SlideShare a Scribd company logo
1 of 20
Download to read offline
Empowerment
Technologies
Quarter 1 – Module 2:
Netiquettes
CO_Q1_Empowerment Technologies SHS
Module 2
Empowerment Technologies
Alternative Delivery Mode
Quarter 1 – Module 2 Netiquettes
First Edition, 2019
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Published by the Department of Education
Secretary:
Undersecretary:
Assistant Secretary:
Printed in the Philippines by ________________________
Department of Education – National Capital Region
Office Address: Misamis St., Bago Bantay, Quezon City____________
____________________________________________
Telefax: 02-929-0153__________________________________
E-mail Address: depedncr@deped.gov.ph________________________
Development Team of the Module
Author: Merry Grace V. Manucduc
Editor: Grace T. Balverde
Reviewers: Lorena Mutas
Illustrator: Amado Banawa
Layout Artist: Melody De Castro
Management Team: Malcom S. Garma, Director IV
Genia V. Santos, CLMD Chief
Dennis M. Mendoza, Regional EPS In Charge of LRMS
Micah S. Pacheco, Regional ADM Coordinator
Loida O. Balasa, CID Chief
Grace R. Nieves, Division EPS In Charge of LRMS
Lorena J. Mutas, Division ADM Coordinator
Empowerment
Technologies
Quarter 1 – Module:2
Netiquettes
Introductory Message
This Self-Learning Module (SLM) is prepared so that you, our dear learners,
can continue your studies and learn while at home. Activities, questions, directions,
exercises, and discussions are carefully stated for you to understand each lesson.
Each SLM is composed of different parts. Each part shall guide you step-by-
step as you discover and understand the lesson prepared for you.
Pre-tests are provided to measure your prior knowledge on lessons in each
SLM. This will tell you if you need to proceed on completing this module or if you
need to ask your facilitator or your teacher’s assistance for better understanding of
the lesson. At the end of each module, you need to answer the post-test to self-check
your learning. Answer keys are provided for each activity and test. We trust that you
will be honest in using these.
In addition to the material in the main text, Notes to the Teacher are also
provided to our facilitators and parents for strategies and reminders on how they can
best help you on your home-based learning.
Please use this module with care. Do not put unnecessary marks on any part
of this SLM. Use a separate sheet of paper in answering the exercises and tests. And
read the instructions carefully before performing each task.
If you have any questions in using this SLM or any difficulty in answering the
tasks in this module, do not hesitate to consult your teacher or facilitator.
Thank you.
1
CO_Q1_Empowerment Technologies SHS
Module 2
What I Need to Know
This module was designed and written with you in mind. It is here to help you
apply online safety, security, ethics, etiquette standards, and practice in using ICTs
related to your specific professional tracks. The scope of this module permits it to be
used in different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.
The module mainly explains and instructs learners about Netiquettes or
online etiquette.
After going through this module, you are expected to:
1. compare and contrast the nuances of varied online platforms, sites, and
content to achieve specific class objectives or address situational challenges;
2. apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks; and
3. use the Internet as a tool for credible research and information gathering to
achieve specific class objectives and or address situations.
2
CO_Q1_Empowerment Technologies SHS
Module 2
What I Know
Privacy, security, and good netizenship are essential words that you have to
remember when you are on the Internet. Do you know your limitations in social
media? Do you feel responsible for what you are posting? Do you think first before
you click? Let us find out!
Answer Yes, if you agree with the statement, and No, if you disagree. Write
your answer on the blank before each number.
___________1. My computer has an antivirus, so it is okay to open most email
attachments like e-cards and video files.
___________2. Your friend told you that his college application was rejected because
you posted a video of him doing crazy stuff at a party. You posted the
video several years ago but later took it down to protect your friend's
reputation. Is it possible that the college found the video?
___________3. You and your best friend play a lot of video games. One time, she asks
you for your password so she can help you level up and get in-game
money. She promises to keep your password a secret. Is it okay to give
away your password?
___________4. You received an email stating that your mother's bank account is going
to be forfeited if you do not respond to the email. Is it safe to reply?
