Digital Literacy Coirse

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 36

PRIMARY LEVEL

Looking at the test routine online from the wrong place, showing the flight or bus time at the wrong time, going to the
wrong place in the online reference and getting the wrong vaccine can cause considerable damage. So accurate
information is very important.

Information is the most valuable resource in today's world. Many big problems can be solved through proper use and
application of information. But one thing to be sure of first is that the information is “correct”. Just as right information can
solve big problems, wrong information can cause much bigger problems. As important as correct information is, false or
incorrect information is just as dangerous. Due to false or wrong information, people can be deceived, panic can be created
inside people, mental breakdown, social and political upheaval, conflict and even loss of life can happen, besides financial
loss, social degradation, many other problems can arise due to wrong information. As a result of the share. Therefore,
before publishing or sharing any information, you must be sure about the correctness of the information.

You must behave responsibly when you post or share any information on digital platforms. Before posting or sharing
anything, you should verify the accuracy and relevance of the information. In addition, it is necessary to think whether
there is any risk of this information sharing, whether it will cause any confusion, misunderstanding or conflict. Because you
have to bear all the responsibility if there is any mistake in the information given by you. Check other reliable sources and
news media to verify content before sharing or posting. Think about what objectives the content creator might have.
Creators may present false opinions as fact to further their own agenda when creating content. One has to think about
whether the content will have a negative impact on someone in the society or not. If you share or post something for
money, you are unintentionally harming society.

What is the browser?

Along with digital devices, if you have an internet connection, many things are at your fingertips. But there is some process
for this. Certain software or apps have to be used for certain tasks on the Internet.

For example, everyone has to register by going to this website https://surokkha.gov.bd to get corona virus vaccination. But
how to get to this web site? Where to write the address of the web site?

There is specific software for accessing different web sites. Before entering any website, the specific software must be
launched. Then through that software you can access the web site according to your needs.

The software or app used to access the internet is called a browser. Browsing is the process of searching a web site or
information using the Internet through a browser.

Google Chrome, Internet Explorer, Opera, Mozilla Firefox are examples of browsers.

What is a search engine?

Suppose, someone wants to register for the corona virus vaccination, but does not know from which website to register.
But he can find this information using the internet. There are certain websites or software for finding information from the
Internet, these are called search engines. Start any search engine and type “coronavirus vaccine registration” and search
https://surokkha.gov.bd/ this website will be found.
A software or app used to search for various types of information is called a search engine. Google, Yahoo, Bing Search are
examples of different search engines.

Search for information using search engines-

To search for any information using a search engine, open Google, Yahoo, Bing search or any other search engine by
browsing from any web browser such as Google Chrome, Mozilla Firefox or Internet Explorer on any digital device
connected to the Internet. After that, if you write the specific content to be searched in the text box of the search engine
and press enter or click on search, all the information about that content will come forward. If you write the content in
Bengali and search, all the Bengali information related to the content will come up. And if the content is written in English,
English information related to the content will appear.

Let's say, someone searched on Google by writing "Bangladesh tourist spots". Then Google will display all the information
about the tourist spots of Bangladesh on various websites and blogs. Google will display a list of multiple results based on
the three words “Bangladesh” “Tourism” “Spot”. And each of these three words is called keyword.

Searching for information using a browser-

Think, your district is Faridpur. There is a government website with all the districts of Bangladesh. The address of the
website of Bangladesh government about Faridpur district is http://www.faridpur.gov.bd.

Many people know this address, but how to see this website, how to get information, the solution to these problems can
be found through the browser.

To search for information using a browser, first start Google Chrome, Internet Explorer or any other browser. Then
http://www.faridpur.gov.bd in the address bar of that browser

Entering this address and pressing enter will take you to the specific website and all the information about the Faridpur
district website will be available.

Rashed is a fifth grade student of a school in the capital Dhaka. He likes to draw pictures. For the past few days, he has
been earnestly urging his mother to enroll him in an art school. Rashed's mother is eager to fulfill this wish of her son. But,
the problem is, it is difficult for a working mother to send Rashed to art school regularly. To solve this problem, Rashed's
mother enrolled him in an online institute that provides skillful training in fine arts and painting.

Rashed needs to connect to various online channels to participate in online classes, learn various class related information,
and submit homework. For example, one can view pre-booked art classes by connecting to the institution's website
account, attend regular classes using Zoom, submit homework using Google Classroom and maintain class communication
using WhatsApp. That is, by participating in this art class, Russell will have to use Internet-based services regularly.

Since Russell has never used Internet-based services before, Russell's mother advises him to take some precautions when
using the Internet and to avoid certain activities. For example-
1. Keep personal information limited and secure: Rashed's mother warns him against sharing personal information such as
photos, videos, home address, educational institution, family income, etc. while communicating with strangers.

2. Keeping privacy settings on: As Rashed will be using communication media like WhatsApp, email, so mother advises
Rashed to keep privacy settings on. Keeping privacy settings on prevents personal information from being leaked to
strangers.

3. Safe Browsing: Many types of tempting offers come from unknown sources at various times. These often become traps.
For example, hackers encourage people to click on malicious links with various tempting offers. Hence, do not click on any
links from unknown sources to ensure safe browsing.

4. Be careful while downloading anything: Rashed may need to download apps, information, images, videos for various
online tasks. Before downloading anything, it is important to read reviews about it. Rashed can take help from his teacher,
parents or family members if necessary.

5. Caution in Sharing: Before sharing any information, Rashed should first verify the authenticity of the information and
check whether the source of the information is correct and reliable.

6. Caution in Mixing with Strangers: Internet is the easiest way to come in contact with different people. Mischievous
people therefore keep finding new fraud traps on the Internet. Rashed must first be sure of the person's reliability and
intentions before becoming intimate with someone on the Internet.

7. Using anti-virus software: To avoid the harmful effects of various internet viruses, users must use an anti-virus software.

In the light of the mentioned cautionary advice, the prohibited activities for Rashed are –

1. Disclosure of personal information to anyone, whether known or unknown.

2. Sharing your personal information in places with public access.

3. Stepping into a tempting trap from an unsafe source. Especially clicking on unsafe links and attachments.

4. Downloading information, images, videos or apps from unknown, unregistered and dubious sources.

5. Not verifying the authenticity and accuracy of the source before sharing anything.
6. Socializing online, being intimate with strangers, etc.

Fact 1: Diva shared a beautiful picture of her online with everyone. 2 days later his girlfriend Tuli told him that she had seen
a picture of Diva on an account with a different name. Diva got very scared and hurried home.

Case 2: Ratul is in class IV. To do online classes, with the help of his elder brother, he created a Facebook account using a
very simple password, so that he would not forget the password later. After 2 weeks all of a sudden he can't access his
account anymore.

Incident 3: Chaiti took her father's mobile phone and went for a walk on the roof with her siblings. He left the phone on a
table while playing. When he returns home, he searches for the mobile phone and cannot find it. Chaiti has lost her father's
phone.

In Case 1 and Case 2, Diva and Ratul are exposed to online risk. And in scenario 3 there is a possibility of stealing data from
Chaiti's father's phone.

If you ever think you have been the victim of an online risk (eg account hacking, phishing, data theft), the first thing to do
is to tell your parent. Then do what needs to be done with their help.

We have already learned about the different types of online risks. Also know how we can be careful. Still we can read many
situations where you have to discuss with your guardian and take decision without taking decision by yourself.

