SlideShare a Scribd company logo
1 of 17
Download to read offline
SLIDESMANIA.COM
slidesmania.com
Prepared By: Mr. Benandro A. Palor
LESSON 2
You can type something here…
Safe and Responsible
Use of ICT
Twitter Facebook Instagram SlidesMania
SLIDESMANIA.COM
slidesmania.com
At the end of the lesson, you should be able to …
LEARNING OUTCOMES
You can type something here…
LESSON 2
Identify factors to
consider in using a
computer, the
internet, and an e-
mail
Provide examples
and advantages of
anti-malware or
anti-virus software
Value the
importance of
personal safety
while working with
a computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
FACTORS TO CONSIDER IN USING
A COMPUTER, THE INTERNET AND AN E-MAIL
Home Recent Tabs LESSON
You can type something here…
1. Viruses, Adware, and
Spyware – computer can get
a virus while using internet
which can damage the files
and memory of the computer
and even affect its funtions.
2. Exposure to inappropriate
contents – these are those
materials which are not meant
for the age and level of
maturity of users specially
children.
4. Identity theft or fraud –
The user must be aware that
identity can be stolen without
his/her knowledge. Some bad
people do this intentionally to
create crimes or unlawful
acts.
3. Harassment and
cyberbullying – A user must
be aware that not all people
online are trustworthy.
SLIDESMANIA.COM
SLIDESMANIA.COM
1. Always wear shoes or slippers with
nonconductive rubber soles. This will
reduce the chances of being shocked or
seriously injured in an electrical accident
2. Do not touch the metallic parts of the
components which are plugged into a
power source
3. Turn off the extension cord when
removing from a compute
4. Avoid eating and drinking near the
computer
5.Before using the computer, be sure that
you fully understand the computer
software
Home Recent Tabs LESSON
You can type something here…
6. Avoid trailing the wire of a computer
across or around the room, because people
might trip on it.
7. Avoid overloading electrical sockets
8. Use a work desk which is strong enough
to support computers and equipment
9. When installing software in your
computer such as antivirus and
antispyware, ask for assistance from a
knowledgeable elder
10. Before touching any hardware, make
sure that the electricity is off.
PERSONAL SAFETY WHILE WORKING WITH A COMPUTER
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs LESSON
You can type something here…
A shortened term for “malicious software” which is designed to damage or disable
computers and computer systems. These can steal, encrypt or delete sensitive data; alter core
computing functions; and monitor the user’s computer activity without any permission.
SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
The computer worms
spread over the computer
networks by exploiting the
computer system
vulnerabilities. They have
the ability to self-replicate
and spread independently.
Often, they are spread
through mass e-mails with
infected attachments to
users’ contacts
WORMS
This is a malware which is
capable of copying itself
and spreading to other
computers. They can steal
information, harm host
computers and networks,
steal money, render
advertisements, and do
other ways to cause
damages.
VIRUS
SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
It is also known as “Trojan”.
To trick the users to
download or install the
malware, it disguises itself
as a normal file or program
TROJAN
HORSE It is a flaw that produces
undesired outcomes which
are usually results of
human error usually exists
in the source code of
compilers of a program.
These can be prevented
with developer education,
code analysis tools, and
quality education
BUG
SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
It is a short form of
advertising-supported
software. It delivers
advertisements
automatically such as pop-
up ads on websites and
applications which offer
free versions
ADWARE
It holds the computer system
captive while demanding a
ransom. It encrypts the user’s
access to the computer by
encrypting files to the hard
drive or locking down the
system. Then, it will display a
display message forcing the
user to pay the malware
creator to remove restriction
as well as to regain access
RANSOMWARE
SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
This is designed to
remotely access or control
a computer wherein the
users or even the security
programs cannot detect. It
cannot be removed easily
because it keeps hiding
itself.
ROOTKIT
It functions by spying the
user’s activity without their
knowledge. It spreads by
exploiting software
vulnerabilities
SPYWARE
SLIDESMANIA.COM
SLIDESMANIA.COM
1. The computer or the web browser speed becomes slower
2. The files are modified or deleted
3. The CPU usage increases
4. There is a problem when connecting to a network
5. It is freezing or crashing
6. The running programs turn off themselves
7. The computer behavior becomes strange
8. The e-mails and messages are being sent automatically without the user’s knowledge
9. Strange files, programs, or desktop icons appear.
Home Recent Tabs LESSON
You can type something here…
MALWARE SYMPTOMS
SLIDESMANIA.COM
SLIDESMANIA.COM
1. An anti-malware and firewall software must be installed. Choose a software that
offers tools for defecting, quarantining, and removing multiple types of malwares.
Scan your computer regularly
2. The software and the operating system should be updated to the current
vulnerability patches. These patches are used to patch bugs or other security
flaws that could be exploited by attackers.
3. Be watchful when downloading files, programs, attachments, and other. Most
often, a download that looks strange or come from an unfamiliar source contains
a malware
Home Recent Tabs LESSON
You can type something here…
RECOMMENDATIONS ON HOW TO PREVENT
AND REMOVE MALWARE
SLIDESMANIA.COM
slidesmania.com
Prepared By: Mr. Benandro A. Palor
LESSON 2
Reference: Dynamic Series in Home Economics and Livelihood Education 4 by: Gee E. Velasquez and Cynthia Bulayo-Banzon
THANK YOU !!!!
Twitter Facebook Instagram SlidesMania

