SlideShare a Scribd company logo
1 of 48
Quarter 1 -Module 7:
Digital Divide,Computer
Addiction, and Bullying
SHEILA G. BUNGALAN
SUBJECT TEACHER
Objectives
 define the following: digital divide, computer addiction
and cyber bullying;
 discuss current issues about digital divide, computer
addiction and cyber bullying and explain the proper
netiquette to address these situations; and
 develop a campaign ad to combat digital divide,
computer addiction and cyber bullying.
What I Know- Choose the letter of the best
answer. Write the chosen letter on a separate
sheet of paper.
 1. It refers to the inequalities of the different sectors in the
community to access, use of or knowledge of information and
communication technology.
a. Digital advancement b. Digital divide
c. Digital Literacy d. Digital skills
 2. This is a factor that create digital divide.
a. Age b. Education
c. Occupation d. All of the Above
3. It is an action to bridge digital divide.
a. Attend technological trainings to develop the skills
b. Read a lot of books in the library to access information
c. Manipulate technology like smartphone, computer and internet
d. Both a and c
4. The following statements are reasons why digital divide exist except one.
a. The person cannot afford to access the technology.
b. he person has a strong motivation to learn how use the technology.
c. The person refuses to have knowledge of the advance technology.
d. The person has less information about the benefits of technology.
5. The group of individuals having high opportunity to acquire digital skills.
a. professional and students b. grandparents at home
c. group of disabled people d. people living in rural areas
6. It refers to the excessive use of technology like gaming.
a. Computer addiction b. Cyberbullying
c. Digital divide d. Digital skills
7. The following is a factor which leads to computer addiction.
a. Depression b. loneliness
c. social acceptance d. All of the above
8. It is a type of computer addiction which spent much time in online gaming
or gambling.
a. Compulsion b. cybersex
c. Cyber relationship d. Information overload
9. These are symptoms of a person experiencing computer addiction except
one.
a. anxiety and distress b. sleep disorder and backpain
c. defensive and dishonesty d. social acceptance and
compulsion
10. It refers to the act of harassing other people using technology like
computer, laptop, or cellphone.
a. bullying b. cyberbullying
c. compulsion d. cyber relationship
Answer Key
1.B 6. A
2.D 7. D
3.D 8. D
4.B 9. D
5.A 10. B
Picture Analysis- Directions: Using the illustrations below,
define in your own words the given terminologies.
Digital Divide
Computer Addiction
Cyber Bullying
Digital divide, cyber bullying and
computer addiction are the common
problems that some people encountered.
Digital Divide (DD)
Are all members in the family having skills in digital
manipulation? How your parent does enroll you in the school this
year? In what way, you communicate your family and friends afar
from you?
Some of you may answers differently like not all members have
the ability to use technology while other family members can,
some experience enrolling via online while others went to their
respective barangay to get the enrolment forms and lastly, others
may be through letters or basic phone call while other can have
video call as a form of communication. These are simple scenarios
that we experience of what we called digital divide.
Digital Divide
- pertains to the social and economic imbalance of the opportunities
to access to, use of or knowledge of information and
communication technology (ICTs).
- It is referring to a gap between sector in the community who can
access, has the skills and has desire to the internet and those who
cannot.
Digital Divide
- The unequal opportunity of the internet acquisition is caused by
the differences of skills, motivations and preferences of use based
on category such as personal category (gender, age, race/ethnicity,
personality, intelligence and Health), positional category
(education, occupation, household and nation) and the resources
category (economic, social and cultural capital) status of a person.
- The divides arise due to lack of knowledge on how to manipulate
the technology and understanding of its benefits as well and some
cannot afford to access because the income is low.
We can able to overcome this phenomenon by:
1. lowering the cost of internet connection in the house
2. a law should be created to make all public places
should have free internet access set by the government.
3. the different LGUs and NGOs should conduct a forum
about the advantage of technology and how to use the
advance technology in rural areas.
4. the parents should be given with trainings related to
technology by the schools and libraries.
Computer Addiction (CD)
Let me ask you these following questions.
1. Are you absentminded because you are thinking of an online
activity?
2. Do you spend more time in the internet before you are satisfied?
3. Have you tried to stop using the internet (like playing online
games) chatting but fail to do it?
4. Is your education, relationship of the family and friends or works