Besides, many times we use the internet for various online tasks. Many types of complications can occur while doing all this
work. Then to solve those complications we should first approach the parents and ask them for help in these matters. This
should not be hidden or avoided in any way. It may increase the possibility of hazard/risk.

You must have heard the words internet and smartphone before. Some of you may be using them at home. Nowadays
people are using this internet and smartphone every day in some way or the other. Because their use has made people's
lives much easier. And so people's inclination towards internet and smartphones is increasing day by day.
Let's start by knowing what we mean by internet and smartphone. The Internet is a vast repository of information. It is not
visible to the eye. All the computers in the world are connected to each other through a special process of wire to form this
internet. On the other hand, a smartphone is a special type of mobile phone that can be used to communicate and perform
a variety of complex tasks that cannot be done with a normal mobile phone. For example: using the Internet, sending
emails, watching videos on YouTube, finding directions, composing texts, using as a remote, etc.

Smartphones have various apps/applications for various tasks. As the demand for these different types of apps is increasing
among people, so are the risks of using them. If we do not take some precautions before downloading any mobile
application, then all the information stored in the mobile (such as pictures, phone numbers, etc.) may be stolen, and
various accounts used in the mobile (such as Facebook, WhatsApp, email) may be hacked. So we must follow these
precautions while downloading the app

(1) If we search with the name of the app we need in the Google Play Store or the App Store, many apps with the same
name may come up. In this situation, if we read the opinions (reviews) and description (description) of other users on the
app with the help of parents or someone experienced, then we can easily understand which one is real. However, many
apps may contain fake and inaccurate reviews. So while reading reviews we must try to understand which reviews are true
and which are false with the help of our parents or someone close who understands the matter well.

(2) While downloading any app, we must activate the updated anti-virus on the mobile with the help of parents or
experienced relatives.

(3) Other software or files may be downloaded while downloading free apps. Therefore, we will delete unnecessary
software and files after discussing with parents or experienced relatives. Under no circumstances will I install them on my
mobile.

(4) Before downloading any app, it is more likely that the app is genuine if it says "Editor's Choice" or "Top Developer" on
the Google Play Store or App Store description page. So we will keep an eye on this. Also, I can be more sure whether the
app is genuine or not by logging in to the website of the developer (company/person) who created the app with the help of
elders.

(5) An app that when installed on a mobile device seeks to access unnecessary information other than the purpose for
which the app is downloaded (eg, if a calendar app is installed unnecessarily accesses the mobile camera, microphone or
image) then that app is fake and risky. More likely to happen. We will refrain from installing such apps.

Terms of Use of Zoom App:

If you want to use Zoom Up on your Android phone, then you need to download the app. For this, first you need to go to
the Google Play Store and search for Zoom app. The app can be downloaded for free from there.

And if you want to download Zoom on desktop computer/laptop then you can download it for free from this link
https://zoom.us/download. Free users can participate in meetings or classes for up to 40 minutes continuously using the
Zoom app.
After downloading and launching the Zoom app, you will see a few things in front of you. That is - join a meeting, host a
meeting, sign in, sign up. Suppose, your teacher has already informed you that tomorrow morning you will have an online
class via Zoom app. So, you have to use the Zoom app to take classes. Remember, your teacher will provide a link or
specific ID and password to add students to the class. You can participate in the class by entering the link or by going to the
'Join a meeting' option in the Zoom app with the specified ID and password. In this case, the permission of the host teacher
will be required to participate in the class. You can participate in the class even if you don't have a Zoom account.

If you need to use the Zoom app regularly for classes or meetings, you can sign up and keep a Zoom account. In this case,
to open a new account on Zoom, you need to provide some necessary information by clicking on the 'Sign Up' option. Like
your name, date of birth, email address etc. After filling in the required information, a confirmation link will be sent to your
given email address which will say Active Your Account. After entering the link and setting a password, the account opening
will be completed. Make sure you remember the password. Later, if you want to access your Zoom account, you can go to
Sign in and enter your Zoom account with your email address and password.

Rules for using Google Meet:

In case of participating in the class using Google Meet, your teacher will provide a link to add the students to the class. If
you want to join the class through desktop computer or laptop then click on that link. If the teacher gives permission, you
can directly enter the Google Meet classroom. Or, the teacher will assign a meeting code to the student. Students should
go to this link https://meet.google.com/ click on Join a meeting and press enter using the meeting code provided by the
teacher. After that, you can enter the classroom only if the teacher gives permission.

If you want to download the Google Meet app on your Android phone, you can find the app by going to the Google Play
Store and searching for the name Google Meet App. The app can be downloaded for free from there. Classes can be
accessed by entering the code at the specified location by launching the app and entering the Join A meeting.

And if you are logged in to a Gmail account, then Google Meet can be used through that account. No need to sign up
separately and open a new account.

Thus, you can easily participate in online class activities using Zoom or Google Meet.

Do you like to play games on your parents or older siblings' mobile phones? to play games

Did you waste more time? Do you sit in front of the computer for a long time?
If this answer is "yes", then that mobile device can be a cause of harm for you. As the use of various technologies like
mobile phones increases in today's world, a new debate is going on, that is - is this technology a blessing for us? Or curse?

This debate has gained momentum with the subsequent prosperity of technology. In fact, anything in excess is harmful. If
any digital device is not used properly or if it is used for an extended period of time, the user may suffer various types of
damage. Excessive use of mobile phones and computers has various health risks. Even terrible problems like cancer can
start from here. Excessive use of digital devices can lead to problems such as:

Health risks of excessive use of mobile phones:

(1) Inattentiveness: A study found that people who are busy with their phones all the time, react to any emergency later
than others. Most of the times, mobile phone distracts us from any work. As a result, it takes us much more time than
usual to do any work.

(2) General illness: You are busy with your favorite phone most of the time. Dust accumulates in it; Along with many
diseases and germs. Maybe while using a mobile phone while eating, about 20 to 30 percent of bacteria and viruses from
this device entered your body with food. You may not get sick right away, but these things are responsible for any sickness
later on.

(3) Eye problems: Using the phone too close to the eyes for a long time can cause headaches, eye pain, blurred vision, etc.
This is because most of the children of your age are addicted to mobile games, cartoons. That is why they are more likely to
have eye problems.

(4) Mental problems: Radiation from mobile phones reduces the amount of melatonin (a hormone that helps sleep) in
the brain, resulting in disturbed sleep of the user and various mental problems. In addition, it is now scientifically proven
that various complex diseases like insomnia, Alzheimer's and Parkinson's occur due to the electromagnetic waves emitted
from mobile phones.

(5) Heart problems: According to research, the radiation generated from mobile phones disrupts the normal functioning of
the human heart. As a result, the hemoglobin in the red blood cells gets separated. In addition, hemoglobin is not
produced in red blood cells but is produced elsewhere in the body. This causes various physical problems.

(6) Loss of hearing: People who talk on mobile phones for a long time are at risk of various ear problems such as hearing
loss. Children involved in listening to loud music, watching cartoons, playing games on mobile phones for more than 2-3
hours a day are at risk of becoming partially deaf.

(7) Brain cancer: Radiation from mobile phones can slowly kill our brain cells or its wireless waves heat up our brain cells.
Therefore, excessive use of mobile phones increases the risk of brain cancer.
Do you just sit in school and study from books? Just learn to study from your school teacher? Do you study from anywhere
else? For most of you, the answer would probably be 'yes'. Because, in this corona situation, many of us have studied in
different ways with the help of internet.

