Professional Documents
Culture Documents
4 security
3. Personal safety
Threats to people or their identity
Software for personal protection
Our attitude, the best protection
We use the term active security to refer to the set of actions aimed at protecting the computer and its content (e.g.
using safe passwords, keeping the antivirus program up to date, etc.). Passive security aims to minimise the impact
of possible computer damage (e.g. making regular backup copies).
Threats
to the computer: malicious software
Malware (from malicious software) is software developed for malicious purposes, such as vi-
ruses, Trojans, worms, spyware, etc.
The different types of malware are shown in the figure on the following page.
Types
of malware
Virus Keylogger
This is a program that installs itself on the computer (From key [tecla] and logger
without the user’s consent with the aim of causing harm. [registrador]). This is a type of
It can self-replicate and infect software that attempts to ob-
other computers. It can use port- tain and memorise keystrokes.
able drives, software or the Inter- It can be used for remote spy-
net to spread itself. Viruses are ing, with the aim of obtaining
the best known threat and the passwords from the user.
most important one because of
their volume of risk.
Worm
This is malware whose purpose is
to flood the system memory by
reproducing itself.
Spyware
Not all spyware is malware.
Spyware programs with ma-
licious code are basically Tro-
jans, adware and hijackers.
Trojan
This is a type of virus that contains in-
structions, camouflaged in another pro-
gram, whose purpose is to destroy or
gather information saved on disks. The
name refers to the Trojan horse, because
Adware
these viruses are usually housed in apparently harmless
elements, such as an image or music file, and are installed (From advertisement software).
in the system when the containing file is opened. Adware is advertising includ-
ed in programs that appears
after installation. Some of this
comes with shareware or free-
ware licences, where advertis-
ing is included to pay for them, so that if the user
Hijackers
wants an advertising-free version, they can choose
These are programs that “hijack” to pay for the registered licence version. The prob-
other programs to use their rights lem arises when these programs act as spyware,
or change their behaviour. The most including code to gather personal information on
common case is a browser attack, the user (information that is not necessarily used
changing the home page and redirecting search pages maliciously: sometimes it is about discovering us-
without the user’s consent. ers’ tastes, but it can be passed on to other parties
without authorisation).
More
terminology
As well as malware, you should be familiar with other concepts related to security:
Crackers
Hackers These are people who try and
These are computer experts who, change how a commercial pro-
in theory, are only looking for an gram works or produce applica-
intellectual challenge. They do tions to obtain valid serial num-
not necessarily cause harm; in- bers in these types of programs
deed, there are ethical hacking in order to use them without a
(or white hacking) companies licence (pirate them).
that help people and businesses
find out how secure they are against malicious hackers. Hack-
ers are sometimes confused with black hackers, who try to
attack Internet security systems and make money from it.
Cookies
These are text files that are saved
to the computer by the browser
when we visit a website, for the
site to read them on subsequent
visits. They are not a risk or a threat
as long as they only aim to pro-
vide access to the site. Thus, for
Pharming
instance, when we visit an online shopping website for the
This practice involves redirecting a second time on the same computer, it is usual to find cer-
domain name to a different computer, tain parameters already completed the configuration from
so that a user who enters a URL goes the previous visit has already been selected, or we may even
to the attacking website. Thus, for in- receive a customised welcome message, all because of the
stance, it can replace a bank website cookies saved from the first visit. They could be considered
to obtain the victim’s passwords. non-malicious spyware.
Hoaxes
These are chain e-mails start-
Spam or junk mail ed by companies to gather
These are e-mail messages that e-mail addresses from large
flood the network in order to ad- numbers of users and then
vertise products, sometimes of carry out mailings (which
dubious legality, so the recipients are also spam). They abuse
buy them. They are sent en masse, people’s good intentions, credulity and superstition. It
since it has been shown that 1 in is currently not an illegal practice. A chain starts when a
12 million sent e-mails receive a company sends a message such as ‘Lost child’ or ‘Careful,
positive reply. Studies indicate dangerous virus!’ to millions of invented e-mail addresses
that spam currently represents (those that do not produce error messages exist and can
80% of e-mail traffic worldwide. then be used); some of these recipients resend the mes-
sage in good faith and thus a chain starts; after a large
number have been sent, the chain will reach the company
again, now full of valid e-mail addresses.
Software
to protect the computer: computer security
Computer security consists of identifying what parts of the system are vulnerable and establish-
ing measures to minimise the risk. Keeping our computer security updated is key to avoiding
attacks and loss of information.
The software and prevention elements in the computer are:
•• Antivirus. An antivirus is a program that analyses the different units and devices and in-
coming and outgoing data flows, checking the code of files and looking for fragments of
characters. It uses a database with the characteristic strings of characters of different virus-
es. The antivirus program can detect viruses and only sometimes identify them. Although
virus creation is quick and always ahead of the antivirus manufacturing companies, having
one installed and up to date provides peace of mind. Antivirus programs protect against
viruses, Trojans and worms and most of them contain antispyware and even spam filters.
•• Firewall. This is a defence system that controls and filters incoming and outgoing net-
work traffic. The firewall is set up to control traffic through ports (our computer connec-
tions go through them) and provide alerts asking for confirmation for any program that uses
the Internet connection. Therefore, it is very important to set it up logically. Normally, they
are included in the operating systems, but there are also other types of free or commercial
software.
•• Proxy. This is software installed on a computer that functions as an entry port; it can be
configured as a firewall or a website blocker.
•• Passwords. These can help protect the security of a file, folder or computer on a local net-
work or the Internet. It is recommended to use between six and eight characters so they
cannot be easily cracked, although the level of security will be different for our computer
user password than for a Wi-Fi router, for example.
•• Cryptography. This is the encrypting of information used to protect files, communications
and passwords.
Preventing attacks
As in many other aspects of life, the best security is prevention. A few simple preventative measures are sufficient
to ensure secure use of our school or domestic computer, but keep in mind that absolute security does not exist. It is
advisable to:
•• Make regular backup copies (or backups) of the system so it can be restored if necessary.
•• Use secure passwords for all devices and applications.
•• Use only open trusted Wi-Fi networks to exchange private data.
•• Install an antivirus program and keep it updated (and know its functions and limitations).
•• Keep your operating system up to date.
•• Regularly check the devices plugged into your computer.
•• Take care when downloading files with P2P (peer-to-peer) programs (eMule, Ares, BitTorrent, etc.), which are a
new way for unknown files possibly containing viruses to get into our computers.
•• Be cautious when setting up the firewall to permit communication between these programs.
•• Take care also with free downloads of programs.
3. Personal safety
When it comes to security, the most important thing is protecting people. Damage to the com-
puter is, after all, no more than material damage, but damage caused to people stays with them
over time and affects other aspects of life. We will focus on online safety here, although per-
sonal safety covers many other areas, such as adopting the correct posture when sitting at the
computer or the risk of computer addiction.
Threats to people or their identity
We are all vulnerable and our vulnerability increases the more we expose ourselves. On the In-
ternet, we reveal ourselves to others to a varying degree. Among the dangers that can threaten
us are:
•• Unintended access to illegal or harmful information.
•• Identity theft, robbery or fraud. For example, phishing is a type of computer fraud that
consists of acquiring information on a user (bank details, passwords, etc.) using deceptive
techniques, which is then used fraudulently. The name refers to ‘fishing’ for passwords. The
most common example is an e-mail that reaches a user, replacing an e-mail from a bank and
asking for passwords due to a false security alert.
•• Loss of our intimacy or harm to our identity or image.
•• Cyberbullying, which is a type of harassment, consisting of threats, blackmail, etc., be-
tween peers over the Internet, mobile or video games.
Software for personal protection
Programs are available to facilitate parental control over Internet use. They can limit searches,
permit or block websites, control instant messaging programs, establish filters by age and so
on. Examples of parental control programs are: KidsWatch (www.kidswatch.com) and K9 Web
Protection (www1.k9webprotection.com).
Our attitude, the best protection
As well as the software available to us, we must be clear that the best protection we can have is
ourselves and adults we trust: parents, teachers and specialists.
The following page provides some basic recommendations for your protection, which could be
considered a basic code for surfing the Internet for young people.
5 Think before you publish photos or videos of yourself; if you decide to do it, only publish things that will not dam-
age your current or future image and publish them in places with restricted access and with the consent of your
parents. Remember not to post pictures of anybody without their consent. Be respectful to others.
