SlideShare a Scribd company logo
1 of 8
Online safety, Ethics and
security, Etiquette
• Cybersafety-is the safe and responsible use of information and
communication technology.
-keeping information safe and secure,but also about being
responsible,with that information ,being respecful of other people online
and using good netiquette.
Social Security number
Credit card information
Bank account number
Personal Identification
Stolen passwords
Password
your password should seem complicated to others but simple to
you.
Saving your identity
You can create an identity theft report
Internet security
a process to create rules and actions .
• Web Search tools
Search Engines – search websites
Web Dictionaries- compilation of site that helps a user to move in
another area of topic.
-hyperlink
Data Base Engines
Google scholar JSTOR
Ebscohot
Springer
LISA
Contextualized Online Search and research
Skills.
• Web Search tools
Search Engines-consists of software that crowls the internet storing
information about websites based on keywords and other.
Web Dictionaries
compilations of site by listed by tropical categories can help a user
move from a general area of interest to more specific topic and
eventually website best of the web dictionaries list websites
categorized both by topic and by region.
• Database Engines
-a respiratory of reviewed journals and literature allows plain text
searching and advanced Searching.
Strategies
Bodean Searching –uses commands (operators)such as AND or NOT
Phrase and proximity Searching-Using qoutation mark allows you to
search for a exact phrase.
Truncation or wildcard functions
truncation ,place a symbol at the end of the word so you search
for variant endings for that word .Wildeard ,place a symbol within a
word to find variatons on it.
by: KHRIZTELLE ZYRA M ANURAN

More Related Content

What's hot

Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Password protection
Password protectionPassword protection
Password protection
post_it
 
Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short Version
Valerie Houghton
 

What's hot (17)

Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
Database security
Database securityDatabase security
Database security
 
call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Database security
Database securityDatabase security
Database security
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ijcis -->cfp
Ijcis -->cfp Ijcis -->cfp
Ijcis -->cfp
 
SocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs WorkshopSocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs Workshop
 
Presentation
PresentationPresentation
Presentation
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
What Is "Secure"?
What Is "Secure"?What Is "Secure"?
What Is "Secure"?
 
Password protection
Password protectionPassword protection
Password protection
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short Version
 
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
2° Ciclo Microsoft Fondazione CRUI  6° Seminario: Classificazione e protezion...2° Ciclo Microsoft Fondazione CRUI  6° Seminario: Classificazione e protezion...
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
 

Similar to Zyra presentation

Internet browsing techniques
Internet browsing techniquesInternet browsing techniques
Internet browsing techniques
Tola Odugbesan
 
Searching the internet information and assessment
Searching the internet information and assessmentSearching the internet information and assessment
Searching the internet information and assessment
nollyris
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
Riya Gupta
 
Technical skills in multimedia for odl learners
Technical skills in multimedia for odl learnersTechnical skills in multimedia for odl learners
Technical skills in multimedia for odl learners
Daniel Koloseni
 

Similar to Zyra presentation (20)

Why Do You Know So Much About Me
Why Do You Know So Much About MeWhy Do You Know So Much About Me
Why Do You Know So Much About Me
 
Unit 1
Unit 1Unit 1
Unit 1
 
Benefits of Internet
Benefits of Internet Benefits of Internet
Benefits of Internet
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
 
Accessing internet resources best practices
Accessing internet resources  best practicesAccessing internet resources  best practices
Accessing internet resources best practices
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptx
 
Internet browsing techniques
Internet browsing techniquesInternet browsing techniques
Internet browsing techniques
 
Searching the internet information and assessment
Searching the internet information and assessmentSearching the internet information and assessment
Searching the internet information and assessment
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
 
Internet
InternetInternet
Internet
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
File000162
File000162File000162
File000162
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Presentation on KBS APP and SEMANTIC WEB
Presentation on KBS APP and SEMANTIC WEB Presentation on KBS APP and SEMANTIC WEB
Presentation on KBS APP and SEMANTIC WEB
 
Technical skills in multimedia for odl learners
Technical skills in multimedia for odl learnersTechnical skills in multimedia for odl learners
Technical skills in multimedia for odl learners
 

More from MaridelBajeta (20)

Lovelyn R. Closa
Lovelyn R. ClosaLovelyn R. Closa
Lovelyn R. Closa
 
Bajeta maridel m.
Bajeta maridel m.Bajeta maridel m.
Bajeta maridel m.
 
Villanueva, realyn p.
Villanueva, realyn p.Villanueva, realyn p.
Villanueva, realyn p.
 
Darlene joy garcia presentation
Darlene joy garcia presentationDarlene joy garcia presentation
Darlene joy garcia presentation
 
Empowerment technology Myrene B.Cantos
Empowerment technology Myrene B.CantosEmpowerment technology Myrene B.Cantos
Empowerment technology Myrene B.Cantos
 
God's grace. Lalaine Marasigan
God's grace. Lalaine MarasiganGod's grace. Lalaine Marasigan
God's grace. Lalaine Marasigan
 
Steven h. palaganas 2
Steven h. palaganas 2Steven h. palaganas 2
Steven h. palaganas 2
 
Chester anne mallari
Chester anne mallariChester anne mallari
Chester anne mallari
 
Mylene aganda..(1) (1)
Mylene aganda..(1) (1)Mylene aganda..(1) (1)
Mylene aganda..(1) (1)
 
Maridel m. bajeta
Maridel m. bajetaMaridel m. bajeta
Maridel m. bajeta
 
Travelogue riza villanueva
Travelogue riza villanuevaTravelogue riza villanueva
Travelogue riza villanueva
 
Robert john marasigan
Robert  john marasiganRobert  john marasigan
Robert john marasigan
 
Know jesus
Know jesusKnow jesus
Know jesus
 
Personal narrative
Personal narrativePersonal narrative
Personal narrative
 
Importance of y
Importance of yImportance of y
Importance of y
 
Steven palaganas
Steven palaganasSteven palaganas
Steven palaganas
 
Education
EducationEducation
Education
 
Friendship
FriendshipFriendship
Friendship
 
The meaning of being a mother
The meaning of being a motherThe meaning of being a mother
The meaning of being a mother
 
Jhielyn samarita
Jhielyn samaritaJhielyn samarita
Jhielyn samarita
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Zyra presentation

  • 1. Online safety, Ethics and security, Etiquette
  • 2. • Cybersafety-is the safe and responsible use of information and communication technology. -keeping information safe and secure,but also about being responsible,with that information ,being respecful of other people online and using good netiquette. Social Security number Credit card information Bank account number Personal Identification Stolen passwords
  • 3. Password your password should seem complicated to others but simple to you. Saving your identity You can create an identity theft report Internet security a process to create rules and actions .
  • 4. • Web Search tools Search Engines – search websites Web Dictionaries- compilation of site that helps a user to move in another area of topic. -hyperlink Data Base Engines Google scholar JSTOR Ebscohot Springer LISA
  • 5. Contextualized Online Search and research Skills.
  • 6. • Web Search tools Search Engines-consists of software that crowls the internet storing information about websites based on keywords and other. Web Dictionaries compilations of site by listed by tropical categories can help a user move from a general area of interest to more specific topic and eventually website best of the web dictionaries list websites categorized both by topic and by region.
  • 7. • Database Engines -a respiratory of reviewed journals and literature allows plain text searching and advanced Searching. Strategies Bodean Searching –uses commands (operators)such as AND or NOT Phrase and proximity Searching-Using qoutation mark allows you to search for a exact phrase. Truncation or wildcard functions truncation ,place a symbol at the end of the word so you search for variant endings for that word .Wildeard ,place a symbol within a word to find variatons on it.