affected by using the internet?
5. Is your behavior becoming moody, irritable or depressed if you
cannot use the internet?
6. Are you escaping meal or sleep late in using the internet?
7. Does internet give you comfort in times of problem or having bad
mood?
When your answers have many YES, then it’s a sign that you are
experiencing Internet Addiction Disorder (IAD) or known as
Computer Addiction.
What is Computer Addiction?
Computer Addiction means the inability to control the desire of
using the technology (like computers, smartphones and internet) or
an extreme use of the computer which makes the person uneasy or
anxiety in the absence of the gadgets.
Computer Addiction (CD)
Wherein the daily routine in life like work, eating or sleep are
affected that could lead to social problem, change in behavior,
relationships and though process. The three reason why computer
addiction exist are depression, loneliness and social acceptance
where young people commonly experience.
Computer Addiction (CD)
1. Information Overload - excessive online surfing resulted to
inefficient at work and have less family interconnection
2. Compulsion- over time spent in online activities like gaming,
bartering of stocks, gambling which cause to a problem at work or
at school
3. Cybersex addiction- exceed time spent in surfing porn sites that
could interfere one’s relationship
4. Cyber- relationship- excessive time spent in social networking
sites to make relationship online than spending time to real persons
like family and friends
Types of Computer Addiction
Different Symptoms of a computer
addict person
1. Emotional Symptoms- feeling of guilt, anxiety, depression,
dishonesty, feeling of great happiness or excitement (euphoric)
in front of the computer, defensive, distress, escaping of work,
isolation and cannot follow schedule
2. Physical Symptoms - backpain, headache, increase or decrease
of weight, sleep disorder, carpal tunnel syndrome, blurred or strain
visions
Computer Addiction can be prevented
through:
1. Set limit in using computers and doing online activities.
2. Talk to your family and friends and mingle with them most of
the time.
3. Organize a non-computer related activity like sports
4. Place your gadgets away from you when not needed
Cyber Bullying
In this time, social media is significant tool like in communication, and
updating information.
As the result from the survey of Stairway foundation reported in a news
that 80% of young people ages 7 to 16 are victims of cyber bullying
through social media. The term bullying “refers to any severe, or repeated
use by one or more students of a written, verbal or electronic expression,
or a physical act or gesture, or any combination thereof, directed at
another student that has the effect of actually causing or placing the latter
in reasonable fear of physical or emotional harm or damage to his
property; creating a hostile environment at school for the other students;
infringing on the rights of another students at school; such as, but not
limited the following:
Cyber Bullying
1. Any unwanted physical contact between the bully and the victim like
punching, pushing, shoving, kicking, slapping, tickling, headlocks, inflicting
school pranks, teasing, fighting and the use of available objects as
weapons;
2. Any Act that causes damage to a victim’s psyche and /or emotional well-
being;
3. Any slanderous statement or accusation that causes the victim undue
emotional distress like directing foul language or profanity at the target,
name -calling, tormenting and commenting negatively on victim’s looks,
clothes and body.” (Republic Act No. 10627-Anti-Bullying Act)
Cyber Bullying
Bullying happens in face to face (like in school) while cyber-bullying
happens in a cyberspace (means in interconnected digital technology).
What is cyber bullying?
Cyber bullying is a type bullying done online with the use of technology
like computers, laptops, and cellphone that can destroy the physical and
emotional aspect of the victim (called as bullied) by the one who does the
act (refers as bully). This problem is associated with the use of internet and
different platforms like text messaging, chatting, emails, websites and
social networking sites. The different forms of cyberbullying are posting
shameful pictures or videos in social media, sending threatening or hurtful
messages through chatting or text messages. The bullying act happens.
Cyberbullying can be prevented by doing the
following:
1. Be optimistic person.
2. Share to the person whom you can trust with.
3. Keep your password by yourself. Don’t share it.
4. Always check the content before posting or sharing.
5. Always log out your account after using.
6. Respect and love other people and yourself.
Guides Questions:
1. What are the problems in the story?
2. What is the reason the reason why some people
encountersuch problem?
3. What are the possible effects or dangers may happen to
the person who experienced such issue?
4. What are the tips or suggestions you can give in order to
protect yourself and your family members?
Activity 4:2 Ad Campaign Making
1. You are going to create a Campaign Ad (it is a set of
