Practical Research 2
Applied SubjectQuarter 2 - MODULE ?
(Title)
Learning Competency and Code: ______
(Title)
Learning Competency and Code: ______
After going through this module, you are expected to:
implement procedures for ensuring security of data, including regular back-ups and virus checks in accordance with standard operating procedure; and
implement basic file maintenance procedures in line with standard operating procedures.
Lesson 8: Performing Computer Operations (PCO)
Topics:
Security measures
Cyber Security
Why Cyber Security is Important
Cyber Attacks
How to avoid Online security Threats
Types of Hackers
Cybersecurity Best Practices
Anti-virus software/programs
What is a Virus
A Brief History of Computer Viruses
File management
- File Management, Part 1
- File Management, Part 2
What is Cyber Security?
Why Cyber Security is Important
Types of Cyber Attacks to Look Out For
How to Protect Yourself Against Cyber Attacks
What are the 7 Types of Hackers
Quick Tips: Cyber Security Best Practices
Anti Virus
A Brief History of Computer Viruses
File Management, Part 1
File Management, Part 2