Basically, internet usage has improved our living process in various ways. Internet is greatly helping in various necessary
tasks. For example, giving serials to doctors, long-distance communication, buying and selling of necessary things, etc., we
now do important tasks with the help of the Internet. The teaching-learning process has undergone a radical change thanks
to the internet. That is why we will now know how we can continue our studies through various websites and apps with
the help of the internet.

Come on, then we know which apps or websites we can study with the help of. Or, we can find solutions to any problems
related to our studies.

First, let's know about some educational apps.

1) Ten Minute School:

This app has some funny videos for small learners like you. Videos make learning the content in your textbooks more fun
and interesting. You have to go to the Google Play Store from your Android mobile and search for '10 Minute School -
Online Learning Courses' to download the 10 Minute School app. Or, you can download the app by visiting this link
https://play.google.com/store/apps/details?id=com.a10minuteschool.tenminuteschool. And if you are using a desktop or
computer, then you can access the Ten Minute School app by accessing this website - http://10minuteschool.com/.

2) Epic! (Epic!):

But now we don't just study with books in hand. We can also read books online through digital devices. There is a great e-
book library app to read such a wide variety of books together. It has a collection of more than 10,000 important books;
Which is basically made with you in mind. You can enrich your knowledge base by reading different types of books by using
this app. Again, there are many educational videos here, watching these videos can also increase the range of knowledge.

3) Various apps for learning new languages:

All of you can speak Bengali properly, right? Do you want to learn any language other than Bengali?

If so then there are some fun apps for you. Through which you can learn a new language very easily. For example -
Duolingo (Duolingo: language lessons) you can download the app from the Play Store and learn the language at your own
time and according to your choice.

4) Quick Math
Quick Math is a very popular app for kids to help them acquire numerical and mathematical skills. Generally, this app plays
an effective role in imparting mathematical concepts to young students. You can easily download this app from the app
store and become proficient in math by solving fun math problems.

5) Science 360

This app provides fun information about science to children through pictures and videos. If you use the app, you will
constantly know the new information of science.

6) Kids Paint

Children can learn to draw and color through this app. At any time you can enter this app and draw as you like very easily.

7) ABC Songs: Nursery Rhymes, Poems, Children's Learning

This app is very useful for children to recognize letter shapes, introduce different new words, teach alphabet. Kids can
easily learn alphabet letters with fun through songs. At the same time, you can learn some funny rhymes and songs.

Some educational websites

1) Curious World (www.curiousworld.com)

One of the most fun websites for kids is Curious World. This website is very useful for teaching children some essential age
appropriate education through play. Children can easily access the service by accessing this website.

2) Geography website (https://kids.nationalgeographic.com/)

Through this website, children can learn new things about the world around them through various videos and various
games.

3) ABCMouse (https://www.abcmouse.com/)
Children aged 2-7 can read or listen to books and music, play games and color through this website. This is one of the best
websites for kids to learn new words.

4) Funbrain (www.funbrain.com)

This website improves math and reading skills through games. It also offers a variety of games, books and videos and much
more.

5) Khan Academy (www.khanacademy.org)

Khan Academy is a popular website for teaching anyone, anywhere for free and has tons of videos on every subject for
students of different age groups. There are also a variety of exercises so that children can self-assess their learning.

6) Funology (www.funology.com)

This website contains lots of fun facts, jokes, riddles and even various fun recipes. For children to spend their free time in a
fun way

whats app

One of the most used apps by billions of people around the world is WhatsApp. More than two billion people in 180
countries use WhatsApp. The app can only be used with a smartphone or computer, with an internet connection.

To use the app through the smartphone, after downloading the app from the Play Store or App Store, you have to create
an account with your name and phone number. For use on a computer, the web version of the app must be opened from
the Internet browser. By opening the phone's WhatsApp app, clicking on connect device and scanning the QR code on the
computer, it will be connected.

To contact any new number, that number must be saved in the phone book first. Audio and video calls can be made on
WhatsApp. Both text and audio messages can be sent here. Any photo or video can be shared. Communication between
like-minded people can be maintained by opening different groups.

the messenger

Messenger is Facebook's messaging app. Messenger has two apps. One of them is Messenger and the other is Messenger
Lite. The lite version of Messenger uses less storage and uses much less data services.
What is required to use Messenger app is a smartphone or computer, internet connection, Messenger app or internet
browser. After downloading and installing the messenger app, you can login with email or phone and password. Here you
can make audio and video calls. Both text and audio messages can be sent. Any photo or video can be shared. By opening
groups, communication between like-minded people can be maintained.

Advantages of Facebook Messenger:

No phone number is required like WhatsApp app. It is possible to contact everyone without knowing anyone's phone
number only through this app. Notifications can be turned off. If desired, the notification of a particular person or a group
can also be turned off. Different games can be played with friends. Can be logged out. Even if you close Facebook or keep
your account inactive (de-active), you can keep in touch through Messenger.

Disadvantages of Facebook Messenger:

Security and privacy of information are not guaranteed. Perhaps the biggest complaint against Facebook Messenger is
business promotions using personal information. For example, you may see an ad for a watch on Facebook after talking to
a friend about buying a watch on Messenger. This is because as soon as you show interest in buying a watch, Facebook
knows you need a watch. As a result watch ads are coming in front of you!

imo

Imo is a popular communication app in Bangladesh. In Bangladesh, especially expatriate family members use this app more
to communicate abroad. This app has been used by many people since it was the first to have the option of video calling.
Although Imo has the ability to send text messages, many people know this app only as a video calling app. A smartphone,
internet connection is required to use the emo app.

Advantages of emo

Stickers and emojis can be used. Can block someone who is unfamiliar or abusive. When calling someone it will show
'Ringing' if they are online and 'Calling' if they are offline. Using imo requires very less memory space. Files up to 10GB can
be shared.
Disadvantages of emo

Any unknown number in IMO can automatically connect to your phone. Cannot share location through imo. Shows too
many ads which is annoying. No end-to-end encryption security measures. Your number may go to some other unknown
person. Anyone can make video and audio calls to you. There is no way to distinguish unknown messages. IMO comes with
a lot of unnecessary notifications that will distract you.

Data Security in IMO

Since there is no end-to-end encryption system and the possibility of receiving unwanted calls, messages, and other
people's numbers automatically, Emo's security system is not very convenient.

Important Links

Bangladesh National Portal

Bangladesh Parliament

ICT Division

Bangladesh Computer Council (BCC)

Unicef

Ekshop

About Us

Youth

Student

Teachers

Learners

Partners

News

Suppose you could not go to school one day due to illness. That is why you do not know what has been taught. What will
you do then? Then you will find out which of your classmates by calling your father/mother's mobile phone, right? So, how
important is a phone call for everyone! You quickly learn what is taught in the class.
Again, suppose you want to inquire about a relative who lives in another city. Even then, you call him on the mobile phone
and inquire about it. That is, we make phone calls to contact someone for various needs or to find out about the welfare of
someone who is far away.

There are certain rules that we must follow to make this phone call.

1) All mobile phone users have their own mobile number. You can talk to him only by calling that number. That's why we
can save the phone number of the people we know who have mobile phones by going to the option to call the phone and
entering the number in 'New Contact' and writing his name (Save). Then, later you can easily go to Contact and search that
name and call.

2) Suppose, you are out of school but your father or mother did not come to pick you up. Then you can request your
teacher and call your parent or guardian through the teacher's phone to find out why they haven't arrived yet. That's why
you always keep their mobile number with you or memorize it. Then, you can contact them with any mobile phone for any
need.

