Como seducir por las redes sociales.Descripción completa
onlineFull description
Como seducir por las redes sociales.
Full description
sekenario
El libro con el que inició la aventura de nuestro protagonista Kirito, y su meta por completar los 100 pisos de el Castillo Flotante conocido como Aincrad!
Să începem cu definirea chiar a noţiunii de „consumator”: este un ins care cumpără ceva în scop personal. Sau, cum scrie la lege, orice persoană fizică (sau grup de persoane fizice constitui…Full description
villamedicDescripción completa
online shopping introduction
online shopping introductionDescripción completa
safety
Electrical SafetyFull description
Date: Nov. 13-14, 2017 Learning Competencies and codes:
Learning Area:
Grade/Section: 12
Duration: 120 mins.
apply online safety, security, ethics, and etiquette standards and pra ctice in the use of ICTs as it would relate to their specific professional tracks
1. Objectives The students are expected to:
Recognize the dangers of the Internet;
Apply online safety, security, ethics and etiquette standards and practices;
Consider one’s and others safety when sharing information on the net.
Display with utmost concern on social responsibility in using media.
Online Safety, Security, Ethics and Etiquette CG, Rex Book Empowerment Technologies, PowerPoint, Projector, Internet
4.2Activity
Individually, accomplish the Table below. Put a check ( ) under Shared or Not Shared. “How Safe are You?”
1. Checking of attendance. 2. Answer the Pre-Test. 3. Review of previous lesson.
1. First Name 2. Last Name 3. Middle Name 4. Current and previous school (s) 5. Your Cellphone Number 6. The Name of your Mother and Father 7. The Name of your Siblings 8. Your Address 9. Your Home Phone Number 10. Your Birthday
4.3 Analysis
1. What do you feel with the activity? 2. How many checks you have for Sh ared? 3. How many checks you have for Not S hared? 4. How safe are you when using the Internet?
4.4Abstraction
Lecturette: Online Safety, Security, Ethics and Etiquette Tips to Stay Safe Online
4.5Application 4.6Assessment
Create a Journal by doing Skill Exploration 2.1 on Privacy Policies in actual websites.
4.7Assignment
In your lecture notebook, answer the following question: 1. What are the problems you encountered in your computer system? 2. Identify the causes of those problems.