Sunday, July 9, 2017

TLE 6: Using Blogs

TLE 6: Using Blogs

I. Objective:      Define what Blog is.
Identify different Blog sites.
Enumerate some internet safety tips.
                            Show steps in making a Blogger account

II. Content
Using Blogs
Nowadays, there are plenty of blogging tools that can be used specifically by kids at your age. Some are free and some are paid. What is a blog by the way?
Blog was derived from the words web logs. Businessdictionary.com
defines blog as "a website, similar to an online journal that includes chronological entries made by individuals. It provides users with forums (o r
a comment area) to talk about each posting."
Blogging can be useful for children as it:
• Helps improve reading and writing skills
• Makes them more creative
• Provides a tool for collaboration
• Fuels their desire for learning
While blogging is useful, you must be aware of the following
internet safety tips:
• Do not use any personal information such as last name, contact
numbers and others.
• Do not post offensive photos.
• Do not compete with other bloggers.
• Do not use your blogs to harm other people.

Internet Safety
ü  Make sure all personal information and passwords are kept private. Never put any contact details online and ensure passwords are difficult to guess.
ü  Never meet up with people you only know online. Meeting someone from chat rooms and social networking sites could be dangerous.
ü  Do not open emails from strangers and unknown sources. Email and attachments may contain viruses or threats that may harm your computer.
ü  Not all information online is reliable. There are lots of information on the internet that are not true. Always check or verify all information and data. The best way to do this is to check the website and make sure it is a reliable source. Examples of such are educational institutions, government offices, established business institutions, and the like.
ü  Tell a trusted adult if anything online makes you feel uncomfortable or threatened.

Dangers and Threats on the internet
v  Spam Email - This is also known as junk email, which involve unsolicited commercial correspondence flooding your account.
v  Spyware - This is a computer program installed secretly on a personal computer to collect information or even take control over the computer without the owner's knowledge.
v  Pharming - This is a dangerous hacker attack on a website which leads all traffic intended for that website to another dummy website.
v  Computer Virus - This is a malicious program that infects and destroys a computer system.

v  Hacker - A person who is entering and controlling other people's computer system without permission to sabotage a person's website or steal personal information.

No comments:

Post a Comment