SlideShare a Scribd company logo
1 of 55
EMPOWERMENT TECHNOLOGIES
PATRONAGE OF MARY DEVELOPMENT SCHOOL
MELVIN MOSOLINI ARIAS │ LESSON TWO │ APPLIED SUBJECT
CONTENT COVERAGE
• Online Security
• Internet Threats
• Protecting Reputations
Online
• Copyright
• Contextualized online
search and research
skill
INTERNET SAFETY
Refers to the
online security or
safety of people
and their
information when
using internet.
NETIQUETTE
Combination of the
words network and
etiquette and is
defined as a set of
rules for acceptable
online behavior.
TEN RULES OF NETIQUETTE
Rule no. 1: Remember the human
Rule no. 2: Adhere to the same standards
online that you follow in real life.
Rule no. 3: Know where you are in
cyberspace.
Rule no. 4: Respect other
people’s time and bandwidth.
Rule no. 5: Make yourself look
good online.
TEN RULES OF NETIQUETTE
Rule no. 6: Share expert knowledge
Rule no. 7: Help keep flame wars under
control
Rule no. 8: Respect other people’s privacy.
Rule no. 9: Don’t abuse your power
Rule no. 10: Be forgiving of
other people’s mistake.
RULES OF NETIQUETTE
You need to
remember that
you are talking to
a real person
when you are
online.
RULE 1: Remember the Human
RULES OF NETIQUETTE
The internet
brings people
together who
would otherwise
never meet.
RULE 1: Remember the Human
RULES OF NETIQUETTE
Remember this
saying when
sending an email:
Would I say this
to the person’s
face.
RULE 1: Remember the Human
RULES OF NETIQUETTE
You need to
behave the
same way
online that you
do in real life.
RULE 2: Adhere to the same standards online that
you follow in real life.
RULES OF NETIQUETTE
You need to
remember that you
can get caught doing
things you should not
be doing online just
like you can in real
life.
RULE 2: Adhere to the same standards online that
you follow in real life.
RULES OF NETIQUETTE
You are still
talking to a real
person with
feelings even
though you can’t
see them.
RULE 2: Adhere to the same standards online that
you follow in real life.
RULES OF NETIQUETTE
Always take a
look around
when you enter a
new domain
when surfing the
web.
RULE 3: Know where you are in cyberspace.
RULES OF NETIQUETTE
Get a sense of
what the
discussion group
is about before
you join it.
RULE 3: Know where you are in cyberspace.
RULES OF NETIQUETTE
Remember people
have other things
to do besides read
your email. You are
not the center of
their world.
RULE 4: Respect other people’s time and
bandwidth.
RULES OF NETIQUETTE
Keep your post
and emails to
minimum by
saying what you
want to say.
RULE 4: Respect other people’s time and
bandwidth.
RULES OF NETIQUETTE
Remember
everyone won’t
answer your
questions.
RULE 4: Respect other people’s time and
bandwidth.
RULES OF NETIQUETTE
Be polite
and pleasant
to everyone.
RULE 5: Make yourself look good online.
RULES OF NETIQUETTE
Always check
your spelling
and grammar
before posting.
RULE 5: Make yourself look good online.
RULES OF NETIQUETTE
Know what you
are talking
about and make
sense saying it.
RULE 5: Make yourself look good online.
RULES OF NETIQUETTE
Ask
questions
online
RULE 6: Share expert knowledge.
RULES OF NETIQUETTE
Share what
you know
online.
RULE 6: Share expert knowledge.
RULES OF NETIQUETTE
Post the answers
to your questions
online because
someone may
have the same
question you do.
RULE 6: Share expert knowledge.
RULES OF NETIQUETTE
Netiquette
does not
forgive
flaming.
RULE 7: Help keep flame wars under control.
RULES OF NETIQUETTE
Netiquette does
however forbid
people who are
flaming to hurt
discussion groups
by putting the
group down.
RULE 7: Help keep flame wars under control.
RULES OF NETIQUETTE
Do not read
other people’s
mail without
their
permission.
RULE 8: Respect other people’s privacy.
RULES OF NETIQUETTE
Going through
other people’s
things could cost
you, your job or
you could even
