SlideShare a Scribd company logo
SLIDESMANIA.COM
slidesmania.com
Prepared By: Mr. Benandro A. Palor
LESSON 2
You can type something here…
Safe and Responsible
Use of ICT
Twitter Facebook Instagram SlidesMania
SLIDESMANIA.COM
slidesmania.com
At the end of the lesson, you should be able to …
LEARNING OUTCOMES
You can type something here…
LESSON 2
Identify factors to
consider in using a
computer, the
internet, and an e-
mail
Provide examples
and advantages of
anti-malware or
anti-virus software
Value the
importance of
personal safety
while working with
a computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
SLIDESMANIA.COM
SLIDESMANIA.COM
FACTORS TO CONSIDER IN USING
A COMPUTER, THE INTERNET AND AN E-MAIL
Home Recent Tabs LESSON
You can type something here…
1. Viruses, Adware, and
Spyware – computer can get
a virus while using internet
which can damage the files
and memory of the computer
and even affect its funtions.
2. Exposure to inappropriate
contents – these are those
materials which are not meant
for the age and level of
maturity of users specially
children.
4. Identity theft or fraud –
The user must be aware that
identity can be stolen without
his/her knowledge. Some bad
people do this intentionally to
create crimes or unlawful
acts.
3. Harassment and
cyberbullying – A user must
be aware that not all people
online are trustworthy.
SLIDESMANIA.COM
SLIDESMANIA.COM
1. Always wear shoes or slippers with
nonconductive rubber soles. This will
reduce the chances of being shocked or
seriously injured in an electrical accident
2. Do not touch the metallic parts of the
components which are plugged into a
power source
3. Turn off the extension cord when
removing from a compute
4. Avoid eating and drinking near the
computer
5.Before using the computer, be sure that
you fully understand the computer
software
Home Recent Tabs LESSON
You can type something here…
6. Avoid trailing the wire of a computer
across or around the room, because people
might trip on it.
7. Avoid overloading electrical sockets
8. Use a work desk which is strong enough
to support computers and equipment
9. When installing software in your
computer such as antivirus and
antispyware, ask for assistance from a
knowledgeable elder
10. Before touching any hardware, make
sure that the electricity is off.
PERSONAL SAFETY WHILE WORKING WITH A COMPUTER
SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs LESSON
You can type something here…
A shortened term for “malicious software” which is designed to damage or disable
computers and computer systems. These can steal, encrypt or delete sensitive data; alter core
computing functions; and monitor the user’s computer activity without any permission.
SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
The computer worms
spread over the computer
networks by exploiting the
computer system
vulnerabilities. They have
the ability to self-replicate
and spread independently.
Often, they are spread
through mass e-mails with
infected attachments to
users’ contacts
WORMS
This is a malware which is
capable of copying itself
and spreading to other
computers. They can steal
information, harm host
computers and networks,
steal money, render
advertisements, and do
other ways to cause
damages.
VIRUS
SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
It is also known as “Trojan”.
To trick the users to
download or install the
malware, it disguises itself
as a normal file or program
TROJAN
HORSE It is a flaw that produces
undesired outcomes which
are usually results of
human error usually exists
in the source code of
compilers of a program.
These can be prevented
with developer education,
code analysis tools, and
quality education
BUG
SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
It is a short form of
advertising-supported
software. It delivers
advertisements
automatically such as pop-
up ads on websites and
applications which offer
free versions
ADWARE
It holds the computer system
captive while demanding a
ransom. It encrypts the user’s
access to the computer by
encrypting files to the hard
drive or locking down the
system. Then, it will display a
display message forcing the
user to pay the malware
creator to remove restriction
as well as to regain access
RANSOMWARE
SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
This is designed to
remotely access or control
a computer wherein the
users or even the security
programs cannot detect. It
cannot be removed easily
because it keeps hiding
itself.
ROOTKIT
It functions by spying the
user’s activity without their
knowledge. It spreads by
exploiting software
vulnerabilities
SPYWARE
SLIDESMANIA.COM
SLIDESMANIA.COM
1. The computer or the web browser speed becomes slower
2. The files are modified or deleted
3. The CPU usage increases
4. There is a problem when connecting to a network
5. It is freezing or crashing
6. The running programs turn off themselves
7. The computer behavior becomes strange
8. The e-mails and messages are being sent automatically without the user’s knowledge
9. Strange files, programs, or desktop icons appear.
Home Recent Tabs LESSON
You can type something here…
MALWARE SYMPTOMS
SLIDESMANIA.COM
SLIDESMANIA.COM
1. An anti-malware and firewall software must be installed. Choose a software that
offers tools for defecting, quarantining, and removing multiple types of malwares.
Scan your computer regularly
2. The software and the operating system should be updated to the current
vulnerability patches. These patches are used to patch bugs or other security
flaws that could be exploited by attackers.
3. Be watchful when downloading files, programs, attachments, and other. Most
often, a download that looks strange or come from an unfamiliar source contains
a malware
Home Recent Tabs LESSON
You can type something here…
RECOMMENDATIONS ON HOW TO PREVENT
AND REMOVE MALWARE
SLIDESMANIA.COM
slidesmania.com
Prepared By: Mr. Benandro A. Palor
LESSON 2
Reference: Dynamic Series in Home Economics and Livelihood Education 4 by: Gee E. Velasquez and Cynthia Bulayo-Banzon
THANK YOU !!!!
Twitter Facebook Instagram SlidesMania

