Lesson 2 Denial-of Service Attack
Online Security and Safety Occurs when a malicious actor
stops the legitimate users from
Learning Competency getting into specific computer
- Apply online safety, security, ethics systems, devices, services or other
and etiquette standards and digital resources.
practice in the use of ICT as it would
relate to their specific professional Man in the Middle
track. Happens by impersonating the
-The internet is very useful for all endpoint in an online information
the digital native and citizen in a exchange via smartphone to
digital world. However, this will website.
make you vulnerable to online
threats and attacks. Malvertising
-Cyberattacks are the exploitation Is done by malicious actors that
of vulnerabilities that were brought upload infected ads to different
about by Increased Internet websites using an advertising
connectivity. network.
Malware Rogue Software
Malicious software is a program or Malware that pretends as
file that can harm your computer legitimate and necessary security
by stealing data or destroying software that will keep your system
something on your computer. safe.
Phishing Cyber Security
It is a form of cyberattack to obtain It refers to the body technologies,
sensitive information like username processes and practices designed
and password through malicious to protect networks, computer
emails. programs and data from attack,
damage and unauthorized access.
Password Attack
Happens when a third party is
trying to access your systems by
cracking a user’s password.
Things you need to consider Turn off “Save Password” Feature
doing to be safe in Browsers
Saving your password on your
Make your password strong and browser has multiple risks in it. It is
unique like giving away your personal data
Make sure to create a unique to prying eyes.
password for all your accounts
combination of random capital Don't Fall Prey to Click Bait
small letters and special characters. Hacker today have found multiple
effective ways for click bait buttons
-c that will direct you to phishing and
Is a type of technology that farming sites.
encrypts a user’s connection over a
less secure networks such as the Explore the Security Tools you
Internet to make it safer. Install
Security tools such as anti-virus
Turn on 2-Factor Authentication software programs are a big help in
Provides another security you need keeping not only your account but
to pass. your device safe from malware and
data breach.
Use Passcodes Even they are - All inclusive protection
Optional - Reliable protection
Combination of random letter and - Performance Impact
numbers to access a specific - Easy to Use
account is called PASSWORD; while - Available Support
a passcode or pin is restricted to
numbers only and used as a 2nd Folksonomy
authentication mechanism. Users can classify and arrange
information by adding tags or
Use Different Email Addresses for labels.
Different Types of Accounts
Your email address is one of the Rich User Experience
most important data used when Users can have high interaction
creating an account. with the content of the page and
can achieve a level of expertise.
Clear your Cache
Be sure to delete browser cookies
and history on a regular basis.
User Participation Media Sharing
Users can put content on their own A website that allows you to share
in web pages like comment, and store multimedia files such as
evaluation, and etc. video , photos and music. eg;
Instagram & YouTube
Long Tail Service
A site that offers services and brings Microblogging
individuals and businesses into A website that allows you to
selling different goods and broadcast short messages. eg;
commodities such as shopping Twitter & Tumblr
sites.
Blogs and Forum
Software as a Service A discussion website that allows
Sharing of diverse information users to ask questions and
through universal web access. comments on a journal posted by
an individual or group.
Mass Participation
Sharing of diverse information Mobile Technologies
through universal web access. A technology used in cellular and
other devices such as net books,
Social Network laptops , tablet smartphones, etc.
A website where people with the
same come together to share Assistive Media
information. A platform that assists people with
e g; Twitter, Instagram, Facebook disabilities. It will guide the
individual like a blind person by
Social News using an audio recording.
A social website where users can
post stories and are ranked based Cloud Computing
on their popularity through voting. Computer applications are stored in
virtual storage. Cloud computing
Bookmarking Websites refers to the use of a network of
A website that allows you to share remote servers hosted on the
and store internet bookmarks, internet- to manage, process, and
articles, posts, blogs, images and store data.
others. eg; Pinterest
Data Analytics
The results are carefully tailed and
develop an algorithm that will
determine the relationship
between data and derived an
impact ful insights
Machine Learning
Is a subset of Artificial Intelligence
where the system can learn
automatically based on experience.
Creating a Mail Merge
Mail Merge • In creating a mail merge, you need a
Is a software toolkit that is used to data source that contains the basic
produce multiple documents. information to be merged into your
word document.
Sample Output: Certificate of • A data source may contain name,
Attendees in a seminar address, telephone and other
information you want to include.
• A data source must be created first to
be able to use Mail Merge for
mass mailing
Steps Using Mail Merge
1. Create a dataset with title headings.
2. Create the template of the letter or
document that will receive the
dataset in a word processor.
3. Insert the label of customized detail
in the word processor and
insert the label that corresponds to the
spreadsheets.
4. Select option preview in the word
processor to generate all of the
pages with different information.
STEPS
1. Create a spreadsheet containing your Graphic Design - art of combining
information and make sure that labels different Images, Shapes for a purpose.
are written in the first row.
2.Indicate the source of information in Line - created by a point
your word processor
3.Select the spreadsheet file you've Shape - 2 dimensional area with
created in step 1. recognizable boundary; communicate
4.Select which sheet in the file contain with your idea
information
5.Start writing or creating the template
that you are going to use.
6.Check the results of label placement.
7.Print the Finished Product
8.Create a new document.
Lesson 4: HYPERLINK, MS
PowerPoint Gamification
Hyperlink - clickable element in a
webpage that directs you to another
webpage
Transition - visual effects that occur
when you move from one slide
Animation-use of moving images and
graphic elements
Animation - use of moving images
and graphic elements. Texture - gives a sense of realism to
the object
Motion Path - allows you to control the
movement of an object Balance - how elements are
distributed
Object - graphical element that can be
selected and manipulated
Ctrl+K - shortcut key for hyperlink
LESSON 5
Graphic Design
Color - create visual impact and
meaning; what gives life to it
Text Type - use of typography;
appealing communication; most
challenging types to create
Infographics - creatively present data
or info
Visual Communication - way of
passing on info nowadays