0% found this document useful (0 votes)
61 views60 pages

Etech Lesson 3

This document discusses netiquette and online safety. It begins with a 3-part definition of netiquette as the proper manner of communicating online and considering rules of communication. It then lists 15 multiple choice questions about online safety with answers of yes or no. Finally, it details various online dangers like computer viruses, trojans, worms, pharming, phishing, hackers, email spam and spoofing, and copyright infringement. It provides tips to stay safe such as being mindful of what you share, reading privacy policies, using strong passwords, avoiding public Wi-Fi, and not downloading untrusted files. It emphasizes thinking before posting and protecting your and others' reputations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views60 pages

Etech Lesson 3

This document discusses netiquette and online safety. It begins with a 3-part definition of netiquette as the proper manner of communicating online and considering rules of communication. It then lists 15 multiple choice questions about online safety with answers of yes or no. Finally, it details various online dangers like computer viruses, trojans, worms, pharming, phishing, hackers, email spam and spoofing, and copyright infringement. It provides tips to stay safe such as being mindful of what you share, reading privacy policies, using strong passwords, avoiding public Wi-Fi, and not downloading untrusted files. It emphasizes thinking before posting and protecting your and others' reputations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 60

Lesson 3:

PART 1: Netiquette
PART 2: Dangers on the Internet
Answer Yes, if you agree with the statement, and
No, if you disagree.
_______1. My computer has an antivirus, so it is okay to open most
email attachments like e-cards and video files.
_______ 2. Your friend told you that his college application was
rejected because you posted a video of him doing crazy
stuff at a party. You posted the video several years ago
but later took it down to protect your friend’s reputation.
Is it possible that the college found the video?
_______ 3. You and your best friend play a lot of video games. One
time, she asks you for your password so she can help
you level up and get in-game money. She promises to
keep your password a secret. Is it okay to give away your
password?
Answer Yes, if you agree with the statement, and
No, if you disagree.
_______ 4. You received an email stating that your mother's bank
account is going to be forfeited if you do not respond to
the email. Is it safe to reply?
_______ 5. You forgot that your essay for English class is due
tomorrow. While doing your research, you found a
website offering free essays.
_______ 6. There is a danger in posting information about a
future vacation.
_______ 7. Letting people know your birthday is probably a must
if you want to get as many gifts as possible. But having
it in your profile makes you vulnerable to identity theft.
Answer Yes, if you agree with the statement, and
No, if you disagree.
_______ 8. If there is no copyright notice, it's okay to copy
a Web page.
_______ 9. Lurking is sometimes considered impolite. It is
the practice of reading discussions without
contributing to them.
_______ 10. Your cousin asked for your fabulous zucchini
cake recipe at the last family function. While
you're sending it to him, you decide to e-mail it to
all 500 people in your address book as well. It is
an example of email spam.
Answer Yes, if you agree with the statement, and
No, if you disagree.
_______ 11. If someone insults and uses offensive language towards
you online, you should reply in the same manner.
_______ 12. If someone uses offensive language online, always
respond and not worry as no one knows who you are
online.
_______ 13. It is ok to constantly give our friends e-mail or items
online which they do not need.
_______ 14. Remember your audience. If you are putting something
on a web page remember that everyone in the world will
have access to it.
_______ 15. You are responsible for your actions on the internet.
Netiquette
 or network etiquette, is concerned with the
"proper" manner of communication in the
online environment.
 Whenever you communicate in the virtual
world, consider the following "rules," adapted
from Virginia Shea's Core Rules of Netiquette.
Core Rules of Netiquette
Core Rules of Netiquette
Core Rules of Netiquette
Core Rules of Netiquette
Core Rules of Netiquette
Core Rules of Netiquette
Core Rules of Netiquette
Core Rules of Netiquette
Core Rules of Netiquette
Core Rules of Netiquette
Online Safety and Security
The Internet is defined as the information
superhighway.
Tips to Stay Safe Online
1. Be mindful of what you share and what site you
share it to. Practice the Golden Rule: “Do unto
others as you would have others do unto you.”
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
Tips to Stay Safe Online
4. Know the security features of the social
networking site you use.
5. Do not share password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or
face-to-face.
Tips to Stay Safe Online
8. Never post anything about future vacation.
9. Add friends you know in real life.
10.Avoid visiting untrusted websites.
11.Install and update an antivirus software on
your computer.
12.If you have a Wi-Fi at home, make it a private
network by adding password.
Tips to Stay Safe Online
13.Avoid downloading anything from
untrusted websites.
14.Buy the software; do not use pirated
ones.
15.Do not reply or click links from
suspicious emails.
Think Before You Click

1. Before you post something on the


web, ask these questions to yourself:
• Would you want your parents or
grandparents to see it?
• Would you want your future boss to
see it?
Think Before You Click
2. Your friends depend on you to protect their
reputation online.
3. Set your post to “private”.
4. Avoid using names.
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it
down or report it as inappropriate.
LESSON 3: LEARNING TASK 1 A-
ACROSTIC POEM M-
Y-

Create an acrostic poem that describes you as R-
an individual who follows the core rules of C-
netiquette. Use the letters of your first name. P-
Your poem must have at least 10 lines. E-
R-
E-
Z-
PART 2: Dangers on the Internet
Computer Virus
 It is a program that duplicates itself and then
infects the computer. It spreads like a biological
virus.
 It can be transferred by the use of removable
storage media devices.
 Damages may be mild to severe.
Trojan Horse
 A malware fronting to perform a good task, but covertly
performs undesirable function with the intention of
entering the computer without the user’s consent.
 It can disable the computer’s defenses, opening it to
unauthorized entry. It can erase data, can corrupt files,
allow access to computer, and
Computer Worm
 It is a dangerous computer program that replicates itself
through a network.
 Some worms delete files, others disrupt the network function.
 It is usually spread through email and running of attachments
from suspicious sources.
 It spreads by exploiting weaknesses in operating systems
(but BLESS OS updates!)
Pharming
 This is a dangerous hacker attack on a website which directs
all traffic to that website to another fictitious website.
 The main objective is to obtain username and passwords, as
well as credit cards ad financial information, and use these to
steal their money electronically or use the credit cards of the
victims.
 It is a major concern of many online banking and electronic
commerce transactions.
Phishing
 It is a deceitful practice of trying to get confidential information
such as passwords and usernames, and credit card details by
making it appear as if it comes from a trustworthy source.
 It is usually done through emails or using popular entity such
as Microsoft, Yahoo, Google, Amazon, and financial
institutions.
Hacker
 This is a person who is able to enter and control
other people’s computer without authorization.
 Usually vandalizes the victims’ website, steals
personal information, obtains intellectual
property, and performs credit card fraud.
 Firewalls are able to prevent entry by hackers.
Email Spam
 AKA Junk mail
 Usually unsolicited commercial email sent from an unknown
source with identical message sent to multiple recipients.
 Usually not dangerous but can be time and space consuming.
 Dangerous ones can carry viruses and other malicious
software (Malware)
Email Spoofing
 It is a deceitful email practice in which the sender
address is changed, so that it would appear to have
come from a different source which is usually someone
you know.
 Email spoofing is usually used by spammers to hide
the origin of the spam.
Copyright Infringement
Intellectual Property
Copyright Law
Copyright Page “No part of this book may be copied,
reproduced……”
Copyright Infringement
1. Understand. Copyright protects literary works,
photographs paintings, drawings, films, music
(and lyrics), choreography, and sculptures.
2. Be responsible. Even if a material does not say
that it is copyrighted, it is not a valid defense
against copyright.
Rules of Netiquette
Copyright Infringement
3. Be creative. Ask yourself whether what you are
making is something that came from you or
something made from somebody else’s creativity.
4. Know the law. There are some limitations to
copyright laws.
LESSON 3: LEARNING TASK 2
POSTER

Create a poster showing the dangers
on the internet and how you can stay
safe online.

You might also like