Podcast
Questions and Answers
What is a key recommendation for maintaining password security?
What is a key recommendation for maintaining password security?
- Use multiple antivirus programs for better protection.
- Never share your password with anyone. (correct)
- Always log into public Wi-Fi networks for convenience.
- Share your password only with trusted friends.
Which type of malware is known to block access to data unless a ransom is paid?
Which type of malware is known to block access to data unless a ransom is paid?
- Spyware
- Virus
- Adware
- Ransomware (correct)
What should you do before posting content online?
What should you do before posting content online?
- Think about how it might affect your future job opportunities. (correct)
- Consider if it will generate a lot of likes and shares.
- Post without thinking to maintain authenticity.
- Check if it matches trending topics online.
What is a common characteristic of phishing attacks?
What is a common characteristic of phishing attacks?
How can you improve home network security?
How can you improve home network security?
Which of the following is NOT a type of malware?
Which of the following is NOT a type of malware?
What should you do with suspicious emails?
What should you do with suspicious emails?
Why is it important to read terms and conditions before accepting them online?
Why is it important to read terms and conditions before accepting them online?
Which best describes the primary feature of Web 2.0?
Which best describes the primary feature of Web 2.0?
What is a significant trend in ICT that reflects the blending of different technologies?
What is a significant trend in ICT that reflects the blending of different technologies?
What does the term 'cyber citizenship' refer to?
What does the term 'cyber citizenship' refer to?
Which feature distinguishes Web 4.0 from previous web iterations?
Which feature distinguishes Web 4.0 from previous web iterations?
What is considered a major ethical concern of Web 5.0?
What is considered a major ethical concern of Web 5.0?
Which of the following options is NOT a commonly recognized type of social media?
Which of the following options is NOT a commonly recognized type of social media?
Which component is part of Google's advanced search engine features?
Which component is part of Google's advanced search engine features?
What does 'electronic libel' refer to?
What does 'electronic libel' refer to?
What is the implication of the concept of 'fair use'?
What is the implication of the concept of 'fair use'?
What role do fact-checking sites play in information seeking?
What role do fact-checking sites play in information seeking?
Which of the following is NOT a consequence of cyberbullying?
Which of the following is NOT a consequence of cyberbullying?
What is the main purpose of using hashtags in social media?
What is the main purpose of using hashtags in social media?
What does phishing involve?
What does phishing involve?
In the context of ICT, what crucial aspect emerges from the decentralized nature of Web 5.0?
In the context of ICT, what crucial aspect emerges from the decentralized nature of Web 5.0?
Flashcards
Spyware
Spyware
Software that secretly monitors your computer activity, often gathering personal information.
Trojan
Trojan
A type of malware that disguised as legitimate programs, but can harm your computer.
Worm
Worm
Harmful software that spreads from one computer to another, often through email.
Virus
Virus
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Copyright Infringement
Copyright Infringement
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
What is ICT?
What is ICT?
Signup and view all the flashcards
What is the Philippines' ICT standing?
What is the Philippines' ICT standing?
Signup and view all the flashcards
What is Web 1.0?
What is Web 1.0?
Signup and view all the flashcards
What is Web 2.0?
What is Web 2.0?
Signup and view all the flashcards
What is Web 3.0?
What is Web 3.0?
Signup and view all the flashcards
What is Web 4.0?
What is Web 4.0?
Signup and view all the flashcards
What is Web 5.0?
What is Web 5.0?
Signup and view all the flashcards
What is social media?
What is social media?
Signup and view all the flashcards
What is libel?
What is libel?
Signup and view all the flashcards
What is electronic libel?
What is electronic libel?
Signup and view all the flashcards
What is the Cybercrime Law?
What is the Cybercrime Law?
Signup and view all the flashcards
What is a cyber citizen?
What is a cyber citizen?
Signup and view all the flashcards
What are fact-checking sites?
What are fact-checking sites?
Signup and view all the flashcards
What is plagiarism?
What is plagiarism?
Signup and view all the flashcards
What is a virtual self?
What is a virtual self?
Signup and view all the flashcards
Study Notes
Internet Safety and Security
- Online Safety: Be mindful of what and where you share online. Read terms and conditions carefully. Keep social media profiles private.
- Password Security: Never share passwords. Avoid public Wi-Fi. Incognito mode does not guarantee security.
- Stranger Danger: Don't talk to strangers online or offline. Avoid posting about future trips. Add only real-life friends.