___________5. You forgot that your essay for English class is due tomorrow. While
doing your research, you found a website offering free essays.
___________6. There is a danger in posting information about a future vacation.
___________7. Letting people know your birthday is probably a must if you want to
get as many gifts as possible. But having it in your profile makes you
vulnerable to identity theft.
___________8. If there is no copyright notice, it's okay to copy a Web page.
___________9. Lurking is sometimes considered impolite. It is the practice of reading
discussions without contributing to them
___________10. Your cousin asked for your fabulous zucchini cake recipe at the last
family function. While you're sending it to him, you decide to e-mail
it to all 500 people in your address book as well. It is an example of
email spam.
3
CO_Q1_Empowerment Technologies SHS
Module 2
____________11. If someone insults and uses offensive language towards you online,
you should reply in the same manner.
_____________12. If someone uses offensive language online, always respond and
not worry as no one knows who you are online.
_____________13. It is ok to constantly give our friends e-mail or items online which
they do not need.
_____________14. Remember your audience. If you are putting something on a web
page remember that everyone in the world will have access to it.
_____________15. You are responsible for your actions on the internet.
4
CO_Q1_Empowerment Technologies SHS
Module 2
Lesson
3 Netiquettes
In this generation, people are dependent on the Internet. Like how people
socialize face to face, we should follow etiquette at all times as it mirrors our
personality. Being on different platforms, we should be aware of our actions and
protect ourselves at the same time. Remember that once something has been shared
online, it cannot be deleted.
What's In
This lesson provides information about Netiquette. It will serve as your guide
on how to behave appropriately online. It is vital to use Netiquette because
communication online is non-verbal. Most often, online discussion consists of
reading something someone else’s has typed.
Notes to the Teacher
Ask the students of their own rules of thumb in using the
Internet, especially social media.
5
CO_Q1_Empowerment Technologies SHS
Module 2
What's New
Compare and contrast the scenario in the picture. Describe how Jimmy and
Boggart are the same and different and in using social media. Plot your answer in
the Venn diagram.
Jimmy Boggart
6
CO_Q1_Empowerment Technologies SHS
Module 2
What is It
Core Rules of Netiquette
Netiquette, or network etiquette, is concerned with the "proper" manner of
communication in the online environment. Whenever you communicate in the virtual
world, consider the following "rules," adapted from Virginia Shea's Core Rules of
Netiquette.
Rule 1: Remember the Human
When communicating electronically, whether through email, instant message,
discussion post, text, or another method, practice the Golden Rule: Do unto others
as you would have others do unto you. Remember, your written words are read by
real people, all deserving of respectful communication. Before you press "send" or
"submit," ask yourself, "Would I be okay with this if someone else had written it?"
Rule 2: Adhere to the same standards of behavior online that you follow in real
life
While it can be argued that standards of behavior may be different in the
virtual world, they certainly should not be lower. You should do your best to act
within the laws and ethical manners of society whenever you inhabit "cyberspace."
Would you behave rudely to someone face-to-face? On most occasions, no. Neither
should you behave this way in the virtual world.
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea, 1994) Depending on where
you are in the virtual world, the same written communication can be acceptable in
one area, where it might be considered inappropriate in another. What you text to a
friend may not be appropriate in an email to a classmate or colleague. Can you think
of another example?
Rule 4: Respect other people's time and bandwidth
Electronic communication takes time: time to read and time in which to
respond. Most people today lead busy lives, just like you do, and don't have time to
read or respond to frivolous emails or discussion posts. As a virtual world
communicator, it is your responsibility to make sure that the time spent reading your
words isn't wasted. Make your written communication meaningful and to the point,
without extraneous text or superfluous graphics or attachments that may take
forever to download.
Rule 5: Make yourself look good online
One of the virtual world's best things is the lack of judgment associated with
your physical appearance, the sound of your voice, or the clothes you wear (unless
