AlbaniaDreamin24 - How to easily use an API with Flows
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
1. Picture Analysis
Questions:
• What do you think the picture is
portraying?
• Have you experienced something
similar on what is being portrayed
in the picture?
3. Objectives:
1.Point out what are the best practices for searching.
2.Reflect on the importance of observing netiquettes and
avoiding plagiarism when searching.
3.Discuss and appreciate the importance of avoiding web
threats
5. Data Privacy
• Data privacy is the right to protect
your personal information from
unauthorized access, use, or
disclosure. It is also the right to control
how your personal information is
collected, stored, and used.
• Personal information is any
information that can be used to
identify you as an individual, such as
your name, address, date of birth,
Social Security number, financial
information, and medical information.
6. Republic Act No. 10173/Data Privacy Act
of 2012 (DPA)
• The Data Privacy Act of 2012 (DPA) is a
comprehensive law that governs the
collection, use, disclosure, storage, and
disposal of personal data in the
Philippines. It covers both public and
private sector entities.
• The DPA requires entities to obtain the
consent of individuals before collecting or
processing their personal data. Entities
must also have a legitimate purpose for
collecting and using personal data, and
they must take reasonable steps to protect
the data from unauthorized access, use, or
disclosure.
7. Plagiarism
• Plagiarism is the act of passing off
someone else's work as your own. This
can include copying someone else's
words, ideas, or structure without
giving them proper credit. Plagiarism
can be intentional or unintentional,
but it is always wrong.
8. Types of Plagiarism
Direct plagiarism: This is the most common type of plagiarism, and it involves
copying someone else's work word-for-word without giving them credit.
Paraphrasing plagiarism: This type of plagiarism involves copying someone else's
ideas and putting them into your own words without giving them credit.
Self-plagiarism: This type of plagiarism involves reusing your own work without
properly citing yourself.
Mosaic plagiarism: This type of plagiarism involves copying and pasting pieces of
text from different sources together to create a new work without giving credit to
the original authors.
10. Online Safety Tips
• Keep Personal Information Professional and Limited
• Keep Your Privacy Settings On
• Practice Safe Browsing
• Make Sure Your Internet Connection is Secure, Use a
Secure VPN Connection
• Be Careful What You Download
11. Online Safety Tips
• Choose Strong Passwords
• Make Online Purchases From Secure Sites
• Be Careful What You Post
• Be Careful Who You Meet Online
• Keep Your Antivirus Program Up To Date
13. Activity: 5 Online Safety
Tips for Students
List down 5 online safety tips that will be helpful for a student
like you consider the lifestyle and internet browsing
tendencies of students when making the list. You can use
your personal experiences in crafting your list. After the
activity, some students will share their list to the class.
Category 4 points 3 points 2 points 1 point
Accuracy All tips are accurate. Most tips are accurate. Some tips are accurate.
Few or no tips are
accurate.
Relevance
All tips are relevant to
students.
Most tips are relevant
to students.
Some tips are relevant
to students.
Few or no tips are
relevant to students.
Clarity
Tips are clear and easy
to understand.
Tips are mostly clear
and easy to understand.
Tips are somewhat
clear and easy to
understand.
Tips are not clear or
easy to understand.
14. The “I LOVE YOU” VIRUS
The ILOVEYOU virus comes in an
email with "ILOVEYOU" in the subject
line and contains an attachment
that, when opened, results in the
message being re-sent to everyone
in the recipient's Microsoft Outlook
address book. Perhaps more
seriously, it results in the loss of
every JPEG, MP3 and certain other
files on all recipients' hard disks.
Onel De Guzman, creator of the virus
18. Internet Threats
• An internet threat is anything that can harm your computer or your
personal information when you are using the internet. These threats can
come from a variety of sources, including hackers, cybercriminals, malware,
and even other users.
19. Types of Internet Threats
▪ Malware: Malware is a type
of software that is designed
to harm your computer or
steal your personal
information. Malware can
include viruses, worms,
Trojans, keyloggers, and
spyware.
20. Types of Internet Threats
▪ Computer Virus: It is a
program that duplicates
itself and then infects the
computer. It spreads like a
biological virus.
▪It can be transferred by the
use of removable storage
media devices.
21. Types of Internet Threats
Computer Worm: It is a
dangerous computer
program that replicates itself
through a network.
