SlideShare a Scribd company logo
1 of 6
Maintaining Internet Safety
Unit 1 – Lesson 1
At the end of the lesson, we should be
able to:
• Discuss possible threats to safety when
surfing the Internet
• Identify possible ways of avoiding such
threats online
Lets start with –
“Common Online Threats”
• Phishing – this is a threat that tricks the user
into giving his or her information like username
or password.
• Malware – threat that download viruses, Trojan
horses, spyware and other harmful software
into our computers
• Cyberbullying – usually happen in social sites in
groups, chats or discussion board who would
want to say mean and hurtful things
How can we avoid those threats from
Internet?
• These are some practical ways to avoid;
– Think before we click.
– Leave unknown sites
– Do not post personal information
– Only be friends with the people we know
– Be careful with the people that we meet
online
– Do not talk back to cyberbullies
– Have the latest anti-virus software
installed.
Lets test Ourselves
• Lets complete the statements.
Choices:
Cyberbullying Malware Password Antivirus Phishing Think
1. The first rule in protecting yourself online is to _____ before you
click.
2. _____ is when user say mean and hurtful things about a person
online.
3. To protect your computer from any threat , you must install an
___ software.
4. ____ is a threat that tricks you into giving out your personal
information.
5. When your computer is infected with a virus or a Trojan horse,
you have encountered _____.
Com 6 u1 L1 Maintaining internet safety

More Related Content

What's hot

What's hot (20)

L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Razif Ben Syena 7a Creation
Razif Ben Syena 7a CreationRazif Ben Syena 7a Creation
Razif Ben Syena 7a Creation
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Internet security
Internet securityInternet security
Internet security
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussam
 
E security
E securityE security
E security
 

Similar to Com 6 u1 L1 Maintaining internet safety

Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)FRANCISANGELOBANTAT
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Oe keeping your computer safe rev3
Oe keeping your computer safe rev3Oe keeping your computer safe rev3
Oe keeping your computer safe rev3oeproducer
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 

Similar to Com 6 u1 L1 Maintaining internet safety (20)

Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Oe keeping your computer safe rev3
Oe keeping your computer safe rev3Oe keeping your computer safe rev3
Oe keeping your computer safe rev3
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
IT Security
IT SecurityIT Security
IT Security
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 

More from Jason Ruelo

Com6 l7 creating online survey forms
Com6 l7 creating online survey formsCom6 l7 creating online survey forms
Com6 l7 creating online survey formsJason Ruelo
 
Working with shape
Working with shapeWorking with shape
Working with shapeJason Ruelo
 
Com6 recalling ms word
Com6 recalling ms wordCom6 recalling ms word
Com6 recalling ms wordJason Ruelo
 
Com6 l8 joining_egroups
Com6 l8 joining_egroupsCom6 l8 joining_egroups
Com6 l8 joining_egroupsJason Ruelo
 
Kabanata 1 entrep lesson 2
Kabanata 1 entrep lesson 2Kabanata 1 entrep lesson 2
Kabanata 1 entrep lesson 2Jason Ruelo
 
Kabanata 1 entrep lesson 1
Kabanata 1 entrep lesson 1Kabanata 1 entrep lesson 1
Kabanata 1 entrep lesson 1Jason Ruelo
 
Aralin 3 mga negosyong maaring pagkakakitaan sa tahanan at pamayanan
Aralin 3   mga negosyong maaring pagkakakitaan sa tahanan at pamayananAralin 3   mga negosyong maaring pagkakakitaan sa tahanan at pamayanan
Aralin 3 mga negosyong maaring pagkakakitaan sa tahanan at pamayananJason Ruelo
 
Com 6 u1 l4 creating blogs
Com 6 u1 l4 creating blogsCom 6 u1 l4 creating blogs
Com 6 u1 l4 creating blogsJason Ruelo
 
Com6 l6 using-onlinetools
Com6 l6 using-onlinetoolsCom6 l6 using-onlinetools
Com6 l6 using-onlinetoolsJason Ruelo
 
Com6 l5 starting_audio&video
Com6 l5 starting_audio&videoCom6 l5 starting_audio&video
Com6 l5 starting_audio&videoJason Ruelo
 
Com 6 u1 L3 engaging wikis
Com 6 u1 L3 engaging wikisCom 6 u1 L3 engaging wikis
Com 6 u1 L3 engaging wikisJason Ruelo
 
