0% found this document useful (0 votes)
15 views32 pages

Emptech Week 2

Uploaded by

masison143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views32 pages

Emptech Week 2

Uploaded by

masison143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Virtual

Tutorial in
EMPOWERMENT
TECHNOLOGIES
WEEK 1- MODULE 2
LEARNING COMPETENCIES

2. Apply online safety,


security, ethics, and
etiquette standards and
practice in the use of ICTs as
it would relate to their
specific professional tracks
Online safety and Security

• Internet safety, or online safety, is


the knowledge of maximizing the
user's personal safety against
security risks to private
information and property
associated with using the Internet,
and the self-protection from
computer crime in general.
How Safe are You?
TYPE OF
INFORMATION RISKS
1. First name There is a risk in sharing your first name. Chances are, a
hacker may already know plenty of stuff about you even
if you only give out your first name.

2. Last name If sharing your first name is a small risk, having both
your first and last is more risky. You will be vulnerable to
being searched for using search engines, which include
image search. Matching a name and a face is a modus
to several cybercrimes like identity theft.
TYPES OF
RISKS
INFORMATION
3. The name of your Risky, yet not as risky as posting their full names, especially your
mother and father mother’s maiden name. In fact, you may have already encountered
many websites that require your mother’s maiden name as an
answer to a secret question whenever you lose your password.

4. Your address Hopefully, you answered no to this one. Giving the internet your
number is one thing; giving them your address is a whole other
level. It would be much easier for criminals to find you.

5. Your home phone This shared information is more risky than sharing your personal
number phone number. Scams usually use this information to deceive you,
one of which is when a stranger pretends to know your parents or
pretend to be you.
Tips to Stay Safe Online
The internet is a public place and it is up to you to protect yourself. Here are some
tips to help you stay safe when using the internet.

1. Be mindful of what you share online.


2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the
website handles the information you share.
4. Know the security features of the social networking site you use.
5. Do not share your password with anyone.
6. Avoid logging in to public network/Wi-Fi.
7. Do not talk to strangers online.
Tips to Stay Safe Online
7. Never post anything about future vacation.
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer.
11. Make your Wi-Fi at home private by adding a password.
12. Avoid downloading anything from untrusted websites.
13. Do not use pirated software.
14. Do not click links from suspicious emails.
1. Never post anything about future vacation.
2. Add friends you know in real life.
3. Avoid visiting untrusted websites.
4. Install and update an antivirus software on your computer.
5. Make your Wi-Fi at home private by adding a password.
6. Avoid downloading anything from untrusted websites.
7. Do not use pirated software.
8. Do not click links from suspicious emails.
Internet Threats
1. Malware– stands for malicious software.

a. Virus-a malicious program designed to replicate itself and transfer from


one computer to another either through the internet and local networks or data
storage like flash drives and CDs.
b.Worm-a malicious program that transfer from one computer to another by
any type of means. Often, it uses a computer network to spread itself.
c.Trojan-a malicious program that is disguised as a useful program but once
downloaded or installed, leaves you PC unprotected anf allows hackers to get you
information.
*Rogue security software-tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality, they are
not protected at all.
Internet Threats

d. Spyware-a program that runs in the background without you


knowing it (thus called “spy”). It has the ability to monitor what you
are currently doing and typing through keylogging.
*Keyloggers-used the record the keystroke done by the users.
This is done to steal their password or any other sensitive information.
e. Adware-a program designed to send you advertisements,
mostly as pop ups
Internet Threats
2. Spam– unwanted emails mostly from bots or
advertisers. It can be used to send malware

3. Phishing-Its goal is to acquire sensitive


personal information like passwords and credit
cards details. This is done by sending you an email
that will direct the user to visit a website and be
asked to update his/her username, password,
credit card, or personal information.
*Pharming-a more complicated way of
phishing where it exploits the DNS (Domain Name
Service) system.
Protecting Reputation Online

• Make no mistake, you and your


family's online reputation is a big
deal. There are myriad individuals,
including business associates,
neighbors, other family members,
and yes, even potential identity
thieves searching for you on a
regular basis.
Here are things you might want to consider
before posting something over the
Internet:
1. Before you post something on the web, ask these questions to
yourself: Would you want your parents or grandparents to see it?
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to private. In this way, search engines will not be
able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that post can affect you or other’s reputation, ask the
one who posted it to pull it down or report it as inappropriate.
Copyright infringement pertains to the violation of
someone's intellectual property (IP). It is another term for
piracy or the theft of someone’s original creation,
especially if the one who stole recoups the benefits and
not the creator of the material.
Here are some tips that could help
you avoid copyright infringement:
1. Copyright laws are designed to protect the creator of
original works, which are creative expressions from
others using and profiting their work, without permission.
2. Use Caution If It's Not Your Original Work.
3. Read, Read, Read.
4. Don't Believe the Urban Legends.
5. Look for Fair Use.
What I Have Learned?
Match Column A with Column B. Write the letter of the correct answer on
the space before each number.

