0% found this document useful (0 votes)
40 views2 pages

Preventions, Etiquette On Online

The document provides ethical guidelines for computer use that instruct people to use computers to help others and not harm them, steal others' work, or access others' computers without permission. It also gives tips for online security, including using firewalls and complex passwords, not sharing personal information online, keeping devices updated, being cautious of emails and attachments, and careful web browsing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views2 pages

Preventions, Etiquette On Online

The document provides ethical guidelines for computer use that instruct people to use computers to help others and not harm them, steal others' work, or access others' computers without permission. It also gives tips for online security, including using firewalls and complex passwords, not sharing personal information online, keeping devices updated, being cautious of emails and attachments, and careful web browsing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ETHICAL

GUIDELINES

Do not use Use computer


computer to ruin
to do good
other people's
things to other
life

Do not look at Do not use other


other people's people's
computer computer
without their without their
permission. permission.

Do not use computer to


steal other people's work.

Evita Sandra Paculanang


STEM 12- Mendel B
TIPS AND
PREVENTIONS
FROM ANY ONLINE
THREATHS
1 USE A FIRE WALL AND
ALWAYS KEEP THIS
SETTINGS ON.

2 USE A COMPLEX
PASSWORDS THAT
ARE NOT EASY TO
HACKED.

3 DO NOT GIVE
PERSONAL
INFORMATION
ONLINE SUCH AS
EMAIL, PASSWORDS
AND CREDIT CARD
DETAILS.

4 KEEP YOUR DEVICE


UPDATED WITH THE
LATEST SECURITY
FEATURES

5 BE CAUTIOUS WHEN
OPENING AN EMAIL
AND ATTACHMENTS

6 BE CAREFUL OF WHAT
YOU ACCESS ONLINE.

Evita Sandra Paculanang


STEM 12- Mendel B

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy