0% found this document useful (0 votes)
2K views23 pages

ALS - JH - LS6 - Digital Ethics Why It Is Important - Galvez - Baguio City

Uploaded by

alma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views23 pages

ALS - JH - LS6 - Digital Ethics Why It Is Important - Galvez - Baguio City

Uploaded by

alma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

DIGITAL ETHICS

WHY IT IS IMPORTANT?
CHARACTERISTICS
AND TYPES ODEVICE
Module in ALS - Learning Strand 6
Digital Citizenships

https://www.google.com/search?q=digital+ethics+picture

Rolando G. Galvez
Department of Education • Division of Baguio City
i
Republic of the Philippines

DEPARTMENT OF EDUCATION
Cordillera Administrative Region
SCHOOLS DIVISION OF BAGUIO CITY
#82 Military Cut-Off, Baguio City

Published by
Learning Resource Management and Development System

COPYRIGHT NOTICE
2021

Section 9 of Presidential Decree No. 49 provides:

“No copyright shall subsist in any work of the Government of the Philippines.
However, prior approval of the government agency of office wherein the work is
created shall be necessary for exploitation of such work for profit.”

This material has been developed for the implementation of K-12 Curriculum
through the DepEd Schools Division of Baguio City - Curriculum Implementation
Division (CID). It can be reproduced for educational purposes and the source must
be acknowledged. Derivatives of the work including creating an edited version, an
enhancement or a supplementary work are permitted provided all original work is
acknowledged and the copyright is attributed. No work may be derived from this
material for commercial purposes and profit.

ii
PREFACE
This module is a project of the DepEd Schools Division of Baguio City through
the Curriculum Implementation Division (CID) which is in response to the
implementation of the Alternative Learning System - K to 12 Curriculum.

This Learning Material is a property of the Department of Education, Schools


Division of Baguio City. It aims to improve students’ performance specifically in
Learning Strand 6 Digital Citizenship. earning Strand 6: Digital Citizenship.

Date of Development: March 2021February1, 2021


Resource Location: Schools Division of Baguio City
Learning Area: LS 6- Digital Citizenship LS 6 –
Grade Level: Junior High School
Junior High School
Learning Resource Type: Module

Competencies
• Explain the meaning of digital ethics and why it is important
S6DL-DE-PSFBL/LE/AE/LS/AS1
• Distinguish ethical versus unethical behavior as a user of digital
technology
DL-DE-PSFLE/AE/LS/AS-2
●digital plagiarism
●breaking copyright and software theft
●improper use of digital resources
●securing information privacy and confidentiality
●computer fraud
• Practice respectful conduct when using the Internet
LS6DL-DE-PSFBL/LE/AE/LS/AS3
●sensitivity to national and local cultures
●avoiding identity misrepresentation and fraud
●internet etiquette while chatting, emailing, blogging, and using social
media
●protecting personal information

iii
ACKNOWLEDGMENT
The developer wishes to express his gratitude to those who helped in the
development of this learning material. The fulfillment of this learning material would
not be possible without them.
Thank you all for your moral and technical support in the crafting of this
learning module. To my colleagues in our school for sharing your knowledge and
expertise as I developed this learning resource. Lastly, to the office of DepEd
Division of Baguio City for giving us the opportunity to discover our skills as module
writers.

School Learning Resources Management Team


School Head / Principal: Arlito G. Pecay
School LR Coordinator: Arlito G. Pecay

Development Team
Developer/s: Rolando G. Galvez
Layout Artist:
Illustrator:

Quality Assurance Team


Mary Jane N. Malihod EPS – TLE
Lourdes B. Lomas-e PSDS – District 1

Learning Resource Management Section Staff


Armi Victoria A. Fiangaan EPS – LRMDS
Christopher David G. Oliva Project Development Officer II – LRMDS
Priscilla A. Dis-iw Librarian II
Lily B. Mabalot Librarian I
Jesse Lance S. Dawaton Admin. Assistant

