1 / 34

1 citizen portfolio

1 citizen portfolio. Presented by: Lim X in H ui – SA11040 Hew X in L in – SB11019 Trainer: Encik Mohd T armizi Session: 28-29 april 2012. e-Care. -Physical and Psychological Well-Being in a Digital World -applying ergonomics in our daily life. Examples: Table.

haracha
Télécharger la présentation

1 citizen portfolio

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 1 citizen portfolio Presented by: Lim XinHui – SA11040 Hew XinLin – SB11019 Trainer: EncikMohdTarmizi Session: 28-29 april 2012

  2. e-Care -Physical and Psychological Well-Being in a Digital World -applying ergonomics in our daily life

  3. Examples: Table Work Surface Height Must be adjustable

  4. Example2: Chair With adjustable height well-designed chair that supports your back as well as allows you to work with ease.

  5. Example3: Using mouse purchase a well-designed mouse that can help avoid pressure on your forearms and wrists.  Release the mouse at frequent intervals so that you can avoid pressure on the wrists

  6. Example4: Desktop layout  Make sure that all your documents and controls are easily reachable by both hands so that there is no need to twist and turn any parts of your body unnecessarily.

  7. Example5: Document Holder reduce the movement of your head in djusting your focus from the screen to your documents. 

  8. e-Literate

  9. What is e-Literate?? The e-Literate module provides an introduction to 21st century global digital technology. It explains the capabilities to use digital technology and knowing when, when not and how to use it. It stresses on the ethics, process of learning about technology and the uses of technology.

  10. The Digital Literacy Tools

  11. Mobile Phone

  12. Smart Object

  13. Satellite TV

  14. Game Console

  15. Wireless Internet

  16. How to Tell if a Web Page is Secure? • Most websites begin with the letters “http”, it is impossible to tell if the websites are secure or not. • However, if a website begins its URLs with “https”, it means that the website provides a secure connection for users • Example:

  17. “Lock” icon • All secure websites have a “lock” icon somewhere on the screen. This is to guarantee the transactions and data provided are safe and secure.  • Example:

  18. e-Safety

  19. What is e-Safety?? Description: Internet safety is more on how to protect your important information from internet threat.

  20. Cyber Bullying

  21. Description: "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.

  22. Examples of Cyber-Bullying 1.A fake profile is created on a social networking site and the fake profile is used to harass and abuse other students. 2.Someone posts some embarrassing, private or doctored photos or videos to a social networking site. Someone sends abusive or threatening text messages or emails to a victim. 3. Online polls are set up to judge and intimidate other students based on characteristics such as physical appearance or intelligence.

  23. Cyberstalking

  24. Description: • Cyber stalking is the use of the Internet or any electronic device to stalk other people. Cyber stalkers find information on their victims from various sources such as blogs, search services, and social networking websites.

  25. What To Do If You Are Being Cyberstalked??? • Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet system administrators or law enforcement officials. • You may want to consider blocking or filtering messages from the harasser. Many email programs such as Eudora and Microsoft Outlook have a filter feature, and software can be easily obtained that will automatically delete emails from a particular email address or contain offensive words. Chat room contact can be blocked as well.

  26. Contact your local police department and inform them of the situation in as much detail as possible. In appropriate cases, they may refer the matter to state or federal authorities.

  27. Hacker and Cracker

  28. Hacker • Hacker is a person who enjoys learning programming languages and computer systems and can be considered an expert on the subjects. • Hackers usually are programmers who try to find holes in the ground systems to enhance their knowledge. • Sometimes hackers may share the information they find with others, but have no intention to interfere with the system or to get others’ personal information.

  29. Cracker • Cracker is a person who is illegally accessed to someone else’s system, with the intention to distribute malicious software. • A cracker can disturb the system by damaging key data.

  30. Protection from Internet Threats 1. Your Screen  • If you walk away from your computer, close the lid or engage the screensaver. • Be sure you have it password protected to get back to the main screen. 2. Be responsible and be aware  • You are responsible for what happens on your computer and with your account, • Know the security policy (AUP)

  31. 3. Password choice  • Mix upper and lower case, numbers and misspell the words you choose. • Do not write it down. • Do not share your password with anyone. • Do not rely on one password for everything in case you have a breach. 4. Surf wisely • Surf as if others were observing you. • Be cautious about providing personal information to websites.

  32. 5. It is all on the record  • Every keystroke of every email, every IM, everything said or done on the web or in email is recorded somewhere. 6. Practise safe access  • Be careful opening any email attachments. This is especially true if you do not know the sender, but even if you do, it is possible for malware to fake email address or even steal them from computer and send them out without the owner knowing.

  33. 7. Protect your identity  • Do not reply or click on links in any message requesting personal or financial information. • Monitor your finances. At least review your credit quarterly. • Don’t download programs from companies of which you are not familiar. • Secure your computer. Block popups. 8. Backup data  • Backup to disks, external hard drives, flash drives or the server. • Create a schedule.

More Related