3) Many times calls may come to the mobile phone whose number is not saved in the phone; That is, a stranger can call on
the phone. In this case, you should give the phone to the elders so that they can talk. If there is no one around then we will
receive the phone call with a polite salam/adab. If you know who the person is then there is no problem, but if you don't
know his identity but don't say anything unnecessary and leave the phone. Please note, we will never share your personal
information in this case. If you call again, you do not need to pick up the call and you must inform your guardian
afterwards.

4) Take care not to disturb someone by talking unnecessarily on the phone. For example, you can call your classmate and
discuss your homework with him, but be careful not to take up time with other stories.

5) Suppose you call one of your relatives to inquire about him. When calling, he is not answering the phone. In such
situation we will not call again but wait for his call. Because he may be busy with some important work. Again, similarly if
someone hangs up, we will not disturb him by calling him again. When they have time, they will call you and talk to you.

6) Never disturb anyone by intentionally or jokingly calling wrong numbers. The person you call may be doing something
urgent; As a result, your prank call may disrupt his work. And if you forget to call a number, then politely say sorry to him
and leave the call.

7) Can memorize some essential numbers, which are very important in our daily life.

For example- 999; This is the national emergency service number. Emergency police assistance, ambulance and fire service
assistance are available by calling this number. No money will be required to call. Another number is 16263. Any
information related to health can be known by calling this number. If someone in your house suddenly falls ill, you can call
this number and get quick service.

Later you will know some more such numbers.


Important Links

Bangladesh National Portal

Bangladesh Parliament

ICT Division

Bangladesh Computer Council (BCC)

Unicef

Ekshop

About Us

Youth

Student

Teachers

Learners

Partners

News

SECONDARY LEVEL
Due to online scams, this medium has not yet become a trusted medium for many. No one will be interested in buying
something without knowing it, without seeing it, unless there is a guarantee of safety. Many of you may have been a victim
of fraud while doing online transactions. Let's know some such events -

1. Suppose you have placed an advance payment to buy something from an online shop, but the product has not been
shipped. Or after ordering from an online shop asked to pay the price in advance from there. After confirming the order
and sending the money, the shop owner's number is available. Many people have had such experience in Bangladesh.

2. Have you invested a lot of money or bought a product on an e-commerce website but they are not giving you any
product or money. In such sites, products are bought and sold with many benefits or discount offers, and since everyone's
products are given properly in the beginning, both the customer and the seller are greedy and invest a lot of money. Many
people borrow large sums of money and start the business of buying products from these e-commerce sites and selling
them in the market. But after a few days their cheating got exposed. Many sellers don't get paid for their sales. Customers
do not receive products.
3. After providing financial help for someone's treatment or any other emergency, if you find out that the money has been
taken by lying. Financial help is often seen on Facebook or other social media. Here are some account numbers through
which the aid money can be sent. But many of these are fraudulent money making schemes. It is important to be careful of
them. It is better to check in this case. These numbers should be checked by phone or if possible by yourself and then help
should be sent.

4. By sending a link to the name of a known company, it is said that if you click on it and answer the quiz, you will get such
a percentage offer or such a discount from this company. After clicking the account got hacked. A few days ago a link was
being circulated with the name of a super shop where an offer of 2000 taka or more than 20% was mentioned. Enter this
link and answer the quiz and send this link to 20 people. If you click on such a link, there is a possibility of hacking the
account. So be careful.

5. Transferring money from the account with OTP saying that the mobile banking account has been closed over the phone.

You may have heard of scams like Bikash Cash or Rocket Account Block. Large amounts of money are transacted in mobile
banking accounts and such fraudsters will be noticed. They will try to convince you by phone that they have called from
Mobile Banking Authority office. Your account has been blocked. Now they will send OTP or code which if you don't give
them the account will not be active anymore. Money transactions will not be possible. The work is done in such a way that
people fear their words and give OTP.

6. Scams are done by talking about various online jobs. For example, many times you will see just a few clicks to win 500
taka or a good paying job at home. Many such fake job advertisements range from account hacking to financial fraud.

7. Many of the sites where we provide account information to purchase various online services are phishing sites. If you do
not recognize these sites and provide personal information to them, you will lose control of your account. Hacking social
media accounts by sending spam links like this is very rare.

8. Do many purchases from different Facebook pages. Many times it is seen that the product that you have paid for has
been sent instead of the product. There are examples of many Facebook pages disappearing after taking money. So it is
safe to buy from the places where the facility is available which will pay after receiving the product.

What is the browser?


Along with digital devices, if you have an internet connection, many things are at your fingertips. But there is some process
for this. Certain software or apps have to be used for certain tasks on the Internet.

For example, everyone has to register by going to this website https://surokkha.gov.bd to get corona virus vaccination. But
how to get to this web site? Where to write the address of the web site?

There is specific software for accessing different web sites. Before entering any website, the specific software must be
launched. Then through that software you can access the web site according to your needs.

The software or app used to access the internet is called a browser. Browsing is the process of searching a web site or
information using the Internet through a browser.

Google Chrome, Internet Explorer, Opera, Mozilla Firefox are examples of browsers.

What is a search engine?

Suppose, someone wants to register for the corona virus vaccination, but does not know from which website to register.
But he can find this information using the internet. There are certain websites or software for finding information from the
Internet, these are called search engines. Start any search engine and type “coronavirus vaccine registration” and search
https://surokkha.gov.bd/ this website will be found.

A software or app used to search for various types of information is called a search engine. Google, Yahoo, Bing Search are
examples of different search engines.

Search for information using search engines-

To search for any information using a search engine, open Google, Yahoo, Bing search or any other search engine by
browsing from any web browser such as Google Chrome, Mozilla Firefox or Internet Explorer on any digital device
connected to the Internet. After that, if you write the specific content to be searched in the text box of the search engine
and press enter or click on search, all the information about that content will come forward. If you write the content in
Bengali and search, all the Bengali information related to the content will come up. And if the content is written in English,
English information related to the content will appear.

Let's say, someone searched on Google by writing "Bangladesh tourist spots". Then Google will display all the information
about the tourist spots of Bangladesh on various websites and blogs. Google will display a list of multiple results based on
the three words “Bangladesh” “Tourism” “Spot”. And each of these three words is called keyword.

Searching for information using a browser-

Think, your district is Faridpur. There is a government website with all the districts of Bangladesh. The address of the
website of Bangladesh government about Faridpur district is http://www.faridpur.gov.bd.
Many people know this address, but how to see this website, how to get information, the solution to these problems can
be found through the browser.

To search for information using a browser, first start Google Chrome, Internet Explorer or any other browser. Then
http://www.faridpur.gov.bd in the address bar of that browser

Entering this address and pressing enter will take you to the specific website and all the information about the Faridpur
district website will be available.

Maria, a 12th grade student, saw a friend's post on Facebook one afternoon in 2018 and found out that 'Mr. Popular British
actor Rowan Atkinson of 'Bean' fame has died. Grieving the death of her beloved star, Maria collected some photos of
Rowan Atkinson from Google and posted a post in memory of Rowan Atkinson with some emotional words, without
verifying the information. The post went viral instantly and within hours the post reached millions of people across the
country and abroad. And by chance it reached Rowan Atkinson.

An embarrassed Rowan Atkinson went live from his account to correct everyone's mistake. This exposes the falsity of false
information. Maria realizes that it is very important to identify false information spread on social media. Knowing and
implementing the correct methods of reporting these false information to the appropriate authorities will help reduce the
spread of false information through social media. Also, it will save you from many unwanted problems.

