SlideShare a Scribd company logo
RULES OF
NETIQUETTE
EMPOWERMENT TECHNOLOGY LESSON 2
MELC 2
Apply online safety, security, ethics, and
etiquette standards and practice in the use of
ICTs as it would relate to their specific
professional tracks.
LESSON OBJECTIVES
1. Consider one’s and others’ safety when sharing information
using the internet.
2. Consider one’s and other’s reputation when using the internet
3. Determine and avoid the dangers of the internet
4. Be responsible in the use of social networking sites
5. Browse the internet efficiently and properly through proper
referencing
RULES OF NETIQUETTE
SELF-CHECK ON ONLINE HABITS
Directions: Reflect and assess yourself on your
online habits. Check “Yes” or “No” on the
following table.
ONLINE HABITS YES NO
I always talk to strangers on social media
Giving your password to your friends
Posting your future vacation
Visiting unsecured websites
Ranting on social media
Posting image or video without asking permission
from the owner
Sharing of personal information
NETIQUETTE
Came from the two words “net” and
“etiquette”. It is an etiquette applied
online that shows proper manner and
behavior.
ONLINE SAFETY AND SECURITY
Type of Information Risks
1. First name There is a risk in sharing your first name.
Chances are, a hacker may already know
plenty of stuff about you even if you only
give out your first name. Likewise, you
cannot just walk in a room to start
introducing yourself to every one. You do
not know whom you can across with.
ONLINE SAFETY AND SECURITY
Type of Information Risks
2. Last name If sharing your first name is a small risk,
having both your fist and last is more
risky. You will be vulnerable to being
search for using search engines, which
include image search. Matching a name
with a face is a modus to several
cybercrimes like identity theft.
ONLINE SAFETY AND SECURITY
Type of Information Risks
3. Your cellphone
number
Your cellphone number should never be
posted over the internet. The internet is a
public place. It is the same as posting your
number on a billboard. You would not want
random strangers to text or call you, or
worse, pretend that they are someone else.
ONLINE SAFETY AND SECURITY
Type of Information Risks
4. Your address Hopefully you answered “no” to this one.
Giving your number to the internet is one
thing; giving them your address is a whole
other level. It would be easier for the
criminals to find you.
TIPS ON HOW TO BE SAFE ONLINE
1. Be mindful of what you shared online and what site you
share it too.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how
the website handles the information you share.
4. Know the security features of the social networking site you
use. By keeping your profile private, search engines will not
be able to scan your profile.
TIPS ON HOW TO BE SAFE ONLINE
5. Do not share your password with anyone
6. Avoid logging in to public networks/Wi-Fi. Browsing in
“incognito (or private) mode,” a feature of a browser, will not
protect you from hacker.
7. Do not talk to strangers whether online or face-to-face
8. Never post anything about a future vacation. It is similar to
posting “Rob my house at this date.”
9. Add friends in real life
TIPS ON HOW TO BE SAFE ONLINE
10.Avoid visiting untrusted websites
11.Install and update an antivirus software on your computer.
Use only one anti-virus to avoid conflicts.
12.If you have a Wi-Fi at home, make it a private network by
adding a password
13.Avoid downloading anything from untrusted websites. You
are most likely not monitored by site owner.
14.Do not reply or click links from suspicious emails.
INTERNET RISKS
CYBERBULLYING – it happens when
someone intentionally abuse, harass, and
mistreated by other person using
electronic communication.
INTERNET RISKS
IDENTITY THEFT – It is a crime of
stealing personal information for the
purpose of assuming that person’s name or
identity to make any form of transactions.
INTERNET RISKS
CYBER STALKING – A criminal practice
where electronic communication is used to
stalk or harass individual or group
INTERNET RISKS
SEXTING – The act of sending sexually
explicit text messages, images, and videos
INTERNET THREATS
1. MALWARE – also known as malicious
software
TYPES OF MALWARE
a. VIRUS – a malicious program designed to
replicate itself and transfer from one computer
to another either through the internet and local
networks or data storage like flash drives and
CDs
b. WORM – a malicious program that
transfers from one computer to another by
any type of means. Often, it uses a
computer network to spread itself. Exaple,
the ILOVEYOU worm (Love Bug Worm)
created by Filipino.
c. TROJAN – a malicious program
that is disguised as a useful program
but once downloaded or installed,
leave your PC unprotected and allows
hackers to get your information
ex: Rogue security software
d. SPYWARE – a program that runs in
the background without you knowing
it (thus called “spy”). It has the ability
to monitor what you are currently
doing and typing through keylogging.
Ex: Keyloggers
e. ADWARE – a program designed to
send you advertisements, mostly as
pop-ups.
INTERNET THREATS
2. SPAM – unwanted email mostly from
bots or advertisers. It can be used to send
malware.
INTERNET THREATS
3. PHISHING – its goal is to acquire sensitive
personal information like passwords and
credit cards details. This is done by sending
you email that will direct the user to visit a
website and be asked to update your
username, password, credit card, personal
information.
INTERNET THREATS
4. PHARMING – cyber attack intended to
redirect a website’s traffic to another false
site.
PROTECTING REPUTATIONS ONLINE
THINK BEFORE YOU CLICK:
Things to consider before posting something over the internet:
1. Before you post something on the web, ask these questions to
yourself: would you want your parents or grand parents to
see it? Would you want your future boss to see it? Once you
post something on the web, you have no control of who sees
your posts.
2. Your friends depend on you to protect
their reputation online. Talk to your
friends about this serious responsibility.
3. Set your post to private. In this way,
search engines will not be able to scan
that post.
4. If you feel that a post can affect you or
other’s reputation, ask the one who
posted it to pull it down or report it as
inappropriate.
COPYRIGHT INFRINGEMENT
Copyright Infringement occurs when a copyrighted
work is reproduced, distributed, performed,
publicly displayed, or made into a derivative work
without the permission of the copyright owner.
TIPS TO HELP YOU AVOID COPYRIGHT
INFRINGEMENT
• UNDERSTAND – give credit to the source
• BE RESPONSIBLE – know if something has a
copyright
• BE CREATIVE – add your own creative genius in
everything that will be credited to you
• KNOW THE LAW – seek permission first
ACTIVITY
Together with your group, create a campaign
materials it could be in a form of a small poster
promoting “ THINK BEFORE YOU CLICK”.
RUBRICS
CATEGORY 4 3 2 1
Graphics
Relevance
All graphics
are related to
the topic/theme
and makes it
easier to
understand
All graphics
are related to
the topic except
1.
Some graphics
are not related
to the topic
Many graphics
are not related
to the topic
Attractiveness The poster is
exceptionally
attractive
The poster is
attractive, neat
and clean
The poster is
acceptably
attractive but it
has few erasure
The poster is
not attractive
and has many
erasures
NEWS REPORTING
Together with your group, search a news
online regarding a case of cyberbullying
and portray it as if you are the news
reporter.
RUBRICS