A B
____1. virus a. designed to send your advertisements
____2. rogue b. tricks the user into posing that it is a
security software
____3. spam c. unwanted email mostly from bots
____4. fair use d. allows you to use copyrighted work
without consent with certain limitations.
____5. adware e. replicates and can transfer from one
computer to another
f. exploits the DNS system
ANSWER KEY
1. e
2. b
3. c
4. d
5. a
PERFORMANCE TASK 1:
Create a poster promoting “Think before you click.” You
can use any software like Canva, Photoshop, Word or
PowerPoint. Short bond paper.
Empowerment
Technologies
WEEK 2 –MODULE 3
LEARNING COMPETENCIES
3. Use the Internet as a tool for credible
research and information gathering to
best achieve specific class objectives or
address situational
• Google has amassed a global market share of 87%.No one serves up better
search results than Google. At least that’s the common perception. But is that
always the case? Google’s easy-to-use interface and personalized user
experience comes at a cost. It’s no secret the search engine giant catalogs
the browsing habits of its users and shares that in-formation with advertisers
and other interested parties.
If you are unwilling to trade privacy for convenience or have specific search
needs, there are a number of Google alternatives that offer a better search
experience.

1. Bing- One could argue that Bing actually outperforms Google in certain
respects. For starters, Bing has a rewards program that allows one to
accumulate points while searching. These points are redeemable at the
Microsoft and Windows stores, which is a nice perk. In my view, the Bing image
search GUI is superior to its rival’s and much more intuitive. Bing carries that
same clean user experience to video, making it the go-to source for video
search without a YouTube bias.
2. Yandex -Looking for a search perspective outside of the United States?
Yandex is used by more than 45% of Russian Internet users. It is also
used in Belarus, Kazakhstan, Tur-key, and Ukraine. Yandex is an overall
easy-to-use search engine. As an added bonus, it offers a suite of some
pretty cool tools
3. CC Search-CC Search should be your first stop on the hunt for nearly any type
of copy-right-free content. This search engine is perfect if you need music for a
video, an image for a blog post, or anything else without worrying about an angry
artist coming after you for ripping off their work. The way CC Search works is
simple – it draws in results from platforms such as Sound cloud, Wikimedia, and
Flickr and displays results labeled as Creative Commons material.
4. Dogpile – It is is a metasearch engine for information on the World Wide Web
that fetches results from Google, Yahoo!, Yandex, Bing,[2][3]and other popular
search engines, including those from audio and video content providers such as
Yahoo!.[3]
Other popular Search Engine that are being use are Yahoo Search, Ask, Aol
Search,, WebCrawler, MyWebSearch, Infospace, DuckDuckGo,
HOW TO USE THE INTERNET
1. Use email. Email is a lot like regular mail
and you can use it in many of the same
ways. You'll need to sign up with an
email service in order to get an address,
though. Many email services are free and
good ones include Gmail and
Outlook.com. When you go to check your
email, you will go to the website for the
service you signed up with and only the
service you signed up with in order to
read your mail.
HOW TO USE THE
INTERNET
2.Use Social Media. Social media is a term that encompasses a lot of
different kind of websites, all for connecting and communicating with
other people. Commonly used forms of social media include:
 Facebook, which is used for lots of different purposes, from messaging to
sharing pictures and videos.
 Twitter, which is used for sending very short updates and thoughts about
your life.
 Instagram, which is used for sharing pictures.
 Pinterest which is for sharing items you find on the internet.
HOW TO USE THE INTERNET

3. Read or write blogs. A blog, which was derived


from the term web log, is an online journal. You can
put text, pictures, and even videos in a blog. You
can write your own or you can read someone else's.
Blogs cover all sorts of different subjects, and are
starting to replace certain sections of the
newspaper in their function.
HOW TO USE THE INTERNET
4. Chat! You can use the internet to talk
directly with people you know (or even
people you don't know). If you want to talk
face-to-face or with voice like a phone, you
can use services like Skype, which is often
free or a low price. You can also type-chat,
which is like talking but with just text,
using a number of different services (like
AOL's Instant Messenger service AIM).
HOW TO USE THE INTERNET
5. Start dating! You can also date online!
There are sites that are free, as well as sites
that you pay for, all with the goal of helping
you meet someone that's right for you.
There are even specialty dating websites,
for people in particular professions or with
special interests. Match and eHarmony are
the most common. Meet me is a popular
free dating site and app for smartphones,
tablets, and computers.
ACTIVTY 5
Identify the following statement below.
___________1. Used for sending very short updates and thoughts about
your life.
___________2. Used for sharing pictures
___________3. Messages distributed by electronic means from one
computer user to one or more recipients via a network.
___________4. Used for lots of different purposes, from messaging to
sharing pictures and videos
___________5. Discussion or informational website published on the
World Wide Web consisting of discrete, often informal diary-style text
entries
ANSWER KEY

Activity 5
1. Twitter
2. Instagram
3. Email
4. Social Media
5. Blogs

You might also like