SlideShare une entreprise Scribd logo
1  sur  55
EMPOWERMENT TECHNOLOGIES
PATRONAGE OF MARY DEVELOPMENT SCHOOL
MELVIN MOSOLINI ARIAS │ LESSON TWO │ APPLIED SUBJECT
CONTENT COVERAGE
• Online Security
• Internet Threats
• Protecting Reputations
Online
• Copyright
• Contextualized online
search and research
skill
INTERNET SAFETY
Refers to the
online security or
safety of people
and their
information when
using internet.
NETIQUETTE
Combination of the
words network and
etiquette and is
defined as a set of
rules for acceptable
online behavior.
TEN RULES OF NETIQUETTE
Rule no. 1: Remember the human
Rule no. 2: Adhere to the same standards
online that you follow in real life.
Rule no. 3: Know where you are in
cyberspace.
Rule no. 4: Respect other
people’s time and bandwidth.
Rule no. 5: Make yourself look
good online.
TEN RULES OF NETIQUETTE
Rule no. 6: Share expert knowledge
Rule no. 7: Help keep flame wars under
control
Rule no. 8: Respect other people’s privacy.
Rule no. 9: Don’t abuse your power
Rule no. 10: Be forgiving of
other people’s mistake.
RULES OF NETIQUETTE
You need to
remember that
you are talking to
a real person
when you are
online.
RULE 1: Remember the Human
RULES OF NETIQUETTE
The internet
brings people
together who
would otherwise
never meet.
RULE 1: Remember the Human
RULES OF NETIQUETTE
Remember this
saying when
sending an email:
Would I say this
to the person’s
face.
RULE 1: Remember the Human
RULES OF NETIQUETTE
You need to
behave the
same way
online that you
do in real life.
RULE 2: Adhere to the same standards online that
you follow in real life.
RULES OF NETIQUETTE
You need to
remember that you
can get caught doing
things you should not
be doing online just
like you can in real
life.
RULE 2: Adhere to the same standards online that
you follow in real life.
RULES OF NETIQUETTE
You are still
talking to a real
person with
feelings even
though you can’t
see them.
RULE 2: Adhere to the same standards online that
you follow in real life.
RULES OF NETIQUETTE
Always take a
look around
when you enter a
new domain
when surfing the
web.
RULE 3: Know where you are in cyberspace.
RULES OF NETIQUETTE
Get a sense of
what the
discussion group
is about before
you join it.
RULE 3: Know where you are in cyberspace.
RULES OF NETIQUETTE
Remember people
have other things
to do besides read
your email. You are
not the center of
their world.
RULE 4: Respect other people’s time and
bandwidth.
RULES OF NETIQUETTE
Keep your post
and emails to
minimum by
saying what you
want to say.
RULE 4: Respect other people’s time and
bandwidth.
RULES OF NETIQUETTE
Remember
everyone won’t
answer your
questions.
RULE 4: Respect other people’s time and
bandwidth.
RULES OF NETIQUETTE
Be polite
and pleasant
to everyone.
RULE 5: Make yourself look good online.
RULES OF NETIQUETTE
Always check
your spelling
and grammar
before posting.
RULE 5: Make yourself look good online.
RULES OF NETIQUETTE
Know what you
are talking
about and make
sense saying it.
RULE 5: Make yourself look good online.
RULES OF NETIQUETTE
Ask
questions
online
RULE 6: Share expert knowledge.
RULES OF NETIQUETTE
Share what
you know
online.
RULE 6: Share expert knowledge.
RULES OF NETIQUETTE
Post the answers
to your questions
online because
someone may
have the same
question you do.
RULE 6: Share expert knowledge.
RULES OF NETIQUETTE
Netiquette
does not
forgive
flaming.
RULE 7: Help keep flame wars under control.
RULES OF NETIQUETTE
Netiquette does
however forbid
people who are
flaming to hurt
discussion groups
by putting the
group down.
RULE 7: Help keep flame wars under control.
RULES OF NETIQUETTE
Do not read
other people’s
mail without
their
permission.
RULE 8: Respect other people’s privacy.
RULES OF NETIQUETTE
Going through
other people’s
things could cost
you, your job or
you could even
go to jail.
RULE 8: Respect other people’s privacy.
RULES OF NETIQUETTE
Not respecting
other people’s
privacy is a bad
netiquette.
RULE 8: Respect other people’s privacy.
RULES OF NETIQUETTE
Do not take
advantage of other
people just because
you have more
knowledge or power
than them.
RULE 9: Don’t abuse your power.
RULES OF NETIQUETTE
Treat others as you
would want them to
treat you if the roles
were reversed.
RULE 9: Don’t abuse your power.
RULES OF NETIQUETTE
Do not point
out mistakes to
people online.
RULE 10: Be forgiving of other
people’s mistake.
RULES OF NETIQUETTE
Remember
that you were
once the new
kid on the
block.
RULE 10: Be forgiving of other
people’s mistake.
RULES OF NETIQUETTE
You still need to have
a good manners even
though you are online
and cannot see the
person face to face.
RULE 10: Be forgiving of other
people’s mistake.
INTERNET THREATS
 MALWARE
 SPAM
 PHISHING
INTERNET THREATS
 MALWARE
Stands for
Malicious
Software, any
program or file
that is harmful to
a computer user.
INTERNET THREATS
SPAM
Unwanted
email mostly
from
advertisers.
INTERNET THREATS
 PHISHING
Its goal is to
acquire sensitive
personal
information like
passwords and
credit card details.
KINDS OF MALWARE
 VIRUS
 WORM
 TROJAN
 SPYWARE
 KEYLOGGER
 ADWARE
MALWARE
 VIRUS
Program designed
to replicate itself
and transfer from
one computer to
another.
MALWARE
 WORM
A malicious program that transfers from one
computer to another by any types of means.
MALWARE
 TROJAN
A malicious program
that is disguised as a
useful program but
once downloaded or
installed , leaves your
PC unprotected and
allows hacker to get
you information.
MALWARE
 SPYWARE
Software that
ruins in the
background
without you
knowing it.
MALWARE
 KEYLOGGERS
Used to record
the keystroke
done by the
user.
MALWARE
 ADWARE
A program designed
to send you
advertisements,
mostly a pop-ups.
PROTECTING REPUTATIONS ONLINE
 INTELLECTUAL
PROPERTY
 COPYRIGHT
LAW
 COPYRIGHT
PAGE
PROTECTING REPUTATIONS ONLINE
 INTELLECTUAL
PROPERTY
Intellectual property is a
category of property that
includes intangible creations
of the human intellect.
Intellectual property
encompasses two types of
rights: industrial property
rights and copyright.
PROTECTING REPUTATIONS ONLINE
 COPYRIGHT
LAW
It is the legal
protection extended
to the owner of the
rights in an original
work.
PROTECTING REPUTATIONS ONLINE
 COPYRIGHT
PAGE
The copyright page is
where the publisher
places all the legal
notices and
information related
to a book.
TO AVOID COPYRIGHT INFRINGEMENT
UNDERSTAND
Copyright protect
literary works,
photographs
paintings, drawing,
films, music
choreography and
sculptures.
TO AVOID COPYRIGHT INFRINGEMENT
 BE RESPONSIBLE
Even if a material does not say
that it is copyrighted, it is not a
valid defense against copyright.
TO AVOID COPYRIGHT INFRINGEMENT
BE CREATIVE
Ask yourself whether
what you are making
is something that
came from you or
something made
from somebody else
creativity.
TO AVOID COPYRIGHT INFRINGEMENT
KNOW THE LAW
There are some
limitations to
copyright laws.
ONLINE RESEARCH
Have a question in mind- Focus on a
question you want answered.
Narrow it down- Search engines like
Google, Bing, or Yahoo use several filters to
determine the most appropriate result for
you.
Advanced Search- The best way to filter
information you get from search engines is
by using the advanced search.
ONLINE RESEARCH
Look for a credible sources- Some wikis,
filled with updated information, are not a
credible source. When using wikis, check out
the link of the cited texts.
Give credit- Give credit to the original author
of the page or information. To properly site a
reference, you may use the format below.
EMPOWERMENT TECHNOLOGIES
PATRONAGE OF MARY DEVELOPMENT SCHOOL
SCIENCE, TECHNOLOGY, ENGINEERING, AND MATHEMATICS (STEM)