advertisement which focus in a single message with a certain
objective need to achieve). You create the Ad in a form poster
slogan.
2. The main objective of the Ad Campaign is to combat the
problems of digital divide, computer addiction and cyber
bullying.
Sample Campaign Ad
https://images.squarespace-cdn.com/content/v1/5813f50b59cc689660a3d746/1570113244210-K1GLJP8J7VNGFNPO62Q3/ke17ZwdGBToddI8pDm48kHB3XifhsPKlDqUW3T0x-
B1Zw-
zPPgdn4jUwVcJE1ZvWQUxwkmyExglNqGp0IvTJZUJFbgE7XRK3dMEBRBhUpytvPtBp0YLWPWPFqTgy9SPjV6MceqUVJyRcSSnAlnwsoaoi9xLN9eiJFqLxbSi5HY/bullying+awareness+bl
og.PNG?format=original
https://pbs.twimg.com/media/EjPlxgrXkAIILit.jpg
https://www.shutterstock.com/shutterstock/photos/1395291815/display_1500/stock-vector-stop-
cyberbullying-slogan-with-design-elements-vector-stylized-text-and-decoration-1395291815.jpg
https://www.red-
dot.org/index.php?f=32003&token=aae0989d378dd86055ce2f898c173a2ab5900a4e&eID=tx_solr_image&
size=large&usage=slider
https://ih1.redbubble.net/image.3858045718.6146/poster,
504x498,f8f8f8-pad,600x600,f8f8f8.jpg
https://images.squarespace-cdn.com/content/v1/5b434204da02bc0f557905b9/1533642950070-
L3920TK3P6MPF466Q2NK/Addiction-au-telephone-la-regle-des-50-minutes-qui-change-vos-
habitudes.jpg
https://image.shutterstock.com/shutterstock/photos/134164694/display_1500/stock-vector-concept-
the-digital-divide-134164694.jpg
https://www.sun-
sentinel.com/resizer/GzujaY6bd5mSS6okLzLKS_U8PWY=/630x630/filters:format(jpg):quality(70)/cloudfront-
us-east-1.images.arcpublishing.com/tronc/3ZT6S6PSGVDQDFHEQAXGTZEV5Y.jpg
https://img.i-scmp.com/cdn-
cgi/image/fit=contain,width=425,format=auto/sites/default/files/styles/768x768/public/d8/images/methode/
2020/03/26/9f50dbce-6f41-11ea-b0ed-
5e14cf8eb9e1_image_hires_171310.jpg?itok=oNCR7nxz&v=1585213996
Assessment
Multiple Choice. Choose the letter of the best answer. Write the
chosen letter on a separate sheet of paper.
1. It refers to the inequalities of the different sectors in the
community to access, use of or knowledge of information and
communication technology.
a. Digital advancement b. Digital divide
c. Digital Literacy d. Digital skills
2. This is a factor that create digital divide.
a. Age b. Education
c. Occupation d. All of the Above
3. It is an action to bridge digital divide.
a. Attend technological trainings to develop the skills
b. Read a lot of books in the library to access information
c. Manipulate technology like smartphone, computer and internet
d. Both a and c
4. The following statements are reasons why digital divide exist except
one.
a. The person cannot afford to access the technology.
b. The person has a strong motivation to learn how use the
technology.
c. The person refuses to have knowledge of the advance
technology
d. The person has less information about the benefits of
technology.
5. The group of individuals having high opportunity to acquire
digital skills.
a. professional and students b. grandparents at home
c. group of disabled person d.people living in rural areas
6. It refers to the excessive use of technology like gaming.
a. Computer addiction b. Cyberbullying
c. Digital divide d.Digital skills
7. The following is a factor which leads to computer addiction.
a. Depression b. loneliness
c. social acceptance d. All of the above
8. It is a type of computer addiction which spent much time in
online gaming or gambling.
a. compulsion
b. cybersex
c. Cyber relationship
d. Information overload
9. These are symptoms of a person experiencing
computer addiction except one.
a. anxiety and distress
b. sleep disorder and backpain
c. defensive and dishonesty
d. social acceptance and compulsion
10. It is a way to fight computer addiction.
a. spends more time to family and friends and do
non- computer related activities
b. turns off the cellphone when somebody call to
avoid using the gadgets
c. keeps listening to a music while playing online
games.
d. all of the above
11. It refers to the act of harassing other people using
technology like computer, laptop, or cellphone.
a. bullying b. cyberbullying
c. compulsion d. cyber relationship
12. It is an example of cyber bullying.
a. posting pictures of other people for fun
b. hurting someone through punching
c. sending threatening messages through messenger
d. Both a and c
13. It is a law which protect the bullied from a bully individual
known as Anti-bullying Act
a. Republic Act 10175
b. Republic Act 10627
c. Republic Act 10672
d. Republic Act 10762
14.The way you can do to avoid being a victim of cyber bullying.
a. Sign out your account after using specially in public places
b. Do not tell and share your password to other people.
c. Avoid using social media like Facebook.
d. Both a and b
15.The best way you can do when you are cyber bullied is______.
a. Keep quiet so that no one will know.
b. Fight back by doing the same what he/she did
c. Find a person that you trust and seek for help
d. All of the above
Test II.
Write an action that you can do using the acronym
“P.R.O.M.I.S.E.” which contains ways/tips you can do in order to
avoid the negative effects of digital divide, computer
addiction and cyber bullying.
P-
R-
O-
M-
I-
S-
E-