CONSULTANTS

JULIET C. SANNAD, EdD


Chief Education Supervisor – CID

CHRISTOPHER C. BENIGNO
OIC - Asst. Schools Division Superintendent

MARIE CAROLYN B. VERANO, CESO V


Schools Division Superintendent

iv
TABLE OF CONTENTS
Page
Copyright Notice………………………………………………….……...… i
Preface …………………………………………………………………...… ii
Acknowledgment……………………………………………………. ……. iii
Table of Contents……………………………………………………….… iv
What I Need To Know
Learning Objectives …………………………………………………… 1
What I Know..………………………………………………………….…… 2
What’s In……………………………………………………………………. 4
What’s New………………..………………………….……………….……. 5
What Is It……………………...……………………………………...……… 6
What’s More..……………………………………………………….……… 10
What I Have Learned.……………………………………………………… 12
What I Can Do…………………………………………………………….… 13
Post-Assessment …………………...……………………………………… 14
Additional Activities……………………………………………….………… 16
Answer Key…………………………………………………………………. 17
References…………………………………………………...…….……… 18

v
What I Need to Knowle
This module was designed to equip you with essential knowledge about
importance of digital ethics, distinguishing ethical versus unethical behavior as a
user of digital and practice respectful conduct when using the Internet.

HOW TO USE THIS MODULE

This module contains several lessons. To make the most out of them, you need to
do the following:
1. Scan the list of Learning Objectives to get an idea of the knowledge and skills you
are expected to gain and develop as you study the module. These outcomes are
based on the content standards, performance standards, and learning competencies
of the ALS K to 12 Curriculum Digital Citizenship.
2. Each Lesson aims to develop one of the learning objectives set for the module. It
starts with an activity that will help you understand the lesson and complete the
required competencies.
3. Take your time in reading this module. Write down points for clarification. You may
discuss these points with your teacher.
4. Perform all activities and answer all worksheets. The activities and assessments
are designed to enhance your understanding of the lesson. Review the lessons if
necessary, until you have achieved a satisfactory level of understanding.
5. At the end of the module, take the Post-Assessment to evaluate your overall
understanding about the lessons.

LEARNING OBJECTIVES
At the end of the module, you should be able to:
Explain the meaning of digital ethics and why it is important.
S6DL-DE-PSFBL/LE/AE/LS/AS1
Distinguish ethical versus unethical behavior as a user of digital technology.
DL-DE-PSFLE/AE/LS/AS-2
●digital plagiarism ●breaking copyright and software theft ●improper
use of digital resources ●securing information privacy and
confidentiality ●computer fraud
Practice respectful conduct when using the Internet.
LS6DL-DE-PSFBL/LE/AE/LS/AS3
●sensitivity to national and local cultures
●avoiding identity misrepresentation and fraud
●internet etiquette while chatting, emailing, blogging, and using social
media
●protecting personal information

1
What I Know
The following activity will serve as a pre-test to determine what you already
know about mobile devices.

Read each item carefully and write the letter of the correct answer in a
separate sheet of paper.

1. What is unethical in using mobile devices?


a. These are electronic devices that are used to store data for information
using rules of behavior based on ideas about what is morally good.
b. These interconnecting devices brought by the Internet and digital devices
connect networks are used in right way.
c. This refers to the method in relating, treating and resolving issues that
encompass how individuals interact in good ways with each other.
d. This is used to connect for gambling, dating and used to share your pain.

2. Mobile devices are powerful enough to do many of the same things you can do
with a desktop computer.
a. no answer b. false c. true d. maybe

1. It is the protection of intellectual property rights, privacy and personality rights.


a. access rights b. beware of bias c. accountability d. digital rights

2. It is the access to empowering technology as a right or freedom.


a.access rights b. beware of bias c. accountability d. digital rights

5. This upholds the principle that its integrity must be assured if it is to be of value to
consumers.
a. Promote trust c. Design for privacy
b. Promote an ethical culture d. Maintain dignity and respect

6. This can be accomplished by avoiding deception and being fair, but can also be
conveyed through engaging users.
a. Promote trust c. Design for privacy
b. Promote an ethical culture d. Maintain dignity and respect