More Related Content

Similar to lesson2-safeandresponsibleuseofict-210806120854.pdf

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Empowerment
EmpowermentEmpowerment
Empowermentrairuta
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 

Similar to lesson2-safeandresponsibleuseofict-210806120854.pdf (20)

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Internet security
Internet securityInternet security
Internet security
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 

More from Debbie Rizza Daroy

tipo-ng-klima-sa-pilipinas-211014054715.pdf
tipo-ng-klima-sa-pilipinas-211014054715.pdftipo-ng-klima-sa-pilipinas-211014054715.pdf
tipo-ng-klima-sa-pilipinas-211014054715.pdfDebbie Rizza Daroy
 
physicalfitnesstestlecture-141117053550-conversion-gate01.pdf
physicalfitnesstestlecture-141117053550-conversion-gate01.pdfphysicalfitnesstestlecture-141117053550-conversion-gate01.pdf
physicalfitnesstestlecture-141117053550-conversion-gate01.pdfDebbie Rizza Daroy
 
klimaatpanahonsapilipinas-160724122557.pdf
klimaatpanahonsapilipinas-160724122557.pdfklimaatpanahonsapilipinas-160724122557.pdf
klimaatpanahonsapilipinas-160724122557.pdfDebbie Rizza Daroy
 
drawingtheartoffilipinoculturalcommunities-210118035733.pdf
drawingtheartoffilipinoculturalcommunities-210118035733.pdfdrawingtheartoffilipinoculturalcommunities-210118035733.pdf
drawingtheartoffilipinoculturalcommunities-210118035733.pdfDebbie Rizza Daroy
 
visualizatingnumbersthrough100000-170127214120.pdf
visualizatingnumbersthrough100000-170127214120.pdfvisualizatingnumbersthrough100000-170127214120.pdf
visualizatingnumbersthrough100000-170127214120.pdfDebbie Rizza Daroy
 
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdfaralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdfDebbie Rizza Daroy
 

More from Debbie Rizza Daroy (7)

tipo-ng-klima-sa-pilipinas-211014054715.pdf
tipo-ng-klima-sa-pilipinas-211014054715.pdftipo-ng-klima-sa-pilipinas-211014054715.pdf
tipo-ng-klima-sa-pilipinas-211014054715.pdf
 
physicalfitnesstestlecture-141117053550-conversion-gate01.pdf
physicalfitnesstestlecture-141117053550-conversion-gate01.pdfphysicalfitnesstestlecture-141117053550-conversion-gate01.pdf
physicalfitnesstestlecture-141117053550-conversion-gate01.pdf
 
klimaatpanahonsapilipinas-160724122557.pdf
klimaatpanahonsapilipinas-160724122557.pdfklimaatpanahonsapilipinas-160724122557.pdf
klimaatpanahonsapilipinas-160724122557.pdf
 
drawingtheartoffilipinoculturalcommunities-210118035733.pdf
drawingtheartoffilipinoculturalcommunities-210118035733.pdfdrawingtheartoffilipinoculturalcommunities-210118035733.pdf
drawingtheartoffilipinoculturalcommunities-210118035733.pdf
 
visualizatingnumbersthrough100000-170127214120.pdf
visualizatingnumbersthrough100000-170127214120.pdfvisualizatingnumbersthrough100000-170127214120.pdf
visualizatingnumbersthrough100000-170127214120.pdf
 
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdfaralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
 
conditioning-180909105836.pdf
conditioning-180909105836.pdfconditioning-180909105836.pdf
conditioning-180909105836.pdf
 