7
CO_Q1_Empowerment Technologies SHS
Module 2
you post a video of yourself singing Karaoke in a clown outfit.) The quality of your
writing will judge you, so keep the following tips in mind:
Always check for spelling and grammar errors
Know what you're talking about and state it clearly
Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is the ease in which
information can be shared or accessed, and in fact, this "information sharing"
capability is one of the reasons the Internet was founded. So in the spirit of the
Internet's "founding fathers," share what you know! When you post a question and
receive intelligent answers, share the results with others. Are you an expert at
something? Post resources and references for your subject matter. You have recently
expanded your knowledge about a subject that might be of interest to others? Share
that as well.
Rule 7: Help keep flame wars under control
What is meant by "flaming" and "flame wars?" "Flaming is what people do
when they express a strongly held opinion without holding back any emotion." (Shea,
1994). As an example, think of the kinds of passionate comments you might read on
a sports blog. While "flaming" is not necessarily forbidden in virtual communication,
"flame wars," when two or three people exchange angry posts between one another,
must be controlled, or the camaraderie of the group could be compromised. Don't
feed the flames; extinguish them by guiding the discussion back to a more productive
direction.
Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world, be it an online class
discussion forum, Facebook page, or an email, you may be exposed to some private
or personal information that needs to be handled with care. Perhaps someone is
sharing some medical news about a loved one or discussing a situation at work. What
do you think would happen if this information "got into the wrong hands?"
Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect
your privacy, so should you respect the privacy of others. Be sure to err on the side
of caution when deciding to discuss or not to discuss virtual communication.
Rule 9: Don't abuse your power
Like in face-to-face situations, there are people in cyberspace who have more
"power" than others. They have more expertise in technology or have years of
experience in a particular skill or subject matter. Maybe it is you who possesses all
of this knowledge and power! Just remember: knowing more than others do or having
more power than others may have does not give you the right to take advantage of
anyone. Think of Rule 1: Remember the human.
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience working in the virtual world.
And not everyone knows the rules of Netiquette. At some point, you will see a stupid
8
CO_Q1_Empowerment Technologies SHS
Module 2
question, read an unnecessarily long response, or encounter misspelled words; when
this happens, practice kindness and forgiveness as you would hope someone would
do if you had committed the same offense. If it's a minor "offense," you might want
to let it slide. If you feel compelled to respond to a mistake, do so in a private email
rather than a public forum.
Shea, V. (1994). Core Rules of Netiquette. Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html
What's More
Let's Reflect!
Make a reflection on the importance of using Netiquette in your daily life.
What benefits can you get from it? How can you promote the use of these regulations?
How can Netiquette be
beneficial to me?
How can I promote
Netiquette?
9
CO_Q1_Empowerment Technologies SHS
Module 2
What I Have Learned
Accomplish the items below using what you have learned from the Ten Rules of
Netiquette.
1. In cyberspace, it is important to remember the ________________. “Do unto
others as you would have others do unto you.”
2. Why are spelling and grammar crucial on the Internet?
3. Is it okay to read other people's files and emails without their permission?
Why?
4. What do you need to be careful about if you are in control of a network?
5. What should you do about a newbie who continually makes the same error
on the Internet?
10
CO_Q1_Empowerment Technologies SHS
Module 2
What I Can Do
Now it’s time to show your creativity!
Create a poster showing the Netiquette rules with examples of how you can
use them in your daily life, primarily online. The poster should use an interactive
online tool like Canva, Glogster, Piktochart, etc.
Take note of the criteria:
Relevance to the topic 30%
Layout and design 40%
Originality 10%
Creativity 20%
Total 100%
11
CO_Q1_Empowerment Technologies SHS
Module 2
Assessment
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.
1. What is Netiquette?
A. Using a net to catch fish
B. Being mean to other people on Facebook
C. Presenting proper manners at the dinner table
