Quarter 1 – Module 9
Media and
Information
Literacy(MIL)
Quarter 2 – Module 1 & 2
Media and
Information
Literacy(MIL)
Review of the
past lesson
LO 1 – Understand opportunities and
challenges in media and information.
(MIL11/12OCP-IIIh-24);
LO 2 – Cite an example of an issue
showing the power of media and
information to affect change.
(MIL11/12OCP-IIIh-25)
LO 1 – Define and describe what
Massive Open Online Course.
(MIL11/12CFT-IIIi-27)
● After going through this module, you are
expected to:
a. Determine how media and information
affect change in society;
b. Identify the advantages and
disadvantages of the internet in a given
context; and
c. Give an issue that shows the power of
media and information to affect change.
● After going through this module, you are
expected to:
d. Describe the new trend in media and
information in education;
e. Determine the value of progressive
lifestyle and education; and lastly,
f. Predict future innovations based on
observation.
Quarter 2 – Module 1 & 2
Opportunities and
Challenges and Current and
Future Trends in Media and
Information
ACTIVITY 1:
Directions:
Construct your OWN definition for the following
concepts:
1. Cybercrime?
2. Computer Addiction?
3. Cyber bullying?
Challenges in the
Virtual World
What is it?
Money theft/phishing
 it refers to the process of harvesting bank details,
in particular, personal identification numbers
(PINs) and transaction authentication numbers
(TANs), with the intent to ransack other people’s
bank accounts.
What is it?
8 things you can do to safeguard
yourself against phishing threats:
1. Always be aware of the content of the email that is
sent to you. Never click suspicious links.
2. Be very careful of emails requesting sensitive
information.
3. Always check to make sure that the site is verified. By
checking the actual email that is sent to you and not
just the displayed name.
What is it?
8 things you can do to safeguard
yourself against phishing threats:
4. Phishers sometimes use scare tactics. Like
threatening to cancel your service in case you failed
to update information. Don’t react unless you are
sure.
What is it?
8 things you can do to safeguard
yourself against phishing threats:
5. Don’t sign up and put your email in sites or forms
when you don’t have to. Most of the spam and junk
you received as a result of you signing up to certain
websites.
What is it?
8 things you can do to safeguard
yourself against phishing threats:
6. Never input sensitive information in forms that are present in
suspicious emails.
7. Instead of pressing links in emails, input the links yourself to
prevent being tricked into going to a false site.
8. Check for HTTPS (secure connection on the site) at the start of
the web site link. To make sure that the website you are using
is not a fake one.
What is it?
Commercial fraud
 Commercial fraud happens when sellers pretend
to sell goods or services which, after payment,
either do not show the promised attributes or are
not delivered at all.
What is it?
Grooming
 refers to pedophiles using the Internet as a
means to contact children and young people
while concealing their adult identity. (grooming is
also known as Child Sexual Exploitation).
What is it?
Here are the warning signs of
grooming:
1. Age difference
2. encouraging you to get involved
in sexual activity early on in the
relationship/friendship.
3. Illegal/criminal activity, travelling
to and from places or parties also
known as trafficking,
What is it?
Here are the warning signs of
grooming:
4. controlling behavior
5. telling lies and keeping secrets
from friends and family
6. trying to get you alone as
opposed to meeting your friends
or family.
What is it?
Here are the warning signs of
grooming:
7. Overly friendly to your friends
and family to try and win them
over
8. Nudity – sending nude images
What is it?
Bullying
 is the use of force, coercion, hurtful
teasing or threat, to abuse,
aggressively dominate or
intimidate.
What is it?
Computer addiction
 the excessive use of computers
to the extent that it interferes
with daily life.
What is it?
5 subcategories of specific types of
computer and internet addictions.
1. Cybersex Addiction
2. Net Compulsions
3. Cyber (Online) Relationship Addiction
4. Cumpulsive Information Seeking
5. Computer or Gaming Addiction
What is it?
Digital divide
 the economic inequality between
groups in terms of access to, use
of, or knowledge of ICT.
What is it?
Digital divide
The access divide
It refers to the socioeconomic
differences among people and the
impact on their ability to afford the
devices necessary to get online.
What is it?
Digital divide
The use divide
This refers to the difference in
the level of skills possessed by
individuals.
What is it?
Digital divide
The quality-of-use gap
It refers to the different ways
that people use the Internet and the
fact that some people are far more
able to get the information they need
from it than others.
What is it?
Republic Act 10175
also known as the “Cybercrime
Prevention Act of 2012” which
aims to address legal issues
concerning online interactions
and technology related concerns
in the country.
What is it?
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(1) Illegal Access – The access to the whole or any part of a
computer system without right.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(2) Illegal Interception – The interception made by technical
means without right of any non-public transmission of
computer data to, from, or within a computer system
including electromagnetic emissions from a computer
system carrying such computer data.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(3) Data Interference — The intentional or reckless alteration,
damaging, deletion or deterioration of computer data,
electronic document, or electronic data message, without
right, including the introduction or transmission of viruses.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(4) System Interference — The intentional alteration or reckless hindering
or interference with the functioning of a computer or computer
network by inputting, transmitting, damaging, deleting, deteriorating,
altering or suppressing computer data or program, electronic
document, or electronic data message, without right or authority,
including the introduction or transmission of viruses.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(5) Misuse of Devices
(i) The use, production, sale, procurement, importation,
distribution, or otherwise making available, without right,
of:
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(6) Cyber-squatting – The acquisition of a domain name over
the internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the same.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(1) Computer-related Forgery
(i) The input, alteration, or deletion of any computer data
without right resulting in inauthentic data with the intent
that it be considered or acted upon for legal purposes as
if it were authentic, regardless whether or not the data is
directly readable and intelligible; or
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(2) Computer-related Fraud — The unauthorized input,
alteration, or deletion of computer data or program or
interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided,
That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(3) Computer-related Identity Theft – The intentional
acquisition, use, misuse, transfer, possession, alteration
or deletion of identifying information belonging to another,
whether natural or juridical, without right: Provided, That if
no damage has yet been caused, the penalty imposable
shall be one (1) degree lower.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(1) Cybersex — The willful engagement, maintenance, control,
or operation, directly or indirectly, of any lascivious
exhibition of sexual organs or sexual activity, with the aid
of a computer system, for favor or consideration.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(2) Child Pornography — The unlawful or prohibited acts
defined and punishable by Republic Act No. 9775 or the
Anti-Child Pornography Act of 2009, committed through a
computer system: Provided, That the penalty to be
imposed shall be (1) one degree higher than that provided
for in Republic Act No. 9775.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(3) Unsolicited Commercial Communications. — The
transmission of commercial electronic communication
with the use of computer system which seek to advertise,
sell, or offer for sale products and services are prohibited
unless: (i) There is prior affirmative consent from the
recipient;
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(4) Libel — The unlawful or prohibited acts of libel as defined
in Article 355 of the Revised Penal Code, as amended,
committed through a computer system or any other similar
means which may be devised in the future.
What Is It?
What’s More
Answer the following questions on page 11 on
your module.
1. Discuss how cybercrime becomes a national concern
2. What makes computer addiction a problem?
3. Explain how somebody can be a victim of cyber
bullying?
What I Have Learned
Answer the following questions on page 12 on
your module.
1. What is cybercrime?
2. Enumerate examples of cybercrime
3. We can combat cybercrime by…
4. We can protect ourselves from cybercrime by…
What I Can Do
Answer the following questions on page 13 on
your module.
Guide Question:
As a student, how can you help combat
cyberbullying? Present your answer through an
infographic.
What I Can Do
Additional Activities
Answer the activity on page 17 on your module.
Direction:
Create a short rap that suggest ways on
how to stop cyber bullying.
Post - Test
1. Economic inequality between groups in terms of
access to, use of, or knowledge of ICT.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
2. Sending messages/emails of insult, humiliating
photos and fake profiles deliberately shared across
social media.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
Post - Test
3. Happens when sellers pretend to sell goods or
services which, after payment, either do not show the
promised attributes or are not delivered at all.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
4. Harvesting bank details, in particular personal
identification numbers with the intent to ransack other
people’s bank accounts.
a.RA 8293 c. Cyberbullying
b. Phishing d. Commercial fraud
Post - Test
5. A governing act that aims to address legal issues
concerning online interactions and technology related
concerns in the country.
a.RA 8293 c. Cyberbullying
b. RA 10175 d. Commercial fraud
6. The excessive use of computers to the extent that it
interferes with daily life is called?
a.Cyberbullying c. Computer Addiction
b. Grooming d. Phishing
Post - Test
7. It refers to pedophiles using the Internet as a means
to contact children and young people while concealing
their adult identity.
a.Grooming c. Computer Addiction
b. Commercial Fraud d. Phishing
Post - Test
8. It is one of the offenses against the confidentiality,
integrity, and availability of computer data and
systems which refers to the intentional or reckless
alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data
message, without right, including the introduction or
transmission of viruses.
a.Grooming c. Illegal Interception
b. Data Interference d. Illegal Access
Post - Test
9. It refers to the willful engagement, maintenance,
control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual
activity, with the aid of a computer system, for favor or
consideration.
a.Grooming c. Cybersex
b. Libel d. Child Pornography
Post - Test
9. It refers to the unlawful or prohibited acts of libel as
defined in Article 355 of the Revised Penal Code, as
amended, committed through a computer system or
any other similar means which may be devised in the
future.
a.Grooming c. Cybersex
b. Libel d. Child Pornography
Post – Test Answer Key
1. a
2. c
3. d
4. b
5. b
6. c
7. a
8. b
9. c
10. b
● Quarter 2 Module 1 &
2
● Opportunities and
Challenges in Media
and Information
● Current and Future
trends in media and
information
● Ma’am Fretzie
Cambiado
Dec. 09,
2021
at 1:00 PM
See you
next week.
