SlideShare a Scribd company logo
Empowerment
Technologies
Quarter 1 – Module 2:
Netiquettes
CO_Q1_Empowerment Technologies SHS
Module 2
Empowerment Technologies
Alternative Delivery Mode
Quarter 1 – Module 2 Netiquettes
First Edition, 2019
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Published by the Department of Education
Secretary:
Undersecretary:
Assistant Secretary:
Printed in the Philippines by ________________________
Department of Education – National Capital Region
Office Address: Misamis St., Bago Bantay, Quezon City____________
____________________________________________
Telefax: 02-929-0153__________________________________
E-mail Address: depedncr@deped.gov.ph________________________
Development Team of the Module
Author: Merry Grace V. Manucduc
Editor: Grace T. Balverde
Reviewers: Lorena Mutas
Illustrator: Amado Banawa
Layout Artist: Melody De Castro
Management Team: Malcom S. Garma, Director IV
Genia V. Santos, CLMD Chief
Dennis M. Mendoza, Regional EPS In Charge of LRMS
Micah S. Pacheco, Regional ADM Coordinator
Loida O. Balasa, CID Chief
Grace R. Nieves, Division EPS In Charge of LRMS
Lorena J. Mutas, Division ADM Coordinator
Empowerment
Technologies
Quarter 1 – Module:2
Netiquettes
Introductory Message
This Self-Learning Module (SLM) is prepared so that you, our dear learners,
can continue your studies and learn while at home. Activities, questions, directions,
exercises, and discussions are carefully stated for you to understand each lesson.
Each SLM is composed of different parts. Each part shall guide you step-by-
step as you discover and understand the lesson prepared for you.
Pre-tests are provided to measure your prior knowledge on lessons in each
SLM. This will tell you if you need to proceed on completing this module or if you
need to ask your facilitator or your teacher’s assistance for better understanding of
the lesson. At the end of each module, you need to answer the post-test to self-check
your learning. Answer keys are provided for each activity and test. We trust that you
will be honest in using these.
In addition to the material in the main text, Notes to the Teacher are also
provided to our facilitators and parents for strategies and reminders on how they can
best help you on your home-based learning.
Please use this module with care. Do not put unnecessary marks on any part
of this SLM. Use a separate sheet of paper in answering the exercises and tests. And
read the instructions carefully before performing each task.
If you have any questions in using this SLM or any difficulty in answering the
tasks in this module, do not hesitate to consult your teacher or facilitator.
Thank you.
1
CO_Q1_Empowerment Technologies SHS
Module 2
What I Need to Know
This module was designed and written with you in mind. It is here to help you
apply online safety, security, ethics, etiquette standards, and practice in using ICTs
related to your specific professional tracks. The scope of this module permits it to be
used in different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.
The module mainly explains and instructs learners about Netiquettes or
online etiquette.
After going through this module, you are expected to:
1. compare and contrast the nuances of varied online platforms, sites, and
content to achieve specific class objectives or address situational challenges;
2. apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks; and
3. use the Internet as a tool for credible research and information gathering to
achieve specific class objectives and or address situations.
2
CO_Q1_Empowerment Technologies SHS
Module 2
What I Know
Privacy, security, and good netizenship are essential words that you have to
remember when you are on the Internet. Do you know your limitations in social
media? Do you feel responsible for what you are posting? Do you think first before
you click? Let us find out!
Answer Yes, if you agree with the statement, and No, if you disagree. Write
your answer on the blank before each number.
___________1. My computer has an antivirus, so it is okay to open most email
attachments like e-cards and video files.
___________2. Your friend told you that his college application was rejected because
you posted a video of him doing crazy stuff at a party. You posted the
video several years ago but later took it down to protect your friend's
reputation. Is it possible that the college found the video?
___________3. You and your best friend play a lot of video games. One time, she asks
you for your password so she can help you level up and get in-game
money. She promises to keep your password a secret. Is it okay to give
away your password?
___________4. You received an email stating that your mother's bank account is going
to be forfeited if you do not respond to the email. Is it safe to reply?
___________5. You forgot that your essay for English class is due tomorrow. While
doing your research, you found a website offering free essays.
___________6. There is a danger in posting information about a future vacation.
___________7. Letting people know your birthday is probably a must if you want to
get as many gifts as possible. But having it in your profile makes you
vulnerable to identity theft.
___________8. If there is no copyright notice, it's okay to copy a Web page.
___________9. Lurking is sometimes considered impolite. It is the practice of reading
discussions without contributing to them
___________10. Your cousin asked for your fabulous zucchini cake recipe at the last
family function. While you're sending it to him, you decide to e-mail
it to all 500 people in your address book as well. It is an example of
email spam.
3
CO_Q1_Empowerment Technologies SHS
Module 2
____________11. If someone insults and uses offensive language towards you online,
you should reply in the same manner.
_____________12. If someone uses offensive language online, always respond and
not worry as no one knows who you are online.
_____________13. It is ok to constantly give our friends e-mail or items online which
they do not need.
_____________14. Remember your audience. If you are putting something on a web
page remember that everyone in the world will have access to it.
_____________15. You are responsible for your actions on the internet.
4
CO_Q1_Empowerment Technologies SHS
Module 2
Lesson
3 Netiquettes
In this generation, people are dependent on the Internet. Like how people