More Related Content

Similar to lesson2-safeandresponsibleuseofict-210806120854.pdf

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
Joemer Mabagos
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
Acageron
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
rairuta
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
Jonathan Bacon
 
Empowerment
EmpowermentEmpowerment
Empowerment
rairuta
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
SheryldeVilla2
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
Khalil Jubran
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 

Similar to lesson2-safeandresponsibleuseofict-210806120854.pdf (20)

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Internet security
Internet securityInternet security
Internet security
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 

More from Debbie Rizza Daroy

tipo-ng-klima-sa-pilipinas-211014054715.pdf
tipo-ng-klima-sa-pilipinas-211014054715.pdftipo-ng-klima-sa-pilipinas-211014054715.pdf
tipo-ng-klima-sa-pilipinas-211014054715.pdf
Debbie Rizza Daroy
 
physicalfitnesstestlecture-141117053550-conversion-gate01.pdf
physicalfitnesstestlecture-141117053550-conversion-gate01.pdfphysicalfitnesstestlecture-141117053550-conversion-gate01.pdf
physicalfitnesstestlecture-141117053550-conversion-gate01.pdf
Debbie Rizza Daroy
 
klimaatpanahonsapilipinas-160724122557.pdf
klimaatpanahonsapilipinas-160724122557.pdfklimaatpanahonsapilipinas-160724122557.pdf
klimaatpanahonsapilipinas-160724122557.pdf
Debbie Rizza Daroy
 
drawingtheartoffilipinoculturalcommunities-210118035733.pdf
drawingtheartoffilipinoculturalcommunities-210118035733.pdfdrawingtheartoffilipinoculturalcommunities-210118035733.pdf
drawingtheartoffilipinoculturalcommunities-210118035733.pdf
Debbie Rizza Daroy
 
visualizatingnumbersthrough100000-170127214120.pdf
visualizatingnumbersthrough100000-170127214120.pdfvisualizatingnumbersthrough100000-170127214120.pdf
visualizatingnumbersthrough100000-170127214120.pdf
Debbie Rizza Daroy
 
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdfaralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
Debbie Rizza Daroy
 
conditioning-180909105836.pdf
conditioning-180909105836.pdfconditioning-180909105836.pdf
conditioning-180909105836.pdf
Debbie Rizza Daroy
 