If you don't want to fall into such an embarrassing situation like Maria, you need to know the ways to identify fake
information. For example-

1. Verifying the source – Fake news headlines spread on Facebook or other social media may attract you. But as soon as
you are attracted to various colorful headlines, you must verify the source before sharing them.

2. Take Google's help for verification - It is wise to verify the authenticity of any information before spreading it. In this
case, you can verify the authenticity of various information with the help of Google or other search engines.

3. Verification of Evidence – By verifying various evidences one can be sure about the truth of the information. In this case,
it must be confirmed by verifying reliable sources, news media and sources of information.

4. Take a break – The most important step when it comes to spreading information, reacting to it or expressing an opinion
on the internet or online is to 'take a break'. It is easier to protect personal image by taking a moment to think before
reacting immediately. By doing this, some time is also available to collect the correct information on the concerned subject.

It is possible to detect fake information by verifying the authenticity of the information with the help of the mentioned
steps. Besides, it is characteristic of a conscious citizen to report any false information to the proper authorities. False
information can be reported to the appropriate authorities with the help of the following steps. The steps are to be
followed sequentially. For example-
1. Click on the three-dot icon ( … ) to the right of the post, image, or information you wish to report as false to the
appropriate authorities.

2. Now a dialog page will appear on your screen where you can save, hide, report the post, image or information.

3. You have to select the 'Report Post' option.

4. As a result, another new dialog page will appear on your screen where different categories will be given as reporting
options.

5. Choose the 'False Information' category from the given categories.

6. As a result another new dialog page will appear on your screen. There the process will be completed by selecting the
'Finish' option.

One of the most common problems faced by Internet users is forgetting their passwords. Having different passwords for
different media not only ensures the security of the account, but also increases the chances of forgetting the password
many times over. Moreover, password changes are often required for security reasons or for emergency purposes. It is
important to remember the old password to change the password. In this case, if you forget the old password, then you
have to recover it. Hence, internet users need to know the password recovery procedures.

What to do if you forget your Google account password:

Google is one of the most important websites and apps used by internet users. A Google account is also required to open
accounts on various social media platforms including Facebook, YouTube or Instagram, use G Suite (Google Forms,
Spreadsheets etc.) or join Google Classroom. Again, Google is most used for exchanging 'email' which is one of the most
important internet based communication systems. So it is very important to know what to do if you forget your Google
account password. What to do if you forget your Google account password –

1. First, go to the 'Gmail Sign-in' page and select the Forgot Password option.

2. Google will ask you for a 'recovery email address' (the email address to which the password recovery code will be sent).

Incidentally, the recovery email address should usually be added at the time of opening the email account. Along with the
recovery email address, the recovery mobile number can also be attached.

3. In the next step, Google sends a 6-digit code to the recovery email address. It can be used to reset the password.

What to do if you forget your Facebook account password:

Facebook is the most popular social media used by internet users. For connecting with friends, following the lifestyle of
your favorite celebrities, shopping online or expressing yourself, Facebook is full of pairings. Apart from this, there is a lot
of awareness creation using various group-pages. Facebook has been doing the work of knowing and spreading the
opinions of people from all walks of life quite amazingly. However, due to the free movement of various third party apps,
your important information may be exposed from Facebook, account hacking may happen. Therefore, it is very important
to know what to do if you forget or lose your Facebook account password. What to do if you forget your Facebook account
password –
1. First, enter the 'Facebook Log-in' page and select the Forgot Password option.

2. Now the user's email address or mobile should be placed in the form given on the screen.

3. A code will be sent to the given email address or mobile number.

4. You have to select your account on the screen.

5. You can change the password using the code.

Ever walked along the river or on the beach?

While walking on the river bank or beach, you must have noticed your footprints on the soft sandy beach or the soft mud
of the river bank?

Every step or action you take on the Internet can thus create an imprint or footprint. This phenomenon is called digital
footprint. A digital footprint is all the information you leave about yourself due to various activities on the Internet (such as
sharing photos and posts on social media, using various apps, emails, and websites).

Search history in your browser (search history), sent messages (including deleted messages), photos and videos (including
deleted ones), photos tagged by friends, reacting or commenting on social media, and browsing history of various
websites, etc. Digital footprints or belongs to the footprint.

Digital footprint can be of two types. For example-

Direct Footprint – A direct footprint refers to all information that is created as a result of your active activities. For
example, the footprint created by reacting or commenting on social media.

Indirect Footprint – Indirect Footprint refers to all the information that remains without your knowledge while using the
Internet. For example, your browser history.

Being aware of the digital footprint is very important. It ensures the safety of internet users, personal dignity is intact
through social media, the possibility of losing sensitive information is reduced. It is possible to be aware of your footprint in
the digital environment by taking various steps. Analyzing the steps shows the importance of being aware of the digital
footprint. For example-

1. Delete or disable unnecessary accounts created for shopping or social networking. This will reduce the chances of losing
any information about your past work or personal moments.
2. Delete your necessary, personal and sensitive information from sites that collect or store information. It is best not to
use such sites at all. Through this, various third parties, hackers or unscrupulous advertising companies will not be able to
reach you.

3. If any personal information such as social security number, bank account number, credit card information is provided on
a website in case of emergency, all such information should be deleted from the website as soon as the work is completed.
This will reduce the chances of fraudsters gaining access to your sensitive financial information.

4. Don't log in to any third party apps using Facebook. We use services from third party apps for various reasons. Facebook
is widely used to log in to these apps. But, this is a harmful habit. As a result, your Facebook account login information may
be exposed.

5. After all, it is possible to control footprints by sharing controlled amounts of information through social media. This will
reduce the possibility of private moments being leaked.

With the development of communication media, communication between us has become much easier. It has become
easier to come to the same platform and participate in any work. The boundaries of familiar people have grown, as well as
communication with many strangers has increased every day thanks to various social media. Parallel to our personal lives is
another life developing where our personalities are shaped by our interactions with people through digital media.

In our society, people of different opinions, beliefs, ideals live side by side and they all promote and express their own
beliefs, ideals through digital media. The beauty of diversity in this society is also reflected in digital media. However,
communication between people in society is very different from digital communication.

First, we don't see the man here.

Secondly, under the cover of digital media, we can often do or say daring or daring things that we might not be able to do
in real life.

Thirdly, although it is not so easy to talk to someone in real life, this communication has become much easier through
digital media. Contacting the desired person has become easy. Even reaching someone's inbox easily without face to face.
Apart from good use of this opportunity, many people are also misusing it. And you can call it digital media.

It is important to maintain mutual respect through digital media despite differences. Many of us have read, heard or know
a word called 'Tolerance'. This word means to be respectful of the opposing views of others. Everyone grows up in this
society with different personalities, different beliefs and thoughts. If you can respect everyone's difference of opinion, if
you can maintain mutual respect even after arguing, many problems will be solved. Many complications can also be
avoided. Because we have to live with people who are against us.

Importance of showing mutual respect through social media:


1. Peace of mind will prevail

Disagreeing or agreeing through digital media may not have much impact on our normal life. In that case, if you stay in
conflict with others all the time here, it will create mental turmoil, which will affect your personal life. Maintain peace, not
intolerance.

2. It will help people to understand

Having good relations with people of different opinion without creating enmity will give a good impression about the
people of this society. If you only go with your like-minded people, you will get stuck. If you want to understand the mind
of the person who is against your opinion, it is important to have a good relationship by understanding the reason of his
opinion. If you know the reason behind this opinion, you will see that hatred has reduced.