socialize face to face, we should follow etiquette at all times as it mirrors our
personality. Being on different platforms, we should be aware of our actions and
protect ourselves at the same time. Remember that once something has been shared
online, it cannot be deleted.
What's In
This lesson provides information about Netiquette. It will serve as your guide
on how to behave appropriately online. It is vital to use Netiquette because
communication online is non-verbal. Most often, online discussion consists of
reading something someone else’s has typed.
Notes to the Teacher
Ask the students of their own rules of thumb in using the
Internet, especially social media.
5
CO_Q1_Empowerment Technologies SHS
Module 2
What's New
Compare and contrast the scenario in the picture. Describe how Jimmy and
Boggart are the same and different and in using social media. Plot your answer in
the Venn diagram.
Jimmy Boggart
6
CO_Q1_Empowerment Technologies SHS
Module 2
What is It
Core Rules of Netiquette
Netiquette, or network etiquette, is concerned with the "proper" manner of
communication in the online environment. Whenever you communicate in the virtual
world, consider the following "rules," adapted from Virginia Shea's Core Rules of
Netiquette.
Rule 1: Remember the Human
When communicating electronically, whether through email, instant message,
discussion post, text, or another method, practice the Golden Rule: Do unto others
as you would have others do unto you. Remember, your written words are read by
real people, all deserving of respectful communication. Before you press "send" or
"submit," ask yourself, "Would I be okay with this if someone else had written it?"
Rule 2: Adhere to the same standards of behavior online that you follow in real
life
While it can be argued that standards of behavior may be different in the
virtual world, they certainly should not be lower. You should do your best to act
within the laws and ethical manners of society whenever you inhabit "cyberspace."
Would you behave rudely to someone face-to-face? On most occasions, no. Neither
should you behave this way in the virtual world.
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea, 1994) Depending on where
you are in the virtual world, the same written communication can be acceptable in
one area, where it might be considered inappropriate in another. What you text to a
friend may not be appropriate in an email to a classmate or colleague. Can you think
of another example?
Rule 4: Respect other people's time and bandwidth
Electronic communication takes time: time to read and time in which to
respond. Most people today lead busy lives, just like you do, and don't have time to
read or respond to frivolous emails or discussion posts. As a virtual world
communicator, it is your responsibility to make sure that the time spent reading your
words isn't wasted. Make your written communication meaningful and to the point,
without extraneous text or superfluous graphics or attachments that may take
forever to download.
Rule 5: Make yourself look good online
One of the virtual world's best things is the lack of judgment associated with
your physical appearance, the sound of your voice, or the clothes you wear (unless
7
CO_Q1_Empowerment Technologies SHS
Module 2
you post a video of yourself singing Karaoke in a clown outfit.) The quality of your
writing will judge you, so keep the following tips in mind:
Always check for spelling and grammar errors
Know what you're talking about and state it clearly
Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is the ease in which
information can be shared or accessed, and in fact, this "information sharing"
capability is one of the reasons the Internet was founded. So in the spirit of the
Internet's "founding fathers," share what you know! When you post a question and
receive intelligent answers, share the results with others. Are you an expert at
something? Post resources and references for your subject matter. You have recently
expanded your knowledge about a subject that might be of interest to others? Share
that as well.
Rule 7: Help keep flame wars under control
What is meant by "flaming" and "flame wars?" "Flaming is what people do
when they express a strongly held opinion without holding back any emotion." (Shea,
1994). As an example, think of the kinds of passionate comments you might read on
a sports blog. While "flaming" is not necessarily forbidden in virtual communication,
"flame wars," when two or three people exchange angry posts between one another,
must be controlled, or the camaraderie of the group could be compromised. Don't
feed the flames; extinguish them by guiding the discussion back to a more productive
direction.
Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world, be it an online class
discussion forum, Facebook page, or an email, you may be exposed to some private
or personal information that needs to be handled with care. Perhaps someone is
sharing some medical news about a loved one or discussing a situation at work. What
do you think would happen if this information "got into the wrong hands?"
Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect
your privacy, so should you respect the privacy of others. Be sure to err on the side
of caution when deciding to discuss or not to discuss virtual communication.
Rule 9: Don't abuse your power
Like in face-to-face situations, there are people in cyberspace who have more
"power" than others. They have more expertise in technology or have years of
experience in a particular skill or subject matter. Maybe it is you who possesses all
of this knowledge and power! Just remember: knowing more than others do or having
more power than others may have does not give you the right to take advantage of
anyone. Think of Rule 1: Remember the human.
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience working in the virtual world.
And not everyone knows the rules of Netiquette. At some point, you will see a stupid
8
CO_Q1_Empowerment Technologies SHS
Module 2
question, read an unnecessarily long response, or encounter misspelled words; when
this happens, practice kindness and forgiveness as you would hope someone would
do if you had committed the same offense. If it's a minor "offense," you might want
to let it slide. If you feel compelled to respond to a mistake, do so in a private email
rather than a public forum.
Shea, V. (1994). Core Rules of Netiquette. Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html