6 Keep up to date with technology and limit how long you spend on the Internet.
7 Make sure that you are of the minimum age required to enter a site. You will find this age in the terms of use of
the site. You must read these terms before clicking on “I agree”. If you do not read them, you may be allowing the
site owners to use your data, pictures, etc.
8 Inform yourself about sites. On some sites you cannot “unsubscribe” so we must be careful about what we post
on them; we can sometimes give away our data forever.
9 Never exchange private information on open Wi-Fi networks that are not trustworthy. Both the administrator and
some of the connected users can use techniques to steal your information.
In short: use common sense and do not do things on a computer that you would not do in everyday life.
Software licences
All software used or acquired by different means (shops, downloads, the Internet, etc.) has a
user licence, in other words, a contract with a series of terms and conditions that must be ob-
served.
Freeware This is software with no monetary cost but which is not free. It is pro-
prietary software. Examples: Microsoft Edge, Adobe Flash Player.
Free software This can be freely used, copied, modified and redistributed. Its source
code is available and is known as open source. Examples: Libre-
Office, GIMP, Audacity.
GNU/GPL (general A licence that accompanies packages distributed by the GNU project.
public licence) The author reserves the rights and permits redistribution and modifi-
cation under the same licence.
File exchange: P2P networks
One of the most widespread ways of obtaining software online are P2P networks (peer-to-peer
networks). Computers on these networks behave as peers, acting as both clients (information
requesters) and servers (information providers). This permits the direct exchange of information
between computers in the network. P2P networks optimise the bandwidth of all the network
users, making use of the connectivity between them.
The information is split up and sent over the network. Users exchange these information pack-
ets, which are reconstructed when the user has received all the components. This permits the
exchange of large files and is one of the characteristics that made them popular.
However, the fact that the information is exchanged directly between users has made it possible
to share applications that are not free. This has generated a great deal of controversy about the
legality of exchanging content protected by intellectual property rights and copyright.
This point requires reflection: we should objectively value the creators’ efforts and work to ob-
tain the product (software, music, books, etc.) and the harm caused when this product is im-
properly obtained by others without copyright.
There are a large number of Internet sites where content can be downloaded legally and even,
in many cases, for free.
Exercise
1. Find out your Internet IP
As we have seen, every time we connect to the Internet we are identified
by a unique address assigned to our computer, called an IP address. We
will now see how easy it is to find out our assigned IP.
1. Open your browser and go to www.google.es. Type “find out my pub-
lic IP” in the search box.
2. Click on any link, look up the IP address you are browsing with and
write it down (it will look like the one in Figure 1).
3. Repeat the operation by clicking on another link and check that it de- Fig. 1
tects the same IP.
Some sites give us more information than the IP.
Exercise
2. Know your browser
1. Open any browser. Press the key combination Shift + Ctrl + Supr.
This opens a window where you can delete your browsing data (Fig-
ures 2 and 3).
2. Press the Eliminar button to delete everything that has been select-
ed. Nonetheless, there will be some terms that you do not understand.
3. Search for information on the meanings of each term that appears in
the window.
4. Open a text document and create a table like the one below. Now
complete it with the meanings of the terms that you find.
Browsing history Explanation
Exercise
3. Take care of your personal information
1. The biggest footprint that you can leave is what you upload to the In-
ternet. Discuss this statement in your document and give your opin-
ion on it. Fig. 3. Privacy settings
in Google Chrome
2. Save the file with the name P1_namesurname.
Information and Communication Technologies - 4º ESO - Editorial Donostiarra 145
Computer security
4 Step-by-step practical
THREATS SOLUTIONS
•• Identity theft.
TO THE INDIVIDUAL
Our attitude, the best protection.
•• Phishing. A type of computer fraud that uses trickery
to obtain information about a user (bank details, pass-
words, etc.) in order to use it fraudulently.
•• Loss of privacy.
•• Damage to our identity or image.
•• Cyberbullying. A type of harassment that uses
threats, blackmail, etc., between peers on the Internet,
mobile phones or video games.
TO COMPUTERS
•• Spyware Firewall. A defence system that controls and filters the incoming and
outgoing traffic of a network through our computer ports. It displays
Software that tries to obtain data alerts to ask for confirmation for any program that uses the Internet
from users. Not all spyware is mali- connection.
cious; sometimes it is designed to
make searching easier.
