0% found this document useful (0 votes)
4 views6 pages

Lesson 2

The document covers various online security threats such as Denial-of-Service attacks, Man-in-the-Middle attacks, and phishing, along with strategies for protecting oneself online, like using strong passwords and two-factor authentication. It also discusses concepts related to digital communication and technology, including cloud computing, data analytics, and graphic design principles. Additionally, it provides an overview of tools and techniques for creating documents and presentations, such as mail merge and hyperlinks.

Uploaded by

Rias Granger
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views6 pages

Lesson 2

The document covers various online security threats such as Denial-of-Service attacks, Man-in-the-Middle attacks, and phishing, along with strategies for protecting oneself online, like using strong passwords and two-factor authentication. It also discusses concepts related to digital communication and technology, including cloud computing, data analytics, and graphic design principles. Additionally, it provides an overview of tools and techniques for creating documents and presentations, such as mail merge and hyperlinks.

Uploaded by

Rias Granger
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Lesson 2 Denial-of Service Attack

Online Security and Safety Occurs when a malicious actor


stops the legitimate users from
Learning Competency getting into specific computer
- Apply online safety, security, ethics systems, devices, services or other
and etiquette standards and digital resources.
practice in the use of ICT as it would
relate to their specific professional Man in the Middle
track. Happens by impersonating the
-The internet is very useful for all endpoint in an online information
the digital native and citizen in a exchange via smartphone to
digital world. However, this will website.
make you vulnerable to online
threats and attacks. Malvertising
-Cyberattacks are the exploitation Is done by malicious actors that
of vulnerabilities that were brought upload infected ads to different
about by Increased Internet websites using an advertising
connectivity. network.

Malware Rogue Software


Malicious software is a program or Malware that pretends as
file that can harm your computer legitimate and necessary security
by stealing data or destroying software that will keep your system
something on your computer. safe.

Phishing Cyber Security


It is a form of cyberattack to obtain It refers to the body technologies,
sensitive information like username processes and practices designed
and password through malicious to protect networks, computer
emails. programs and data from attack,
damage and unauthorized access.
Password Attack
Happens when a third party is
trying to access your systems by
cracking a user’s password.
Things you need to consider Turn off “Save Password” Feature
doing to be safe in Browsers
Saving your password on your
Make your password strong and browser has multiple risks in it. It is
unique like giving away your personal data
Make sure to create a unique to prying eyes.
password for all your accounts
combination of random capital Don't Fall Prey to Click Bait
small letters and special characters. Hacker today have found multiple
effective ways for click bait buttons
-c that will direct you to phishing and
Is a type of technology that farming sites.
encrypts a user’s connection over a
less secure networks such as the Explore the Security Tools you
Internet to make it safer. Install
Security tools such as anti-virus
Turn on 2-Factor Authentication software programs are a big help in
Provides another security you need keeping not only your account but
to pass. your device safe from malware and
data breach.
Use Passcodes Even they are -​ All inclusive protection
Optional -​ Reliable protection
Combination of random letter and -​ Performance Impact
numbers to access a specific -​ Easy to Use
account is called PASSWORD; while -​ Available Support
a passcode or pin is restricted to
numbers only and used as a 2nd Folksonomy
authentication mechanism. Users can classify and arrange
information by adding tags or
Use Different Email Addresses for labels.
Different Types of Accounts
Your email address is one of the Rich User Experience
most important data used when Users can have high interaction
creating an account. with the content of the page and
can achieve a level of expertise.
Clear your Cache
Be sure to delete browser cookies
and history on a regular basis.
User Participation Media Sharing
Users can put content on their own A website that allows you to share
in web pages like comment, and store multimedia files such as
evaluation, and etc. video , photos and music. eg;
Instagram & YouTube
Long Tail Service
A site that offers services and brings Microblogging
individuals and businesses into A website that allows you to
selling different goods and broadcast short messages. eg;
commodities such as shopping Twitter & Tumblr
sites.
Blogs and Forum
Software as a Service A discussion website that allows
Sharing of diverse information users to ask questions and
through universal web access. comments on a journal posted by
an individual or group.
Mass Participation
Sharing of diverse information Mobile Technologies
through universal web access. A technology used in cellular and
other devices such as net books,
Social Network laptops , tablet smartphones, etc.
A website where people with the
same come together to share Assistive Media
information. A platform that assists people with
e g; Twitter, Instagram, Facebook disabilities. It will guide the
individual like a blind person by
Social News using an audio recording.
A social website where users can
post stories and are ranked based Cloud Computing
on their popularity through voting. Computer applications are stored in
virtual storage. Cloud computing
Bookmarking Websites refers to the use of a network of
A website that allows you to share remote servers hosted on the
and store internet bookmarks, internet- to manage, process, and
articles, posts, blogs, images and store data.
others. eg; Pinterest
Data Analytics
The results are carefully tailed and
develop an algorithm that will
determine the relationship
between data and derived an
impact ful insights

Machine Learning
Is a subset of Artificial Intelligence
where the system can learn
automatically based on experience.
Creating a Mail Merge
Mail Merge • In creating a mail merge, you need a
Is a software toolkit that is used to data source that contains the basic
produce multiple documents. information to be merged into your
word document.
Sample Output: Certificate of • A data source may contain name,
Attendees in a seminar address, telephone and other
information you want to include.
• A data source must be created first to
be able to use Mail Merge for
mass mailing

Steps Using Mail Merge


1. Create a dataset with title headings.
2. Create the template of the letter or
document that will receive the
dataset in a word processor.
3. Insert the label of customized detail
in the word processor and
insert the label that corresponds to the
spreadsheets.
4. Select option preview in the word
processor to generate all of the
pages with different information.
STEPS
1. Create a spreadsheet containing your Graphic Design - art of combining
information and make sure that labels different Images, Shapes for a purpose.
are written in the first row.
2.Indicate the source of information in Line - created by a point
your word processor
3.Select the spreadsheet file you've Shape - 2 dimensional area with
created in step 1. recognizable boundary; communicate
4.Select which sheet in the file contain with your idea
information
5.Start writing or creating the template
that you are going to use.
6.Check the results of label placement.
7.Print the Finished Product
8.Create a new document.

Lesson 4: HYPERLINK, MS
PowerPoint Gamification

Hyperlink - clickable element in a


webpage that directs you to another
webpage

Transition - visual effects that occur


when you move from one slide
Animation-use of moving images and
graphic elements

Animation - use of moving images


and graphic elements. Texture - gives a sense of realism to
the object
Motion Path - allows you to control the
movement of an object Balance - how elements are
distributed
Object - graphical element that can be
selected and manipulated

Ctrl+K - shortcut key for hyperlink

LESSON 5
Graphic Design
Color - create visual impact and
meaning; what gives life to it

Text Type - use of typography;


appealing communication; most
challenging types to create

Infographics - creatively present data


or info

Visual Communication - way of


passing on info nowadays

You might also like