Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
57 views
15 pages
Emtech Q1 M2
Uploaded by
Geriza Rico
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save EMTECH Q1 M2 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
57 views
15 pages
Emtech Q1 M2
Uploaded by
Geriza Rico
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save EMTECH Q1 M2 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 15
Search
Fullscreen
Senior High School DepED DEPARTMENT If OF EDUCATION Empowerment Technologies Quarter 1 - Module 2: Netiquettes ALTERNATIVE DELIVERY MODE CO_Q1_Empowerment Technologies SHS Module 2What I Need to Know This module was designed and written with you in mind. Itis here to help you apply online safety, security, ethics, etiquette standards, and practice in using ICTs related to your specific professional tracks. The scope of this module permits it to be used in different learning situations. The language used recognizes the diverse vocabulary level of students. The lessons are arranged to follow the standard sequence of the course. But the order in which you read them can be changed to correspond with the textbook you are now using. The module mainly explains and instructs learners about Netiquettes or online etiquette. After going through this module, you are expected to: 1. compare and contrast the nuances of varied online platforms, sites, and content to achieve specific class objectives or address situational challenges; 2. apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks; and 3. use the Internet as a tool for credible research and information gathering to achieve specific class objectives and or address situations. CO_Q1_Empowerment Technologies SHS Module 2What I Know Privacy, security, and good netizenship are essential words that you have to remember when you are on the Internet. Do you know your limitations in social media? Do you feel responsible for what you are posting? Do you think first before you click? Let us find out! Answer Yes if you agree with the statement, and No, if you disagree. Write your answer on the blank before each number. 1. My computer has an antivirus, so it is okay to open most email attachments like e-cards and video files. 2. Your friend told you that his college application was rejected because you posted a video of him doing crazy stuff at a party. You posted the video several years ago but later tools it down to protect y reputation. Is it possible that the college found the video? yur friend's 3. You and your best friend play a lot of video games. One time, she asks you for your password so she can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your password? 4. You received an email stating that your mother's bank account is going to be forfeited if you do not respond to the email. Is it safe to reply? 5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a website offering free essays. 6. There is a danger in posting information about a future vacation. 7. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft. 8. If there is no copyright notice, it's okay to copy a Web page. 9. Lurking is sometimes considered impolite. It is the practice of reading discussions without contributing to them 10. Your cousin asked for your fabulous zucchini cake recipe at the last family function. While you're sending it to him, you decide to e-mail it to all 500 people in your address book as well. It is an example of email spam CO_Q1_Empowerment Technologies SHS Module 211. If someone insulte and uses offensive language towards you online, you should reply in the same manner. 12. If someone uses offensive language online, always respond and not worry as no one knows who you are online. 13. Itis ok to constantly give our friends e-mail or items online which they do not need. 14. Remember your audience. Ifyou are putting something on a web page remember that everyone in the world will have access to it. 15. You are responsible for your actions on the internet. CO_Q1_Empowerment Technologies SHS Module 2BET Tas 3 Netiquettes In this generation, people are dependent on the Internet. Like how people socialize face to face, we should follow etiquette at all times as it mirrors our personality. Being on different platforms, we should be aware of our actions and protect ourselves at the same time. Remember that once something has been shared online, it cannot be deleted = & What's In This lesson provides information about Netiquette. It will serve as your guide on how to behave appropriately online. It is vital to use Netiquette because communication online is non-verbal. Most often, online discussion consists of reading something someone else’s has typed. Notes to the Teacher Ask the students of their own rules of thumb in using the Internet, especially social media. CO_Q1_Empowerment Technologies SHS Module 2What's New Compare and contrast the scenario in the picture. Describe how Jimmy and Boggart are the same and different and in using social media. Plot your answer in the Venn diagram. Boggart CO_Q1_Empowerment Technologies SHS Module 2What is It Core Rules of Netiquette Netiquette, or network etiquette, is concerned with the "proper" manner of communication in the online environment. Whenever you communicate in the virtaal world, consider the following "rules," adapted from Virginia Shea's Core Rules of Netiquette. Rule 1: Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press “send” or "submit," ask yourself, "Would I be okay with this if someone else had written it?” Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace. Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world. Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain.” (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example? Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download. Rule 5: Make yourself look good online One of the virtual world’s best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless CO_Q1_Empowerment Technologies SHS Module 2you post a video of yourself singing Karaoke in a clown outfit.) The quality of your writing will judge you, so keep the following tips in mind: Always check for spelling and grammar errors Know what you're talking about and state it clearly Be pleasant and polite Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in fact, this "information sharing’ capability is one of the reasons the Internet was founded. So in the spirit of the Internet's "founding fathers,” share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references for your subject matter. You have recently expanded your knowledge about a subject that might be of interest to others? Share that as well. Rule Help keep flame wars under control ‘What is meant by "flaming" and "flame wars?” "Flaming is what people do when they express a strongly held opinion without holding back any emotion.” (Shea, 1994), As an example, think of the kinds of passionate comments you might read on a sports blog. While ‘flaming’ is not necessarily forbidden in virtual communication, "flame wars,” when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction. Rule 8: Respect other people's privacy Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information “got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication. Rule 9: Don't abuse your power Like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or have years of experience in a particular skill or subject matter. Maybe it is you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human. Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of Netiquette. At some point, you will see a stupid 7 C0_@1_Empowerment Technologies SHS Module 2question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor “offense,” you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum. Shea, V. (1994). Core Rules of Netiquette. Retrieved from http: /coursedesign.colostate.edu/obj /corerulesnet. html Ge) What's More Let's Reflect! Make a reflection on the importance of using Netiquette in your daily life What benefits can you get from it? How can you promote the use of these regulations? CO_Q1_Empowerment Technologies SHS Module 2Oe What I Have Learned ae Accomplish the items below using what you have learned from the Ten Rules of Netiquette. 1. In cyberspace, it is important to remember the “Do unto others as you would have others do unto you.” 2. Why are spelling and grammar crucial on the Internet? 3. Is it okay to read other people's files and emails without their permission? Why? 4. What do you need to be careful about if you are in control of a network? 5. What should you do about a newbie who continually makes the same error on the Internet? CO_Q1_Empowerment Technologies SHS Module 2“) What I Can Do Now it’s time to show your creativity! Create a poster showing the Netiquette rules with examples of how you can use them in your daily life, primarily online. The poster should use an interactive online tool like Canva, Glogster, Piktochart, ete. Take note of the criteria: RUBRIC Relevance to the topic 30% Layout and design 40% Originality 10% Creativity 20% Total 100% 10 CO_Q1_Empowerment Technologies SHS Module 2Assessment Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose the letter of the best answer and write it in your notebook. 