0% found this document useful (0 votes)
31 views

Module 1 - Computer and Internet Essentials FINAL

Uploaded by

mjcamanze
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Module 1 - Computer and Internet Essentials FINAL

Uploaded by

mjcamanze
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 161

COMPUTER AND

INTERNET ESSENTIALS
Free Public Internet Access Program

Municipality of Loon, Bohol


June 12-16, 2023
CONTENTS

Information and
Internet and Web
Communications
Browsing Concepts
Technology

Computer and Devices Internet and its


Benefits

Desktop and File Internet Safety and


Management Netiquette
COURSE OBJECTIVES
At the end of this course, the participants would be able to:
Define computer and identify the four basic computing functions

Identify and proper utilize basic input devices such as keyboard and
mouse
Differentiate hardware, software, and peopleware
Familiarize with desktop environment and file management

Explain World Wide Web and explore the Internet concepts through web
browsers
Understand concepts of email, online communities, and social media
COURSE OBJECTIVES
At the end of this course, the participants would be able to:
Search effectively for information and transaction with the government online

Utilize the Internet in accessing opportunities online through online


freelancing and e-commerce
Recognize existing Internet usage Philippine laws
Understand the importance of keeping information and data secure

Recognize threats to personal security from identity theft and potential threats and
identify common data/privacy protection

Search effectively for online information and critically evaluate content in the
Internet
INFORMATION AND
COMMUNICATIONS
TECHNOLOGYUsing digital technology to access, store and
process information into an organized and
understandable form

Uses of ICT include:


 Internet services
 Mobile technology
 Office productivity applications

Images from Google Images


COMPUTER AND
DEVICES
An advanced electronic device that takes
raw data as input from the user and
processes it under the control of set of
instructions (program), gives the result
(output), and saves (store) it for the
future use.

Images from Google Images


FUNCTIONALITIES OF A COMPUTER

▶ Input: Transferring of data into a computer


system

▶ Process: Manipulating and controlling of data


and converting it into useful information
COMPUT ▶ Store: Storing of data/information/instructions
ER AND in the memory and use them when required

DEVICES ▶ Output: Generating the output or displaying


the information.
COMPUTER AND
DEVICES
FUNCTIONALITIES OF A COMPUTER

COMPUTE
PROC
R OUTP
INPUT
ESS UT
STOR
E
DATA

▶ A collection of independent raw facts, numbers,


letters, symbols and any combination of these
that provide necessary requirements of a system
to achieve a result.
COMPUT
ER AND
DEVICES
COMPUTER DATA EXAMPLE
AND
DEVICES

Juan dela Mal


Cruz e Teache
Quezon r
City 28
January 11, Singl
1991 e
INFORMATION

▶ A data made meaningful based on the needs of


the user through manipulation.

▶ Also called processed data.


COMPUT
ER AND
DEVICES
COMPUTER DATA EXAMPLE -
AND
DEVICES RECAP
Juan dela Mal
Cruz e Teache
Quezon r
City 28
January 11, Singl
1991 e
COMPUTER INFORMATION
AND
DEVICES

NAJuan dela Mal


ME: Cruz e Teache
ADDRQuezon SE r
ESS: City 28 X:
BIRTH AG
January 11, Singl
DATE: E:
OCCUPA
1991 e
CIVIL
TION: STATUS:
TYPES OF COMPUTERS

▶ Supercomputers

▶ Mainframes

COMPUT ▶ Microcomputers
 Desktops
ER AND 

Laptops or notebooks
Handhelds (smartphones, tablets)
DEVICES  Wearables
TYPES OF COMPUTERS

Supercomputers

▶ The fastest type of computer; very expensive and are


employed for specialized applications that require
immense amounts of mathematical calculations
COMPUT ▶ An extremely fast computer that can perform
hundreds of millions of instructions per second
ER AND ▶ Examples:
 Satellites

DEVICES 

Weather forecast
Oil exploration
 Scientific research
TYPES OF COMPUTERS

Mainframes

▶ A very large and expensive computer capable of


supporting hundreds, or even thousands, of users
simultaneously
COMPUT ▶ In some ways, mainframes are more powerful than
supercomputers because they support more
ER AND simultaneous programs.
▶ Examples:
DEVICES 

Hospitals
Universities
 Banks
 Government offices
TYPES OF COMPUTERS

Microcomputers

▶ A microcomputer is a small, relatively inexpensive


computer with a microprocessor as its central
processing unit (CPU)
COMPUT ▶ A small, single-user computer based on one

ER AND microprocessor

▶ Microcomputers are designed to be used by


DEVICES individuals
TYPES OF COMPUTERS

Desktop

▶ Designed to be placed on a desk, and they're


typically made up of a few different parts, including
the computer case, monitor, keyboard,
COMPUT and mouse.

