Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
639 views

Ge 10 - Living in An It Era: Flexible Dominican Education Module

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
639 views

Ge 10 - Living in An It Era: Flexible Dominican Education Module

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

GE 10 – LIVING IN AN IT ERA

FLEXIBLE DOMINICAN EDUCATION MODULE

COURSE: Ge 10
MODULE NO.: 5
MODULE TITLE: Living in an IT Era
TOPIC: Computer Security, Safety and Ethics
WRITERS: Allan L. Tan & Joshua Mitchell Guan

To do well in this module, you need to remember the following:


1. Pause and pray before starting this module.
2. Read and go through the module at your own time and pace.
3. You may open suggested references for supplemental activities and exercises.
4. Honestly answer the activities and sample exercises. The answers are provided on
the succeeding pages.

OPENING PRAYER:

May God the Father bless us.


May God the Son heal us.
May God the Holy Spirit enlighten us,
and give us eyes to see with,
ears to hear with,
hands to do the work of God with,
feet to walk with,
a mouth to preach the word of salvation with,
and the angel of peace to watch over us and lead us at last,
by our Lord's gift,
to the Kingdom.
Amen.

Learning Outcomes Estimated


Subtopic Title
“I SHOULD BE ABLE TO”… time
Computer Describe various types of Internet and network
2 Security Risks attacks
Health Concern
Discuss ways to prevent health-related disorders and
of Computer 9 hours
2.1 injuries due to computer use
Use
Ethics and
2.2 Demonstrate Ethical Use of Computers.
Society
GE 10 – LIVING IN AN IT ERA

MODULE INTRODUCTION AND FOCUS QUESTION(S):

AS WITH MOST OTHER facets of modern life, computing has its share of troublemakers, scam artists, and
identity thieves. The value of a stolen computer is not so much in the hardware as in the data it contains.

With stolen data such as your bank account numbers and PINs, a thief can wipe out your checking and
savings accounts. With your credit card numbers, a thief can go on a spending spree. Even worse, a criminal
can use stolen data to assume your identity, run up debts, get into legal difficulties, ruin your credit rating,
and cause you no end of trouble.

What are the risks when I am on my Computer? What can I do to minimize these risks? What is the proper
way to behave when you are online or on our computer?

PRETEST:

To further gauge your level of understanding and where you currently stand in this topic, please answer the
following pre-test questions honestly. Take note of the items that you were not able to correctly answer and
look for the right answer as you go through this module.

Identify what is being asked in the following sentences:

CYBER CRIME1. It is any illegal act involving a computer.


EXTORTION/ EXTORTIONIST 2. A person who uses e-mail as a vehicle for extortion.
INTERNET AND NETWORK ATTACKS 3. It is a type of computer security risks that jeopardize security,
and it includes computer viruses, Trojan horses and worms.
PASSWORD 4. It is a private combination of characters associated with the username that allows access
to certain computer resources.
LICENSE 5. It is the right to use the software.
BACKUP 6. It is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or
destroyed.
TREMOR 7. It is an inflammation of the nerve that connects the forearm to the palm of the wrist.
ERGONOMICS 8. It is an applied science devoted to incorporating comfort, efficiency, and safety into
the design of items in the workplace.
AVR 9. It involves reducing the electricity and environmental waste while using a computer.
COOKIE 10. It is a small text file that a Web server stores on your computer.
GE 10 – LIVING IN AN IT ERA

HOOK UP ACTIVITY:

The Creeper virus was first detected on ARPANET, the forerunner of the Internet, Creeper was an
experimental self-replicating program written by Bob Thomas. Creeper gained access via the ARPANET and
copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed.
The Reaper program was created to delete Creeper. The reaper is like an antivirus but it was created only to
remove the creeper virus.

STUDY:

COMPUTER SECURITY RISKS

Today, people rely on computers to create, store, and manage critical information.
Thus, it is crucial that users take measures to protect their computers and data from
loss, damage, and misuse. A computer security risk is any event or action that could
cause a loss of or damage to computer hardware, software, data, information, or
processing capability.

An intentional breach of computer security often involves a deliberate act that is


against the law. Any illegal act involving a computer generally is referred to as a
COMPUTER CRIME.

Perpetrators of cybercrime and other intrusions fall into seven basic categories: hacker, cracker,
script kiddie, corporate spy, unethical employee, cyber extortionist, and cyberterrorist.

 CYBER CRIME PERPETRATORS:

o Hacker, although originally a complimentary word for a computer enthusiast, now has a derogatory
meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the
intent of their security breaches is to improve security.

o Cracker also is someone who accesses a computer or network illegally but


has the intent of destroying data, stealing information, or other malicious
action.

o Script kiddie has the same intent as a cracker but does not have the
technical skills and knowledge. Script kiddies often use prewritten hacking
and cracking programs to break into computers.

o Corporate spies have excellent computer and networking skills and are
GE 10 – LIVING IN AN IT ERA

hired to break into a specific computer and steal its proprietary data and information. Unscrupulous
companies hire corporate spies, a practice known as corporate espionage, to gain a competitive
advantage.

o Unethical employees break into their employers’ computers for a variety of reasons. Some simply want
to exploit a security weakness. Others seek financial gains from selling confidential information.
Disgruntled employees may want revenge.

o Cyber extortionist is someone who uses e-mail as a vehicle for extortion. These perpetrators send an
organization a threatening e-mail message indicating they will expose confidential information, exploit a
security flaw, or launch an attack that will compromise the organization’s network — if they are not paid
a sum of money.

o Cyberterrorist is someone who uses the Internet or network to destroy or damage computers for
political reasons. The cyberterrorist might target the nation’s air traffic control system, electricity-
generating companies, or a telecommunications infrastructure.

 THE COMPUTER SECURITY RISKS

The common computer security risks include Internet and network attacks, unauthorized access
and use, hardware theft, software theft, information theft, and system failure.

1. INTERNET AND NETWORK ATTACKS that jeopardize security


include computer viruses, worms, Trojan horses, and rootkits; botnets;
denial of service attacks; back doors; and spoofing. The following
sections address these computer security risks and suggest measures
organizations and individuals can take to protect their computers
while on the Internet or connected to a network.

 Computer viruses, worms, Trojan horses, and rootkits are classified


as MALWARE (short for malicious software), which are programs
that act without a user’s knowledge and deliberately alter the
computer’s operations.

Tips for Preventing Viruses and Other Malware


1. Never start a computer with removable media inserted in the drives or plugged in the ports,
unless the media are uninfected.
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted source.
3. Install an antivirus program on all of your computers. Update the software and the virus
signature files regularly.
4. Scan all downloaded programs for viruses and other malware.
5. If the antivirus program flags an e-mail attachment as infected, delete or quarantine the
attachment immediately.
GE 10 – LIVING IN AN IT ERA

7. Before using any removable media, scan the media for malware. Follow this procedure even for
shrink-wrapped software from major developers. Some commercial software has been infected
and distributed to unsuspecting users.
8. Install a personal firewall program.
9. Stay informed about new virus alerts and virus hoaxes.

2. UNAUTHORIZED ACCESS AND USE is the use of a computer or network without permission.
Unauthorized Use is the use of a computer or its data for unapproved or possibly illegal activities.

 Organizations take several measure to help prevent unauthorized access and use. At a minimum, they
should have a written ACCEPTABLE USE POLICY (AUP) that outlines the computer activities for
which the computer and network may and may not be used. Safeguarding against unauthorized
access and use also includes identifying and authenticating users.

 Under Identifying and Authenticating Users is the


ACCESS CONTROL, it is a security measure that defines
who can access a computer, when they can access it, and
what actions they can take while accessing the computer.

