0% found this document useful (0 votes)
20 views

ETECH Lesson 2

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

ETECH Lesson 2

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

PRAYER:

Our Father,
Who art in Heaven,
hallowed be Thy name;
Thy Kingdom come,
Thy will be done
on earth as it is in Heaven.
give us this day our daily bread;
and forgive us our trespasses
as we forgive those
who trespass against us;
and lead us not into temptation,
But deliver us from evil
Amen
Goal of the lesson
∙ Understand and demonstrate the proper etiquette in using ICT;
∙ Consider one’s safety when sharing information using the
internet;
∙ Determine and avoid the dangers of the internet;
∙ Be responsible in the use of social networking sites; and
∙ Browse the internet efficiently and properly through proper
referencing.
Guidelines for courteous communication in the online environment. It
includes proper manners for sending e-mail, conversing online, and so on.
All About Netiquette

My computer has an antivirus so it is


okay to open most email attachments
Like e-cards and video files.
All About Netiquette
Your friend told you that his college
application was rejected because
you posted a video of him doing crazy stuff
at a party and you posted
that video several years ago but later took it
down to protect your
friend’s reputation.
Can your friend be right that the college
found the video?
All About Netiquette
You and your best friend play a lot of video
games. One time, she asks
you for your password so she can help you
to level up and get in-game money. She
promises to keep your password a secret.
Is it okay to give away your password?
All About Netiquette

You received an e-mail stating that


your mother’s bank account is going
to be forfeited if you do not respond
to the e-mail. Is it safe to reply?
All About Netiquette

People knowing your birthday is


probably a must if you want to get the
most gifts as possible. But having it
in your profile make you vulnerable
to identity theft.
Sadly, this is
cyberbullying…
HOW TO STAY SAFE ONLINE?
Tips to stay safe online:

1. Be mindful of what you share online and what site you


share it to.
2. Do not just accept terms and conditions; read them
3. Check out the privacy policy page of a website to learn
how the website handles the information you share.
4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
5. Do not share any of your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito” (or
private) mode, a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
Tips to stay safe online:

8. Never post anything about a future vacation. It is similar


to posting, “Rob my house at this date.”
9. Add friends you know in real life and refrain from adding
strangers.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one anti-
virus software to avoid conflicts.
12. If you have Wi-Fi at home, make it a private network by creating a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable
in peer-to-peer downloads (torrents) as the download is more likely not
monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Malicious Software
Types of Malware
Virus - Malicious software program loaded into
user’s computer without the user’s knowledge
and performs malicious actions. Can be
transferred from one computer to another
through the internet and local networks or data
storage.

Worm - Stand-alone malicious program that


can self-replicate and propagate via computer
networks without human help. Ex. ILOVEYOU
worm (Love Bug Worm) created by a Filipino.
Types of Malware
Trojan - Malicious software program that is
disguised as a useful program but once
downloaded or installed, leaves your PC
unprotected and allows hackers to get your
information.

Example: Rogue security software: Tricks


the user into posing that it is a security
software. It asks the user to pay to improve
his/her security but in reality they are not
protected at all.
Types of Malware
Spyware - A program that runs in the background
without you knowing it (thus called spy). It has the
ability to monitor what you are currently doing and
typing key logging.
Example Key loggers: used to record the
keystroke done by the users this is done to steal
their password or any other sensitive information. It
can record email, messages or any information you
type using your keyboard.

Adware: A program designed to send you


advertisements, mostly as pop-ups.
Spam
Unwanted email mostly from bots or advertisers. It can be
used to send malware.
Phishing
Its goal is to acquire sensitive personal information like passwords and credit
card details. This is done by sending you an email that direct the use to visit a
website and be asked to update his/her username, password, credit card or
personal information.
Pharming
A more complicated way of phishing where it exploits the DNS (Domain
Name Service) System.
Think Before You Click!

Here are some things that you might want to consider before posting something
on the internet.
1. Before you post something on the web, ask these questions to yourself.
• Would you want your parents or grandparents to see it?
• Would you want your future boss to see it?
• Once you post something on the web, you have no control of who can
see your posts.
2. Your friends depend on you to protect their reputation online. Talk to your
friends about this serious responsibility.
3. Set your post to “private”. In this way search engines will not be able to scan
that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who
posted it to take it down or report it as inappropriate.
Copyright
Section of the law that states the rights of a person regarding his
own work and anyone who uses it without consent is punishable by
law.

Copyright refers to the legal right of the owner of intellectual


property. In simpler terms, copyright is the right to copy. This
means that the original creators of products and anyone they give
authorization to are the only ones with the exclusive right to
reproduce the work. Copyrights in the Philippines only last a
lifetime (of the author) plus 50 years.
Here as some tips that could help you avoid
copyright infringement.
1. Understand
2. Be Responsible
3. Be Creative
4. Know the law

Fair Use
An intellectual property may be used without
consent as long as it is used in commentaries,
criticisms, search engines, parodies, news
reports, research, library archiving and
education.
Act. 2: Evaluation
Answer pages 15 and 33.
(Empowerment Technologies)

The submission tab is already posted


in your courses under week 1 lesson 2

Deadline: August 26 (Friday)


EDIT IN POWERPOINT®
Click on the button under the presentation
preview that says "Download as PowerPoint
template". You will get a .pptx file that you
can edit in PowerPoint.
Remember to download and install the fonts
used in this presentation (you’ll find the
links to the font files needed in the
Presentation design slide)

30

You might also like