0% found this document useful (0 votes)
102 views21 pages

Emptech Reviewer

This document discusses various online risks and threats such as malware, viruses, worms, adware, trojans, and more. It also covers topics like cyberbullying, cyberstalking, hacking, identity theft, inappropriate content, internet bots/botnets, internet scams, online grooming, pharming, phishing, spoofing, spam, and online safety tips. It provides examples for many of these topics. It also discusses cyberlaws in the Philippines, online research skills, online collaboration tools, and principles of collaboration.

Uploaded by

cintagarciano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views21 pages

Emptech Reviewer

This document discusses various online risks and threats such as malware, viruses, worms, adware, trojans, and more. It also covers topics like cyberbullying, cyberstalking, hacking, identity theft, inappropriate content, internet bots/botnets, internet scams, online grooming, pharming, phishing, spoofing, spam, and online safety tips. It provides examples for many of these topics. It also discusses cyberlaws in the Philippines, online research skills, online collaboration tools, and principles of collaboration.

Uploaded by

cintagarciano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Online Risk and Threats

• Malware : malicious software


• Virus : to replicate itself and transfer from
one computer to another when executed.
• Worm : transfers from one computer to another without human .
intervention
• Adware : program designed t o send you ads usually in the form of pop-
ups
• Trojan : malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected.
• Rogue Security Software : tricks the user into posing that it is a
security
software.
• Spyware : program that runs in the background without you
knowing it. t has the ability to monitor what you are currently doing through
I
Keylogging*.

Cyberbullying
refers to the act of embarrassing, harassing, or bullying a person using the internet
and communication technologies.

Examples of Cyberbullying
Ganging up on a player online
Posting humiliating or hateful
media
Sending mean messages through
chat Sharing personal information
Spreading rumors or gossip
Excluding someone from information

Cyberstalking
refers to the act of stalking and repeatedly harassing someone else through
internet or other electronic devices.
Examples of Cyberstalking
Accessing one’s account to track their moves
Blackmailing someone through the internet and digital platforms
Monitoring one’s movements using camerasor GPS
Sending unwanted texts, messages, or content

Hacking
is the act of gaining access or controlling one’s account or computer.

Examples of Hacking
Access a bank account and steal
money Change one’s username and
password Modify information from one’s
account
Purchase something online with other’s account
Sell and share one’s information to other parties.

Identity Theft
happens when someone steal another person’s personal information and use
them without permission.

Identity Theft victims could possibly...


Get rejected from getting credit, plans, or jobs
Incur damage to their reputation
Lose access to their accounts
Lose money and run into debts.

Inappropriate Content
might include texts, photos, and videos that are illegal, offensive, or inappropriate
for some age groups.
Internet Bots / BotNets
refer to a network of compromised computers controlled by a robot that performs
malicious acts for its creator.

Internet Scams
Internet scams refer to the act of deceiving a user through fabricated promises or
stories, typically, to gain money from the victim.

Online Grooming
Online grooming happens when someone manipulates, exploits, or abuses a
minor online.

Pharming
Pharming uses malicious codes that direct users to a fake website to collect
personal information.

Phishing
Phishing is the act of sending an email claiming to be an established enterprise
asking for personal information. It is almost similar to pharming.

Spoofing
Spoofing is the act of pretending to be a legitimate business, a neighbor, or
someone else.

Spam
Spams refer to unwanted and unsolicited messages, often through email. They
can also be found on internet forums, text messages, blog comments, and social
media.
Online Safety and Security
Netiquette
This is the use of good manners in line communication such as Email, forums,
blogs, and social networking sites to name a few.

Examples of Netiquette
DON’T TYPE IN ALL CAPITAL LETTERS
○ Typing in capital letters in forums or chats is considered as
shouting or yelling.

Limit Sarcasm
○ Sarcasm has been a source of plenty of misguided arguments
online as it is incredibly difficult to understand the commenter’s intent.