It is usually spread through
email and running of
attachments from suspicious
sources.
22. Types of Internet Threats
Computer Bug: A
malfunction on a computer
system through its runtime
23. Types of Internet Threats
Spyware: A computer program
that is installed covertly on a
personal computer to collect
information or even take control
over the computer without the
knowledge of the user.
It can monitor and collect
information about the user’s
internet habits and practices.
It can also affect the performance
and setting of the computer.
24. Types of Internet Threats
Trojan Horse: A malware fronting
to perform a good task, but
covertly performs undesirable
function with the intention of
entering the computer without
the user’s consent.
It can disable the computer’s
defenses, opening it to
unauthorized entry. It can erase
data, can corrupt files, allow access
to computer, and
25. Types of Internet Threats
Adware: This program
automatically sends pop-ups
advertisements.
26. Types of Internet Threats
▪ Ransomware: Ransomware is a
type of malware that encrypts
your files and demands a ransom
payment in exchange for the
decryption key.
27. Types of Internet Threats
▪ Phishing: Phishing is a type of
scam where attackers try to trick
you into revealing confidential
information, such as your
passwords or credit card
numbers. Phishing attacks often
involve sending fake emails or
text messages that appear to be
from legitimate companies.
28. Types of Internet Threats
▪ Pharming: This is a dangerous
hacker attack on a website which
directs all traffic to that website to
another fictitious website.
The main objective is to obtain
username and passwords, as well
as credit cards ad financial
information, and use these to steal
their money electronically or use
the credit cards of the victims.
It is a major concern of many online
banking and electronic commerce
transactions.
29. Types of Internet Threats
Email Spam: AKA Junk mail
Usually unsolicited commercial
email sent from an unknown
source with identical message
sent to multiple recipients.
Usually not dangerous but can
be time and space consuming.
Dangerous ones can carry
viruses and other malicious
software (Malware)
30. Types of Internet Threats
Email Spoofing: It is a
deceitful email practice in
which the sender address is
changed, so that it would
appear to have come from a
different source which is
usually someone you know.
Email spoofing is usually used
by spammers to hide the origin
of the spam.
31.
32. Types of Internet Threats
Internet Bots: A network of
zombie computers that have
been taken over by a robot or
bot that performs large scale
malicious acts for the creator
of the bot net.
33. Types of Internet Threats
Sexting: It is a term used to
describe inappropriate
photos or text sent via
cellphone or mobile phone.
34. Types of Internet Threats
Internet Scam: A type of scam
that misleads the users in
many ways attempting to
take lead of them.
35. Types of Internet Threats
Non-Delivery of
Merchandise: A deceiving act
which the culprit posted a
product or service on the
Internet. Once the victim
placed its payment, the
culprit does not give the item
or service.
36. Types of Internet Threats
Cyber Stalking: The use of
the internet or other
electronic device to harass or
stalk individual, group or
organization
37. Types of Internet Threats
Cyber Bullying: The act of
tormenting, threatening,
harassing or embarrassing
another person using the
internet or other
technologies
38. Types of Internet Threats
Hacking: It is unauthorized
accessing of data from a
computer network. Mostly,
hackers attack commercial and
government sites to cause an
alarm or to threat someone.
Hacker: This is a person who is
able to enter and control other
people’s computer without
authorization.
39. Types of Internet Threats
Electronic Harassment: An
anonymous criminal who
harass, abuse, threat, or
annoy other people.
40. Types of Internet Threats
Child Pornography: Based on
Republic Act no 9775 or known
as Anti-Child Pornography Act
of 2009, it is an act of real or
simulated explicit sexual
activities that involves any child
aged 18 and below and it is
penalized depending on the
offender. If it is the parent or
relative of the child, they’ll
receive the maximum penalty.
41. Types of Internet Threats
Prostitution: It is an illegal
act engage in any sexual
activities.
42. Types of Internet Threats
Criminal Copyright
Infringement: It is an
unauthorized use or stealing
of intellectual property, such
as movies and music, for
profitable benefit.
Sometimes, students violate
it through plagiarism.
43. Types of Internet Threats
▪ Denial-of-service (DoS) attacks: DoS attacks are designed to
overwhelm a website or server with traffic, making it unavailable
to legitimate users.
