SlideShare une entreprise Scribd logo
1  sur  49
ONLINE
SAFETY,
SECURITY AND
RULES OF
NETIQUETTE
ACTIVITY
1.In a piece of paper write down your observation
on the following images.
ONLINE SAFETY
ONLINE SAFETY
How many checks you have for
shared?How many checks you have for not shared?
How safe are you when using the
internet?
ONLINE SAFETY
First Name
There is still a risk in sharing your first name. chances are, hacker
already knows plenty of stuff about you even if you only give out
your first name.
Last Name
If sharing your first name has a small risk, sharing both your first
and last name is more risky.
ONLINE SAFETY
Middle Name
Sharing your middle name is probably not the most risky of these
shared information, but sharing your entire full name would be.
Current and Previous School
Most people who steal identities study their subject. They can use
this information for verification purposes.
ONLINE SAFETY
Your Cell phone Number
Your cell phone number should never be posted over the internet.
The internet is a public place, it is the same as posting your number
on a billboard.
Who your Mother and Father are
Risky yet not as risky as posting their full names, especially your
Mother’s Maiden Name.
ONLINE SAFETY
Who your siblings are
This is a huge risk especially if you have a younger siblings.
Strangers may pretend or use their identity to dupe you.
Your address
It would be much easier for criminals to find you.
ONLINE SAFETY
Your Home Phone Number
Scams usually use this information to deceive you, one of which is
when a stranger pretends to know your parents or pretends to be
you.
Your Birthday
Having it in your profile makes you more vulnerable to identity
theft.
- it refers to the safety of people and their
information when using internet.
ONLINE SAFETY
- refers to the practices and precautions
that should be observed when using the
internet to ensure that the users as well as
their computers and personal information
are safe from crimes associated using the
internet.
ONLINE SAFETY
ONLINE SAFETY MEASURES
1. Never give any personal information out
about yourself over the internet.
2. Never give any banking or sensitive
information unless you are sure that it is a
reputable business having a secure service.
3. Never open any messages or attachment
from someone you don’t know.
ONLINE SAFETY MEASURES
4. Regularly check your privacy settings in
your account to make sure you are not sharing
important personal information.
5. When using a public computer terminal
make sure to delete your browsing data before
leaving.
ONLINE SAFETY MEASURES
6. Keep your software updated to avoid
security holes.
7. Do not download or install software or
anything on your computer or cell phone that
is unknown to you.
- related to not only Internet, ofteninvolving browser
security and the World Wide Web, but also network security
as it applies to other applications or operating systems as a
whole.
ONLINE SECURITY
SECURITY REQUIREMENT
TRIAD
Confidentiality
Data confidentiality
Privacy
Integrity
 Data integrity
 System integrity
Availability
Types of System Intruders
Masquerader
- Unauthorized user who penetrates a system exploiting a
legitimate user’s account (outside).
Hackers
- Legitimate user who makes unauthorized accesses or misuses
his privileges (inside).
Clandestine user
- Seizes supervisory control to evade auditing and access
controls or suppress audit collection (inside|outside)
Parts of Virus
Infection mechanism
- The means by which a virus spreads, enabling it
to replicate. The mechanism is also referred to
as the infection vector.
- This is how the virus spreads or propagates. A
virus typically has a search routine, which
locates new files or new disks for infection
Parts of Virus
Trigger
-Also known as a logic bomb, this is the compiled
version that could be activated any time within
an executable file when the virus is run that
determines the event or condition for the malicious
"payload" to be activated or delivered such as a
particular date, a particular time, particular presence
of another program, capacity of the disk exceeding
some limit, or a double-click that opens a particular
file.
Parts of Virus
Payload
-The "payload" is the actual body or data which carries
out the malicious purpose of the virus. Payload activity
might be noticeable (e.g., because it causes the system
to slow down or "freeze"), as most of the time the
"payload" itself is the harmful activity, or sometimes
non-destructive but distributive, which is called virus
hoax.
Virus Stages
Dormant Phase
-The Virus is idle.
Propagation Phase
-Virus places an identical copy of itself into other
programs or into certain system areas on the
disk.
Virus Stages
Triggering Phase
-Virus is activated to perform the function for
which it was intended.
Execution Phase
-It can be destructive such as deleting files on
disk, crashing the system, or corrupting files or
relatively harmless such as popping up humorous
or political messages on screen.
Key Terms
1. Cyber Crime
- a crime committed or assisted through the use
of the Internet.
a. Cyber Bullying
- can work in the same way as bullying in the
playground; the victim feels frightened and
alone, while the bully tries to hide from being
caught.
Key Terms
1. Cyber Crime
b. Cyber Stalking
- Harassment on the internet can be just as
frightening as other forms of stalking.
Key Terms
1. Cyber Crime
c. Identity Theft
