0% found this document useful (0 votes)
80 views3 pages

Stem Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 3

E-TECH

ADWARE - When a person surfs the internet,


Internet - is defined as the information
adware is a sort of virus that displays unwanted
superhighway
advertisements. A valid technique of generating
Here are some tips to help you stay safe when advertising money that help fund development
using the Internet. is frequently included in many shareware or
freeware downloads. Some websites, on the
1. Be mindful of what you share and what site other hand, are tainted with dangerous adware
you share it to. that is downloaded to your computer
2. Do not just accept terms and conditions; automatically.
read it.
3. Check out the privacy policy page of a TROJANS
website. Trojans leave your computer vulnerable to
4. Know the security features of the social hackers, allowing them to steal any data on
networking site you use. your computer. Trojans frequently disguise
5. Passwords should not be shared with themselves as harmless computer programs in
anyone. Your password should be treated order for hackers to gain access to your
like a toothbrush. Allow no one to use it, computer without being detected by you.
and replace it every six months.
6. Logging into public networks/Wi-Fi is a bad VIRUS – one of the most talked about internet
idea. Hackers' ability to position themselves threats. Because viruses are designed to
between you and the connection point is propagate at an alarming rate, they usually
one of the most serious dangers to free attach themselves discreetly to downloads.
WiFi. As a result, instead of speaking Antivirus software is often attached to files for
directly with the hotspot, you send your data download, shares virus-infected email
to the hacker. Any information you provide attachments, or loaded onto computers via
or gain access to on these networks is gone CDs, DVDs, and USB sticks.
in a blink of an eye.
7. Do not talk to strangers whether online or WORMS – malicious email attachments or
face-to-face. USB sticks are the most common ways for
8. Never post anything about future vacation. worms to get onto a computer. When a worm
You are inviting the burglar to rob your infects your computer, it will most likely send
house at that date. itself to every email account on your machine.
9. Add friends you know in real life. Your email will appear innocent to the recipient
10. Avoid visiting untrusted websites. until they read it and find themselves infected
11. On your computer, install and update by the same worm.
antivirus software. To avoid conflicts, use
only one antivirus software. PHISHING – a type of fraudulent behavior in its
12. If you have a Wi-Fi at home, make it a most basic form. Official-looking emails
private network by adding a password. impersonating a well-known source, such as a
13. Downloading anything from untrusted bank, are frequently sent. It is the purpose of
websites is a bad idea. Malware can infect these emails to acquire people's passwords
your computer if you visit certain websites. and credit card information.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious SPYWARE – is another type of malware.
emails. Known as spyware, it is an all-encompassing
Internet Threats - the internet is an excellent internet ailment that is commonly associated
source of communication and information, with downloading file pop-ups. Spyware can
there are a lot of dangerous risks to be aware monitor your keystrokes, read, and destroy
of. When utilizing the Internet, here are some your files, reformat your hard drive, and access
of the hazards you should be aware of. your apps once it is installed on your computer.
Without your knowledge, the individual in
SPAM - Most of our email accounts come with charge of the spyware has access to your
a ‘Spam’ or ‘Junk’folder. Spam emails are a personal information.
huge issue, with more than 50% of emails
being syphoned into these folders. Aside from
being an annoyance, spam emails are not a
direct threat, but many can contain malware.
KEYLOGGERS – are similar to spyware, 8. If someone asks a question and you know
record a user's keyboard operations. The the answer, offer to help.
majority of keyloggers will hunt for easily 9. Thank others who help you online
identifiable key entries, such as bank card
numbers and passwords. Identity and
intellectual property theft are frequently tied to
keylogging.

PHARMING – a more sophisticated form of


phishing that takes advantage of the DNS
system. Pharmers frequently construct web
pages that look like those of a reputable
company, such as an online banking log-in
page. Users will then submit their credentials,
assuming they are logging in to their regular
service, and the pharmer will steal their
credentials.

ROGUE SECURITY SERVICE


This is a form of malicious software and
internet fraud that misleads users into believing
there is a virus on their computer and aims to
convince them to pay for a fake malware
removal tool that actually installs malware on
their computer.