More Related Content

What's hot

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Empo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptxEmpo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptxPinkyFash
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Media and Information Literacy- Performance Task (Video Project) Short Film
Media and Information Literacy- Performance Task (Video Project)  Short FilmMedia and Information Literacy- Performance Task (Video Project)  Short Film
Media and Information Literacy- Performance Task (Video Project) Short FilmArniel Ping
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
MEDIA-INFORMATION-LITERACY-G12-NAT-REVIEWER.pptx
MEDIA-INFORMATION-LITERACY-G12-NAT-REVIEWER.pptxMEDIA-INFORMATION-LITERACY-G12-NAT-REVIEWER.pptx
MEDIA-INFORMATION-LITERACY-G12-NAT-REVIEWER.pptxKimZainaLyn
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
EmpTech Lesson 9-Web Page Design Using Templates and online WYSIWYG Platforms...
EmpTech Lesson 9-Web Page Design Using Templates and online WYSIWYG Platforms...EmpTech Lesson 9-Web Page Design Using Templates and online WYSIWYG Platforms...
EmpTech Lesson 9-Web Page Design Using Templates and online WYSIWYG Platforms...liera silvan
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Media and Information Literacy- Performance Task (Project) Digital Poster Ma...
Media and Information Literacy- Performance Task (Project)  Digital Poster Ma...Media and Information Literacy- Performance Task (Project)  Digital Poster Ma...
Media and Information Literacy- Performance Task (Project) Digital Poster Ma...Arniel Ping
 