- The more information you make available online,
the greater the risk of identity theft. It can be very
tempting to reply to an email or open an
attachment or post information about yourself on
social networking sites, but you should never do
it.
Key Terms
1. Cyber Crime
d. Sexting
- usually refers to sending and receiving rude
messages or videos of:
 naked pictures
 'underwear shots'
 any sexual texts, images or videos
Key Terms
1. Cyber Crime
d. Sexting
- These images or videos can be sent from a
boyfriend or girlfriend or a friend or someone
you've met online. You also may have sent a
sexual photo, video or text to someone else.
Key Terms
1. Cyber Crime
d. Sexting
Remember:
 There is no turning back once you press send.
 Even if you use apps like Snapchat the person
can take a screen shot
 You risk being seen as someone you are not.
Key Terms
2. Privacy Policy / Terms of Service
- tells the user how the website will handle its
data.
3. Malware
-stands for malicious software variants, including
viruses, ransom ware and spyware.
Key Terms
3. Malware
a. Virus
- a malicious program designed to transfer from one
computer to another in any means possible.
b. Worms
- a malicious program designed to replicate itself and
transfer from one file folder to another and also
transfer to other computers.
Key Terms
3. Malware
c. Trojan
- a malicious program designed that is disguised as a
useful program but once downloaded or installed,
leaves your PC unprotected and allows hacker to
get your information.
Key Terms
3. Malware
d. Spyware
- a program that runs in the background without you
knowing it. It has the ability to monitor what you
are currently doing and typing through key logging.
e. Adware
- a program designed to send you advertisement,
mostly pop-ups.
Key Terms
4. Spam
- unwanted email mostly from bots or
advertisers.
5. Phishing
-acquires sensitive personal information like
passwords and credits card details.
Key Terms
6. Pharming
- a more complicated way of phishing where it
exploits the DNS system.
7. Copyright
- a part of law, wherein you have the rights to
work, anyone who uses it w/o your consent is
punishable by law.
Key Terms
8. Fair use
- means that an intellectual property may be
used w/o consent as long as it is used in
commentaries, criticism, parodies, research and
etc.
9. Key Loggers
- used to record the keystrokes done by user.
This is done to steal passwords or any other
sensitive information.
Key Terms
10. Rogue Security Software
- is a form of malicious software and internet
fraud that misleads users into believing there is a
virus on their computer, and manipulates them
into paying money for a fake malware removal
tool.
- is network etiquette, the do’s and don’ts of
online communication.
NETIQUETTE
10 Rules of Netiquette
Rule 1: Remember the Human
You need to remember that you are talking to a
real person when you are online.
The internet brings people together who would
otherwise never meet.
Remember this saying when sending an email:
Would I say this to the person’s face.
10 Rules of Netiquette
Rule 2: Adhere to the same standard online
that you follow in real life
You need to behave the same way online that you
do in real life.
You need to remember that you can get caught
doing things you should not be doing online just
like you can in real life.
You are still talking to a real person with feelings
even though you can’t see them.
10 Rules of Netiquette
Rule 3: Know where you are in cyber space
Always take a look around when you enter a new
domain when surfing the web.
Get a sense of what the discussion group is about
before you join it.
10 Rules of Netiquette
Rule 4: Respect other people’s time and
bandwidth
Remember people have other things to do besides
read your email. You are not the center of their
world.
Keep your post and emails to minimum by saying
what you want to say.
Remember everyone won’t answer your
questions.
10 Rules of Netiquette
Rule 5: Make yourself look good online
Be polite and pleasant to everyone.
Always check your spelling and grammar before
posting.
Know what you are talking about and make sense
saying it.
10 Rules of Netiquette
Rule 6: Share expert knowledge
Ask questions online
Share what you know online.
Post the answers to your questions online because
someone may have the same question you do.
10 Rules of Netiquette
Rule 7: Helps keep flame wars under control
Netiquette does not forgive flaming.
Netiquette does however forbid people who are
flaming to hurt discussion groups by putting the
group down.
10 Rules of Netiquette
Rule 8: Respect other people’s privacy
Do not read other people’s mail without their
permission.
Going through other people’s things could cost
you, your job or you could even go to jail.
Not respecting other people’s privacy is a bad
netiquette
10 Rules of Netiquette
Rule 9: Don’t abuse your power
Do not take advantage of other people just
because you have more knowledge or power than
them.
Treat others as you would want them to treat you
if the roles were reversed.
10 Rules of Netiquette
Rule 10: Be forgiving of other people’s
mistake
Do not point out mistakes to people online.
Remember that you were once the new kid on the
block.
You still need to have a good manners even
though you are online and cannot see the person
face to face.
ACTIVITY 2.
Make an ad/poster online about
“Think Before You Click” campaign.
Post it to your FB timeline. Use the
hashtags
#EmpowermentTechnology

