E-Literate Muhammad Naimullah b. Badrulhisam 900916-14-6231.

Slides:



Advertisements
Similar presentations
Practically, Internet can be described as a multifunctional tool since we can use it for several purposes, such as: Seeking useful information Contacting.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Cyber Safety Assessment Review
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Why Are Computers Necessary in Today’s World?
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
What you don’t know CAN hurt you!
USING TECHNOLOGY TO EXTRACT INFORMATION AND EVALUATE SOURCES OF INFORMATION.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
How many of these icons do you recognise?. Year 7 Guidance Manager CEOP Ambassador.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Are you being a safe and successful digital citizen?
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Company LOGO Internet Safety A Community Approach.
Unit 1 - The Internet CSC CSC The Origin of the Internet  ARPANET  Advanced Research Projects Agency Network  Funded by the U.S. government.
The Internet as a Communications Tool. Communication is Key “I’ll pay more for a man’s ability to express himself than for any other quality he might.
Internet.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
The Internet. What is the Internet?  The Internet is a network of networks.  It gives users access to a wide variety of information from millions of.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
Making Life and Communication Easier Neka Anyaogu.
IT security By Tilly Gerlack.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
What is e-Learning e-Learning is the use of technology to enable people to learn anytime and anywhere. e-Learning can include training, the delivery of.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
What is e-government? E-Government refers to the use by government agencies of information technologies (such as Wide Area Networks, the Internet, and.
Por Guan Xiong PROJECT OBJECTIVES To develop a sense of ‘keNegaraan’, collaboration, responsibility and ownership to the communities during.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Specialist communication channel. Sarah-Jane king.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Get involved with your children online and encourage balanced use – set time limits Make sure they know who to talk to if they feel uncomfortable Talk.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
Cyber Literate Module 2. What is ‘Cyber Literate’?  Cyber Literate = Ability to use technology + knowing when, when not and how to use it appropriately.
Are you a Digital Native?
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Digital Citizenship Project Kimberly Robbins. “Advances in computer technology and the Internet have changed the way America works, learns, and communicates.
CYBER INTERACTION & COLLABORATION MODULE 4. LEARNING OUTCOMES By the end of this module, you should be able to: 1.Identify current digital tools for communication.
 S = Stay safe  M = Meet up  A = Accepting information  R = Reliable  T = Tell someone.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Tshilidzi Tshiredo. Introduction Long time ago even before technologies, social networking platforms and mobile devices, Dewey, J.( ) stated that.
Exchanging information. Communications 1 Communications enable organizations to keep in touch with Staff, Suppliers, Customers – actual & potential.
Internet Safety 101! Instant Messaging Social Networking Sites (i.e. Facebook) Sending personal Information Sending pictures online Talking to strangers.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-safety Parent Workshop Helping to keep your children safe online.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
E-safety Parent Workshop Helping to keep your children safe online.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
Guidelines for Internet Safety Chad Olivard ITC 525 Kutztown University Summer 2011.
Digital Citizenship.
E-Safety Briefing
Internet Identity, Safety, & Security
Computer Literacy – Grade 8
Do’s & Don'ts: Online Shopping
Digital Marketing Company In India
How many of these apps do you really know?
Introduction to Networks
Computer Literacy – Grade 8
E-safety Presentation
Presentation transcript:

e-Literate Muhammad Naimullah b. Badrulhisam

INTRODUCTION Is a special training program develop by Prestariang Systems Sdn.Bhd. to foster national unity via appropriate use of technology. It inspires Netizen to become critical thinkers that understand ethical consequences of online behaviour.

e-LITERATE Definition of e-Literate is the ability to use technology and knowing when, when not and how to use it appropriately. It highlight how online behaviour can have major consequences offline.

DIGITAL LITERACY APPLICATIONS

WEB 2.0  Web 2.0 is the second generation of the internet. It is now becoming dynamic where it enables everyone to create their own websites, upload audio and video files, post and information and complete a variety of other tasks. INSTANT MESSAGING  A type of communication service that enables you to create private chat rooms with another individual over the internet.

Online Application  e-Business  e-Government  e-Learning  Job Search Portals  Social Networking  Social Video Sites

TRUSTING INTERNET RESOURCES The integrity of Internet resources is very important. If you are sure that the origin of the information and the authors have a reputation for being credible, then you can consider the information a reliable resource.

When Should We Trust a Website If we have doubt and need guidance, we can consider this question: Is the website owned by a well-known company or organization? Is there a way to contact someone by phone or mail If you do not recognize the site, do you have information that can help you decide? A website might not be trustworthy if:  The site referred to you through an from unknown person  The site offer offensive content  The site makes offers that seems too good to be true, indicating a possible scam or the sale of illegal or pirated product  You are lured to the site, in which the product or service is not what you were expecting  You are asked for a credit card as verification of identify or for personal information that does not seem necessary

HOW TO KNOW IF A WEB PAGE IS SECURE See where the website begins its URLs with “https”, it means that the website provides a secure connection for users. All secure websites have a “lock” icon somewhere on the screen. This is to guarantee the transactions and data provided are safe and secure

DEALING WITH DIGITAL FOOTPRINT A digital footprint is the persistence of data trails online by a user’s activity in a digital environment. Digital footprint come from your mobile, web and online interactions and comprise the digital data of who you are