SlideShare a Scribd company logo
1 of 59
Quarter 1 – Module 9
Media and
Information
Literacy(MIL)
Quarter 2 – Module 1 & 2
Media and
Information
Literacy(MIL)
Review of the
past lesson
LO 1 – Understand opportunities and
challenges in media and information.
(MIL11/12OCP-IIIh-24);
LO 2 – Cite an example of an issue
showing the power of media and
information to affect change.
(MIL11/12OCP-IIIh-25)
LO 1 – Define and describe what
Massive Open Online Course.
(MIL11/12CFT-IIIi-27)
● After going through this module, you are
expected to:
a. Determine how media and information
affect change in society;
b. Identify the advantages and
disadvantages of the internet in a given
context; and
c. Give an issue that shows the power of
media and information to affect change.
● After going through this module, you are
expected to:
d. Describe the new trend in media and
information in education;
e. Determine the value of progressive
lifestyle and education; and lastly,
f. Predict future innovations based on
observation.
Quarter 2 – Module 1 & 2
Opportunities and
Challenges and Current and
Future Trends in Media and
Information
ACTIVITY 1:
Directions:
Construct your OWN definition for the following
concepts:
1. Cybercrime?
2. Computer Addiction?
3. Cyber bullying?
Challenges in the
Virtual World
What is it?
Money theft/phishing
 it refers to the process of harvesting bank details,
in particular, personal identification numbers
(PINs) and transaction authentication numbers
(TANs), with the intent to ransack other people’s
bank accounts.
What is it?
8 things you can do to safeguard
yourself against phishing threats:
1. Always be aware of the content of the email that is
sent to you. Never click suspicious links.
2. Be very careful of emails requesting sensitive
information.
3. Always check to make sure that the site is verified. By
checking the actual email that is sent to you and not
just the displayed name.
What is it?
8 things you can do to safeguard
yourself against phishing threats:
4. Phishers sometimes use scare tactics. Like
threatening to cancel your service in case you failed
to update information. Don’t react unless you are
sure.
What is it?
8 things you can do to safeguard
yourself against phishing threats:
5. Don’t sign up and put your email in sites or forms
when you don’t have to. Most of the spam and junk
you received as a result of you signing up to certain
websites.
What is it?
8 things you can do to safeguard
yourself against phishing threats:
6. Never input sensitive information in forms that are present in
suspicious emails.
7. Instead of pressing links in emails, input the links yourself to
prevent being tricked into going to a false site.
8. Check for HTTPS (secure connection on the site) at the start of
the web site link. To make sure that the website you are using
is not a fake one.
What is it?
Commercial fraud
 Commercial fraud happens when sellers pretend
to sell goods or services which, after payment,
either do not show the promised attributes or are
not delivered at all.
What is it?
Grooming
 refers to pedophiles using the Internet as a
means to contact children and young people
while concealing their adult identity. (grooming is
also known as Child Sexual Exploitation).
What is it?
Here are the warning signs of
grooming:
1. Age difference
2. encouraging you to get involved
in sexual activity early on in the
relationship/friendship.
3. Illegal/criminal activity, travelling
to and from places or parties also
known as trafficking,
What is it?
Here are the warning signs of
grooming:
4. controlling behavior
5. telling lies and keeping secrets
from friends and family
6. trying to get you alone as
opposed to meeting your friends
or family.
What is it?
Here are the warning signs of
grooming:
7. Overly friendly to your friends
and family to try and win them
over
8. Nudity – sending nude images
What is it?
Bullying
 is the use of force, coercion, hurtful
teasing or threat, to abuse,
aggressively dominate or
intimidate.
What is it?
Computer addiction
 the excessive use of computers
to the extent that it interferes
with daily life.
What is it?
5 subcategories of specific types of
computer and internet addictions.
1. Cybersex Addiction
2. Net Compulsions
3. Cyber (Online) Relationship Addiction
4. Cumpulsive Information Seeking
5. Computer or Gaming Addiction
What is it?
Digital divide
 the economic inequality between
groups in terms of access to, use
of, or knowledge of ICT.
What is it?
Digital divide
The access divide
It refers to the socioeconomic
differences among people and the
impact on their ability to afford the
devices necessary to get online.
What is it?
Digital divide
The use divide
This refers to the difference in
the level of skills possessed by
individuals.
What is it?
Digital divide
The quality-of-use gap
It refers to the different ways
that people use the Internet and the
fact that some people are far more
able to get the information they need
from it than others.
What is it?
Republic Act 10175
also known as the “Cybercrime
Prevention Act of 2012” which
aims to address legal issues
concerning online interactions
and technology related concerns
in the country.
What is it?
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(1) Illegal Access – The access to the whole or any part of a
computer system without right.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(2) Illegal Interception – The interception made by technical
means without right of any non-public transmission of
computer data to, from, or within a computer system
including electromagnetic emissions from a computer
system carrying such computer data.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(3) Data Interference — The intentional or reckless alteration,
damaging, deletion or deterioration of computer data,
electronic document, or electronic data message, without
right, including the introduction or transmission of viruses.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(4) System Interference — The intentional alteration or reckless hindering
or interference with the functioning of a computer or computer
network by inputting, transmitting, damaging, deleting, deteriorating,
altering or suppressing computer data or program, electronic
