SlideShare a Scribd company logo
Lesson 2: Rules of
Netiquette
OBJETIVES
At the end of this lesson, the students should be able to:
 1. Consider one’s and others’ safety when sharing information using
the internet;
 2. Consider one’s and others’ reputation when using the internet;
 3. Determine and AVOID the dangers of the internet;
 4. Be responsible in the use of social networking sites; &
 5. Browse the internet efficiently & properly through proper
referencing.
Online Safety and Security
Internet
Internet is defined as
information superhighway.
Anyone who has access to this
highway, can place information
and can grab that information.
Internet Threats
Malware
malicious software
It can take the form of executable code, scripts,
active content, and other software.
computer viruses
 worms
Trojan horses
spyware
adware, and
Spam
Phishing
other malicious
programs.
Computer Virus
 A computer virus is a malware that; when executed,
replicates by reproducing itself or infecting other
programs by modifying them.
 The term computer virus was a misnomer until it was
coined by Fred Cohen in 1985.
Worm
A computer worm is a
standalone malware computer
program that replicates itself in order to
spread to other computers.
Trojan
a malicious program that is
disguised as useful program but
once installed, leave your PC
unprotected and allows hackers to
get your information.
Adware
a program designed to send
advertisement, mostly as pop-ups.
Spyware
a program that runs in the background
without you knowing it. It has ability to
monitor what are you currently doing and
typing through keylogging.
keyloggers – used to record the
keystroke done by the users
Spam
unwanted emails mostly from bots or
advertisers. It can be used to send
malware.
Phishing
its goal is to acquire sensitive
information like password and credit
card details.
Tips to stay safe online
1. Be mindful of what you shares
online and what site you share it to.
2. don’t just accept terms and
conditions; READ IT.
3. Check out the privacy policy page of
a website.
4. Know the security features of social
networking site you use.
5. Do not share your password with
anyone
6. Avoid logging in to public
networks/Wi-Fi.
7. Do not talk to strangers whether
online or face-to-face.
8. Never post anything about a future
vacation.
“Rob my house at this date”
9. Add friends you know in real life.
10. Avoid visiting untrusted website
11. Install and update antivirus
software on your computer.
12. If you have a Wi-Fi at home, make
a private network by adding a
password.
13. Avoid downloading anything from
untrusted websites.
14. Buy the software; do not use
pirated ones.
15. Do not reply or click links from
suspicious emails.

More Related Content

What's hot

Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
Angelito Quiambao
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lea Rodriguez
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
Maria Eloisa Blanza
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
alicelagajino
 
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
MeiaGuzman1
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptx
JasonPDelosSantos
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
Pearl Maxine Jimena
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
Juvywen
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
AlminaVelasco
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5
Jesus Rances
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ronalyn_Cao
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
Rufa Laguit
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
Leah Condina
 
Multimedia and ICT
Multimedia and ICTMultimedia and ICT
Multimedia and ICTMikaela Papa
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
Teodoro Llanes II
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
pizonaim
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
Mark Jhon Oxillo
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 

What's hot (20)

Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptx
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 
Multimedia and ICT
Multimedia and ICTMultimedia and ICT
Multimedia and ICT
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

Similar to Netiquette on using internet

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
JeffUrgelles
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
alvindalejoyosa1
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rainstorming23m
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
Scott Penton
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
SheryldeVilla2
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
Joemer Mabagos
 
Securitytips
SecuritytipsSecuritytips
Securitytips
Santosh Khadsare
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
007rgmel
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
Andrew_Braza
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 

Similar to Netiquette on using internet (20)

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 

More from Maricrs Alfarö

Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
Maricrs Alfarö
 
Web 2.0 dynamics
Web 2.0 dynamicsWeb 2.0 dynamics
Web 2.0 dynamics
Maricrs Alfarö
 
Trends in ict
Trends in ictTrends in ict
Trends in ict
Maricrs Alfarö
 
Online research
Online researchOnline research
Online research
Maricrs Alfarö
 
Features of the web
Features of the webFeatures of the web
Features of the web
Maricrs Alfarö
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
Maricrs Alfarö
 

More from Maricrs Alfarö (6)

Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
Web 2.0 dynamics
Web 2.0 dynamicsWeb 2.0 dynamics
Web 2.0 dynamics
 
Trends in ict
Trends in ictTrends in ict
Trends in ict
 
Online research
Online researchOnline research
Online research
 
Features of the web
Features of the webFeatures of the web
Features of the web
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Netiquette on using internet

  • 1. Lesson 2: Rules of Netiquette
  • 2. OBJETIVES At the end of this lesson, the students should be able to:  1. Consider one’s and others’ safety when sharing information using the internet;  2. Consider one’s and others’ reputation when using the internet;  3. Determine and AVOID the dangers of the internet;  4. Be responsible in the use of social networking sites; &  5. Browse the internet efficiently & properly through proper referencing.
  • 3. Online Safety and Security
  • 4. Internet Internet is defined as information superhighway. Anyone who has access to this highway, can place information and can grab that information.
  • 6. Malware malicious software It can take the form of executable code, scripts, active content, and other software. computer viruses  worms Trojan horses spyware adware, and Spam Phishing other malicious programs.
  • 7. Computer Virus  A computer virus is a malware that; when executed, replicates by reproducing itself or infecting other programs by modifying them.  The term computer virus was a misnomer until it was coined by Fred Cohen in 1985.
  • 8. Worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
  • 9. Trojan a malicious program that is disguised as useful program but once installed, leave your PC unprotected and allows hackers to get your information.
  • 10. Adware a program designed to send advertisement, mostly as pop-ups.
  • 11. Spyware a program that runs in the background without you knowing it. It has ability to monitor what are you currently doing and typing through keylogging. keyloggers – used to record the keystroke done by the users
  • 12. Spam unwanted emails mostly from bots or advertisers. It can be used to send malware.
  • 13. Phishing its goal is to acquire sensitive information like password and credit card details.
  • 14. Tips to stay safe online
  • 15. 1. Be mindful of what you shares online and what site you share it to.
  • 16. 2. don’t just accept terms and conditions; READ IT.
  • 17. 3. Check out the privacy policy page of a website.
  • 18. 4. Know the security features of social networking site you use.
  • 19. 5. Do not share your password with anyone
  • 20. 6. Avoid logging in to public networks/Wi-Fi.
  • 21. 7. Do not talk to strangers whether online or face-to-face.
  • 22. 8. Never post anything about a future vacation. “Rob my house at this date”
  • 23. 9. Add friends you know in real life.
  • 24. 10. Avoid visiting untrusted website
  • 25. 11. Install and update antivirus software on your computer.
  • 26. 12. If you have a Wi-Fi at home, make a private network by adding a password.
  • 27. 13. Avoid downloading anything from untrusted websites.
  • 28. 14. Buy the software; do not use pirated ones.
  • 29. 15. Do not reply or click links from suspicious emails.

Editor's Notes

  1. Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace. how this things happen?
  2. is an umbrella term used to refer to a variety of forms of hostile or intrusive software
  3.  Most often this is spread by sharing software or files between computers. It can be spread by downloading files, exchanging CD/DVDs and USB sticks, copying files from servers, or by opening infected email attachments.
  4. The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war. The most dangerous Malware. Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ” Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.
  5. The least dangerous and most lucrative Malware. Adware displays ads on your computer.
  6. Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system
  7. Rootkit: This one is likened to the burglar hiding in the attic, waiting to take from you while you are not home. It is the hardest of all Malware to detect and therefore to remove; many experts recommend completely wiping your hard drive and reinstalling everything from scratch. It is designed to permit the other information gathering Malware in to get the identity information from your computer without you realizing anything is going on. Backdoors: Backdoors are much the same as Trojans or worms, except that they open a “backdoor” onto a computer, providing a network connection for hackers or other Malware to enter or for viruses or SPAM to be sent. Rogue security software: This one deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software. The next image shows the typical screen for this Malware program, Antivirus 2010 Ransomware: If you see this screen that warns you that you have been locked out of your computer until you pay for your cybercrimes. Your system is severely infected with a form of Malware called Ransomware. It is not a real notification from the FBI, but, rather an infection of the system itself. Even if you pay to unlock the system, the system is unlocked, but you are not free of it locking you out again. The request for money, usually in the hundreds of dollars is completely fake.
  8. to learn how website handles the information you shared
  9. By keeping your profile private the search engines will not able to scan your profile.
  10. And browsing in incognito (private mode) cannot protect you from a hacker
  11. The love bugs is the most destructive virus on the history, created by a computer science student of AMA, he’s thesis was rejected by the professor saying