Emptech Reviewer
Emptech Reviewer
Emptech Reviewer
Midterms
WEEK 1
WEEK 2
Here are the most common offenders in the rogues’ gallery of malware:
Adware(advertising supported software)
- is unwanted software designed to throw advertisements up on your screen. Example,
pop-up ads and banner ads.
Spyware
- is malware that secretly observes the computer user’s activities without permission and
reports it to the software’s author.
- Example is a key logger.
Install anti-virus software, update software, only buy apps from trusted sources,
do not click on suspicious link or unknown/suspicious sources, install firewall, back-up
data regularly
Virus and Worms
- are malwares that attach to another program and, when executed—unintentionally by
the user—replicates itself by modifying other computer programs and infecting them
with its own bits of code.
Trojan, or Trojan horse
- is one of the most dangerous malware types
- It usually represents itself as something useful in order to trick you
- Once it’s on your system, the attackers behind the Trojan gain unauthorized access to
the affected computer
- From there, Trojans can be used to steal financial information or install threats like
viruses and ransomware
Ransomware
- is a form of malware that locks you out of your device and/or encrypts your files, then
forces you to pay a ransom to get them back.
Spams
- are unsolicited emails, instant messages coming from recipients that are not granted
verifiable permission for the message to be sent
- Spam messages can be damaging if you open or respond to it.
Try to avoid opening emlails, and clicking links in spam messages
Do not reply
Cyberstalking
- refers to the use of the internet or other electronic device to harass or stalk individuals
or organizations
Cyberbullying
- refers to the act of tormenting, harassing, or embarrassing another person using the
internet.
Spoofing
- happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.
WEEK 3
Searching the Web
There are billions of information on the web and it is a challenge for us to truly find which
information is reliable and relevant. Here are some tips you may use to be able to look for
relevant and reliable sources:
Search Enginesare websites used for retrieval of data, files, or documents from
data bases. Some search engines we use today are:
Google, Duck DUck Go, Bing, Dogpile, Yippy, Google Scholar, Webopedia, YAhoo, The
Internet Archive
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types
of names and
addresses that refer to objects on the World Wide Web.
Knowing the URL endings will give you clues to who is sponsoring the website and help
evaluate the sources.
1.Protocol
2.Subdomain
3.Domain
4.Top-level Domain
5.Folders/Paths
6.Page
7.Named anchor
Popular Domains
Top-level domains,
.edu - educational institution
.org - non-profit organization
.gov - government site
.com - commercial site
.net - network
Country code top level domains
.ph - Philippines
.eu - European Union
.uk - Uited ingdom
.au - australia
Search Skills and Tools
1.Boolean Logic
–narrows, broadens, or eliminates search term.
a.Boolean“or”–this operator will find pages that include either of the search terms.
b.Boolean “and”–this operator will retrieve only pages containing both terms
c.Boolean “not”–this operator will find pages that do not include search term
immediately following it.
2.Phase Searching
–is used to search for famous quotes, proper names, recommendations, etc. It
encloses the phrase in quotation marks.
Ex.“Jane Doe”“To be or not to be”
3.Plus (+)
–indicates that the word after the sign is a required word must be found in search.
Example: +fire
4.Minus (–)sign
–indicates to exclude a word from your search that is not required on the result.
Example: Jaguar speed –car
5.Ampersand (@)
is used to find social tags.
Example: @SteveJobs
6.Hashtag (#)
is used to find popular hashtags.
Example: #LawOfClassroom
7.Finding Documents
–using the filetype refines the search for documents on the web.
·filetype:pdf
·filetype:doc
·filetype:xls
Ex. ICT in the Philippines pdf
8.Searching Site
–the sites find webpage from a website.
Ex.: National Geographic information in Australia Search: Australia site:
NationalGeographic.com
Technology in the Philippines.
This information must come from a government sitein PDF or Word document.
Print the article and paste your work on a separate sheet of paper. Do not forget to
include the URL of the article you have taken the information.
Evaluating Sites
The web provides access to some excellent information and can also give access to
those that are irrelevant and outdated. Here is some checklist that you can use to
evaluate your website:
1.Authority.
It reveals that the person, institution or agency responsible for a site has the
qualifications and knowledge to do so. Evaluating a web site for authority:
ØAuthorship:
It should be clear who developed the site.
ØContact information should be clearly provided:
e-mail address, snail mail address, phone number, and fax number.
ØCredentials:
the author should state qualifications, credentials, or personal background that gives
them authority to present information.
ØCheck to see if the site supported by an organization or a commercial body
2.Purpose.
The purpose of the information presented in the site should be clear. Some sites are
meant to inform, persuade, state an opinion, entertain, or parody something or someone.
Evaluating a web site for purpose:
ØDoes the content support the purpose of the site?
ØIs the information geared to a specific audience (students, scholars, general
reader)?
ØIs the site organized and focused?ØAre the outside links appropriate for the site?
üDoes the site evaluate the links?
3.Coverage.
This refers to how comprehensive the website is in their discussion of certain topics.
Evaluating a web site for coverage:ØDoes the site claim tobe selective or comprehensive?
ØAre the topics explored in depth?
ØCompare the value of the site’s information compared to other similar sites.
ØDo the links go to outside sites rather than its own?
ØDoes the site provide information with no relevant outside links?
4.Currency.
It refers to:
(1) how current the information presented is, and
(2) how often the site is updated or maintained.
It is important to know when a site was created, when it was last updated, and if all of the
links are current. Evaluating a web site for currency involves finding the date
information was:
Øfirst written
Øplaced on the web
Ølast revised
5.Objectivity.
Objective sites present information with a minimum of bias. Evaluating a web site for
objectivity:
ØIs the information presented with a particular bias?
ØDoes the information try to sway the audience?
ØDoes site advertising conflict with the content?
ØIs the site trying to explain, inform, persuade, or sell something?
6.Accuracy.
It refers to the credibility of the website. Evaluating a web site for accuracy:
ØReliability:
Is the author affiliated with a known, respectable institution?
ØReferences:
do statistics and other factual information receive properreferences as to their
origin?
ØIs the information comparable toother sites on the same topic?
ØDoes the text follow basic rules of grammar, spelling andcomposition?
ØIs a bibliography or reference list included?