0% found this document useful (0 votes)
9 views4 pages

Internet As Superhighway Notes

Uploaded by

chtdaes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views4 pages

Internet As Superhighway Notes

Uploaded by

chtdaes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

?

A made-up word from the words and Netiquette thus describes the rules
of conduct for respectful and appropriate communication on the internet.
Often referred to as “ ”.
 Once information is posted online, there is always a risk that it can be accessed, shared,
or archived by others before you take action to restrict it. It's essential to be mindful of
what you post and consider the potential long-term consequences of sharing information
on the internet.
 Teenagers like you are exposed to many things powered by the internet because they are
mostly into socializing, playing games, reading sports news, shopping, etc. The internet has
given you the most powerful tools that your parents did not enjoy during their early days.
For this reason, you must observe proper internet usage.

is defined as the “ It is a powerful tool but is also


the most dangerous places especially if you are unaware of what you are doing with it.

It means anyone has access to this highway, can place information, and can grab that
information. Therefore, everyone is a prospect to cybercrime threats. We may not experience it
now but whatever information we share today could affect our future. With this reason, social
networking sites like Facebook continue to improve their security features.

1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out privacy policy page of website, learn how the website handles information u share.
4. Know the security features of the social networking site you use.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
a) – a malicious program designed to replicate itself and transfer from one
computer to another either through the internet and local networks or data storage
like flash drives and CDs.
b) – a malicious program that transfers from one computer to another by any
type of means. Often, it uses a computer network to spread itself.
c) – a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get your
information.
 – tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but, they are not
protected at all.
d) – a program that runs in the background without you knowing it (thus
called “spy”). It can monitor what you are currently doing and typing through
keylogging.
 - used to record the keystroke done by the users. This is done to
steal their password or any other sensitive information. It can record email,
messages, or any information you type using your keyboard.
e) – a program designed to send you advertisements, mostly as pop-ups.
2. – unwanted email mostly from bots or advertisers. It can be used to send malware.
3. – its goal is to acquire sensitive personal information like passwords and credit
card details.
 – a more complicated way of phishing where it exploits the DNS
(Domain Name Service) system.

a) Limit the personal information that you make available to others.


b) Don’t say anything online that you wouldn’t say in real life.
c) Don’t post anything that would be hurtful to someone.
d) Remember to treat others the way you would want to be treated.
e) Don’t post pictures or videos that may be embarrassing for yourself or others.
f) Don’t post your vacation plans or upload photos while you’re on vacation. You’re
practically telling people that they can rob your house.
g) Carefully consider whether to post your personal information or photos, because they
affect your reputation in public.
h) Remember that anything you post online has a chance of staying online forever. Take
control of your privacy.
– a category of property that includes intangible creations of the
human intellect. Encompasses two (2) types of rights:
a) Industrial property rights
b) Copyright

– the legal protection extended to the owner of the rights in an original work.

– intended to encourage creativity by allowing creators to control and benefit


from their intellectual property.

- occurs when someone uses, reproduces, distributes, or creates


derivative works from copyrighted material without the permission of the copyright owner. This
unauthorized use violates the exclusive rights granted to the copyright holder and can lead to
legal consequences.

1. Copyright protects literary works, photographs, paintings, drawings,


films, music (and lyrics), choreography, and sculptures.
2. enough to know if something has a copyright.
3. . Ask yourself whether what you are making is something that came
from you, or something made from somebody else’s creativity.
4. . There are limitations to copyright laws. For instance, in the
Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are
also provisions for “fair use” which mean that an intellectual property may be used
without a consent as long as it is used in commentaries, criticisms, search engines,
parodies, news reports, research, library archiving, teaching, and education.

You might also like