CREDITS: This presentation template was
created by Slidesgo, including icons by
Flaticon, infographics & images by Freepik
Thank you
for learning
with me Keep safe
everyone , stay
healthy and
strong always

MIL-Q1M9.pptx

  • 1.
    Quarter 1 –Module 9 Media and Information Literacy(MIL)
  • 2.
    Quarter 2 –Module 1 & 2 Media and Information Literacy(MIL)
  • 3.
  • 4.
    LO 1 –Understand opportunities and challenges in media and information. (MIL11/12OCP-IIIh-24);
  • 5.
    LO 2 –Cite an example of an issue showing the power of media and information to affect change. (MIL11/12OCP-IIIh-25)
  • 6.
    LO 1 –Define and describe what Massive Open Online Course. (MIL11/12CFT-IIIi-27)
  • 7.
    ● After goingthrough this module, you are expected to: a. Determine how media and information affect change in society; b. Identify the advantages and disadvantages of the internet in a given context; and c. Give an issue that shows the power of media and information to affect change.
  • 8.
    ● After goingthrough this module, you are expected to: d. Describe the new trend in media and information in education; e. Determine the value of progressive lifestyle and education; and lastly, f. Predict future innovations based on observation.
  • 9.
    Quarter 2 –Module 1 & 2 Opportunities and Challenges and Current and Future Trends in Media and Information
  • 10.
    ACTIVITY 1: Directions: Construct yourOWN definition for the following concepts: 1. Cybercrime? 2. Computer Addiction? 3. Cyber bullying?
  • 11.
  • 12.
    What is it? Moneytheft/phishing  it refers to the process of harvesting bank details, in particular, personal identification numbers (PINs) and transaction authentication numbers (TANs), with the intent to ransack other people’s bank accounts.
  • 13.
    What is it? 8things you can do to safeguard yourself against phishing threats: 1. Always be aware of the content of the email that is sent to you. Never click suspicious links. 2. Be very careful of emails requesting sensitive information. 3. Always check to make sure that the site is verified. By checking the actual email that is sent to you and not just the displayed name.
  • 14.
    What is it? 8things you can do to safeguard yourself against phishing threats: 4. Phishers sometimes use scare tactics. Like threatening to cancel your service in case you failed to update information. Don’t react unless you are sure.
  • 15.
    What is it? 8things you can do to safeguard yourself against phishing threats: 5. Don’t sign up and put your email in sites or forms when you don’t have to. Most of the spam and junk you received as a result of you signing up to certain websites.
  • 16.
    What is it? 8things you can do to safeguard yourself against phishing threats: 6. Never input sensitive information in forms that are present in suspicious emails. 7. Instead of pressing links in emails, input the links yourself to prevent being tricked into going to a false site. 8. Check for HTTPS (secure connection on the site) at the start of the web site link. To make sure that the website you are using is not a fake one.
  • 17.
    What is it? Commercialfraud  Commercial fraud happens when sellers pretend to sell goods or services which, after payment, either do not show the promised attributes or are not delivered at all.
  • 18.
    What is it? Grooming refers to pedophiles using the Internet as a means to contact children and young people while concealing their adult identity. (grooming is also known as Child Sexual Exploitation).
  • 19.
    What is it? Hereare the warning signs of grooming: 1. Age difference 2. encouraging you to get involved in sexual activity early on in the relationship/friendship. 3. Illegal/criminal activity, travelling to and from places or parties also known as trafficking,
  • 20.
    What is it? Hereare the warning signs of grooming: 4. controlling behavior 5. telling lies and keeping secrets from friends and family 6. trying to get you alone as opposed to meeting your friends or family.
  • 21.
    What is it? Hereare the warning signs of grooming: 7. Overly friendly to your friends and family to try and win them over 8. Nudity – sending nude images
  • 22.
    What is it? Bullying is the use of force, coercion, hurtful teasing or threat, to abuse, aggressively dominate or intimidate.
  • 23.
    What is it? Computeraddiction  the excessive use of computers to the extent that it interferes with daily life.
  • 24.
    What is it? 5subcategories of specific types of computer and internet addictions. 1. Cybersex Addiction 2. Net Compulsions 3. Cyber (Online) Relationship Addiction 4. Cumpulsive Information Seeking 5. Computer or Gaming Addiction
  • 25.
    What is it? Digitaldivide  the economic inequality between groups in terms of access to, use of, or knowledge of ICT.
  • 26.
