or other
digital means of communication is a Cyber libel punishable under RA 10175
and the revised Penal Code(Section 355). So, the next time you post a
comment, be very careful about what you write.

Let’s Try This

Fill in the blanks with the correct word/s from the box below. Do this
on a separate sheet of paper.

Phishing Identity Theft Cyber Libel Cyber Law R.A. 10175

1. ____________ defame someone when you write comments that


damage the good reputation of someone in social media using the
internet.

2. ____________ is also known as Cybercrime Prevention Act of 2012.

3. ____________ refers to the fraudulent acquisition and use of someone


else's personal information for personal gain.

4. ____________ is a legal system that deals with activities over the


internet.

5. ____________ a cybercrime which uses emails, telephone or text


messages to attack victims.

16
Let’s See What You Have Learned

Read the following scenarios. Identify and explain the possible danger
presented in each scenario to the user. Write your answer on a separate sheet
of paper.

A. Heddy takes a photo of her new ID without covering sensitive


information or details and posts it on social media.

_____________________________________________________________________

B. Jerry received a text message from an unknown number saying that he


had won ₱50,000 from a raffle. The sender said that to claim his prize,
he must first send his personal information.

_____________________________________________________________________

C. Siday called her friend whom she has known for over a week because
she wanted to send and email to her company. Due to poor signal of
internet connection, she asked her friend to open her email and gave
her password to her friend.

_____________________________________________________________________

D. Jean receives an email asking her to provide her personal information


as soon as possible to avail a certain promo.

_____________________________________________________________________

E. Edna doesn’t share her personal information online or offline when


unknown senders ask for it.

_____________________________________________________________________

17
Let’s Remember and Review

• Mobile devices are small and lightweight devices that are designed for
people who need to accomplish tasks wherever they are. This is also
referred to as handheld devices.

• A smartphone works like a computer in the way it can store applications.


It can be used for making phone calls and sending text messages.

• Mobile Phone is a smartphone. It is commonly touch screen-operated and


can be used for making phone calls and sending text messages.

• Mobile Computer is a portable gadget that a person may take with them
wherever they go.

• Pager or beeper it makes a beeping noise when receiving messages. It is


a small, one-way telecommunications device that receives messages for the
recipient.

• Digital camera and camcorder better known as “digicam,” is a device that


captures photographs and stores them in the device’s memory or an
external memory card.

• Phishing is a method of trying to gather personal information using


deceptive emails and websites.

• Identity theft is when someone steals your identity and uses it to commit
crimes.

• Cyber law is a legal system that deals with activities over the internet.
Cyber law in the Philippines is hereby implemented through Republic Act
10175, the Cybercrime Prevention Act of 2012.This cybercrime Prevention
Act was signed by President Aquino on September 12, 2012.

• Cyber libel is when you write comments that damage the good reputation
of someone and involves defamatory or prejudicial statements that harm
the integrity, reputation, or character of an individual.

18
What Have You Learned?

Do the following activities on the activity sheet provided.

A. Write True if the statement is true and False if it is false.

1. Most teenagers use mobile phones to communicate with the


people closest to them, which is a common and a particular
practice in their daily lives.
2. Using a mobile phone inside the church is rude.
3. When you use a mobile device, you need to speak loudly.
4. You can talk to any other person through video call whenever
you want.
5. Using a mobile phone while driving has been a major ethical
concern that can cause injury or accident.

B. Choose and write the letter of the correct answer

1. What would you do if you saw one of your friends posted her newly
claimed government ID on social media?
a. I will share it on my profile.
b. I will advise her to delete her post for her security.
c. I will tag others to give comments about it.
d. I will like her post.

2. What crime is committed when the victims were contacted via email,
text messages and pretending they are from a reliable
institution/company.
a. Phishing c. Cyber Libel
b. Identity Theft d. Cyber Law

3. What is the best description of mobile device?


a. It is bulky, but useful.
b. It works like a computer, but it is small and easy to carry around.
c. It is useful but can’t be used without electricity.
d. It is heavy and not easy to carry around.

19
4. What crime is committed when a person’s personal information such
as usernames and passwords is illegally and dishonestly obtained?
a. Identity Theft c. Phishing
b. Cyber Law d. Cyber libel

5. Why is it important to know Cyber Law?


a. So I can complain on social media.
b. So I can boast about how knowledgeable I am when it comes to
Cyber Law.
c. So I can protect and defend myself and loved ones from cybercrime
attacks.
d. So I can complain to the authority.

C. Conduct an interview among your family members and submit it to your


facilitator. Ask them the following question:

1. Have you ever encountered any of the cybercrimes such as phishing,


identity theft, and cyber libel?

