Let us Pray
At the end of the session, you
are expected to:
1. identify what is ICT;
2. explain and give how ICT affects their
everyday lives and its current state; and
3. compare and contrast the nuances of varied
online platforms, sites, and content to achieve
specific class objectives or address situational
challenges.
Using the Venn
diagram, I want
you to list down
how each one is
similar to the other.
Write your answer
into a Jamboard.
INFORMATION AND COMMUNICATION
TECHNOLOGY
Hardware Software
Cellphone
Desktop Laptop
Network Devices
TRENDS IN ICT
Convergent
Technologies
multiple different
devices combine
into a single gadget
because of
technological
advancement
Social
Media
software,
applications or
platforms that allow
users to
communicate in an
online social
communities or
network. Social
media allows people
to communicate
faster
Mobile
Technologies
devices that are
easily carried and
allows fast means of
communication
World Wide WEb
Web Versions
Web Versions
Communication Service Provider
Payment System
Social Media Platform
Social Networking Platform
Web Versions
https://jamboard.google.com/d/1b835lZa_QfnAiefZhaTkHehVeYLtDshSfc3es4hw1oA/edit
?usp=sharing
Source: https://www.google.com.ph/images
Think Before You Click
1. Before you post something on the web, ask these
questions to yourself: Would you want your parents
or grandparents to see it? Would you want your
future boss to see it? Once you post something on
the web, you have no control of who sees your posts.
Source: https://www.google.com.ph/images
Think Before You Click
2. Your friends depend on you to protect their
reputation online. Talk to your friends about this
serious responsibility.
Source: https://www.google.com.ph/images
How Safe Are You?
The Internet is defined as the information
superhighway. This means that anyone has access
to this highway, can place information, and can
grab that information.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Be mindful of what your share online and what site
you share it to.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Do not just accept terms and conditions; read it.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Check out the privacy policy pages of a website to
learn how the website handles the information you
share.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Know the security features of the social networking
site you use. By keeping your profile private, search
engines will not be able to scan your profile.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Do not share your password with anyone.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Avoid logging in to public networks/Wi-Fi. Browsing
in “incognito (or private) mode.” A feature of the
browser, will not protect you from hackers.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Do not talk to strangers whether online or face-to-
face.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Never post anything about a future vacation. It is
similar to posting, “Rob my house at this date.”
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Add friends you know in real life.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Install and update an antivirus software on your
computer. Use only one anti-virus software to
avoid conflicts.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
If you have a Wi-Fi at home, make it a private
network by adding a password.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Avoid downloading anything from untrusted websites. You are
most vulnerable in peer-to-peer downloads (torrents) as the
download is most likely not monitored by the site owner.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Buy the software; do not use pirated ones.
Source: https://www.google.com.ph/images
Tips to Stay Safe Online
Do not reply or click links from suspicious emails.
Source: https://www.google.com.ph/images
Internet Threats
Source: https://www.google.com.ph/images
1. Malware
Stands for Malicious Software
Source: https://www.google.com.ph/images
Virus
A malicious program designed to replicate itself and transfer
from one computer to another either through the Internet and
local networks or data storage like flash drives and CDs.
Source: https://www.google.com.ph/images
Worm
A malicious program that transfers from one computer to
another by any type of means. Often, it uses a computer
network to spread itself. For example, the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.
Source: https://www.google.com.ph/images
Trojan
A malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
Source: https://www.google.com.ph/images
Rogue Security Software
Tricks the user into posing that it is a security software. It
asks the user to pay to improve his/her security but in
reality, they are not protected at all.
Source: https://www.google.com.ph/images
Spyware
A program that runs in the background without you knowing it
(thus called “spy”). It has the ability to monitor what you are
currently doing and typing through keylogging.
Source: https://www.google.com.ph/images
Keyloggers
Used to record the keystroke done by the users. This is done to
steal their password or any other sensitive information. It can
record email, messages, or any information you type using your
keyboard.
Source: https://www.google.com.ph/images
Adware
A program designed to send you advertisements,
mostly as pop-ups.
Source: https://www.google.com.ph/images
2. Spam
Unwanted email mostly from bots or advertisers. It
can be used to send malware.
Source: https://www.google.com.ph/images
3. Phishing
Its goal is to acquire sensitive personal information like passwords
and credit card details. This is done by sending you an email that will
direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information.