3rd Grading Emtech Handout
3rd Grading Emtech Handout
ONLINE SAFETY
Internet
defined as the information superhighway.
This means that anyone has access to this highway, can place info, and can grab that info.
Some Tips to Stay Safe Online:
Be mindful on what you share online.
Do not just accept terms and conditions, read it.
Do not share your password with anyone.
Avoid visiting untrusted websites.
If you have WiFi at home, make it private by adding a password.
Install and update an antivirus software on your computer.
INTERNET THREATS
1.Malware
stands for “malicious software”.
software that is intended to damage or disable computers and computer systems.
5 Types of Malware
a. Computer Virus
It is a program that duplicates itself and then infects the computer. It spreads like a biological virus.
It can be transferred by the use of removable storage media devices.
Damages may be mild to severe.
b. Computer Worm
It is a dangerous computer program that replicates itself through a network.
It spreads by exploiting weaknesses in operating systems
c. Trojan Horse
A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s
consent.
It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, allow access to computer, and
d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and
typing through keylogging.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
2. Spam
an unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing
It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes
from a trustworthy source.
It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions.
EMPOWERMENT TECHNOLOGIES
4. Pharming
This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
The main objective is to obtain username and passwords, as well as credit cards and financial information
5. Botnet – group of compromised computer connected to a network ("zombie")
6. Denial of Service Attack - disrupts computer access to internet services
Payment System
It is any system used to settle financial transactions through transfer of monetary value, and includes the institutions, instruments, people, rules,
procedures, standards, and technologies. See examples below
Advertising Platforms
It allows users to create and manage advertising campaigns, generate reports, and retrieve information about the ads, campaigns, and organizations that
are associated with an account.
Creative Content Outlets
It is content that needs to be translated creatively.
Topic/concept Creative presentation it
ONLINE PLATFORMS
1. Presentation Tools – Prezi, Zoho Shows, MS PowerPoint.
2. Newsletter, ICT Content Platforms – Dropbox, Tumblr, Wix
3. Photo Editing Tools – Picasa, Adobe Photoshop, GIMP
4. Video Editing Tools – Sony Vegas Pro, Windows Movie Maker, Adobe Premier Pro
5. Photo uploading and hosting Tools – Dropbox, Flickr
6. Online Collaborative Tools – Google Drive, Viber, Facebook
7. Cloud Computing – Dropbox, Google Drive, Microsoft One Drive
8. Blog Tools – Blogger, WordPress, LiveJournal
9. Mapping Tools – Google Maps, Waze, Wikimapia
10. Music Production – Sony Vegas Pro, Audacity, Virtual DJ
11. Survey and Forms – Google Forms
12. ICT Projects and Content Publishing and Uploading Platforms – WordPress, MS Office Project Server, File Manager
13. Web Design Platforms – Wix, Weebly, Adobe Dreamweaver
14. Web Management Platforms – Drupal, WordPress, Joomla