You are on page 1of 34

COMPUTER 10

□FIRST QUARTER
CONTENT
□Introduction to Internet
□Internet defined
□History of Information
Technology and Internet
□Networking and Topology
□Channels of Communication
□ Modes of transmission
□ How Web works
□ Domain Name and URL
□ Requirements for internet
connections
□ Services offered by the internet
□ Internet Terminologies
□ Net Etiquette
INTERNET
□The Internet/Net is a world
wide network of computers
that are connected
(networked) and are using the
communication method called
TCP/IP.
TCP(Transmission Control
Protocol )
□Which uses a set of rules to
exchange messages with
other Internet points at the
information packet level
IP(Internet Protocol)

□Which uses a set of rules


to send and receive
messages at the Internet
address level.
INTERNET

□The global communication


network that allows almost all
computers worldwide to
connect and exchange
information.
□ The Internet was named
ARPANET in 1969 by the
Advanced Research Projects
Agency of the U.S. Department of
Defense with just four computers
connected together.
□Vinton Gray Cerf is an
American Internet pioneer, who
is recognized as one of "the
father of the Internet",
RISKS IN USING
THE INERNET
1.Cyber – stalking
□Is any kind of harassment
or threatening behaviour
that happen online
□It can happen through instant
messaging, Text messaging
,email or social network like
Facebook.
□If the perpetuator is a student ,
it is called CYBER
BULLYING.
PERPETUATOR

□A person who commits, an


illegal ,criminal or evil act.
□Last September 12,2013 The
Philippine Government
approved Republic Act 10627
Entitled :
□Anti – Bullying Act of 2013
□Coverage : Elementary
and Secondary Schools
DEFINITION :
□ A severe or repeated use of physical act
or gesture ,written or electronic
expression or combination thereof
resulting to fear, physical, emotional
harm ,damage to property , creation of
hostile environment and
infringement( violation) of rights of
another student.
PHISHING

□ Is a type of scam where the


scammer tries to trick you by
stealing your personal information
that they steal from your email
account or website that they ask
you to approve or look at
something.
□And when you click the
link, it will instantly steal
all you all information.
□ Phishing involves a scammer or online
thief collecting data and information
from users after they have entered it
on a URL that looks similar to a
website they are familiar with logging
into each day.
PIRACY

□Is the act of taking


ownership to a copyrighted
material or illegally sharing
copyrighted materials
□Pupils think that sharing
is alright but it can result
to stiff penalties.
MALWARE

□Is a malicious software that


is designed to damage your
computer or steal your
personal information.
□It includes viruses,spyware,and
other types of harmful software.
□Malware is often secretly
bundled with other software ,
and can infect email
attachments.
□ Viruses and Spyware
□ Using an anti-virus program
installed onto your computer’s
hard drive is highly not
recommended whether you prefer
to browse the internet for email
and information or if you enjoy
social networking and games
□Viruses and spyware are often f
ound in downloaded tools and p
rograms that implement third-p
arty tools
 to add to their own software
upon installation.
□ Be sure to read and review all
terms and conditions for new
programs, mobile apps, and software
prior to installing them on your
computer or mobile device to keep
from obtaining unwanted spyware or
potential viruses.
OBSCENITY

□ It contains malicious content that


you probably don’t want your kids
to see like pornography ,violent
content and vulgar language.
Legal and Financial

□ There is also the risk that a child could


do something that has negative, legal
or financial consequences, such as
giving out a parent’s credit-card
number or doing something that
violates another person’s rights.
Catfish Cases and Potential Online
Dating Dangers

□ Dating online is no longer taboo an


d has millions of individuals from
around the world hooked
, especially with the thousands of
online dating communities
available to choose from today.
□ Catfish cases are also most common
in online dating, where an individual
creates a fake profile and persona to
appeal to potential partners they are
interested in dating.
□ These relationships often last
months or even years prior to
discovering the individual you have
been virtually dating is not really
who they claim to be.
□WHAT ARE THE
GUIDELINES FOR KEEPING
YOURSELF SAFE ONLINE?

You might also like