3. Everyone has their own belief, culture is best, opinion is right

You think others are stupid, your own culture, beliefs are the best. People of more or less all faiths think the same way.
That is why it is better to co-exist with each other than to conflict with anyone for this matter. You will definitely not like it
if someone says something against your beliefs. Same goes for others.

4. Attracting people will be easy

Suppose you think you are promoting a good idea or statement. In that case, speaking respectfully to people of different
faiths may encourage them in your campaign. But if you try to talk down his beliefs, his attitude towards you will be bad in
the beginning.

5. Create a positive self-identity

By showing respect or respect for people's religion, gender, skin color, ethnic identity or any other diversity, uniqueness
and difference, we create a positive identity in the digital world, through which others also create a positive perception of
us. Not only that, through this we can rise above various narrowness and become more generous and tolerant. As a result,
self-acceptance is created in others as well.

6. You can get help in case of emergency

Along the way we have to seek help from many people who do not share our beliefs or opinions. That's why you don't
reduce the boundaries of your acquaintance by destroying mutual respect.

7. Maintain mutual unity

In this country, people of different beliefs, religions and cultures live side by side, but they are all people of the same
country. It is good for the country to maintain unity among themselves. If we create discord and spread hatred due to
differences of opinion, then in real life also this hatred will create conflict.

8. There may be disagreement, respect

Disagreement on various issues is very normal. Logical arguments can also be done respectfully, without personal attacks,
without disrespect. If you maintain this respect, you will find that you will develop a good relationship even with those with
whom you disagree.

9. Victims of conflict through digital media

In the past few years, there have been incidents of attacks on religious institutions and houses of many people due to
online arguments and outrage. Aren't you instigating this attack by expressing mutual disrespect?

In fact, the diversity of belief and culture in Bangladesh is a very beautiful thing. This matter should not be used to spread
any kind of hatred. This country belongs to everyone. Therefore, it is not possible to move forward without the coexistence
of all.

Maria, a 12th grade student, saw a friend's post on Facebook one afternoon in 2018 and found out that 'Mr. Popular British
actor Rowan Atkinson of 'Bean' fame has died. Grieving over the death of her beloved star, Maria collected some photos of
Rowan Atkinson from Google and posted a post in memory of Rowan Atkinson with some emotional words, without
verifying the information. The post went viral instantly and within hours the post reached millions of people across the
country and abroad. And by chance it reached Rowan Atkinson.

An embarrassed Rowan Atkinson went live from his account to correct everyone's mistake. This exposes the falsity of false
information. Maria realizes that it is very important to identify false information spread on social media. Knowing and
implementing the correct methods of reporting these false information to the appropriate authorities will help reduce the
spread of false information through social media. Also, it will save you from many unwanted problems.

If you don't want to fall into such an embarrassing situation like Maria, you need to know the ways to identify fake
information. For example-

1. Verifying the source – Fake news headlines spread on Facebook or other social media may attract you. But as soon as
you are attracted to various colorful headlines, you must verify the source before sharing them.

2. Take Google's help for verification - It is wise to verify the authenticity of any information before spreading it. In this
case, you can verify the authenticity of various information with the help of Google or other search engines.

3. Verification of Evidence – By verifying various evidences one can be sure about the truth of the information. In this case,
it must be confirmed by verifying reliable sources, news media and sources of information.

4. Take a break – The most important step when it comes to spreading information, reacting to it or expressing an opinion
on the internet or online is to 'take a break'. It is easier to protect personal image by taking a moment to think before
reacting immediately. By doing this, some time is also available to collect the correct information on the concerned subject.

It is possible to detect fake information by verifying the authenticity of the information with the help of the mentioned
steps. Besides, it is characteristic of a conscious citizen to report any false information to the proper authorities. False
information can be reported to the appropriate authorities with the help of the following steps. The steps are to be
followed sequentially. For example-

1. Click on the three-dot icon ( … ) to the right of the post, photo, or information you wish to report as false to the
appropriate authorities.

2. Now a dialog page will appear on your screen where you can save, hide, report the post, image or information.

3. You have to select the 'Report Post' option.

4. As a result, another new dialog page will appear on your screen where different categories will be given as reporting
options.

5. Choose the 'False Information' category from the given categories.

6. As a result another new dialog page will appear on your screen. There the process will be completed by selecting the
'Finish' option.

The spread of false information online has a major impact on our lives as we already know in the flood of false/incorrect
information, it has become difficult to find correct information in this era of easy availability of information. In fact,
accurate information is not yet available. If you don't know the right information in this confusing situation, the online
media will confuse you.
How to ensure the authenticity of the information?

1. Note the website address

Almost all known websites have their own domain and specific web address. For example, if the end of the web address of
a site is .com.co then it is normal to raise our eyebrows. Be careful in taking information from such unusual or unfamiliar
websites. For example bbc.com is a well known website but bbc.com.co is not so well known, suspicious.

2. Read the About Us section of the website

Here usually the sites say their goals and objectives. Everything is told directly in this place. If the writing here seems
confusing then be aware.

3. Check for references and citations

References and citations will be included if the information is correct. Absence of these means that this information may
not be correct. There are many online news portals that mislead people by sharing wrong information. In which many
expert opinions will also be found, most of which are false.
4. See comments from others in the comment box

Many apparently interesting but fake news headlines cannot be verified by reading the entire article In that case, it can be
understood by looking at the comments of others. Titles are given in such a way that they easily attract attention. Attempts
are also made to prove the matter true with fake sources. A good way to verify that is the comments of others.

5. You can search for images of news or articles

A tendency of those who create fake news is to use images in the middle of the text from previous images collected from
the Internet. For example, in some place, the news of torture of a particular caste was published. The news gave a picture
of another incident that happened earlier. If you search this image on Google, if you see that this same image has been
used in any previous news, then you can assume that this news is fake. Requests for help for someone's treatment, asking
for financial help because someone is in danger or someone's success story, some discovery story are often false. You can
understand by checking the picture.

6. Search on Google

Search the information that you got through any means on Google. If it is seen that there are many news against this news
then it cannot be trusted. Besides, if the news is correct, the news should be published in the main news media on that
particular date. If there is no news or information about this in the main media, then you can assume it as false or fake
information.

7. Use your own wisdom, don't believe in the beginning


Most of the time the mistake we make is to believe without any verification. Blind faith without verification is a big mistake
in this age of disinformation. A lot of information can be verified by reading carefully. Especially without seeing the whole
video, without reading the whole news, believing only by looking at the title means falling into the trap of information
terror!

8. Check the references

In many cases, false information may be attributed to a Facebook post or Twitter tweet. If you notice, you will see that
there are many people in the society who spread many words based on what they hear. When asked where he got this
information, he will often find that he heard it from someone. This can be seen a lot online. No Facebook post, YouTube
video or tweet can ever be a reliable source. If you check the sources of the article you are reading, you can verify the truth
of this article.

9. Make sure you are joking

A lot of things can be said jokingly online even on many important issues. In that case, it is necessary to read these
romantic writings well and then understand and consider the truth and falsehood.

By observing these precautions, this little awareness can avoid many confusions.

Looking at the test routine online from the wrong place, showing the flight or bus time at the wrong time, going to the
wrong place in the online reference and getting the wrong vaccine can cause considerable damage. So accurate
information is very important.