go to jail.
RULE 8: Respect other people’s privacy.
RULES OF NETIQUETTE
Not respecting
other people’s
privacy is a bad
netiquette.
RULE 8: Respect other people’s privacy.
RULES OF NETIQUETTE
Do not take
advantage of other
people just because
you have more
knowledge or power
than them.
RULE 9: Don’t abuse your power.
RULES OF NETIQUETTE
Treat others as you
would want them to
treat you if the roles
were reversed.
RULE 9: Don’t abuse your power.
RULES OF NETIQUETTE
Do not point
out mistakes to
people online.
RULE 10: Be forgiving of other
people’s mistake.
RULES OF NETIQUETTE
Remember
that you were
once the new
kid on the
block.
RULE 10: Be forgiving of other
people’s mistake.
RULES OF NETIQUETTE
You still need to have
a good manners even
though you are online
and cannot see the
person face to face.
RULE 10: Be forgiving of other
people’s mistake.
INTERNET THREATS
 MALWARE
 SPAM
 PHISHING
INTERNET THREATS
 MALWARE
Stands for
Malicious
Software, any
program or file
that is harmful to
a computer user.
INTERNET THREATS
SPAM
Unwanted
email mostly
from
advertisers.
INTERNET THREATS
 PHISHING
Its goal is to
acquire sensitive
personal
information like
passwords and
credit card details.
KINDS OF MALWARE
 VIRUS
 WORM
 TROJAN
 SPYWARE
 KEYLOGGER
 ADWARE
MALWARE
 VIRUS
Program designed
to replicate itself
and transfer from
one computer to
another.
MALWARE
 WORM
A malicious program that transfers from one
computer to another by any types of means.
MALWARE
 TROJAN
A malicious program
that is disguised as a
useful program but
once downloaded or
installed , leaves your
PC unprotected and
allows hacker to get
you information.
MALWARE
 SPYWARE
Software that
ruins in the
background
without you
knowing it.
MALWARE
 KEYLOGGERS
Used to record
the keystroke
done by the
user.
MALWARE
 ADWARE
A program designed
to send you
advertisements,
mostly a pop-ups.
PROTECTING REPUTATIONS ONLINE
 INTELLECTUAL
PROPERTY
 COPYRIGHT
LAW
 COPYRIGHT
PAGE
PROTECTING REPUTATIONS ONLINE
 INTELLECTUAL
PROPERTY
Intellectual property is a
category of property that
includes intangible creations
of the human intellect.
Intellectual property
encompasses two types of
rights: industrial property
rights and copyright.
PROTECTING REPUTATIONS ONLINE
 COPYRIGHT
LAW
It is the legal
protection extended
to the owner of the
rights in an original
work.
PROTECTING REPUTATIONS ONLINE
 COPYRIGHT
PAGE
The copyright page is
where the publisher
places all the legal
notices and
information related
to a book.
TO AVOID COPYRIGHT INFRINGEMENT
UNDERSTAND
Copyright protect
literary works,
photographs
paintings, drawing,
films, music
choreography and
sculptures.
TO AVOID COPYRIGHT INFRINGEMENT
 BE RESPONSIBLE
Even if a material does not say
that it is copyrighted, it is not a
valid defense against copyright.
TO AVOID COPYRIGHT INFRINGEMENT
BE CREATIVE
Ask yourself whether
what you are making
is something that
came from you or
something made
from somebody else
creativity.
TO AVOID COPYRIGHT INFRINGEMENT
KNOW THE LAW
There are some
limitations to
copyright laws.
ONLINE RESEARCH
Have a question in mind- Focus on a
question you want answered.
Narrow it down- Search engines like
Google, Bing, or Yahoo use several filters to
determine the most appropriate result for
you.
Advanced Search- The best way to filter
information you get from search engines is
by using the advanced search.
ONLINE RESEARCH
Look for a credible sources- Some wikis,
filled with updated information, are not a
credible source. When using wikis, check out
the link of the cited texts.
Give credit- Give credit to the original author
of the page or information. To properly site a
reference, you may use the format below.
EMPOWERMENT TECHNOLOGIES
PATRONAGE OF MARY DEVELOPMENT SCHOOL
SCIENCE, TECHNOLOGY, ENGINEERING, AND MATHEMATICS (STEM)