Contenu connexe

Tendances

8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT DevelopmentTeodoro Llanes II
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICTJazzyNF
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptxRyanRojasRicablanca
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Amber Espiritu
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skillsJonathan Jr Marcelino
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Aira Shayne Come
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)bloodyblade06
 

Tendances (20)

8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skills
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 

Similaire à Empowerment Technology Lesson 2

online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette007rgmel
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 

Similaire à Empowerment Technology Lesson 2 (20)

itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 

Plus de alicelagajino

TLE 7 Lesson 5 - 2nd Quarter
TLE 7 Lesson 5 - 2nd QuarterTLE 7 Lesson 5 - 2nd Quarter
TLE 7 Lesson 5 - 2nd Quarteralicelagajino
 
TLE 7 Lesson 4 - 2nd Quarter
TLE 7 Lesson 4 - 2nd QuarterTLE 7 Lesson 4 - 2nd Quarter
TLE 7 Lesson 4 - 2nd Quarteralicelagajino
 
TLE 7 Lesson 3 - 2nd Quarter
TLE 7 Lesson 3 - 2nd QuarterTLE 7 Lesson 3 - 2nd Quarter
TLE 7 Lesson 3 - 2nd Quarteralicelagajino
 
TLE 7 Lesson 2 - 2nd Quarter
TLE 7 Lesson 2 - 2nd QuarterTLE 7 Lesson 2 - 2nd Quarter
TLE 7 Lesson 2 - 2nd Quarteralicelagajino
 
TLE 7 Lesson 1 - 2nd Quarter
TLE 7 Lesson 1 - 2nd QuarterTLE 7 Lesson 1 - 2nd Quarter
TLE 7 Lesson 1 - 2nd Quarteralicelagajino
 
TLE 7 Lesson 6 - 1st Quarter
TLE 7 Lesson 6 - 1st QuarterTLE 7 Lesson 6 - 1st Quarter
TLE 7 Lesson 6 - 1st Quarteralicelagajino
 
TLE 7 Lesson 5 - 1st Quarter
TLE 7 Lesson 5 - 1st QuarterTLE 7 Lesson 5 - 1st Quarter
TLE 7 Lesson 5 - 1st Quarteralicelagajino
 
TLE 7 Lesson 4 - 1st Quarter
TLE 7 Lesson 4 - 1st QuarterTLE 7 Lesson 4 - 1st Quarter
TLE 7 Lesson 4 - 1st Quarteralicelagajino
 
TLE 7 Lesson 3 - 1st Quarter
TLE 7 Lesson 3 - 1st QuarterTLE 7 Lesson 3 - 1st Quarter
TLE 7 Lesson 3 - 1st Quarteralicelagajino
 
TLE 7 Lesson 2 - 1st Quarter
TLE 7 Lesson 2 - 1st QuarterTLE 7 Lesson 2 - 1st Quarter
TLE 7 Lesson 2 - 1st Quarteralicelagajino
 
TLE 7 Lesson 1 - 1st Quarter
TLE 7 Lesson 1 - 1st QuarterTLE 7 Lesson 1 - 1st Quarter
TLE 7 Lesson 1 - 1st Quarteralicelagajino
 
Math 8 Lesson 3 - 2nd Quarter
Math 8 Lesson 3 - 2nd QuarterMath 8 Lesson 3 - 2nd Quarter
Math 8 Lesson 3 - 2nd Quarteralicelagajino
 
Math 8 Lesson 2 - 2nd Quarter
Math 8 Lesson 2 - 2nd QuarterMath 8 Lesson 2 - 2nd Quarter
Math 8 Lesson 2 - 2nd Quarteralicelagajino
 