Contenu connexe

Tendances

Tendances (20)

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
Media and Information Literacy (MIL) - 9. Current and Future Trends in Media ...
 
Contextualized online search and research skill
Contextualized online search and research skillContextualized online search and research skill
Contextualized online search and research skill
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
 
EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skills
 
ICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development Communication
 

Similaire à EMPOWERMENT TECHNOLOGIES - LESSON 2

Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
RaquelPG96
 
Nettiquete
NettiqueteNettiquete
Nettiquete
osscar96
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 

Similaire à EMPOWERMENT TECHNOLOGIES - LESSON 2 (20)

W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-tech
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Netiquette
NetiquetteNetiquette
Netiquette
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Nettiquete
NettiqueteNettiquete
Nettiquete
 
Net project
Net projectNet project
Net project
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
Netiquette mine
Netiquette mineNetiquette mine
Netiquette mine
 
Netizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online CommunitiesNetizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online Communities
 
Lesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptxLesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptx
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 
RULES OF NETIQUETTE.pptx
RULES OF NETIQUETTE.pptxRULES OF NETIQUETTE.pptx
RULES OF NETIQUETTE.pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 

Plus de PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS)

Plus de PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS) (19)

ISLAM: RELIGION, PRACTICES, AND DOCTRINES
ISLAM: RELIGION, PRACTICES, AND DOCTRINES ISLAM: RELIGION, PRACTICES, AND DOCTRINES
ISLAM: RELIGION, PRACTICES, AND DOCTRINES
 
Christianity: Religion, Practices, and Doctrines
Christianity: Religion, Practices, and Doctrines Christianity: Religion, Practices, and Doctrines
Christianity: Religion, Practices, and Doctrines
 
DISASTER RISK MITIGATION - AP 10
DISASTER RISK MITIGATION - AP 10DISASTER RISK MITIGATION - AP 10
DISASTER RISK MITIGATION - AP 10
 
EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5
 
PAG - AARAL NG KASAYSAYAN: HEOGRAPIYA AT PERYODISASYON
PAG - AARAL NG KASAYSAYAN: HEOGRAPIYA AT PERYODISASYONPAG - AARAL NG KASAYSAYAN: HEOGRAPIYA AT PERYODISASYON
PAG - AARAL NG KASAYSAYAN: HEOGRAPIYA AT PERYODISASYON
 
JUDAISM: CONCEPT AND INTRODUCTION
JUDAISM: CONCEPT AND INTRODUCTIONJUDAISM: CONCEPT AND INTRODUCTION
JUDAISM: CONCEPT AND INTRODUCTION
 
BELIEF SYSTEM: RELIGION AND SPIRITUALITY
BELIEF SYSTEM: RELIGION AND SPIRITUALITYBELIEF SYSTEM: RELIGION AND SPIRITUALITY
BELIEF SYSTEM: RELIGION AND SPIRITUALITY
 
JUDAISM - FORMATION, PRACTICES, RITUALS, AND BELIEFS
JUDAISM - FORMATION, PRACTICES, RITUALS, AND BELIEFSJUDAISM - FORMATION, PRACTICES, RITUALS, AND BELIEFS
JUDAISM - FORMATION, PRACTICES, RITUALS, AND BELIEFS
 
Sustainable Development in the Philippine Context
Sustainable Development in the Philippine ContextSustainable Development in the Philippine Context
Sustainable Development in the Philippine Context
 
SUSTAINABLE DEVELOPMENT
SUSTAINABLE DEVELOPMENTSUSTAINABLE DEVELOPMENT
SUSTAINABLE DEVELOPMENT
 
PAGTUGON SA CLIMATE CHANGE - AP 10
PAGTUGON SA CLIMATE CHANGE - AP 10PAGTUGON SA CLIMATE CHANGE - AP 10
PAGTUGON SA CLIMATE CHANGE - AP 10
 
Aralin 3 - Kagustuhan at Pangangailangan
Aralin 3 - Kagustuhan at PangangailanganAralin 3 - Kagustuhan at Pangangailangan
Aralin 3 - Kagustuhan at Pangangailangan
 
CLIMATE CHANGE - AP 10
CLIMATE CHANGE - AP 10CLIMATE CHANGE - AP 10
CLIMATE CHANGE - AP 10
 
Aralin 2 - Konsepto ng kakapusan
Aralin 2 - Konsepto ng kakapusanAralin 2 - Konsepto ng kakapusan
Aralin 2 - Konsepto ng kakapusan
 
Religion - Lesson 1: Concept of Religon and Belief System
Religion - Lesson 1: Concept of Religon and Belief SystemReligion - Lesson 1: Concept of Religon and Belief System
Religion - Lesson 1: Concept of Religon and Belief System
 