document, or electronic data message, without right or authority,
including the introduction or transmission of viruses.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(5) Misuse of Devices
(i) The use, production, sale, procurement, importation,
distribution, or otherwise making available, without right,
of:
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(6) Cyber-squatting – The acquisition of a domain name over
the internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the same.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(1) Computer-related Forgery
(i) The input, alteration, or deletion of any computer data
without right resulting in inauthentic data with the intent
that it be considered or acted upon for legal purposes as
if it were authentic, regardless whether or not the data is
directly readable and intelligible; or
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(2) Computer-related Fraud — The unauthorized input,
alteration, or deletion of computer data or program or
interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided,
That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(3) Computer-related Identity Theft – The intentional
acquisition, use, misuse, transfer, possession, alteration
or deletion of identifying information belonging to another,
whether natural or juridical, without right: Provided, That if
no damage has yet been caused, the penalty imposable
shall be one (1) degree lower.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(1) Cybersex — The willful engagement, maintenance, control,
or operation, directly or indirectly, of any lascivious
exhibition of sexual organs or sexual activity, with the aid
of a computer system, for favor or consideration.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(2) Child Pornography — The unlawful or prohibited acts
defined and punishable by Republic Act No. 9775 or the
Anti-Child Pornography Act of 2009, committed through a
computer system: Provided, That the penalty to be
imposed shall be (1) one degree higher than that provided
for in Republic Act No. 9775.
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(3) Unsolicited Commercial Communications. — The
transmission of commercial electronic communication
with the use of computer system which seek to advertise,
sell, or offer for sale products and services are prohibited
unless: (i) There is prior affirmative consent from the
recipient;
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(4) Libel — The unlawful or prohibited acts of libel as defined
in Article 355 of the Revised Penal Code, as amended,
committed through a computer system or any other similar
means which may be devised in the future.
What Is It?
What’s More
Answer the following questions on page 11 on
your module.
1. Discuss how cybercrime becomes a national concern
2. What makes computer addiction a problem?
3. Explain how somebody can be a victim of cyber
bullying?
What I Have Learned
Answer the following questions on page 12 on
your module.
1. What is cybercrime?
2. Enumerate examples of cybercrime
3. We can combat cybercrime by…
4. We can protect ourselves from cybercrime by…
What I Can Do
Answer the following questions on page 13 on
your module.
Guide Question:
As a student, how can you help combat
cyberbullying? Present your answer through an
infographic.
What I Can Do
Additional Activities
Answer the activity on page 17 on your module.
Direction:
Create a short rap that suggest ways on
how to stop cyber bullying.
Post - Test
1. Economic inequality between groups in terms of
access to, use of, or knowledge of ICT.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
2. Sending messages/emails of insult, humiliating
photos and fake profiles deliberately shared across
social media.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
Post - Test
3. Happens when sellers pretend to sell goods or
services which, after payment, either do not show the
promised attributes or are not delivered at all.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
4. Harvesting bank details, in particular personal
identification numbers with the intent to ransack other
people’s bank accounts.
a.RA 8293 c. Cyberbullying
b. Phishing d. Commercial fraud
Post - Test
5. A governing act that aims to address legal issues
concerning online interactions and technology related
concerns in the country.
a.RA 8293 c. Cyberbullying
b. RA 10175 d. Commercial fraud
6. The excessive use of computers to the extent that it
interferes with daily life is called?
a.Cyberbullying c. Computer Addiction
b. Grooming d. Phishing
Post - Test
7. It refers to pedophiles using the Internet as a means
to contact children and young people while concealing
their adult identity.
a.Grooming c. Computer Addiction
b. Commercial Fraud d. Phishing
Post - Test
8. It is one of the offenses against the confidentiality,
integrity, and availability of computer data and
systems which refers to the intentional or reckless
alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data
message, without right, including the introduction or
transmission of viruses.
a.Grooming c. Illegal Interception
b. Data Interference d. Illegal Access
Post - Test
9. It refers to the willful engagement, maintenance,
control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual
activity, with the aid of a computer system, for favor or
consideration.
a.Grooming c. Cybersex
b. Libel d. Child Pornography
Post - Test
9. It refers to the unlawful or prohibited acts of libel as
defined in Article 355 of the Revised Penal Code, as
amended, committed through a computer system or
any other similar means which may be devised in the
future.
a.Grooming c. Cybersex
b. Libel d. Child Pornography
Post – Test Answer Key
1. a
2. c
3. d
4. b
5. b
6. c
7. a
8. b
9. c
10. b
● Quarter 2 Module 1 &
2
● Opportunities and
Challenges in Media
and Information
● Current and Future
trends in media and
information
● Ma’am Fretzie
Cambiado
Dec. 09,
2021
at 1:00 PM
See you
next week.
CREDITS: This presentation template was
created by Slidesgo, including icons by
Flaticon, infographics & images by Freepik
Thank you
for learning
with me Keep safe
everyone , stay
healthy and
strong always