More Related Content

What's hot

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Jesus Rances
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Jesus Rances
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT DevelopmentTeodoro Llanes II
 
Empowerment Technologies - Imaging and Design for the Online Environment
Empowerment Technologies - Imaging and Design for the Online EnvironmentEmpowerment Technologies - Imaging and Design for the Online Environment
Empowerment Technologies - Imaging and Design for the Online EnvironmentLany Lyn Magdaraog
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Jesus Rances
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesMark Jhon Oxillo
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Empowerment Technology Lesson 5
Empowerment Technology Lesson 5Empowerment Technology Lesson 5
Empowerment Technology Lesson 5alicelagajino
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 

What's hot (20)

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
Empowerment Technologies - Imaging and Design for the Online Environment
Empowerment Technologies - Imaging and Design for the Online EnvironmentEmpowerment Technologies - Imaging and Design for the Online Environment
Empowerment Technologies - Imaging and Design for the Online Environment
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
ETECH MELCS
ETECH MELCSETECH MELCS
ETECH MELCS
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
 
EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
Empowerment Technology Lesson 5
Empowerment Technology Lesson 5Empowerment Technology Lesson 5
Empowerment Technology Lesson 5
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 

Similar to EMPOWERMENT TECHNOLOGIES - LESSON 2

W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfCedLinc
 
Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-techTrexie9
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
Nettiquete
NettiqueteNettiquete
Nettiqueteosscar96
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetHendrixAntonniAmante
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassieJill Stassie
 
Netizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online CommunitiesNetizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online Communitiescarolynearagones
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by HalinaSelf-employed
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy NetiquetteJPAballe
 
RULES OF NETIQUETTE.pptx
RULES OF NETIQUETTE.pptxRULES OF NETIQUETTE.pptx
RULES OF NETIQUETTE.pptxMariefeMercado
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 

Similar to EMPOWERMENT TECHNOLOGIES - LESSON 2 (20)

W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-tech
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Netiquette
NetiquetteNetiquette
Netiquette
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Nettiquete
NettiqueteNettiquete
Nettiquete
 
Net project
Net projectNet project
Net project
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
Netiquette mine
Netiquette mineNetiquette mine
Netiquette mine
 
Netizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online CommunitiesNetizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online Communities
 
Lesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptxLesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptx
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 
RULES OF NETIQUETTE.pptx
RULES OF NETIQUETTE.pptxRULES OF NETIQUETTE.pptx
RULES OF NETIQUETTE.pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 

More from PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS)

More from PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS) (20)

ISLAM: RELIGION, PRACTICES, AND DOCTRINES
ISLAM: RELIGION, PRACTICES, AND DOCTRINES ISLAM: RELIGION, PRACTICES, AND DOCTRINES
ISLAM: RELIGION, PRACTICES, AND DOCTRINES
 
Christianity: Religion, Practices, and Doctrines
Christianity: Religion, Practices, and Doctrines Christianity: Religion, Practices, and Doctrines
Christianity: Religion, Practices, and Doctrines
 
DISASTER RISK MITIGATION - AP 10
DISASTER RISK MITIGATION - AP 10DISASTER RISK MITIGATION - AP 10
DISASTER RISK MITIGATION - AP 10
 
EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
PAG - AARAL NG KASAYSAYAN: HEOGRAPIYA AT PERYODISASYON
PAG - AARAL NG KASAYSAYAN: HEOGRAPIYA AT PERYODISASYONPAG - AARAL NG KASAYSAYAN: HEOGRAPIYA AT PERYODISASYON
PAG - AARAL NG KASAYSAYAN: HEOGRAPIYA AT PERYODISASYON
 
JUDAISM: CONCEPT AND INTRODUCTION
JUDAISM: CONCEPT AND INTRODUCTIONJUDAISM: CONCEPT AND INTRODUCTION
JUDAISM: CONCEPT AND INTRODUCTION
 
BELIEF SYSTEM: RELIGION AND SPIRITUALITY
BELIEF SYSTEM: RELIGION AND SPIRITUALITYBELIEF SYSTEM: RELIGION AND SPIRITUALITY
BELIEF SYSTEM: RELIGION AND SPIRITUALITY
 
JUDAISM - FORMATION, PRACTICES, RITUALS, AND BELIEFS
JUDAISM - FORMATION, PRACTICES, RITUALS, AND BELIEFSJUDAISM - FORMATION, PRACTICES, RITUALS, AND BELIEFS
JUDAISM - FORMATION, PRACTICES, RITUALS, AND BELIEFS
 
Sustainable Development in the Philippine Context
Sustainable Development in the Philippine ContextSustainable Development in the Philippine Context
Sustainable Development in the Philippine Context
 
SUSTAINABLE DEVELOPMENT
SUSTAINABLE DEVELOPMENTSUSTAINABLE DEVELOPMENT
SUSTAINABLE DEVELOPMENT
 
PAGTUGON SA CLIMATE CHANGE - AP 10
PAGTUGON SA CLIMATE CHANGE - AP 10PAGTUGON SA CLIMATE CHANGE - AP 10
PAGTUGON SA CLIMATE CHANGE - AP 10
 
Aralin 3 - Kagustuhan at Pangangailangan
Aralin 3 - Kagustuhan at PangangailanganAralin 3 - Kagustuhan at Pangangailangan
Aralin 3 - Kagustuhan at Pangangailangan
 
CLIMATE CHANGE - AP 10
CLIMATE CHANGE - AP 10CLIMATE CHANGE - AP 10
CLIMATE CHANGE - AP 10
 
Aralin 2 - Konsepto ng kakapusan
Aralin 2 - Konsepto ng kakapusanAralin 2 - Konsepto ng kakapusan
Aralin 2 - Konsepto ng kakapusan
 
Religion - Lesson 1: Concept of Religon and Belief System
Religion - Lesson 1: Concept of Religon and Belief SystemReligion - Lesson 1: Concept of Religon and Belief System
Religion - Lesson 1: Concept of Religon and Belief System
 
Ekonomiks - Aralin 1: Ang Kahulugan ng Ekonomiks
Ekonomiks - Aralin 1: Ang Kahulugan ng EkonomiksEkonomiks - Aralin 1: Ang Kahulugan ng Ekonomiks
Ekonomiks - Aralin 1: Ang Kahulugan ng Ekonomiks
 
Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
Lesson 2: Performance Preventive Maintenance
Lesson 2: Performance Preventive MaintenanceLesson 2: Performance Preventive Maintenance
Lesson 2: Performance Preventive Maintenance
 
Interaksyon ng Demand at Supply
Interaksyon ng Demand at SupplyInteraksyon ng Demand at Supply
Interaksyon ng Demand at Supply
 

Recently uploaded

Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Recently uploaded (20)

Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

EMPOWERMENT TECHNOLOGIES - LESSON 2

  • 1. EMPOWERMENT TECHNOLOGIES PATRONAGE OF MARY DEVELOPMENT SCHOOL MELVIN MOSOLINI ARIAS │ LESSON TWO │ APPLIED SUBJECT
  • 2. CONTENT COVERAGE • Online Security • Internet Threats • Protecting Reputations Online • Copyright • Contextualized online search and research skill
  • 3. INTERNET SAFETY Refers to the online security or safety of people and their information when using internet.
  • 4. NETIQUETTE Combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior.
  • 5. TEN RULES OF NETIQUETTE Rule no. 1: Remember the human Rule no. 2: Adhere to the same standards online that you follow in real life. Rule no. 3: Know where you are in cyberspace. Rule no. 4: Respect other people’s time and bandwidth. Rule no. 5: Make yourself look good online.
  • 6. TEN RULES OF NETIQUETTE Rule no. 6: Share expert knowledge Rule no. 7: Help keep flame wars under control Rule no. 8: Respect other people’s privacy. Rule no. 9: Don’t abuse your power Rule no. 10: Be forgiving of other people’s mistake.
  • 7. RULES OF NETIQUETTE You need to remember that you are talking to a real person when you are online. RULE 1: Remember the Human
  • 8. RULES OF NETIQUETTE The internet brings people together who would otherwise never meet. RULE 1: Remember the Human
  • 9. RULES OF NETIQUETTE Remember this saying when sending an email: Would I say this to the person’s face. RULE 1: Remember the Human
  • 10. RULES OF NETIQUETTE You need to behave the same way online that you do in real life. RULE 2: Adhere to the same standards online that you follow in real life.
  • 11. RULES OF NETIQUETTE You need to remember that you can get caught doing things you should not be doing online just like you can in real life. RULE 2: Adhere to the same standards online that you follow in real life.
  • 12. RULES OF NETIQUETTE You are still talking to a real person with feelings even though you can’t see them. RULE 2: Adhere to the same standards online that you follow in real life.
  • 13. RULES OF NETIQUETTE Always take a look around when you enter a new domain when surfing the web. RULE 3: Know where you are in cyberspace.
  • 14. RULES OF NETIQUETTE Get a sense of what the discussion group is about before you join it. RULE 3: Know where you are in cyberspace.
  • 15. RULES OF NETIQUETTE Remember people have other things to do besides read your email. You are not the center of their world. RULE 4: Respect other people’s time and bandwidth.
  • 16. RULES OF NETIQUETTE Keep your post and emails to minimum by saying what you want to say. RULE 4: Respect other people’s time and bandwidth.
  • 17. RULES OF NETIQUETTE Remember everyone won’t answer your questions. RULE 4: Respect other people’s time and bandwidth.
  • 18. RULES OF NETIQUETTE Be polite and pleasant to everyone. RULE 5: Make yourself look good online.
  • 19. RULES OF NETIQUETTE Always check your spelling and grammar before posting. RULE 5: Make yourself look good online.
  • 20. RULES OF NETIQUETTE Know what you are talking about and make sense saying it. RULE 5: Make yourself look good online.
  • 21. RULES OF NETIQUETTE Ask questions online RULE 6: Share expert knowledge.
  • 22. RULES OF NETIQUETTE Share what you know online. RULE 6: Share expert knowledge.
  • 23. RULES OF NETIQUETTE Post the answers to your questions online because someone may have the same question you do. RULE 6: Share expert knowledge.
  • 24. RULES OF NETIQUETTE Netiquette does not forgive flaming. RULE 7: Help keep flame wars under control.
  • 25. RULES OF NETIQUETTE Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down. RULE 7: Help keep flame wars under control.
  • 26. RULES OF NETIQUETTE Do not read other people’s mail without their permission. RULE 8: Respect other people’s privacy.