7. This collects and manages data which must uphold the principle that its integrity
must be assured if it is to be of value to consumers.
a. Promote trust c. Make use of netiquette
b. Promote an ethical culture d. Maintain dignity and respect

8. This comprises the rules of an online community on the online forums.


a. Promote trust c.Make use of netiquette
b. Promote an ethical culture d. Maintain dignity and respect

2
9. This is a range from small infractions such as not putting quotes around a
quotation to blatant violations such as copying an entire website.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theft d. Computer fraud

10. This is a cybercrime and the act of using a computer to take or alter electronic
data, or to gain unlawful use of a computer or system.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theft d. Computer fraud

11. Corporate digital ethics covers how individual users honor one another’s right to
self-determination online with respect to privacy and ownership.
a. no answer b. false c. true d. maybe

12. This is digital information and technology that is used in a wrong way by the user
such as using technology for slander, gossip, show scandals and many more.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theft d. Computer fraud

13. The users of digital technologies and Internet should practice right etiquette while
chatting, blogging and using social media as a respect to people and groups who are
going to watch, communicate and use the Internet.
a. Sensitivity to national and local cultures
b. Avoiding identity misrepresentation and fraud
c. Internet etiquette while chatting, emailing, blogging, and using social media
d. Protecting personal information

14. The users of digital technologies and Internet should understand the national and
local cultures in digital information shared and to be shared.
a. Sensitivity to national and local cultures
b. Avoiding identity misrepresentation and fraud
c. Internet etiquette while chatting, emailing, blogging, and using social media
d. Protecting personal information

15. Personal digital ethics is group ethics that practices an online platform like social
networks which collect sensitive information about users.
a. no answer b. false c. true d. maybe

3
What’s In
We already learned about a digital device. A digital device is a physical unit of equipment
that contains a computer or microcontroller which uses discrete, numerable data and
processes for all its operations. Today, myriad devices are digital including a smartphone,
tablet and smartwatch. This is an electronic device that can receive, store, process or send
digital information.
Activity to Review the Previous Lesson
Self-Check

Write D if the tool is a Digital Device or A for Analog Devices. Write your
answer in a separate sheet of paper.

___1. 150 PD ___6. Desktop


Camera Computer

___2. Smart phone ___7. Laser printer

___3. Microphone ___8. Thermometer

___4. Hand on speaker ___9. Headphone

___5. Smartwatch ___10. Multimeter

4
What’s New
This activity will help you remember the lesson for today.

Read and understand the poem Cyber Sense from Canada Centre for Digital and
Media Literacy.

CyberSense
//I have a special secret,
\\ Whenever I’m online -
// I don’t share with others
\\ The things that are just mine.
//My e-mail and my home address,
\\ My phone number and name -
// These are just for me to know,
\\In chat rooms or in games.
//Instead, I use my nonsense name -
\\It’s my online identity!
// When people ask me who I am,
\\I introduce my “cyber-me.”
// And when I want to surf the Web,
\\ for places that are cool,
//I get some help from mom or dad,
\\ or teachers from my school.

1. What does the poem talk about?

2. Relate your personal experience regarding digital technology.

3. What are the values that you can derive from the poem? Explain

5
What Is It
In this time of digital technology, the interconnecting devices brought by the
Internet and digital devices connect networks via Wi-Fi, Bluetooth, cellular networks
or Near Field Communication (NFC) with integrated cameras, the ability to place and
receive voice and video telephone calls, video games, and Global Positioning
System (GPS) capabilities make information and communication accessible to a
global world.
It is high time for learners to use digital devices. Digital devices are electronic
inventions that have the computer or a micro-computer to be used for storing data for
people consumption and information. Some examples of these digital devices are
computers, mobile phones, and the Internet.
During the time of the pandemic, digital technology and the Internet play
important roles and have become important tools in the learning process. These
tools give opportunities, make our life easier but at the same time have a profound
ethical implication. Digital ethics is important for learners to know the good and right
ways to use the Internet and other digital technologies.

