You are on page 1of 3

Lesson 2:Rules of Netiquette

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the
old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.”
The Internet is one of the most dangerous places, especially if you do not know what you are doing.

Different types of Information that thry should not publicly disclose:

Internet Threats

1. Malware – stands for malicious software is any program or file that is harmful to a computer user. Malware includes
computer viruses, worms, trojan horses and spyware.

Types of Malware

a. Trojan or trojan horse are common but dangerous programs that hide within other seemingly harmless
programs. Once. They're installed the program will infect other files throughout your system and potentially
wreak a havoc on your computer they can even send important information through your computer over the
Internet to the developer of the virus. The developer can then essentially control your computer, slowing your
system's activity or. Causing your machine to crash.

b. Virus are small programs or scripts that can negatively affect the health of your computer. These malicious little
programs can create files, move files, erase files, consume your computer’s memory And cause your computer
not to function correctly some viruses can duplicate themselves, attach themselves to programs and travel
across networks.
c. Worm a computer worm is a type of malware that can quickly replicate themselves and spread to other
computers in the network.

d. Spyware is a type of malware that hackers use to see your personal information, banking details. Spyware is
any. Software that installs itself on your computer and starts covertly monitoring your online behaviour without
your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person
or organization and relays this data to other Parties in some cases these may be advertisers or marketing data
firms which is why spyware is sometimes referred to as adware it is installed without user consent by methods
such as a drive by download a trojan included with a legitimate program or deceptive pop up windows.

e. Adware is free software that is supported by advertisements. Common adware programs are. Toolbars that sit
on your desktop or work in conjunction with your web browser. They include features like advanced searching
of the web or your hardrive and better organization of your bookmarks and shortcuts. Adware can also be more
advanced they are free to use but require you to watch advertisements.

f. Rogue Security Software is a form of malicious software and Internet fraud that misleads users into believing
there is a virus on their computer, and to pay money for a fake malware removal tool (that actually introduces
malware to the computer).

g. Keylogger is a program that records the keystrokes on a computer. It does this by monitoring a user's input and
keeping a log of all keys that are pressed. The log may be saved to a file or even sent to another machine over
a network or the Internet.

2 Types of Keylogger

1. Software-based keyloggers are essentially programs that aim to monitor your computer’s operating
system. They vary in types and levels of system penetration. One example of which is memory
injection software. These are typical Trojan viruses that alter the memory tablet of a system in order to
bypass online security.

2. Hardware-based keyloggers compared to a software-based, hardware ones don’t need any installing
since they are already within the physical system of the computer.

h. Pharming is a scamming practice in which malicious code is installed on a personal computer or server,
misdirecting users to fraudulent Web sites without their knowledge or consent.

Pharming has been called "phishing without a lure." In phishing, the perpetrator sends out legitimate-looking e-
mails, appearing to come from some of the Web's most popular sites, in an effort to obtain personal and
financial information from individual recipients.

2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.

3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.

Think Before You CLICK


1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to
see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees
your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility .
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation , ask the one who posted it to pull it down or report it as
inappropriate.

Copyright Infringement
If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be
used by others. This is called intellectual property.
Lesson 3:Advanced Word Processing Skills

Word processing describes the process of creating or editing a document using a word processor such as Microsoft Word or
Google docs.

Mail Merge is a feature within most data processing applications that enables users to send similar letter or. Document
to multiple recipients.

Two Component of Mail Merge

1.Form Document
The document that contains the main body of the message we want to convey or send.
2. List or Data File
This is where the individual information or data that needs to be plugged in (merged) to our form document is
placed and maintained.

Label Generation:It creates a blank form document that simulates either a blank label or envelope of pre-defined size and
will use the data file that you selected to print the information, typically, individual addresses.

Integrating Images and External Materials


Kinds of Materials

a. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in any local
storage device.
b. Clip Art. This is generally a .GIF type; line art drawings or images used as generic representation for ideas
and objects that you might want to integrate in your document.
c. Shapes. These are printable objects or materials that you can integrate in your document to enhance its
appearance or to allow you to have some tools to use for composing and representing ideas or messages.
d. Smart Art. Generally, these are predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature.
e. Chart. Another type of material that you can integrate in your Word document that allows you to represent
data characteristics and trends.
f. Screenshot. Sometimes, creating reports or manuals for training or procedure will require the integration of
a more realistic image of what you are discussing on your report or manual.

Lesson 4: Advanced Spreadsheet Skills


Microsoft Excel provides an automated way of displaying any statistical data. It can be used to automatically compute for
several factors that are not easy to notice especially when faced by a large data. Microsoft Excel includes several arithmetic
and basic functions that help you compute faster.

Basic Excel Formulas:


Addition (+)
Subtraction (-)
Multiplication (*)
Division (/)

*type <=> before the formula, thus:


=a1+a2 <then, hit the ENTER key>

Average – a function used to compute for the average of the number of a range.
COUNTIF – a function used to count the cells with a specified content within a range.
SUMIF – a function used to compute for the summation of a range if a certain condition is met
AVERAGEIF – a function used to compute for the average of a range if a certain condition is met

You might also like