More Related Content

What's hot

The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and InformationEILLEN IVY PORTUGUEZ
 
Media and Information Literacy
Media and Information LiteracyMedia and Information Literacy
Media and Information Literacyjannanavarra
 
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 1)- Definitio...
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 1)- Definitio...Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 1)- Definitio...
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 1)- Definitio...Arniel Ping
 
Current and Future Trends in Media and Information
Current and Future Trends in Media and InformationCurrent and Future Trends in Media and Information
Current and Future Trends in Media and InformationAngelo Delossantos
 
Current and Future Trends of Media and Information - Part 1.pptx
Current and Future Trends of Media and Information - Part 1.pptxCurrent and Future Trends of Media and Information - Part 1.pptx
Current and Future Trends of Media and Information - Part 1.pptxMarylieNoran2
 
Module 6: PHILOSOPHY The human person in society
Module 6: PHILOSOPHY  The human person in societyModule 6: PHILOSOPHY  The human person in society
Module 6: PHILOSOPHY The human person in societyGAMALI Roper
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Arniel Ping
 
CURRENT AND FUTURE TRENDS IN MEDIA AND .pdf
CURRENT AND FUTURE TRENDS IN MEDIA AND .pdfCURRENT AND FUTURE TRENDS IN MEDIA AND .pdf
CURRENT AND FUTURE TRENDS IN MEDIA AND .pdfMagdaLo1
 
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Arniel Ping
 
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Arniel Ping
 
1. introduction to mil (part 2) characteristics of information literate indi...
1. introduction to mil (part 2)  characteristics of information literate indi...1. introduction to mil (part 2)  characteristics of information literate indi...
1. introduction to mil (part 2) characteristics of information literate indi...MelvyEspanol1
 
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Arniel Ping
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Arniel Ping
 
Mil 10. media and information literate individual (feb.12)
Mil   10. media and information literate individual (feb.12)Mil   10. media and information literate individual (feb.12)
Mil 10. media and information literate individual (feb.12)Juncar Tome
 