More Related Content

What's hot

Media and Information Literate Individual.pptx
Media and Information Literate Individual.pptxMedia and Information Literate Individual.pptx
Media and Information Literate Individual.pptxMarylieNoran2
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptxlevipoi
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfEricAntonio9
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Arniel Ping
 
Introduction to Media and Information Literacy (Part 2).pptx
Introduction to Media and Information Literacy (Part 2).pptxIntroduction to Media and Information Literacy (Part 2).pptx
Introduction to Media and Information Literacy (Part 2).pptxMagdaLo1
 
MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)Marvin Bronoso
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfkenneth218994
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxluvvprems5
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Media and Information Daily Log
Media and Information Daily LogMedia and Information Daily Log
Media and Information Daily LogMelanio Florino
 
Chapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information LiteracyChapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information LiteracyJuvywen
 
MIL - Similarities and Differences.pptx
MIL - Similarities and Differences.pptxMIL - Similarities and Differences.pptx
MIL - Similarities and Differences.pptxGarwinRaramaOcampo
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...Arniel Ping
 
Daily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docxDaily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docxRoNTertainmentTV
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information LiteracyDawn Dy
 
EMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxEMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxsherelynbalada1
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 

What's hot (20)

MIL module 3
MIL module 3MIL module 3
MIL module 3
 
Media and Information Literate Individual.pptx
Media and Information Literate Individual.pptxMedia and Information Literate Individual.pptx
Media and Information Literate Individual.pptx
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
 
Introduction to Media and Information Literacy (Part 2).pptx
Introduction to Media and Information Literacy (Part 2).pptxIntroduction to Media and Information Literacy (Part 2).pptx
Introduction to Media and Information Literacy (Part 2).pptx
 
MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptx
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Media and Information Daily Log
Media and Information Daily LogMedia and Information Daily Log
Media and Information Daily Log
 
Chapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information LiteracyChapter 1 Introduction to Media and Information Literacy
Chapter 1 Introduction to Media and Information Literacy
 
MIL - Similarities and Differences.pptx
MIL - Similarities and Differences.pptxMIL - Similarities and Differences.pptx
MIL - Similarities and Differences.pptx
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Ethical Use Of Information
Ethical Use Of InformationEthical Use Of Information
Ethical Use Of Information
 
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
 
Daily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docxDaily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docx
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
 
EMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxEMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptx
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 

Similar to MIL Q1 M7.pptx

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Legal, Ethical, and Societal Issues (cot 4).pptx
Legal, Ethical, and Societal Issues (cot 4).pptxLegal, Ethical, and Societal Issues (cot 4).pptx
Legal, Ethical, and Societal Issues (cot 4).pptxClaesTrinio
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster ReportFarah Sham
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital Worldmgastgoodman
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenshipJimPowers
 
Positive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerPositive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerHina Anjum
 
Lifespan Communication In Cmc
Lifespan Communication In CmcLifespan Communication In Cmc
Lifespan Communication In CmcDaywalk3r
 
Netizenship and Netiquette in Online Communities_PCK 104_FINALS.pptx
Netizenship and Netiquette in Online Communities_PCK 104_FINALS.pptxNetizenship and Netiquette in Online Communities_PCK 104_FINALS.pptx
Netizenship and Netiquette in Online Communities_PCK 104_FINALS.pptxireneraetunque27
 
To investigate the consequences of internet addiction disorder
To investigate the consequences of internet addiction disorderTo investigate the consequences of internet addiction disorder
To investigate the consequences of internet addiction disorderIAEME Publication
 
Cyberbullying - Romania.pdf
Cyberbullying - Romania.pdfCyberbullying - Romania.pdf
Cyberbullying - Romania.pdfPavelVtek3
 
ICT causes social ills by MUET Unit KISAS
ICT causes social ills by MUET Unit KISASICT causes social ills by MUET Unit KISAS
ICT causes social ills by MUET Unit KISASKisas Muet
 
Technology creates social isolation
Technology creates social isolation Technology creates social isolation
Technology creates social isolation sstone5
 

Similar to MIL Q1 M7.pptx (20)

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Final reflection digital citizenship
Final reflection digital citizenshipFinal reflection digital citizenship
Final reflection digital citizenship
 
Legal, Ethical, and Societal Issues (cot 4).pptx
Legal, Ethical, and Societal Issues (cot 4).pptxLegal, Ethical, and Societal Issues (cot 4).pptx
Legal, Ethical, and Societal Issues (cot 4).pptx
 
Il poster
Il posterIl poster
Il poster
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster Report
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Digital Divide Essay
Digital Divide EssayDigital Divide Essay
Digital Divide Essay
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
Emtech2.pptx
Emtech2.pptxEmtech2.pptx
Emtech2.pptx
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenship
 
Positive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerPositive and Negative Impacts of Computer
Positive and Negative Impacts of Computer
 
ASS3SUM2
ASS3SUM2ASS3SUM2
ASS3SUM2
 
Lifespan Communication In Cmc
Lifespan Communication In CmcLifespan Communication In Cmc
Lifespan Communication In Cmc
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 
Netizenship and Netiquette in Online Communities_PCK 104_FINALS.pptx
Netizenship and Netiquette in Online Communities_PCK 104_FINALS.pptxNetizenship and Netiquette in Online Communities_PCK 104_FINALS.pptx
Netizenship and Netiquette in Online Communities_PCK 104_FINALS.pptx
 
To investigate the consequences of internet addiction disorder
To investigate the consequences of internet addiction disorderTo investigate the consequences of internet addiction disorder
To investigate the consequences of internet addiction disorder
 
Cyberbullying - Romania.pdf
Cyberbullying - Romania.pdfCyberbullying - Romania.pdf
Cyberbullying - Romania.pdf
 
ICT causes social ills by MUET Unit KISAS
ICT causes social ills by MUET Unit KISASICT causes social ills by MUET Unit KISAS
ICT causes social ills by MUET Unit KISAS
 
Technology creates social isolation
Technology creates social isolation Technology creates social isolation
Technology creates social isolation
 

More from SheilaBungalan1

More from SheilaBungalan1 (6)

Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1
 
HOPE 2 Q3 M1.pptx
HOPE 2 Q3 M1.pptxHOPE 2 Q3 M1.pptx
HOPE 2 Q3 M1.pptx
 
HOPE 2 Q3 M1.pptx
HOPE 2 Q3 M1.pptxHOPE 2 Q3 M1.pptx
HOPE 2 Q3 M1.pptx
 
HOPE 1 Q1 M2.pptx
HOPE 1 Q1 M2.pptxHOPE 1 Q1 M2.pptx
HOPE 1 Q1 M2.pptx
 
HOPE 1 Q1 M3.pptx
HOPE 1 Q1 M3.pptxHOPE 1 Q1 M3.pptx
HOPE 1 Q1 M3.pptx
 
HOPE 1 Q1 M2.pptx
HOPE 1 Q1 M2.pptxHOPE 1 Q1 M2.pptx
HOPE 1 Q1 M2.pptx
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

MIL Q1 M7.pptx

  • 1. Quarter 1 -Module 7: Digital Divide,Computer Addiction, and Bullying SHEILA G. BUNGALAN SUBJECT TEACHER
  • 2. Objectives  define the following: digital divide, computer addiction and cyber bullying;  discuss current issues about digital divide, computer addiction and cyber bullying and explain the proper netiquette to address these situations; and  develop a campaign ad to combat digital divide, computer addiction and cyber bullying.
  • 3. What I Know- Choose the letter of the best answer. Write the chosen letter on a separate sheet of paper.  1. It refers to the inequalities of the different sectors in the community to access, use of or knowledge of information and communication technology. a. Digital advancement b. Digital divide c. Digital Literacy d. Digital skills  2. This is a factor that create digital divide. a. Age b. Education c. Occupation d. All of the Above
  • 4. 3. It is an action to bridge digital divide. a. Attend technological trainings to develop the skills b. Read a lot of books in the library to access information c. Manipulate technology like smartphone, computer and internet d. Both a and c 4. The following statements are reasons why digital divide exist except one. a. The person cannot afford to access the technology. b. he person has a strong motivation to learn how use the technology. c. The person refuses to have knowledge of the advance technology. d. The person has less information about the benefits of technology.
  • 5. 5. The group of individuals having high opportunity to acquire digital skills. a. professional and students b. grandparents at home c. group of disabled people d. people living in rural areas 6. It refers to the excessive use of technology like gaming. a. Computer addiction b. Cyberbullying c. Digital divide d. Digital skills 7. The following is a factor which leads to computer addiction. a. Depression b. loneliness c. social acceptance d. All of the above
  • 6. 8. It is a type of computer addiction which spent much time in online gaming or gambling. a. Compulsion b. cybersex c. Cyber relationship d. Information overload 9. These are symptoms of a person experiencing computer addiction except one. a. anxiety and distress b. sleep disorder and backpain c. defensive and dishonesty d. social acceptance and compulsion 10. It refers to the act of harassing other people using technology like computer, laptop, or cellphone. a. bullying b. cyberbullying c. compulsion d. cyber relationship
  • 7. Answer Key 1.B 6. A 2.D 7. D 3.D 8. D 4.B 9. D 5.A 10. B
  • 8. Picture Analysis- Directions: Using the illustrations below, define in your own words the given terminologies. Digital Divide
  • 11. Digital divide, cyber bullying and computer addiction are the common problems that some people encountered.
  • 12. Digital Divide (DD) Are all members in the family having skills in digital manipulation? How your parent does enroll you in the school this year? In what way, you communicate your family and friends afar from you? Some of you may answers differently like not all members have the ability to use technology while other family members can, some experience enrolling via online while others went to their respective barangay to get the enrolment forms and lastly, others may be through letters or basic phone call while other can have video call as a form of communication. These are simple scenarios that we experience of what we called digital divide.
  • 13. Digital Divide - pertains to the social and economic imbalance of the opportunities to access to, use of or knowledge of information and communication technology (ICTs). - It is referring to a gap between sector in the community who can access, has the skills and has desire to the internet and those who cannot.
  • 14. Digital Divide - The unequal opportunity of the internet acquisition is caused by the differences of skills, motivations and preferences of use based on category such as personal category (gender, age, race/ethnicity, personality, intelligence and Health), positional category (education, occupation, household and nation) and the resources category (economic, social and cultural capital) status of a person. - The divides arise due to lack of knowledge on how to manipulate the technology and understanding of its benefits as well and some cannot afford to access because the income is low.
  • 15. We can able to overcome this phenomenon by: 1. lowering the cost of internet connection in the house 2. a law should be created to make all public places should have free internet access set by the government. 3. the different LGUs and NGOs should conduct a forum about the advantage of technology and how to use the advance technology in rural areas. 4. the parents should be given with trainings related to technology by the schools and libraries.
  • 16. Computer Addiction (CD) Let me ask you these following questions. 1. Are you absentminded because you are thinking of an online activity? 2. Do you spend more time in the internet before you are satisfied? 3. Have you tried to stop using the internet (like playing online games) chatting but fail to do it? 4. Is your education, relationship of the family and friends or works affected by using the internet? 5. Is your behavior becoming moody, irritable or depressed if you cannot use the internet? 6. Are you escaping meal or sleep late in using the internet? 7. Does internet give you comfort in times of problem or having bad mood?
  • 17. When your answers have many YES, then it’s a sign that you are experiencing Internet Addiction Disorder (IAD) or known as Computer Addiction. What is Computer Addiction? Computer Addiction means the inability to control the desire of using the technology (like computers, smartphones and internet) or an extreme use of the computer which makes the person uneasy or anxiety in the absence of the gadgets. Computer Addiction (CD)
  • 18. Wherein the daily routine in life like work, eating or sleep are affected that could lead to social problem, change in behavior, relationships and though process. The three reason why computer addiction exist are depression, loneliness and social acceptance where young people commonly experience. Computer Addiction (CD)
  • 19. 1. Information Overload - excessive online surfing resulted to inefficient at work and have less family interconnection 2. Compulsion- over time spent in online activities like gaming, bartering of stocks, gambling which cause to a problem at work or at school 3. Cybersex addiction- exceed time spent in surfing porn sites that could interfere one’s relationship 4. Cyber- relationship- excessive time spent in social networking sites to make relationship online than spending time to real persons like family and friends Types of Computer Addiction
  • 20. Different Symptoms of a computer addict person 1. Emotional Symptoms- feeling of guilt, anxiety, depression, dishonesty, feeling of great happiness or excitement (euphoric) in front of the computer, defensive, distress, escaping of work, isolation and cannot follow schedule 2. Physical Symptoms - backpain, headache, increase or decrease of weight, sleep disorder, carpal tunnel syndrome, blurred or strain visions
  • 21. Computer Addiction can be prevented through: 1. Set limit in using computers and doing online activities. 2. Talk to your family and friends and mingle with them most of the time. 3. Organize a non-computer related activity like sports 4. Place your gadgets away from you when not needed
  • 22. Cyber Bullying In this time, social media is significant tool like in communication, and updating information. As the result from the survey of Stairway foundation reported in a news that 80% of young people ages 7 to 16 are victims of cyber bullying through social media. The term bullying “refers to any severe, or repeated use by one or more students of a written, verbal or electronic expression, or a physical act or gesture, or any combination thereof, directed at another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property; creating a hostile environment at school for the other students; infringing on the rights of another students at school; such as, but not limited the following:
  • 23. Cyber Bullying 1. Any unwanted physical contact between the bully and the victim like punching, pushing, shoving, kicking, slapping, tickling, headlocks, inflicting school pranks, teasing, fighting and the use of available objects as weapons; 2. Any Act that causes damage to a victim’s psyche and /or emotional well- being; 3. Any slanderous statement or accusation that causes the victim undue emotional distress like directing foul language or profanity at the target, name -calling, tormenting and commenting negatively on victim’s looks, clothes and body.” (Republic Act No. 10627-Anti-Bullying Act)
  • 24. Cyber Bullying Bullying happens in face to face (like in school) while cyber-bullying happens in a cyberspace (means in interconnected digital technology). What is cyber bullying? Cyber bullying is a type bullying done online with the use of technology like computers, laptops, and cellphone that can destroy the physical and emotional aspect of the victim (called as bullied) by the one who does the act (refers as bully). This problem is associated with the use of internet and different platforms like text messaging, chatting, emails, websites and social networking sites. The different forms of cyberbullying are posting shameful pictures or videos in social media, sending threatening or hurtful messages through chatting or text messages. The bullying act happens.
