KEMBAR78
Cat Notes 3 | PDF | Computer Network | World Wide Web
0% found this document useful (0 votes)
49 views20 pages

Cat Notes 3

The document provides comprehensive study notes for Grade 10 students covering topics such as Personal Area Networks (PAN) and Home Area Networks (HAN), internet and World Wide Web concepts, web browsers, search engines, and e-communication tools. It details the functions of various network devices, communication media, and the basics of email and social media etiquette. Additionally, it includes practical advice on using the internet effectively, including searching techniques and netiquette rules.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views20 pages

Cat Notes 3

The document provides comprehensive study notes for Grade 10 students covering topics such as Personal Area Networks (PAN) and Home Area Networks (HAN), internet and World Wide Web concepts, web browsers, search engines, and e-communication tools. It details the functions of various network devices, communication media, and the basics of email and social media etiquette. Additionally, it includes practical advice on using the internet effectively, including searching techniques and netiquette rules.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Grade 10 Study Notes – Term 3

1 Personal Area Network

Comparison of Personal Area Network (PAN) and Home Area Network (HAN)

Feature Personal Area Network (PAN) Home Area Network (HAN)

A small network connecting personal A private network connecting multiple home


Definition
devices within a short range. devices for communication and internet sharing.

Covers an entire home (can be extended with


Range Typically, up to 10 meters (33 feet).
routers, extenders).

Connection Wireless (Bluetooth, NFC, Infrared) or


Wired (Ethernet) or Wireless (Wi-Fi).
Type Wired (USB).

Personal device communication Home networking (smart TVs, computers,


Purpose
(smartphone, laptop, smartwatch, etc.). security systems, smart home devices).

Easy setup Centralized control of devices


Advantages Low power consumption Internet sharing
No need for an internet connection Smart home automation & security

1 Created by Marissa Pretorius


Short range Setup cost (router, modem, cables)
Disadvantages Limited data transfer speed Can suffer from network congestion
Security risks from weak encryption Security risks if not protected

Bluetooth headset, smartwatch, wireless Streaming media on a smart TV, Wi-Fi for
Examples keyboard, file transfer between phone and multiple devices, home automation, security
laptop. cameras.

What is Bluetooth/Wi-Fi/NFC-enabled devices, Router, modem, Ethernet cables (for wired


Needed? USB cables (for wired connections). connections), Wi-Fi-enabled devices.

2 Home Area Network

2 Created by Marissa Pretorius


Network Devices and Communication Channels/Media
1. Network Devices and Their Functions

Device Function

Modem Converts digital signals from a computer/network into analog signals for
(Modulator- transmission over telephone lines or other long-distance networks, and vice versa.
Demodulator) It enables internet access.

Directs network traffic between different networks (e.g., home network and the
Router internet). It assigns IP addresses and provides security features like firewalls. It
enables multiple devices to connect to the internet.

Connects multiple devices within a local network (LAN) and efficiently manages
Switch data transmission by forwarding data only to the intended recipient device. Unlike a
hub, a switch reduces network congestion.

2. Communication Channels/Media
Communication media can be classified into wired and wireless types:

Type Examples Characteristics

Wired Ethernet (Twisted Pair), Coaxial ✔️ Faster and more reliable connection✔️ Less
Media Cable, Fiber Optic Cable interference❌ Limited mobility

Wireless Wi-Fi, Bluetooth, Infrared, ✔️ Convenient and mobile✔️ No physical cables needed❌
Media Radio Waves, Satellite Can be affected by interference and distance

Understanding the Internet and the World Wide Web (WWW)

1. What is the Internet?

3 Created by Marissa Pretorius


The Internet is a global network that connects millions of private, public, academic, business, and
government networks. It allows computers and other devices to communicate with each other worldwide
using standardized communication protocols (such as TCP/IP).
Key Features of the Internet:
Enables communication (email, video calls, messaging).
Provides access to vast amounts of information.
Facilitates online transactions (banking, shopping).
Supports cloud computing and web applications.

2. Internet Addresses
Internet addresses uniquely identify devices and websites on the internet.

Type of Address Description Example

IP Address A unique numerical label assigned to each device on a network.


(Internet Protocol IPv4 (e.g., 192.168.1.1) and IPv6 (e.g., 192.168.1.1
Address) 2001:db8::ff00:42:8329) are common formats.

A user-friendly address that maps to an IP address using the


Domain Name www.google.com
Domain Name System (DNS).

