0% found this document useful (0 votes)
57 views

Emtech 101

The document discusses various dangers on the internet such as malware, spam, email spoofing, phishing, and hackers. It provides definitions for different types of malware like viruses, worms, trojan horses, spyware, and adware. It also discusses spam, email spoofing, phishing, hackers, and pharming. The document provides 10 commandments for computer ethics and steps to make contextualized online research and enhance research skills. It discusses identifying good sources from satirical sources and provides examples of satirical news stories that went viral. Finally, it discusses adding animations in Microsoft PowerPoint.

Uploaded by

rich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Emtech 101

The document discusses various dangers on the internet such as malware, spam, email spoofing, phishing, and hackers. It provides definitions for different types of malware like viruses, worms, trojan horses, spyware, and adware. It also discusses spam, email spoofing, phishing, hackers, and pharming. The document provides 10 commandments for computer ethics and steps to make contextualized online research and enhance research skills. It discusses identifying good sources from satirical sources and provides examples of satirical news stories that went viral. Finally, it discusses adding animations in Microsoft PowerPoint.

Uploaded by

rich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

DANGERS ON THE INTERNET

Internet is a powerful tool for learning and communicating with people.


However,there are many dangers that you must watch out for.
MALWARE
stands for malicious software.
5 types of malware
VIRUS a malicious program designed to replicate itself and transfer from
one computer to another.
WORM malicious program that transfer from one computer to another by
any types of means.
TROJAN HORSE a malicious program that disguises as a useful program.
SPYWARE a program that runs in the background without knowing it.
ADWARE a program designed to send you advertisement, mostly as pop ups.
2 SPAM
An unwanted email mostly from boths advertisers. It can be use to send
malware.
3. EMAIL SPOOFING
Refers to deciteful email practice in which the sender address is change, so
that it would appear to have came from a different source usually someone you
know.t
4.PHISHING
An unwanted acquisition of sensitive personal information like passwords and
credit card details.
5.HACKER
A person who is able to enter and control other people’s computer without
authorization.
PHARMING a hacker attack on a website which directs all trafic to that
website to another fictitious website.
10 Commandments for computer ethics
1.Thou shalt not use computer to harm other people.
2.Thou shalt not interfere with other peoples computer works.
3.Thou shalt not snoop around in other peoples files.
4.Thou shalt not use computer to steal.
5.Thou shalt not use computer to bear false witness.
6.Thou shalt not use or copy software for which you have not paid.
7.Thou shalt not use other peoples computer resources without a authoriztion.
8.Thou shalt not appropriate other people intellectual output.
9.Thou shalt think about the social consequenceof the program you write.
10.Thou shalt use a computer in ways that shows consideration and respect.
CONTEXTUALIZED ONLINE SEARCH AND
RESEARCH SKILLS
New mobile phone apps are added including those used for research and
school assignments.

CONTEXUAL SEARCH
Is an attemp to be more precise in providing the list of documents
according to the words used by the user to earch on the internet.
Steps to make contextualized online research
1.Identify or choose a topoic choose something that you are interested in,new
ideas,things or areas.
2.Topic or task defination use the google search or wikipedia or other source to define
the topic or task.
3.Identify methods of search You can perform experiment ,explore or get a survey of
the subject matter and textual content of the research.
4.Identify source of your research Reliable source are very important to opbtain the
rich and accurate information for your research.
5.Make your research strategies List down the all the keyword for specific topics to
sear5ch on the internet.
6.Compiling the research report The internet has enormous wealth of information that
can be overwhelming.Strategies of handling large amount of data is necessary for you ti be
able to shift through them for your final analysis.
7.Evaluate the result of your research go through the marerials you have research
and check them for usefulness,relevance to your research ,reliability,and accuracy.
8.Creat a list of your references for citation It is a good practice to keep your source
update for your footnote and bibliography.
Enhancing and improving research skills
Enhancing research skills is important as a student for your assignments and papers as it is
when you graduate and work for a company.
Improving research skills
Critical thinking is a very important skill to develop in reaseach since the internet is full of
valuable data.
Analytical skill requires the ability look, verbalize,conceptualize, and gather data attuned to
the context the subject.
Problem solving capability is the ability to present solutions or solve problem by presenting
a desicion based on the given information.
Organized data mining is a well planned design of databese of all the research materials
either inside the computer of hard copies.
Research presentation the ability to present ideas and draw conclusions from the research,
be able to explain in writing the purpose, steps, goals and objective of the reseach
Creativity and developed imagination is the ability to look for alternative solutions to the
problem needed to solve in the reseach and thinking only within the context but also beyond the
usual approaches to the research objective.
Computer literacy knowledge of the various computer applications and tools when working
with large amount of data helps the researcher manage these information.
Steps in making contexualized research

1.Open the google site,on the upper right side of the window,click the google
apps icon and click search.
2.On the lower right part of the window,click settings and the google search
settinf pop ups list will appear.
3.Click the advance serach and advance search window will appear.
4.Type the keyword that you would like you to search and click the advance
search button.
Identifying good source from satirical source
Satirical site are website that report untrue or false stories meant to amuse or
intertain.These sites take thier cue from TV shows that report exaggerated news
that are but intriguing and funny.
HOW TO DETECT SATIRICAL NEWS
1.If it is good to be true,then it must be so
2.If they are from known satirical sites.
3.If the news did not emanatefrom reliable news site.
List of top source of satirical news
1.adobo chronicles
2.So,what news
3.Erits times
4.The professional hackler
Examples of satire news that went viral on the internet
shared many times by readers believing they were true

1.Philippines banned from beauty pagents for the next two years from adobo
chronicles.The news iondicate the enormous advantage of a filipina
2.CNN reported anderson cooper appointed us ambssador to the phlippines from adobo
chronicles. The news came out after the yolanda incident.
3.Snow in the4 philippines by RBN.the pagasa has to confirm the news to be fake and the
video was actually footage of ashes falling as a result of MT. Pinatubo eruption.
4.Pope francis resign a reported by a satirical site in USA.
Hands on using MS powerpoint to create
custom animations

A.Adding an animation
side animation is a moving computer graphic effects that can be added to the
text,object or the entire slide.
1.Click the animation tab and go to the advance animation group
2.Select the animation from the list of options grouped as ENTRANCE,EMPHAHSIS AND
EXIT.

You might also like