Visual Media and Information - Media and Information Literacy (MIL)
Visual Media and Information - Media and Information Literacy (MIL)Visual Media and Information - Media and Information Literacy (MIL)
Visual Media and Information - Media and Information Literacy (MIL)Mark Jhon Oxillo
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvVivienPastores1
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Amber Espiritu
 
Daily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docxDaily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docxRoNTertainmentTV
 
Media and Information Literacy (MIL) Types of Media (Part 2)- Mass Media and ...
Media and Information Literacy (MIL) Types of Media (Part 2)- Mass Media and ...Media and Information Literacy (MIL) Types of Media (Part 2)- Mass Media and ...
Media and Information Literacy (MIL) Types of Media (Part 2)- Mass Media and ...Arniel Ping
 

What's hot (20)

The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Media and Information Literacy
Media and Information LiteracyMedia and Information Literacy
Media and Information Literacy
 
MEDIA LITERACY-DLL 4.docx
MEDIA LITERACY-DLL 4.docxMEDIA LITERACY-DLL 4.docx
MEDIA LITERACY-DLL 4.docx
 
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 1)- Definitio...
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 1)- Definitio...Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 1)- Definitio...
Media and Information Literacy (MIL) 4.MIL Media Literacy (Part 1)- Definitio...
 
Current and Future Trends in Media and Information
Current and Future Trends in Media and InformationCurrent and Future Trends in Media and Information
Current and Future Trends in Media and Information
 
Current and Future Trends of Media and Information - Part 1.pptx
Current and Future Trends of Media and Information - Part 1.pptxCurrent and Future Trends of Media and Information - Part 1.pptx
Current and Future Trends of Media and Information - Part 1.pptx
 
Module 6: PHILOSOPHY The human person in society
Module 6: PHILOSOPHY  The human person in societyModule 6: PHILOSOPHY  The human person in society
Module 6: PHILOSOPHY The human person in society
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
 
CURRENT AND FUTURE TRENDS IN MEDIA AND .pdf
CURRENT AND FUTURE TRENDS IN MEDIA AND .pdfCURRENT AND FUTURE TRENDS IN MEDIA AND .pdf
CURRENT AND FUTURE TRENDS IN MEDIA AND .pdf
 
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
 
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
 
1. introduction to mil (part 2) characteristics of information literate indi...
1. introduction to mil (part 2)  characteristics of information literate indi...1. introduction to mil (part 2)  characteristics of information literate indi...
1. introduction to mil (part 2) characteristics of information literate indi...
 
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
 
Mil 10. media and information literate individual (feb.12)
Mil   10. media and information literate individual (feb.12)Mil   10. media and information literate individual (feb.12)
Mil 10. media and information literate individual (feb.12)
 
Visual Media and Information - Media and Information Literacy (MIL)
Visual Media and Information - Media and Information Literacy (MIL)Visual Media and Information - Media and Information Literacy (MIL)
Visual Media and Information - Media and Information Literacy (MIL)
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
 
Daily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docxDaily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docx
 
Media and Information Literacy (MIL) Types of Media (Part 2)- Mass Media and ...
Media and Information Literacy (MIL) Types of Media (Part 2)- Mass Media and ...Media and Information Literacy (MIL) Types of Media (Part 2)- Mass Media and ...
Media and Information Literacy (MIL) Types of Media (Part 2)- Mass Media and ...
 

Similar to MIL-Q1M9.pptx

Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxnorwinadriatico
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptraffy ursulum
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxBenjieBarlaan
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxAnecitaLCalamohoy
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxLeah Condina
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptxReminPasion1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
E0334035040
E0334035040E0334035040
E0334035040theijes
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 

Similar to MIL-Q1M9.pptx (20)

Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.ppt
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
E0334035040
E0334035040E0334035040
E0334035040
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