EmpTech Lesson 8 - Basic Web Page Creation
EmpTech Lesson 8 - Basic Web Page CreationEmpTech Lesson 8 - Basic Web Page Creation
EmpTech Lesson 8 - Basic Web Page Creationliera silvan
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Arniel Ping
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 

What's hot (20)

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Empo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptxEmpo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptx
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Media and Information Literacy- Performance Task (Video Project) Short Film
Media and Information Literacy- Performance Task (Video Project)  Short FilmMedia and Information Literacy- Performance Task (Video Project)  Short Film
Media and Information Literacy- Performance Task (Video Project) Short Film
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
MEDIA-INFORMATION-LITERACY-G12-NAT-REVIEWER.pptx
MEDIA-INFORMATION-LITERACY-G12-NAT-REVIEWER.pptxMEDIA-INFORMATION-LITERACY-G12-NAT-REVIEWER.pptx
MEDIA-INFORMATION-LITERACY-G12-NAT-REVIEWER.pptx
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
EmpTech Lesson 9-Web Page Design Using Templates and online WYSIWYG Platforms...
EmpTech Lesson 9-Web Page Design Using Templates and online WYSIWYG Platforms...EmpTech Lesson 9-Web Page Design Using Templates and online WYSIWYG Platforms...
EmpTech Lesson 9-Web Page Design Using Templates and online WYSIWYG Platforms...
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Media and Information Literacy- Performance Task (Project) Digital Poster Ma...
Media and Information Literacy- Performance Task (Project)  Digital Poster Ma...Media and Information Literacy- Performance Task (Project)  Digital Poster Ma...
Media and Information Literacy- Performance Task (Project) Digital Poster Ma...
 
EmpTech Lesson 8 - Basic Web Page Creation
EmpTech Lesson 8 - Basic Web Page CreationEmpTech Lesson 8 - Basic Web Page Creation
EmpTech Lesson 8 - Basic Web Page Creation
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
 
Co2 empowerment technology
Co2 empowerment technologyCo2 empowerment technology
Co2 empowerment technology
 
EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 

Similar to Rules of netiquette-lesson 2.pptx

EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette007rgmel
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxGrayzon Gonzales, LPT
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 

Similar to Rules of netiquette-lesson 2.pptx (20)

EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Users guide
Users guideUsers guide
Users guide
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 

Recently uploaded

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfPo-Chuan Chen
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 