MAC Address
A unique hardware identifier for network devices, assigned by
(Media Access 00:1A:2B:3C:4D:5E
the manufacturer.
Control Address)

3. Overview of the World Wide Web (WWW)


What is the WWW?
The World Wide Web (WWW) is a system of interlinked documents and multimedia resources
accessed via the internet using a web browser. It operates using Hypertext Transfer Protocol
(HTTP/HTTPS).

Term Description

Web Address (Uniform Resource A URL is the full address of a web page (e.g.,
Locator - URL) https://www.example.com/about).

A tool that converts long URLs into shorter ones for easy sharing
URL Shortener
(e.g., bit.ly, tinyurl.com).

Web Page A single document on the internet (e.g., a blog post, a product page).

A collection of web pages under a common domain (e.g.,


Website
www.wikipedia.org).

Hyperlink A clickable link that directs users to another web page or document.

4 Created by Marissa Pretorius


4. Types of Websites, Their Purpose, and Examples

Type of
Purpose / What It Offers Examples
Website

Online journals or personal diaries where individuals or


Weblog/Vlog WordPress, Medium,
organizations share updates, opinions, or multimedia
(Blog) YouTube (for vlogs)
content.

A collaborative website where users can create and edit


Wiki Wikipedia, Fandom
content.

Platforms for connecting with friends, sharing updates, Facebook, Instagram,


Social Network
and networking. Twitter, LinkedIn

Web Cloud-based software accessed via a browser, allowing Google Docs, OneDrive,
Applications users to create, edit, and store files online. Google Drive, Office 365

Web Browsers: Overview and Functionality

1. What is a Web Browser?


A web browser is a software application that allows users to access and interact with the World Wide
Web (WWW) by retrieving, displaying, and navigating web pages.
Purpose of a Web Browser:
Access websites and online resources.
Display web content, including text, images, videos, and interactive elements.
Allow navigation between web pages via hyperlinks.

5 Created by Marissa Pretorius


Support web applications (e.g., Google Docs, online banking).
Provide security features like incognito mode, pop-up blockers, and HTTPS encryption.
Examples of Popular Web Browsers:
• Google Chrome
• Mozilla Firefox
• Microsoft Edge
• Safari (Apple devices)
• Opera

2. Basic Web Browsing Functions


Entering a URL – Type a web address in the address bar (e.g., www.google.com).
Using a Search Engine – Enter keywords in the search bar to find relevant results (e.g., Google, Bing).
Navigating Between Pages – Use the back, forward, and refresh buttons.
Managing Bookmarks – Save frequently visited sites for quick access.
Downloading Files – Save documents, images, or software from websites.
Filling Out Online Forms – Enter details for registrations, surveys, or purchases.

3. Advantages of Tabbed Browsing


Tabbed browsing allows users to open multiple web pages within a single browser window, each in its own
tab.

Advantage Description

Users can switch between multiple websites without opening separate browser
Better Multitasking
windows.

Saves Screen Space Keeps the desktop organized by reducing clutter.

Faster Navigation Allows easy comparison of information across different web pages.

Reduced System Load Uses fewer system resources than opening multiple browser windows.

Drag and Drop


Users can reorder or move tabs to different windows.
Support

Session Recovery If the browser crashes, most modern browsers restore previously opened tabs.

6 Created by Marissa Pretorius


Search Engines, Downloading & Uploading, and ISPs

1. Search Engines
What is a Search Engine?
A search engine is an online tool that helps users find information on the internet by searching a vast
database of indexed web pages. It works by using algorithms to deliver the most relevant results based
on a user's query.
Purpose of a Search Engine:
Helps users find websites, images, videos, news, and other content.
Organizes and ranks web pages based on relevance and popularity.
Uses keywords and algorithms to deliver accurate search results.
Common Examples of Search Engines:
• Google (most popular, widely used worldwide)
• Bing (Microsoft’s search engine)
• Yahoo! (formerly a leading search engine)
• DuckDuckGo (focuses on privacy, does not track users)
• Baidu (China’s leading search engine)
• Yandex (popular in Russia)

2. Searching Techniques
Keywords & Key Phrases:
• Keywords – Individual words used in a search query (e.g., "best smartphones").
• Key Phrases – A combination of words that refine search accuracy (e.g., "best budget smartphones
2024").
Search Engine Operators (Advanced Search Techniques):
Operators help refine search results by modifying how a search engine interprets a query.

