Web Design Portfolio Presentation in Pink Purple Orange Digitalism Style

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

The Facilitators

AQUINO

Back to Agenda Page SOTO


SAFETY ISSUES IN ICT:

Guidelines in
Teaching and
Learning
AQUINO X SOTO
ICEBREAKER
Techno-Bingo
Few situations that can
result in accidents
IN USING COMPUTER
T R L N G
C L E
T R A I L I N G
C A B L E S
Trailing
Cables If these cables are laying on the
floor, they can cause people to trip
over them.

Solution:
Back to Agenda Page Place cables inside cable ducts, under the
carpet/ flooring
O V R A D
O W R
S C K T
O V E R L O A D E D
P O W E R
S O C K E T S
Overloaded
Power Plugging Too many power cables into
Sockets a socket can result in the socket
being overloaded, overheating, and a
fire starting.

Solution:
Back to Agenda Page
Never plug too many cables into a socket. Always
make sure there are fire extinguishers nearby.
S L T
D
C N K
S P I L T
C R I N K S
D
SPILT
DRINKS It can result in damage to the
equipment, or an electric shock to
the user.

Solution:
Back to Agenda Page Keep drinks and food away from
computers
H V Y
B J T
F L G
H E A V Y
O B J E C T S
F A L L I N G
HEAVY
OBJECTS
Heavy items can cause serious
FALLING
injury if they fall on people.

Solution:
Back to Agenda Page
Make sure equipment is placed on strong
tables/ shelves.
HACKING, MALWARE, AND
COMPUTER VIRUS
TIPS TO PREVENT IT
HACKING
WHY DO HACKERS HACK?

just out of
WHAT IS HACKING?
curiosity or for
in the context of the challenge.
ICT, it is normally
taken to mean breaking in to
breaking into a access data
Back to Agenda Page
computer system.
Can a Computer
be Protected 01
Use Strong passwords to
protect your user login account
from Hacking?
02 Never reveal your login
password to anyone else

Place a firewall between your


03
computer and any network

Disconnect From networks


04
when you are not using them

Encrypt Any sensitive


05
information
Malware
MALICIOUS MALWARE INSTALLED ONCOMPUTER
and SOFTWARE
Malware is the
SYSTEM IN A VARIETY OF WAYS:
Installing software that seems ok, but has
Viruses
name given to
any software malware hidden inside (known as a 'Trojan
that could harm Horse').
a computer Having their computer hacked, and the software
system, installed by the hacker.
interfere with a
user's data, or
Visiting Dodgy website and clicking on infected
make the
Drag and drop your links
The computer being infected by a computer virus
photo or video! Click the
computer
sample photo or video

perform action
and delete. Select yours
from the uploads tab,
without
drag, the
and then drop SOME EXAMPLES OF MALWARE:
owner's
inside the frame!
Spyware (spys on you)
knowledge or Adware (pops up adverts all the time)
permission. Rootkits (allows a hacker full access to your computer)
Malware
MALICIOUS MALWARE INSTALLED ONCOMPUTER
and SOFTWARE
Malware is the
SYSTEM IN A VARIETY OF WAYS:
Installing software that seems ok, but has
Viruses
name given to
any software malware hidden inside (known as a 'Trojan
that could harm Horse').
a computer Having their computer hacked, and the software
system, installed by the hacker.
interfere with a
user's data, or
Visiting Dodgy website and clicking on infected
make the
Drag and drop your links
The computer being infected by a computer virus
photo or video! Click the
computer
sample photo or video

perform action
and delete. Select yours
from the uploads tab,
without
drag, the
and then drop SOME EXAMPLES OF MALWARE:
owner's
inside the frame!
Spyware (spys on you)
knowledge or Adware (pops up adverts all the time)
permission. Rootkits (allows a hacker full access to your computer)
WEBSITE

Computer Virus
a type of malicious software

EMAIL

a piece of software that can 'infect' a


computer (install itself)

PHONE

copy itself to other computers, without


the user's knowledge or permission.
As a future Educator,
why it is important to
know the safety issues
in using technology in
teaching and learning?

Back to Agenda Page


Where do you learn more in Ol class or f2f?

Write it down on sticky notes.


Where do you learn more in
Online class or Face to Face
class?
CONNOR HAMILTON'S

CHED RELATED POLICIES


POLICY ON FLEXIBLE LEARNING IN HIGHER
EDUCATION IN THE PHILIPPINES
(CHED MEMORANDUM ORDER NO. 04, s. 2020)

EMAIL WEBSITE

This policy provides guidelines on the It recognizes the importance of using ICT
implementation of flexible learning in tools and platforms to deliver quality
higher education institutions (HEIs) in education in a flexible and accessible
the country. manner.
GUIDELINES FOR THE
IMPLEMENTATION OF BLENDED This policy provides guidelines on
LEARNING IN HIGHER the implementation of blended
EDUCATION INSTITUTIONS learning in HEIs during the COVID-
AMIDST THE COVID-19 19 pandemic.

PANDEMIC
It emphasizes the use of various ICT
tools and platforms for the delivery
(CHED MEMORANDUM ORDER NO. of learning materials and activities.
07, s. 2021)
This policy provides
guidelines on the
quality assurance of e-
POLICY ON QUALITY ASSURANCE learning programs in
HEIs.
OF E-LEARNING PROGRAMS IN
HIGHER EDUCATION
(CHED MEMORANDUM ORDER NO. 12, S. 2019)

It sets standards for the


design, development, and
delivery of e-learning
programs, including the use
of appropriate ICT tools and
platforms.
GUIDELINES FOR THE (CHED MEMORANDUM
ORDER NO. 13, s. 2020)
ASSESSMENT AND
ACCREDITATION OF E-
LEARNING PROGRAM This policy provides guidelines on

IN HIGHER EDUCATION the assessment and accreditation of


e-learning programs in HEIs.

It sets criteria and standards for the


evaluation of e-learning programs,
including the use of ICT tools and
platforms.
by : aquino & soto

@reallygreatsite

THANK YOU!

Back to Agenda Page

You might also like