ER AND
DEVICES

Images from Google Images


TYPES OF COMPUTERS

Laptop (or notebooks)

▶ Portable computers that you can take with you and


use in different environments.

COMPUT
ER AND
DEVICES

Images from Google Images


TYPES OF COMPUTERS

Smartphones

▶ Mobile phones that can do a lot of things like


computers, including browsing the Internet,
playing games, and working with mobile
COMPUT applications

ER AND
DEVICES

Images from Google Images


TYPES OF COMPUTERS

Tablet

▶ Handheld computers that are even more portable


than laptops.

COMPUT ▶ Instead of a keyboard and mouse, tablets use


a touch-sensitive screen for typing and navigation.

ER AND
DEVICES

Images from Google Images


TYPES OF COMPUTERS

Wearables

▶ General term for a group of devices that are


designed to be worn throughout the day

COMPUT ▶ Includes fitness


ER AND trackers and
smartwatches

DEVICES

Images from Google Images


COMPUTER SYSTEM

A computer system is made of:

HARDWA SOFTWA
RE
physical components
RE
programs or list of
COMPUT instructions

ER AND
DEVICES

Images from Google Images


INPUT

▶ Any data or instruction entered into the computer is


known as input

▶ Types of computer input:

COMPUT
 Data: the raw facts given to the computer

 Programs: the sets of instructions that direct the


ER AND computer

DEVICES
 Commands: special codes or key words that the user
HARDWARE inputs to perform a task

 User response: the user's answer to the computer's


question
INPUT DEVICES

▶ An input device helps you to communicate


with the computer

▶ To enter information and issue commands, you


use input devices. Examples are:
COMPUT  Keyboard
ER AND 

Mouse
Scanner
DEVICES
HARDWARE


Microphone
Camera
KEYBOARD

▶ The keyboard is the most common and widely


used input device.

▶ It is made up of buttons called ‘keys’. The keys


are arranged into sections.
COMPUT
ER AND
DEVICES
HARDWARE

Images from Google Images


COMPUTER KEYBOARD
AND
DEVICES

Images from Google Images


COMPUTER KEYBOARD
AND
DEVICES

Images from Google Images


COMPUTER KEYBOARD
AND
DEVICES
COMMON KEYBOARD
SHORTCUTS
 Select All  Undo

 Copy  Redo

 Cut
 Switch windows

 Paste  Exit

 Save Refresh
MOUSE

▶ A pointer device

▶ Primary button – left button


of the mouse

COMPUT ▶ Secondary button – right


button of the mouse

ER AND ▶ Scroll Wheel – located


between the buttons use to help
DEVICES
HARDWARE
you scroll thru documents and
webpages more easily.
Note: You will use the primary button most often.

Images from Google Images


COMPUTER MOUSE
AND
DEVICES
PROPERLY HOLDING A
COMPUTER MOUSE

Images from Google Images


MOUSE

Mouse Actions

▶ Click – Selects an Item on the Screen


▶ Double-Click – Opens Document or Program

COMPUT ▶ Right-Click – Displays a List of Commands


▶ Drag and Drop – Moves Item on Screen
ER AND ▶ Wheel Mouse – Scroll and Zoom

DEVICES
HARDWARE

Images from Google Images


COMPUTER MOUSE
AND
DEVICES

LEFT CLICK DOUBLE


OR CLICK
clicking the primary button
once
CLICK
clicking the primary button twice

Images from Google Images


COMPUTER MOUSE
AND
DEVICES

RIGHT CLICK DRAG AND


clicking the secondary button
DROP
click on an object, hold the button down
while dragging to a different area of the
screen

Images from Google Images


SCANNER

▶ input device that reads printed text and graphics


and the image or text obtained can be saved or
changed on the computer

COMPUT
ER AND
DEVICES
HARDWARE

Images from Google Images


MICROPHONE

▶ allows to record your voice to the computer

▶ also lets the user speak to other people using


computers or even on the telephone

COMPUT
ER AND
DEVICES
HARDWARE

Images from Google Images


CAMERA

▶ records and stores images in digital form, which


can then be viewed on a screen

▶ used to transmit video images in real time or for


videoconferencing over the Internet

COMPUT
ER AND
DEVICES
HARDWARE

Images from Google Images


OUTPUT

▶ The data that has been processed into a useful


form is called output.

▶ the outcome of the process

COMPUT ▶ Types of computer output:

ER AND  Hard copy: printed on paper or other permanent


media

DEVICES
HARDWARE  Soft copy: the unprinted digital document file;
displayed on screen or by other non-permanent
means, and can be transported from one computer to
another
OUTPUT DEVICES

▶ Output is the result we get through output


devices.

▶ Examples of output devices are:

COMPUT 

Monitor
Printer
ER AND 

Speaker
Headphone
DEVICES
HARDWARE
MONITOR

▶ A monitor is an output device similar to a television


screen.

▶ It is used to display text and graphics.

COMPUT
ER AND
DEVICES
HARDWARE

Images from Google Images


PRINTER

▶ An output device that print text and graphics from


a computer onto paper.

▶ A printer can produce both black and white and


colored images.

COMPUT
ER AND
DEVICES
HARDWARE

Images from Google Images


SPEAKERS

▶ A speaker allows you to hear the sound generated


by your computer

▶ Speaker produces sound or music

COMPUT
ER AND
DEVICES
HARDWARE

Images from Google Images


HEADPHONE

▶ Headphone is used to listen to music and sounds.

▶ Headphone usually have strap that rests on top of


the head and a pair of speakers over both ears.

COMPUT
ER AND
DEVICES
HARDWARE

Images from Google Images


PROCESS

▶ It is the transformation process to convert the input


into output

▶ A process is an instance of running a program

COMPUT ▶ It cause the computer to follow instructions from the


memory module

ER AND ▶ Perform by Central Processing Unit (CPU)

DEVICES
HARDWARE
CENTRAL PROCESSING UNIT (CPU)

▶ CPU is considered as the brain of the computer

▶ CPU performs all types of data processing


operations

COMPUT ▶ It stores data, intermediate results and instructions


(program)

ER AND ▶ It controls the


DEVICES
HARDWARE
operation of all
parts of computer

Images from Google Images


MOTHERBOARD

▶ The motherboard serves as a single platform to


connect all of the parts of a computer together

▶ A motherboard connects CPU, memory, hard drives,


optical drives, video card, sound card, and other

COMPUT ports and expansion cards directly or via cables

▶ It can be considered as the backbone of a computer


ER AND
DEVICES
HARDWARE
COMPUTER MOTHERBOARD
AND
DEVICES

Images from Google Images


RANDOM ACCESS MEMORY (RAM)

▶ Alternatively referred to as main memory, primary


memory, or system memory

▶ A hardware device that allows information to be


stored and retrieved on a computer As soon as the

COMPUT machine is switched off, data is erased.

ER AND
DEVICES
HARDWARE

Images from Google Images


STORAGE DEVICES

▶ Also known as the secondary memory which serves


as the storage area of the computer system
▶ Removable
 Floppy disk, or diskette
 Compact Disc (CD-R, CD-RW, CD-ROM)
 DVDs (DVD-ROM, DVD-R, DVD-RW, DVD-RAM)
COMPUT 

Flash disk/USB drive
Memory Card / SD Card

ER AND 

Tape
Zip disk
▶ Non-Removable
DEVICES
HARDWARE  Hard disk

Images from Google Images


SOFTWARE

▶ It is any set of instructions that tells the


hardware what to do

▶ It is what guides the hardware and tells it


how to accomplish each task
COMPUT ▶ Some examples of software include web
ER AND browsers, games, and word processors

DEVICES
SOFTWARE
SOFTWARE

Categories of software:

SYSTEM APPLICAT
SOFTWAR IONS
COMPUT E system
includes the operating SOFTWAR
includes programs that do
and real work for users
ER AND consists of programs to
control the
E
(e.g. word processors,
spreadsheets, and database
management systems)

DEVICES
operations of computer
equipment
SOFTWARE
OPERATING SYSTEM

▶ An operating system (OS) is software that starts up


a computer and keeps it running and responding
to your commands

▶ Instructions in the operating system tell the

COMPUT computer how to perform the functions of


loading, storing, and executing an application
program and how to transfer data
ER AND ▶ Most computers use an operating system that has a
DEVICES
SOFTWARE
graphical user interface (GUI)
OPERATING SYSTEM