7 Created by Marissa Pretorius


Operator Function Example

"" (Quotation Searches for the exact phrase inside the


"climate change effects"
Marks) quotes.

apple -fruit (searches for Apple Inc., not


- (Minus Sign) Excludes a specific word from results.
the fruit)

site: Searches within a specific website. site:wikipedia.org artificial intelligence

Finds specific file types (PDF, DOC, PPT,


filetype: filetype:pdf machine learning
etc.).

Finds pages that contain either one of the


OR buy laptop OR desktop
specified terms.

intitle: Searches for a keyword in the page title. intitle:best laptops

inurl: Searches for a keyword in a webpage URL. inurl:cybersecurity

3. Concept of Downloading & Uploading

Process Definition Example

Receiving data from the internet and storing Saving a file from Google Drive to your
Downloading
it on a local device. computer.

Sending data from a local device to the Posting a photo on Instagram or uploading a
Uploading
internet or a remote server. document to OneDrive.

Key Differences:
• Downloading → Data moves from the internet to your device.
• Uploading → Data moves from your device to the internet.
4. Internet Service Provider (ISP)
What is an ISP?
An Internet Service Provider (ISP) is a company that provides internet access to individuals and
businesses. ISPs connect users to the internet using various technologies like fiber optics, DSL, cable,
and satellite.
Purpose of an ISP:
Provides internet access via broadband, fiber, mobile data, or satellite.
Assigns IP addresses to users.
Offers services such as web hosting, email, and cloud storage.
Ensures network security and data management.

8 Created by Marissa Pretorius


Examples of ISPs in South Africa:

E-Communication Using Computing Devices


1. What is E-Communication?
E-communication (Electronic Communication) refers to the exchange of messages, information, and data
using digital devices and the internet. It enables real-time or asynchronous interaction between
individuals, businesses, and organizations.
Examples of E-Communication:
• Emails (e.g., Gmail, Outlook)
• Instant Messaging (e.g., WhatsApp, Telegram, Messenger)
• Online Meetings (e.g., Zoom, Microsoft Teams)
• Social Media Messaging (e.g., Facebook, Instagram DMs)
• Video Calls (e.g., FaceTime, Google Meet)

2. What is a Communication Device?


A communication device is any electronic hardware that allows users to send, receive, and process data
over a network.
Common Communication Devices:
• Computers & Laptops – Used for emails, messaging, and video calls.
• Smartphones & Tablets – Mobile devices for instant messaging and calls.

9 Created by Marissa Pretorius


• Routers & Modems – Provide internet access for communication.
• Webcams & Microphones – Enable video and voice communication.
• Smartwatches – Support voice calls, messaging, and notifications.

3. E-Communication Using a PC
A PC (Personal Computer) can be used for various e-communication purposes, including:
✔ Sending emails (e.g., Gmail, Outlook).
✔ Browsing the internet (e.g., Google Chrome, Firefox).
✔ Participating in video calls (e.g., Zoom, Skype).
✔ Instant messaging (e.g., WhatsApp Web, Slack).
✔ Sharing files and documents (e.g., Google Drive, Dropbox).

4. Overview of Applications to Facilitate E-Communication


A. Email
What is it? – A digital messaging system that allows users to send text, images, and attachments.
Purpose:
✔ Used for professional and personal communication.
✔ Allows sending large amounts of text and files.
✔ Enables record-keeping and organization of messages.
B. Web Browsers
What is it? – A software application for accessing the internet.
Purpose:
✔ Used for searching information, social media, and email.
✔ Supports real-time communication via web-based platforms.
✔ Enables cloud-based messaging and collaboration.
C. Instant Messaging (IM)
What is it? – A service for sending real-time text messages via the internet.
Examples: WhatsApp, Telegram, Facebook Messenger.
Purpose:
✔ Allows quick and direct conversations.
✔ Supports group chats and media sharing.
✔ Works on both mobile and desktop platforms.
D. Text, Picture, and Video Messaging
What is it? – Sending short messages, images, and videos via mobile networks or the internet.
Examples: SMS, MMS, iMessage, Snapchat.
Purpose:
✔ Quick communication via multimedia.
✔ Supports social interaction and business marketing.
E. Online Meeting Platforms
What is it? – Digital tools that allow remote meetings, video conferencing, and collaboration.
Examples: Microsoft Teams, Zoom, Google Meet, Skype.

10 Created by Marissa Pretorius


Purpose:
✔ Facilitates virtual meetings and discussions.
✔ Supports screen sharing and file collaboration.
✔ Used for remote work, online learning, and webinars.

Basic Use of the Internet, E-Mail, and Social Media Platforms


1. Hyperlinks
What is a Hyperlink?
A hyperlink (or link) is a clickable element (text, image, or button) that directs users to another webpage,
document, or section within a page.
Types of Hyperlinks:
• Text Link – Clickable text (e.g., Visit Google).
• Image Link – Clickable images that redirect users.
• Anchor Link – Jumps to a specific section within a webpage.
• Email Link – Opens an email client when clicked (e.g., mailto:example@email.com).
How to Identify a Hyperlink?
✔ Usually underlined or in blue text.
✔ Cursor changes to a hand icon when hovered over.
✔ Clicking it redirects to another location.

2. Applying Netiquette Rules


Netiquette (Internet Etiquette) refers to the proper and respectful way of communicating online.
Key Netiquette Rules:
✔ Use Proper Spelling & Grammar:
• Check spelling before sending messages.
• Use professional language in emails and formal communication.
✔ Be Courteous & Concise:
• Keep messages short and clear.
• Use polite greetings and closings (e.g., “Hello,” “Best regards”).
✔ Avoid Gossiping & Negative Comments:
• Do not spread rumors or engage in cyberbullying.

11 Created by Marissa Pretorius


• Be respectful in online discussions.
✔ Avoid Typing in ALL CAPS:
• ALL CAPS = SHOUTING (can be rude or aggressive).
• Use bold or italics for emphasis instead.
✔ Reduce Attachment Size:
• Compress large files before sending (e.g., use ZIP files or Google Drive links).
• Avoid sending large attachments via email unless necessary.
✔ Use Proper Subject Lines in Emails:
• The subject should summarize the content (e.g., "Meeting Agenda for March 5").
✔ Do Not Spam:
• Avoid sending unnecessary or multiple messages.
• Do not forward chain emails or irrelevant advertisements.
✔ Think Before You Post on social media:
• Remember that posts are public and can be permanent.
• Do not share personal or sensitive information.

12 Created by Marissa Pretorius


Basic E-mailing Functions
1. Composing Messages
How to Compose an Email:
• Open your email client (e.g., Gmail, Outlook).
• Click on the "Compose" or "New Email" button.
• Enter the recipient’s email address in the "To" field.
• Add a subject in the "Subject" field, summarizing the email's content (e.g., "Meeting Reminder").
• In the body of the email, type your message.

• Click "Send" when you're ready to send the email.


2. Sending and Receiving Emails
Sending an Email:
• After composing your email, click "Send" to send it to the recipient(s).
• Ensure the recipient's email address is correct to avoid delivery issues.
Receiving an Email:
• When someone sends you an email, it will appear in your Inbox.
• You will typically receive a notification (depending on your settings).
• To open a received email, click on the subject line to view the content.
3. Forwarding Emails
How to Forward an Email:
• Open the email you want to forward.
• Click on the "Forward" button (usually represented by an arrow pointing right).
• Enter the recipient’s email address in the "To" field.
• You can also add a message at the top if you'd like to explain why you're forwarding the email.
• Click "Send" to forward the email.

13 Created by Marissa Pretorius


4. Replying to Emails
Replying to an Email:
• To reply to an email, open the email and click on the "Reply" button (often an arrow pointing left).
• This will open the email in a reply form with the original message included.
• Type your reply in the message body and click "Send".
Reply to All:
• If the email was sent to multiple recipients and you want to reply to everyone, click "Reply All".
• This ensures that your reply is sent to all recipients of the original email.

Attachments in E-mail
What are Email Attachments?
Attachments are files or documents that you send along with your email. They can include:
• Documents (e.g., Word, PDF, Excel files)
• Images (e.g., JPEG, PNG)
• Videos (e.g., MP4, AVI)
• Audio Files (e.g., MP3)
How to Add an Attachment:
1. When composing or replying to an email, look for the paperclip icon (usually labeled "Attach" or
"Attachment").
2. Click on the icon to open your file explorer.
3. Select the file you want to attach.
4. Once the file is attached, it will appear as an icon in the email body (e.g., a PDF or image
thumbnail).
5. You can add additional files by clicking "Attach" again.
Important Notes:
• File Size Limits: Most email services have file size limits (e.g., Gmail allows up to 25MB per
attachment).
• If your attachment is larger than the limit, you can upload it to cloud storage (e.g., Google Drive,
OneDrive) and share the link.
• Be mindful of security when opening attachments from unknown sources to avoid viruses and
malware.

