Professional Documents
Culture Documents
DIGITAL
LITERACY
Vic Deanver O. Baga
TABLE OF
Researching
0 Cyber
Citizenship in 0 and Evaluating
CONTENTS
10 50 Use
Digital Age the WebMedia
Social
Internet Safety
20 Cyberbullying
and
60 Devices
Cybercrimes
Managing
Mobile
1. Phishing
2. Internest Scams
3. Malware
4. Personal safety and threats
Phishing Malware
A common type of scam, which the A malicious software (particularly
scammers disguise as a trustworthy spyware) disguise to collect and
source in an attempt to obtain transmit private information.
private information through the use
of fake websites that look identical
and legitimate.
Internet
Personal safety and
Scams
The growth of internetthreats
These are schemes that deceive the
users in various ways in an gave rise to
attemptto take advantage to them. many important services accessible
to anyone with a connection, such
as digital communication.
Cyberbullying and
Cybercrime • Cyberbullying is a form of bullying or
harassment using electronic means.
• It is similar to traditional bullying, it is just that
victims may not know the identity of their bully
and the reason for bullying them.
Types of Cyberbullying:
• Internet trolling is a common form of bullying
over the internet in an online community to
elicit a reaction, disruption, or intentionally
provoke and offend others.
• Cyberstalking uses electronic
communication to stalk a victim and post a
credible threat to harass him/her.
• Cybercrimes as any criminal activity carries
out using computers or the internet.
• When hackers access your computer for
malicious reasons. You can fall victim any
time you are on unprotected computer, receive
a deceptive email claiming there is an “urgent
matter” regarding your account or just
searching the web.
Managing computer
What is a computer threat? threats
Is a potential negative action or event facilitated by a
vulnerability that results in an unwanted impact to a
computer system or application.
1. HUMAN ERRORS
• Giving sensitive information to the wrong peiple.
• Writing down your passwords.
• Using the same passwords for all your accounts.
• Clicking on links provided in emails with verification.
• 2. PHYSICAL ACCESS
• Theft
• 3. SECURITY THREATS
• Programs written to alter the way a computer
operates without the permission of knowledge of a
user.
• 4. HARDWARE FAILURE
• Mechanical damage of hard drive
• Spilling coffee and other water damages.
Researching and Evaluating the web
● The internet is a global communication network
that allows computers to exchange and share
information.
● The WCC librarians highly recommend that you
begin your research with reliable articles and
books to gain a solid background about your
subject. With that knowledge and evaluating
the web becomes much more easier.
Checking
AUTHORCredibilities FACT VS. OPINION PURPOSE
Look for the author’s Stick with sites that Analyze the goal of
qualifications to present factual the website if it has
provide on the information. Be on a concrete
information you are the lookout for relationship of your
researching. biases. identified objectives.
DATE URL
Get the most up to Determine the most
date information. credible and trusted
information
(.gov, .edu, .org, .co
m, .net)
Social Media Use
Social Media is a computer-based
technology that facilitates the
sharing of ideas, thoughts, and
information through the building of
virtual networks and communities.
2000’s
1980’s The phone that all of your mates
had at school – if you went to
Motorola released its
school in the mid-to-late-90s, that
first commercial mobile is.
phone, known as the Motorola
DynaTAC 8000X. The handset
offered 30 minutes of talk-
2010-2021: Thein Android
A lot of things happened &
the phone market
time, six hours standby, and
could store 30 phone numbers.
iPhone
obvious thingEra
during 2010 and 2021. The first and most
was the rise of Google’s
Android platform.
Digital
Traits 8 Traits That Make a Positive Digital Citizen
1. Positive Advocates
Advocates for equal digital rights and accesss for
all.
2. Respectful
Treats others with respects in online spaces and
never cyberbullies.
3. Responsible
Makes appropriate decisions when
communicating through a variety of digital
channels.
4. Adept
Use digital tools to advance their learning and keeps up with
changing technologies.
5. Does not steal or damage other’s digital work,
identity and property.
6. Upholds basic human rights in all figital platforms.
7. Protects personal information from outside forces
that might cause harm.
8. Proactively limits health risks of technology from
physical to psychology.
What is the
importance of
Digital Literacy to
students?
Digital literacy is crucial to helping
students become lifelong learners. It
teaches them essential life skills as well
as academic skills.
THAN
K YOU