DIGITAL CITIZENSHIP.docx

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

DIGITAL CITIZENSHIP\ \ Responsible Use of Internet\ Using the internet makes you connected to a lot of things in different places, even outside the country. However, internet can also have a bad effect on our lives when use irresponsibly. That is why it is important that you know the responsible use...

DIGITAL CITIZENSHIP\ \ Responsible Use of Internet\ Using the internet makes you connected to a lot of things in different places, even outside the country. However, internet can also have a bad effect on our lives when use irresponsibly. That is why it is important that you know the responsible use of internet.\ \ Be careful about opening personal e-mails from unfamiliar senders. It is guaranteed that the email attachment comes with virus infection. Restrain your curiosity\ \ Don\'t view inappropriate websites. If you own a website, have your Domain Name Registration information and do not post your email address on it in text, have it in graphic image (.gif or.jpg) or encrypt it in some way.\ \ Don\'t give out your personal information via the internet. Your full name, home address, telephone numbers, and especially your parent\'s credit card information.\ \ Guard your e-mail address. Scammers might use it for illegal ways. You can prevent these by choosing email address and passwords that are hard to guess.\ \ If you find anything suspicious going on with your computer while you\'re online ask the guidance of an adult. Many spam emails contain viruses and other Malware in the actual email itself- not in attachments\ \ Use an anti-spam program. If spam has become a problem and you can\'t change your email address and start anew, use anti-spam software which filters junk email out of your inbox and puts it into a special spam folder.\ \ Do not reply to a spam email and never click on a link in a spam email. Do not click on pop-up, don\'t say yes when a website wants you to download some attractive things like wallpapers, screensavers and freebies. Remember the rule No. 1 of Internet browsing: the more questionable the website, the more likely you will get infected.\ \ Make sure that you have an anti-virus program that is capable to detect suspicious website with viruses. Run a thorough scan of your disk drives daily or weekly, with this you can avoid unwanted virus that may destroy your computer.\ \ Responsible Use of Computer\ With the fast growing technology, computers can already be found everywhere. It is used by different people in different fields of work to make daily activities easier, faster and more efficient. However, sometimes some users are abusing the use of computer. That is why we should know how to use a computer responsibly.\ 1. Remember the human ware. Never use other people\'s documents without their permission. And do not create or install a program that threatens the function of the computer of other users.\ 2. Respect privacy. As a good computer user, you must respect other person\'s privacy. You should not look at other people\'s documents or email messages without asking permission. Never share passwords.\ 3. Follow house rules. Parents and adults should set rules for their children in using the computer and internet and this policy should be respected and obeyed.\ \ \ Copyright and Licensing Issues\ Intellectual Property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in the society. Intellectual property, in the most general sense, encompasses creations of the human intellect. Its protection is covered under a law called Philippine Copyright Law.\ \ Copyright (©) gives the creator of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation; after which time the work is said to enter the public domain.\ \ Intellectual Property Rights Policy sets out policies on issues related to intellectual property rights, such as allegations of infringing material being posted or made available on our properties and actions against repeat infringers.\ \ Fair Use\ Fair Use is a legal concept that allows the reproduction of copyrighted material for purposes without permission from the copyright owner and without paying a fee. Purpose permitting the application of fair use include review, news reporting, parody, teaching or scholarly research.\ The factors to be considered in determining whether the use of a copyrighted material is a fare use are the following:\ \ 1. the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;\ 2. the nature of the copyrighted work;\ 3. the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and\ 4. the effect of the use upon the potential market for or value of the copyrighted work.\ \ \ \ \ \ LESSON 2\ CYBERBULLYING AND ONLINE RISKS\ \ Cyber Bullying is bullying that takes place using electronic technology.\ Electronic technology includes devices and equipment such as cellphones, computers and tablets as well as communication tools including social media sites, text messages, chat, and websites.\ \ Examples of cyber bullying include:\ 1. mean text messages or e-mails;\ 2. rumors sent by e-mail or posted on social networking sites;\ 3. embarrassing pictures, videos, websites, or;\ 4. fake profiles.\ \ \ How to Avoid Being Cyber Bullied\ The following are some of the ways on how to avoid being cyber bullied.\ 1. Use the internet and mobile phones carefully and responsibly.\ 2. Think before you click. Think carefully before posting anything on the internet.\ 3. Don\'t give out personal details, such as your phone number or address.\ 4. Only give your mobile number to close friends.\ 5. Never give your friends access to your accounts. Choose a strong password.\ 6. Be private. Keep your social media privacy settings high and do not connect with anybody who do you not know in person.\ 7. Learn how to block instant messages or use mail filters to block emails.\ 8. Know how to report bullying to social media sites, internet service providers or website administrators. Ask a parent or teacher for help.\ \ \ Strategies on How to Deal with Cyber Bullying\ The following are some of the strategies on how to deal with cyber bullying.\ 1. Talk to someone you trust. Talk to a parent, teacher, counselor or other trusted adult so they could give you advice, help and support.\ 2. Never respond to anything the cyber bully has been said or retaliate by doing the same thing back. This can make things worse or get you in to trouble.\ 3. Screenshot and save anything that you think could be an evidence of cyber bullying.\ 4. Block and report the cyber bully to the appropriate social media platform.
