inbound1512977112797820233.pptx education slides

KeziahFaithAungon 6 views 84 slides Mar 04, 2025
Slide 1
Slide 1 of 84
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84

About This Presentation

for educational purposes


Slide Content

EMPOWERMENT TECHNOLOGIES (E-Tech)

Empowerment Technologies Information and Communication Technologies ACTIVITY 1 How is your digital media life like?

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 1. 82% of teens say that they own which of the following? a) cell phone b) smartphone c) iPod Touch or similar device d) iPad or similar device

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 2. What percent of teens describe themselves as “addicted” to their cell phones? a) 11% b) 27% c) 41% d) 63%

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 3. 68% of teens say they do which of the following at least once a day? a) text b) visit a social network c) instant message (IM) d) use email

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 4. How many characters (letters, punctuation marks, symbols, and spaces) can you send in a regular text message? a) 110 b) 140 c) 200 d) 250

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 5. How often do 34% of teens visit social networking sites? a) at least once a day b) several times a day c) once a week or less d) never

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 6. What percent of teens say that they don’t understand their social networking site’s privacy policies? a) 24% b) 35% c) 46% d) 61%

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 7. What percent of teens still prefer face-to-face communication with their friends over communication online or via texting? a) 22% b) 36% c) 49% d) 61%

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 8. What percent of teens say they have said something bad about someone online that they wouldn’t have said in person? a) 33% b) 67% c) 49% d) 25%

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 9. What percent of teens say that social networking helps them connect with people who share a common interest? a) 35% b) 42% c) 57% d) 66%

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 10. What percent of teens agreed they wish they could “unplug” for a while? a) 13% b) 27% c) 29% d) 43%

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Filipinos use Social Media to express emotions (IOITP, 2013) # whogoat # walangforever # tbt # tamaanbukol # marcelosantosIII # nofilter #BTS #OOTD

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!

Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!

LOG-IN…WHO AM I?

…YES! CONNECTED

ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE It is a combination of the words network and etiquette , and is defined as a set of rules for acceptable online behavior . Similarly, online ethics focuses on acceptable use of online social environment.

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 1: Remember the Human

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 2: Adhere to the same standards of behavior online that you follow in real life

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 3: Know where you are in cyberspace

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 4: Respect other people's time and bandwidth

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 5: Make yourself look good online

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 6: Share expert knowledge

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 7: Help keep flame wars under control

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 8: Respect other people's privacy

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 9: Don't abuse your power

Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 10: Be forgiving of other people's mistakes

Empowerment Technologies Online Safety, Security, Ethics and Etiquette Web’s GOLDEN RULE Remember the web ’ s golden rule: “ Remember, there is a person there. ” Emails, comments in chat rooms, and instant messages are read by real people with real feelings . Golden Rule

Empowerment Technologies Online Safety, Security, Ethics and Etiquette RULES OF NETIQUETTE • Online security, safety, and ethics • Internet threats • Protecting reputations online • Copyright • Contextualized online search and research skills

Empowerment Technologies Online Safety, Security, Ethics and Etiquette Online Safety and Security The Internet is one of the most dangerous places! The Internet is a powerful tool . Promote business Gain new friends

Empowerment Technologies Online Safety, Security, Ethics and Etiquette Online Safety and Security The Internet is defined as information superhighway Internet

Empowerment Technologies Online Safety, Security, Ethics and Etiquette Online Safety and Security Internet The Internet is a public place and it is up to you to protect yourself

Empowerment Technologies Do YOU agree? “Instead of promoting social behavior, social media promotes disengagement , self-absorption , loneliness and sadness .” Online Safety, Security, Ethics and Etiquette

Empowerment Technologies DIGITAL LIFE 101 (https://www.commonsensemedia.org/ video/modal/2078096) Online Safety, Security, Ethics and Etiquette

Empowerment Technologies How Safe are You? Type of Information Shared Not Shared First name Last name Middle name Current and previous school (s) Your cellphone number Name of father and mother Name of your siblings Your address Your home phone number Your birthday Online Safety, Security, Ethics and Etiquette

Empowerment Technologies Online Safety, Security, Ethics and Etiquette How Safe are You?

Empowerment Technologies Online Safety, Security, Ethics and Etiquette How Safe are You?

Empowerment Technologies Online Safety, Security, Ethics and Etiquette How Safe are You?

Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS MALWARE SPAM PHISHING

Malware – stands for Mal icious Soft ware . Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE a malicious program designed to replicate itself and transfer from one computer to another. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE a malicious program that transfers from one computer to another by any type of means. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE I LOVE YOU WORM I LOVE YOU WORM Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get you information MALWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE a form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer, and manipulates them into paying money for a fake malware removal ROGUE SECURITY SOFTWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

ROGUE SECURITY SOFTWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

a program designed to send you advertisements, mostly as pop-ups. MALWARE CERTIFIED ADWARE!!! Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE a program designed to send you advertisements, mostly as pop-ups. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE a program that runs in the background without you knowing it. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

MALWARE a program that runs in the background without you knowing it. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

SPAM unwanted email mostly from bots or advertisers. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

SPAM An Internet  bot , also known as web robot, WWW robot or simply  bot , is a software application that runs automated tasks (scripts) over the Internet. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

PHISHING Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS   -the attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

PHISHING Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

PHISHING CERTIFIED PHISHING!!! Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS

Empowerment Technologies Online Safety, Security, Ethics and Etiquette COPYRIGHT INFRINGEMENT If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.

Empowerment Technologies Online Safety, Security, Ethics and Etiquette “BORROWING” Is it ever right to “ borrow ” or copy someone else ’ s pictures or writing without giving them credit?

Empowerment Technologies Online Safety, Security, Ethics and Etiquette Cutting and Pasting Others ’ Work Is Okay as Long as You… Points to Remember…

Empowerment Technologies Online Safety, Security, Ethics and Etiquette Points to Remember… Give Credit Where Credit Is Due…Cite Your Sources!

Empowerment Technologies Online Safety, Security, Ethics and Etiquette THINK BEFORE YOU CLICK 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts.

Empowerment Technologies Online Safety, Security, Ethics and Etiquette THINK BEFORE YOU CLICK 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility . 3. Set your post to “private.” In this way, search engines will not be able to scan that post.

Empowerment Technologies Online Safety, Security, Ethics and Etiquette THINK BEFORE YOU CLICK 4. Avoid using names . Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation , ask the one who posted it to pull it down or report it as inappropriate .

your HEART # TagAnOPPORTUNITY the future GOOD VIBES!
Tags