Attempt to find your own answers

○ Attempt to find the answers to any other questions on your


own using a search engine like Google and Bing.

Check your Grammar


○ Always take your time to use proper punctuation, spelling, and grammar

Read First
○ Take your time and read through the previous discussions first
before writing your own response.

Don’t over share


○ Personal information is valuable to identity thieves, so try
not to share more than is necessary.
Be Kind
○ Make a point to be respectful in your comments even if you
disagree or dislike someone’s stance on a topic.
Tips to Stay Safe Online

Be mindful of what you share online and what site you share it to.
Do not just accept terms and conditions, READ IT.
Check out the privacy policy page of a website to
learn how the website handles the information you
share.
Know the security features of the social networking
site that you use. By keeping your profile private
search engines will not be able to scan your profile
Do not share your password, make them secure
Do not talk to strangers whether online or face - to =
face
Never post anything about a future vacation or similar
outing.
Add friends you know in real life
Avoid visiting untrusted websites
Install and update antivirus software on your computer
Do not reply or click links from suspicious emails.

Cyberlaws of the Philippines

Consumer Act (Republic Act 7394)


Cybercrime Prevention Act (Republic Act 10175)
Data Privacy Act of 2012 (Republic Act 10173)
Revised Penal Code

The Consumer Act


It is created to penalize people who are proved to be guilty in any form of
dishonesty before, during, and after an online transaction.
Cybercrime Prevention Act
This is created to tackle illegal activities happening through mobile phones,
computers, software, and internet.

Data Privacy Act of 2012


This is a law stating that personal information collected from users should only be
used for specific purposes, such as online buying, and cannot be shared with
anyone else.

Revised Penal Code


It is made to penalize people for theft, swindling, or estafa which concern most
online scams.

Online Research Skills

Online Research
Being a vast sea of information is one of the key features of the Internet.

Search Engines
is a software system designed to search the Internet for documents related to the
keyword or search word used or entered into the system.

Types of Search Engines


➜ Crawler Based
➜ Directories
➜ Hybrid Search Engine
➜ Meta Search Engines

Crawler Based Search Engines


It uses a spider or crawler to search the Internet.
Digs through individual web pages, pulls out keywords
Pros
➜ They contain a huge amount of pages.
➜ Ease of use.
➜ Familiarity. Most people who search
the Internet are familiar with Google.

Cons
➜ Sometimes, it's just too much information.
➜ It is easy to trick the crawler. Websites have
hidden data that can be manipulated to make the page
appear like it's something it's not.

Directories
Directories depend on human editors to create their listings or database.

There are two types of directories.


➜ Academic
➜ Commercial

Academic and professional directories which are often created and maintained by
subject experts to support the needs of the researchers.

Commercial and portal directories that cater to the general public and are
competing for internet traffic.

Pros
➜ Each page is reviewed for relevance and content before being included.
➜ Less results sometimes means finding what you need quicker.
Disadvantages
➜ Unfamiliar design and format.
➜ Delay in creation of a website and it's inclusion in the directory.
➜ May have trouble with more obscure searches.
Hybrid Search Engines
Uses both crawler based searches and directory searches to obtain
results.

Meta Search Engines


Transmit user supplied keywords simultaneously to several individual search
engines to carry out the search.

Effective Searching
➜ Know your sources
➜ Use your web browser properly
➜ Organize your bookmarks
➜ Learn to use Advanced search
➜ Follow the web
➜ Use of Keywords
➜ Use of Phrases
➜ Boolean Logic

Know your Sources


Make sure to find the most reliable information which can be found in multiple
sources or, better, to have the original source.

Use your Web Browser Properly


Know the capabilities of your preferred browser to help make your search faster
and easier.

Learn to use Advanced Search


Practice using advanced search which are readily available in Google and other
related Search Engines.

Follow the Web


Follow the wave of information in the web. st make sure to read and be critical
Ju
with every link or page you click.
Use of Keywords
Determine which keyword works best, the recommended maximum is six to eight
words, preferably nouns and objects.

Use of Phases
The most powerful keyword is a phrase, a combination of two or more words that
must be found in the documents being searched.

Boolean Logic
Boolean logic is a powerful search to a reasonable number of results and
increases the chance of a useful outcome.
The three most commonly used Boolean commands are AND, OR, and NOT

Online Collaboration tools

Collaboration

Collaboration came from the latin word “collaboratus”, past participle of


“Collaborate” which means “To labor Together.”

Team Structure and Dynamics


structure is described as a less hierarchical organizational structure in which
individuals are divided into teams.

“The unconscious, psychological forces that influence


the direction of a team’s behavior and performance.”

Joseph Carl Robnett Licklide


( march 15,1915 - june 26, 1990 )
Father of cloud computing
Principles of Collaboration
◉ Participation
◉ Collective
◉ Transparency
◉ Independence
◉ Persistence
◉ Emergence
◉ Strategy before Technology
◉ Lead by Example
◉ Create a Supportive Environment

Participation
Encourage participation from across your
organization wherein they belong as one.

Collective
Each needs to help the group reach a consensus and the
take action collectively on the decisions to make.

Transparency
Feedback and trust are essential elements of collaboration. Being transparent with
information is crucial

Independence
Ensure that groupthink does not emerge and that people are thinking for
themselves.

Persistence
You need to be persistence in your application to these principles, to ensure that
all content is kept within the community and easily accessible to all members.
Emergence
You need to ensure that you focus on the end goal rather than worrying about how
it achieved.

Strategy Before Technology


Before rushing to pick a shiny new collaboration platform, focus on developing a
strategy that will help you understand the “Why” before the “How” do you use a
platform.

Lead by Example
Leaders are very powerful instruments to facilitate change and encourage desired
behavior. They must be visibly onboard.

Create a Supportive Environment


It is also crucial to reward teamwork as rewarding individual performances.

Group Dynamics
The Term “Group Dynamics” describes the way in which people in a group interact
with one another.

Principles of Collaboration
◉ Know the Team
◉ Tackle problems quickly with good feedback
◉ Define roles and responsibilities
◉ Break down barriers
◉ Focus on Communication
◉ Pay Attention
Online Collaboration Tools
lets a group of people work together in real-time using the internet.

5 Essential Features of an Online Collaborative Tool.


1. Easy and Clean Interface
2. Permissions Control
3. File Storage with Document Versioning
4. Whiteboards
5. Document Locking

Easy and Clean Interface


A Good user interface is key to a great online collaboration
tool.

Permissions Control
Users need to be able to easily add people to workspaces and control what they
are able to do in each workspace or document.

File Storage with Document Versioning


This will make it ea sier to track the progress of the document and reference with
the old versions.

Whiteboard
are very useful in a collaboration tool, as they let team members communicate in a
more informal way.

Document Locking
This is especially important if you work in a large team with several document
editors.
Common Internet Based Collaboration Tools
◉ Document Sharing Sites
◉ Web Presenting
◉ Co-Browsing
◉ Web Conferencing
◉ Video Conferencing
◉ Screen Sharing
◉ Instant Messaging
◉ Mind Mapping

Project Management in ICT


is mostly applied in the business sector however, it has also been implemented in
ICT since it involves technicalities, services, and management.

◉ Goals, Scope, and constraints


◉ Timetables and costs
◉ Tasks and deliverables
◉ Workloads and resources
◉ Quality and Risks
◉ Changes
◉ Communication
◉ External Services and sourcing

Common Internet Based


Coordination (Management) Tools
◉ Electronic Calendars
◉ Project Management
◉ Workflow Systems
◉ Knowledge Management Systems
Applied Productivity tools word and
Powerpoint
Productivity Tools
It is composed of computer that are
programs
used mainly for generating information, such as
documents, presentations, worksheets,
databases, charts, graphs, digital painting, electronic music, and videos.

Microsoft Word
Ms word is one of the software of microsoft office.
It offers a set of tools that is advanced compared to its
previous versions along with its new features are advanced
techniques including hyperlinks Macros and mail merge.

Microsoft PowerPoint
Ms PowerPoint, on the other hand, allows you to create
slide show presentations, where in you can format
the text and images adding also animations and other
multimedia components interactively.

Microsoft Excel
MS Excel is used to simulate a paper sheets. It is composed
of cells that are represented in rows and columns
designed to perform basic arithmetic operations. It is widely
used in accounting and financial applications

Microsoft Word
✘ Mail Merge and Label
Generation
✘ Integrating Images and
External Materials
Mail Merge
Mail merge lets you create a batch of documents
that are personalized for each recipient.

Components of Mail Merge


✘ Form Document
✗ The document that contains message or
letter that you wish to send
✘ List and Data File
✗ The list of names and addresses of the
individuals for your file.

Form Documents

The first component of our mail merge document. It is generally the document that
contains the main body of the message we want to convey or send.

Placeholders
also referred to as data fields or merge fields.
This marks the position of your form document where individual data or
information will be inserted.

Integrating Images and External Materials


A better understanding of the physical form of your document
Rich not only in content but also in physical form.

Kinds of Materials
✘ Pictures ✘ Online Pictures
✘ Clip art. ✘ Icons
✘ Shapes ✘ 3d Models
✘ Smart Art ✘ Screenshot
✘ Chart
Pictures
theses are electronic or digital pictures or photograph
you have saved in any local storage device.

Three commonly used types of picture files


✘ .JPG
✘ .PNG

✘ .GIF

Clip Art
a GIF type; line are drawings or images used as generic
representation for ideas and objects.

Shapes
These are printable objects or materials that you can
integrate in your document to enhance its appearance or to allow you to have
some tools to use for composing and representing ideas and messages.

Smart Arts
Generally, these are predefined assets of different shapes
grouped together to form ideas that are organizational or structural in nature.

Chart

Another type of material that you can integrate in your


Word Document that allows you to represent date characteristics and trends.

Screenshot
MS Word even provides a snipping tool for your screen shots so you can select
and display only the part that you exactly like to capture on your screen
ICT Graphics
Basic Principles of Graphics and Layout
Graphics refers to any design or visual image, which can be found in any surface,
designed to inform, illustrate, or entertain.

Layout is part of any graphic design that deals with the arrangement of the visual
elements on a page.

● Balance
● Emphasis
● Movement
● Pattern
● Proportion
● Variety

Balance
Balance refers to how the objects, texture,
colors,
and space are distributed to achieve equality or stability.
A design can be Symmetrical or asymmetrical.

Emphasis
is a principle of art that occurs when an element
is dominant and stands out from the rest.

Movement
Movement refers to the way the eye moves over a design.

Pattern
it is the creation of unity on a design
through the use of repetition of visual
elements.
Proportion
refers to the virtual size of an element within an image compared to other
elements or based on a recognized standard.

Variety
is the use of different design elements to attract and retain attention.

Infographics
a collection of images, charts, and texts that
serve as a visual representation and overview of a topic.

Types of Infographics
● Anatomical
● Comparison
● Hierarchical
● How to / Guide
● Informational / List
● Location Based
● Mixed Charts
● Photographic
● Process
● Resume
● Single Chart
● Timeline
● Visualized Numbers
Keys in Making Infographics
● Add white spaces
● Create based on the target audience
● Make it easy to view
● Check the facts and figures
● Focus on the flow
● Keep it focused
● Keep it simple

Keys in Making Infographics


● Manage the length and size
● Put a powerful headline
● Present things visually
● Cite sources

—Ayan ganda

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy