SlideShare a Scribd company logo
1
UNIT 2. Internet. Security and responsability.
1. Unit summary:
1. Internet: is a network of thousands of computers and devices around the world
connected by cooper wires, fibre optics, wireless connections and other methods.
2. Browser: a programme that displays the content of web pages.
3. Search engine: is a computer system that indexes files stored on websites.
4. URL: uniform resource locator. The address that identifies a website on the Internet.
5. Server: is a computer with special features, prepared to provide uninterrupted
services to lots of useers.
2. Order the stages that go from when I connect to the Internet to search for
an address in a browser until the corresponding web page appears:
1. I connect to the Internet if I have got an Internet servide provider (ISP) that
assigns an addres to my computer, calle dan IP address.
2. A router lets me connect to the Internet. Once connected, I open my browser
and type the address of a page in it (URL). Information starts to travel in the
form of packets.
3. DNS servers assign a name to each IP address.
4. My computer communicates with other computers following a common set of
rules called a protocol.
5. The DNS server sends the request to the server that hosts the web page we
want to visit.
6. Finally, the packets reach our computer and are reassembled. The page is then
displayed in our browser.
3. Tell me four tools to protect our personal safety and machine security.
1. Our attiude protects us from identify theft, phising, loss of privacy, damage to
our identity or image, ciberbullying,…
2. Antivirus that can protect our computer from attacks by viruses and Trojans.
3. Firewall that displays alerts to ask confirmation for any program that uses the
Internet connection.
4. Passwords that can enhance the security of a file, folder, computer, etc.
2
4. Match up the ítems in these two columns:
Threat Answer
Virus ANTIVIRUS Criptography
Trojans ANTIVIRUS Firewall
Black hackers CRIPTOGRAPHY. WHITE
HACKING
Antivirus
Ciberbullying REPORT Passwords
Spyware FIREWALL Report
Loss of privacy TAKE CARE OF OUR PRIVACY White hacking
Phising PASSWORDS Take care of our privacy
5. Explain why our attitude is our best protection to the Internet.
We must be digitally responsable. When we use Internet tools, we need to keep in mind
our own safety and respect for others. We have to use commom sense and do not do
things on a computer that we would not do in everyday life.
6. What is the digital footprint?
Everything we do on the Internet leaves a trace. This information is our digital identity
and it is our duty to take care of it.

More Related Content

What's hot

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
Om Prakash Mishra
 
Aiman
AimanAiman
Aiman
Aimanz
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
Rc Os
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
Syed Zeeshan Ali
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
Jana Baxter
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
nehal patel
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
aimane
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Protection
ProtectionProtection
Protection
roxanne62
 
Adware
AdwareAdware
Adware
Avani Patel
 
Presentation
 Presentation Presentation
Presentation
Fettah Kurtulus
 
CLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONSCLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONS
Rc Os
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
irfan shaikh
 
Internet terms
Internet termsInternet terms
Internet terms
theAidman
 
Cyber security
Cyber securityCyber security
Cyber security
Sajid Hasan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 

What's hot (20)

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Aiman
AimanAiman
Aiman
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Protection
ProtectionProtection
Protection
 
Adware
AdwareAdware
Adware
 
Presentation
 Presentation Presentation
Presentation
 
CLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONSCLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONS
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Internet terms
Internet termsInternet terms
Internet terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Similar to Review unit 2 tecnology 2 eso

shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
SheetalKamble39
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
Yhal Htet Aung
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...
Sijuna Aetta
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
Umakant Mishra
 
Cyber security
Cyber securityCyber security
Cyber security
Anju Sharma
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
KrishnaVashistha4
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
ToleraYadessaGonfa
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Internet security
Internet securityInternet security
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Syed Irshad Ali
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Arnav Chowdhury
 
Computer security
Computer securityComputer security
Computer security
Dhani Ahmad
 

Similar to Review unit 2 tecnology 2 eso (20)

shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...
 
Cyber security
Cyber securityCyber security
Cyber security
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hamza
HamzaHamza
Hamza
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer security
Computer securityComputer security
Computer security
 

Recently uploaded

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 

Recently uploaded (20)

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 

Review unit 2 tecnology 2 eso

  • 1. 1 UNIT 2. Internet. Security and responsability. 1. Unit summary: 1. Internet: is a network of thousands of computers and devices around the world connected by cooper wires, fibre optics, wireless connections and other methods. 2. Browser: a programme that displays the content of web pages. 3. Search engine: is a computer system that indexes files stored on websites. 4. URL: uniform resource locator. The address that identifies a website on the Internet. 5. Server: is a computer with special features, prepared to provide uninterrupted services to lots of useers. 2. Order the stages that go from when I connect to the Internet to search for an address in a browser until the corresponding web page appears: 1. I connect to the Internet if I have got an Internet servide provider (ISP) that assigns an addres to my computer, calle dan IP address. 2. A router lets me connect to the Internet. Once connected, I open my browser and type the address of a page in it (URL). Information starts to travel in the form of packets. 3. DNS servers assign a name to each IP address. 4. My computer communicates with other computers following a common set of rules called a protocol. 5. The DNS server sends the request to the server that hosts the web page we want to visit. 6. Finally, the packets reach our computer and are reassembled. The page is then displayed in our browser. 3. Tell me four tools to protect our personal safety and machine security. 1. Our attiude protects us from identify theft, phising, loss of privacy, damage to our identity or image, ciberbullying,… 2. Antivirus that can protect our computer from attacks by viruses and Trojans. 3. Firewall that displays alerts to ask confirmation for any program that uses the Internet connection. 4. Passwords that can enhance the security of a file, folder, computer, etc.
  • 2. 2 4. Match up the ítems in these two columns: Threat Answer Virus ANTIVIRUS Criptography Trojans ANTIVIRUS Firewall Black hackers CRIPTOGRAPHY. WHITE HACKING Antivirus Ciberbullying REPORT Passwords Spyware FIREWALL Report Loss of privacy TAKE CARE OF OUR PRIVACY White hacking Phising PASSWORDS Take care of our privacy 5. Explain why our attitude is our best protection to the Internet. We must be digitally responsable. When we use Internet tools, we need to keep in mind our own safety and respect for others. We have to use commom sense and do not do things on a computer that we would not do in everyday life. 6. What is the digital footprint? Everything we do on the Internet leaves a trace. This information is our digital identity and it is our duty to take care of it.