 In addition, the computer should maintain an AUDIT


TRIAL that records in a file both successful and unsuccessful
access attempts. An unsuccessful access attempt could
result from a user mistyping his or her password, or it could
result from a hacker trying thousands of passwords.

 Many systems implement access controls using a two-phase


process called identification and authentication.
IDENTIFICATION verifies that an individual is a valid user. AUTHENTICATION verifies that the
individual is the person he or she claims to be.

THREE METHODS OF IDENTIFICATION AND AUTHENTICATION

1. USER NAMES AND PASSWORDS - A user name, or user ID (identification), is a unique


combination of characters, such as letters of the alphabet or numbers that identifies one specific
user. A password is a private combination of characters associated with the user name that allows
access to certain computer resources.

2. POSSESSED OBJECT - is any item that you must carry to gain access to a computer or
computer facility. Examples of possessed objects are badges, cards, smart cards, and keys.
Possessed objects often are used in combination with personal identification numbers. A
personal identification number (PIN) is a numeric password, either assigned by a company or
selected by a user.
3. BIOMETRIC DEVICES - authenticates a person’s identity by translating a personal
characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored
in the computer verifying a physical or behavioral characteristic. Examples of biometric devices
and systems include fingerprint readers, hand geometry systems, face recognition systems, voice
GE 10 – LIVING IN AN IT ERA

3. HARDWARE THEFT AND VANDALISM, Hardware theft is the act of stealing computer
equipment. Hardware vandalism is the act of defacing or destroying computer equipment. Hardware
vandalism takes many forms, from someone cutting a computer cable to individuals breaking into a
business or school computer lab and aimlessly smashing computers.

 Security measures are used to reduce the chance of theft. Physical


access controls, such as locked doors and windows, usually are
adequate to protect the equipment. Many businesses, schools, and
some homeowners install alarm systems for additional security.
School computer labs and other areas with a large number of
semifrequent users often attach additional physical security devices
such as cables that lock the equipment to a desk, cabinet, or floor.
Small locking devices also exist that require a key to access a
hard disk or optical disc drive.

4. SOFTWARE THEFT occurs when someone steals software media, intentionally erases programs,
illegally copies a program, or illegally registers and/or activates a program.

 One form of software theft involves someone physically stealing


the media that contain the software or the hardware that contains
the media.

 Another form of software theft occurs when software is stolen from


software manufacturers. This type of theft, called piracy, is by far
the most common form of software theft. Software piracy is the
unauthorized and illegal duplication of copyrighted software.

 A related form of software theft involves users illegally obtaining


registration numbers and/or activation codes.

SAFEGUARD AGAINST SOFTWARE THEFT

 To protect software media from being stolen, owners should keep original software boxes and
media in a secure location.
 All computer users should back up their files and disks regularly, in the event of theft.
 To protect themselves from software piracy, software manufacturers issue users license
agreements. A license agreement is the right to use the software. That is, you do not own the
software. The license agreement provides specific conditions for use of the software, which a
5. INFORMATION THEFT occurs when someone steals personal or confidential information. Some
user must accept before using the software.
GE 10 – LIVING IN AN IT ERA

information theft includes buying or stealing information learn about a competitor and stealing credit
card numbers to make fraudulent purchase.

 Most companies attempt to prevent information theft by


implementing the user identification and authentication
controls. To protect information on the Internet and networks,
companies and individuals use a variety of encryption
techniques.

 ENCRYPTION is the process of converting readable data into


unreadable characters to prevent unauthorized access. You
treat encrypted data just like any other data. That is, you can
store it or send it in an e-mail message. To read the data, the
recipient must decrypt, or decipher, it into a readable form.

6. SYSTEM FAILURE is the prolonged malfunction of a computer. System failure can cause loss of
hardware, software, data, or information.

 A variety of causes can lead to system failure. These include aging


hardware; natural disasters such as fires, floods, or hurricanes;
random events such as electrical power problems; and even errors in
computer programs.

 Electrical power variations is one of the more common causes of


system failures that can cause loss of data and loss of equipment. If
the computer equipment is networked, a single power disturbance
can damage multiple systems.

SAFEGUARD AGAINST SYSTEM FAILURE

 To protect against electrical power variations, use a surge protector. A surge protector uses special
electrical components to provide a stable current flow to the computer and other electronic
equipment.

 For additional electrical protection, some users connect an uninterruptible power supply to the
computer. An uninterruptible power supply (UPS) is a device that contains surge protection
circuits and one or more batteries that can provide power during a loss of power. A UPS connects
between your computer and a power source.

 As another measure of protection, some companies use duplicate components or computers as a


safeguard against system failure.

 BACKING UP – The Ultimate Safeguard


GE 10 – LIVING IN AN IT ERA

To protect against data loss caused by a system failure or hardware/software/information theft, computer
users should back up files regularly.

 A BACKUP is a duplicate of a file, program, or disk that can be


used if the original is lost, damaged, or destroyed. Thus, to back
up a file means to make a copy of it.

 You can use just about any media to store backups such as
eternal hard disks. A growing trend is to use cloud storage as
an offsite location.

 Some users implement a three-generation backup policy to


preserve three copies of important files. The grandparent is the
oldest copy of the file. The parent is the second oldest copy of
the file. The child is the most recent copy of the file.

 Most operating systems include a backup program. Backup


devices, such as external disk drives, also include backup programs.

HEALTH CONCERNS OF COMPUTER USE

Users are a key component in any information system. Thus, protecting users is just
as important as protecting hardware, software, and data.
GE 10 – LIVING IN AN IT ERA

The widespread use of computers has led to some important user health concerns. The following sections
discuss health risks and preventions, along with measures users can take to keep the environment healthy.

 COMPUTERS AND HEALTH RISKS

A REPETITIVE STRAIN INJURY (RSI) is an injury or disorder of the muscles, nerves, tendons,
ligaments, and joints. Computer-related RSIs include tendonitis and carpal tunnel syndrome.

1. Tendonitis is an inflammation of a tendon due to some repeated motion or stress on that tendon.
Symptoms of tendonitis of the wrist include extreme pain that extends from the forearm to the hand,
along with tingling in the fingers.

2. Carpal tunnel syndrome (CTS) is an HAND EXERCISES


inflammation of the nerve that connects the
forearm to the palm of the wrist. Symptoms of • Spread fingers apart for several seconds while
CTS include burning pain when the nerve is keeping wrists straight.
compressed, along with numbness and • Gently push back fingers and then thumb.
tingling in the thumb and first two fingers.
• Dangle arms loosely at sides and then shake
 Repeated or forceful bending of the wrist arms and hands.
and long-term computer work can cause
CTS or tendonitis.

 Factors that cause these disorders include


prolonged typing, prolonged mouse usage, or continual shifting between the mouse and the
keyboard.

 If untreated, these disorders can lead to permanent physical damage. To reduce the chance of
developing tendonitis or carpal tunnel syndrome, take frequent breaks during computer sessions
to exercise your hands and arms.

3. You may have computer vision syndrome (CVS) if you have sore, tired, burning, itching, or dry
eyes; blurred or double vision; distance blurred vision after prolonged staring at a display device;
headache or sore neck; difficulty shifting focus between a display device and documents; difficulty
focusing on the screen image; color fringes or after-images when you look away from the display
device; and increased sensitivity to light.

 Eyestrain associated with CVS is not thought to have serious or long-term consequences.

 Following these tips may help reduce eyestrain while working on a computer.
TECHNIQUES TO EASE EYESTRAIN
• Every 10 to 15 minutes, take an eye break.
- Look into the distance and focus on an object for 20 to 30 seconds.
- Roll your eyes in a complete circle.
- Close your eyes and rest them for at least one minute.
• Blink your eyes every five seconds.
• Place your display device about an arm’s length away from your
GE 10 – LIVING IN AN IT ERA

4. People who spend their workday using the computer sometimes complain of lower back pain, muscle
fatigue, and emotional fatigue. Lower back pain sometimes is caused from poor posture.

