1 citizen portfolio n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
1 citizen portfolio PowerPoint Presentation
Download Presentation
1 citizen portfolio

Loading in 2 Seconds...

play fullscreen
1 / 34

1 citizen portfolio - PowerPoint PPT Presentation


  • 274 Views
  • Uploaded on

1 citizen portfolio. Presented by: Lim X in H ui – SA11040 Hew X in L in – SB11019 Trainer: Encik Mohd T armizi Session: 28-29 april 2012. e-Care. -Physical and Psychological Well-Being in a Digital World -applying ergonomics in our daily life. Examples: Table.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about '1 citizen portfolio' - haracha


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
1 citizen portfolio
1 citizen portfolio

Presented by:

Lim XinHui – SA11040

Hew XinLin – SB11019

Trainer: EncikMohdTarmizi

Session: 28-29 april 2012

e care

e-Care

-Physical and Psychological Well-Being in a Digital World

-applying ergonomics in our daily life

examples table
Examples: Table

Work Surface Height

Must be adjustable

example2 chair
Example2: Chair

With adjustable height

well-designed chair that supports your back as well as allows you to work with ease.

example3 using mouse
Example3: Using mouse

purchase a well-designed mouse that can help avoid pressure on your forearms and wrists. 

Release the mouse at frequent intervals so that you can avoid pressure on the wrists

example4 desktop layout
Example4: Desktop layout

 Make sure that all your documents and controls are easily reachable by both hands so that there is no need to twist and turn any parts of your body unnecessarily.

example5 document holder
Example5: Document Holder

reduce the movement of your head in djusting your focus from the screen to your documents. 

what is e literate
What is e-Literate??

The e-Literate module provides an introduction to 21st century global digital technology. It explains the capabilities to use digital technology and knowing when, when not and how to use it. It stresses on the ethics, process of learning about technology and the uses of technology.

how to tell if a web page is secure
How to Tell if a Web Page is Secure?
  • Most websites begin with the letters “http”, it is impossible to tell if the websites are secure or not.
  • However, if a website begins its URLs with “https”, it means that the website provides a secure connection for users
  • Example:
lock icon
“Lock” icon
  • All secure websites have a “lock” icon somewhere on the screen. This is to guarantee the transactions and data provided are safe and secure. 
  • Example:
what is e safety
What is e-Safety??

Description:

Internet safety is more on how to protect your important information from internet threat.

description
Description:

"Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.

examples of cyber bullying
Examples of Cyber-Bullying

1.A fake profile is created on a social networking site

and the fake profile is used to harass and abuse other students.

2.Someone posts some embarrassing, private or

doctored photos or videos to a social networking site.

Someone sends abusive or threatening text messages or emails to a victim.

3. Online polls are set up to judge and intimidate

other students based on characteristics such as

physical appearance or intelligence.

description1
Description:
  • Cyber stalking is the use of the Internet or any electronic device to stalk other people. Cyber stalkers find information on their victims from various sources such as blogs, search services, and social networking websites.
what to do if you are being cyberstalked
What To Do If You Are Being Cyberstalked???
  • Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet system administrators or law enforcement officials.
  • You may want to consider blocking or filtering messages from the harasser. Many email programs such as Eudora and Microsoft Outlook have a filter feature, and software can be easily obtained that will automatically delete emails from a particular email address or contain offensive words. Chat room contact can be blocked as well.
slide26

Contact your local police department and inform them of the situation in as much detail as possible. In appropriate cases, they may refer the matter to state or federal authorities.

hacker
Hacker
  • Hacker is a person who enjoys learning programming languages and computer systems and can be considered an expert on the subjects.
  • Hackers usually are programmers who try to find holes in the ground systems to enhance their knowledge.
  • Sometimes hackers may share the information they find with others, but have no intention to interfere with the system or to get others’ personal information.
cracker
Cracker
  • Cracker is a person who is illegally accessed to someone else’s system, with the intention to distribute malicious software.
  • A cracker can disturb the system by damaging key data.
protection from internet threats
Protection from Internet Threats

1. Your Screen 

  • If you walk away from your computer, close the lid or engage the screensaver.
  • Be sure you have it password protected to get back to the main screen.

2. Be responsible and be aware 

  • You are responsible for what happens on your computer and with your account,
  • Know the security policy (AUP)
slide31

3. Password choice 

  • Mix upper and lower case, numbers and misspell the words you choose.
  • Do not write it down.
  • Do not share your password with anyone.
  • Do not rely on one password for everything in case you have a breach.

4. Surf wisely

  • Surf as if others were observing you.
  • Be cautious about providing personal information to websites.
slide32

5. It is all on the record 

  • Every keystroke of every email, every IM, everything said or done on the web or in email is recorded somewhere.

6. Practise safe access 

  • Be careful opening any email attachments. This is especially true if you do not know the sender, but even if you do, it is possible for malware to fake email address or even steal them from computer and send them out without the owner knowing.
slide33

7. Protect your identity 

  • Do not reply or click on links in any message requesting personal or financial information.
  • Monitor your finances. At least review your credit quarterly.
  • Don’t download programs from companies of which you are not familiar.
  • Secure your computer. Block popups.

8. Backup data 

  • Backup to disks, external hard drives, flash drives or the server.
  • Create a schedule.