You are on page 1of 101

Information

Communication
Technology 6
Cycle 1 July 31 - August 8, 2023
This is Marcus, he
does not have his
own computer so
he uses his family’s
common computer.
He likes to use
Facebook: he likes
to join communities
and make friends
online. He
autosaves his
password so that he
can log-in easily.
One day he made a
friend - they have so
many things in
common, so it was
easy to share stories
about his life, his name,
his age, where he lives.
His online friend
one day sent him a
link to a website
where he can make
money by signing
up on a site.
Marcus happily
clicked it; it was a
confusing site but
he followed the
login instructions
and inputted his
information.
However, after downloading
the required software, the
computer started
malfunctioning.
It was a virus! He rebooted his
computer and when he
logged back in, there was an
email from the bank. His
account was zero.
He posted complaints on the
internet about his experience:
but instead of sympathy, people
made fun of him and called him
rude names.
He was now broke
and broken he
stopped using social
media.
Maintaining Internet
Safety
1

Common Online
threats
1 Phishing
This is a threat that tricks the
user into giving his or her
information, like a
username or password. This
usually involves links
leading to fake sites that
ask for personal
information.
2 Malware
This is a threat that
downloads viruses, Trojan
horses, spywares, and
other harmful software
into our computers.
Types of Malware

Spyware Worms
collects information about
Targets vulnerabilities in an
users’ activities without their
operating system to replicate
knowledge or consent.
themselves in networks to eat
system resources

Trojan Virus
Disguises itself as another
software and damages or a malware that corrupts or
steals information infects data in computer
Guess the Malware
Use your plickers cards
It is a malware that infects other
files in a computer
a. Trojan Horse
b. Spyware
c. Worms
d. Virus
Targets vulnerable OS and
self-replicates
a. Trojan Horse
b. Spyware
c. Worms
d. Virus
Pretends to be other programs
and steals or destroys data
a. Trojan Horse
b. Spyware
c. Worms
d. Virus
Collects information of victims
and monitors their actions
a. Trojan Horse
b. Spyware
c. Worms
d. Virus
3 Cyberbullying

It is using online
technology to hurt
someone on purpose.
3 Pharming

Internet fraud that fools


victims into going to sus
sites to steal information
1
Identify the online
threats in Marcus’
story
2
What should we do to
protect ourselves
online?
Protection from Internet Threats

Think before Leave


we click. unknown sites.
1 2
Only be friends
Do not post with the
personal people we
information 3 know. 4
Protection from Internet Threats
Be careful with Do not talk
the people we back to
cyberbullies.
meet online.
5 6

Have the latest


antivirus software
installed.
7
1 Think before we
click.
Anything that we
click may lead to a
fake site.
2 Leave unknown
sites.
Do this immediately
to avoid threats that
may lure us.
3
Do not post personal
information.
Do not post home
addresses, e-mail
addresses, mobile
numbers and passwords.
4
Only be friends with
the people we know.

It is safe to use the


Internet if we know whom
we are interacting with.
5
Be careful with the people
we meet online.

Always be aware of who


you are interacting
with in the Internet.
6
Do not talk back to
cyberbullies.
Do not respond to online
bullies. Let your
parents or teachers
know about this.
7
Have the latest antivirus
software installed.

The antivirus software will


protect us from
threats.
Let’s go back to your
answers
Based on your answers, How could
Marcus have avoided the online threats?
Let’s Recall!

● What are the common internet threats?


● How can you maintain internet safety?
Cyberbullying Password Phishing
Malware Antivirus Think
1. The first rules in protecting yourself in online is to Think before you
click.
2. Cyberbullying is when users say mean and hurtful things about a
person online.
3. To protect your computer from any threat, you must install an
Antivirus software.
4. Phishing is a threat that tricks you into giving out your personal
information
5. When your computer is infected with a virus or a Trojan horse, you
have encountered a Malware
See you next meeting!
● Read the conversation,
what did you notice?
● How should you
talk/act online?
● What is etiquette?
Observing
Netiquette
Netiquette
net etiquette
Referring to These are formal manners
the internet and rules that are followed
in social or professional
setting.
Netiquette
These are rules that show
respect and courtesy to
people online.
Rules of
Netiquette
Rules of Netiquette
Cyber Manners

Cyber Smarts

Cyber Communication
Cyber
Manners
1 2 3
A. Cyber Manners

1 Be polite.
A. Cyber Manners

2
Think before
we click or
type.
A. Cyber Manners

3
Behave online
just like how we
would behave in
real life.
Cyber Smart
4 5 6
B. Cyber Smart

4
Never give out or
post personal
information.
B. Cyber Smart

5
Do not do
anything
uncomfortable.
B. Cyber Smart

6
Only visit
safe
websites.
Cyber
Communicatio
n
7 8 9 10
C. Cyber Communication

7 Do not talk to
strangers.
C. Cyber Communication

8 Keep messages
short.
C. Cyber Communication

9
Use
appropriate
emoticons.
C. Cyber Communication

10 Do not use
all caps.
Let’s Test
your
Knowledge!
✕ 1. Phil’s message to Sophia was “HELLO
SOPHIA HOW WAS YOUR DAY?”
✕ 2. Sophia was not yet finished with what she
was saying, but she clicked the send
button already.
◯ 3. Phil used only one emoticon at the end of
his message
◯ 4. Sophia only said positive things to her
friends online.
✕ 5. Phil clicked an ad and downloaded an
unknown software.
1. It refers to rules of respect and courtesy to
people online
a. smiley
b. phishing
c. emoticon
d. netiquette
2. It is a combination of characters used to
display emotion.
a. smiley
b. phishing
c. emoticon
d. netiquette
3. It refers to capitalizing all of the letters in what
you are typing.
a. all caps
b. malware
c. emoticon
d. netiquette
4. It is used to show you are laughing
a. :-)
b. :-D
c. :-(
d. ;-)
5. While browsing, you were redirected to another
page that is unfamiliar to you. What should you
do?
a. take a look at the content
b. close the web browser immediately
c. do not click the back button at the web
browser
d. Call other friends, and look at the website
together.
Recalling MS Word:
MS Word
Launch
Recalling
Microsoft Word
How do we open
Microsoft Office Word?
You can look for MS Word’s icon at the
desktop.

You can look for it in the Start Menu.


Recalling MS Word:
MS Word
Environment
Ribbon
Ribbon

File Home Insert Page Layout

References Mailings Review View


Ribbon

Home
It is where the most
common tools are found.
Document Area
Document Area
This is where we create our
document by putting
information needed for
analysis.

Rulers are present to guide


us in aligning our content.
Minimize, Maximize, or Close Button
Recalling MS Word:
MS Word
Saving
How do we save a document?
If the document is a new document, we must
use the Save As option.

If the file has been saved previously, just


select the Save icon on the Quick Access
toolbar.
Browse the folder where we want the file to be saved.

Type a good file name for your file then, click the Save
button.
Recalling MS Word:
MS Word
Closing
Click the Close button.
Click the Close button.
Activity
Time
MS Word Activity No.1

1. Launch MS Word
2. Create a blank document
3. Save a document
4. Close a document
5. Open an existing document
Recalling MS Word:
Keyboard
shortcuts
Common MS Word access shortcuts
Saving a file: (ctrl + S) or (Fn+F12)/(F12)

Opening a file: (ctrl + O)

Closing a file: (alt + F4) or (alt+ Fn + F4)

Creating a new document : (ctrl + N)


Select all text: (ctrl + A)

Copy: (ctrl + C)

Cut: (ctrl + X)

Paste and keep formatting: (ctrl + v) or (ctrl + shift + v)

Undo: (ctrl + Z)

Redo: (ctrl + Y)
Alignment and text formatting:
Center: (ctrl + E)

Justify: (ctrl + J)

Align Right: (ctrl + R)

Align Left: (ctrl + L)

Italicize: (ctrl + I)
Alignment and text formatting:
Bold : (ctrl + B)

Underline: (ctrl + U)

Font size increase: (ctrl + shift + >)

Font size decrease: (ctrl + shift + <)

Print : (ctrl + P)
Activity
(boardwork)
Deep thought Question

1. Why is learning MS Word


important? (1 star)
2. What is the benefit of keyboard
shortcuts?
3. What are the other alternatives of
MS Word? (2 stars)

You might also like