This document contains a lesson on safe and responsible use of information and communication technology. It discusses factors to consider when using computers and the internet like viruses, inappropriate content, identity theft. It also covers personal safety tips when working with computers like wearing protective shoes and avoiding eating near devices. Examples of common malware like viruses, worms, Trojan horses are provided along with symptoms of malware infections and recommendations for prevention and removal like using anti-malware software and updating operating systems.
2. SLIDESMANIA.COM
slidesmania.com
At the end of the lesson, you should be able to …
LEARNING OUTCOMES
You can type something here…
LESSON 2
Identify factors to
consider in using a
computer, the
internet, and an e-
mail
Provide examples
and advantages of
anti-malware or
anti-virus software
Value the
importance of
personal safety
while working with
a computer
3. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
4. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
5. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
6. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
7. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
8. SLIDESMANIA.COM
SLIDESMANIA.COM
FACTORS TO CONSIDER IN USING
A COMPUTER, THE INTERNET AND AN E-MAIL
Home Recent Tabs LESSON
You can type something here…
1. Viruses, Adware, and
Spyware – computer can get
a virus while using internet
which can damage the files
and memory of the computer
and even affect its funtions.
2. Exposure to inappropriate
contents – these are those
materials which are not meant
for the age and level of
maturity of users specially
children.
4. Identity theft or fraud –
The user must be aware that
identity can be stolen without
his/her knowledge. Some bad
people do this intentionally to
create crimes or unlawful
acts.
3. Harassment and
cyberbullying – A user must
be aware that not all people
online are trustworthy.
9. SLIDESMANIA.COM
SLIDESMANIA.COM
1. Always wear shoes or slippers with
nonconductive rubber soles. This will
reduce the chances of being shocked or
seriously injured in an electrical accident
2. Do not touch the metallic parts of the
components which are plugged into a
power source
3. Turn off the extension cord when
removing from a compute
4. Avoid eating and drinking near the
computer
5.Before using the computer, be sure that
you fully understand the computer
software
Home Recent Tabs LESSON
You can type something here…
6. Avoid trailing the wire of a computer
across or around the room, because people
might trip on it.
7. Avoid overloading electrical sockets
8. Use a work desk which is strong enough
to support computers and equipment
9. When installing software in your
computer such as antivirus and
antispyware, ask for assistance from a
knowledgeable elder
10. Before touching any hardware, make
sure that the electricity is off.
PERSONAL SAFETY WHILE WORKING WITH A COMPUTER
10. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs LESSON
You can type something here…
A shortened term for “malicious software” which is designed to damage or disable
computers and computer systems. These can steal, encrypt or delete sensitive data; alter core
computing functions; and monitor the user’s computer activity without any permission.
11. SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
The computer worms
spread over the computer
networks by exploiting the
computer system
vulnerabilities. They have
the ability to self-replicate
and spread independently.
Often, they are spread
through mass e-mails with
infected attachments to
users’ contacts
WORMS
This is a malware which is
capable of copying itself
and spreading to other
computers. They can steal
information, harm host
computers and networks,
steal money, render
advertisements, and do
other ways to cause
damages.
VIRUS
12. SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
It is also known as “Trojan”.
To trick the users to
download or install the
malware, it disguises itself
as a normal file or program
TROJAN
HORSE It is a flaw that produces
undesired outcomes which
are usually results of
human error usually exists
in the source code of
compilers of a program.
These can be prevented
with developer education,
code analysis tools, and
quality education
BUG
13. SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
It is a short form of
advertising-supported
software. It delivers
advertisements
automatically such as pop-
up ads on websites and
applications which offer
free versions
ADWARE
It holds the computer system
captive while demanding a
ransom. It encrypts the user’s
access to the computer by
encrypting files to the hard
drive or locking down the
system. Then, it will display a
display message forcing the
user to pay the malware
creator to remove restriction
as well as to regain access
RANSOMWARE
14. SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
This is designed to
remotely access or control
a computer wherein the
users or even the security
programs cannot detect. It
cannot be removed easily
because it keeps hiding
itself.
ROOTKIT
It functions by spying the
user’s activity without their
knowledge. It spreads by
exploiting software
vulnerabilities
SPYWARE
15. SLIDESMANIA.COM
SLIDESMANIA.COM
1. The computer or the web browser speed becomes slower
2. The files are modified or deleted
3. The CPU usage increases
4. There is a problem when connecting to a network
5. It is freezing or crashing
6. The running programs turn off themselves
7. The computer behavior becomes strange
8. The e-mails and messages are being sent automatically without the user’s knowledge
9. Strange files, programs, or desktop icons appear.
Home Recent Tabs LESSON
You can type something here…
MALWARE SYMPTOMS
16. SLIDESMANIA.COM
SLIDESMANIA.COM
1. An anti-malware and firewall software must be installed. Choose a software that
offers tools for defecting, quarantining, and removing multiple types of malwares.
Scan your computer regularly
2. The software and the operating system should be updated to the current
vulnerability patches. These patches are used to patch bugs or other security
flaws that could be exploited by attackers.
3. Be watchful when downloading files, programs, attachments, and other. Most
often, a download that looks strange or come from an unfamiliar source contains
a malware
Home Recent Tabs LESSON
You can type something here…
RECOMMENDATIONS ON HOW TO PREVENT
AND REMOVE MALWARE
17. SLIDESMANIA.COM
slidesmania.com
Prepared By: Mr. Benandro A. Palor
LESSON 2
Reference: Dynamic Series in Home Economics and Livelihood Education 4 by: Gee E. Velasquez and Cynthia Bulayo-Banzon
THANK YOU !!!!
Twitter Facebook Instagram SlidesMania