Math 8 Lesson 1 - 2nd Quarter
Math 8 Lesson 1 - 2nd QuarterMath 8 Lesson 1 - 2nd Quarter
Math 8 Lesson 1 - 2nd Quarteralicelagajino
 
Math 8 Lesson 3 - 1st Quarter
Math 8 Lesson 3 - 1st QuarterMath 8 Lesson 3 - 1st Quarter
Math 8 Lesson 3 - 1st Quarteralicelagajino
 
Math 8 Lesson 2 - 1st Quarter
Math 8 Lesson 2 - 1st QuarterMath 8 Lesson 2 - 1st Quarter
Math 8 Lesson 2 - 1st Quarteralicelagajino
 
Math 8 Lesson 1 - 1st Quarter
Math 8 Lesson 1 - 1st QuarterMath 8 Lesson 1 - 1st Quarter
Math 8 Lesson 1 - 1st Quarteralicelagajino
 
General Math Lesson 3
General Math Lesson 3General Math Lesson 3
General Math Lesson 3alicelagajino
 
General Math Lesson 2
General Math Lesson 2General Math Lesson 2
General Math Lesson 2alicelagajino
 
General Math Lesson 1
General Math Lesson 1General Math Lesson 1
General Math Lesson 1alicelagajino
 

Plus de alicelagajino (20)

TLE 7 Lesson 5 - 2nd Quarter
TLE 7 Lesson 5 - 2nd QuarterTLE 7 Lesson 5 - 2nd Quarter
TLE 7 Lesson 5 - 2nd Quarter
 
TLE 7 Lesson 4 - 2nd Quarter
TLE 7 Lesson 4 - 2nd QuarterTLE 7 Lesson 4 - 2nd Quarter
TLE 7 Lesson 4 - 2nd Quarter
 
TLE 7 Lesson 3 - 2nd Quarter
TLE 7 Lesson 3 - 2nd QuarterTLE 7 Lesson 3 - 2nd Quarter
TLE 7 Lesson 3 - 2nd Quarter
 
TLE 7 Lesson 2 - 2nd Quarter
TLE 7 Lesson 2 - 2nd QuarterTLE 7 Lesson 2 - 2nd Quarter
TLE 7 Lesson 2 - 2nd Quarter
 
TLE 7 Lesson 1 - 2nd Quarter
TLE 7 Lesson 1 - 2nd QuarterTLE 7 Lesson 1 - 2nd Quarter
TLE 7 Lesson 1 - 2nd Quarter
 
TLE 7 Lesson 6 - 1st Quarter
TLE 7 Lesson 6 - 1st QuarterTLE 7 Lesson 6 - 1st Quarter
TLE 7 Lesson 6 - 1st Quarter
 
TLE 7 Lesson 5 - 1st Quarter
TLE 7 Lesson 5 - 1st QuarterTLE 7 Lesson 5 - 1st Quarter
TLE 7 Lesson 5 - 1st Quarter
 
TLE 7 Lesson 4 - 1st Quarter
TLE 7 Lesson 4 - 1st QuarterTLE 7 Lesson 4 - 1st Quarter
TLE 7 Lesson 4 - 1st Quarter
 
TLE 7 Lesson 3 - 1st Quarter
TLE 7 Lesson 3 - 1st QuarterTLE 7 Lesson 3 - 1st Quarter
TLE 7 Lesson 3 - 1st Quarter
 
TLE 7 Lesson 2 - 1st Quarter
TLE 7 Lesson 2 - 1st QuarterTLE 7 Lesson 2 - 1st Quarter
TLE 7 Lesson 2 - 1st Quarter
 
TLE 7 Lesson 1 - 1st Quarter
TLE 7 Lesson 1 - 1st QuarterTLE 7 Lesson 1 - 1st Quarter
TLE 7 Lesson 1 - 1st Quarter
 
Math 8 Lesson 3 - 2nd Quarter
Math 8 Lesson 3 - 2nd QuarterMath 8 Lesson 3 - 2nd Quarter
Math 8 Lesson 3 - 2nd Quarter
 
Math 8 Lesson 2 - 2nd Quarter
Math 8 Lesson 2 - 2nd QuarterMath 8 Lesson 2 - 2nd Quarter
Math 8 Lesson 2 - 2nd Quarter
 
Math 8 Lesson 1 - 2nd Quarter
Math 8 Lesson 1 - 2nd QuarterMath 8 Lesson 1 - 2nd Quarter
Math 8 Lesson 1 - 2nd Quarter
 
Math 8 Lesson 3 - 1st Quarter
Math 8 Lesson 3 - 1st QuarterMath 8 Lesson 3 - 1st Quarter
Math 8 Lesson 3 - 1st Quarter
 
Math 8 Lesson 2 - 1st Quarter
Math 8 Lesson 2 - 1st QuarterMath 8 Lesson 2 - 1st Quarter
Math 8 Lesson 2 - 1st Quarter
 
Math 8 Lesson 1 - 1st Quarter
Math 8 Lesson 1 - 1st QuarterMath 8 Lesson 1 - 1st Quarter
Math 8 Lesson 1 - 1st Quarter
 
General Math Lesson 3
General Math Lesson 3General Math Lesson 3
General Math Lesson 3
 
General Math Lesson 2
General Math Lesson 2General Math Lesson 2
General Math Lesson 2
 
General Math Lesson 1
General Math Lesson 1General Math Lesson 1
General Math Lesson 1
 

Dernier

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Empowerment Technology Lesson 2

  • 2. ACTIVITY 1.In a piece of paper write down your observation on the following images.
  • 4. ONLINE SAFETY How many checks you have for shared?How many checks you have for not shared? How safe are you when using the internet?
  • 5. ONLINE SAFETY First Name There is still a risk in sharing your first name. chances are, hacker already knows plenty of stuff about you even if you only give out your first name. Last Name If sharing your first name has a small risk, sharing both your first and last name is more risky.
  • 6. ONLINE SAFETY Middle Name Sharing your middle name is probably not the most risky of these shared information, but sharing your entire full name would be. Current and Previous School Most people who steal identities study their subject. They can use this information for verification purposes.
  • 7. ONLINE SAFETY Your Cell phone Number Your cell phone number should never be posted over the internet. The internet is a public place, it is the same as posting your number on a billboard. Who your Mother and Father are Risky yet not as risky as posting their full names, especially your Mother’s Maiden Name.
  • 8. ONLINE SAFETY Who your siblings are This is a huge risk especially if you have a younger siblings. Strangers may pretend or use their identity to dupe you. Your address It would be much easier for criminals to find you.
  • 9. ONLINE SAFETY Your Home Phone Number Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you. Your Birthday Having it in your profile makes you more vulnerable to identity theft.
  • 10. - it refers to the safety of people and their information when using internet. ONLINE SAFETY
  • 11. - refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated using the internet. ONLINE SAFETY
  • 12. ONLINE SAFETY MEASURES 1. Never give any personal information out about yourself over the internet. 2. Never give any banking or sensitive information unless you are sure that it is a reputable business having a secure service. 3. Never open any messages or attachment from someone you don’t know.
  • 13. ONLINE SAFETY MEASURES 4. Regularly check your privacy settings in your account to make sure you are not sharing important personal information. 5. When using a public computer terminal make sure to delete your browsing data before leaving.
  • 14. ONLINE SAFETY MEASURES 6. Keep your software updated to avoid security holes. 7. Do not download or install software or anything on your computer or cell phone that is unknown to you.
  • 15. - related to not only Internet, ofteninvolving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems as a whole. ONLINE SECURITY
  • 17. Types of System Intruders Masquerader - Unauthorized user who penetrates a system exploiting a legitimate user’s account (outside). Hackers - Legitimate user who makes unauthorized accesses or misuses his privileges (inside). Clandestine user - Seizes supervisory control to evade auditing and access controls or suppress audit collection (inside|outside)
  • 18. Parts of Virus Infection mechanism - The means by which a virus spreads, enabling it to replicate. The mechanism is also referred to as the infection vector. - This is how the virus spreads or propagates. A virus typically has a search routine, which locates new files or new disks for infection
  • 19. Parts of Virus Trigger -Also known as a logic bomb, this is the compiled version that could be activated any time within an executable file when the virus is run that determines the event or condition for the malicious "payload" to be activated or delivered such as a particular date, a particular time, particular presence of another program, capacity of the disk exceeding some limit, or a double-click that opens a particular file.
  • 20. Parts of Virus Payload -The "payload" is the actual body or data which carries out the malicious purpose of the virus. Payload activity might be noticeable (e.g., because it causes the system to slow down or "freeze"), as most of the time the "payload" itself is the harmful activity, or sometimes non-destructive but distributive, which is called virus hoax.
  • 21. Virus Stages Dormant Phase -The Virus is idle. Propagation Phase -Virus places an identical copy of itself into other programs or into certain system areas on the disk.
  • 22. Virus Stages Triggering Phase -Virus is activated to perform the function for which it was intended. Execution Phase -It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen.
  • 23. Key Terms 1. Cyber Crime - a crime committed or assisted through the use of the Internet. a. Cyber Bullying - can work in the same way as bullying in the playground; the victim feels frightened and alone, while the bully tries to hide from being caught.
  • 24. Key Terms 1. Cyber Crime b. Cyber Stalking - Harassment on the internet can be just as frightening as other forms of stalking.
  • 25. Key Terms 1. Cyber Crime c. Identity Theft - The more information you make available online, the greater the risk of identity theft. It can be very tempting to reply to an email or open an attachment or post information about yourself on social networking sites, but you should never do it.
  • 26. Key Terms 1. Cyber Crime d. Sexting - usually refers to sending and receiving rude messages or videos of:  naked pictures  'underwear shots'  any sexual texts, images or videos
  • 27. Key Terms 1. Cyber Crime d. Sexting - These images or videos can be sent from a boyfriend or girlfriend or a friend or someone you've met online. You also may have sent a sexual photo, video or text to someone else.
  • 28. Key Terms 1. Cyber Crime d. Sexting Remember:  There is no turning back once you press send.  Even if you use apps like Snapchat the person can take a screen shot  You risk being seen as someone you are not.
  • 29. Key Terms 2. Privacy Policy / Terms of Service - tells the user how the website will handle its data. 3. Malware -stands for malicious software variants, including viruses, ransom ware and spyware.
  • 30. Key Terms 3. Malware a. Virus - a malicious program designed to transfer from one computer to another in any means possible. b. Worms - a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
  • 31. Key Terms 3. Malware c. Trojan - a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information.
  • 32. Key Terms 3. Malware d. Spyware - a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging. e. Adware - a program designed to send you advertisement, mostly pop-ups.
  • 33. Key Terms 4. Spam - unwanted email mostly from bots or advertisers. 5. Phishing -acquires sensitive personal information like passwords and credits card details.
  • 34. Key Terms 6. Pharming - a more complicated way of phishing where it exploits the DNS system. 7. Copyright - a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law.
  • 35. Key Terms 8. Fair use - means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research and etc. 9. Key Loggers - used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information.
  • 36. Key Terms 10. Rogue Security Software - is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.
  • 37. - is network etiquette, the do’s and don’ts of online communication. NETIQUETTE
  • 38. 10 Rules of Netiquette Rule 1: Remember the Human You need to remember that you are talking to a real person when you are online. The internet brings people together who would otherwise never meet. Remember this saying when sending an email: Would I say this to the person’s face.
  • 39. 10 Rules of Netiquette Rule 2: Adhere to the same standard online that you follow in real life You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to a real person with feelings even though you can’t see them.
  • 40. 10 Rules of Netiquette Rule 3: Know where you are in cyber space Always take a look around when you enter a new domain when surfing the web. Get a sense of what the discussion group is about before you join it.
  • 41. 10 Rules of Netiquette Rule 4: Respect other people’s time and bandwidth Remember people have other things to do besides read your email. You are not the center of their world. Keep your post and emails to minimum by saying what you want to say. Remember everyone won’t answer your questions.
  • 42. 10 Rules of Netiquette Rule 5: Make yourself look good online Be polite and pleasant to everyone. Always check your spelling and grammar before posting. Know what you are talking about and make sense saying it.
  • 43. 10 Rules of Netiquette Rule 6: Share expert knowledge Ask questions online Share what you know online. Post the answers to your questions online because someone may have the same question you do.
  • 44. 10 Rules of Netiquette Rule 7: Helps keep flame wars under control Netiquette does not forgive flaming. Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
  • 45. 10 Rules of Netiquette Rule 8: Respect other people’s privacy Do not read other people’s mail without their permission. Going through other people’s things could cost you, your job or you could even go to jail. Not respecting other people’s privacy is a bad netiquette
  • 46. 10 Rules of Netiquette Rule 9: Don’t abuse your power Do not take advantage of other people just because you have more knowledge or power than them. Treat others as you would want them to treat you if the roles were reversed.
  • 47. 10 Rules of Netiquette Rule 10: Be forgiving of other people’s mistake Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have a good manners even though you are online and cannot see the person face to face.
  • 48.
  • 49. ACTIVITY 2. Make an ad/poster online about “Think Before You Click” campaign. Post it to your FB timeline. Use the hashtags #EmpowermentTechnology