Module 1 ICT Introduction Basic Web Concept
Module 1 ICT Introduction Basic Web Concept
Technology (ICT)
Lesson 1 – Quarter 3
THE SESSION IS DIVIDED INTO FOUR
LESSONS, NAMELY:
1. Basic Web Concept
2. Web design and principle
3. Netiquettes in Web
4. Web safety and security
AFTER GOING THROUGH THIS
SESSION, YOU ARE EXPECTED TO:
1. Learn different concept in Web such as
termonilogies, history and other factors;
2. Understand Web designs and principles;
3. List and identify the different typefaces.
4. Acquire knowledge on how to be safe/secure in
Web;
5. Identify the 10-core rule in Netiquette;
6. Appreciate the essence of learning web safety.
LESSON PROPER
Web page is a single document on the Internet. It can include any of
various types of content, including text, images, video material, other
sorts of code or it could also be blank.
HOW TO ACCESS
Dedicated line a type of always on method and provide
constant connection.
THE WEB?
Cable Internet-Is an online connection to the web by the
use of cable lines already used by the cable TV provider.
Cable lines can carry TV and data signals faster since they
are dedicated line originally intended for TV.
HEADING A larger font size text, usually bold or italic in style, showing the different sections of a page.
NORMAL TEXT The text that makes up the main content of the web page. It has many formats. It can be in
paragraph form or bulleted list.
BACKGROUND The wallpaper of the web page. It can be a solid color, a picture or a graphic, or a default
standard with white or gray background.
ANIMATED IMAGES Inline images that include motion and animation. These images are more attractive to the user.
LINKS Text, phrases, or graphics that help the user to navigate more on the Web page.
EMAIL SPAM
• Also known as junk email, it
is usually unsolicited commercial
email sent from one source with
identical message sent to a
multiple recipient.
• Dangerous spams carry
virus like Trojan Horse and other
malicious software. Spammer is
the term used to refer to person
who create electronic spam.
• Spamming is projected to
continue because it is a cheap
means of advertising.
48
Email Spoofing
• This refers to deceitful
email practice in which the
sender address is changed, so
that it would appear to have
come from a different source
usually someone you know.
• Email spoofing is usually used
by the spammer to hide the
origin of the spam.
49
HACKER
• A person who is able
to enter and control other
people’s computer without
authorization. A hacker is
able to enter another’s
computer, usually
vandalizes the victim’s
website, steal information,
and performs credit fraud
PHARMING
• A dangerous hacker
attack on a website which
directs all traffic to that
web site to another
fictitious website. The main
objective of Pharming is to
obtain username and
password as well as
financial information to
steal their money
electronically.
52
SPYWARE
• This is a computer
program that is installed
covertly on a personal
computer to collect
information or even take
control over the computer
without the knowledge of the
user.
• Spyware program
would be able to monitor and
collect information about the
user and his internet habits and
practices.
53
COMPUTER VIRUS
• is a program that duplicates
itself and infects the computer. It
spreads like a real biological virus.
• Some Worm Virus deleted files
and other interrupted the network
function and stiil, other send junk
mail from infected computers.
• Trojan Horse is a malware fronting
to perform a good task but
convertly performs undesirable
function. This can disable the
computer defences opening it to
unauthorized entry. DANGERS ON THE INTERNET
54
FIREWALL
• Helps in protecting
your computer from
unauthorized entries, viruses
and even hackers. It is
recommended to keep this
setting turned on.
SECURITY CENTER
55
AUTOMATIC UPDATE
• Another feature of
microsoft that when your
turned on will
automatically download
updated from MS Windows
website. Usually meant to
update features and fix
bugs in OS.
SECURITY CENTER
56
VIRUS PROTECTION
• Is usually about the
current anti-virus installed in
your computer. This option
is recommend to be turned
on always. It is meant to
locate, find, and remove
virus threats that are
already in your computer.
This program should be
constantly updated.
SECURITY CENTER