  • 25. Cyberbullying can be prevented by doing the following: 1. Be optimistic person. 2. Share to the person whom you can trust with. 3. Keep your password by yourself. Don’t share it. 4. Always check the content before posting or sharing. 5. Always log out your account after using. 6. Respect and love other people and yourself.
  • 26.
  • 27. Guides Questions: 1. What are the problems in the story? 2. What is the reason the reason why some people encountersuch problem? 3. What are the possible effects or dangers may happen to the person who experienced such issue? 4. What are the tips or suggestions you can give in order to protect yourself and your family members?
  • 28.
  • 29. Activity 4:2 Ad Campaign Making 1. You are going to create a Campaign Ad (it is a set of advertisement which focus in a single message with a certain objective need to achieve). You create the Ad in a form poster slogan. 2. The main objective of the Ad Campaign is to combat the problems of digital divide, computer addiction and cyber bullying.
  • 30.
  • 41. Assessment Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a separate sheet of paper. 1. It refers to the inequalities of the different sectors in the community to access, use of or knowledge of information and communication technology. a. Digital advancement b. Digital divide c. Digital Literacy d. Digital skills 2. This is a factor that create digital divide. a. Age b. Education c. Occupation d. All of the Above
  • 42. 3. It is an action to bridge digital divide. a. Attend technological trainings to develop the skills b. Read a lot of books in the library to access information c. Manipulate technology like smartphone, computer and internet d. Both a and c 4. The following statements are reasons why digital divide exist except one. a. The person cannot afford to access the technology. b. The person has a strong motivation to learn how use the technology. c. The person refuses to have knowledge of the advance technology d. The person has less information about the benefits of technology.
  • 43. 5. The group of individuals having high opportunity to acquire digital skills. a. professional and students b. grandparents at home c. group of disabled person d.people living in rural areas 6. It refers to the excessive use of technology like gaming. a. Computer addiction b. Cyberbullying c. Digital divide d.Digital skills 7. The following is a factor which leads to computer addiction. a. Depression b. loneliness c. social acceptance d. All of the above
  • 44. 8. It is a type of computer addiction which spent much time in online gaming or gambling. a. compulsion b. cybersex c. Cyber relationship d. Information overload 9. These are symptoms of a person experiencing computer addiction except one. a. anxiety and distress b. sleep disorder and backpain c. defensive and dishonesty d. social acceptance and compulsion
  • 45. 10. It is a way to fight computer addiction. a. spends more time to family and friends and do non- computer related activities b. turns off the cellphone when somebody call to avoid using the gadgets c. keeps listening to a music while playing online games. d. all of the above 11. It refers to the act of harassing other people using technology like computer, laptop, or cellphone. a. bullying b. cyberbullying c. compulsion d. cyber relationship
  • 46. 12. It is an example of cyber bullying. a. posting pictures of other people for fun b. hurting someone through punching c. sending threatening messages through messenger d. Both a and c 13. It is a law which protect the bullied from a bully individual known as Anti-bullying Act a. Republic Act 10175 b. Republic Act 10627 c. Republic Act 10672 d. Republic Act 10762
  • 47. 14.The way you can do to avoid being a victim of cyber bullying. a. Sign out your account after using specially in public places b. Do not tell and share your password to other people. c. Avoid using social media like Facebook. d. Both a and b 15.The best way you can do when you are cyber bullied is______. a. Keep quiet so that no one will know. b. Fight back by doing the same what he/she did c. Find a person that you trust and seek for help d. All of the above
  • 48. Test II. Write an action that you can do using the acronym “P.R.O.M.I.S.E.” which contains ways/tips you can do in order to avoid the negative effects of digital divide, computer addiction and cyber bullying. P- R- O- M- I- S- E-

Editor's Notes

  1. Activity 4.1: Reading Time Direction: Read the content in the storyboard below. Identify the problem, Cause, effects and create a solution to solve the issue. Answer the guide questions by using a graphic organizer