Module 4
Module 4
2 R3 PRE-TEST
Lesson
Direction: Read each item carefully and circle the letter of the
4 correct answer.
Advanced
ICT in the
Online 1. What feature of Microsoft Word allows you to efficiently
create a document that have the same general content but
Wordof
Context
Safety,
may have different recipients or purpose?
e
Learning Objectives:
identify what
identify what
3. What are the steps in creating a simple mail merge?
Learning Objectives:
constitutes appropriate a. Create form document; preview; insert place holders; print
constitutes
identify varied
and inappropriate
online platforms b. Preview; insert place holders; create form document; print
appropriate and
and sites
online behavior c. Create main document; create data source; insert place
inappropriate
compare andonline
use the advance
contrast the
behavior. holders; preview
nuances
capabilities ofof
varied
Microsoft
apply
onlineinternet online
platforms, d. Create data source; insert place holders, preview; print
Word
sites,commonly
and contentused
safety, security 4. What file contains the information you need to merge with
totoincrease
best achieve
productivity
ethics andclass
specific etiquette your main document?
and efficiency;
objectives or
standards and a. Address block b. Contact list c. Data file d.
address situational
utilize the features of Directory
practice
challengesin the use
this application
evaluate existing 5. What image compression/file type is capable of displaying
of ICTs.
online creation
efficiently to help simple animation?
discern possible
tools, platforms
improve the
and applications in a. .bmp b. .gif c. .jpg d. .png
deceptive
developing ICT
productivity of an
information
content and
organization through
wrongly evaluated
maximizing the
data.
potential of Microsoft
Word;
create letters or
documents for
distribution of your
target recipients; and,
improve this letter as
you create media-rich
documents for printing
and publishing.
1|Page
Recap
In the previous module, you learned about the “Rules of Netiquette”. At
this point, you are now familiar of the following key points:
1. Online security, safety and ethics. You understand that internet can be
considered as one of the most dangerous places especially when you are not certain
in what you do from using it. Sharing personal information needs to be secured to
make you safe. Simply, you ask yourself, “How safe are you?” Are those details you
will input in those online platforms safe? The same way, you must be respectful of
others when you are online by adhering to the online safety tips already discussed.
2. Internet threats. Here you learned about malwares which are software that can
damage your computer system and the data you stored in them. Some of them
travel online or offline in ways that you may not know, it can severely jeopardize a
computer system. On the other hand, when you access your emails, you need to be
cautious of spam email because it might contain messages which ask your personal
details, specifically bank account information with the intention of losing your
savings.
4. Copyright. You became aware that the product of our mind, be it an idea, an
invention or literacy work which we call Intellectual Property must also be protected.
Any violation to its rights as protected by the law of our country can be called
Copyright Infringement which is considered a crime.
Read Me!
This module will show you how a letter can be made using Microsoft Word – an
automated way of doing it and even sending it to many designated recipients. Below
are tasks that you will need to do prior to learning the main topic. Make sure that it
is available, because you will need it in the midst of the discussion.
Scenario 1: You are tasked to send a formal letter of invitation for a promo
campaign which a company is running. Initially, make a list of 10(ten) names of loyal
customers for this letter to send out. Below is a format of the customer information
you need.
Describe how you would most likely complete the task of sending 10 (ten)
invitations with individual names and other information of the recipients using
Microsoft Word.
1. Make an invitation letter that you can personalize, send, and distribute.
NOTE: There's almost no limit to what you can do online. The Internet makes it
possible to access information quickly, communicate around the world, and much
more. Unfortunately, the Internet is also home to certain risks, such as malware,
spam, and phishing. If you want to stay safe online, you'll need to understand these
risks and learn how to avoid them.
PRACTICE
2 Shared or Not Shared? That is the Question.
Directions: Read and reflect each item carefully. Check the space whether you
have shared or not shared these pieces of information in all your social media
accounts.
3. Based from your answers above, do you think you are safe when using the
Internet? Why?
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
DISCUSSI
ON
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is
a reputable business having a secure service. To make sure that you are in a
secured network, the website address should begin with “https://’ as opposed
to “http://”. Never access your accounts by following an email link, instead
type your URL by yourself.
Here are some ways you can check if a website is trustworthy.
Reliable Websites Unreliable Websites
Usually end in .edu or .gov Mind end in .com
Don’t have errors Have errors
Are up to date Are outdated
Use facts Use opinions
Use experts Use unreliable sources
d. I have two similar passwords that I alternately use for all my accounts.
3. Your parents bought you your first cellphone. How will you share your cellphone
number?
d. Foreigners
5. Choose which image below describes how you feel about sharing your password
with your boyfriend/ girlfriend?
DISCUSSI
ON
DIWA SENIOR HIGH SCHOOL SERIES: Empowerment Technologies (2 nd Edition) 8
Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on
vulnerabilities to attack computers and retrieve sensitive data from individuals. Half
the time, we aren’t even aware it is happening until it is too late. Online threat is
deemed any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners. These are usually done by
computer hackers who uses the World Wide Web to facilitate cybercrime. Web
threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS
protocols, but may also employ other protocols and components, such as links in
email or Instant Messaging apps, or any malware attachments on servers that
access the Web. They benefit cybercriminals by stealing information for subsequent
sale and help absorb infected PCs into botnets. Web threats pose a broad range of
risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking. The
following are the top kinds of online threats that you should be aware of:
6. Spams - are unsolicited emails, instant messages coming from recipients that
are not granted verifiable permission for the message to be sent. Spam messages
can be damaging if you open or respond to it.
PRACTICE
3 Show Me How You Hashtag!
Direction: Look at the following images and create a hashtag based on the type of
online threat represented by each image. Write your answers in the space provided
in each item.
1. #__________________________________ 2. #__________________________
5. #_____________________________
REFLECTIO
N
Direction: From all you have learned in lesson 2, why is there a need to
“think before you click?” Write your answer below.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
1. What type of malicious program is designed to replicate it and transfer from one
computer to another either through the internet or local networks or data storage
like flash drives and CDs?
2. What harmful online programs are designed to send you advertisements, mostly
pop-up ads?
3. What harmful online program is used to record keystrokes done by users to steal
passwords?
b. Creating a fake website that looks nearly identical to a real website in order
to trick users into entering their login information.
c. Sending someone a text message looks like a notification that the person
has won a contest.
6. Which of the following must NOT be done if you received an embarrassing picture
from your friend?
b. An expert programmer.
b. Strike first - post mean things about other people on your Wall on Facebook.
b. You are judged by what you do on the Internet and how it looks - by your
spelling, grammar, and netiquette.
c. You are judged by your intent - if you didn't mean to hurt someone's
feelings, then it is okay.
d. You are judged by how you look - your profile picture is important.