Recently uploaded

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

lesson2-safeandresponsibleuseofict-210806120854.pdf

  • 1. SLIDESMANIA.COM slidesmania.com Prepared By: Mr. Benandro A. Palor LESSON 2 You can type something here… Safe and Responsible Use of ICT Twitter Facebook Instagram SlidesMania
  • 2. SLIDESMANIA.COM slidesmania.com At the end of the lesson, you should be able to … LEARNING OUTCOMES You can type something here… LESSON 2 Identify factors to consider in using a computer, the internet, and an e- mail Provide examples and advantages of anti-malware or anti-virus software Value the importance of personal safety while working with a computer
  • 3. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 4. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 5. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 6. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 7. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 8. SLIDESMANIA.COM SLIDESMANIA.COM FACTORS TO CONSIDER IN USING A COMPUTER, THE INTERNET AND AN E-MAIL Home Recent Tabs LESSON You can type something here… 1. Viruses, Adware, and Spyware – computer can get a virus while using internet which can damage the files and memory of the computer and even affect its funtions. 2. Exposure to inappropriate contents – these are those materials which are not meant for the age and level of maturity of users specially children. 4. Identity theft or fraud – The user must be aware that identity can be stolen without his/her knowledge. Some bad people do this intentionally to create crimes or unlawful acts. 3. Harassment and cyberbullying – A user must be aware that not all people online are trustworthy.
  • 9. SLIDESMANIA.COM SLIDESMANIA.COM 1. Always wear shoes or slippers with nonconductive rubber soles. This will reduce the chances of being shocked or seriously injured in an electrical accident 2. Do not touch the metallic parts of the components which are plugged into a power source 3. Turn off the extension cord when removing from a compute 4. Avoid eating and drinking near the computer 5.Before using the computer, be sure that you fully understand the computer software Home Recent Tabs LESSON You can type something here… 6. Avoid trailing the wire of a computer across or around the room, because people might trip on it. 7. Avoid overloading electrical sockets 8. Use a work desk which is strong enough to support computers and equipment 9. When installing software in your computer such as antivirus and antispyware, ask for assistance from a knowledgeable elder 10. Before touching any hardware, make sure that the electricity is off. PERSONAL SAFETY WHILE WORKING WITH A COMPUTER
  • 10. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs LESSON You can type something here… A shortened term for “malicious software” which is designed to damage or disable computers and computer systems. These can steal, encrypt or delete sensitive data; alter core computing functions; and monitor the user’s computer activity without any permission.
  • 11. SLIDESMANIA.COM SLIDESMANIA.COM COMMON TYPES OF MALWARE Home Recent Tabs LESSON You can type something here… The computer worms spread over the computer networks by exploiting the computer system vulnerabilities. They have the ability to self-replicate and spread independently. Often, they are spread through mass e-mails with infected attachments to users’ contacts WORMS This is a malware which is capable of copying itself and spreading to other computers. They can steal information, harm host computers and networks, steal money, render advertisements, and do other ways to cause damages. VIRUS
  • 12. SLIDESMANIA.COM SLIDESMANIA.COM COMMON TYPES OF MALWARE Home Recent Tabs LESSON You can type something here… It is also known as “Trojan”. To trick the users to download or install the malware, it disguises itself as a normal file or program TROJAN HORSE It is a flaw that produces undesired outcomes which are usually results of human error usually exists in the source code of compilers of a program. These can be prevented with developer education, code analysis tools, and quality education BUG
  • 13. SLIDESMANIA.COM SLIDESMANIA.COM COMMON TYPES OF MALWARE Home Recent Tabs LESSON You can type something here… It is a short form of advertising-supported software. It delivers advertisements automatically such as pop- up ads on websites and applications which offer free versions ADWARE It holds the computer system captive while demanding a ransom. It encrypts the user’s access to the computer by encrypting files to the hard drive or locking down the system. Then, it will display a display message forcing the user to pay the malware creator to remove restriction as well as to regain access RANSOMWARE
  • 14. SLIDESMANIA.COM SLIDESMANIA.COM COMMON TYPES OF MALWARE Home Recent Tabs LESSON You can type something here… This is designed to remotely access or control a computer wherein the users or even the security programs cannot detect. It cannot be removed easily because it keeps hiding itself. ROOTKIT It functions by spying the user’s activity without their knowledge. It spreads by exploiting software vulnerabilities SPYWARE
  • 15. SLIDESMANIA.COM SLIDESMANIA.COM 1. The computer or the web browser speed becomes slower 2. The files are modified or deleted 3. The CPU usage increases 4. There is a problem when connecting to a network 5. It is freezing or crashing 6. The running programs turn off themselves 7. The computer behavior becomes strange 8. The e-mails and messages are being sent automatically without the user’s knowledge 9. Strange files, programs, or desktop icons appear. Home Recent Tabs LESSON You can type something here… MALWARE SYMPTOMS
  • 16. SLIDESMANIA.COM SLIDESMANIA.COM 1. An anti-malware and firewall software must be installed. Choose a software that offers tools for defecting, quarantining, and removing multiple types of malwares. Scan your computer regularly 2. The software and the operating system should be updated to the current vulnerability patches. These patches are used to patch bugs or other security flaws that could be exploited by attackers. 3. Be watchful when downloading files, programs, attachments, and other. Most often, a download that looks strange or come from an unfamiliar source contains a malware Home Recent Tabs LESSON You can type something here… RECOMMENDATIONS ON HOW TO PREVENT AND REMOVE MALWARE
  • 17. SLIDESMANIA.COM slidesmania.com Prepared By: Mr. Benandro A. Palor LESSON 2 Reference: Dynamic Series in Home Economics and Livelihood Education 4 by: Gee E. Velasquez and Cynthia Bulayo-Banzon THANK YOU !!!! Twitter Facebook Instagram SlidesMania