Meaning of digital ethics

Digital ethics comes in two words digital and ethics. Digital from Merriam Webster is
the use of electronic devices that is relating to, using to, or storing data for
information. Ethics is a set of rules or behavior based on ideas about what is morally
good and bad behavior. So with the two combined words, Digital Ethics are the
rules applied to the users (individual and group) of computer devices when using the
Internet. Digital ethics also refers to treating and resolving issues that encompass
how user’s groups and individuals in online environments interact with each other
and the technologies and platforms they used to engage.

Personal digital ethics covers how individual users honor one another’s right to
self-determination online concerning privacy and ownership. These are ways of
interpersonal conduct on the online communication between one person to another
person on the use of the Internet through their computer devices.

The following are examples of respect for privacy and ownership in the digital
environment:
1) It is commonly polite if you ask consent from an individual who shares a good
picture or sayings for you to use.
2) Giving recognition to the person by citing his/her work.

Corporate digital ethics is a group ethics that practices on an online platform like
social networks which collect sensitive information about users. This is more
concentrated in an online business or companies users’ agreement upon the matter
of how arcane, sale of user data other information should preserve it secrecy and
privacy of such individual and company. A sample of this is advertising one’s product
online as a necessary platform for products information.

6
Types of users’ ethical behavior of digital technology

Technology ethics are values that can be used to govern digital technology including
factors such as risk management and individual rights. The following are common
areas of digital technology ethics.

• Access to empowering technology as a right or freedom.


1. Access rights

• The rules of responsibility for decisions made by technology that


would normally be made by qualified and regulated
2. Accountability professionals and governed by law of the countries.

• Where individuals seek or interpret information in a way that


confirm their beliefs, hypotheses or expectations and dismiss
opinions and information that are contrary to these. Users should
3. Beware of know the data in the perspective of the contributor in the
bias Internet.

• Protection of intellectual property rights, privacy and personality


rights.
4. Digital rights

• Data consumers, whether they are individuals, groups or


organizations must be able to trust the digital services and the
data they are using. Those who collect and manage data must
uphold the principle that its integrity must be assured if it is to
5. Promote trust be of value to consumers. This should be evaluated for
potential misinterpretation.

• In the digital world, transparency and integrity must be the core


values that guide professional behavior. Organizations must use
data in responsible and ethical ways; and that means not using it
6. Design for in ways that are considered intrusive, manipulative or
privacy, security disrespectful to others.
and integrity • Being transparent means that organizations must state their
intentions regarding data usage and allow their customers to
provide their consent.

7
• Culture can be described as the set of shared values, beliefs and
norms that influence the way individuals within it think, feel and
behave. Values especially, are important as they articulate and
7. Promote an provide an excellent digital experience or ‘excellence through
ethical culture innovation and teamwork.

• Ethical practices must also ensure that employees demonstrate


respect for their public and users. This can be accomplished by
8. Maintain avoiding deception and being fair, but can also be conveyed
dignity and through engaging users.
respect

• Netiquette comprises the rules of an online community. Sloppy


writing in online forums, device distraction while in conversation,
9. Make use of and sending of unsolicited emails are a few examples of poor
netiquette netiquette. Learners need to understand what makes good and bad
netiquette and why.

Types of unethical behavior user of digital technology

1. Digital plagiarism- Plagiarism is the act of copying someone else's work and
publishing it as your own. This includes text, media, and even ideas. Whenever
another person's work is copied and republished without an appropriate reference
or citation, it is considered plagiarism. Examples of plagiarism range from small
infractions such as not putting quotes around a quotation to blatant violations
such as copying an entire website. Plagiarism is the act of copying someone
else's work and publishing it as your own.

2. Breaking copyright and software theft- Software theft means the unauthorized
or illegal copying, sharing, or usage of copyright-protected software programs.
Software theft may be carried out by individuals, groups, or, in some cases,
organizations that distributed unauthorized software copies to users.

Copyright theft without permission for a usage where such permission is required,
thereby infringing. The copyright holder is typically the work's creator, or a
publisher or other business to whom copyright has been assigned.