More from Debbie Rizza Daroy (7)

tipo-ng-klima-sa-pilipinas-211014054715.pdf
tipo-ng-klima-sa-pilipinas-211014054715.pdftipo-ng-klima-sa-pilipinas-211014054715.pdf
tipo-ng-klima-sa-pilipinas-211014054715.pdf
 
physicalfitnesstestlecture-141117053550-conversion-gate01.pdf
physicalfitnesstestlecture-141117053550-conversion-gate01.pdfphysicalfitnesstestlecture-141117053550-conversion-gate01.pdf
physicalfitnesstestlecture-141117053550-conversion-gate01.pdf
 
klimaatpanahonsapilipinas-160724122557.pdf
klimaatpanahonsapilipinas-160724122557.pdfklimaatpanahonsapilipinas-160724122557.pdf
klimaatpanahonsapilipinas-160724122557.pdf
 
drawingtheartoffilipinoculturalcommunities-210118035733.pdf
drawingtheartoffilipinoculturalcommunities-210118035733.pdfdrawingtheartoffilipinoculturalcommunities-210118035733.pdf
drawingtheartoffilipinoculturalcommunities-210118035733.pdf
 
visualizatingnumbersthrough100000-170127214120.pdf
visualizatingnumbersthrough100000-170127214120.pdfvisualizatingnumbersthrough100000-170127214120.pdf
visualizatingnumbersthrough100000-170127214120.pdf
 
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdfaralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
aralin5-anghanggananatlawakngteritoryongpilipinas-150625041804-lva1-app6892.pdf
 
conditioning-180909105836.pdf
conditioning-180909105836.pdfconditioning-180909105836.pdf
conditioning-180909105836.pdf
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