D. Showing manners and etiquette on the Internet
2. What should you do if you receive a text or email from someone you don't
know?
A. Call the police
B. Delete it without opening it
C. Open it immediately and reply
D. Leave it in your inbox until you figure out who it is
3. Which of the following should you never give on the Internet?
A. Your age
B. Your name
C. Your address
D. All of the above
4. What should you do to avoid being cyber-bullied?
A. Observe proper netiquette rules
B. Give out personal information to anyone who asks
C. Ignore any requests from people to be your friend online
D. Strike first - post mean things about other people on your
Facebook Wall
5. What should you do if you feel you are being cyber-bullied?
A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Internet
6. What should you never do if you get an embarrassing picture from someone?
A. Talk to the person again
B. Send it on to other friends
C. Tell your parents or a teacher
D. Discourage the person from sending pictures like that
7. What should you avoid doing in a chat room?
A. Posting your address
B. Posting your phone number
C. Revealing financial information
D. All of the above
12
CO_Q1_Empowerment Technologies SHS
Module 2
8. It is OK to forward or post an email message that you received if_____________
A. The message is typed in all capital letters
B. It does not contain any copyrighted material
C. The author of the message has marked it as confidential.
D. The author of the message hasn’t given you permission to forward
or post it
9. Before posting to a discussion group you should _____________________
A. Read the FAQ
B. Find the Frequently Asked Questions (FAQ) document
C. Read some of the existing posts to get an idea of the tone and
character of the group
D. All of the above.
10. A flame is _____________________________
A. An online chain letter
B. An expert programmer
C. A person who consistently breaks the rules of Netiquette
D. a post or email message that expresses a strong opinion or
criticism
11. The Golden Rule of Netiquette is __________________________
A. Remember the human!
B. A smiley in every message
C. Don't follow the rules of netiquette
D. Type in all caps when you're angry.
12. Spamming is very poor Netiquette and means ____________________
A. Spilling the juice of meat-byproducts into your keyboard
B. Sending in lines of nonsensical garbage in a chat conversation
C. Posting or emailing unsolicited advertising messages to a wide
audience.
D. Posting a message that contains graphic descriptions of
something really gross
13
CO_Q1_Empowerment Technologies SHS
Module 2
13. Knowledge and understanding of netiquette is useful because _________
A. It will help you create a positive impression on those you meet in
cyberspace
B. It explains the conventions already being used by millions of
cybernauts
C. It explains some of the technical limitations of online
communications
D. all of the above.
14. You've been sent a virus warning, what should you do now?
A. Ignore it.
B. Forward it within your company.
C. Forward it to everyone in your address book.
D. Go to a security Web site to learn if it is a real virus.
15. As a common courtesy, when in a chat room you should:
A. Report disruptive users
B. Introduce yourself when you enter a room
C. Make it clear when you are directing a question or response to a
specific user
D. All of the above
14
CO_Q1_Empowerment Technologies SHS
Module 2
Additional Activity
Like any other rules, what you have learned from this lesson could be applied
to any task you do. So start doing your part as a student and as you take steps in
preparing for your future.
What profession do you prefer to have in the future? In what way could you
make an impact on society using the Internet? Answer the following question in essay
form. (Use a separate sheet of paper)
Relevance to the topic 10%
Content 40%
Organization and format 10%
Word Choice, Sentence Variety and
Structure
20%
Grammar and Mechanics 20%
Total 100%
15
CO_Q1_Empowerment Technologies SHS
Module 2
Answer Key
References
Innovative Training Works, I. (2006). Empowerment Technologies. In I. Innovative
Training Works, Empowerment Technologies (p. 19). Rex Bookstore.
Shea, V. (1994). Core Rules of Netiquette. Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html
Assessment
1.
D
2.
D
3.
D
4.
A
5.
C
6.
D
7.
D
8.
B
9.
D
10.D
11.A
12.C
13.D
14.D
15.D
What
I
Know
1.
No
2.
Yes
3.
No
4.
No
5.
No
6.
Yes
7.
Yes
8.
No
9.
Yes
10.
Yes
11.
No
12.
No
13.
No
14.
Yes
15.
Yes
For inquiries or feedback, please write or call:
Department of Education - Bureau of Learning Resources (DepEd-BLR)
Ground Floor, Bonifacio Bldg., DepEd Complex
Meralco Avenue, Pasig City, Philippines 1600
Telefax: (632) 8634-1072; 8634-1054; 8631-4985
Email Address: blr.lrqad@deped.gov.ph * blr.lrpd@deped.gov.ph

