Professional Documents
Culture Documents
TECHNOLOGIES
Name Strand
“Even though I walk through the valley of the shadows of death, I will fear no evil for you are with me;
your rod and your staff they comfort me”. Psalms 23:4
We are living in this vicious and frightening world where nothing is so certain. We tend to share
whatever we may feel toward some random things. We post new updates in our way of
releasing stress, expressing special emotions to a special person, and even conveying hatred.
By doing so, we were pre-occupied with our feelings alone not knowing others’ feelings on the
other hand—this, is our way of worship. Remember this verse, “Dear children, keep yourself from
idols” I John 5:21. social media and/or gadget is our idol.
Now there are some hundred thousand questions to answer on your worksheet 2.1.
What to Know!
Objectives:
At the end of the lesson, you are expected to:
Before proceeding, let’s see if you have prior knowledge about this course. Provide the answers
of the activity on worksheet 2.2.
Let’s Explore!
There are numerous delinquencies that can be committed on the internet such as stalking,
identity theft, privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is
a reputable business having a secure service. To make sure that you are in a
Regularly review your privacy settings in your online accounts to make sure you are not
sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data before
leaving.
Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:
WHAT IS IT?
Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities
to attack computers and retrieve sensitive data from individuals. Half the time, we
Online threat is deemed any malicious act that attempts to gain access to a
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which utilize
HTTP or HTTPS protocols, but may also employ other protocols and components,
servers that access the Web. They benefit cybercriminals by stealing information for
subsequent sale and help absorb infected PCs into botnets. Web threats pose a
broad range of risks, including financial damages, identity theft, loss of confidential
The following are the top kinds of online threats that you should be aware of:
come in various forms such as lottery scam, charity fraud scams, job offer
human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots are
"bad" and are programmed to break into user accounts, scan the web for
computer user. Here are the most common offenders in the rogues’ gallery of
malware:
Spams are unsolicited emails, instant messages coming from recipients that
are not granted verifiable permission for the message to be sent. Spam
else to gain our confidence, get access to our systems, steal data, steal
ASSESSMENT
Let’s see what you have learned during our entire lesson. Provide the table with your answers
on worksheet 2.4.