3. Improper use of digital resources- Digital information and technology used in a


wrong way by the user such as using technology to slander, gossip, show
scandals, and many more.

4. Computer fraud- Computer fraud is a cybercrime and the act of using a


computer to take or alter electronic data, or to gain unlawful use of a computer or
system. Examples of which are unauthorized access to computer systems or
applications, Unauthorized interception of any non-public transmission of
computer data to, from, or within a computer system, data and or system

8
interference, cybersquatting, Computer-related Identity Theft, Cybersex, Child
Pornography, and others.

Practical and respectful ways of using the Internet

1. Sensitivity to national and


local cultures: The users of
digital technologies and the
Internet should have an
Practical and respectful ways understanding of the national and
using the Internet local cultures. Understanding and
respecting the differences will
avoid biases, discrimination, and
judgment.

3. Internet etiquette while


chatting, emailing, blogging, 2. Avoiding identity
and using social media: The users misrepresentation and fraud:
of digital technologies and the This will make the digital world a
Internet should practice the right place of order and harmony where
etiquette while using social media in the rights of an individual and
groups are protected and given
consideration of people and groups acknowledgement in their work
who are going to watch, communicate and product.
and use the Internet.

4. Protecting personal
information: Protection of the
personal information of every user
is the right to privacy. Digital
information of an individual is the
right of the user at their disposal.
Personal information should be
protected during data gathering.

9
What’s More
This activity will help you master the topics discussed earlier.

A. Match column A with column B. Write the letter of the correct answer on the blank
before each numberon a separate sheet of paper.

A B
_____1. Being transparent means that A. Access Rights
organizations must state their intentions
regarding data usage and allow their
customers to provide their consent.

_____2.Ethical practices must also B. Accountability


ensure that employees demonstrate
respect for their public and users.

_____3. This is where individuals seek C. Beware of Bias


or interpret information in a way that
confirms their beliefs, hypotheses, or
expectations and dismiss opinions and
information that are contrary to these.

_____4. Access to empowering D. Digital Rights


technology as a right or freedom.

_____5. Those who collect and manage E. Promote trust


data must uphold the principle that its
integrity must be assured if it is to be of
value to consumers.

_____6.Culture can be described as the F. Design for privacy, security, and


set of shared values, beliefs, and norms integrity
that influence the way individuals think,
feel and behave.
.
_____7. The responsibility for decisions G. Promote an ethical culture
made on technology would normally be
made by qualified and regulated
professionals and governed by the law
of the countries.

10
_____8. Sloppy writing in online forums, H. Maintain dignity and respect
device distraction while in conversation,
and sending of unsolicited emails are a
few examples.

______9. Protection of intellectual I. Make use of netiquette


property rights, privacy and personality
rights.

B. Complete the diagram below and give the meaning of each unethical behavior
towards digital technology. Write answers on a separate sheet of paper.

1.
Breaking
copyright
and
software
theft

2.

Digital
plagiarism

3.

Computer
fraud

4.
Improper
use of
digital
resources

11
What I Have Learned
This activity will enrich your understanding of mobile devices.

True or False: Read each statement below carefully. Write T if you think the
statement is TRUE. Write F if you think the statement is FALSE. Write your answer
on a separate sheet of paper.

_____1. Personal digital ethics cover how individual users honor one another’s right
to self-determination, online privacy and owner.
_____2. Accountability is powering technology as a right or freedom.
_____3. Interpreting information in a way that confirms their beliefs, hypotheses, or
expectations and dismisses opinions and information that are contrary to
one's belief is not being biased.
_____4. Values are important as they articulate an excellent digital experience.
_____ 5. Ethical practices must also ensure that employees demonstrate respect to
the public and users.
_____ 6.Computer fraud and an act of using a computer to take or alter electronic
data, or to gain unlawful use of a computer or system are not considered as
cybercrime.
_____ 7. The users of digital technologies and the Internet should not practice the
right etiquette while chatting, blogging, and using social media.
_____ 8. The users of digital technologies and Internet should not be avoiding
identity misrepresentation and fraud.
_____ 9. Knowing the national and local cultures should flourish and be respected in
the use of the Internet and digital technologies.
_____ 10. Digital ethics includes the method of treating and resolving issues that
encompass how user’s groups and individuals in online environments
interact with each other and the technologies and platforms they have used
to engage.

