Empowerment Technology Week 2 Lesson 2
Empowerment Technology Week 2 Lesson 2
and Netiquette
Empowerment technologies – lesson 2
Start
!
M
Objectives
01 02
Identify different Analyze the scenario W
online threats. of netiquette.
03 T
Create virtual
commandments for
the end-user. F
Sample Scenario 1
Suddenly, a thief who’s been monitoring their social media accounts sees
the opportunity to break into their house. With knowledge of the family’s 3
absence, the thief waits for the right time and then robs their home, taking
valuable items like the TV, car, money, and jewelry.
refers to the
practices and 2
precautions that
should be observed 3
behaving properly
online. 3
4
M
Empowerment technologies – lesson 2
ONLINE W
THREATS T
F
Online threats 1
access to a computer
network without
authorization or 3
Malware Spam 2
Phishing Cyberbullying
3
Internet Scam
4
Contents of This Template
Here’s what you’ll find in this Slidesgo template:
1. A slide structure based on a multi-purpose presentation for education, which you can easily
adapt to your needs. For more info on how to edit the template, please visit
Slidesgo School or read our FAQs.
2. An assortment of graphic resources that are suitable for use in the presentation can be
found in the alternative resources slides.
3. A thanks slide, which you must keep so that proper credits for our design are given.
4. Two resources slides, where you’ll find links to all the elements used in the template.
5. Instructions for use.
6. Final slides with:
● The fonts and colors used in the template.
● A selection of illustrations. You can also customize and animate them as you wish
with the online editor. Visit Storyset to find more.
● More infographic resources, whose size and color can be edited.
● Sets of customizable icons of the following themes: general, business, avatar,
creative process, education, help & support, medical, nature, performing arts, SEO &
marketing, and teamwork.
You can delete this slide when you’re done editing the presentation.
Malware 1
VIRUS TROJAN 2
SPYWARE ADWARE
3
RANSOMWARE
4
Virus 1
a malicious 2
program designed
to transfer from one
computer to 3
another in any
means possible. 4
Trojan 1
2
a malicious
program designed
that is disguised as 3
a useful program.
4
Spyware 1
2
a program that runs
in the background
without you 3
knowing it.
4
Adware 1
2
a program
designed to send
you advertisement, 3
mostly pop-ups.
4
RANSOMWARE 1
a form of malware
that locks you out of 2
2
an email sent from an
internet criminal
disguised as an email
3
from a legitimate,
trustworthy source.
4
Cyberbullying 1
2
refers to the act of
tormenting, harassing,
or embarrassing
3
another person using
the internet.
4
Internet Scam 1
refers to someone
using internet services 2
or software to defraud
or take advantage of
victims, typically for
3
financial gain.
F
1. Use Strong, Unique Passwords 1
F
𝐴ctivity! Show me how your hashtag! 1
Direction:
Look at the following images and create a hashtag 2
based on the type of online threat represented by
each image. Write your answer on your notebook.
Random person will be called to share his/her answer.
3