  • 27. RULES OF NETIQUETTE Going through other people’s things could cost you, your job or you could even go to jail. RULE 8: Respect other people’s privacy.
  • 28. RULES OF NETIQUETTE Not respecting other people’s privacy is a bad netiquette. RULE 8: Respect other people’s privacy.
  • 29. RULES OF NETIQUETTE Do not take advantage of other people just because you have more knowledge or power than them. RULE 9: Don’t abuse your power.
  • 30. RULES OF NETIQUETTE Treat others as you would want them to treat you if the roles were reversed. RULE 9: Don’t abuse your power.
  • 31. RULES OF NETIQUETTE Do not point out mistakes to people online. RULE 10: Be forgiving of other people’s mistake.
  • 32. RULES OF NETIQUETTE Remember that you were once the new kid on the block. RULE 10: Be forgiving of other people’s mistake.
  • 33. RULES OF NETIQUETTE You still need to have a good manners even though you are online and cannot see the person face to face. RULE 10: Be forgiving of other people’s mistake.
  • 34. INTERNET THREATS  MALWARE  SPAM  PHISHING
  • 35. INTERNET THREATS  MALWARE Stands for Malicious Software, any program or file that is harmful to a computer user.
  • 37. INTERNET THREATS  PHISHING Its goal is to acquire sensitive personal information like passwords and credit card details.
  • 38. KINDS OF MALWARE  VIRUS  WORM  TROJAN  SPYWARE  KEYLOGGER  ADWARE
  • 39. MALWARE  VIRUS Program designed to replicate itself and transfer from one computer to another.
  • 40. MALWARE  WORM A malicious program that transfers from one computer to another by any types of means.
  • 41. MALWARE  TROJAN A malicious program that is disguised as a useful program but once downloaded or installed , leaves your PC unprotected and allows hacker to get you information.
  • 42. MALWARE  SPYWARE Software that ruins in the background without you knowing it.
  • 43. MALWARE  KEYLOGGERS Used to record the keystroke done by the user.
  • 44. MALWARE  ADWARE A program designed to send you advertisements, mostly a pop-ups.
  • 45. PROTECTING REPUTATIONS ONLINE  INTELLECTUAL PROPERTY  COPYRIGHT LAW  COPYRIGHT PAGE
  • 46. PROTECTING REPUTATIONS ONLINE  INTELLECTUAL PROPERTY Intellectual property is a category of property that includes intangible creations of the human intellect. Intellectual property encompasses two types of rights: industrial property rights and copyright.
  • 47. PROTECTING REPUTATIONS ONLINE  COPYRIGHT LAW It is the legal protection extended to the owner of the rights in an original work.
  • 48. PROTECTING REPUTATIONS ONLINE  COPYRIGHT PAGE The copyright page is where the publisher places all the legal notices and information related to a book.
  • 49. TO AVOID COPYRIGHT INFRINGEMENT UNDERSTAND Copyright protect literary works, photographs paintings, drawing, films, music choreography and sculptures.
  • 50. TO AVOID COPYRIGHT INFRINGEMENT  BE RESPONSIBLE Even if a material does not say that it is copyrighted, it is not a valid defense against copyright.
  • 51. TO AVOID COPYRIGHT INFRINGEMENT BE CREATIVE Ask yourself whether what you are making is something that came from you or something made from somebody else creativity.
  • 52. TO AVOID COPYRIGHT INFRINGEMENT KNOW THE LAW There are some limitations to copyright laws.
  • 53. ONLINE RESEARCH Have a question in mind- Focus on a question you want answered. Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for you. Advanced Search- The best way to filter information you get from search engines is by using the advanced search.
  • 54. ONLINE RESEARCH Look for a credible sources- Some wikis, filled with updated information, are not a credible source. When using wikis, check out the link of the cited texts. Give credit- Give credit to the original author of the page or information. To properly site a reference, you may use the format below.
  • 55. EMPOWERMENT TECHNOLOGIES PATRONAGE OF MARY DEVELOPMENT SCHOOL SCIENCE, TECHNOLOGY, ENGINEERING, AND MATHEMATICS (STEM)