Etech Q1 Lesson 2
Etech Q1 Lesson 2
RULES OF
NETIQUETTE
OBJECTIVES
1
✓ Consider one’s and other’s safety
when sharing information;
✓ Determine and avoid dangers of
the internet;
✓ Be responsible in the use of social
network.
YES OR NO
My computer has an
antivirus so it is okay to
open email attachments like
e-cards and video effects.
YES OR NO
You and friend agreed to
level up your games so you
provide him the password.
Is it okay?
YES OR NO
You posted about your friends,
after 5 years it shows as your post
and your friends was not able to
get a job of reputation issues.
Do the post affects your friend?
How?
YES OR NO
Keyloggers are software
that show pop-up ads
even if you are not using
your browser.
YES OR NO
You forgot to pass your essay
in English, while browsing
you saw an article related to
your essay, is it okay to use
the article in you essay?
YES OR NO
Search engines scan
websites for search result
even if you have set your
post to “private”.
YES OR NO
Virus is a malware that
multiple and infects
other computer through
flash drives.
LET US SEE!!
ARE YOU SAFE?
✓ SHARE KO LANG? OR DI KO PA NASHARE?
LAST
NAME ADDRESS
BIRTHDAY
CHALLENGE
HAVE YOU TRIED SEARCHING
YOUR NAME IN THE SEARCH
ENGINES LIKE GOOGLE, OR
ANY BROWSER?
YES!!!
YOUR PICTURES AND
INFORMATION APPEARS
ON THOSE SEARCH
ENGINES!!
3 QUESTIONS
✓ HOW MANY HOURS DO YOU SPEND IN
THE INTERNET?
✓ WHEN IS THE LAST TIME YOU
COMPLAINED ABOUT INTERNET SPEED?
✓ CAN YOU LIVE WITHOUT THE INTERNET?
CYBERCRIME
• Cybercrime refers to criminal activities that are
committed using computer networks or the
internet. These crimes can involve stealing
sensitive information, disrupting computer
systems, committing fraud, or engaging in other
illegal activities.
CYBERSTALKING
Using electronic
communication to harass,
threaten, or intimidate
another person.
MALWARES
✓Stands for malicious software.
• Virus
- a malicious program that
transfers from one computer to
another by any type of means.
MALWARES
• WORMS
– a malicious program that transfers from
one computer to another by any type of
means. Often use computer networks to
spread.
Ex: ILOVEYOU (LOVE BUG WORMS)
MALWARES
• TROJAN
- distinguished as a useful program
but once downloaded or installed,
your PC will be unprotected and
hackers can get your information.
MALWARES
• SPYWARE
- a program that in that background
without knowing it. It has the ability
to monitor what you are currently
doing and typing through keylogging.
KEYLOGGERS
- use to record keystrokes done by
the users. For the purpose of
stealing the password. It can
record email, messages through
the keyboard.
MALWARES
• ADWARE
– a program designed to
send you advertisement
mostly in a form of pop-
ups.
SPAM
• Unwanted email mostly
from bots or
advertisers. It can be
use to send malwares.
PHISHING
• Criminals send emails or messages
that look like they're from a trusted
source, but are actually designed to
trick people into giving away their
personal information.
PHARMING
• It is more complicated
because it exploits the
DNS (Domain Name
Service)
PHISHING
• The goal is to acquire
sensitive information
like passwords and
credit card details.
In a form of email.
PROTECTING
REPUTATIONS
ONLINE
R E P UT AT I O N
• the general opinion that
people have about someone
or something.
• Either Bad or Good
YOU MIGHT CONSIDER
THESE:
Before you post something
on the web, ask these
questions to yourself: Would
you want your parents or
grandparents to see it?
YOU MIGHT CONSIDER
THESE:
• Your friends
depends on you to
protect their
reputation online.
Talk to your friends
about this serious
responsibility.
YOU MIGHT CONSIDER
THESE:
• Set your post to
“private”. In this
way, search
engines will not
be able to scan
that post.
Incognito
YOU MIGHT CONSIDER
THESE:
• Avoid using names. Names are easy
for search engines to can.
• If you feel that a post can affect you
or other’s reputation, ask the one
who posted it to pull it down or
report it as inappropriate.
COPYRIGHT INFRINGEMENT
COPYRIGHT INFRINGEMENT
• Any literary works, invention, a
form of literary work, or a
research, you have the right as to
how it should be used by others.
• This is called intellectual
property.
COPYRIGHT INFRINGEMENT
• The law includes your rights
over your work, and anyone
who uses it without your
consent is
PUNISHABLE BY LAW.
TIPS TO AVOID COPYRIGHT
INFRINGEMENT
1. UNDERSTAND – it includes literary
works, photographs, painting,
drawings, films. This means that you
express something using own words,
but you should give credits to the
source.
TIPS FOR AVOID COPYRIGHT
INFRINGEMENT
2. Be RESPONSIBLE. No
excuse if you do not see any
copyright. Be responsible
enough to know if something
has copyright.
TIPS FOR AVOID COPYRIGHT
INFRINGEMENT
3. BE CREATIVE. Ask yourself
whether what you are making is
something made from somebody else’s
creativity. It is important to add your
own creative genius in everything that
will be credited to you.
TIPS FOR AVOID COPYRIGHT
INFRINGEMENT
4. KNOW THE LAW – The law covers
50 years in the Copyright infringement.
There are also provisions for “fair use” which
mean that an intellectual property may be
used without a consent as long as it is used in
commentaries, criticisms, search engines,
parodies, news reports and teaching.