If you are being cyber bullied in school, report it to the teacher or report them to a trusted adult. If the cyber bully makes you fear for your safety, report it to the Police.\ 5. Don\'t blame yourself. You should not be ashamed of who you are or what you feel. Instead, spend time doing things you enjoy.\ \ Potential Risks and Dangers Associated with Online Communications\ \ The internet has made it possible for people all over the world to communicate with one another easily, effectively and inexpensively. However, there are some potential risks and dangers that we may encounter with online communications:\ \ 1. Online Anonymity\ Anybody can create a presence online while hiding their real identity. This ability gives the scammers and thieves the ability to masquerade as almost anyone in order to trick their victims. Be mindful and careful with the personal information you share online and with the links you click in the internet that may redirect you into a malicious website.\ \ 2. Privacy Concerns\ Internet is a public network, meaning, it can collect data on your online activities and can send that information out over the internet where marketers or anonymous persons can use it for their own purposes.\ 3. Malware threats\ Malware is intended to steal information or spy on computer users without their knowledge. It can be acquired through downloading from websites or through e-mail. Be careful with the software you download and with the sites you go through as they may contain malware threats without your knowledge.\ \ 4. Online Harassment\ Online harassment can be observed in the form of stalking, cyber bullying, and etc. Block or report unwanted and malicious users.\ \ 5.Social Networking Sites\ Be mindful of the things you post and share on social media sites as these things can become a way for you to get into danger such as cyber bullying and cyber predators. Social Networking sites can also interrupt a child from studying if they get addicted to it.\ \ 6. Exposure to Inappropriate Materials\ Inappropriate content includes information, images, or videos that is disturbing, explicit or inappropriate for your child. It can also a material that is directed at adults, or misleading information that may tempt your child into unlawful or dangerous behavior. This could be pornographic material, content containing swearing, pictures, images, and games that show violence or cruelty and more.\ \ 7.Data Theft\ Data theft is one of the potential risks with online communications. There are phishing scams that use bogus e-mails and websites which are designed to trick users into revealing their personal and financial information.\ \ LESSON 3\ PARTS OF THE SYSTEM UNIT\ \ System Unit, also known as a base unit, is the main body of a computer. It is typically made of a metal and plastic enclosure. It contains the motherboard, power supply, cooling fans, internal disk drives, memory modules and expansion cards that are plugged into the motherboard.\ \ Motherboard is the central Printed Circuit\ Board (PCB) in some complex electronic systems such as modern personal computers.\ \ Power Supply supplies power to the other components of the computer. It is typically designed to convert general-purpose alternating current (AC) electric power to usable low-voltage direct current (DC) power for the internal components of the computer.\ \ Microprocessor is the center of your computer which processes instructions and communicates with outside devices, controlling most of the operation of the computer. The microprocessor usually has a large heat sink attached to it.\ \ Hard Disk Drive (HDD) is commonly referred to as a hard drive, hard disk or fixed disk drive. It is a non-volatile storage device which stores digitally encoded data on a rapid cylinder rotating platters with magnetic surfaces.\ \ Video Card is also known as a graphics accelerator card, display adapter or graphics card.\ This is an expansion card that improves images shown on your display screen.\ \ Sound Card is also known as an audio card. It is a computer expansion card that facilitates the input and output of audio signals to and from a computer under the control of computer programs.\ Typical use of sound cards includes providing the audio component for multimedia applications such as music composition, editing video or audio, presentation, education, and entertainment (games).\ \ Memory is a temporary storage area which holds the data and instructions that the system unit or CPU needs. Before a program can be run, the program is loaded from a storage medium into the memory. This allows the system unit to direct access to the program. Each type of computer memory serves a specific function and purpose. There are two types of computer memory:\ \ Random-Access Memory (RAM) is the main memory of the computer. It can be accessed randomly, where any byte can be accessed without touching the preceding bytes.\ Everything that you run on your computer resides in the RAM. There is a Virtual Memory Paging System that takes data out of your secondary memory. Your hard drive loads it into RAM when it is needed. RAM is very important.\ \ Read-Only-Memory (ROM) refers to special memory used to store programs that boot the computer and perform diagnostics. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty, so it is mainly used to distribute firmware. A firmware is software that is very closely tied to specific hardware, and unlikely to need frequent updates.\ \ Ports are the openings at the back portion of the system unit where you can connect all the other external devices. Personal computers have various types of ports.\ \ \ LESSON 4\ USING VIRTUAL DESKTOP\ \ \ IT Essentials Virtual Desktop\ Virtual Desktop enables you to learn the steps required in assembling a desktop computer virtually. By using this application, you will be able to build a desktop in a virtual manner. You will see a visual representation of an actual desktop and its components. Virtual Desktop lets you assemble a desktop computer in a proper and safer way by giving you proper instructions. This is to avoid any unwanted cuts, electric shock or worse electrocution.\ \ IT Essentials Virtual Desktop has three modes:\ 1. Learn Mode walks you through the assembly of desktop computer.\ 2. Test Mode allows you to virtually build a desktop without any assistance,\ 3. Explore Mode gives you information about many features and components of the desktop.\ \ In this lesson, we will focus on the learn mode of the Virtual Desktop.\ The Learn Mode is made up of 7 layers:\ 1. Power Supply\ 2. Motherboard\ 3. Adapter Cards\ 4. Internal Drives\ 5. External Bays\ 6. Internal Cables\ 7. External Cables\ \ In Learn Mode, it shows you information about what components make up each layer. By clicking on the \"Show instructions\" button, you will see a step by step list of instructions that will help you installed each component within a layer. You will also be notified when the installation of that layer is complete so you may now proceed to the next layer.\ \ Installing Components\ When you look at your screen, you will see the Anti-static mat located at the bottom of the main window. It contains all the parts you will need to assemble your virtual desktop. An Anti-static mat is an anti-static device that safeguards an individual or piece of equipment from an electrostatic discharge (ESD). It reduces the risk of electrostatic discharge while working with electrostatic sensitive equipment.\ \ Explore mode lets you explore the computer components in its installed state. Just click the plus (+) sign to view the name of component and its function. The object that the label is referring to will be highlighted in yellow.

Use Quizgecko on...
Browser
Browser