More Related Content

What's hot

Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfEricAntonio9
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Empowerment Technology Lesson 5
Empowerment Technology Lesson 5Empowerment Technology Lesson 5
Empowerment Technology Lesson 5alicelagajino
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvVivienPastores1
 
Types of Media - Media and Information Literacy (MIL)
Types of Media - Media and Information Literacy (MIL)Types of Media - Media and Information Literacy (MIL)
Types of Media - Media and Information Literacy (MIL)Mark Jhon Oxillo
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Jesus Rances
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Jesus Rances
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Opportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationOpportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationHazel Lorenzo
 
Advanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesAdvanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesMark Jhon Oxillo
 
Mga kasanayan sa mapanuring pagbasa
Mga kasanayan sa mapanuring pagbasaMga kasanayan sa mapanuring pagbasa
Mga kasanayan sa mapanuring pagbasaRochelle Nato
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictDexter Dizon
 

What's hot (20)

Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Empowerment Technology Lesson 5
Empowerment Technology Lesson 5Empowerment Technology Lesson 5
Empowerment Technology Lesson 5
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
 
Types of Media - Media and Information Literacy (MIL)
Types of Media - Media and Information Literacy (MIL)Types of Media - Media and Information Literacy (MIL)
Types of Media - Media and Information Literacy (MIL)
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Opportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationOpportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media Information
 
Advanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesAdvanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment Technologies
 
Mga kasanayan sa mapanuring pagbasa
Mga kasanayan sa mapanuring pagbasaMga kasanayan sa mapanuring pagbasa
Mga kasanayan sa mapanuring pagbasa
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ict
 

Similar to Admshs emp tech_q1_m2_netiquettes

Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8 Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8 Jaypee Tan
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Cyber safety
Cyber safetyCyber safety
Cyber safety10715050
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipAplus Admin
 
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdfEAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdfLeah Condina
 
English9_q1_mod1_Modals_V1.pdf
English9_q1_mod1_Modals_V1.pdfEnglish9_q1_mod1_Modals_V1.pdf
English9_q1_mod1_Modals_V1.pdfMayettiSpaghettini
 
ADM-English-8-Q1-L1 (1).pdf
ADM-English-8-Q1-L1 (1).pdfADM-English-8-Q1-L1 (1).pdf
ADM-English-8-Q1-L1 (1).pdfJazwyneMiao
 
ADM_PHILO_MODULE-3.pdf
ADM_PHILO_MODULE-3.pdfADM_PHILO_MODULE-3.pdf
ADM_PHILO_MODULE-3.pdfArthurRabangJr
 
Performing Computer Operations.pdf
Performing Computer Operations.pdfPerforming Computer Operations.pdf
Performing Computer Operations.pdfsuertezaragosa2
 
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdfCopy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdfVeeYbanez
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxacademicjfurio
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspaceJanealW
 
FRIT 7739 - Collaborative Unit on Digital Citizenship
FRIT 7739 - Collaborative Unit on Digital CitizenshipFRIT 7739 - Collaborative Unit on Digital Citizenship
FRIT 7739 - Collaborative Unit on Digital CitizenshipMeagan Harrelson
 

Similar to Admshs emp tech_q1_m2_netiquettes (20)

MIL_Q1_M3.pdf
MIL_Q1_M3.pdfMIL_Q1_M3.pdf
MIL_Q1_M3.pdf
 
Etech Q1 Module 3.pdf
Etech Q1 Module 3.pdfEtech Q1 Module 3.pdf
Etech Q1 Module 3.pdf
 
Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8 Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdfEAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
 
Compass Ky
Compass KyCompass Ky
Compass Ky
 
Cyber bullying gr8
Cyber bullying gr8Cyber bullying gr8
Cyber bullying gr8
 
English9_q1_mod1_Modals_V1.pdf
English9_q1_mod1_Modals_V1.pdfEnglish9_q1_mod1_Modals_V1.pdf
English9_q1_mod1_Modals_V1.pdf
 
Etech_Q2_M3.docx
Etech_Q2_M3.docxEtech_Q2_M3.docx
Etech_Q2_M3.docx
 
ADM-English-8-Q1-L1 (1).pdf
ADM-English-8-Q1-L1 (1).pdfADM-English-8-Q1-L1 (1).pdf
ADM-English-8-Q1-L1 (1).pdf
 
ADM_PHILO_MODULE-3.pdf
ADM_PHILO_MODULE-3.pdfADM_PHILO_MODULE-3.pdf
ADM_PHILO_MODULE-3.pdf
 
Performing Computer Operations.pdf
Performing Computer Operations.pdfPerforming Computer Operations.pdf
Performing Computer Operations.pdf
 
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdfCopy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
 
Q1 English9 Module 3.pdf
Q1 English9 Module 3.pdfQ1 English9 Module 3.pdf
Q1 English9 Module 3.pdf
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
FRIT 7739 - Collaborative Unit on Digital Citizenship
FRIT 7739 - Collaborative Unit on Digital CitizenshipFRIT 7739 - Collaborative Unit on Digital Citizenship
FRIT 7739 - Collaborative Unit on Digital Citizenship
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Admshs emp tech_q1_m2_netiquettes

