STUDENT TEACHER CLASS TARGET GRADE. Learning outcome achieved

Size: px
Start display at page:

Download "STUDENT TEACHER CLASS TARGET GRADE. Learning outcome achieved"

Transcription

1 Tick Level Lesson STUDENT TEACHER CLASS TARGET GRADE WORKING AT GRADE Learning outcome achieved Achieved a level 3 in the baseline assessment 5 Achieved a level 4 in the baseline assessment 6 Achieved a level 5 in the baseline assessment 4 I can select, combine and use internet services. 5 I know the potential of information technology for collaboration when computers are networked. I know names of hardware e.g. hubs, routers, switches, and the names of protocols e.g. SMTP, imap, 6 POP, FTP, TCP/IP, associated with networking systems. I can show responsible use of technologies and online services, and I know a range of ways to report 4 concerns I can recognise ethical issues surrounding the application of information technology beyond school. I can use technologies and online services securely, and I know how to identify and report inappropriate conduct. I can show responsible use of technologies and online services, and I know a range of ways to report concerns I can recognise ethical issues surrounding the application of information technology beyond school. I can use technologies and online services securely, and I know how to identify and report inappropriate conduct. I can show responsible use of technologies and online services, and I know a range of ways to report concerns. 5 I can recognise ethical issues surrounding the application of information technology beyond school. I can use technologies and online services securely, and I know how to identify and report inappropriate 6 conduct I know the difference between physical, wireless and mobile networks. I know data transmission between digital computers over networks, including the internet i.e. IP addresses and packet switching. I know names of hardware e.g. hubs, routers, switches, and the names of protocols e.g. SMTP, imap, POP, FTP, TCP/IP, associated with networking systems. I know how to effectively use search engines, and I know how search results are selected, including that search engines use 'web crawler programs'. I know how search engines rank search results. 6 I can identify and explain how the use of technology can impact on society. 4 Achieved a level 4 in the end of term assessment 5 Achieved a level 5 in the end of term assessment 6 Achieved a level 6 in the end of term assessment 1

2 1. Baseline assessment Can you match the keyword to the correct definition? REPETITION A set of step by step instructions that solves a problem SEQUENCE Repeating an instruction a number of times PROGRAM Finding errors and fixing them OUTPUT Data that is given to a computer system ALGORITHM A list of instructions that tell a computer what to do SELECTION Having different choices to make DEBUG Instructions that are placed in order and happen one after another INPUT Something that stores data for the computer to remember Self Assessment: R A G 2

3 2. Understanding Browsers Can you match the logo to the correct internet browser? Mozilla Firefox Netscape TheWorld Tencent Traveler Opera Internet Explorer Chrome Maxthon Safari My IP address is: 3

4 Research the advantages and disadvantages of changing security settings and list them below: ADVANTAGES DISADVANTAGES There are lots of different internet browsers available to download. Research at least three and then write a report for Pixel Pro, an independent games developer, about what internet browser they should use and why try to use key words (see back back of workbook). Upload your completed work to Edmodo. Self Assessment: R A G 4

5 3. Spot the Scam Below is an example of a phishing can you identify anything that makes it stand out as a scam? Make a list below. Research one of the following types of scams and create a presentation explaining what the scam is, how it works and how to avoid it. You should include real world examples. Chain s / Scareware / Mobile phone missed calls / Text message marketing / Phone-paid services 5

6 Your teacher will show you six examples of possible scams. Your job is to identify whether each one is real or a scam and then explain why you think this. Example Scam or Real Why? Self Assessment: R A G 6

7 4. Safety Savvy Read the news story below and then answer the questions. British hacker, 21, jailed for infiltrating Selena Gomez's Facebook page... and reading personal s to boyfriend Justin Bieber By EMILY SHERIDAN Published: 14:20, 21 May 2012 A British fast-food worker has been jailed for hacking into American singer/actress Selena Gomez's Facebook page. Gareth Crosskey, 21, of Lancing, West Sussex, posed as the 19-year-old star's step -father Brian Teefey to convince staff at the social networking firm to change passwords to her account. He then infiltrated her personal page, posting negative statements about her boyfriend Justin Bieber and also reading personal messages between the couple. Former McDonald's employee Crosskey, who was 19 at the time of the hacking in January 2011, was jailed for 12 months after admitting two offences under the Computer Misuse Act. After reading her s, Crosskey contacted OK! and Hollywood Life magazines offering them information about Gomez, who was yet to go public with her romance with Bieber at the time. He posted 'Justin Bieber sucks' on her Facebook page - which also appeared on her Twitter account - prompting a wave of abuse from devoted Bieber fans. Crosskey then wrote to the singer's stepfather Teefey claiming he had hacked into at least four personal accounts and had copied messages between her and her famous boyfriend. Judge John Price at Southwark Crown Court told Crosskey: 'You are clever with a computer and you hacked into the private part of somebody's Facebook account - that somebody was a singer, a celebrity called Selena Gomez. 'People deserve privacy and should not their private correspondence by made public. 'People are entitles to privacy even those who seek publicity.' Prosecutor Corrine Bramwell said Crosskey also boasted about the incident by posting a video on YouTube demonstrating how he had hacked the page. Bramwell said the singer's team spent three days trying to regain control of the Facebook page. A joint 50,000 investigation between the Federal Bureau of Investigation (FBI) and MeT's E-Crime Unit eventually traced Crosskey to his home in West Sussex. He was found using an IP address linked to his home and a Wi-Fi network at the McDonald's branch where he was employed at the time. Gareth Morgan, defending, said: 'This defendant was 19 when he embarked on this course of action, he is now 21. 'He accepts his actions have caused distress and alarm and he accepts that his actions were stupid.' Source: How many months was Crosskey jailed for? Which celebrity did Crosskey hack and what did he hack into? How was he found? 7