Tasks of an Operation System:

▶ Operations Management
 Load, store and execute programs
 Transfer data
COMPUT ▶ File Management
 Files
ER AND  Folder
▶ System Maintenance
DEVICES
SOFTWARE
 Defragment/Check Disk
 Virus Check
▶ System Monitoring
 Task Manager
COMPUTER Operating system
AND
DEVICES

Images from Google Images


APPLICATION SOFTWARE

▶ Word Processing
▶ Spreadsheet
▶ Presentation Graphics
▶ Database
▶ Desktop Publishing
COMPUT ▶

Games
Statistical Analysis
ER AND ▶

Contact Management
Utility Software – anti-virus, data backup, and
DEVICES
SOFTWARE file compression
PEOPLEWARE

▶ Personnel involved in the design,


development, installation and maintenance
of computer
 Users
 Programmers
COMPUT 

Systems Analyst
System/ Network
ER AND Administrator

DEVICES
peopleWARE

Images from Google Images


STARTING UP A COMPUTER

Desktop
and file
manageme
nt
Images from Google Images
SHUTTING DOWN COMPUTER

Windows 7

Desktop
and file
manageme
nt
SHUTTING DOWN COMPUTER

Windows 8

Desktop
and file
manageme
nt
SHUTTING DOWN COMPUTER

Windows 8.1 and 10

Desktop
and file
manageme
nt
DESKTOP DESKTOP
AND FILE WINDOWS 7
MANAGEME ENVIRONMENT
NT icons

start menu

start button notifications bar

quick launch toolbar


DESKTOPDESKTOP
AND FILE WINDOWS
8
MANAGEME ENVIRONMENT
startNT
menu

start button
icons

quick launch toolbar


DESKTOP DESKTOP
AND FILE WINDOWS 8.1
MANAGEME ENVIRONMENT
AND 10
NT icons
start menu

start button quick launch toolbar notifications bar


FILE

▶ A collection of data or information, identified by


a filename and represented by an icon.

▶ A file can be a document, picture, audio or


video, application, and so on.

Desktop
and file
manageme
nt
FOLDER

▶ Folders are designed for organizing files. It


stores different types of files.

Desktop
and file
manageme
nt
FILE MANAGEMENT

▶ File Management is the storing, naming, sorting


and handling computer files.

Desktop
and file
manageme
nt
FILE EXPLORER

▶ A built-in application for viewing and


organizing files and folders

Desktop
and file
manageme
nt
DESKTOP FILE EXPLORER
AND FILE
MANAGEME
NT
ribbon

search box
address bar

file and folder listing

navigation pane
OPENING A FILE OR FOLDER

▶ Double-click a file or folder to open

Desktop
and file
manageme
nt
CREATING A NEW FOLDER OR FILE

1. Right-click on the explorer.


2. Go to New.
3. Select Folder or any type of file.

Desktop
and file
manageme
nt
RENAMING A FOLDER OR FILE

1. Right-click on the
folder or file.
2. Select Rename.
Desktop 3. Type the new
filename.
and file 4. Press Enter on
keyboard
manageme
nt
SELECTING MULTIPLE FILES OR FOLDER

Method 1:
▶ To select specific files/folders, press and
hold Ctrl on keyboard then click the
files/folders

Desktop
and file
manageme
nt
SELECTING MULTIPLE FILES OR FOLDER

Method 2:
▶ Click and drag the mouse to draw a box
around the files you want to select

Desktop
and file
manageme
nt
MOVING FILES OR FOLDER

▶ Drag and drop file to another folder

Desktop
and file
manageme
nt
DELETING OR MOVING FILES TO THE RECYCLE BIN

Method 1:
▶ Right-click on the
Desktop file/folder, then
select Delete
and file
manageme
nt
DELETING OR MOVING FILES TO THE RECYCLE BIN

Method 2:
▶ Select file/folder, then press Delete key on
keyboard.

Desktop
and file
manageme
nt
PERMANENTLY DELETE A FILE

Method 1:
▶ Select file/s to be deleted, then press Shift and
Delete at the same time.

Desktop
and file
manageme
nt
PERMANENTLY DELETE A FILE

Method 2:
▶ Open Recycle Bin, then click on Empty
Recycle Bin

Desktop
and file
manageme
nt
INTERNET AND WEB
BROWSING
Internet is the largest computer
network in the world, connecting
millions of computers.

Images from Google Images


WORLD WIDE WEB (WWW)

▶ The collection of information/linked pages accessed


“on top” of the Internet

▶ A collection of linked documents residing on


Internet servers around the world

INTER
NET
AND
WEB
BROWS Images from Google Images

ING
WEB BROWSER

▶ A web browser is a software program used to access


the World Wide Web.

INTER
NET
AND
WEB
BROWS Images from Google Images

ING
ADDRESS BAR

▶ It shows the web address (also called a URL) of the


page.

▶ To go to a different page, type the URL on the


address bar and press Enter

INTER
NET
AND
WEB
BROWS
ING
WEB ADDRESS

https://www.facebook.com/
INTER
NET protocol WWW domain extension

AND
WEB
BROWS
ING
WEB ADDRESS

▶ Protocol: usually http:// (Hypertext Transfer


Protocol) this defines how the information is
transmitted

▶ WWW: indicates the website is on the World Wide

INTER Web

▶ Domain: the section of the Internet owned by the


NET website

AND ▶ Extension: identifies either the type of organization


or the country of origin of the website
WEB
BROWS
ING
WEB ADDRESS

Common types of domains:

▶ Geographical domain - Two letter identifier that lists where


the website is registered
 ph - Philippines
 ca - Canada

INTER  th - Thailand

▶ Organization domain - Three letter identifier


NET  gov - Government agencies
 edu - Educational institutions

AND  org - Organizations (nonprofit)


 mil - Military
 com - commercial business
WEB  net - Network organizations

BROWS
ING
NAVIGATING WEB BROWSER

Navigating Buttons

▶ Back – previous page


▶ Forward – moves you forward a page
▶ Refresh – reloads a page

INTER
NET
AND
WEB
BROWS
ING
NAVIGATING WEB BROWSER

INTER
NET bookmarks bar bookmark
AND a bar under the address bar
that shows all the bookmarks
saves shortcut
that direct

WEB browser to a
specific page

BROWS
ING
E-MAIL

▶ short term for electronic mail

▶ modern day tool used to send and receive messages


using the Internet

INTER
NET
AND
ITS
BENEFI Images from Google Images

TS
ADVANTAGES OF E-MAIL

easily accessible

free

INTER fast

NET reliable

long-lasting
AND long-distance
ITS
BENEFI
TS
GMAIL

▶ Google Mail o Gmail is an e-mail service where e-


mails and messages are stored in the Internet.

INTER
NET
AND
ITS
BENEFI
TS
USES OF E-MAIL

▶ Send and receive messages

INTER
NET
AND
ITS
BENEFI
TS
USES OF E-MAIL

▶ Reply to messages

INTER
NET
AND
ITS
BENEFI
TS
USES OF E-MAIL

▶ Forward messages

INTER
NET
AND
ITS
BENEFI
TS
USES OF E-MAIL

▶ Attach files to messages

INTER
NET
AND
ITS
BENEFI
TS
SOCIAL MEDIA

▶ enables individuals to gather, communicate and


share information, interests, ideas, images, or videos
using the Internet

INTER
NET
AND
ITS
BENEFI Images from Google Images

TS
FACEBOOK

▶ social media used to interact with other people from


different parts of the world

▶ most common social networking site

INTER
NET
AND
ITS
BENEFI Images from Google Images

TS
FACEBOOK

INTER
Friend
NET News Feed
Requests
Messenger Marketplace

AND
ITS Notifications Search Menu

BENEFI
TS
ONLINE MESSAGING AND CALLS

INTER
NET
AND
ITS
BENEFI Images from Google Images

TS
ONLINE MESSAGING AND CALLS

INTER
NET
AND
ITS
BENEFI Images from Google Images

TS
SEARCH ENGINES

▶ tools used to find information on the internet based


on a word or combination of words

INTER
NET
AND
ITS
BENEFI Images from Google Images

TS
GOVERNMENT E-SERVICES

▶ provision of services and government transactions


through the use of information and communication
technologies (ICTs)

INTER
NET
AND
ITS
BENEFI Images from Google Images

TS
NATIONA
L
BUREAU
OF
CLEARANCE.NBI.
INVESTIG
GOV.PH

ATION
DATA PRIVACY ACT OF 2012

▶ Republic Act No. 10173

An act protecting individual personal information in


information and communications systems in the
government and the private sector, creating for this

INTERN purpose a national privacy commission, and for other


purposes

ET
SAFET
Y AND
NETIQ Image Source: Google Images

UETTE
DATA PRIVACY ACT OF 2012

▶ Republic Act No. 10173

An act protecting individual personal information in


information and communications systems in the
government and the private sector, creating for this

INTERN purpose a national privacy commission, and for other


purposes

ET
SAFET
Y AND
NETIQ Image Source: Google Images

UETTE
MGA BATAS SA PAGGAMIT NG INTERNET
CYBERCRIME PREVENTION ACT OF 2012

▶ Republic Act No. 10175

An act defining cybercrime, providing for the prevention,


investigation, suppression and the imposition of penalties
therefor and for other purposes

INTERN
ET
SAFET
Y AND
NETIQ Image Source: Google Images

UETTE
PHISHING

▶ Phishing is the fraudulent attempt to obtain sensitive


information such as usernames, passwords and credit
card details by disguising as a trustworthy entity in an
electronic communication

INTERN ▶ It often directs users to


enter personal information
ET at a fake website

SAFET
Y AND
NETIQ Image Source: Google Images

UETTE
PHISHING

INTERN
ET
SAFET
Y AND
NETIQ Image Source: Google Images

UETTE
PHISHING

INTERN
ET
SAFET
Y AND
NETIQ Image Source: Google Images

UETTE
INTERNET FRAUD

▶ Internet fraud is a deception which makes use of the


Internet and could involve hiding of information or
providing incorrect information for the purpose
tricking victims out of money, property, and
inheritance.

INTERN
ET
SAFET
Y AND
NETIQ Image Source: Google Images

UETTE
INTERNET FRAUD

▶ Romance or Love Scam

INTERN
ET
SAFET
Y AND
NETIQ Source: https://www.youtube.com/watch?v=YIR6_qISZ9E

UETTE
INTERNET FRAUD

▶ Investment Scam

INTERN
ET
SAFET
Y AND
NETIQ
UETTE
MALWARE

▶ Malware (or malicious software) is software that is


specifically designed to disrupt, damage, or gain
unauthorized access to a computer system.

INTERN
ET Virus Worm Trojan

SAFET
Y AND Spyware Adware

NETIQ Image Source: Google Images

UETTE
MALWARE

INTERN
ET
SAFET
Y AND
NETIQ Image Source: Google Images

UETTE
PHISHING

▶ Ang phishing ay isang malisyosong gawain na


kung saan tinatangkang kunin ang mga
Ligtas at sensitibong personal at pinansyal na
impormasyon. Kabilang na dito ang username,
Responsable password, birthday, bank details, address, at iba
pa.

ng Paggamit
ng ICT

Image Source: Google Images


April 18, 2020
sa ulat ni John Consulta
Source: https://www.youtube.com/watch?v=Sl2akbqrPbs
HACKING

▶ Ang hacking ay ginagawa ng mga eksperto sa


computer upang makapagnakaw ng impormasyon,
Ligtas at makapagpalit ng mga data, at makapinsala.

Responsable
ng Paggamit
ng ICT

Image Source: Google Images


June 21, 2018
sa ulat ni Victoria Tulad
Source: https://www.youtube.com/watch?v=J4TjeqLMvQg
June 21, 2018
sa ulat ni Victoria Tulad
Source: https://www.youtube.com/watch?v=J4TjeqLMvQg
IDENTITY THEFT

▶ Ang identity theft ay ang paggamit sa katauhan


ng ibang tao nang walang permiso para sa
Ligtas at personal na motibo.

Responsable
ng Paggamit
ng ICT

Image Source: Google Images


February 28, 2016
sa ulat ni John Consulta

Source: https://www.youtube.com/watch?v=sUcw-mRHc60
February 28, 2016
sa ulat ni John Consulta

Source: https://www.youtube.com/watch?v=sUcw-mRHc60
DATA PROTECTION

▶ Ang data protection ay ang pag-iingat sa mga


mahahalagang impormasyon upang hindi masira o
mawala.

▶ Ilan sa mga halimbawa nito ay:

Ligtas at ▶ Anti-virus software


Responsable
▶ Updated software
ng Paggamit
ng ICT ▶ Backup files

▶ Password
Anu-ano ang mga
batas sa Pilipinas na
sumasaklaw sa
paggamit ng Internet?
MGA BATAS SA PAGGAMIT NG INTERNET

May mga batas na sumasaklaw ukol sa wastong


paggamit ng Internet. Ilan sa mga paglabag dito ay
Ligtas at ang mga sumusunod:

Responsable ▶

identity theft
forgery

ng Paggamit ▶

cybersex
child pornography
▶ cyberbullying
ng ICT
DATA PRIVACY ACT OF 2012
REPUBLIC ACT NO. 10173

An act protecting individual personal


information in information and communications
Ligtas at systems in the government and the private
sector, creating for this purpose a national
Responsable privacy commission, and for other purposes

ng Paggamit
ng ICT

Image Source: Google Images


MGA BATAS SA PAGGAMIT NG INTERNET
CYBERCRIME PREVENTION ACT OF 2012
REPUBLIC ACT NO. 10175

An act defining cybercrime, providing for the


prevention, investigation, suppression and the
Ligtas at imposition of penalties therefor and for other
purposes
Responsable
ng Paggamit
ng ICT

Image Source: Google Images


Mga Batas sa Paggamit ng
Mga karampatang parusa sa bawat paglabag sa RA 10175
Internet
Illegal Access · Illegal Interception · Multang PhP200,000.00 o higit pa
Data Interference · System Interference · 6 taon at isang araw – 12 taong pagkakakulong
Cyber-squatting · Computer-related Offenses o parehong kaparusahan

Multang hindi hihigit ng PhP500,000.00


Misuse of Devices 6 taon at isang araw – 12 taong pagkakakulong
o parehong kaparusahan

PhP200,000.00 – PhP1,000,000.00
Cybersex 6 taon at isang araw – 12 taong pagkakakulong
o parehong kaparusahan
Mga Batas sa Paggamit ng
Mga karampatang parusa sa bawat paglabag sa RA 10175
Internet
PhP50,000.00 – PhP5,000,000.00*
Child Pornography 1 buwan at isang araw – 30 taong
(RA 9775) pagkakakulong*
*depende sa mga nagawang paglabag na nakatakda sa RA 9775

Libel PhP6,000.00 o higit pa


6 taon at isang araw – 12 taong pagkakakulong

Iba pang paglabag PhP100,000.00 – PhP500,000.00


aiding or abetting in the commission of cybercrime pagkakakulong
attempt in the commission of cybercrime o parehong kaparusahan
GUIDE TO PERSONAL DATA PRIVACY

 Create strong passwords.

INTERN
ET
SAFET ▶ at least 12 characters long
Y AND ▶ combination of upper and lower case letters, numbers,
and if possible, symbols
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Never use the same password on multiple accounts.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Lock your device.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Always log out of browsers.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Make sure there is an https in the browser address


bar.

INTERN
ET
SAFET
Y AND The S after the HTTP stands for “Secure”
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Install an Anti-Virus…and update it.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Don’t click on pop-ups or virus warnings.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Install an ad blocker to lessen browser pop-ups.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Have you been Powned?

INTERN
ET
SAFET
Y AND Check out https://haveibeenpwned.com/PwnedWebsites

NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Clean up your Facebook Third-Party Apps.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Clean up your Facebook Groups.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Set up your Facebook Privacy Settings.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Unfriend Facebook friends you don’t know


personally.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Set up your Facebook Privacy Settings.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Don’t be too public.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Check and clean up your spam folder.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Be wary of phishing emails.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Avoid using work e-mail addresses for personal


matters.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Unsubscribe from unwanted newsletters.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Clean up your Browser Extensions.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Delete your Browsing Data.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Uninstall unwanted programs from your PC.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Back up your files and data.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Keep your software up-to-date.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Check and use firewalls.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Secure your wireless network.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Store personal and financial documents securely.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Be mindful of devices with company data on them.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
GUIDE TO PERSONAL DATA PRIVACY

 Pass this on.

INTERN
ET
SAFET
Y AND
NETIQ credits to National Privacy Commission (https://www.privacy.gov.ph/30-ways/)

UETTE
SPOTTING FALSE NEWS

Can you tell if a news


story is false?

INTERN This quiz will test your


ability to spot false stories
ET online!

SAFET bit.ly/SpotFalseNews

Y AND
NETIQ https://www.qzzr.com/c/quiz/371990/can-you-tell-if-a-news-story-is-fake

UETTE
THANK YOU

You might also like