    What is it? Digitaldivide The access divide It refers to the socioeconomic differences among people and the impact on their ability to afford the devices necessary to get online.
  • 27.
    What is it? Digitaldivide The use divide This refers to the difference in the level of skills possessed by individuals.
  • 28.
    What is it? Digitaldivide The quality-of-use gap It refers to the different ways that people use the Internet and the fact that some people are far more able to get the information they need from it than others.
  • 29.
    What is it? RepublicAct 10175 also known as the “Cybercrime Prevention Act of 2012” which aims to address legal issues concerning online interactions and technology related concerns in the country.
  • 30.
    What is it? CHAPTERII. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (1) Illegal Access – The access to the whole or any part of a computer system without right.
  • 31.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (2) Illegal Interception – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
  • 32.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (3) Data Interference — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
  • 33.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (4) System Interference — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
  • 34.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (5) Misuse of Devices (i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
  • 35.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (6) Cyber-squatting – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same.
  • 36.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (b) Computer-related Offenses: (1) Computer-related Forgery (i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or
  • 37.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (b) Computer-related Offenses: (2) Computer-related Fraud — The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.
  • 38.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (b) Computer-related Offenses: (3) Computer-related Identity Theft – The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.
  • 39.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (c) Content-related Offenses: (1) Cybersex — The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
  • 40.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (c) Content-related Offenses: (2) Child Pornography — The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.
  • 41.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (c) Content-related Offenses: (3) Unsolicited Commercial Communications. — The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited unless: (i) There is prior affirmative consent from the recipient;
  • 42.
    CHAPTER II. PUNISHABLEACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (c) Content-related Offenses: (4) Libel — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.
  • 43.
  • 44.
    What’s More Answer thefollowing questions on page 11 on your module. 1. Discuss how cybercrime becomes a national concern 2. What makes computer addiction a problem? 3. Explain how somebody can be a victim of cyber bullying?
  • 45.
    What I HaveLearned Answer the following questions on page 12 on your module. 1. What is cybercrime? 2. Enumerate examples of cybercrime 3. We can combat cybercrime by… 4. We can protect ourselves from cybercrime by…
  • 46.
    What I CanDo Answer the following questions on page 13 on your module. Guide Question: As a student, how can you help combat cyberbullying? Present your answer through an infographic.
  • 47.
  • 48.
    Additional Activities Answer theactivity on page 17 on your module. Direction: Create a short rap that suggest ways on how to stop cyber bullying.
  • 49.
    Post - Test 1.Economic inequality between groups in terms of access to, use of, or knowledge of ICT. a.Digital Divide c. Cyberbullying b. RA 10175 d. Commercial fraud 2. Sending messages/emails of insult, humiliating photos and fake profiles deliberately shared across social media. a.Digital Divide c. Cyberbullying b. RA 10175 d. Commercial fraud
  • 50.
    Post - Test 3.Happens when sellers pretend to sell goods or services which, after payment, either do not show the promised attributes or are not delivered at all. a.Digital Divide c. Cyberbullying b. RA 10175 d. Commercial fraud 4. Harvesting bank details, in particular personal identification numbers with the intent to ransack other people’s bank accounts. a.RA 8293 c. Cyberbullying b. Phishing d. Commercial fraud
  • 51.
    Post - Test 5.A governing act that aims to address legal issues concerning online interactions and technology related concerns in the country. a.RA 8293 c. Cyberbullying b. RA 10175 d. Commercial fraud 6. The excessive use of computers to the extent that it interferes with daily life is called? a.Cyberbullying c. Computer Addiction b. Grooming d. Phishing
  • 52.
    Post - Test 7.It refers to pedophiles using the Internet as a means to contact children and young people while concealing their adult identity. a.Grooming c. Computer Addiction b. Commercial Fraud d. Phishing
  • 53.
    Post - Test 8.It is one of the offenses against the confidentiality, integrity, and availability of computer data and systems which refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses. a.Grooming c. Illegal Interception b. Data Interference d. Illegal Access
  • 54.
    Post - Test 9.It refers to the willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. a.Grooming c. Cybersex b. Libel d. Child Pornography
  • 55.
    Post - Test 9.It refers to the unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future. a.Grooming c. Cybersex b. Libel d. Child Pornography
  • 56.
    Post – TestAnswer Key 1. a 2. c 3. d 4. b 5. b 6. c 7. a 8. b 9. c 10. b
  • 57.
    ● Quarter 2Module 1 & 2 ● Opportunities and Challenges in Media and Information ● Current and Future trends in media and information ● Ma’am Fretzie Cambiado Dec. 09, 2021 at 1:00 PM See you next week.
  • 59.
    CREDITS: This presentationtemplate was created by Slidesgo, including icons by Flaticon, infographics & images by Freepik Thank you for learning with me Keep safe everyone , stay healthy and strong always