12
What I Can Do
This part is the application of what you have learned in this module.

Enumeration. Write your answers in a separate sheet.

A.) 9 Types of ethical behavior towards digital technology


1. ______________________________________
2. ______________________________________
3. ______________________________________
4. ______________________________________
5. ______________________________________
6. ______________________________________
7. ______________________________________
8. ______________________________________
9._______________________________________

B.) 4 Types of unethical behavior towards digital technology

1. ______________________________________
2. ______________________________________
3. ______________________________________
4._______________________________________

C.) Explain the meaning of digital ethics in 3 (three) sentences.

______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

Rubrics:
4 – 3 complete sentences related to the topic
3 – 2 complete sentences related to the topic
2 – 1 complete sentence/s related to the topic
1 – writes sentence/s not related to the topic

13
Post-Assessment
This activity will measure how well you have understood the topics
discussed in this module.

Read each item carefully and write the letter of the correct answer on a
separate sheet of paper.

1. What is unethical in using mobile devices?


a. These are electronic devices that are used to store data for information
using rules of behavior based on ideas about what is morally good.
b. These interconnecting devices brought by the Internet and digital devices
connect networks use in a right way.
c. This refers to the method in relating treating and resolving issues that
encompasses how individuals interact in good ways with each other.
d. This is used to connect for gambling, dating and used to share your pain.

2. Mobile devices are powerful enough to do many of the same things you can do
with a desktop computer.
a. no answer b. false c. true d. maybe

3. It is the protection of intellectual property rights, privacy and personality rights.


a. access rights b. beware of bias c. accountability d. digital rights

4. It is the access to empowering technology as a right or freedom.


a. access rights b. beware of bias c. accountability d. digital rights

5. This upholds the principle that its integrity must be assured if it is to be of value to
consumers.
a. Promote trust c. Design for privacy
b. Promote an ethical culture d. Maintain dignity and respect

6. This can be accomplished by avoiding deception and being fair, but can also be
conveyed through engaging users.
a. Promote trust c. Design for privacy
b. Promote an ethical culture d. Maintain dignity and respect

7. This collects and manages data which must uphold the principle that its integrity
must be assured if it is to be of value to consumers.
a. Promote trust c. Make use of netiquette
b. Promote an ethical culture d. Maintain dignity and respect

8. This comprises the rules of an online community on the online forums.


a. Promote trust c.Make use of netiquette
b. Promote an ethical culture d. Maintain dignity and respect

14
9. This is a range from small infractions such as not putting quotes around a
quotation to blatant violations such as copying an entire website.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theftd. Computer fraud

10. This is a cybercrime and the act of using a computer to take or alter electronic
data, or to gain unlawful use of a computer or system.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theftd. Computer fraud

11. Corporate digital ethics covers how individual users honor on another’s right to
self-determination online with respect to privacy and ownership.
a. no answer b. false c. true d. maybe

12. This is a digital information and technology that is used in a wrong way by the
user such as using technology to slander, gossip, show scandals and many more.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theftd. Computer fraud

13. The users of digital technologies and Internet should practice right etiquette while
chatting, blogging and using social media as a respect to people and group who are
going to watch, communicate and use the Internet.
a. Sensitivity to national and local cultures
b. Avoiding identity misrepresentation and fraud
c. Internet etiquette while chatting, emailing, blogging, and using social media
d. Protecting personal information

14. The users of digital technologies and Internet should understand the national and
local cultures in digital information shared and to be shared.
a. Sensitivity to national and local cultures
b. Avoiding identity misrepresentation and fraud
c. Internet etiquette while chatting, emailing, blogging, and using social media
d. Protecting personal information

15. Personal digital ethics is a group ethics that practices an online platform like
social networks which collects sensitive information about users.
a. no answer b. false c. true d. maybe

15
Additional Activities
This activity will show the strength of your understanding on the lesson given
in this module.

Draw comic strips demonstrating the respectful ways of using the Internet.
Justify your answer with 3 (three) reasons/ sentences. Write your answer in a
separate sheet if necessary.