lesson2-safeandresponsibleuseofict-210806120854.pdf

  • 1. SLIDESMANIA.COM slidesmania.com Prepared By: Mr. Benandro A. Palor LESSON 2 You can type something here… Safe and Responsible Use of ICT Twitter Facebook Instagram SlidesMania
  • 2. SLIDESMANIA.COM slidesmania.com At the end of the lesson, you should be able to … LEARNING OUTCOMES You can type something here… LESSON 2 Identify factors to consider in using a computer, the internet, and an e- mail Provide examples and advantages of anti-malware or anti-virus software Value the importance of personal safety while working with a computer
  • 3. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 4. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 5. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 6. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 7. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs ACTIVITY You can type something here… Type “YES” if you should do this and “NO” if you should not do this to computer or at the front of computer
  • 8. SLIDESMANIA.COM SLIDESMANIA.COM FACTORS TO CONSIDER IN USING A COMPUTER, THE INTERNET AND AN E-MAIL Home Recent Tabs LESSON You can type something here… 1. Viruses, Adware, and Spyware – computer can get a virus while using internet which can damage the files and memory of the computer and even affect its funtions. 2. Exposure to inappropriate contents – these are those materials which are not meant for the age and level of maturity of users specially children. 4. Identity theft or fraud – The user must be aware that identity can be stolen without his/her knowledge. Some bad people do this intentionally to create crimes or unlawful acts. 3. Harassment and cyberbullying – A user must be aware that not all people online are trustworthy.
  • 9. SLIDESMANIA.COM SLIDESMANIA.COM 1. Always wear shoes or slippers with nonconductive rubber soles. This will reduce the chances of being shocked or seriously injured in an electrical accident 2. Do not touch the metallic parts of the components which are plugged into a power source 3. Turn off the extension cord when removing from a compute 4. Avoid eating and drinking near the computer 5.Before using the computer, be sure that you fully understand the computer software Home Recent Tabs LESSON You can type something here… 6. Avoid trailing the wire of a computer across or around the room, because people might trip on it. 7. Avoid overloading electrical sockets 8. Use a work desk which is strong enough to support computers and equipment 9. When installing software in your computer such as antivirus and antispyware, ask for assistance from a knowledgeable elder 10. Before touching any hardware, make sure that the electricity is off. PERSONAL SAFETY WHILE WORKING WITH A COMPUTER
  • 10. SLIDESMANIA.COM SLIDESMANIA.COM Home Recent Tabs LESSON You can type something here… A shortened term for “malicious software” which is designed to damage or disable computers and computer systems. These can steal, encrypt or delete sensitive data; alter core computing functions; and monitor the user’s computer activity without any permission.
  • 11. SLIDESMANIA.COM SLIDESMANIA.COM COMMON TYPES OF MALWARE Home Recent Tabs LESSON You can type something here… The computer worms spread over the computer networks by exploiting the computer system vulnerabilities. They have the ability to self-replicate and spread independently. Often, they are spread through mass e-mails with infected attachments to users’ contacts WORMS This is a malware which is capable of copying itself and spreading to other computers. They can steal information, harm host computers and networks, steal money, render advertisements, and do other ways to cause damages. VIRUS
  • 12. SLIDESMANIA.COM SLIDESMANIA.COM COMMON TYPES OF MALWARE Home Recent Tabs LESSON You can type something here… It is also known as “Trojan”. To trick the users to download or install the malware, it disguises itself as a normal file or program TROJAN HORSE It is a flaw that produces undesired outcomes which are usually results of human error usually exists in the source code of compilers of a program. These can be prevented with developer education, code analysis tools, and quality education BUG
  • 13. SLIDESMANIA.COM SLIDESMANIA.COM COMMON TYPES OF MALWARE Home Recent Tabs LESSON You can type something here… It is a short form of advertising-supported software. It delivers advertisements automatically such as pop- up ads on websites and applications which offer free versions ADWARE It holds the computer system captive while demanding a ransom. It encrypts the user’s access to the computer by encrypting files to the hard drive or locking down the system. Then, it will display a display message forcing the user to pay the malware creator to remove restriction as well as to regain access RANSOMWARE
  • 14. SLIDESMANIA.COM SLIDESMANIA.COM COMMON TYPES OF MALWARE Home Recent Tabs LESSON You can type something here… This is designed to remotely access or control a computer wherein the users or even the security programs cannot detect. It cannot be removed easily because it keeps hiding itself. ROOTKIT It functions by spying the user’s activity without their knowledge. It spreads by exploiting software vulnerabilities SPYWARE
  • 15. SLIDESMANIA.COM SLIDESMANIA.COM 1. The computer or the web browser speed becomes slower 2. The files are modified or deleted 3. The CPU usage increases 4. There is a problem when connecting to a network 5. It is freezing or crashing 6. The running programs turn off themselves 7. The computer behavior becomes strange 8. The e-mails and messages are being sent automatically without the user’s knowledge 9. Strange files, programs, or desktop icons appear. Home Recent Tabs LESSON You can type something here… MALWARE SYMPTOMS
  • 16. SLIDESMANIA.COM SLIDESMANIA.COM 1. An anti-malware and firewall software must be installed. Choose a software that offers tools for defecting, quarantining, and removing multiple types of malwares. Scan your computer regularly 2. The software and the operating system should be updated to the current vulnerability patches. These patches are used to patch bugs or other security flaws that could be exploited by attackers. 3. Be watchful when downloading files, programs, attachments, and other. Most often, a download that looks strange or come from an unfamiliar source contains a malware Home Recent Tabs LESSON You can type something here… RECOMMENDATIONS ON HOW TO PREVENT AND REMOVE MALWARE
  • 17. SLIDESMANIA.COM slidesmania.com Prepared By: Mr. Benandro A. Palor LESSON 2 Reference: Dynamic Series in Home Economics and Livelihood Education 4 by: Gee E. Velasquez and Cynthia Bulayo-Banzon THANK YOU !!!! Twitter Facebook Instagram SlidesMania