What's More
Let's Reflect!
Make a reflection on the importance of using Netiquette in your daily life.
What benefits can you get from it? How can you promote the use of these regulations?
How can Netiquette be
beneficial to me?
How can I promote
Netiquette?
9
CO_Q1_Empowerment Technologies SHS
Module 2
What I Have Learned
Accomplish the items below using what you have learned from the Ten Rules of
Netiquette.
1. In cyberspace, it is important to remember the ________________. “Do unto
others as you would have others do unto you.”
2. Why are spelling and grammar crucial on the Internet?
3. Is it okay to read other people's files and emails without their permission?
Why?
4. What do you need to be careful about if you are in control of a network?
5. What should you do about a newbie who continually makes the same error
on the Internet?
10
CO_Q1_Empowerment Technologies SHS
Module 2
What I Can Do
Now it’s time to show your creativity!
Create a poster showing the Netiquette rules with examples of how you can
use them in your daily life, primarily online. The poster should use an interactive
online tool like Canva, Glogster, Piktochart, etc.
Take note of the criteria:
Relevance to the topic 30%
Layout and design 40%
Originality 10%
Creativity 20%
Total 100%
11
CO_Q1_Empowerment Technologies SHS
Module 2
Assessment
Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the
letter of the best answer and write it in your notebook.
1. What is Netiquette?
A. Using a net to catch fish
B. Being mean to other people on Facebook
C. Presenting proper manners at the dinner table
D. Showing manners and etiquette on the Internet
2. What should you do if you receive a text or email from someone you don't
know?
A. Call the police
B. Delete it without opening it
C. Open it immediately and reply
D. Leave it in your inbox until you figure out who it is
3. Which of the following should you never give on the Internet?
A. Your age
B. Your name
C. Your address
D. All of the above
4. What should you do to avoid being cyber-bullied?
A. Observe proper netiquette rules
B. Give out personal information to anyone who asks
C. Ignore any requests from people to be your friend online
D. Strike first - post mean things about other people on your
Facebook Wall
5. What should you do if you feel you are being cyber-bullied?
A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Internet
6. What should you never do if you get an embarrassing picture from someone?
A. Talk to the person again
B. Send it on to other friends
C. Tell your parents or a teacher
D. Discourage the person from sending pictures like that
7. What should you avoid doing in a chat room?
A. Posting your address
B. Posting your phone number
C. Revealing financial information
D. All of the above
12
CO_Q1_Empowerment Technologies SHS
Module 2
8. It is OK to forward or post an email message that you received if_____________
A. The message is typed in all capital letters
B. It does not contain any copyrighted material
C. The author of the message has marked it as confidential.
D. The author of the message hasn’t given you permission to forward
or post it
9. Before posting to a discussion group you should _____________________
A. Read the FAQ
B. Find the Frequently Asked Questions (FAQ) document
C. Read some of the existing posts to get an idea of the tone and
character of the group
D. All of the above.
10. A flame is _____________________________
A. An online chain letter
B. An expert programmer
C. A person who consistently breaks the rules of Netiquette
D. a post or email message that expresses a strong opinion or
criticism
11. The Golden Rule of Netiquette is __________________________
A. Remember the human!
B. A smiley in every message
C. Don't follow the rules of netiquette
D. Type in all caps when you're angry.
12. Spamming is very poor Netiquette and means ____________________
A. Spilling the juice of meat-byproducts into your keyboard
B. Sending in lines of nonsensical garbage in a chat conversation
C. Posting or emailing unsolicited advertising messages to a wide
audience.
D. Posting a message that contains graphic descriptions of
something really gross
13
CO_Q1_Empowerment Technologies SHS
Module 2
13. Knowledge and understanding of netiquette is useful because _________
A. It will help you create a positive impression on those you meet in
cyberspace
B. It explains the conventions already being used by millions of
cybernauts
C. It explains some of the technical limitations of online
communications
D. all of the above.
14. You've been sent a virus warning, what should you do now?
A. Ignore it.
B. Forward it within your company.
C. Forward it to everyone in your address book.
D. Go to a security Web site to learn if it is a real virus.
15. As a common courtesy, when in a chat room you should:
A. Report disruptive users
B. Introduce yourself when you enter a room
C. Make it clear when you are directing a question or response to a
specific user
D. All of the above
14
CO_Q1_Empowerment Technologies SHS
Module 2
Additional Activity
Like any other rules, what you have learned from this lesson could be applied
to any task you do. So start doing your part as a student and as you take steps in
preparing for your future.
What profession do you prefer to have in the future? In what way could you
make an impact on society using the Internet? Answer the following question in essay
form. (Use a separate sheet of paper)
Relevance to the topic 10%
Content 40%
Organization and format 10%
Word Choice, Sentence Variety and
Structure
20%
Grammar and Mechanics 20%
Total 100%
15
CO_Q1_Empowerment Technologies SHS
Module 2
Answer Key
References
Innovative Training Works, I. (2006). Empowerment Technologies. In I. Innovative
Training Works, Empowerment Technologies (p. 19). Rex Bookstore.
Shea, V. (1994). Core Rules of Netiquette. Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html
Assessment
1.
D
2.
D
3.
D
4.
A
5.
C
6.
D
7.
D
8.
B
9.
D
10.D
11.A
12.C
13.D
14.D
15.D
What
I
Know
1.
No
2.
Yes
3.
No
4.
No
5.
No
6.
Yes
7.
Yes
8.
No
9.
Yes
10.
Yes
11.
No
12.
No
13.
No
14.
Yes
15.
Yes
For inquiries or feedback, please write or call:
Department of Education - Bureau of Learning Resources (DepEd-BLR)
Ground Floor, Bonifacio Bldg., DepEd Complex
Meralco Avenue, Pasig City, Philippines 1600
Telefax: (632) 8634-1072; 8634-1054; 8631-4985
Email Address: blr.lrqad@deped.gov.ph * blr.lrpd@deped.gov.ph