  • 1. Empowerment Technologies Quarter 1 – Module 2: Netiquettes CO_Q1_Empowerment Technologies SHS Module 2
  • 2. Empowerment Technologies Alternative Delivery Mode Quarter 1 – Module 2 Netiquettes First Edition, 2019 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Undersecretary: Assistant Secretary: Printed in the Philippines by ________________________ Department of Education – National Capital Region Office Address: Misamis St., Bago Bantay, Quezon City____________ ____________________________________________ Telefax: 02-929-0153__________________________________ E-mail Address: depedncr@deped.gov.ph________________________ Development Team of the Module Author: Merry Grace V. Manucduc Editor: Grace T. Balverde Reviewers: Lorena Mutas Illustrator: Amado Banawa Layout Artist: Melody De Castro Management Team: Malcom S. Garma, Director IV Genia V. Santos, CLMD Chief Dennis M. Mendoza, Regional EPS In Charge of LRMS Micah S. Pacheco, Regional ADM Coordinator Loida O. Balasa, CID Chief Grace R. Nieves, Division EPS In Charge of LRMS Lorena J. Mutas, Division ADM Coordinator
  • 4. Introductory Message This Self-Learning Module (SLM) is prepared so that you, our dear learners, can continue your studies and learn while at home. Activities, questions, directions, exercises, and discussions are carefully stated for you to understand each lesson. Each SLM is composed of different parts. Each part shall guide you step-by- step as you discover and understand the lesson prepared for you. Pre-tests are provided to measure your prior knowledge on lessons in each SLM. This will tell you if you need to proceed on completing this module or if you need to ask your facilitator or your teacher’s assistance for better understanding of the lesson. At the end of each module, you need to answer the post-test to self-check your learning. Answer keys are provided for each activity and test. We trust that you will be honest in using these. In addition to the material in the main text, Notes to the Teacher are also provided to our facilitators and parents for strategies and reminders on how they can best help you on your home-based learning. Please use this module with care. Do not put unnecessary marks on any part of this SLM. Use a separate sheet of paper in answering the exercises and tests. And read the instructions carefully before performing each task. If you have any questions in using this SLM or any difficulty in answering the tasks in this module, do not hesitate to consult your teacher or facilitator. Thank you.
  • 5. 1 CO_Q1_Empowerment Technologies SHS Module 2 What I Need to Know This module was designed and written with you in mind. It is here to help you apply online safety, security, ethics, etiquette standards, and practice in using ICTs related to your specific professional tracks. The scope of this module permits it to be used in different learning situations. The language used recognizes the diverse vocabulary level of students. The lessons are arranged to follow the standard sequence of the course. But the order in which you read them can be changed to correspond with the textbook you are now using. The module mainly explains and instructs learners about Netiquettes or online etiquette. After going through this module, you are expected to: 1. compare and contrast the nuances of varied online platforms, sites, and content to achieve specific class objectives or address situational challenges; 2. apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks; and 3. use the Internet as a tool for credible research and information gathering to achieve specific class objectives and or address situations.
  • 6. 2 CO_Q1_Empowerment Technologies SHS Module 2 What I Know Privacy, security, and good netizenship are essential words that you have to remember when you are on the Internet. Do you know your limitations in social media? Do you feel responsible for what you are posting? Do you think first before you click? Let us find out! Answer Yes, if you agree with the statement, and No, if you disagree. Write your answer on the blank before each number. ___________1. My computer has an antivirus, so it is okay to open most email attachments like e-cards and video files. ___________2. Your friend told you that his college application was rejected because you posted a video of him doing crazy stuff at a party. You posted the video several years ago but later took it down to protect your friend's reputation. Is it possible that the college found the video? ___________3. You and your best friend play a lot of video games. One time, she asks you for your password so she can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your password? ___________4. You received an email stating that your mother's bank account is going to be forfeited if you do not respond to the email. Is it safe to reply? ___________5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a website offering free essays. ___________6. There is a danger in posting information about a future vacation. ___________7. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft. ___________8. If there is no copyright notice, it's okay to copy a Web page. ___________9. Lurking is sometimes considered impolite. It is the practice of reading discussions without contributing to them ___________10. Your cousin asked for your fabulous zucchini cake recipe at the last family function. While you're sending it to him, you decide to e-mail it to all 500 people in your address book as well. It is an example of email spam.