Com 6 u1 L2 Observing netiquette
Com 6 u1 L2  Observing netiquetteCom 6 u1 L2  Observing netiquette
Com 6 u1 L2 Observing netiquetteJason Ruelo
 
Music unit1 lesson1
Music unit1 lesson1Music unit1 lesson1
Music unit1 lesson1Jason Ruelo
 
Health unit1 lesson1
Health unit1 lesson1Health unit1 lesson1
Health unit1 lesson1Jason Ruelo
 
Art unit1 lesson1
Art unit1 lesson1Art unit1 lesson1
Art unit1 lesson1Jason Ruelo
 

More from Jason Ruelo (15)

Com6 l7 creating online survey forms
Com6 l7 creating online survey formsCom6 l7 creating online survey forms
Com6 l7 creating online survey forms
 
Working with shape
Working with shapeWorking with shape
Working with shape
 
Com6 recalling ms word
Com6 recalling ms wordCom6 recalling ms word
Com6 recalling ms word
 
Com6 l8 joining_egroups
Com6 l8 joining_egroupsCom6 l8 joining_egroups
Com6 l8 joining_egroups
 
Kabanata 1 entrep lesson 2
Kabanata 1 entrep lesson 2Kabanata 1 entrep lesson 2
Kabanata 1 entrep lesson 2
 
Kabanata 1 entrep lesson 1
Kabanata 1 entrep lesson 1Kabanata 1 entrep lesson 1
Kabanata 1 entrep lesson 1
 
Aralin 3 mga negosyong maaring pagkakakitaan sa tahanan at pamayanan
Aralin 3   mga negosyong maaring pagkakakitaan sa tahanan at pamayananAralin 3   mga negosyong maaring pagkakakitaan sa tahanan at pamayanan
Aralin 3 mga negosyong maaring pagkakakitaan sa tahanan at pamayanan
 
Com 6 u1 l4 creating blogs
Com 6 u1 l4 creating blogsCom 6 u1 l4 creating blogs
Com 6 u1 l4 creating blogs
 
Com6 l6 using-onlinetools
Com6 l6 using-onlinetoolsCom6 l6 using-onlinetools
Com6 l6 using-onlinetools
 
Com6 l5 starting_audio&video
Com6 l5 starting_audio&videoCom6 l5 starting_audio&video
Com6 l5 starting_audio&video
 
Com 6 u1 L3 engaging wikis
Com 6 u1 L3 engaging wikisCom 6 u1 L3 engaging wikis
Com 6 u1 L3 engaging wikis
 
Com 6 u1 L2 Observing netiquette
Com 6 u1 L2  Observing netiquetteCom 6 u1 L2  Observing netiquette
Com 6 u1 L2 Observing netiquette
 
Music unit1 lesson1
Music unit1 lesson1Music unit1 lesson1
Music unit1 lesson1
 
Health unit1 lesson1
Health unit1 lesson1Health unit1 lesson1
Health unit1 lesson1
 
Art unit1 lesson1
Art unit1 lesson1Art unit1 lesson1
Art unit1 lesson1
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Com 6 u1 L1 Maintaining internet safety

  • 2. At the end of the lesson, we should be able to: • Discuss possible threats to safety when surfing the Internet • Identify possible ways of avoiding such threats online
  • 3. Lets start with – “Common Online Threats” • Phishing – this is a threat that tricks the user into giving his or her information like username or password. • Malware – threat that download viruses, Trojan horses, spyware and other harmful software into our computers • Cyberbullying – usually happen in social sites in groups, chats or discussion board who would want to say mean and hurtful things
  • 4. How can we avoid those threats from Internet? • These are some practical ways to avoid; – Think before we click. – Leave unknown sites – Do not post personal information – Only be friends with the people we know – Be careful with the people that we meet online – Do not talk back to cyberbullies – Have the latest anti-virus software installed.
  • 5. Lets test Ourselves • Lets complete the statements. Choices: Cyberbullying Malware Password Antivirus Phishing Think 1. The first rule in protecting yourself online is to _____ before you click. 2. _____ is when user say mean and hurtful things about a person online. 3. To protect your computer from any threat , you must install an ___ software. 4. ____ is a threat that tricks you into giving out your personal information. 5. When your computer is infected with a virus or a Trojan horse, you have encountered _____.