____________________________________________
__________________________________________________
__________________________________________________
______________________________________________

Rubrics:

Criteria Points
10 7 5 1
Explanation 3 complete 2 complete 1 complete Sentence/s
sentences sentences sentence not related to
related to the related to the related to the the topic
topic topic topic
Drawing Creatively Enhances Balanced, Not balanced,
enhances information uncluttered, cluttered,
information adequate insufficient
white space white space
Total

16
Answer Key
What I What’s in What’s new What’s more
know
1. d 1. d 1. The use of digital A. B.
2. c 2. d devices and internet 1. F 1. Software theft means the
3. d 3. a by the individual user. 2. H unauthorized or illegal copying,
4. a 4. a 2. The poem is nice 3. C sharing or usage of copyright-
5. a 5. d related to my 4. A protected software programs.
6. d 6. d experience that using 5. E 2. Plagiarism is the act of copying
7. a 7. d the internet I used 6. G someone else's work and publishing
8. c 8. a other name. 7. B it as your own. This includes
9. a 9. a 3. The values that I 8. I text, media, and even ideas.
10. d 10. a have learned is be 9. D Whenever another person's work is
11. b careful in the use of copied and republished without an
12. c internet, needs parent appropriate reference or citation, it is
13. c guidance and keep considered plagiarism.
14. c your secrets. 3. Computer fraud is a cybercrime
15. b and the act of using a computer to
take or alter electronic data, or to
gain unlawful use of a computer or
system.
4. Digital information and technology
used in a wrong way by the user
such as using technology to slander
scandals and many more.
What I have What I can do
learned
1. T A B C. This is the use of electronic
2. F 1. Access Rights 1. Digital plagiarism devices that is using to and storing
3. F 2. Accountability 2. Breaking data for information using rules of
4. T 3. Beware of Bias copyright and behavior based on ideas about
5. T 4. Digital Rights Software theft what is morally good. This
6. F 5. Promote trust 3. Improper use of interconnecting devices brought by
7. F 6. Design for privacy digital resources the internet and digital devices
8. F Security and integrity 4. Computer Fraud connect networks use in right way.
9. T 7. Promote an ethical This refers to the method in relating
10. T culture treating and resolving issues that
8. Maintain dignity and encompasses how individuals
respect interact in good ways with each
9. Make use of netiquette other.

Post Assessment Additional Activities


1. d 9. a 1.Showing respect in using
2. c 10. d digital devices builds up
3. d 11. b friendship, knowledge sharing
4. a 12. c and building digital manners
5. a 13. c in good ways.
6. d 14. c
7. a 15. b
8. c

17
References
https://www.google.com/search?q=digital+ethics+picture
http//www.bing.com/search?q=degital+devices+definition&qs
https://www.process.st/digital-ethics/
https://www.pcmag.com/encyclopedia/term/digital-device
https://www.reference.com/history/digital-devices
https://clipground.com/images/communication-technology-clipart
https://www.bing.com/images/search?view=detailV2&ccid
https://ictlounge.com/Images/analogue_devices
https://mediasmarts.ca//sites/default/files/pdfs
https://www.learnersdictionary.com
https://www.lifewire.com/what-are-digital-ethics
https://writingcommons.org/article/digital-ethics
https://www.pagecentertraining.psu.edu/public-relations-ethics/digital-
ethics/why-digital-ethics
https://www.consultancy.uk/news/16602/the-top-five-ethical-moral-principles
https://simplicable.com/new/technology
https://www.techopedia.com/definition/22203/software-theft
https://en.wikipedia.org/wiki/Copyright_infringement
https://techterms.com/definition/plagiarism
https://en.wikipedia.org/wiki/Computer_fraud
https://online.nwmissouri.edu/articles/education/ethics-technology-use-
classroom
https://www.ipophil.gov.ph/copyright/

18

You might also like