Rules of netiquette-lesson 2.pptx

  • 2. MELC 2 Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks.
  • 3. LESSON OBJECTIVES 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and other’s reputation when using the internet 3. Determine and avoid the dangers of the internet 4. Be responsible in the use of social networking sites 5. Browse the internet efficiently and properly through proper referencing
  • 5. SELF-CHECK ON ONLINE HABITS Directions: Reflect and assess yourself on your online habits. Check “Yes” or “No” on the following table.
  • 6. ONLINE HABITS YES NO I always talk to strangers on social media Giving your password to your friends Posting your future vacation Visiting unsecured websites Ranting on social media Posting image or video without asking permission from the owner Sharing of personal information
  • 7. NETIQUETTE Came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior.
  • 8. ONLINE SAFETY AND SECURITY Type of Information Risks 1. First name There is a risk in sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you only give out your first name. Likewise, you cannot just walk in a room to start introducing yourself to every one. You do not know whom you can across with.
  • 9. ONLINE SAFETY AND SECURITY Type of Information Risks 2. Last name If sharing your first name is a small risk, having both your fist and last is more risky. You will be vulnerable to being search for using search engines, which include image search. Matching a name with a face is a modus to several cybercrimes like identity theft.
  • 10. ONLINE SAFETY AND SECURITY Type of Information Risks 3. Your cellphone number Your cellphone number should never be posted over the internet. The internet is a public place. It is the same as posting your number on a billboard. You would not want random strangers to text or call you, or worse, pretend that they are someone else.
  • 11. ONLINE SAFETY AND SECURITY Type of Information Risks 4. Your address Hopefully you answered “no” to this one. Giving your number to the internet is one thing; giving them your address is a whole other level. It would be easier for the criminals to find you.
  • 12. TIPS ON HOW TO BE SAFE ONLINE 1. Be mindful of what you shared online and what site you share it too. 2. Do not just accept terms and conditions; read it. 3. Check out the privacy policy page of a website to learn how the website handles the information you share. 4. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.
  • 13. TIPS ON HOW TO BE SAFE ONLINE 5. Do not share your password with anyone 6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode,” a feature of a browser, will not protect you from hacker. 7. Do not talk to strangers whether online or face-to-face 8. Never post anything about a future vacation. It is similar to posting “Rob my house at this date.” 9. Add friends in real life
  • 14. TIPS ON HOW TO BE SAFE ONLINE 10.Avoid visiting untrusted websites 11.Install and update an antivirus software on your computer. Use only one anti-virus to avoid conflicts. 12.If you have a Wi-Fi at home, make it a private network by adding a password 13.Avoid downloading anything from untrusted websites. You are most likely not monitored by site owner. 14.Do not reply or click links from suspicious emails.
  • 15. INTERNET RISKS CYBERBULLYING – it happens when someone intentionally abuse, harass, and mistreated by other person using electronic communication.
  • 16. INTERNET RISKS IDENTITY THEFT – It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
  • 17. INTERNET RISKS CYBER STALKING – A criminal practice where electronic communication is used to stalk or harass individual or group
  • 18. INTERNET RISKS SEXTING – The act of sending sexually explicit text messages, images, and videos
  • 19. INTERNET THREATS 1. MALWARE – also known as malicious software
  • 20. TYPES OF MALWARE a. VIRUS – a malicious program designed to replicate itself and transfer from one computer to another either through the internet and local networks or data storage like flash drives and CDs
  • 21. b. WORM – a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. Exaple, the ILOVEYOU worm (Love Bug Worm) created by Filipino.
  • 22. c. TROJAN – a malicious program that is disguised as a useful program but once downloaded or installed, leave your PC unprotected and allows hackers to get your information ex: Rogue security software
  • 23. d. SPYWARE – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging. Ex: Keyloggers
  • 24. e. ADWARE – a program designed to send you advertisements, mostly as pop-ups.
  • 25. INTERNET THREATS 2. SPAM – unwanted email mostly from bots or advertisers. It can be used to send malware.
  • 26. INTERNET THREATS 3. PHISHING – its goal is to acquire sensitive personal information like passwords and credit cards details. This is done by sending you email that will direct the user to visit a website and be asked to update your username, password, credit card, personal information.
  • 27. INTERNET THREATS 4. PHARMING – cyber attack intended to redirect a website’s traffic to another false site.
  • 28. PROTECTING REPUTATIONS ONLINE THINK BEFORE YOU CLICK: Things to consider before posting something over the internet: 1. Before you post something on the web, ask these questions to yourself: would you want your parents or grand parents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts.
  • 29. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
  • 30. 3. Set your post to private. In this way, search engines will not be able to scan that post. 4. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
  • 31. COPYRIGHT INFRINGEMENT Copyright Infringement occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner.
  • 32. TIPS TO HELP YOU AVOID COPYRIGHT INFRINGEMENT • UNDERSTAND – give credit to the source • BE RESPONSIBLE – know if something has a copyright • BE CREATIVE – add your own creative genius in everything that will be credited to you • KNOW THE LAW – seek permission first
  • 33. ACTIVITY Together with your group, create a campaign materials it could be in a form of a small poster promoting “ THINK BEFORE YOU CLICK”.
  • 34. RUBRICS CATEGORY 4 3 2 1 Graphics Relevance All graphics are related to the topic/theme and makes it easier to understand All graphics are related to the topic except 1. Some graphics are not related to the topic Many graphics are not related to the topic Attractiveness The poster is exceptionally attractive The poster is attractive, neat and clean The poster is acceptably attractive but it has few erasure The poster is not attractive and has many erasures
  • 35. NEWS REPORTING Together with your group, search a news online regarding a case of cyberbullying and portray it as if you are the news reporter.

Editor's Notes

  1. In the activity above, you assessed yourself in online habits. Those habits might be good or bad that you must be aware of. If you keep practicing those bad habits, it might bring you danger. Safety is the first thing you must consider in using internet.