  • 7. 3 CO_Q1_Empowerment Technologies SHS Module 2 ____________11. If someone insults and uses offensive language towards you online, you should reply in the same manner. _____________12. If someone uses offensive language online, always respond and not worry as no one knows who you are online. _____________13. It is ok to constantly give our friends e-mail or items online which they do not need. _____________14. Remember your audience. If you are putting something on a web page remember that everyone in the world will have access to it. _____________15. You are responsible for your actions on the internet.
  • 8. 4 CO_Q1_Empowerment Technologies SHS Module 2 Lesson 3 Netiquettes In this generation, people are dependent on the Internet. Like how people socialize face to face, we should follow etiquette at all times as it mirrors our personality. Being on different platforms, we should be aware of our actions and protect ourselves at the same time. Remember that once something has been shared online, it cannot be deleted. What's In This lesson provides information about Netiquette. It will serve as your guide on how to behave appropriately online. It is vital to use Netiquette because communication online is non-verbal. Most often, online discussion consists of reading something someone else’s has typed. Notes to the Teacher Ask the students of their own rules of thumb in using the Internet, especially social media.
  • 9. 5 CO_Q1_Empowerment Technologies SHS Module 2 What's New Compare and contrast the scenario in the picture. Describe how Jimmy and Boggart are the same and different and in using social media. Plot your answer in the Venn diagram. Jimmy Boggart
  • 10. 6 CO_Q1_Empowerment Technologies SHS Module 2 What is It Core Rules of Netiquette Netiquette, or network etiquette, is concerned with the "proper" manner of communication in the online environment. Whenever you communicate in the virtual world, consider the following "rules," adapted from Virginia Shea's Core Rules of Netiquette. Rule 1: Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?" Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world. Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example? Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download. Rule 5: Make yourself look good online One of the virtual world's best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless
  • 11. 7 CO_Q1_Empowerment Technologies SHS Module 2 you post a video of yourself singing Karaoke in a clown outfit.) The quality of your writing will judge you, so keep the following tips in mind: Always check for spelling and grammar errors Know what you're talking about and state it clearly Be pleasant and polite Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references for your subject matter. You have recently expanded your knowledge about a subject that might be of interest to others? Share that as well. Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction. Rule 8: Respect other people's privacy Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication. Rule 9: Don't abuse your power Like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or have years of experience in a particular skill or subject matter. Maybe it is you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human. Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of Netiquette. At some point, you will see a stupid
  • 12. 8 CO_Q1_Empowerment Technologies SHS Module 2 question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum. Shea, V. (1994). Core Rules of Netiquette. Retrieved from http:/coursedesign.colostate.edu/obj/corerulesnet.html What's More Let's Reflect! Make a reflection on the importance of using Netiquette in your daily life. What benefits can you get from it? How can you promote the use of these regulations? How can Netiquette be beneficial to me? How can I promote Netiquette?
  • 13. 9 CO_Q1_Empowerment Technologies SHS Module 2 What I Have Learned Accomplish the items below using what you have learned from the Ten Rules of Netiquette. 1. In cyberspace, it is important to remember the ________________. “Do unto others as you would have others do unto you.” 2. Why are spelling and grammar crucial on the Internet? 3. Is it okay to read other people's files and emails without their permission? Why? 4. What do you need to be careful about if you are in control of a network? 5. What should you do about a newbie who continually makes the same error on the Internet?
  • 14. 10 CO_Q1_Empowerment Technologies SHS Module 2 What I Can Do Now it’s time to show your creativity! Create a poster showing the Netiquette rules with examples of how you can use them in your daily life, primarily online. The poster should use an interactive online tool like Canva, Glogster, Piktochart, etc. Take note of the criteria: Relevance to the topic 30% Layout and design 40% Originality 10% Creativity 20% Total 100%
  • 15. 11 CO_Q1_Empowerment Technologies SHS Module 2 Assessment Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the letter of the best answer and write it in your notebook. 1. What is Netiquette? A. Using a net to catch fish B. Being mean to other people on Facebook C. Presenting proper manners at the dinner table D. Showing manners and etiquette on the Internet 2. What should you do if you receive a text or email from someone you don't know? A. Call the police B. Delete it without opening it C. Open it immediately and reply D. Leave it in your inbox until you figure out who it is 3. Which of the following should you never give on the Internet? A. Your age B. Your name C. Your address D. All of the above 4. What should you do to avoid being cyber-bullied? A. Observe proper netiquette rules B. Give out personal information to anyone who asks C. Ignore any requests from people to be your friend online D. Strike first - post mean things about other people on your Facebook Wall 5. What should you do if you feel you are being cyber-bullied? A. Call the police B. Tell no one, it's embarrassing C. Tell a trusted adult like a parent or teacher D. Just delete anything referring to you on the Internet 6. What should you never do if you get an embarrassing picture from someone? A. Talk to the person again B. Send it on to other friends C. Tell your parents or a teacher D. Discourage the person from sending pictures like that 7. What should you avoid doing in a chat room? A. Posting your address B. Posting your phone number C. Revealing financial information D. All of the above
  • 16. 12 CO_Q1_Empowerment Technologies SHS Module 2 8. It is OK to forward or post an email message that you received if_____________ A. The message is typed in all capital letters B. It does not contain any copyrighted material C. The author of the message has marked it as confidential. D. The author of the message hasn’t given you permission to forward or post it 9. Before posting to a discussion group you should _____________________ A. Read the FAQ B. Find the Frequently Asked Questions (FAQ) document C. Read some of the existing posts to get an idea of the tone and character of the group D. All of the above. 10. A flame is _____________________________ A. An online chain letter B. An expert programmer C. A person who consistently breaks the rules of Netiquette D. a post or email message that expresses a strong opinion or criticism 11. The Golden Rule of Netiquette is __________________________ A. Remember the human! B. A smiley in every message C. Don't follow the rules of netiquette D. Type in all caps when you're angry. 12. Spamming is very poor Netiquette and means ____________________ A. Spilling the juice of meat-byproducts into your keyboard B. Sending in lines of nonsensical garbage in a chat conversation C. Posting or emailing unsolicited advertising messages to a wide audience. D. Posting a message that contains graphic descriptions of something really gross
  • 17. 13 CO_Q1_Empowerment Technologies SHS Module 2 13. Knowledge and understanding of netiquette is useful because _________ A. It will help you create a positive impression on those you meet in cyberspace B. It explains the conventions already being used by millions of cybernauts C. It explains some of the technical limitations of online communications D. all of the above. 14. You've been sent a virus warning, what should you do now? A. Ignore it. B. Forward it within your company. C. Forward it to everyone in your address book. D. Go to a security Web site to learn if it is a real virus. 15. As a common courtesy, when in a chat room you should: A. Report disruptive users B. Introduce yourself when you enter a room C. Make it clear when you are directing a question or response to a specific user D. All of the above
  • 18. 14 CO_Q1_Empowerment Technologies SHS Module 2 Additional Activity Like any other rules, what you have learned from this lesson could be applied to any task you do. So start doing your part as a student and as you take steps in preparing for your future. What profession do you prefer to have in the future? In what way could you make an impact on society using the Internet? Answer the following question in essay form. (Use a separate sheet of paper) Relevance to the topic 10% Content 40% Organization and format 10% Word Choice, Sentence Variety and Structure 20% Grammar and Mechanics 20% Total 100%
  • 19. 15 CO_Q1_Empowerment Technologies SHS Module 2 Answer Key References Innovative Training Works, I. (2006). Empowerment Technologies. In I. Innovative Training Works, Empowerment Technologies (p. 19). Rex Bookstore. Shea, V. (1994). Core Rules of Netiquette. Retrieved from http:/coursedesign.colostate.edu/obj/corerulesnet.html Assessment 1. D 2. D 3. D 4. A 5. C 6. D 7. D 8. B 9. D 10.D 11.A 12.C 13.D 14.D 15.D What I Know 1. No 2. Yes 3. No 4. No 5. No 6. Yes 7. Yes 8. No 9. Yes 10. Yes 11. No 12. No 13. No 14. Yes 15. Yes
  • 20. For inquiries or feedback, please write or call: Department of Education - Bureau of Learning Resources (DepEd-BLR) Ground Floor, Bonifacio Bldg., DepEd Complex Meralco Avenue, Pasig City, Philippines 1600 Telefax: (632) 8634-1072; 8634-1054; 8631-4985 Email Address: blr.lrqad@deped.gov.ph * blr.lrpd@deped.gov.ph