1. What is Netiquette? ‘A. Using a net to catch fish B. Being mean to other people on Facebook C. Presenting proper manners at the dinner table D. Showing manners and etiquette on the Internet 2. What should you do if you receive a text or email from someone you don't know? A. Call the police B. Delete it without opening it C. Open it immediately and reply D. Leave it in your inbox until you figure out who it is Which of the following should you never give on the Internet? A. Your age B. Your name C. Your address D. All of the above 4. What should you do to avoid being cyber-bullied? A. Observe proper netiquette rules B. Give out personal information to anyone who asks C. Ignore any requests from people to be your friend online D. Strike first - post mean things about other people on your Facebook Wall 5. What should you do if you feel you are being cyber-bullied? A. Call the police B. Tell no one, it's embarrassing C. Tell a trusted adult like a parent or teacher D, Just delete anything referring to you on the Internet 6. What should you never do if you get an embarrassing picture from someone? A. Talk to the person again B. Send it on to other friends C. Tell your parents or a teacher D. Discourage the person from sending pictures like that 7. What should you avoid doing in a chat room? Posting your address, Posting your phone number Revealing financial information All of the above voup 11 Go_@1_Empowerment Technologies SHS Module 28. It is OK to forward or post an email message that you received if__ vou, ‘The message is typed in all capital letters It does not contain any copyrighted material The author of the message has marked it as confidential. ‘The author of the message hasn't given you permission to forward or post it 9. Before posting to a discussion group you should A B c. D. Read the FAQ Find the Frequently Asked Questions (FAQ) document Read some of the existing posts to get an idea of the tone and character of the group All of the above. 10. A flame is pope An online chain letter An expert programmer A person who consistently breaks the rules of Netiquette a post or email message that expresses a strong opinion or criticism, 11. The Golden Rule of Netiquette is pomp Remember the human! A smiley in every message Don't follow the rules of netiquette Type in all caps when you're angry. 12. Spamming is very poor Netiquette and means > Spilling the juice of meat-byproducts into your keyboard Sending in lines of nonsensical garbage in a chat conversation Posting or emailing unsolicited advertising messages to a wide audience. Posting a message that contains graphic descriptions of something really gross 12 ¢o_@1_Empowerment Technologies SHS Module 213. Knowledge and understanding of netiquette is useful because A. It will help you create a positive impression on those you meet in cyberspace B. It explains the conventions already being used by millions of cybernauts ©. It explains some of the technical limitations of online communications D. all of the above. 14. You've been sent a virus warning, what should you do now? Ignore it. Forward it within your company. Forward it to everyone in your address book. Go to a security Web site to learn if it is a real virus. voor 15. As a common courtesy, when in a chat room you should: > Report disruptive users Introduce yourself when you enter a room c. Make it clear when you are directing a question or response to a specific user D. Alll of the above » 13 Go_@1_Empowerment Technologies SHS Module 2Additional Activity Like any other rules, what you have learned from this lesson could be applied to any task you do. So start doing your part as a student and as you take steps in preparing for your future. What profession do you prefer to have in the future? In what way could you make an impact on society using the Internet? Answer the following question in essay form. (Use a separate sheet of paper) ESSAY RUBIRIC Relevance to the topic 10% Content 40% Organization and format 10% Word Choice, Sentence Variety and Structure 20% Grammar and Mechanics 20% Total! 100% 4 1 CO_Q1_Empowerment Technologies SHS Module 2
You might also like
Computer Ethics and Netiquette
PDF
67% (3)
Computer Ethics and Netiquette
6 pages
Empowerment Technologies Q1 MODULE 3
PDF
No ratings yet
Empowerment Technologies Q1 MODULE 3
5 pages
Empowerment Technologies: Quarter 1 - Week 2 Netiquettes
PDF
No ratings yet
Empowerment Technologies: Quarter 1 - Week 2 Netiquettes
6 pages
LAS Empowerment TechWeek3Q1 085319
PDF
No ratings yet
LAS Empowerment TechWeek3Q1 085319
8 pages
Empowerment Technologies m2
PDF
No ratings yet
Empowerment Technologies m2
5 pages
EMPOWERMENT Q1 Lesson 3
PDF
No ratings yet
EMPOWERMENT Q1 Lesson 3
5 pages
Week-2 Asynchronous
PDF
No ratings yet
Week-2 Asynchronous
6 pages
Week 3 - EMTECH Module 2
PDF
No ratings yet
Week 3 - EMTECH Module 2
29 pages
Netiquettes
PDF
No ratings yet
Netiquettes
16 pages
Learning Activity Sheet Abm 11 Empowerment Technologies (Q1-Wk2) Netiquette
PDF
No ratings yet
