Capture231.JPG
Document Details
Tags
Related
- ETECH LESSON 2 - ONLINE SAFETY- SECURITY- ETHICS AND ETIQUETTE.pdf
- Lesson-2_Online-Safety-Security-Ethics-and-Netiquette.pdf
- Online Safety and Security PDF
- Lesson 2 - Online Safety, Security, Ethics and Etiquette.pdf
- Information and Communication Technology in the 21st Century PDF
- Common Scams on Mobile Devices PDF
Full Transcript
## Mobile Technologies - Tasks originally found on a personal computer and now can be accessed on mobile devices. ## Operating System for Mobile Devices - Android (Developed by Google) - iOS (Apple Device) Apple Corp - Blackberry (Blackberry Device) - Symbian (First Android OS) - Nokia - Windows...
## Mobile Technologies - Tasks originally found on a personal computer and now can be accessed on mobile devices. ## Operating System for Mobile Devices - Android (Developed by Google) - iOS (Apple Device) Apple Corp - Blackberry (Blackberry Device) - Symbian (First Android OS) - Nokia - Windows Phone OS (Developed by Microsoft) - WebOS (for Smart TV) ## Social Media - An online channel or application that allows users to create, co-create, modify, and generate user contents - **Social Networks:** Same interest and background (Facebook) - **Social News:** Allows users to create their own news items (Reddit or Digg) - **Media Sharing:** Allows users to share their own media like images, video, music (IG, YouTube, Flicker) - **Bookmarking Sites:** Allows users to save or store their own references (Pinterest) - **Microblogging:** Short updates from the users (x or Plurk) - **Blogs and Forums:** Allows users to put their own personal contents (Blogger, Tumblr) ## Assistive Media - Technology that is very useful for people with disabilities (text to speech, ebook, audio book, etc) ## Online Safety and Security - **Netiquette:** Network etiquette (set of ideals, rules, and good conduct that a Netizen should observe in using the online community) ## Information That Should Not Be Shared Online - Complete name - Birthday - Family information - Credit card/debit card number - Contact number - Address - Etc ## Internet Threats - **Malware:** Malicious software - **Virus:** Malware that replicates itself and transfers from one computer to another - **Worms:** Stronger malware that transfers from one computer to another and corrupts files automatically. - **Trojan:** Malware that disguises itself to be a useful program but keeps your device unprotected - **Spyware:** Malware that runs in the background without you knowing it and has the ability to monitor your keystroke using the keyboard (keyloggers) - **Adware:** Malware that sends advertisements, normally in the form of pop-ups - **Spam:** Unwanted emails from bots and advertisers - **Phishing:** Its goal is to acquire personal sensitive information like your passwords and other personal sensitive information. The main goal is to hack your information.