Information is the most valuable resource in today's world. Many big problems can be solved through proper use and
application of information. But one thing to be sure of first is that the information is “correct”. Just as right information can
solve big problems, wrong information can cause much bigger problems. As important as correct information is, false or
incorrect information is just as dangerous. Due to false or wrong information, people can be deceived, panic can be created
inside people, mental breakdown, social and political upheaval, conflict and even loss of life can occur, besides financial
loss, social degradation, many other problems can arise due to wrong information. As a result of the share. Therefore,
before publishing or sharing any information, you must be sure about the correctness of the information.

You must behave responsibly when you post or share any information on digital platforms. Before posting or sharing
anything, you should verify the accuracy and relevance of the information. In addition, it is necessary to think whether
there is any risk of this information sharing, whether it will cause any confusion, misunderstanding or conflict. Because you
have to bear all the responsibility if there is any mistake in the information given by you. Check other reliable sources and
news media to verify content before sharing or posting. Think about what objectives the content creator might have.
Creators may present false opinions as fact to further their own agenda when creating content. One has to think about
whether the content will have a negative impact on someone in the society or not. If you share or post something for
money, you are unintentionally harming society.

The debate that has been going on since the beginning of the use of technology in the world is whether technology is a
blessing or a curse? This debate has also gained momentum with the subsequent advancement of technology. In fact
anything in excess is harmful. If any digital device is not used properly or if it is used for an extended period of time, the
user may suffer various types of damage. Excessive use of mobile phones and computers has various health risks. Even
terrible problems like cancer can start from here. Overuse of digital devices can lead to problems such as:

Health risks of excessive use of mobile phones:

(1) Inattention: A study found that people who are busy with their phones all the time, react to any emergency later than
others. Most of the times, mobile phone disturbs our concentration on any work. As a result, it takes us much more time
than usual to do any work.

(2) General illness: You are busy with your favorite phone all the time. Dust accumulates in it, along with many diseases
and germs. Maybe while using a mobile phone or replying to a call/message while eating, about 20 to 30 percent of
bacteria and viruses entered your body with food from this device. Maybe you won't get sick right away, but these things
will be responsible for any sickness later on.
(3) Eye problems: Using the phone too close to the eyes for a long time can cause headaches, eye pain, blurred vision, etc.
These children who are addicted to mobile games, cartoons etc. are more likely to have eye problems.

(4) Neurological problems: Mobile phone radiation reduces the amount of melatonin (a type of hormone that helps sleep)
in the brain, resulting in disturbed sleep of the user and various neurological problems. Besides, it is now scientifically
proven that various problems like insomnia, Alzheimer's and Parkinson's disease occur due to electromagnetic waves
emitted from mobile phones.

(5) Heart problems: According to studies, the radiation generated from mobile phones disrupts the normal functioning of
the human heart. As a result, the hemoglobin in the red blood cells gets separated. In addition, hemoglobin tends to be
produced elsewhere in the body instead of inside the red blood cells, which creates a variety of physical problems.

(6) Loss of hearing: People who talk on mobile phones for a long time are at risk of various ear problems such as hearing
loss. Children involved in listening to loud music, watching cartoons, playing games on mobile for more than 2-3 hours a
day are at risk of becoming partially deaf.

(7) Brain cancer: Radiation from mobile phones can slowly kill our brain cells or its wireless waves heat up our brain cells.
Therefore, excessive use of mobile phones increases the risk of brain cancer.

Health Risks of Overuse of Computers:

Apart from business, office, higher education, computers are now essential for school children too. Apart from online
classes, computers are also used for various school assignments. Apart from these, children also use computers for playing
computer games, singing, watching movies and other activities. Continuous use of computer is very harmful. Various
complex diseases can arise due to continuous use of computer for a long time. Some of these problems are discussed
below:

1. Constantly sitting looking at the computer screen puts pressure on the back and disrupts blood circulation in the body.
Sitting in a chair for a long time has harmful effects on the body. Then if that posture is not correct it can lead to more
serious problems including back pain. In addition, due to less movement for a long time, less calories are consumed and
without our knowledge, complications like heart disease, cancer, diabetes may develop along with weight gain.

2. Staring at a desktop or laptop screen for long periods of time can cause serious eye strain. This can lead to blurred vision,
eye discomfort, eye irritation, dry eyes, redness, itchy eyes, headaches. Anyone who plays computer games for a long time
can easily identify these problems in the eyes of children.

Around 70 million workers worldwide are at risk of computer vision syndrome and the number is increasing day by day.
Even using the computer for only three hours a day can cause such problems. People who work on computers for longer
periods of time also suffer from chronic headaches, neck and back pain.

So it is important to take a break from working without constantly looking at mobile or computer. Every 15-20 minutes it is
necessary to stand up and walk around with a short break. Work should be done with the neck and back straight in the
chair and the computer should be placed at such a distance that the work does not have to be bent. Hands, wrists, hands
and thighs should be kept flat on the floor. It is possible to stay healthy only if you follow the rules.

Due to online scams, this medium has not yet become a trusted medium for many. No one will be interested in buying
something without knowing it, without seeing it, unless there is a guarantee of safety. Many of you may have been a victim
of fraud while doing online transactions. Let's know some such events -

1. Suppose you have placed an advance payment to buy something from an online shop, but the product has not been
shipped. Or after ordering from an online shop asked to pay the price in advance from there. After confirming the order
and sending the money, the shop owner's number is available. Many people have had such experience in Bangladesh.
2. Have you invested a lot of money or bought a product on an e-commerce website but they are not giving you any
product or money. In such sites, products are bought and sold with many benefits or discount offers, and since everyone's
products are given properly in the beginning, both the customer and the seller are greedy and invest a lot of money. Many
people borrow large sums of money and start the business of buying products from these e-commerce sites and selling
them in the market. But after a few days their cheating got exposed. Many sellers don't get paid for their sales. Customers
do not receive products.

3. After providing financial help for someone's treatment or any other emergency, if you find out that the money has been
taken by lying. Financial help is often seen on Facebook or other social media. Here are some account numbers through
which the aid money can be sent. But many of these are fraudulent money making schemes. It is important to be careful of
them. It is better to check in this case. These numbers should be checked by phone or if possible by yourself and then help
should be sent.

4. By sending a link to the name of a known company, it is said that if you click on it and answer the quiz, you will get such
a percentage offer or such a discount from this company. After clicking the account got hacked. A few days ago a link was
being circulated with the name of a super shop where an offer of 2000 taka or more than 20% was mentioned. Enter this
link and answer the quiz and send this link to 20 people. If you click on such a link, there is a possibility of hacking the
account. So be careful.

5. Transferring money from the account with OTP saying that the mobile banking account has been closed over the phone.

You may have heard of scams like Bikash Cash or Rocket Account Block. Large amounts of money are transacted in mobile
banking accounts and such fraudsters will be noticed. They will try to convince you by phone that they have called from
Mobile Banking Authority office. Your account has been blocked. Now they will send OTP or code which if you don't give
them the account will not be active anymore. Money transactions will not be possible. The work is done in such a way that
people fear their words and give OTP.

6. Scams are done by talking about various online jobs. For example, many times you will see just a few clicks to win 500
taka or a good paying job at home. Many such fake job advertisements range from account hacking to financial fraud.
7. Many of the sites where we provide account information to purchase various online services are phishing sites. If you do
not recognize these sites and provide personal information to them, you will lose control of your account. Hacking social
media accounts by sending spam links like this is very rare.

8. Do many purchases from different Facebook pages. Many times it is seen that the product that you have paid for has
been sent instead of the product. There are examples of many Facebook pages disappearing after taking money. So it is
safe to buy from the places where the facility is available which will pay after receiving the product.