Ekonomiks - Aralin 1: Ang Kahulugan ng Ekonomiks
Ekonomiks - Aralin 1: Ang Kahulugan ng EkonomiksEkonomiks - Aralin 1: Ang Kahulugan ng Ekonomiks
Ekonomiks - Aralin 1: Ang Kahulugan ng Ekonomiks
 
Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
Lesson 2: Performance Preventive Maintenance
Lesson 2: Performance Preventive MaintenanceLesson 2: Performance Preventive Maintenance
Lesson 2: Performance Preventive Maintenance
 
Interaksyon ng Demand at Supply
Interaksyon ng Demand at SupplyInteraksyon ng Demand at Supply
Interaksyon ng Demand at Supply
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 

EMPOWERMENT TECHNOLOGIES - LESSON 2

  • 1. EMPOWERMENT TECHNOLOGIES PATRONAGE OF MARY DEVELOPMENT SCHOOL MELVIN MOSOLINI ARIAS │ LESSON TWO │ APPLIED SUBJECT
  • 2. CONTENT COVERAGE • Online Security • Internet Threats • Protecting Reputations Online • Copyright • Contextualized online search and research skill
  • 3. INTERNET SAFETY Refers to the online security or safety of people and their information when using internet.
  • 4. NETIQUETTE Combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior.
  • 5. TEN RULES OF NETIQUETTE Rule no. 1: Remember the human Rule no. 2: Adhere to the same standards online that you follow in real life. Rule no. 3: Know where you are in cyberspace. Rule no. 4: Respect other people’s time and bandwidth. Rule no. 5: Make yourself look good online.
  • 6. TEN RULES OF NETIQUETTE Rule no. 6: Share expert knowledge Rule no. 7: Help keep flame wars under control Rule no. 8: Respect other people’s privacy. Rule no. 9: Don’t abuse your power Rule no. 10: Be forgiving of other people’s mistake.
  • 7. RULES OF NETIQUETTE You need to remember that you are talking to a real person when you are online. RULE 1: Remember the Human
  • 8. RULES OF NETIQUETTE The internet brings people together who would otherwise never meet. RULE 1: Remember the Human
  • 9. RULES OF NETIQUETTE Remember this saying when sending an email: Would I say this to the person’s face. RULE 1: Remember the Human
  • 10. RULES OF NETIQUETTE You need to behave the same way online that you do in real life. RULE 2: Adhere to the same standards online that you follow in real life.
  • 11. RULES OF NETIQUETTE You need to remember that you can get caught doing things you should not be doing online just like you can in real life. RULE 2: Adhere to the same standards online that you follow in real life.
  • 12. RULES OF NETIQUETTE You are still talking to a real person with feelings even though you can’t see them. RULE 2: Adhere to the same standards online that you follow in real life.
  • 13. RULES OF NETIQUETTE Always take a look around when you enter a new domain when surfing the web. RULE 3: Know where you are in cyberspace.
  • 14. RULES OF NETIQUETTE Get a sense of what the discussion group is about before you join it. RULE 3: Know where you are in cyberspace.
  • 15. RULES OF NETIQUETTE Remember people have other things to do besides read your email. You are not the center of their world. RULE 4: Respect other people’s time and bandwidth.
  • 16. RULES OF NETIQUETTE Keep your post and emails to minimum by saying what you want to say. RULE 4: Respect other people’s time and bandwidth.
  • 17. RULES OF NETIQUETTE Remember everyone won’t answer your questions. RULE 4: Respect other people’s time and bandwidth.
  • 18. RULES OF NETIQUETTE Be polite and pleasant to everyone. RULE 5: Make yourself look good online.
  • 19. RULES OF NETIQUETTE Always check your spelling and grammar before posting. RULE 5: Make yourself look good online.
  • 20. RULES OF NETIQUETTE Know what you are talking about and make sense saying it. RULE 5: Make yourself look good online.
  • 21. RULES OF NETIQUETTE Ask questions online RULE 6: Share expert knowledge.
  • 22. RULES OF NETIQUETTE Share what you know online. RULE 6: Share expert knowledge.
  • 23. RULES OF NETIQUETTE Post the answers to your questions online because someone may have the same question you do. RULE 6: Share expert knowledge.
  • 24. RULES OF NETIQUETTE Netiquette does not forgive flaming. RULE 7: Help keep flame wars under control.
  • 25. RULES OF NETIQUETTE Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down. RULE 7: Help keep flame wars under control.
  • 26. RULES OF NETIQUETTE Do not read other people’s mail without their permission. RULE 8: Respect other people’s privacy.
  • 27. RULES OF NETIQUETTE Going through other people’s things could cost you, your job or you could even go to jail. RULE 8: Respect other people’s privacy.
  • 28. RULES OF NETIQUETTE Not respecting other people’s privacy is a bad netiquette. RULE 8: Respect other people’s privacy.
  • 29. RULES OF NETIQUETTE Do not take advantage of other people just because you have more knowledge or power than them. RULE 9: Don’t abuse your power.
  • 30. RULES OF NETIQUETTE Treat others as you would want them to treat you if the roles were reversed. RULE 9: Don’t abuse your power.
  • 31. RULES OF NETIQUETTE Do not point out mistakes to people online. RULE 10: Be forgiving of other people’s mistake.
  • 32. RULES OF NETIQUETTE Remember that you were once the new kid on the block. RULE 10: Be forgiving of other people’s mistake.
  • 33. RULES OF NETIQUETTE You still need to have a good manners even though you are online and cannot see the person face to face. RULE 10: Be forgiving of other people’s mistake.
  • 34. INTERNET THREATS  MALWARE  SPAM  PHISHING
  • 35. INTERNET THREATS  MALWARE Stands for Malicious Software, any program or file that is harmful to a computer user.
  • 37. INTERNET THREATS  PHISHING Its goal is to acquire sensitive personal information like passwords and credit card details.
  • 38. KINDS OF MALWARE  VIRUS  WORM  TROJAN  SPYWARE  KEYLOGGER  ADWARE
  • 39. MALWARE  VIRUS Program designed to replicate itself and transfer from one computer to another.
  • 40. MALWARE  WORM A malicious program that transfers from one computer to another by any types of means.
  • 41. MALWARE  TROJAN A malicious program that is disguised as a useful program but once downloaded or installed , leaves your PC unprotected and allows hacker to get you information.
  • 42. MALWARE  SPYWARE Software that ruins in the background without you knowing it.
  • 43. MALWARE  KEYLOGGERS Used to record the keystroke done by the user.
  • 44. MALWARE  ADWARE A program designed to send you advertisements, mostly a pop-ups.
  • 45. PROTECTING REPUTATIONS ONLINE  INTELLECTUAL PROPERTY  COPYRIGHT LAW  COPYRIGHT PAGE
  • 46. PROTECTING REPUTATIONS ONLINE  INTELLECTUAL PROPERTY Intellectual property is a category of property that includes intangible creations of the human intellect. Intellectual property encompasses two types of rights: industrial property rights and copyright.
  • 47. PROTECTING REPUTATIONS ONLINE  COPYRIGHT LAW It is the legal protection extended to the owner of the rights in an original work.
  • 48. PROTECTING REPUTATIONS ONLINE  COPYRIGHT PAGE The copyright page is where the publisher places all the legal notices and information related to a book.
  • 49. TO AVOID COPYRIGHT INFRINGEMENT UNDERSTAND Copyright protect literary works, photographs paintings, drawing, films, music choreography and sculptures.
  • 50. TO AVOID COPYRIGHT INFRINGEMENT  BE RESPONSIBLE Even if a material does not say that it is copyrighted, it is not a valid defense against copyright.
  • 51. TO AVOID COPYRIGHT INFRINGEMENT BE CREATIVE Ask yourself whether what you are making is something that came from you or something made from somebody else creativity.
  • 52. TO AVOID COPYRIGHT INFRINGEMENT KNOW THE LAW There are some limitations to copyright laws.
  • 53. ONLINE RESEARCH Have a question in mind- Focus on a question you want answered. Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for you. Advanced Search- The best way to filter information you get from search engines is by using the advanced search.
  • 54. ONLINE RESEARCH Look for a credible sources- Some wikis, filled with updated information, are not a credible source. When using wikis, check out the link of the cited texts. Give credit- Give credit to the original author of the page or information. To properly site a reference, you may use the format below.
  • 55. EMPOWERMENT TECHNOLOGIES PATRONAGE OF MARY DEVELOPMENT SCHOOL SCIENCE, TECHNOLOGY, ENGINEERING, AND MATHEMATICS (STEM)