8 One of the simplest ways that people have their accounts hacked is through someone else finding out their password. Sometimes this is due to people using the same password for all accounts. One way to avoid this is to use an algorithm to help you to set a unique password for each website and help you to remember it. Use the space below to come up with a set of instructions to set a strong password. Find a definition for Bluejacking: Some websites may not be what they seem and you could pick up a computer virus. Name a virus and what kind of software you need to remove it. 8

9 Choose one of the following internet services: shopping, gaming or social networking and explain how you can stay safe while online. Self Assessment: R A G 9

10 STRENGTH TARGET ACTION GRADE Green Pen Activity: 5. Safe social networking On the next page is an example of a Facebook account, can you see any problems with the information that Michael has shared circle anything that stands out to you as a concern. 10

11 When you sign up for a social networking site you have to go through some security checks. Give some examples of these and explain why these are needed: Create a poster explaining how to set up your security settings for Facebook and why. Submit your poster on Edmodo. Self Assessment: R A G 11

12 6. Connecting to the internet When you visit a website the packets of data have to travel between several servers. Go to to trace the route to your favourite site Draw the route taken by the packet data from your favourite website: 12

13 The data that all internet traffic is split down into is called: Using the internet to help you can you match up the term, abbreviation and description correctly? Term Abbreviation Description Point of Presence NAP The protocol which takes data from a user s application program and passes it to the IP for transfer across the internet. The reverse operation is performed at the destination computer, i.e. the TCP reassembles the data (from individual packets) and forwards them to the user s application program. The close relation with the IP means that the terms are Network Access Point TCP A standard protocol which allows files to be transferred between two computers on a TCP-based network. It is commonly used to download programs to your computer from other servers and to upload web pages that you have created to the server that is hosting Internet Protocol ISP An access point to the internet. Normally, it is a location which contains all of the hardware which allows internet users access to the internet. An Internet Service Provider (ISP) may operate several PoPs in their area to allow good access to the internet. Transmission FTP An interchange between Control Protocol File Transfer Protocol Internet Service Provider IP POP networks within the internet. It allows ISP s to interconnect with each other Which of the above protocols would be involved in sending an ? Direct connection to the internet would be very costly and so ISPs provide a costeffective gateway for people and organisations to get onto the internet. In the UK there are many ISPs, with some of the most popular ones being BT (British Telecom), Virgin Media and Sky. The protocol used to route packets of information across the internet 13

14 Computers need to be connected to a network in order to access the internet. Write the descriptions next to the correct piece of hardware. Self Assessment: R A G 14

15 7. Communicating Online Using what you learnt last lesson complete the diagram below: How travels Read Outbox Internet Inbox Write Senders ISP Recipients ISP You will have used a search engine lots of times to find out information but do you know how one works. Go to and answer the questions below. The world wide web is made up of more than how many pages? How does a search engine navigate from page to page? Where are the results of this stored? 15

16 What kind of things does Google have algorithms for? What is an algorithm? Are the results displayed in a random order? How many factors are used to rank results? A new bill has recently been passed which allows people the right to be forgotten. What do you think this means? 16

17 What are the advantages and disadvantages of this bill? Today you have learnt about some algorithms for searching can you name them below. Which was the most efficient? Self Assessment: R A G 17

18 8. End of term assessment End of term round up: What have you most enjoyed this term? What have you least enjoyed? What would you like to learn more about? 18