 Always sit properly in the chair while you work.

 To alleviate back pain, muscle fatigue, and emotional fatigue, take a 15- to 30-minute break every
2 hours — stand up, walk around, stretch, and relax. Another way to help prevent these injuries
is to be sure your workplace is designed ergonomically.

 ERGONOMICS AND WORKPLACE DESIGN

Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design
of items in the workplace.

Ergonomic studies have shown that using the correct type and configuration of chair,
keyboard, display device, and work surface helps users work comfortably and efficiently and helps
protect their health. For the computer work space, experts recommend an area of at least two feet by four
feet.

A well-designed work area should be flexible to allow adjustments to the height and build of
different individuals. Good lighting and air quality also are important considerations.
GE 10 – LIVING IN AN IT ERA

 COMPUTER ADDICTION

Computers can provide entertainment and enjoyment. Some computer users, however, become
obsessed with the computer and the Internet.

Computer addiction occurs when the computer


consumes someone’s entire social life. Computer addiction is a
growing health problem but can be treated through therapy and
support groups. Symptoms of a user with computer addiction
include the following:

• Craves computer time


• Irritable when not at the computer
• Overjoyed when at the computer
• Unable to stop computer activity
• Neglects family and friends
• Problems at work or school

ETHICS AND SOCIETY

As with any powerful technology, computers can be used for both good and
bad intentions. The standards that determine whether an action is good or bad
are known as ethics. Computer ethics are the moral guidelines that govern
the use of computers and information systems.

The following sections discuss issues related to information accuracy,


intellectual property rights, green computing, and information privacy.

 INFORMATION ACCURACY

Information accuracy today is a concern because many users access information maintained by
other people or companies, such as on the Internet. Do not assume that because the information is
on the Web that it is correct.

In addition to concerns about the accuracy of computer


input, some individuals and organizations raise questions about
the ethics of using computers to alter output, primarily
graphical output such as retouched photos. Using graphics
equipment and software, users easily can digitize photos and
then add, change, or remove images.
GE 10 – LIVING IN AN IT ERA

 One group that completely opposes any manipulation of an image is the National Press
Photographers Association. It believes that allowing even the slightest alteration could lead to
misrepresentative photos.

 Others believe that digital photo retouching is acceptable as long as the significant content or
meaning of the photo does not change. Digital retouching is an area in which legal precedents
so far have not been established.

A digitally altered photo shows


sports legend Michael Jordan
(born in 1963) meeting the
famous scientist Albert Einstein
(who died in 1955).

 INTELLECTUAL PROPERTY RIGHTS

Intellectual property refers to unique and original works such as ideas, inventions, art, writings,
processes, company and product names, and logos. Intellectual property rights are the rights to which
creators are entitled for their work.

A copyright gives authors and artists exclusive rights to duplicate,


publish, and sell their materials. A copyright protects any tangible form of
expression.

A common infringement of copyright is piracy. People pirate


(illegally copy) software, movies, and music. Many areas are not clear-cut
with respect to the law, because copyright law gives the public fair use to
copyrighted material. The issues surround the phrase, fair use, which allows
use for educational and critical purposes.

 INFORMATION PRIVACY

Information privacy refers to the right of individuals and


companies to deny or restrict the collection and use of information about
them. In the past, information privacy was easier to maintain because
information was kept in separate locations.
GE 10 – LIVING IN AN IT ERA

Today, huge databases store this data online. Much of the data is personal and confidential and
should be accessible only to authorized users. Many individuals and organizations, however, question
whether this data really is private.

 ELECTRONIC PROFILES

Every time you click an advertisement on the Web or register software online, your
information and preferences enter a database. Merchants then sell the contents of their databases
to national marketing firms and Internet advertising firms.

By combining this data with information from public sources such as driver’s
licenses and vehicle registrations, these firms create an electronic profile of individuals.

Critics contend that the information in an electronic profile reveals


more about an individual than anyone has a right to know.

They also claim that companies should inform people if they plan to
provide personal information to others. Many companies today allow people to
specify whether they want their personal information distributed.

 COOKIES

A cookie is a small text file that a Web server stores on your computer. Cookie files
typically contain data about you, such as your user name or viewing preferences.

Many commercial Web sites send a cookie to your


browser, and then your computer’s hard disk stores the cookie.
The next time you visit the Web site, your browser retrieves the
cookie from your hard disk and sends the data in the cookie to
the Web site.

 SPYWARE AND ADWARE

Spyware is a program placed on a computer without the user’s


knowledge that secretly collects information about the user. Internet
advertising firms often collect information about users’ Web browsing habits
by hiding spyware in adware.

Adware is a program that displays an online advertisement in a banner


or pop-up window on Web pages, e-mail messages, or other Internet services.

To remove spyware and adware, you can obtain a spyware and adware remover that can
detect and delete spyware and adware.

 SPAM
GE 10 – LIVING IN AN IT ERA

Spam is an unsolicited e-mail message or newsgroup


posting sent to multiple recipients or newsgroups at once. Spam is
Internet junk mail.

The content of spam ranges from selling a product or


service, to promoting a business opportunity, to advertising
offensive material.

Users can reduce the amount of the spam by signing up for e-mail filtering from their
Internet Service Provider or purchasing Anti-spam programs. Some e-mail programs have
built-in settings that allow users to delete spam automatically.

The disadvantage of e-mail filters and anti-spam programs is that sometimes they remove
valid e-mail messages.

 PHISHING

Phishing is a scam in which a perpetrator sends an official


looking e-mail message that attempts to obtain your personal and
financial information.

A phishing filter is a program that warns or blocks you from


potentially fraudulent or suspicious Web sites. Some Web browsers
include phishing filters.

Pharming is a scam, similar to phishing, where a perpetrator attempts to obtain your


personal and financial information, except they do so via spoofing.

Clickjacking is yet another similar scam. With clickjacking, an object that can be clicked
on a Web site, such as a button, image, or link, contains a malicious program.

 SOCIAL ENGINEERING

Social engineering is defined as gaining unauthorized access or


obtaining confidential information by taking advantage of the trusting human
nature of some victims and the naivety of others.
Some social engineers trick their victims into revealing confidential information such
as user names and passwords on the telephone, in person, or on the Internet.

ANALYSIS

Give your analysis about computer security risk that you encounter or experience in your life. In
your analysis, include how it affects you and how you resolve it.
GE 10 – LIVING IN AN IT ERA

If you haven’t experience any computer security risk in your life, you will still give your analysis
about one computer security risks, how it affects others and possible solution in preventing or stopping
it.

For the very first time, I encountered a computer security risk which is the hacker. Last
2 years ago my Facebook account was hacked by some Vietnamese and I don’t know
what to do. I panicked and cried a lot because that Facebook account of mine was a
sentimental value. I was trying to recover my account and I couldn’t do anything. I tried
to put my number and waited for the code, but the code wouldn’t accept. I saw it very
quick and try to recover quickly but, the hacker was a snap. The hacker changed
everything, my e-mail, my number, and they deactivated it. A day after, my significant
other, told to me to check my e-mail that I used in my account. Upon checking my e-
mail, I got a message from a Facebook and there’s a code and notify me and indicated
there the e-mail that the hacker used. In short, my account was recovered, fully
recovered. It affects me physically and mentally. Well, the good thing in there is I was
so very conscious in everything, I want everything to be filled up. There’s one thing I
learned here that you need to activate the “two-factor authentication” because it really
helps, it helps a lot especially notifying that someone is trying to open your account.
Not only activating the “two-factor authentication” but filling the important things like
the primary email address and secondary if that case if you cannot open the primary
email address you still have the other one. This is a tip, always remember your
passwords.

ACTION
GE 10 – LIVING IN AN IT ERA

In the box provided below, create your


own infographic about

Raising awareness on COMPUTER


ADDICTION, Cybercrime perpetrators, or
about the health concern of computer
use!

INFOGRAPHIC HERE:

Put a check on each topic weather you can understand it on your own, need more reference material, or if
you can’t understand at all.

SELF ASSESSMENT
I can do it with the help
I can do it on my own. I still can’t understand.
of a reference material.
Computer Security Risk

Health Concern of
GE 10 – LIVING IN AN IT ERA

Computer Use
Ethics & Society

POST TEST:

Identify what is being asked in the following sentences:

COMPUTER CRIME 1. It is any illegal act involving a computer.


CYBER EXTORTIONIST 2. A person who uses e-mail as a vehicle for extortion.
INTERNET AND NETWORK ATTACKS 3. It is a type of computer security risks that jeopardize security
and it includes computer viruses, Trojan horses and worms.
PASSWORD 4. It is a private combination of characters associated with the user name that allows access
to certain computer resources.
LICENSE AGREEMENT 5. It is the right to use the software.
BACKUP 6. It is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or
destroyed.
CARPAL TUNNEL SYNDROME 7. It is an inflammation of the nerve that connects the forearm to the
palm of the wrist.
ERGONOMICS 8. It is an applied science devoted to incorporating comfort, efficiency, and safety into
the design of items in the workplace.
GREEN CONSUMING 9. It involves reducing the electricity and environmental waste while using a
computer.
COOKIE 10. It is a small text file that a Web server stores on your computer.

RUBRICS

Category 4 3 2 1
Neatness and The work is The work is The work is The work appears
organization presented in a neat, presented in a neat presented in an sloppy and
clear, organized and organized organized fashion unorganized. It is
fashion that is easy fashion that is but may be hard to hard to know what
to read. usually easy to read. read at times. information goes
together.
Understanding I got it!! I did it in I got it. I I understood parts I did not
GE 10 – LIVING IN AN IT ERA

new ways and understood the of the problem. I understand the


showed you how it problem and have got started, but I problem.
worked. I can tell an appropriate couldn’t finish.
you what math solution. All parts
concepts are used. of the problem are
addressed.
Explanation Complete response Good solid response Explanation is Misses key points
with a detailed with clear unclear
explanation explanation
Demonstration of Shows complete Response shows Response shows Response shows a
Knowledge understanding of substantial SOME complete lack of
questions, ideas, understanding understanding understanding
and processes
Requirements Goes beyond the Meets the Hardly meets the Does not meet the
requirements requirements requirements requirements

CLOSING PRAYER

May God the Father bless us.


May God the Son heal us.
May God the Holy Spirit enlighten us,
and give us eyes to see with,
ears to hear with,
hands to do the work of God with,
feet to walk with,
a mouth to preach the word of salvation with,
and the angel of peace to watch over us and lead us at last,
by our Lord's gift,
to the Kingdom.
Amen.

This module is based on the following references:

 Shelly, G. B, & Vermaat, M. E. (2013). Discovering Computers: Fundamentals. Boston, MA: Course
Technology, Cengage Learning
 https://en.wikipedia.org/wiki/Computer_virus
 https://www.vectorstock.com/royalty-free-vectors/hack-vectors
 https://www.privacy.gov.ph/data-privacy-act/#:~:text=%E2%80%93%20This%20Act%20shall%20be
%20known,Data%20Privacy%20Act%20of%202012%E2%80%9D.&text=%E2%80%93%20It%20is
%20the%20policy%20of,to%20promote%20innovation%20and%20growth.

You might also like