- Website and Downloads: Avoid untrusted websites and downloads. Buy software, don't use pirated versions.
- Email Security: Avoid suspicious emails and links.
- Antivirus: Use reputable antivirus software; one is sufficient; update regularly.
- Home Network Security: Secure your home Wi-Fi with a password.
- Secure Purchases: Make online purchases from secure sites.
- Privacy: Private profiles may not be foolproof against hackers. You cannot control who might view your profile.
Internet Threats
- Malware: Harmful software for computers.
- Viruses: Self-replicating programs that spread to other computers.
- Worms: Transmit themselves across computer networks.
- Trojans: Disguised as useful software, endangering your PC.
- Ransomware: Blocks access to data until a ransom is paid.
- Adware: Displays unwanted advertisements, often as pop-ups.
- Spyware: Monitors user activity in the background (e.g., keyloggers).
- Spam: Unwanted emails (often from bots) used to spread malware.
- Phishing: Deceiving users into revealing personal information (e.g., passwords, credit card details) on fake websites.
Protecting Online Reputation
- Consider Consequences: Before posting, imagine how your parents, grandparents, or future boss might react.
- Respond to Harm: If a post harms you or others, report it, and/or request removal.
Copyright Infringement
- Copyright: Using copyrighted material without permission is infringement.
- Avoid Infringement: Assume all work is copyrighted. Do not copy, share, alter, use without permission. Review licenses, buy content, and credit original authors.
Information and Communication Technology (ICT)
- ICT Definition: Communication technologies (internet, mobile phones) for accessing, storing, sending, and processing information.
- Philippines ICT: Significant ICT presence in the Philippines, a large number of ICT jobs, large mobile phone ownership.
- Web Evolution:
- Web 1.0: Static pages, no user interaction.
- Web 2.0: Dynamic pages, user interaction (social media, blogs, wikis).
- Web 3.0: Delivering user-specific content; sharing/reusing data.
- Web 4.0: Intelligent & personalized; utilizes AI, big data, social networking. Concerns include job losses, and potential for inequalities.
- Web 5.0: Decentralized, allows user data control, potentially greater social robots.
- Social Media: Platforms for user-generated content.
- Social Media Types: Social networks, bookmarking sites, social news, media sharing, microblogging, blogs, forums.
- ICT Trends: Convergence, social media, mobile tech (smartphones/tablets) and assistive media.
- Mobile OS: iOS, Android, Blackberry OS, Windows Phone OS, Symbian, WebOS and Windows Mobile.
- Key Terms: Static, dynamic, folksonomy, hashtag, convergence, and social media.
Electronic Libel and Cybercrime Prevention
- Libel: Under the Revised Penal Code, libel is a crime, especially when committed using a computer.
- Cybercrime Law: Penalties include imprisonment and fines.
- "Likes" and Comments: "Likes" and comments are usually protected expression.
- Potential Consequences: Avoid libel; consider consequences of statements.
Cyber Citizenship
- Cyber Citizenship Definition: Appropriate use of technology; etiquette, communication, education, access, commerce, responsibility, rights, safety, and security.
- Online Gaming: Be a good sportsperson; don't accept downloads from strangers.
- IM and Email: Follow privacy tips; distrust unknown sources.
- Social Networking: Be aware of age restrictions.
Contextualized Online Search and Research Skills
- Search Engines: Google (most widely used), Bing (aids in decisions).
- Google Features: Onebox results, instant info, conversions, translations.
- Bing Features: Flight cost predictions, video search.
- Fact-Checking Sites: Check information accuracy.
- Fact-Correction Tools Correct misinformation.
- Image Tools: TinEye, Google Images, and FourAndSix(Izitru).
Legal, Ethical, and Societal Issues
- Cyber Definitions: Relating to computers or networks.
- Cyberspace: Virtual computer world.
- Cybercrime: Criminal activities using computers or the internet.
- Cyberbullying: Bullying via electronic communication.
- Hacking: Unauthorized modification of computer systems.
- Phishing: Fraudulently obtaining sensitive information.
- Illegal Activities: Downloading without permission, digital piracy, identity theft, cyber defamation, cybersex, and more.
- Copyright: Creators' legal right to control reproduction.
- Plagiarism: Copying another's work without attribution.
- Fair Use: Limited use of copyrighted material without permission.
- Virtual Self: Online persona.
- Netiquette: Guidelines for appropriate online communication.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.