EMTECH-Notes-First-Summative
EMTECH-Notes-First-Summative
- The use of the Internet, e-mail or video conferencing. Mass participation- Allows universal web access from a
traditional internet user to a wider variety of users
Assistive Media
TYPES OF SOCIAL MEDIA
- A technology that includes assistive, adaptive, and
1) SOCIAL NETWORKS - Enables people to
rehabilitative devices for people with disabilities and
connect with other people with the same interests or
also includes the process used in selecting, locating, and
background
using them
2) BOOKMARKING SITES - Sites that allow
users to store and manage links to various websites and - It enables people to perform tasks by changing
resources, and to tag methods of interacting with the technology needed to
3) SOCIAL NEWS - Sites that allow users to post accomplish such tasks.
their own news articles or links to other news sources
and comment to the post or vote on the news articles of
the website VISUAL IMPAIRMENTS
4.) MEDIA SHARING - Sites that allow users to Screen readers, braille and braille embossers, desktop,
upload and share media content like music, images and video magnifier, screen magnification software, large-
video print and tactile keyboards
Internet Threats
1. Malware – or malicious software, is any program 1. Before your post something on the web, ask these
or file that is harmful to a computer user. questions to yourself:
Types of Malwares: Would you want your parents or grandparents
to see it?
a) Virus - a malicious program designed to replicate
Would you want your future boss to see it?
itself and transfer from one computer to another
(internet, local networks, FDs, CDs, etc.)
b) Worm - a malicious program that transfers from 2. If you feel that a post can affect you or other’s
one computer to another by any type of means. reputation, ask the one who posted it to pull it down or
Ex. ILOVEYOU Worm - The malware originated report it as inappropriate.
in the Pandacan neighborhood of Manila in the
Philippines on May 5, 2000. Copyright Infringement
c) Trojan - a malicious program that disguises as a It is the use of works protected by copyright law
useful program but once downloaded or installed, without permission for a usage where such permission
leaves your PC unprotected and allows hackers to is required.
get your information.
d) Spyware - a program that runs in the background Here are some tips that could help you avoid copyright
without you knowing it (thus called “spy”). It has infringement:
the ability to monitor what you are currently doing 1. Always assume that the work is copyrighted.
and typing through keylogging. 2. Do not copy, share or alter without seeking
Ex. Keylogger – used to record keystrokes done permission.
by the user. This is done to steal their password 3. Review and retain licensing agreements.
or any other sensitive information. The key 4. Consider buying content.
logger software typically uses log file to store its 5. Give credit to the original author of the page or
recording. information
e) Adware - a program designed to send you
advertisements, mostly as pop-ups. Rules for Good Netiquette
f) Ransomware - or ransom software is a type of
1. Avoid posting inflammatory or offensive
malicious software from cryptovirology that
comments online (aka flaming).
threatens to publish the victim's data or
2. Respect others' privacy by not sharing personal
perpetually block access to it unless a ransom is
information, photos, or videos that another
paid.
person may not want published online.
3. Never spam others by sending large amounts of
unsolicited email.
2. Spam – an unwanted email mostly from bots or 4. Show good sportsmanship when playing online
advertisers. It can be used to send malware. games, whether you win or lose.
5. Don't troll people in web forums or website
comments by repeatedly nagging or annoying
3. Phishing – its goal is to acquire sensitive personal them.
information like passwords and credit card details. 6. Stick to the topic when posting in online forums
or when commenting on photos or videos, such
This is done by sending you an e-mail that will direct the
as YouTube or Facebook comments.
user to visit a fake website and be asked to update
7. Don't swear or use offensive language
his/her username, password, credit card or personal
8. Avoid replying to negative comments with more
information.
negative comments. Instead, break the cycle
with a positive post.
9. If someone asks a question and you know the
answer, offer to help.
10. Thank others who help you online.