44. Types of Internet Threats
▪ Man-in-the-middle attacks: Man-in-the-middle attacks are where an
attacker intercepts communication between two parties and
impersonates one of them. This can be used to steal personal
information or to spread malware.
46. Activity: Internet Threats
Table
Fill up the table with the right
information. After that, produce
prevention tips to avoid internet
threats.
Category Definition Target Platforms Prevention Tips
Phishing
Ransomware
Man-in-the-middle
attacks
Denial of Service
Attacks
47. Green Flag or Red Flag
WHAT ARE SOME OF YOUR RED FLAGS WHEN IT COMES TO
INTERNET BEHAVIOR?
54. Objectives:
Understand the concept of netiquette.
Create a slogan promoting awareness of netiquette.
Value the importance of netiquette when using the
Internet.
55. In recent news . . .
Rendon Labador’s facebook and tiktok account got deleted.
57. Netiquette
Netiquette is defined as “network
etiquette” the code of conduct for
online communication. Netiquette is
important for maintaining a positive
and productive online environment,
whether it's in emails, social media,
forums, chat rooms, or any other
online platform.
59. Common Principles of Netiquette
Respect others: Treat others with
the same respect and courtesy
you would in face-to-face
interactions. Avoid offensive
language, insults, or harassment.
Use proper grammar and spelling:
Clear and well-structured
communication is essential for
effective online communication. Avoid
excessive use of abbreviations and
acronyms that others may not
understand.
60. Common Principles of Netiquette
Be Concise: Keep your messages
and comments brief and to the
point. Avoid writing
unnecessarily long messages that
may lose the
Use appropriate tone and language:
Choose your words carefully and avoid
using all caps, which can be
interpreted as shouting. Be mindful of
cultural differences and potential
misunderstandings.
61. Common Principles of Netiquette
Be cautious with humor and
sarcasm: Humor and sarcasm can
be easily misinterpreted online.
Use emoticons or emojis to
clarify your tone when necessary.
Respect privacy: Don't share personal
information about others without their
consent. Be mindful of data privacy
and security when discussing sensitive
topics.
62. Common Principles of Netiquette
Stay on topic: When
participating in online
discussions or forums, stick to
the topic at hand. Avoid derailing
conversations with unrelated
comments.
Use meaningful subject lines: In
emails and forum posts, provide clear
and descriptive subject lines to help
others understand the content of your
message.
63. Common Principles of Netiquette
Avoid spam: Don't flood forums
or email inboxes with irrelevant
or unsolicited messages. Be
mindful of the frequency and
relevance of your
communication.
Read and follow community
guidelines: Different online platforms
may have their own rules and
guidelines for conduct. Familiarize
yourself with these rules and abide by
them.
64. Common Principles of Netiquette
Use private channels for
personal matters: When
discussing personal or sensitive
issues, use private messaging or
email rather than public forums
or social media.
Be patient and tolerant: Not everyone
online will share your views or
opinions. Be open to constructive
criticism and engage in civil discussions
when disagreements arise.
67. What would you do?
You notice a heated argument between two users on a forum. How would you
intervene to promote a more respectful and constructive discussion while respecting
netiquette principles?
Your friend posts a potentially embarrassing photo of you on their social media
without your consent. How would you address this situation while adhering to
netiquette guidelines?
You receive an email from a colleague with multiple spelling errors and a rude tone.
How would you respond professionally, keeping in mind the principles of netiquette?
68. What would you do?
During an online game, a teammate starts using offensive language and insults
others. How would you handle the situation to maintain a positive gaming
environment in line with netiquette?
You've been chatting with someone you met on a dating app, and they suddenly
stop responding. How would you follow up or handle the situation without violating
netiquette or making the other person uncomfortable?
70. Slogan Making on Netiquette
The students will create a
slogan promoting the
importance of netiquette.
They will design and
create a slogan promoting
the awareness and
practice of netiquette.
Criterion Points Description
Creativity 10
The slogan is original and unique and uses creative
language to convey its message.
Clarity 10
The slogan is clear and concise, and its message is easy
to understand.
Relevance 10
The slogan is relevant to the topic of netiquette and its
importance.
Impact 10
The slogan is memorable and thought-provoking, and
it effectively conveys its message.
Overall 10
The slogan is well-written and effective in promoting
netiquette.