Professional Documents
Culture Documents
Web Design Portfolio Presentation in Pink Purple Orange Digitalism Style
Web Design Portfolio Presentation in Pink Purple Orange Digitalism Style
Web Design Portfolio Presentation in Pink Purple Orange Digitalism Style
AQUINO
Guidelines in
Teaching and
Learning
AQUINO X SOTO
ICEBREAKER
Techno-Bingo
Few situations that can
result in accidents
IN USING COMPUTER
T R L N G
C L E
T R A I L I N G
C A B L E S
Trailing
Cables If these cables are laying on the
floor, they can cause people to trip
over them.
Solution:
Back to Agenda Page Place cables inside cable ducts, under the
carpet/ flooring
O V R A D
O W R
S C K T
O V E R L O A D E D
P O W E R
S O C K E T S
Overloaded
Power Plugging Too many power cables into
Sockets a socket can result in the socket
being overloaded, overheating, and a
fire starting.
Solution:
Back to Agenda Page
Never plug too many cables into a socket. Always
make sure there are fire extinguishers nearby.
S L T
D
C N K
S P I L T
C R I N K S
D
SPILT
DRINKS It can result in damage to the
equipment, or an electric shock to
the user.
Solution:
Back to Agenda Page Keep drinks and food away from
computers
H V Y
B J T
F L G
H E A V Y
O B J E C T S
F A L L I N G
HEAVY
OBJECTS
Heavy items can cause serious
FALLING
injury if they fall on people.
Solution:
Back to Agenda Page
Make sure equipment is placed on strong
tables/ shelves.
HACKING, MALWARE, AND
COMPUTER VIRUS
TIPS TO PREVENT IT
HACKING
WHY DO HACKERS HACK?
just out of
WHAT IS HACKING?
curiosity or for
in the context of the challenge.
ICT, it is normally
taken to mean breaking in to
breaking into a access data
Back to Agenda Page
computer system.
Can a Computer
be Protected 01
Use Strong passwords to
protect your user login account
from Hacking?
02 Never reveal your login
password to anyone else
perform action
and delete. Select yours
from the uploads tab,
without
drag, the
and then drop SOME EXAMPLES OF MALWARE:
owner's
inside the frame!
Spyware (spys on you)
knowledge or Adware (pops up adverts all the time)
permission. Rootkits (allows a hacker full access to your computer)
Malware
MALICIOUS MALWARE INSTALLED ONCOMPUTER
and SOFTWARE
Malware is the
SYSTEM IN A VARIETY OF WAYS:
Installing software that seems ok, but has
Viruses
name given to
any software malware hidden inside (known as a 'Trojan
that could harm Horse').
a computer Having their computer hacked, and the software
system, installed by the hacker.
interfere with a
user's data, or
Visiting Dodgy website and clicking on infected
make the
Drag and drop your links
The computer being infected by a computer virus
photo or video! Click the
computer
sample photo or video
perform action
and delete. Select yours
from the uploads tab,
without
drag, the
and then drop SOME EXAMPLES OF MALWARE:
owner's
inside the frame!
Spyware (spys on you)
knowledge or Adware (pops up adverts all the time)
permission. Rootkits (allows a hacker full access to your computer)
WEBSITE
Computer Virus
a type of malicious software
PHONE
EMAIL WEBSITE
This policy provides guidelines on the It recognizes the importance of using ICT
implementation of flexible learning in tools and platforms to deliver quality
higher education institutions (HEIs) in education in a flexible and accessible
the country. manner.
GUIDELINES FOR THE
IMPLEMENTATION OF BLENDED This policy provides guidelines on
LEARNING IN HIGHER the implementation of blended
EDUCATION INSTITUTIONS learning in HEIs during the COVID-
AMIDST THE COVID-19 19 pandemic.
PANDEMIC
It emphasizes the use of various ICT
tools and platforms for the delivery
(CHED MEMORANDUM ORDER NO. of learning materials and activities.
07, s. 2021)
This policy provides
guidelines on the
quality assurance of e-
POLICY ON QUALITY ASSURANCE learning programs in
HEIs.
OF E-LEARNING PROGRAMS IN
HIGHER EDUCATION
(CHED MEMORANDUM ORDER NO. 12, S. 2019)
@reallygreatsite
THANK YOU!