Financial transactions related to online transaction platforms and

Necessary precautions in providing personal information

Various websites, apps require us to provide personal information and account related information to transact online.
There are many risks involved in providing information on these sites. That is why it is important to be careful in giving
information related to any financial transaction. Being able to handle personal information securely is a pretty good skill
these days.

What precautions should be taken while giving personal information in online transactions?

1. Check if the transaction platform is genuine and then give the information

Check if the transaction you are transacting with is a phishing site. Many times many phishing sites are created to look like
real websites which are actually created to deceive. Giving confidential account information here can lead to account
hacking. Or can transfer all the money in the account. That is why it is very important to make sure which site you are
giving information and doing transactions. Check if there is https:// in the website address.

2. Check if the amount is correct

In case of online transactions, typing the amount by mistake can result in more money being lost. So check how much you
are paying while doing the transaction and then send the money. If it becomes more or less, it should be worn with irony.

3. Pin number should be kept secret

Even if someone wants to know the PIN number from the bank, the PIN number cannot be given. No one from the bank
will even want to know the pin number. If you want to know, you will assume that this person is a fraud. Be careful of
them.
4. Check if the name and phone number are correct

Make sure to double check the name and phone number you are giving. If there is a mistake in the phone number or name,
the money or goods may go to the wrong address. Or someone else could lose control of your account, which is even
worse.

5. Password cannot be shared with anyone

Passwords are very personal things. Password cannot be shared with anyone. Do not share passwords with anyone close to
you. Giving the account email and password to someone means putting the account at risk.

6. Passwords, account numbers or credit card information cannot be saved on e-commerce sites or elsewhere

Many times we save passwords on various sites to avoid the hassle of repeatedly entering passwords. This cannot be done
at all. If you need to save account number, password and credit card/debit card information on these sites, delete them
after work.

7. Account amount and transaction ID should not be disclosed to anyone

If you need to share money transfer information from the account with someone, delete the amount in the bank and the
transaction ID. With account information you can become a target for fraudsters. Which is by no means good news.

Potential risks of online transactions

With the availability of online financial transactions, everyone's life has become much easier. Due to online banking
services such as Bikash, Cash, Rocket, SureCash, Debit-Credit Cards, etc., financial transactions have become easier for the
masses and their acceptance has increased a lot. Along with this, the risk of online transactions has also increased.

What are the potential risks in online transactions?

1. Bank account hacking

Online account is likely to be hacked. If you do not keep important information like bank account number, password safe,
there is a possibility of hacker attack. It is important to keep this information safe. A strong password can add a lot of
security to your account.

2. Money going to wrong account number


If you want to send money somewhere, the money may go to the wrong number due to wrong typing of a number of the
account number. This type of problem is very common if you are careless in dealings.

3. Providing confidential account information to fake payment gateways

It is important to be careful while giving information to online payment gateways. Many times, fake phishing sites are
created like real websites and they transfer the account money to their own account after knowing the confidential
information of the account through the online gateway. If in doubt, you can search on Google to know these gateways.
Again, if the website you are shopping on is genuine, the probability of the payment gateway being genuine increases. You
can understand if you look at the web address.

4. Not providing the desired service even after deducting the money from the account

You can't get the desired service even after deducting money while buying an account subscription, train-bus-launch ticket
online. Sometimes it may happen that no payment message arrives on your phone to prove the payment. In case of such
problem, contacting the authorities can solve the problem.

5. While withdrawing money from the ATM booth, money is not received even after it is deducted from the account

In case of withdrawing money from the ATM booth, many times money is deducted from the account but the money does
not come out from the ATM machine. This may be due to mechanical glitches at the ATM booth. If you contact the
authorities quickly, they refund the money to the account.

6. More money than necessary may be gone

More money may go without paying the amount that was supposed to be paid. It is not unusual to write 20000 as 2000 by
mistake. To avoid such problems, keep an eye on how much service you are taking and how much you are paying. Be
careful while typing the amount. Even if the money is returned in such a situation, there will be many ironies.

7. on Steal money on line

Some foreign hackers have stolen the reserves of Bangladesh Bank. This theft is possible even from thousands of mails
away due to online transaction. That is why it is very important to take the support of proper security measures. This type
of problem can also occur in case of personal accounts.

8. Stealing money from mobile banking accounts by bank authorities

By making a phone call, Bikash or any other account can steal money by fearing it to be inactive or blocked. The OTP is
sent to the phone number and the account owner is persuaded to send the OTP by speaking well. By sending this OTP, all
the money in the account will go to the fraudster's account. This type of incident is very common in Bangladesh.
General People

whats app

One of the most used apps by billions of people around the world is WhatsApp. More than two billion people in 180
countries use WhatsApp. The app can only be used with a smartphone or computer, with an internet connection.

To use the app through the smartphone, after downloading the app from the Play Store or App Store, you have to create
an account with your name and phone number. For use on a computer, the web version of the app must be opened from
the Internet browser. By opening the phone's WhatsApp app, clicking on connect device and scanning the QR code on the
computer, it will be connected.

To contact any new number, that number must be saved in the phone book first. Audio and video calls can be made on
WhatsApp. Both text and audio messages can be sent here. Any photo or video can be shared. Communication between
like-minded people can be maintained by opening different groups.

the messenger

Messenger is Facebook's messaging app. Messenger has two apps. One of them is Messenger and the other is Messenger
Lite. The lite version of Messenger uses less storage and uses much less data services.

What is required to use Messenger app is a smartphone or computer, internet connection, Messenger app or internet
browser. After downloading and installing the messenger app, you can login with email or phone and password. Here you
can make audio and video calls. Both text and audio messages can be sent. Any photo or video can be shared. By opening
groups, communication between like-minded people can be maintained.

Advantages of Facebook Messenger:

No phone number is required like WhatsApp app. It is possible to contact everyone without knowing anyone's phone
number only through this app. Notifications can be turned off. If desired, the notification of a particular person or a group
can also be turned off. Different games can be played with friends. Can be logged out. Even if you close Facebook or keep
your account inactive (de-active), you can keep in touch through Messenger.
Disadvantages of Facebook Messenger:

Security and privacy of information are not guaranteed. Perhaps the biggest complaint against Facebook Messenger is
business promotions using personal information. For example, you may see an ad for a watch on Facebook after talking to
a friend about buying a watch on Messenger. This is because as soon as you show interest in buying a watch, Facebook
knows you need a watch. As a result watch ads are coming in front of you!

imo

Imo is a popular communication app in Bangladesh. In Bangladesh, especially expatriate family members use this app more
to communicate abroad. This app has been used by many people since it was the first to have the option of video calling.
Although Imo has the ability to send text messages, many people know this app only as a video calling app. A smartphone,
internet connection is required to use the emo app.

Advantages of emo

Stickers and emojis can be used. Can block someone who is unfamiliar or abusive. When calling someone it will show
'Ringing' if they are online and 'Calling' if they are offline. Using imo requires very less memory space. Files up to 10 GB can
be shared.

Disadvantages of emo

Any unknown number in IMO can automatically connect to your phone. Cannot share location through imo. Shows too
many ads which is annoying. No end-to-end encryption security measures. Your number may go to some other unknown
person. Anyone can make video and audio calls to you. There is no way to distinguish unknown messages. IMO comes with
a lot of unnecessary notifications that will distract you.

Data Security in IMO


Since there is no end-to-end encryption system and the possibility of receiving unwanted calls, messages, and other
people's numbers automatically, Emo's security system is not very convenient.

You might also like