SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Unit 6
INFORMATION COMMUNICATION
TECHNOLOGY (ICT)
Trends, Networks, and Critical
Thinking in the 21st Century
Senior High School Grade 12
The Core Rules
of Netiquette
Rule 1: Remember the human
The golden rule must apply even in
the cyberspace. You do not see the
facial expressions of a person.
When communicating with a
person, especially with a stranger,
always ask the question: "Would
you say it to the person's face?
The Core Rules
of Netiquette
Rule 2: Adhere to the same
standards of behaviour online
that you follow in real life
You should not change your
persona whenever you are in
front of the screen.
The Core Rules
of Netiquette
Rule 3: Know where you are in cyberspace.
There are different areas or domains in the
cyberspace and the type of people also
vary. The culture or self- imposed rules
(on posting) varies on different websites.
This is prevalent in forum boards and on
social media services where anyone can
comment.
The Core Rules
of Netiquette
Rule 4: Respect other people's time and
bandwidth.
Rule 5: Make yourself look good online.
You will mostly be judged for your writing, so
read and read in order to make comments and
messages with good spelling and grammar
The Core Rules
of Netiquette
Rule 6: Share expert
knowledge.
The internet was founded on the
idea that scientist wanted to share
their knowledge. Do not be afraid
to tell what you know
The Core Rules
of Netiquette
Rule 7: Help keep flame wars
under control.
Be a referee and know how
to control other people's
emotions
The Core Rules
of Netiquette
Rule 8: Respect other people's
privacy.
Do not snoop into other people's
private accounts, especially their
files and, messages. This is
prevalent when phone has been
stolen or when an account has
been left logged on a public
computer, such as library
Online Safety and
Ethics
Keeping yourself safe
online
1. Check for virus and malware.
2. Do an account Security Check
up.
3. Google has a Security Check
up Feature in your account's
page that allows an overall
check-up and for a possible
update of your details.
Online Safety and
Ethics
Keeping yourself safe
online
4. Update your account recovery
options.
5. Enroll in 2-step verification.
6. Google allows you to add an
extra layer of security by requiring
you to grab a code sent to your
phone after logging in with your
password.
Online Safety and
Ethics
Keeping yourself safe
online
7. Perform regular operating
system and browser updates.
8. Never use your Google Account
Password on another websites.
9. Protect your password.
10. Use a strong password
Phishing Scams
Phishing scams are
attempts by scammers to
trick you into giving out
personal information
such as your bank
account numbers,
passwords and credit
How does this scam
work?
A scammer contacts you
pretending to be from a legitimate
business such a bank, telephone
or internet service provider. You
may be contacted by email, social
media, phone call, or text
message.
How does this scam
work?
The scammer asks you to provide
or confirm your personal details.
For example, the scammer may
say that the bank or organization is
verifying customer records due to
a technical error that wiped out
customer data. Or they may ask
you to fill out a customer survey
and offer a prize for participating.
Other types of
Phishing Scams
Whaling and spear
phishing - the scammer
targets a business in an
attempt to get
confidential information
for fraudulent purposes.
Other types of
Phishing Scams
Pharming - the scammer
redirects you to a fake version of
a legitimate website you are
trying to visit. This is done by
infecting your computer with
malware which causes you to be
redirected to the fake site, even
if you type the real address or
click on your bookmarked link.
Warning Signs in
Phishing
1. You receive an email, text
or phone call claiming to be
from a bank,
telecommunications provider
or other business you regularly
deal with, asking you
to update or verify your details.
Warning Signs in
Phishing
2. The email or text
message does not address
you by your proper name
and may contain typing
errors and grammatical
mistakes.
Warning Signs in
Phishing
3. The website address
does not look like the
address you usually use
and is requesting details
the legitimate site does
not normally ask for.
Warning Signs in
Phishing
4. You notice new icons
on your computer
screen, or your computer
is not as fast as it
normally is.

Weitere ähnliche Inhalte

Ähnlich wie ICT 2.pptx

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
jleverett
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 

Ähnlich wie ICT 2.pptx (20)

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 

Mehr von ChristineJoyMaranan2

WORK-IMMERSION-GUIDELINES-for-Students.pptx
WORK-IMMERSION-GUIDELINES-for-Students.pptxWORK-IMMERSION-GUIDELINES-for-Students.pptx
WORK-IMMERSION-GUIDELINES-for-Students.pptx
ChristineJoyMaranan2
 
pdfcoffee.com_dlp-trends-week-9-planetary-networks-pdf-free (1).docx
pdfcoffee.com_dlp-trends-week-9-planetary-networks-pdf-free (1).docxpdfcoffee.com_dlp-trends-week-9-planetary-networks-pdf-free (1).docx
pdfcoffee.com_dlp-trends-week-9-planetary-networks-pdf-free (1).docx
ChristineJoyMaranan2
 
Blue-and-Purple-Certificate-of-Achievement-Award-Template.pptx
Blue-and-Purple-Certificate-of-Achievement-Award-Template.pptxBlue-and-Purple-Certificate-of-Achievement-Award-Template.pptx
Blue-and-Purple-Certificate-of-Achievement-Award-Template.pptx
ChristineJoyMaranan2
 
DAY 2 SESSION 6 - ChildProtectionPolicy2.pptx
DAY 2 SESSION 6 - ChildProtectionPolicy2.pptxDAY 2 SESSION 6 - ChildProtectionPolicy2.pptx
DAY 2 SESSION 6 - ChildProtectionPolicy2.pptx
ChristineJoyMaranan2
 

Mehr von ChristineJoyMaranan2 (20)

WORK-IMMERSION-GUIDELINES-for-Students.pptx
WORK-IMMERSION-GUIDELINES-for-Students.pptxWORK-IMMERSION-GUIDELINES-for-Students.pptx
WORK-IMMERSION-GUIDELINES-for-Students.pptx
 
Citizenship-1.pptx
Citizenship-1.pptxCitizenship-1.pptx
Citizenship-1.pptx
 
Political-Ideol-WPS-OfficeGroup-1.pptx
Political-Ideol-WPS-OfficeGroup-1.pptxPolitical-Ideol-WPS-OfficeGroup-1.pptx
Political-Ideol-WPS-OfficeGroup-1.pptx
 
Presentation-2-1.pptx
Presentation-2-1.pptxPresentation-2-1.pptx
Presentation-2-1.pptx
 
Lecture 11Econ.pptx
Lecture 11Econ.pptxLecture 11Econ.pptx
Lecture 11Econ.pptx
 
Philippine-Politics-and-Government.pptx
Philippine-Politics-and-Government.pptxPhilippine-Politics-and-Government.pptx
Philippine-Politics-and-Government.pptx
 
Citizens Charter (as of March 31 2021).pdf
Citizens Charter (as of March 31 2021).pdfCitizens Charter (as of March 31 2021).pdf
Citizens Charter (as of March 31 2021).pdf
 
4- COMMUNICATION.pptx
4- COMMUNICATION.pptx4- COMMUNICATION.pptx
4- COMMUNICATION.pptx
 
COMMUNICATION-PPT.pptx
COMMUNICATION-PPT.pptxCOMMUNICATION-PPT.pptx
COMMUNICATION-PPT.pptx
 
DIASS_LESSON (1).pptx
DIASS_LESSON (1).pptxDIASS_LESSON (1).pptx
DIASS_LESSON (1).pptx
 
Mans-Social-cultural-background.pptx
Mans-Social-cultural-background.pptxMans-Social-cultural-background.pptx
Mans-Social-cultural-background.pptx
 
STRAND-G-10-PPT (1).pptx
STRAND-G-10-PPT (1).pptxSTRAND-G-10-PPT (1).pptx
STRAND-G-10-PPT (1).pptx
 
front-cd-Roselyn (1).docx
front-cd-Roselyn (1).docxfront-cd-Roselyn (1).docx
front-cd-Roselyn (1).docx
 
025790313.pdf
025790313.pdf025790313.pdf
025790313.pdf
 
PFO-POWER-POINT-TEENAGE-PREGNANCY (1).pptx
PFO-POWER-POINT-TEENAGE-PREGNANCY (1).pptxPFO-POWER-POINT-TEENAGE-PREGNANCY (1).pptx
PFO-POWER-POINT-TEENAGE-PREGNANCY (1).pptx
 
pdfcoffee.com_dlp-trends-week-9-planetary-networks-pdf-free (1).docx
pdfcoffee.com_dlp-trends-week-9-planetary-networks-pdf-free (1).docxpdfcoffee.com_dlp-trends-week-9-planetary-networks-pdf-free (1).docx
pdfcoffee.com_dlp-trends-week-9-planetary-networks-pdf-free (1).docx
 
Blue-and-Purple-Certificate-of-Achievement-Award-Template.pptx
Blue-and-Purple-Certificate-of-Achievement-Award-Template.pptxBlue-and-Purple-Certificate-of-Achievement-Award-Template.pptx
Blue-and-Purple-Certificate-of-Achievement-Award-Template.pptx
 
Living-With-Compassion.pptx
Living-With-Compassion.pptxLiving-With-Compassion.pptx
Living-With-Compassion.pptx
 
DAY 2 SESSION 6 - ChildProtectionPolicy2.pptx
DAY 2 SESSION 6 - ChildProtectionPolicy2.pptxDAY 2 SESSION 6 - ChildProtectionPolicy2.pptx
DAY 2 SESSION 6 - ChildProtectionPolicy2.pptx
 
Citizenship.pptx
Citizenship.pptxCitizenship.pptx
Citizenship.pptx
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

ICT 2.pptx

  • 1. Unit 6 INFORMATION COMMUNICATION TECHNOLOGY (ICT) Trends, Networks, and Critical Thinking in the 21st Century Senior High School Grade 12
  • 2. The Core Rules of Netiquette Rule 1: Remember the human The golden rule must apply even in the cyberspace. You do not see the facial expressions of a person. When communicating with a person, especially with a stranger, always ask the question: "Would you say it to the person's face?
  • 3. The Core Rules of Netiquette Rule 2: Adhere to the same standards of behaviour online that you follow in real life You should not change your persona whenever you are in front of the screen.
  • 4. The Core Rules of Netiquette Rule 3: Know where you are in cyberspace. There are different areas or domains in the cyberspace and the type of people also vary. The culture or self- imposed rules (on posting) varies on different websites. This is prevalent in forum boards and on social media services where anyone can comment.
  • 5. The Core Rules of Netiquette Rule 4: Respect other people's time and bandwidth. Rule 5: Make yourself look good online. You will mostly be judged for your writing, so read and read in order to make comments and messages with good spelling and grammar
  • 6. The Core Rules of Netiquette Rule 6: Share expert knowledge. The internet was founded on the idea that scientist wanted to share their knowledge. Do not be afraid to tell what you know
  • 7. The Core Rules of Netiquette Rule 7: Help keep flame wars under control. Be a referee and know how to control other people's emotions
  • 8. The Core Rules of Netiquette Rule 8: Respect other people's privacy. Do not snoop into other people's private accounts, especially their files and, messages. This is prevalent when phone has been stolen or when an account has been left logged on a public computer, such as library
  • 9. Online Safety and Ethics Keeping yourself safe online 1. Check for virus and malware. 2. Do an account Security Check up. 3. Google has a Security Check up Feature in your account's page that allows an overall check-up and for a possible update of your details.
  • 10. Online Safety and Ethics Keeping yourself safe online 4. Update your account recovery options. 5. Enroll in 2-step verification. 6. Google allows you to add an extra layer of security by requiring you to grab a code sent to your phone after logging in with your password.
  • 11. Online Safety and Ethics Keeping yourself safe online 7. Perform regular operating system and browser updates. 8. Never use your Google Account Password on another websites. 9. Protect your password. 10. Use a strong password
  • 12. Phishing Scams Phishing scams are attempts by scammers to trick you into giving out personal information such as your bank account numbers, passwords and credit
  • 13. How does this scam work? A scammer contacts you pretending to be from a legitimate business such a bank, telephone or internet service provider. You may be contacted by email, social media, phone call, or text message.
  • 14. How does this scam work? The scammer asks you to provide or confirm your personal details. For example, the scammer may say that the bank or organization is verifying customer records due to a technical error that wiped out customer data. Or they may ask you to fill out a customer survey and offer a prize for participating.
  • 15. Other types of Phishing Scams Whaling and spear phishing - the scammer targets a business in an attempt to get confidential information for fraudulent purposes.
  • 16. Other types of Phishing Scams Pharming - the scammer redirects you to a fake version of a legitimate website you are trying to visit. This is done by infecting your computer with malware which causes you to be redirected to the fake site, even if you type the real address or click on your bookmarked link.
  • 17. Warning Signs in Phishing 1. You receive an email, text or phone call claiming to be from a bank, telecommunications provider or other business you regularly deal with, asking you to update or verify your details.
  • 18. Warning Signs in Phishing 2. The email or text message does not address you by your proper name and may contain typing errors and grammatical mistakes.
  • 19. Warning Signs in Phishing 3. The website address does not look like the address you usually use and is requesting details the legitimate site does not normally ask for.
  • 20. Warning Signs in Phishing 4. You notice new icons on your computer screen, or your computer is not as fast as it normally is.