14 Created by Marissa Pretorius


1. Digital Citizenship
What is Digital Citizenship?
Digital citizenship refers to the responsible, ethical, and safe use of technology and the internet. It
involves understanding the rights and responsibilities that come with being an active participant in the
digital world, both for individuals and communities.
Key Aspects of Digital Citizenship:
• Online Etiquette (Netiquette): Engaging with others online in a respectful and polite manner.
• Cybersecurity: Protecting personal information and understanding how to keep data safe online.
• Digital Literacy: Being able to use digital tools and platforms effectively and safely.
• Responsibility: Understanding the impact of your actions online and being accountable for your
behavior.
• Privacy Awareness: Respecting others’ privacy and understanding how your own personal data is
used and shared.

2. Social Issues Linked to Digital Content


In today’s digital world, various social issues arise due to the widespread use of technology and the
internet. These issues include:
A. Cyberbullying
• Definition: Using the internet, social media, or other digital platforms to harass or intimidate
others.
• Impact: Can cause emotional distress, harm relationships, and, in extreme cases, lead to mental
health issues or suicide.
B. Online Predators & Safety
• Definition: People who use the internet to exploit others, especially children and teenagers, for
illegal or harmful purposes.
• Impact: It highlights the importance of educating users about how to protect their personal
information and interact safely online.
C. Privacy Concerns
• Definition: The issue of how personal information is collected, used, and shared by websites,
companies, and other entities.
• Impact: Data breaches and misuse of personal data can lead to identity theft, financial loss, and
loss of privacy.
D. Digital Divide
• Definition: The gap between individuals who have access to modern technology and the internet
and those who do not.
• Impact: This creates inequality in terms of access to information, education, and opportunities.

15 Created by Marissa Pretorius


3. Digital Footprint
What is a Digital Footprint?
A digital footprint is the trail of data you leave behind when you use the internet. This can include the
websites you visit, the things you post on social media, the emails you send, and even your browsing
history.
Types of Digital Footprints:
• Active Footprint: Information you intentionally share online (e.g., social media posts, blog
comments, photos).
• Passive Footprint: Data collected about you without your direct input (e.g., your IP address,
location, browsing history).
What Does It Mean?
Your digital footprint is a reflection of your online presence and can have long-term consequences. It can
influence how others perceive you, impact job opportunities, and affect your online privacy. For example,
inappropriate or negative posts can harm your reputation, while positive content can enhance it.

4. POPI Act (Protection of Personal Information Act)


What is the POPI Act?
The POPI Act (Protection of Personal Information Act) is a South African law designed to protect
personal data and safeguard privacy. It regulates how businesses, organizations, and other entities
collect, process, and store personal information.
Key Aspects of the POPI Act:
• Data Protection: Ensures that organizations must take care when handling personal information,
and they must ask for consent before collecting data.
• Access to Information: Individuals have the right to access their personal data and request
corrections.
• Consent: Organizations must get explicit consent from individuals before collecting or using their
personal data.
• Security Safeguards: Organizations must put measures in place to protect personal information
from breaches and unauthorized access.
• Accountability: Businesses can be held accountable for any misuse or negligence in handling
personal data.

16 Created by Marissa Pretorius


Why is the POPI Act Important?


• It ensures privacy protection and reduces the risk of data misuse.
• It promotes trust between individuals and organizations, especially with the growing use of digital
platforms.
• Violating the POPI Act can result in fines or penalties for organizations, encouraging better data
management practices.

Summary
• Digital Citizenship teaches us how to be responsible and respectful online.
• Social Issues like cyberbullying, privacy concerns, and digital inequality arise in the digital world.
• A Digital Footprint refers to the data trail left behind online, and it’s important to be mindful of
what you post.
• The POPI Act ensures that personal information is protected, and it sets clear guidelines for
organizations on how to handle personal data.

Recognizing and Acknowledging the Ownership of Electronic Material


What does it mean?
When using or sharing electronic material (e.g., text, images, videos, software), it's essential to
recognize the intellectual property rights of the creators or owners. This means respecting copyright
laws and giving credit where it's due.
Examples of Ownership of Electronic Material:
• Copyrighted Text and Images: When using articles, books, or images from the internet, you
should ensure you have permission to use them or cite the original source.
• Software: Using software or apps without purchasing or obtaining permission from the creator or
distributor is illegal.
• Creative Commons Licenses: Some creators allow others to use their work under specific
conditions. Always check for licensing terms (e.g., “Attribution-NonCommercial”).

17 Created by Marissa Pretorius


Best Practices for Acknowledging Ownership:
• Cite sources when using or referencing someone else’s work, especially in research papers, blogs,
and presentations.
• Ask for permission when using someone else's content for commercial purposes.
• Give proper credit to authors, artists, and creators by using proper citation formats (e.g., MLA,
APA).

2. Appropriate Communication Etiquette


What is Communication Etiquette?
Communication etiquette is the practice of interacting with others in a polite, respectful, and
appropriate manner, both in-person and online.
Key Points of Digital Communication Etiquette:
• Be clear and concise: Avoid overly long messages. Stick to the point.
• Be polite and professional: Especially in emails and work-related communication. Always use
appropriate greetings (e.g., "Hello," "Dear [Name]").
• Respect tone: Be careful of how your words can be perceived. Avoid sounding too harsh, sarcastic,
or rude.
• Mind your timing: Respond promptly but respect people’s time (don’t expect instant replies).
• Use proper grammar and spelling: In professional communication, spelling mistakes and poor
grammar can appear unprofessional.
• Don't spam: Avoid sending irrelevant or excessive emails/messages.
Examples:
• Email Etiquette:
o Greeting: “Hello [Name],” or “Dear [Name],”
o Body: Briefly introduce the purpose of the email and be clear about your request or
message.
o Closing: "Best regards," "Sincerely," followed by your name.
• Social Media Etiquette:
o Be respectful of others’ opinions, even if they differ from your own.
o Avoid posting inappropriate content or personal information without consent.

3. Safe Email and Internet Use – Dangers and Tips for Safe Use
A. Dangers of Email and Internet Use
The internet and email are wonderful tools, but they also come with some risks. Being aware of these
dangers can help protect you from harm.
Common Dangers:

18 Created by Marissa Pretorius


• Viruses and Malware: Malicious software that can infect your computer or device, potentially
damaging files or stealing personal information.
• Phishing Scams: Fraudulent attempts to trick you into giving away sensitive information (e.g.,
passwords, bank details) via fake emails, websites, or pop-ups.
• Spam: Unwanted, often unsolicited emails that may contain harmful content or advertisements.
• Cyberbullying: Harmful behavior in online environments, including harassment or intimidation
through emails or social media.
• Identity Theft: The act of stealing personal information (e.g., Social Security number, bank
details) to commit fraud or steal money.

B. Tips for Safe Email and Internet Use:


1. Use Strong Passwords:
• Always create strong and unique passwords for your email accounts and other online accounts (e.g.,
a combination of letters, numbers, and symbols).
• Avoid using the same password for multiple accounts.
• Enable two-factor authentication (2FA) where possible for an added layer of security.
2. Be Wary of Suspicious Emails and Links:
• Avoid opening emails from unknown senders or suspicious addresses.
• Do not click on links or download attachments in emails unless you're certain they're from a
trusted source.
• Look for signs of phishing: Suspicious-looking URLs, urgent language, or requests for personal
information.
3. Install Antivirus Software:
• Use up-to-date antivirus software to help protect against malware and viruses.
• Keep your software, operating system, and web browsers up-to-date with the latest security
patches.
4. Avoid Public Wi-Fi for Sensitive Activities:
• Public Wi-Fi networks (e.g., in cafes or airports) may not be secure.
• Avoid accessing sensitive data or logging into accounts on these networks. Use a VPN (Virtual
Private Network) if you must access private information on public Wi-Fi.
5. Secure Your Personal Information:
• Be cautious about the personal information you share online. This includes on social media, forums,
or public websites.
• Review privacy settings on social media platforms and adjust them to restrict who can see your
posts and information.
6. Use a Secure Email Provider:
• Consider using secure email services that offer end-to-end encryption, ensuring that your
messages are not accessible by unauthorized parties.

19 Created by Marissa Pretorius


7. Regular Backups:
• Backup your data regularly to an external hard drive or cloud storage. This will protect your data
if your device gets infected or lost.

Summary:
• Digital ownership requires respecting creators' rights and providing proper credit when using
their content.
• Communication etiquette is essential for maintaining respectful, clear, and effective interactions
online.
• Safe email and internet use involves understanding risks like viruses, phishing, and identity theft,
and following steps like using strong passwords, avoiding suspicious emails, and keeping devices
protected with antivirus software.

20 Created by Marissa Pretorius

You might also like