Learning Activity Sheet Abm 11 Empowerment Technologies (Q1-Wk2) Netiquette
13 pages
Week 1 Day 3.2 Netiquettes
PDF
No ratings yet
Week 1 Day 3.2 Netiquettes
23 pages
Media Information Technology
PDF
100% (1)
Media Information Technology
8 pages
E TECH Netiq.
PDF
No ratings yet
E TECH Netiq.
22 pages
Empowerment Technologies q1 Module 2
PDF
No ratings yet
Empowerment Technologies q1 Module 2
6 pages
The Netiquette and The Computer Ethics
PDF
No ratings yet
The Netiquette and The Computer Ethics
12 pages
N Etiquettes
PDF
No ratings yet
N Etiquettes
14 pages
The Netiquette The Computer Ethics
PDF
No ratings yet
The Netiquette The Computer Ethics
11 pages
Lesson 3netiquettes
PDF
No ratings yet
Lesson 3netiquettes
17 pages
E-tech-Lesson-3
PDF
No ratings yet
E-tech-Lesson-3
17 pages
Learners Netiquette
PDF
No ratings yet
Learners Netiquette
28 pages
Empowerment Technologies - Lesson 3 - Q3
PDF
No ratings yet
Empowerment Technologies - Lesson 3 - Q3
12 pages
Cream and Brown Scrapbook Art Museum Presentation
PDF
No ratings yet
Cream and Brown Scrapbook Art Museum Presentation
27 pages
Core Rules - Netiquette
PDF
No ratings yet
Core Rules - Netiquette
3 pages
What-is-Netiquette
PDF
No ratings yet
What-is-Netiquette
18 pages
IT-Skills Unit-1
PDF
No ratings yet
IT-Skills Unit-1
20 pages
Core Rules of Netiquette PDF
PDF
50% (2)
Core Rules of Netiquette PDF
2 pages
8 Living in It Era
PDF
No ratings yet
8 Living in It Era
21 pages
Rule and Netiquette
PDF
No ratings yet
Rule and Netiquette
3 pages
Netiquettes or Network Etiquettes
PDF
No ratings yet
Netiquettes or Network Etiquettes
28 pages
Colegio Del Sagrado Corazon de Jesus FLEX Blended Learning: On-Line Learning Netiquette
PDF
No ratings yet
Colegio Del Sagrado Corazon de Jesus FLEX Blended Learning: On-Line Learning Netiquette
4 pages
Module 4: The Netiquette and The Computer Ethics
PDF
No ratings yet
Module 4: The Netiquette and The Computer Ethics
5 pages
IT-ERA-MIDTERM
PDF
No ratings yet
IT-ERA-MIDTERM
28 pages
LESSON 4
PDF
No ratings yet
LESSON 4
12 pages
Core Rules of Netiquette
PDF
No ratings yet
Core Rules of Netiquette
2 pages
MODULE 4 - Revise
PDF
No ratings yet
MODULE 4 - Revise
10 pages
E-Tech 3
PDF
No ratings yet
E-Tech 3
14 pages
Emtech Module2 Week2 Lesson
PDF
No ratings yet
Emtech Module2 Week2 Lesson
4 pages
Mil Module 4
PDF
No ratings yet
Mil Module 4
24 pages
Part 4 - The Netiquette and Computer Ethics
PDF
No ratings yet
Part 4 - The Netiquette and Computer Ethics
12 pages
Module 4-The Netiquette and The Computer Ethics
PDF
No ratings yet
Module 4-The Netiquette and The Computer Ethics
12 pages
DOST
PDF
No ratings yet
DOST
18 pages
Black and Blue Modern Technology Presentation
PDF
No ratings yet
Black and Blue Modern Technology Presentation
41 pages
5 Lesson-5
PDF
No ratings yet
5 Lesson-5
5 pages
Module 4 The Netiquette and The Computer Ethics. Part 2pptx
PDF
No ratings yet
Module 4 The Netiquette and The Computer Ethics. Part 2pptx
18 pages
Emtech Exam
PDF
No ratings yet
Emtech Exam
6 pages
Lesson 4
PDF
No ratings yet
Lesson 4
4 pages
Living-in-the-IT-Era-Module-4
PDF
No ratings yet
Living-in-the-IT-Era-Module-4
12 pages
E-Technologies Week 2
PDF
No ratings yet
E-Technologies Week 2
66 pages
lesson 2
PDF
No ratings yet
lesson 2
7 pages
Module For Legal and Ethical Issues
PDF
No ratings yet
Module For Legal and Ethical Issues
6 pages
Netiquettes
PDF
No ratings yet
Netiquettes
20 pages
Netiquette and Computer Ethics
PDF
No ratings yet
Netiquette and Computer Ethics
48 pages
Module 4 Living in the IT Era
PDF
No ratings yet
Module 4 Living in the IT Era
17 pages
Lesson 5 Netiquette
PDF
No ratings yet
Lesson 5 Netiquette
17 pages
ET PPT 2 - NETIQUETTES
PDF
No ratings yet
ET PPT 2 - NETIQUETTES
13 pages
Living in It Era
PDF
No ratings yet
Living in It Era
60 pages
It Era1
PDF
No ratings yet
It Era1
19 pages
REFLECTION JOURNAL Fourth Quarter
PDF
No ratings yet
REFLECTION JOURNAL Fourth Quarter
2 pages
Intent Letter
PDF
No ratings yet
Intent Letter
2 pages
FINANCIALREPORT
PDF
No ratings yet
FINANCIALREPORT
1 page
REFLECTION JOURNAL First Quarter
PDF
No ratings yet
REFLECTION JOURNAL First Quarter
2 pages
DLL Cpar M1
PDF
No ratings yet
DLL Cpar M1
4 pages
Dll-Cpar-M2 (Art Nouveau)
PDF
No ratings yet
Dll-Cpar-M2 (Art Nouveau)
8 pages
Emtech Q1 M1.2
PDF
No ratings yet
Emtech Q1 M1.2
18 pages
ATTENDANCE 2022 (AutoRecovered)
PDF
No ratings yet
ATTENDANCE 2022 (AutoRecovered)
6 pages
DLL CNF M7
PDF
No ratings yet
DLL CNF M7
7 pages
Item Analysis Sample Template
PDF
No ratings yet
Item Analysis Sample Template
18 pages
Cpar - Module 2
PDF
100% (1)
Cpar - Module 2
89 pages
Dll-Emtech-M3 (Concept Paper)
PDF
No ratings yet
Dll-Emtech-M3 (Concept Paper)
4 pages
Cpar Module 1
PDF
No ratings yet
Cpar Module 1
40 pages
Emtech ST1
PDF
No ratings yet
Emtech ST1
3 pages