More Related Content

What's hot

MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
EricAntonio9
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Arniel Ping
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
Media and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information SourcesMedia and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information Sources
Arniel Ping
 
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
Arniel Ping
 
1. introduction to mil (part 1) communication, media, information, and techn...
1. introduction to mil (part 1)  communication, media, information, and techn...1. introduction to mil (part 1)  communication, media, information, and techn...
1. introduction to mil (part 1) communication, media, information, and techn...
MelvyEspanol1
 
Chapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information LiteracyChapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information Literacy
Juvywen
 
MIL module 3
MIL module 3MIL module 3
MIL module 3
Janet Tibaldo
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
levipoi
 
Media and Information Daily Log
Media and Information Daily LogMedia and Information Daily Log
Media and Information Daily Log
Melanio Florino
 
Media and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information LiteracyMedia and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information Literacy
J Q
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
danielloberiz1
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Arniel Ping
 
MIL LESSON 4.pptx
MIL LESSON 4.pptxMIL LESSON 4.pptx
MIL LESSON 4.pptx
NormanMisoles
 
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 2)- Key Conce...
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 2)- Key Conce...Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 2)- Key Conce...
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 2)- Key Conce...
Arniel Ping
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
Jesus Rances
 
Ict as platform for change group 1
Ict as platform for change group 1Ict as platform for change group 1
Ict as platform for change group 1
christian abendanio
 
Q2 LESSON 1- TRENDS IN MIL.pptx
Q2 LESSON 1- TRENDS IN MIL.pptxQ2 LESSON 1- TRENDS IN MIL.pptx
Q2 LESSON 1- TRENDS IN MIL.pptx
TRISHAMAEARIAS3
 

What's hot (20)

MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Media and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information SourcesMedia and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information Sources
 
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
 
1. introduction to mil (part 1) communication, media, information, and techn...
1. introduction to mil (part 1)  communication, media, information, and techn...1. introduction to mil (part 1)  communication, media, information, and techn...
1. introduction to mil (part 1) communication, media, information, and techn...
 
Chapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information LiteracyChapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information Literacy
 
MIL module 3
MIL module 3MIL module 3
MIL module 3
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
 
dll-WEEK 2.docx
dll-WEEK 2.docxdll-WEEK 2.docx
dll-WEEK 2.docx
 
Media and Information Daily Log
Media and Information Daily LogMedia and Information Daily Log
Media and Information Daily Log
 
Media and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information LiteracyMedia and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information Literacy
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
 
MIL LESSON 4.pptx
MIL LESSON 4.pptxMIL LESSON 4.pptx
MIL LESSON 4.pptx
 
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 2)- Key Conce...
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 2)- Key Conce...Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 2)- Key Conce...
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 2)- Key Conce...
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Ict as platform for change group 1
Ict as platform for change group 1Ict as platform for change group 1
Ict as platform for change group 1
 
Q2 LESSON 1- TRENDS IN MIL.pptx
Q2 LESSON 1- TRENDS IN MIL.pptxQ2 LESSON 1- TRENDS IN MIL.pptx
Q2 LESSON 1- TRENDS IN MIL.pptx
 

Similar to Admshs emp tech_q1_m2_netiquettes

MIL_Q1_M3.pdf
MIL_Q1_M3.pdfMIL_Q1_M3.pdf
MIL_Q1_M3.pdf
CatherineDioneda2
 
Etech Q1 Module 3.pdf
Etech Q1 Module 3.pdfEtech Q1 Module 3.pdf
Etech Q1 Module 3.pdf
MikhailaFernandez
 
Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8 Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8
Jaypee Tan
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 
Cyber safety
Cyber safetyCyber safety
Cyber safety10715050
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipAplus Admin
 
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdfEAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
Leah Condina
 
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
CristineGraceAcuyan
 
Cyber bullying gr8
Cyber bullying gr8Cyber bullying gr8
Cyber bullying gr8
Jeremy Brooks
 
English9_q1_mod1_Modals_V1.pdf
English9_q1_mod1_Modals_V1.pdfEnglish9_q1_mod1_Modals_V1.pdf
English9_q1_mod1_Modals_V1.pdf
MayettiSpaghettini
 
Etech_Q2_M3.docx
Etech_Q2_M3.docxEtech_Q2_M3.docx
Etech_Q2_M3.docx
Christopher Pontejo
 
ADM-English-8-Q1-L1 (1).pdf
ADM-English-8-Q1-L1 (1).pdfADM-English-8-Q1-L1 (1).pdf
ADM-English-8-Q1-L1 (1).pdf
JazwyneMiao
 
ADM_PHILO_MODULE-3.pdf
ADM_PHILO_MODULE-3.pdfADM_PHILO_MODULE-3.pdf
ADM_PHILO_MODULE-3.pdf
ArthurRabangJr
 
Performing Computer Operations.pdf
Performing Computer Operations.pdfPerforming Computer Operations.pdf
Performing Computer Operations.pdf
suertezaragosa2
 
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdfCopy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
VeeYbanez
 
Q1 English9 Module 3.pdf
Q1 English9 Module 3.pdfQ1 English9 Module 3.pdf
Q1 English9 Module 3.pdf
Ma. Tricia Susana
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
academicjfurio
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspaceJanealW
 
FRIT 7739 - Collaborative Unit on Digital Citizenship
FRIT 7739 - Collaborative Unit on Digital CitizenshipFRIT 7739 - Collaborative Unit on Digital Citizenship
FRIT 7739 - Collaborative Unit on Digital Citizenship
Meagan Harrelson
 

Similar to Admshs emp tech_q1_m2_netiquettes (20)

MIL_Q1_M3.pdf
MIL_Q1_M3.pdfMIL_Q1_M3.pdf
MIL_Q1_M3.pdf
 
Etech Q1 Module 3.pdf
Etech Q1 Module 3.pdfEtech Q1 Module 3.pdf
Etech Q1 Module 3.pdf
 
Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8 Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdfEAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
 
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
 
Compass Ky
Compass KyCompass Ky
Compass Ky
 
Cyber bullying gr8
Cyber bullying gr8Cyber bullying gr8
Cyber bullying gr8
 
English9_q1_mod1_Modals_V1.pdf
English9_q1_mod1_Modals_V1.pdfEnglish9_q1_mod1_Modals_V1.pdf
English9_q1_mod1_Modals_V1.pdf
 
Etech_Q2_M3.docx
Etech_Q2_M3.docxEtech_Q2_M3.docx
Etech_Q2_M3.docx
 
ADM-English-8-Q1-L1 (1).pdf
ADM-English-8-Q1-L1 (1).pdfADM-English-8-Q1-L1 (1).pdf
ADM-English-8-Q1-L1 (1).pdf
 
ADM_PHILO_MODULE-3.pdf
ADM_PHILO_MODULE-3.pdfADM_PHILO_MODULE-3.pdf
ADM_PHILO_MODULE-3.pdf
 
Performing Computer Operations.pdf
Performing Computer Operations.pdfPerforming Computer Operations.pdf
Performing Computer Operations.pdf
 
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdfCopy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
Copy-of-ORAL-COMMUNICATION11_Q1_Module2_08082020-1 (2).pdf
 
Q1 English9 Module 3.pdf
Q1 English9 Module 3.pdfQ1 English9 Module 3.pdf
Q1 English9 Module 3.pdf
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
FRIT 7739 - Collaborative Unit on Digital Citizenship
FRIT 7739 - Collaborative Unit on Digital CitizenshipFRIT 7739 - Collaborative Unit on Digital Citizenship
FRIT 7739 - Collaborative Unit on Digital Citizenship
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

Admshs emp tech_q1_m2_netiquettes

  • 1. Empowerment Technologies Quarter 1 – Module 2: Netiquettes CO_Q1_Empowerment Technologies SHS Module 2
  • 2. Empowerment Technologies Alternative Delivery Mode Quarter 1 – Module 2 Netiquettes First Edition, 2019 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Undersecretary: Assistant Secretary: Printed in the Philippines by ________________________ Department of Education – National Capital Region Office Address: Misamis St., Bago Bantay, Quezon City____________ ____________________________________________ Telefax: 02-929-0153__________________________________ E-mail Address: depedncr@deped.gov.ph________________________ Development Team of the Module Author: Merry Grace V. Manucduc Editor: Grace T. Balverde Reviewers: Lorena Mutas Illustrator: Amado Banawa Layout Artist: Melody De Castro Management Team: Malcom S. Garma, Director IV Genia V. Santos, CLMD Chief Dennis M. Mendoza, Regional EPS In Charge of LRMS Micah S. Pacheco, Regional ADM Coordinator Loida O. Balasa, CID Chief Grace R. Nieves, Division EPS In Charge of LRMS Lorena J. Mutas, Division ADM Coordinator
  • 4. Introductory Message This Self-Learning Module (SLM) is prepared so that you, our dear learners, can continue your studies and learn while at home. Activities, questions, directions, exercises, and discussions are carefully stated for you to understand each lesson. Each SLM is composed of different parts. Each part shall guide you step-by- step as you discover and understand the lesson prepared for you. Pre-tests are provided to measure your prior knowledge on lessons in each SLM. This will tell you if you need to proceed on completing this module or if you need to ask your facilitator or your teacher’s assistance for better understanding of the lesson. At the end of each module, you need to answer the post-test to self-check your learning. Answer keys are provided for each activity and test. We trust that you will be honest in using these. In addition to the material in the main text, Notes to the Teacher are also provided to our facilitators and parents for strategies and reminders on how they can best help you on your home-based learning. Please use this module with care. Do not put unnecessary marks on any part of this SLM. Use a separate sheet of paper in answering the exercises and tests. And read the instructions carefully before performing each task. If you have any questions in using this SLM or any difficulty in answering the tasks in this module, do not hesitate to consult your teacher or facilitator. Thank you.
  • 5. 1 CO_Q1_Empowerment Technologies SHS Module 2 What I Need to Know This module was designed and written with you in mind. It is here to help you apply online safety, security, ethics, etiquette standards, and practice in using ICTs related to your specific professional tracks. The scope of this module permits it to be used in different learning situations. The language used recognizes the diverse vocabulary level of students. The lessons are arranged to follow the standard sequence of the course. But the order in which you read them can be changed to correspond with the textbook you are now using. The module mainly explains and instructs learners about Netiquettes or online etiquette. After going through this module, you are expected to: 1. compare and contrast the nuances of varied online platforms, sites, and content to achieve specific class objectives or address situational challenges; 2. apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks; and 3. use the Internet as a tool for credible research and information gathering to achieve specific class objectives and or address situations.
  • 6. 2 CO_Q1_Empowerment Technologies SHS Module 2 What I Know Privacy, security, and good netizenship are essential words that you have to remember when you are on the Internet. Do you know your limitations in social media? Do you feel responsible for what you are posting? Do you think first before you click? Let us find out! Answer Yes, if you agree with the statement, and No, if you disagree. Write your answer on the blank before each number. ___________1. My computer has an antivirus, so it is okay to open most email attachments like e-cards and video files. ___________2. Your friend told you that his college application was rejected because you posted a video of him doing crazy stuff at a party. You posted the video several years ago but later took it down to protect your friend's reputation. Is it possible that the college found the video? ___________3. You and your best friend play a lot of video games. One time, she asks you for your password so she can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your password? ___________4. You received an email stating that your mother's bank account is going to be forfeited if you do not respond to the email. Is it safe to reply? ___________5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a website offering free essays. ___________6. There is a danger in posting information about a future vacation. ___________7. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft. ___________8. If there is no copyright notice, it's okay to copy a Web page. ___________9. Lurking is sometimes considered impolite. It is the practice of reading discussions without contributing to them ___________10. Your cousin asked for your fabulous zucchini cake recipe at the last family function. While you're sending it to him, you decide to e-mail it to all 500 people in your address book as well. It is an example of email spam.
  • 7. 3 CO_Q1_Empowerment Technologies SHS Module 2 ____________11. If someone insults and uses offensive language towards you online, you should reply in the same manner. _____________12. If someone uses offensive language online, always respond and not worry as no one knows who you are online. _____________13. It is ok to constantly give our friends e-mail or items online which they do not need. _____________14. Remember your audience. If you are putting something on a web page remember that everyone in the world will have access to it. _____________15. You are responsible for your actions on the internet.
  • 8. 4 CO_Q1_Empowerment Technologies SHS Module 2 Lesson 3 Netiquettes In this generation, people are dependent on the Internet. Like how people socialize face to face, we should follow etiquette at all times as it mirrors our personality. Being on different platforms, we should be aware of our actions and protect ourselves at the same time. Remember that once something has been shared online, it cannot be deleted. What's In This lesson provides information about Netiquette. It will serve as your guide on how to behave appropriately online. It is vital to use Netiquette because communication online is non-verbal. Most often, online discussion consists of reading something someone else’s has typed. Notes to the Teacher Ask the students of their own rules of thumb in using the Internet, especially social media.
  • 9. 5 CO_Q1_Empowerment Technologies SHS Module 2 What's New Compare and contrast the scenario in the picture. Describe how Jimmy and Boggart are the same and different and in using social media. Plot your answer in the Venn diagram. Jimmy Boggart
  • 10. 6 CO_Q1_Empowerment Technologies SHS Module 2 What is It Core Rules of Netiquette Netiquette, or network etiquette, is concerned with the "proper" manner of communication in the online environment. Whenever you communicate in the virtual world, consider the following "rules," adapted from Virginia Shea's Core Rules of Netiquette. Rule 1: Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?" Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world. Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example? Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download. Rule 5: Make yourself look good online One of the virtual world's best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless
  • 11. 7 CO_Q1_Empowerment Technologies SHS Module 2 you post a video of yourself singing Karaoke in a clown outfit.) The quality of your writing will judge you, so keep the following tips in mind: Always check for spelling and grammar errors Know what you're talking about and state it clearly Be pleasant and polite Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references for your subject matter. You have recently expanded your knowledge about a subject that might be of interest to others? Share that as well. Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction. Rule 8: Respect other people's privacy Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication. Rule 9: Don't abuse your power Like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or have years of experience in a particular skill or subject matter. Maybe it is you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human. Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of Netiquette. At some point, you will see a stupid
  • 12. 8 CO_Q1_Empowerment Technologies SHS Module 2 question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum. Shea, V. (1994). Core Rules of Netiquette. Retrieved from http:/coursedesign.colostate.edu/obj/corerulesnet.html What's More Let's Reflect! Make a reflection on the importance of using Netiquette in your daily life. What benefits can you get from it? How can you promote the use of these regulations? How can Netiquette be beneficial to me? How can I promote Netiquette?
  • 13. 9 CO_Q1_Empowerment Technologies SHS Module 2 What I Have Learned Accomplish the items below using what you have learned from the Ten Rules of Netiquette. 1. In cyberspace, it is important to remember the ________________. “Do unto others as you would have others do unto you.” 2. Why are spelling and grammar crucial on the Internet? 3. Is it okay to read other people's files and emails without their permission? Why? 4. What do you need to be careful about if you are in control of a network? 5. What should you do about a newbie who continually makes the same error on the Internet?
  • 14. 10 CO_Q1_Empowerment Technologies SHS Module 2 What I Can Do Now it’s time to show your creativity! Create a poster showing the Netiquette rules with examples of how you can use them in your daily life, primarily online. The poster should use an interactive online tool like Canva, Glogster, Piktochart, etc. Take note of the criteria: Relevance to the topic 30% Layout and design 40% Originality 10% Creativity 20% Total 100%
  • 15. 11 CO_Q1_Empowerment Technologies SHS Module 2 Assessment Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the letter of the best answer and write it in your notebook. 1. What is Netiquette? A. Using a net to catch fish B. Being mean to other people on Facebook C. Presenting proper manners at the dinner table D. Showing manners and etiquette on the Internet 2. What should you do if you receive a text or email from someone you don't know? A. Call the police B. Delete it without opening it C. Open it immediately and reply D. Leave it in your inbox until you figure out who it is 3. Which of the following should you never give on the Internet? A. Your age B. Your name C. Your address D. All of the above 4. What should you do to avoid being cyber-bullied? A. Observe proper netiquette rules B. Give out personal information to anyone who asks C. Ignore any requests from people to be your friend online D. Strike first - post mean things about other people on your Facebook Wall 5. What should you do if you feel you are being cyber-bullied? A. Call the police B. Tell no one, it's embarrassing C. Tell a trusted adult like a parent or teacher D. Just delete anything referring to you on the Internet 6. What should you never do if you get an embarrassing picture from someone? A. Talk to the person again B. Send it on to other friends C. Tell your parents or a teacher D. Discourage the person from sending pictures like that 7. What should you avoid doing in a chat room? A. Posting your address B. Posting your phone number C. Revealing financial information D. All of the above
  • 16. 12 CO_Q1_Empowerment Technologies SHS Module 2 8. It is OK to forward or post an email message that you received if_____________ A. The message is typed in all capital letters B. It does not contain any copyrighted material C. The author of the message has marked it as confidential. D. The author of the message hasn’t given you permission to forward or post it 9. Before posting to a discussion group you should _____________________ A. Read the FAQ B. Find the Frequently Asked Questions (FAQ) document C. Read some of the existing posts to get an idea of the tone and character of the group D. All of the above. 10. A flame is _____________________________ A. An online chain letter B. An expert programmer C. A person who consistently breaks the rules of Netiquette D. a post or email message that expresses a strong opinion or criticism 11. The Golden Rule of Netiquette is __________________________ A. Remember the human! B. A smiley in every message C. Don't follow the rules of netiquette D. Type in all caps when you're angry. 12. Spamming is very poor Netiquette and means ____________________ A. Spilling the juice of meat-byproducts into your keyboard B. Sending in lines of nonsensical garbage in a chat conversation C. Posting or emailing unsolicited advertising messages to a wide audience. D. Posting a message that contains graphic descriptions of something really gross
  • 17. 13 CO_Q1_Empowerment Technologies SHS Module 2 13. Knowledge and understanding of netiquette is useful because _________ A. It will help you create a positive impression on those you meet in cyberspace B. It explains the conventions already being used by millions of cybernauts C. It explains some of the technical limitations of online communications D. all of the above. 14. You've been sent a virus warning, what should you do now? A. Ignore it. B. Forward it within your company. C. Forward it to everyone in your address book. D. Go to a security Web site to learn if it is a real virus. 15. As a common courtesy, when in a chat room you should: A. Report disruptive users B. Introduce yourself when you enter a room C. Make it clear when you are directing a question or response to a specific user D. All of the above
  • 18. 14 CO_Q1_Empowerment Technologies SHS Module 2 Additional Activity Like any other rules, what you have learned from this lesson could be applied to any task you do. So start doing your part as a student and as you take steps in preparing for your future. What profession do you prefer to have in the future? In what way could you make an impact on society using the Internet? Answer the following question in essay form. (Use a separate sheet of paper) Relevance to the topic 10% Content 40% Organization and format 10% Word Choice, Sentence Variety and Structure 20% Grammar and Mechanics 20% Total 100%
  • 19. 15 CO_Q1_Empowerment Technologies SHS Module 2 Answer Key References Innovative Training Works, I. (2006). Empowerment Technologies. In I. Innovative Training Works, Empowerment Technologies (p. 19). Rex Bookstore. Shea, V. (1994). Core Rules of Netiquette. Retrieved from http:/coursedesign.colostate.edu/obj/corerulesnet.html Assessment 1. D 2. D 3. D 4. A 5. C 6. D 7. D 8. B 9. D 10.D 11.A 12.C 13.D 14.D 15.D What I Know 1. No 2. Yes 3. No 4. No 5. No 6. Yes 7. Yes 8. No 9. Yes 10. Yes 11. No 12. No 13. No 14. Yes 15. Yes
  • 20. For inquiries or feedback, please write or call: Department of Education - Bureau of Learning Resources (DepEd-BLR) Ground Floor, Bonifacio Bldg., DepEd Complex Meralco Avenue, Pasig City, Philippines 1600 Telefax: (632) 8634-1072; 8634-1054; 8631-4985 Email Address: blr.lrqad@deped.gov.ph * blr.lrpd@deped.gov.ph