NETIQUETTE – a short for "Internet etiquette,"


and it is a code of appropriate online behavior
that is similar to politeness in society. Email,
social media, online chat, web forums, website
comments, multiplayer gaming, and other
forms of online communication are all
examples of this.

While there is no official list of netiquette rules


or guidelines, the general idea is to respect
others online. Below are ten examples of rules
to follow for good netiquette:
1. Avoid posting inflammatory or offensive
comments online (aka flaming).
2. Respect others' privacy by not sharing
personal information, photos, or videos that
another person may not want published
online.
3. Never spam others by sending large
amounts of unsolicited email.
4. Show good sportsmanship when playing
online games, whether you win or lose.
5. Don't troll people in web forums or website
comments by repeatedly nagging or
annoying them. 6. Stick to the topic when
posting in online forums or when
commenting on photos or videos, such as
YouTube or Facebook comments.
6. Don't swear or use offensive language.
7. Avoid replying to negative comments with
more negative comments. Instead, break
the cycle with a positive post.
PAGBASA Pang-ugnay - Paggamit ng mga pangatnig
KOHESYONG GRAMATIKAL o COHESIVE upang makabuo o pag-ugnayin angisang
DEVICE pangungusap. Halimbawa: - Hindi sila
 Ang kohesyong gramatikal ay mga salitang nagtagumpay sa kanilang binabalak sapagkat
nagsisilbing pananda upang hindi hindi lahat ay nakiisa.
babanggitin nang paulit-ulit.
TALATA (PARAGRAPH) - ay binubuo ng isang
Panghalip pangungusap o lipon ng pangungusap na
Halimbawa: ito, dito, doon, iyon naglalahad ng isang bahagi ng buong
(bagay/lugar/hayop) sila, siya, tayo, kanila, pagkukuro, palagay, o paksang diwa.
kaniya (tao/ hayop)  Mauuri sa lokasyong katatagpuan nila sa
loob ng isang komposisyon.
Mga Panandang Kohesyong Gramatikal  Panimulang talata, talatang ganap, talata
 Pagpapatungkol ng paglilipat-diwa attalatang pabuod.
 Elipsis
 Pagpapalit o Substitution Panimulang Talata
 Pang-ugnay  Ito ang una at kung minsan ay hanggang sa
ikalawang talata ng komposisyon.
Pagpapatungkol - Paggamit ng mga  Layunin nito ang ilahad ang paksa ng
panghalip upang humalili sa pangngalan. komposisyon.
Dalawang Uri:  Sinasabi rito kung ano ang ipaliliwanag, ang
 Anapora- Panghalip na ginagamit sa isasalaysay, ang ilalarawan o bibigyan ng
hulihan bilang pamalit sa pangngalang nasa katuwiran.
unahan.
Halimbawa: Matulungin si Anna sa mahihirap
kaya’t siya ay pinagpapala ngPanginoon.
 Katapora- - Mga panghalip na
matatagpuan sa unahan ng pangungusap
bilang pamalit sa pangngalang nasa
hulihan.
Halimbawa: Siya ay hindi karapat-dapat sa
aking apelyido. Si Juan ay kahiya-hiya.

Elipsis - Pagtitipid sa pagpapahayag.


Halimbawa: - Pumunta si Erick sa tindahan at
bumili si Erick ng tinapay. - Pumunta si Erick sa
tindahan at bumili ng tinapay.
Pamalit o Substitution - Mga salitang
ipinapalit sa iba pang bahagi ng pangungusap
na naunang nabanggit.

Mga Uri ng Pamalit o Substitution:


Nominal - Pinapalitan ay ang pangngalan.
Halimbawa: - Ang wikang Filipino ay ang daan
upang tayo ay magkakaunawaan, kailangan
lang nating pagyamanin ang ating wikang
pambansa.

Berbal - Pinapalitan ay ang pandiwa.


Halimbawa: - Inaayos ni Tatay ang mesa at
sinimulan naman ni kuya ang silya
Clausal- Pinapalitan ay sugnay.
Halimbawa: - Hindi mahabol ng mga tao ang
magnanakaw at hindi rin nagawa ng mga pulis
na hulihin sila

You might also like