SlideShare a Scribd company logo
Self-Check on Online Habits
Online Habits Yes No
I share my password to my friends.
I post my rant/s on my social media.
I talk to strangers on social media.
I visit unsecured websites.
I post about my family’s future vacation.
I post image or video without asking permission from
the owner.
Online Safety, Security, Ethics
and Etiquette
Objectives:
1. identify different online risks and threats;
2. value the importance of online safety, security, ethics and
etiquette; and
3. apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would relate
to their specific professional tracks.
(CS_ICT11/12-ICTPT-Ia-b2)
What is the
biggest
threat
online?
Practical
Tips for
Social Media
1) You are not obliged to
share all your info
Data Privacy Act of 2012
(Republic Act No. 10173) -
protects individuals from
unauthorized processing of
personal information that is
(1) private, not publicly
available; and (2)
identifiable, where the
identity of the individual is
apparent either through
direct attribution or when
put together with other
available information.
2. Do not over-share!
•Life story or daily routine
•Names of children or
relatives or pets
•Photos of your
house/room
•Financials
Identity Theft
– a crime of stealing personal
information for the purpose of
assuming that person’s name
or identity to make any form
of transactions.
Cyber Stalking
– a criminal practice where
electronic communication is
used to stalk or harass
individual or group.
3. Talk only to your intended audience
When Sharing
IDs
1. Ask recipient
what is
needed
2. Block out
unnecessary
info
Share only what is needed
4) Review,
Review, Review
5) Chat only with Verified Accounts
6) Check with your
”Friends”
Cyberbullying
– bullying that takes place over
digital devices like cellphones,
computers, and tablets.
Anti-Bullying Act of 2013
– an act requiring all elementary
and secondary schools to adopt
policies to prevent and address
the acts of bullying in their
institutions including
cyberbullying.
7) Know what
you’re reading or
sharing
8) Careful with
Quizzes
Internet Threats
1. Malware – stands for malicious
software. A software that is
specifically designed to disrupt,
damage, or gain unauthorized
access to a computer system.
2. Spam – unwanted email mostly
from bots or advertisers. It can be
used to send malware.
3. Phishing – its goal is to acquire
sensitive personal information like
passwords and credit card details.
9) Logout
•Email
•Old SocMed Accounts
•Delete unused apps
10) Deactivate Old Accounts
Cyber Crime Prevention
Act of 2012
• officially recorded as Republic Act
No. 10175 is a law in Philippines
approved on September 12, 2012
• It aims to address legal issues
concerning online interactions and
the internet in the Philippines.
• Among the cybercrime offenses
included in the bill are
cybersquatting, cybersex, child
pornography, identity theft, illegal
access to data and libel.
Stay safe online!
Facebook.com/smartcommunities
Twitter.com/smartnewsroom
Activity 1: Answer the following:
(Max. of 3 sentences)
1. How do you keep yourself safe and secure online?
__________________________________________________________________
___________________________________________________________________
_________________________________________________________________
2. Explain the verse below relating to the use of social media:
“A good reputation and respect are worth much more than
silver and gold.” ~ Proverbs 22:1
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
Activity 2:
Poster Making
Directions:
Make an e-poster with a
theme “think before you
click”. You may use any
online or offline application
in designing. If not
available, use a 1 whole
sheet of short bond paper
and coloring materials.
Criteria 5 4 3
Originality There are no
similar elements
on the poster.
There are 1 or 2
similar
elements on
the poster.
There are many
similar
elements on
the poster.
Graphics
Relevance
All graphics are
related to the
theme and
makes it easier
to understand.
Some graphics
are related to
the theme.
Many graphics
are not related
to the topic.
Attractiveness The poster is
exceptionally
attractive, neat,
and clean.
The poster is
acceptably
attractive, but
it has few
erasures.
The poster is
not attractive
and has many
erasures.

More Related Content

Similar to 4. ONLINE SAFETY.pptx

15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx
ReminPasion1
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
Leah Condina
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
AnecitaLCalamohoy
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
AnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
AnecitaLCalamohoy
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
ReinIgnacioUrolaza
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
JoelGautham
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
cyb1337
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 

Similar to 4. ONLINE SAFETY.pptx (20)

15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

4. ONLINE SAFETY.pptx

  • 1. Self-Check on Online Habits Online Habits Yes No I share my password to my friends. I post my rant/s on my social media. I talk to strangers on social media. I visit unsecured websites. I post about my family’s future vacation. I post image or video without asking permission from the owner.
  • 2. Online Safety, Security, Ethics and Etiquette
  • 3. Objectives: 1. identify different online risks and threats; 2. value the importance of online safety, security, ethics and etiquette; and 3. apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks. (CS_ICT11/12-ICTPT-Ia-b2)
  • 5.
  • 7. 1) You are not obliged to share all your info Data Privacy Act of 2012 (Republic Act No. 10173) - protects individuals from unauthorized processing of personal information that is (1) private, not publicly available; and (2) identifiable, where the identity of the individual is apparent either through direct attribution or when put together with other available information.
  • 8. 2. Do not over-share! •Life story or daily routine •Names of children or relatives or pets •Photos of your house/room •Financials
  • 9. Identity Theft – a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions. Cyber Stalking – a criminal practice where electronic communication is used to stalk or harass individual or group.
  • 10. 3. Talk only to your intended audience
  • 11. When Sharing IDs 1. Ask recipient what is needed 2. Block out unnecessary info Share only what is needed
  • 12.
  • 14.
  • 15. 5) Chat only with Verified Accounts
  • 16.
  • 17. 6) Check with your ”Friends”
  • 18. Cyberbullying – bullying that takes place over digital devices like cellphones, computers, and tablets. Anti-Bullying Act of 2013 – an act requiring all elementary and secondary schools to adopt policies to prevent and address the acts of bullying in their institutions including cyberbullying.
  • 19. 7) Know what you’re reading or sharing
  • 20.
  • 22.
  • 23. Internet Threats 1. Malware – stands for malicious software. A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. 2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing – its goal is to acquire sensitive personal information like passwords and credit card details.
  • 25. •Email •Old SocMed Accounts •Delete unused apps 10) Deactivate Old Accounts
  • 26. Cyber Crime Prevention Act of 2012 • officially recorded as Republic Act No. 10175 is a law in Philippines approved on September 12, 2012 • It aims to address legal issues concerning online interactions and the internet in the Philippines. • Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.
  • 28. Activity 1: Answer the following: (Max. of 3 sentences) 1. How do you keep yourself safe and secure online? __________________________________________________________________ ___________________________________________________________________ _________________________________________________________________ 2. Explain the verse below relating to the use of social media: “A good reputation and respect are worth much more than silver and gold.” ~ Proverbs 22:1 __________________________________________________________________ __________________________________________________________________ __________________________________________________________________
  • 29. Activity 2: Poster Making Directions: Make an e-poster with a theme “think before you click”. You may use any online or offline application in designing. If not available, use a 1 whole sheet of short bond paper and coloring materials. Criteria 5 4 3 Originality There are no similar elements on the poster. There are 1 or 2 similar elements on the poster. There are many similar elements on the poster. Graphics Relevance All graphics are related to the theme and makes it easier to understand. Some graphics are related to the theme. Many graphics are not related to the topic. Attractiveness The poster is exceptionally attractive, neat, and clean. The poster is acceptably attractive, but it has few erasures. The poster is not attractive and has many erasures.