White hacking. Activity carried out by people who help individuals and
•• Black hackers businesses to discover how secure their systems are against malicious hack-
Expert computer criminals who ers.
attempt to bypass Internet se- Cryptography. The encryption of information to protect files, communica-
curity systems to make money tion and passwords.
from it. Passwords. These can enhance the security of a file, folder or computer on a
local network or the Internet. The security level of our computer user will be
different to the security level of a Wi-Fi router, for example.
Fig. 6 2. Click on Make a padlet. In the next window, Start with a blank...,
select Wall (Figure 7).
3. On the next screen, double-click on the title and change it to “My
Computer is Under Attack!”, and type “Computer threats on the Inter-
net” (Figure 8) in the description.
4. You can also change the wallpaper in this window, if you wish. When
you have made these changes, click on Next.
5. In the next step, check that your padlet is secret by default. Click on
Next until a window appears that lets you save it.
6. Double-click on the wallpaper on the screen to start publishing en-
tries. As the title of your first entry, type “Viruses and Trojans” and copy
the information from the “Learn” section of this unit about viruses and
Fig. 7 Trojans (Figure 9). Click on the Upload icon and upload the image
P4_Virus.jpg from the virtual CD.
7. Repeat the process with the information and images on spyware and
hackers.
8. Now create another entry to include a video on Internet security. Type
“Security Videos” as the title of this entry and enter the description
“Viruses”. Click on the Link icon and paste the address of the video
that you will find in the text file P4_Security_videos_addresses on
the virtual CD.
9. Repeat these steps to insert the spyware video.
10. Click on Modify in the top menu and, at the end of the menu, change
the address of your padlet. Type “computersecurity” as the address
(Figure 10). Open a new tab in the browser and type in the full ad-
dress to view the result.
Fig. 8
11. Click on the Share option in the same menu. Under the Share/Ex-
port/Embed tab, you have several options, including e-mailing the
padlet to somebody, inserting it on a website and exporting it as a
PDF file.
12. Choose the Print code option and save the image (generated QR
code) with the name P4_namesurname. Then scan the code with a
code reader to see the result.
Fig. 9
Fig. 10
Exercise
1. Choosing an appropriate user name
When we choose a user name to create an e-mail account, we should think
about what we want to use the account for. It can be formal (as in name.
surname, or with the first name initial and the whole surname, for exam-
ple) if we are going to use it in an academic or professional setting, or it
can be more “fun” or informal if it’s for friends. In any event, you should
never use a name such as Gabriel96, which gives the year you were born
and lets people easily know your age
1. Open file P6_E1_Usernames in Unit 4 of the virtual CD and answer
the questions in it.
2. Save the file with the name P6_E1_namesurname.
Exercise
2. Minimum age for creating an e-mail account
Do you know what the minimum age to create an e-mail account is?
Where do you think you could find this information?
1. Enter the Gmail settings and search for “Privacidad” and “Condiciones”.
2. Look in these texts for the minimum age required to have an account.
When you find it, take a screenshot by pressing Impr pant (imprimir
pantalla or print screen) on your keyboard, paste the image into a text
document and save the file with the name P6_ E2_namesurname.
3. In the same document, write a brief commentary on how easy or dif-
ficult it is to find this information.
Exercise
3. Spam and hoaxes
We often receive two types of malicious messages on our computer or
mobile device: unwanted mail (spam) and chain e-mails containing false
rumours (hoaxes). To combat spam, e-mail account providers (such as
Gmail, Hotmail, Yahoo, etc.) have systems to prevent it. Antivirus software
usually includes a spam filter. The problem with hoaxes is that they nor-
mally come from known e-mail addresses, so the above filters are ineffec-
tive, as they are valid senders. To try and stop the trend, there are websites
that compile information on these rumours which you should to visit be-
fore resending a “caring” message to all the contacts in your address book.
1. Enter your Gmail account and find out where it saves spam. Take a
screenshot showing where it is, paste the image into a text document
and save the file with the name P6_ E3_namesurname.
2. In the same document, explain if you’ve ever received a hoax by com-
puter or mobile.
YouTube is a website that lets users share digital videos online. It is cur-
rently owned by Google.
To upload a video to YouTube, you need to create a free account. The min-
imum age for doing so is 14. If you try and create an account giving a date
of birth younger than 14, the following error message will appear: “Lo
sentimos. Según la información que nos has proporcionado, no te puedes
registrar en YouTube.com”.
1. Go to www.youtube.com.
2. Look for the terms of service (condiciones del servicio) and the pri-
vacy policy (política de privacidad) and try and find the minimum
required age in these documents. If you manage it, take a screenshot
with the Impr pant key, paste the image into a text document and
save the file with the name P7_namesurname.
3. In the same document, write a brief commentary on how easy or dif-
ficult it is to find this information.
4. In the privacy policy, try to understand what personal details Google
can collect and how it can use them. Is it easy to understand this in-
formation? Do you think a person with the minimum required age
would be able to make decisions about these details?
5. Look for the Community guidelines (Normas de la comunidad)
section. Read the Respect the YouTube community (Respeta la co-
munidad de YouTube) section. Take a screenshot and paste it in the
same text document.
6. Do you think that you can upload images of other people without
their consent? Write a short statement about the possible conse-
quences of disseminating images of other people.
7. Have you ever thought about all the information out there that can
help identify a person, even though it is not immediately obvious? For
example: street names, names of schools, school uniforms or football
kits. Do you think this information could reach people who can make
malicious use of it?
8. How long do you think a YouTube video can stay uploaded? What
happens if a person uploads a video to his or her account without our
consent and a few years later we realise it is inappropriate?
9. Write a statement about YouTube and copyright. Put all your answers
in the same document and save it again.
Exercise
1. Free antivirus
If you do not have an antivirus program installed on your computer, you
can choose a free one for home use, such as Avast!, Avira, Bitdefender,
etc. In this practical, we are going to download and install the Avast! anti-
virus program in Spanish.
1. Go to www.avast.com/es-ww/free-antivirus-download.
2. Download the latest available version of the program.
3. Once downloaded, double-click on the file to start installation and
follow the steps shown in the wizard. To be able to install it, you need
to accept the manufacturer’s licence terms. Once installation is com-
plete, it will ask if you want to carry out an initial system virus search
after rebooting the system. You should allow this to be sure that there
are no viruses on the computer (this process will be carried out during
boot-up and should last around 10 minutes).
4. Take a screenshot showing the installation wizard and paste it into
a text document. Save the file with the name P10_namesurname.
Exercise
2. Windows Defender
As well as antivirus programs, software is available specifically for detect-
ing and deleting other types of malicious software.
1. To open Windows Defender, click the Inicio button. In the search
box, type “Defender” and press Intro.
2. Click on Examinar ahora to see whether your computer is protected
against malware.
3. Once the scan is complete, take a screenshot of the results and save
them in the same text document as Exercise 1.
Exercise 3. Antispyware: Lavasoft Ad-Aware
1. Go to www.adaware.es. Click on Descargar and follow the instruc-
tions to get your free version of this tool.
2. Once the download is complete, execute the file to start installation.
Select the language and follow the steps in the wizard. Click on Fi-
nalizar to complete the installation and an Ad-Aware update win-
dow will automatically open. Once the process is complete, reboot
the computer to activate the changes.
3. After rebooting the system, open the Ad-Aware program by double-
clicking on the task bar icon and selecting the Analizar sistema op-
tion. If it detects anything, follow the recommendations indicated by
the tool to solve the infection.
4. Once the scan is complete, take a screenshot of the results and save
them in the same text document.
Exercise
1. Compressing with a password
1. If you don’t have a file compression program, you can get one by
going to www.winrar.es/descargas. Consult the terms of the licence.
Once the program has downloaded, double-click on the file to start
installation and follow the steps shown in the wizard until it is com-
plete.
2. Create a folder with the name P11_namesurname and save a file of
any sort in it. Next, open the file explorer and go to a level higher than
the created folder, which is the directory you want to protect. Right-
click on the folder and choose the Añadir al archivo... option. In the
Avanzado tab, click on Establecer contraseña.
3. Click on Aceptar to generate a compressed file (RAR) with all the con-
tents of the directory. Once complete, you can delete the directory
you have compressed.
4. From now on, when you double-click on the RAR file, you will be
asked for the password you set before showing you the content.
Exercise
2. Passwords in word processors
Practically all programs you can use on your computer offer the option
of protecting files with passwords in their security tools. Let’s look at two
examples:
Microsoft Word
1. Open a document. Go to Archivo / Información / Permisos and click
on Proteger el documento. Select Cifrar con contraseña.
2. Write the password “Sunlight” in the Cifrar documento dialogue
box. Next, click on Aceptar.
3. Write the password again and click on Aceptar.
LibreOffice Writer
1. Open the document. Go to Archivo / Guardar como.
2. Enable the Guardar con contraseña option and click on Guardar.
3. Write and confirm the password “Sunlight”, then click on Aceptar.
Save the files in the folder P11_namesurname and then try to open
them.
3
E HER E
T W R I T
4
DO N O
5
Use a search engine to find out what a phonbie is. Next, based on Prac-
tical 5, create a video in PowToon to explain everything you’ve found
out: what phonbies are, how they can affect you, what you can do to
avoid becoming one, etc.
This practical can be done alone and then shared in class or, if your
teacher shares a document with the whole class using Drive, you can
produce a joint presentation, even with all of you working on it at the
same time. This enables a lot of information to be gathered quickly.
1. In your Gmail account, click on Apps (in the top right menu) and in
the pop-up menu click on Drive.
2. Open the New menu and select the Google Slides option. A doc-
ument will open in a new window.
3. In the document, write your name and a real case that you person
ally know, which matches what we have seen on personal threats.
In the description, don’t say who it happened to, even if it’s you
or just someone you know. When you have finished, click on Save
now and save the file with the name Sharing problems: aware-
ness is prevention.
4. Share the file with three classmates using the Share option. If your
teacher asks you to, share the document with him or her.
5. Next, go to your Gmail account and open a file that someone has
shared with you. Check that you can write in it.
Extension 3. Cryptography
UNIT SUMMARY
Personal safety
Phishing is a type of computer fraud that consists of acquiring information about a user (bank details, passwords, etc.) in
order to use it fraudulently.
Cyberbullying is a type of harassment consisting of threats, blackmail, etc., between peers over the Internet, mobile or
video games.
When we use the Internet, we must bear in mind our security and respect for others. The law protects us.
As well as the software available to us, we must be clear that the best protection we can have is ourselves and adults we
trust: parents, teachers and specialists.
Use common sense and do not do things on a computer that you would not do in everyday life.
COMPREHENSION ACTIVITIES
When you have completed the topic, do the following exercises. You can complete them online by going to the relevant
unit on the publisher’s website (www.editorialdonostiarra.com) and hand them in as PDFs.
Threat Solution
1. Virus a) Cryptography
2. Trojans b) Firewall
3. Black hackers c) Antivirus
4. Cyberbullying d) Passwords
5. Spyware e) Reporting
6. Loss of intimacy f) Ethical hacking
7. Identity theft g) Protecting your privacy
4. Open file Comprehension4_revision.doc in Unit 4 of the virtual CD and check your knowledge of security by filling
in the table without looking in the book. Next, correct it and complete it by re-reading the contents of the unit. Save the
file with the name Comprehension4_namesurname.doc.
5. In relation to Practical 9, explain which security elements should we check on our computer.
Personal safety
1. Explain what Internet fraud is and how it can be avoided.
2. Say whether the following statements on Internet security are true or false and why:
a) We can post photos of another person on the Internet without their consent, so long as the person is not doing any-
thing in the photo that could harm their image.
b) If we switch our webcam off, we do not have to worry about people recording us.
c) We can sometimes extract more personal information than we might first think by studying a photo or a video care-
fully.
3. In relation to Practical 1, explain what your digital footprint is.
MULTIMEDIA ACTIVITIES
When you have studied the topic, test your knowledge by doing the following online exercises, which you can find in the
relevant unit on the publisher’s website (www.editorialdonostiarra.com). You can hand them in as PDFs.
MOBILE APPS
ONLINE ACTIVITIES
Websites that protect you
1. Open file Internet1_Websites.doc in Unit 4 of the virtual CD and complete the table after visiting the websites indica-
ted in it.
2. Save the file with the name Internet1_namesurname.
Security videos
1. Go to www.pantallasamigas.net (or www.youtube.com/user/pantallasamigas) and watch the following videos: “Cuida
tu imagen on-line”, “Netiqueta joven para redes sociales”, “Cuidado con la webcam: sus usos positivos y riesgos” and
“Sexting: ¡no lo produzcas!”.
2. In a word processor, summarise the main idea in each video. Save the file with the name Internet2_namesurname.