MIL-Q1M9.pptx

  • 1. Quarter 1 – Module 9 Media and Information Literacy(MIL)
  • 2. Quarter 2 – Module 1 & 2 Media and Information Literacy(MIL)
  • 4. LO 1 – Understand opportunities and challenges in media and information. (MIL11/12OCP-IIIh-24);
  • 5. LO 2 – Cite an example of an issue showing the power of media and information to affect change. (MIL11/12OCP-IIIh-25)
  • 6. LO 1 – Define and describe what Massive Open Online Course. (MIL11/12CFT-IIIi-27)
  • 7. ● After going through this module, you are expected to: a. Determine how media and information affect change in society; b. Identify the advantages and disadvantages of the internet in a given context; and c. Give an issue that shows the power of media and information to affect change.
  • 8. ● After going through this module, you are expected to: d. Describe the new trend in media and information in education; e. Determine the value of progressive lifestyle and education; and lastly, f. Predict future innovations based on observation.
  • 9. Quarter 2 – Module 1 & 2 Opportunities and Challenges and Current and Future Trends in Media and Information
  • 10. ACTIVITY 1: Directions: Construct your OWN definition for the following concepts: 1. Cybercrime? 2. Computer Addiction? 3. Cyber bullying?
  • 12. What is it? Money theft/phishing  it refers to the process of harvesting bank details, in particular, personal identification numbers (PINs) and transaction authentication numbers (TANs), with the intent to ransack other people’s bank accounts.
  • 13. What is it? 8 things you can do to safeguard yourself against phishing threats: 1. Always be aware of the content of the email that is sent to you. Never click suspicious links. 2. Be very careful of emails requesting sensitive information. 3. Always check to make sure that the site is verified. By checking the actual email that is sent to you and not just the displayed name.
  • 14. What is it? 8 things you can do to safeguard yourself against phishing threats: 4. Phishers sometimes use scare tactics. Like threatening to cancel your service in case you failed to update information. Don’t react unless you are sure.
  • 15. What is it? 8 things you can do to safeguard yourself against phishing threats: 5. Don’t sign up and put your email in sites or forms when you don’t have to. Most of the spam and junk you received as a result of you signing up to certain websites.
  • 16. What is it? 8 things you can do to safeguard yourself against phishing threats: 6. Never input sensitive information in forms that are present in suspicious emails. 7. Instead of pressing links in emails, input the links yourself to prevent being tricked into going to a false site. 8. Check for HTTPS (secure connection on the site) at the start of the web site link. To make sure that the website you are using is not a fake one.
  • 17. What is it? Commercial fraud  Commercial fraud happens when sellers pretend to sell goods or services which, after payment, either do not show the promised attributes or are not delivered at all.
  • 18. What is it? Grooming  refers to pedophiles using the Internet as a means to contact children and young people while concealing their adult identity. (grooming is also known as Child Sexual Exploitation).
  • 19. What is it? Here are the warning signs of grooming: 1. Age difference 2. encouraging you to get involved in sexual activity early on in the relationship/friendship. 3. Illegal/criminal activity, travelling to and from places or parties also known as trafficking,
  • 20. What is it? Here are the warning signs of grooming: 4. controlling behavior 5. telling lies and keeping secrets from friends and family 6. trying to get you alone as opposed to meeting your friends or family.
  • 21. What is it? Here are the warning signs of grooming: 7. Overly friendly to your friends and family to try and win them over 8. Nudity – sending nude images
  • 22. What is it? Bullying  is the use of force, coercion, hurtful teasing or threat, to abuse, aggressively dominate or intimidate.
  • 23. What is it? Computer addiction  the excessive use of computers to the extent that it interferes with daily life.
  • 24. What is it? 5 subcategories of specific types of computer and internet addictions. 1. Cybersex Addiction 2. Net Compulsions 3. Cyber (Online) Relationship Addiction 4. Cumpulsive Information Seeking 5. Computer or Gaming Addiction
  • 25. What is it? Digital divide  the economic inequality between groups in terms of access to, use of, or knowledge of ICT.
  • 26. What is it? Digital divide The access divide It refers to the socioeconomic differences among people and the impact on their ability to afford the devices necessary to get online.
  • 27. What is it? Digital divide The use divide This refers to the difference in the level of skills possessed by individuals.
  • 28. What is it? Digital divide The quality-of-use gap It refers to the different ways that people use the Internet and the fact that some people are far more able to get the information they need from it than others.
  • 29. What is it? Republic Act 10175 also known as the “Cybercrime Prevention Act of 2012” which aims to address legal issues concerning online interactions and technology related concerns in the country.
  • 30. What is it? CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (1) Illegal Access – The access to the whole or any part of a computer system without right.
  • 31. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (2) Illegal Interception – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
  • 32. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (3) Data Interference — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
  • 33. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (4) System Interference — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
  • 34. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (5) Misuse of Devices (i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
  • 35. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity, and availability of computer data and systems: (6) Cyber-squatting – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same.
  • 36. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (b) Computer-related Offenses: (1) Computer-related Forgery (i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or
  • 37. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (b) Computer-related Offenses: (2) Computer-related Fraud — The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.
  • 38. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (b) Computer-related Offenses: (3) Computer-related Identity Theft – The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.
  • 39. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (c) Content-related Offenses: (1) Cybersex — The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
  • 40. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (c) Content-related Offenses: (2) Child Pornography — The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.
  • 41. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (c) Content-related Offenses: (3) Unsolicited Commercial Communications. — The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited unless: (i) There is prior affirmative consent from the recipient;
  • 42. CHAPTER II. PUNISHABLE ACTS Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act: (c) Content-related Offenses: (4) Libel — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.
  • 44. What’s More Answer the following questions on page 11 on your module. 1. Discuss how cybercrime becomes a national concern 2. What makes computer addiction a problem? 3. Explain how somebody can be a victim of cyber bullying?
  • 45. What I Have Learned Answer the following questions on page 12 on your module. 1. What is cybercrime? 2. Enumerate examples of cybercrime 3. We can combat cybercrime by… 4. We can protect ourselves from cybercrime by…
  • 46. What I Can Do Answer the following questions on page 13 on your module. Guide Question: As a student, how can you help combat cyberbullying? Present your answer through an infographic.
  • 48. Additional Activities Answer the activity on page 17 on your module. Direction: Create a short rap that suggest ways on how to stop cyber bullying.
  • 49. Post - Test 1. Economic inequality between groups in terms of access to, use of, or knowledge of ICT. a.Digital Divide c. Cyberbullying b. RA 10175 d. Commercial fraud 2. Sending messages/emails of insult, humiliating photos and fake profiles deliberately shared across social media. a.Digital Divide c. Cyberbullying b. RA 10175 d. Commercial fraud
  • 50. Post - Test 3. Happens when sellers pretend to sell goods or services which, after payment, either do not show the promised attributes or are not delivered at all. a.Digital Divide c. Cyberbullying b. RA 10175 d. Commercial fraud 4. Harvesting bank details, in particular personal identification numbers with the intent to ransack other people’s bank accounts. a.RA 8293 c. Cyberbullying b. Phishing d. Commercial fraud
  • 51. Post - Test 5. A governing act that aims to address legal issues concerning online interactions and technology related concerns in the country. a.RA 8293 c. Cyberbullying b. RA 10175 d. Commercial fraud 6. The excessive use of computers to the extent that it interferes with daily life is called? a.Cyberbullying c. Computer Addiction b. Grooming d. Phishing
  • 52. Post - Test 7. It refers to pedophiles using the Internet as a means to contact children and young people while concealing their adult identity. a.Grooming c. Computer Addiction b. Commercial Fraud d. Phishing
  • 53. Post - Test 8. It is one of the offenses against the confidentiality, integrity, and availability of computer data and systems which refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses. a.Grooming c. Illegal Interception b. Data Interference d. Illegal Access
  • 54. Post - Test 9. It refers to the willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. a.Grooming c. Cybersex b. Libel d. Child Pornography
  • 55. Post - Test 9. It refers to the unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future. a.Grooming c. Cybersex b. Libel d. Child Pornography
  • 56. Post – Test Answer Key 1. a 2. c 3. d 4. b 5. b 6. c 7. a 8. b 9. c 10. b
  • 57. ● Quarter 2 Module 1 & 2 ● Opportunities and Challenges in Media and Information ● Current and Future trends in media and information ● Ma’am Fretzie Cambiado Dec. 09, 2021 at 1:00 PM See you next week.
  • 58.
  • 59. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, infographics & images by Freepik Thank you for learning with me Keep safe everyone , stay healthy and strong always