2. If you have, how did you solve the problem?

3. What have you learned from the experience?

20
21
Possible Answer
1. What can mobile device do?
Mobile devices can make phone calls, send text messages, surf the
Internet, use applications, play games, take photos and videos, play
music and videos, navigate by GPS, and more.
2. How important is your smartphone in your life?
My smartphone is very important in my life because it helps me stay
connected, organized and informed, serving as a valuable tool for
communication, productivity and entertainment.
3. Are mobile phone necessary? Why?
Mobile phones are important because this is a necessity. They
provide communication, information processing, convenience and
ease of internet connectivity, offer a wide range of applications, and
act as portable entertainment devices.
Why? Because of communication, internet access, mobility,
entertainment, productivity, accessing, emergency situations,
emergency situations, photography, information access, and social
connectivity.
Lesson 1
Let’s See What You Already Know
1. Sharing personal information and password with friends and family.
2. Using the device responsibly and respectfully towards other.
3. Disabling unnecessary app permission.
4. Enabling biometric authentication, such as fingerprint or face
recognition.
5. Overcharging the device overnight.
6. Delete the messages without opening any links or attachments.
7. It allows you to use your data if the device is lost, stolen, or damaged
8. 8.Sending threatening or harassing messages to someone through
mobile devices.
9. It maintains trust and foster healthy relationships.
10. Recycle it properly or donate it after securely wiping your data.
Answer Key
22
What Have You Learned Let’s See What Have You
A. 1. True Learned
2. True Answer may vary
3. False
4. False
5. True
Let’s Try This
B. 1. B Possible answers:
2. A
3. B 1. Cyber libel
4. A 2. R.A. 10175
5. 3. Identify Theft
4. Cyber Law
5. Phishing
Lesson 2
Let’s Try This
Let’s Do This
Answer may vary Possible answers:
• Mobile phones are a portable
device that allows users to
make calls, send messages,
Let’s See What Have You access the internet, and use
Learned? various applications.
1. A • Essential tools for
2. B communication, information
3. C
access, and multitasking in
4. A
5. B our daily lives.
Glossary

GPS - short for Global Positioning System, an accurate worldwide navigational


and surveying facility based on the reception of signals from an array of
orbiting satellites

Ethical - thinking and doing the right thing.

Identity - the characteristics determining who or what a person or thing is

Laptop - a computer that is portable and suitable for use while traveling

Mobile - capable of moving or being moved

Device - a piece of equipment or a mechanism designed to serve a special


purpose or perform a special function

Pager - an electronic device, usually worn on one’s person that receives


messages and signals the user by keeping or vibrating

Smartphone - a mobile phone that performs many of the functions of a


computer

23
References

Mobile devices meaning - Google search. (n.d.). Google.


https://www.google.com/search?q=mobile+devices+meaning&oq=Mo
bile+Devices&gs_lcrp=EgZjaHJvbWUqBwgCEAAYgAQyCggAEAAYsQM
YgAQyBwgBEAAYgAQyBwgCEAAYgAQyBwgDEAAYgAQyBwgEEAAYg
AQyBwgFEC4YgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQy
BwgJEAAYgATSAQg5NTIwajBqN6gCALACAA&sourceid=chrome&ie=
UTF-8
Learning Strand 6: Digital Citizenship, Module 6: Digital Devices, 2020,
United Nations Educational, Scientific and Cultural Organization
UNESCO Office and Department of Education - Philippines
WORKSHEET
Worksheet uses of mobile phones in daily life - Google search. (n.d.). Google.
https://www.google.com/search?q=WORKSHEET+uses+of+mobile+p
hones+in+daily+life&tbm=isch&source=iu&ictx=1&vet=1&fir=xZmgo
w-JzG-n3M%252CMK3
Uses of Mobile Device
Use of mobile devices - Google search. (n.d.). Google.
https://www.google.com/search?q=use+of+mobile+devices&source=l
mns&hl=en&sa=X&ved=2ahUKEwjZ8YHLk-
31AhWcIqYKHRirA2sQ_AUoAHoECAEQAA
Practice Safe Use of Mobile device. Practice safe and ethical use of mobile
devices - Google search. (n.d.). Google.
https://www.google.com/search?q=practice+safe+and+ethical+use+of+mob
ile+devices&hl=en&ei=fdUAYunNFOuUr7wPytOyWA&oq=practice+safe+use
+of+mobile&gs_lcp=Cgdnd3Mtd2l6EAEYADIGCAAQFhAeMgYIABAWEB4yB
ggAEBYQHjIGCAAQFhAeMgYIABAWEB46BwgAEEcQsAM6FAgAEOoCELQC
EIoDELcDENQDEOUCOgUIABCRAjoLCAAQgAQQsQMQgwE6BAgAEEM6B
QgAEIAEOgoIABCxAxCDARBDOhEILhCABBCxAxCDARDHARCjAjoICAAQg
AQQsQM6BwgAELEDEEM6BwguELEDEEM6CgguEMcBEK8BEEM6BwgAE
LEDEAo6CggAELEDEIMBEAo6BQgAELEDOggIABAWEAoQHjoICCEQFhAd
EB46BQghEKABSgQIQRgASgQIRhgAUIakB1iGpAhg2bgIaARwAngAgAHjAog
B7hySAQg2LjIwLjEuMZgBAKABAbABCsgBCMABAQ&sclient=gws-wiz

24
For inquiries or feedback, please write or call:

Department of Education - Bureau of Alternative Education (DepEd-BAE)

5th Floor, Bonifacio Bldg., DepEd Complex


Meralco Avenue, Pasig City, Philippines 1600

Telephone No.: (02) 8636-3603

Email Address: bae.od@deped.gov.ph * bae.pmsdd@deped.gov.ph

25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy