Professional Documents
Culture Documents
Communication
Technology 6
Cycle 1 July 31 - August 8, 2023
This is Marcus, he
does not have his
own computer so
he uses his family’s
common computer.
He likes to use
Facebook: he likes
to join communities
and make friends
online. He
autosaves his
password so that he
can log-in easily.
One day he made a
friend - they have so
many things in
common, so it was
easy to share stories
about his life, his name,
his age, where he lives.
His online friend
one day sent him a
link to a website
where he can make
money by signing
up on a site.
Marcus happily
clicked it; it was a
confusing site but
he followed the
login instructions
and inputted his
information.
However, after downloading
the required software, the
computer started
malfunctioning.
It was a virus! He rebooted his
computer and when he
logged back in, there was an
email from the bank. His
account was zero.
He posted complaints on the
internet about his experience:
but instead of sympathy, people
made fun of him and called him
rude names.
He was now broke
and broken he
stopped using social
media.
Maintaining Internet
Safety
1
Common Online
threats
1 Phishing
This is a threat that tricks the
user into giving his or her
information, like a
username or password. This
usually involves links
leading to fake sites that
ask for personal
information.
2 Malware
This is a threat that
downloads viruses, Trojan
horses, spywares, and
other harmful software
into our computers.
Types of Malware
Spyware Worms
collects information about
Targets vulnerabilities in an
users’ activities without their
operating system to replicate
knowledge or consent.
themselves in networks to eat
system resources
Trojan Virus
Disguises itself as another
software and damages or a malware that corrupts or
steals information infects data in computer
Guess the Malware
Use your plickers cards
It is a malware that infects other
files in a computer
a. Trojan Horse
b. Spyware
c. Worms
d. Virus
Targets vulnerable OS and
self-replicates
a. Trojan Horse
b. Spyware
c. Worms
d. Virus
Pretends to be other programs
and steals or destroys data
a. Trojan Horse
b. Spyware
c. Worms
d. Virus
Collects information of victims
and monitors their actions
a. Trojan Horse
b. Spyware
c. Worms
d. Virus
3 Cyberbullying
It is using online
technology to hurt
someone on purpose.
3 Pharming
Cyber Smarts
Cyber Communication
Cyber
Manners
1 2 3
A. Cyber Manners
1 Be polite.
A. Cyber Manners
2
Think before
we click or
type.
A. Cyber Manners
3
Behave online
just like how we
would behave in
real life.
Cyber Smart
4 5 6
B. Cyber Smart
4
Never give out or
post personal
information.
B. Cyber Smart
5
Do not do
anything
uncomfortable.
B. Cyber Smart
6
Only visit
safe
websites.
Cyber
Communicatio
n
7 8 9 10
C. Cyber Communication
7 Do not talk to
strangers.
C. Cyber Communication
8 Keep messages
short.
C. Cyber Communication
9
Use
appropriate
emoticons.
C. Cyber Communication
10 Do not use
all caps.
Let’s Test
your
Knowledge!
✕ 1. Phil’s message to Sophia was “HELLO
SOPHIA HOW WAS YOUR DAY?”
✕ 2. Sophia was not yet finished with what she
was saying, but she clicked the send
button already.
◯ 3. Phil used only one emoticon at the end of
his message
◯ 4. Sophia only said positive things to her
friends online.
✕ 5. Phil clicked an ad and downloaded an
unknown software.
1. It refers to rules of respect and courtesy to
people online
a. smiley
b. phishing
c. emoticon
d. netiquette
2. It is a combination of characters used to
display emotion.
a. smiley
b. phishing
c. emoticon
d. netiquette
3. It refers to capitalizing all of the letters in what
you are typing.
a. all caps
b. malware
c. emoticon
d. netiquette
4. It is used to show you are laughing
a. :-)
b. :-D
c. :-(
d. ;-)
5. While browsing, you were redirected to another
page that is unfamiliar to you. What should you
do?
a. take a look at the content
b. close the web browser immediately
c. do not click the back button at the web
browser
d. Call other friends, and look at the website
together.
Recalling MS Word:
MS Word
Launch
Recalling
Microsoft Word
How do we open
Microsoft Office Word?
You can look for MS Word’s icon at the
desktop.
Home
It is where the most
common tools are found.
Document Area
Document Area
This is where we create our
document by putting
information needed for
analysis.
Type a good file name for your file then, click the Save
button.
Recalling MS Word:
MS Word
Closing
Click the Close button.
Click the Close button.
Activity
Time
MS Word Activity No.1
1. Launch MS Word
2. Create a blank document
3. Save a document
4. Close a document
5. Open an existing document
Recalling MS Word:
Keyboard
shortcuts
Common MS Word access shortcuts
Saving a file: (ctrl + S) or (Fn+F12)/(F12)
Copy: (ctrl + C)
Cut: (ctrl + X)
Undo: (ctrl + Z)
Redo: (ctrl + Y)
Alignment and text formatting:
Center: (ctrl + E)
Justify: (ctrl + J)
Italicize: (ctrl + I)
Alignment and text formatting:
Bold : (ctrl + B)
Underline: (ctrl + U)
Print : (ctrl + P)
Activity
(boardwork)
Deep thought Question