Safe & Ethical Use of Mobile Devices
Safe & Ethical Use of Mobile Devices
Learning Strand 6
DIGITAL CITIZENSHIP
SAFE & ETHICAL USE OF MOBILE DEVICES
Accreditation and Equivalency (A&E) Program Module
Book Record
School: District:
To the Learner
Use the table below by following the instructions:
1. Write your name clearly under the column Name of Borrower.
2. Use the following letters in recording the condition of the book before and after borrowing:
Date
Name of Borrower Date Issued Condition Condition
Returned
Dos: Don’ts:
1. Cover your book using a plastic cover, 1. Do not fold the pages.
manila paper, old newspaper, or magazine. 2. Do not write on the cover or pages.
2. Be sure your hands are clean when you 3. Do not cut out any picture.
handle or turn the pages. 4. Never detach or tear any page.
3. When using a book for the first time, lay it 5. Do not leave it open or lying face down
on its back and open only a few pages at a when not in use.
time. 6. Do not use pencils, ballpens, or thick
4. Use a piece of paper or cardboard for objects as bookmarks.
bookmarks. 7. Do not force the book into a packed
5. Paste or tape immediately any torn pages. schoolbag.
Always take care of damaged book. 8. Do not use it to cover your head when it is
6. Handle the book with care when passing raining.
from one person to another. 9. Do not sit on it.
7. Always keep your book in a clean dry place.
8. When your book is lost, report it to your
teacher right away.
Elementary
Learning Strand 6
DIGITAL CITIZENSHIP
SAFE AND ETHICAL USE OF
MOBILE DEVICES
Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
Regional Office IX
iii
User’s Guide
For the ALS Learner:
This module was designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
What Is This Module This will give you an idea of the skills or
competencies you are expected to learn in the
About?
module.
Let’s See What You This part includes an activity that aims to
Already Know check what you already know about the lesson.
If you get all the answers correct (100%), you
may decide to skip
What Will You Learn This contains objective/s or the learning
from This Module? competencies in a lesson. This may include a
brief rationale on what you will learn.
Let’s See What You This section provides an activity that will
Have Learned help you transfer your new knowledge or
skill in real-life situations or concerns.
Let’s Remember and This contains key concepts taken from all the
Review lessons covered in every module.
What Have You This is a task which aims to evaluate your level
Learned? of mastery in achieving the given learning
competency.
ii
iii
This contains answers to all activities in the
Answer Key module.
1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer the Pre-assessment before moving on to the other
activities included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your ALS Teacher/Instructional Manager/Learning
7. Facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your ALS Teacher/Instructional Manager/Learning Facilitator.
Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can
iv
iii
Table of Contents
iv
v
What Is This Module About?
Today, you will learn about the use of mobile devices in terms of access,
information and communication and even help you solve problems in daily
life. The safe and ethical use of mobile devices shall be discussed on this
module.
1
Let’s See What You Already Know
Before going through this module, try to answer the following questions
by ticking the box or the choices of each statement.
2
4. How can you prevent unauthorized access to your mobile device?
3
8. Which of the following is an example of cyberbullying?
Well, how was it? Do you find it difficult to answer? Please see the Answer Key
at the back of this module. You may still study the module to review what you
already know. Who knows, you might learn a few more new things as well and
help you understand more concepts that you can apply in your daily life.
4
Lesson
Mobile devices are very essential in our lives. This has been a part of
our daily lives when it comes to access in information, communication and
even in problem solving. However, one must also be safe and secure and to
be aware of scams and most importantly we must safeguard our personal
information and privacy.
Let’s Do This
Before you begin studying this module, answer the following questions.
Write your answer in a paragraph form.
5
Let’s Study and Analyze
Mobile device, is a portable device that allows users to make calls, send
messages, access the internet, and use various applications.
6
2. Convenient size- mobile phones are commonly preferred by people due to
their compact size. Infact today's smartphones can be aptly referred to as
portable computers or devices since it is designed to be small and
lightweight. This allows individuals to conveniently carry their
smartphones with ease, enhancing mobility and facilitating various tasks
on the go.
3. Photos- mobile phones are widely utilized for capturing special moments
through photography. This is primarily due to the excellent cameras found
in modern smartphones, which have the capability to produce high-quality
photos. As a result, taking a photo with a smartphone results in impressive
image quality, enhancing the overall visual appeal of the captured
photograph.
4. Making Video- most of the mobile phones are equipped with exceptional
cameras capable of recording videos into high-definition (HD) quality. The
presence of a high-quality camera in smartphones is particularly favored
by individuals such as reporters, vloggers, and more. They opt to use their
mobile phones to capture videos due to the lightweight nature of these
devices, which ensures minimal strain on their hands during video
recording.
5. Making e-notes- using a mobile phone, you can generate electronic notes,
commonly known as e notes. In the present day, learners rely on mobile
phones to take notes for all their subjects. These notes offer the advantage
of being accessible anytime and anywhere. The term "e-notes" refers to
electronic notes that can be viewed on portable devices as well as computer
systems.
6. Sending Text Message - mobile phones have the ability to send text
messages to other individuals even without an internet connection. Text
messaging is a remarkable feature of mobile phones that enables you to
communicate with friends, family members. To utilize this feature, you
only require a mobile phone equipped with a SIM card, which should have
a sufficient balance or messaging plan.
7
9. Maps- the feature map is now available on every modern smartphone.
Nowadays, people heavily rely on this application to navigate and explore
maps. By utilizing their mobile devices, individuals can effortlessly find
their way to the correct destination without having to seek assistance from
others.
10. Online Banking- this digital approach to banking brings flexibility and
efficiency to everyday financial activities, empowering individuals to handle
their banking needs with ease and convenience. Online banking has
revolutionized the way people manage their finances by providing a range
of convenient functions accessible from the comfort of their homes.
Through online banking, individuals can perform a multitude of banking
tasks without the need to visit a physical bank branch. They can open new
accounts, review electronic passbooks, transfer funds, and receive
payments, all through online platforms. Moreover, online banking offers
additional conveniences such as mobile recharge, electricity bill payment,
and landline phone bill settlement, which can be conveniently accessed
and utilized.
11. Address Book- the address book function of mobile phones serves a
vital role in organizing and managing contact information. Mobile phones
provide a convenient platform for users store and access the phone
numbers and addresses of others.
13. Remote Working- mobile phones play a crucial role in remote working,
granting individuals the ability to perform their tasks from any place and
at any given time. Whether one is on the go or working outside a traditional
office environment, mobile phones empower them to efficiently accomplish
their work. The flexibility offered by these devices ensures convenient and
effective work operations, regardless of the individual's location.
15. Calculator - users of mobile phones now have a convenient tool for
performing mathematical calculations with the capabilities of a calculator.
8
Users can conduct several calculations on their mobile devices, such as
addition, subtraction, multiplication, and division, with an integrated
calculator app. Scientific operation, memory storage, and percentage
calculations are common extras on calculators.
17. Access to News, Sports, and Live Events - mobile phones offer instant
access to news, sports updates, and live events, keeping users informed
and engaged. Through news apps, websites, and social media platforms,
users can stay updated with current events, breaking news, and
personalized news preferences. Sports enthusiasts can follow their favorite
teams, track scores, and watch live matches through dedicated sports
apps or streaming services.
18. Web Browse - with mobile web browsers, users can access websites,
search for information, and browse online content. Mobile-friendly
versions of websites ensure optimized viewing and navigation on smaller
screens.
19. Edit & Scan Documents -mobile phones provide convenient tools for
editing and scanning documents, offering practical solutions for
productivity on the go. Document editing apps enable users to create,
modify, and format text documents, spreadsheets, and presentations
directly on their mobile devices.
9
documents and eventually send their works through online submission. If
there is a wireless internet connection, you can use this gadget with it.
Well how was it? Truly mobile devices are very vital in our life. Our
access to information is very broad due to technology. As years passed by,
these mobile devices have evolved and continue to improve their ability to
share information and a variety of data that is needed in our daily lives.
10
Let’s Try This
_________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
11
Let’s See What Have You Learned
2. One of the practical tools of mobile phones that offers illumination and
provides immediate light in dark environments.
a. calculator c. photos
b. flashlight d. web browser
3. This apps is used to look for the location of the destination you are
looking for.
a. calculator c. maps
b. photos d. calendar
5. Which icon on a mobile phone allows users to capture and store visual
a. photos c. making e-notes
b. Making video d. sending text message
12
Lesson
Practicing Safe and Ethical
2 Use of Mobile Devices
You have learned in lesson 1 regarding mobile devices, samples and its
important applications that you can use in your daily life. It is also important
that one must practice safe use of mobile devices especially using this kind of
technologies that are susceptible to cybercrime.
• phishing
• identity theft
13
Let’s Do This
Before you begin studying this module, read the situation below and
check Yes if you have practiced it and No if you have not practiced it.
Activity
Yes No
14
Let’s Study and Analyze
15
If you defame someone when you write comments that damage the good
reputation of someone and involves defamatory or prejudicial statements that
harm the integrity, reputation, or character of an individual on the different
networking sites, (e.g., thru FB page post, Twitter, emails, blogs, etc.) or other
digital means of communication is a Cyber libel punishable under RA 10175
and the revised Penal Code(Section 355). So, the next time you post a
comment, be very careful about what you write.
Fill in the blanks with the correct word/s from the box below. Do this
on a separate sheet of paper.
16
Let’s See What You Have Learned
Read the following scenarios. Identify and explain the possible danger
presented in each scenario to the user. Write your answer on a separate sheet
of paper.
_____________________________________________________________________
_____________________________________________________________________
C. Siday called her friend whom she has known for over a week because
she wanted to send and email to her company. Due to poor signal of
internet connection, she asked her friend to open her email and gave
her password to her friend.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
17
Let’s Remember and Review
• Mobile devices are small and lightweight devices that are designed for
people who need to accomplish tasks wherever they are. This is also
referred to as handheld devices.
• Mobile Computer is a portable gadget that a person may take with them
wherever they go.
• Identity theft is when someone steals your identity and uses it to commit
crimes.
• Cyber law is a legal system that deals with activities over the internet.
Cyber law in the Philippines is hereby implemented through Republic Act
10175, the Cybercrime Prevention Act of 2012.This cybercrime Prevention
Act was signed by President Aquino on September 12, 2012.
• Cyber libel is when you write comments that damage the good reputation
of someone and involves defamatory or prejudicial statements that harm
the integrity, reputation, or character of an individual.
18
What Have You Learned?
1. What would you do if you saw one of your friends posted her newly
claimed government ID on social media?
a. I will share it on my profile.
b. I will advise her to delete her post for her security.
c. I will tag others to give comments about it.
d. I will like her post.
2. What crime is committed when the victims were contacted via email,
text messages and pretending they are from a reliable
institution/company.
a. Phishing c. Cyber Libel
b. Identity Theft d. Cyber Law
19
4. What crime is committed when a person’s personal information such
as usernames and passwords is illegally and dishonestly obtained?
a. Identity Theft c. Phishing
b. Cyber Law d. Cyber libel
20
21
Possible Answer
1. What can mobile device do?
Mobile devices can make phone calls, send text messages, surf the
Internet, use applications, play games, take photos and videos, play
music and videos, navigate by GPS, and more.
2. How important is your smartphone in your life?
My smartphone is very important in my life because it helps me stay
connected, organized and informed, serving as a valuable tool for
communication, productivity and entertainment.
3. Are mobile phone necessary? Why?
Mobile phones are important because this is a necessity. They
provide communication, information processing, convenience and
ease of internet connectivity, offer a wide range of applications, and
act as portable entertainment devices.
Why? Because of communication, internet access, mobility,
entertainment, productivity, accessing, emergency situations,
emergency situations, photography, information access, and social
connectivity.
Lesson 1
Let’s See What You Already Know
1. Sharing personal information and password with friends and family.
2. Using the device responsibly and respectfully towards other.
3. Disabling unnecessary app permission.
4. Enabling biometric authentication, such as fingerprint or face
recognition.
5. Overcharging the device overnight.
6. Delete the messages without opening any links or attachments.
7. It allows you to use your data if the device is lost, stolen, or damaged
8. 8.Sending threatening or harassing messages to someone through
mobile devices.
9. It maintains trust and foster healthy relationships.
10. Recycle it properly or donate it after securely wiping your data.
Answer Key
22
What Have You Learned Let’s See What Have You
A. 1. True Learned
2. True Answer may vary
3. False
4. False
5. True
Let’s Try This
B. 1. B Possible answers:
2. A
3. B 1. Cyber libel
4. A 2. R.A. 10175
5. 3. Identify Theft
4. Cyber Law
5. Phishing
Lesson 2
Let’s Try This
Let’s Do This
Answer may vary Possible answers:
• Mobile phones are a portable
device that allows users to
make calls, send messages,
Let’s See What Have You access the internet, and use
Learned? various applications.
1. A • Essential tools for
2. B communication, information
3. C
access, and multitasking in
4. A
5. B our daily lives.
Glossary
Laptop - a computer that is portable and suitable for use while traveling
23
References
24
For inquiries or feedback, please write or call:
25