19 Self Assessment: R A G STRENGTH TARGET ACTION GRADE Green Pen Activity: 19

20 Keywords Virtual Learning Environment (VLE) A computer system that helps teachers by allowing them to provide learning resources to pupils and monitor their progress. AND gate A logic gate that has two inputs. If both inputs are 1 it will output 1, otherwise it will output 0. NOT gate A logic gate that has one input. If the input is 0, its output is 1. If the input is 1, its output is 0. OR gate A logic gate that has two inputs. If either or both of the two inputs is 1, its output is 1. File transfer protocol (ftp) An agreed system and set of rules that allow different programs to transfer files across different computers over the internet. Firewall Malware Adware Anti-malware Antivirus LAN Packet WAN Domain name HTML Internet IP address Protocol Router TCP/IP Algorithm A utility or device that monitors the traffic between a computer and the internet and only allows connections that are authorised. Any program, such as viruses, worms, trojans and adware, that are designed to be harmful to the computer on which they are run. A program that repeatedly and disruptively displays advertisements on a user s computer. A utility that searches for and removes any malware on a computer. A utility that searches for and removes any viruses on a computer. Local area network A unit of data sent on a packet switching network. Wide area network Name assigned to a resource on the internet. Hypertext Markup Language. The language used to define pages on the world wide web and similar networks. An international network of networks. Internet protocol number: the unique number that identifies a resource on the internet. Rules/standards for devices to communicate. A device that connects networks. Transmission control protocol/internet protocol A set of rules specifying a how to solve a problem. 20

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7 Computing at Cox Green Curriculum Plan Key Stage 3 Year 7 Term 1 Term 2 Term 3 Term 4 Term 5 Term 6 E-safety Database Programming Spreadsheet and modelling Web design How data is represented in s? How

More information

ICT & Computing Progress Grid

ICT & Computing Progress Grid ICT & Computing Progress Grid Pupil Progress ion 9 Select, Algorithms justify and apply appropriate techniques and principles to develop data structures and algorithms for the solution of problems Programming

More information

It pays to stop and think

It pays to stop and think It pays to stop and think Protect yourself from financial fraud Together we thrive 2 In the first six months of 2018, over 34,000 people were scammed out of 145.4m At HSBC, we work hard to keep our customers

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) 1. An organization is planning to train all staff online rather than video-conference. Describe what is meant by a web conference. 2. Explain the differences

More information

Bowie Senior Center Surfing the Web

Bowie Senior Center Surfing the Web Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better

More information

Chapter 5: Networking and the Internet

Chapter 5: Networking and the Internet Chapter 5: Networking and the Internet (Completion Time: 3 weeks) Topics: Internet Basics An overview of how the internet works and how we as users interact with it. This topic can also be used as sort

More information

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Internet and  Mini.K.G Senior Scientist, FRAD, CMFRI Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Topic 4 Transfer of Data in ICT Systems

Topic 4 Transfer of Data in ICT Systems Topic 4 Transfer of Data in ICT Systems Key The Key concepts for this topic are: Students awareness of current and emerging communication technologies Basic elements of an ICT network Characteristics of

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans

More information

3.2 COMMUNICATION AND INTERNET TECHNOLOGIES

3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2.1 PROTOCOLS PROTOCOL Protocol a set of rules governing the way that devices communicate with each other. With networks and the Internet, we need to allow

More information

MBChB Student E-portfolio Guide Year /18

MBChB Student E-portfolio Guide Year /18 MBChB Student E-portfolio Guide Year 2 2017/18 This document is a step by step guide covering the use of the e- portfolio system and the customised forms that have been created, allowing you to record

More information

Class X Chapter 1 Internet

Class X Chapter 1 Internet Class X Chapter 1 Internet I. Word Search Find and circle seven terms related to this chapter. I S A C O M P U T E R Q X E N A M Y U N L B G S S J T X T Y W A E I O U G D Q F W B E B R S Q W J U F A A

More information

Lesson-1 Computer Security

Lesson-1 Computer Security Threats to computer Security: What do they mean by a threat? Lesson-1 Computer Security A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to

More information

MBChB Student E-portfolio Guide Year /18

MBChB Student E-portfolio Guide Year /18 MBChB Student E-portfolio Guide Year 3 2017/18 This document is a step by step guide covering the use of the e- portfolio system and the customised forms that have been created, allowing you to record

More information

Internet Concepts ML Study Guide Created by Advisers

Internet Concepts ML Study Guide Created by Advisers Description of Internet Concepts ML: The written objective test may consist of general information about the Internet, world wide web, browsers, e-mail, computer security, ethics, and privacy. 1 It is

More information

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer.

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer. Purpose - Why the Client Needs the Network: The client needs the network for their office in a nearby town for their small company Mesh Networking Solutions. These people are all using stand-alone computer

More information

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC 1 regulations, Frankfort Plant Board (FPB) provides this information about our broadband Internet access

More information

Anti-Cyber Bullying Policy.

Anti-Cyber Bullying Policy. Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.

More information

F9A0 04 (ESKINT2): Using the Internet 2

F9A0 04 (ESKINT2): Using the Internet 2 F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Staff AUP (Acceptable Use Policy)

Staff AUP (Acceptable Use Policy) Guidance review Date April 2014 Date of next Review April 2016 Who reviewed this Guidance? Deputy Headteacher Guidance: Staff AUP (Acceptable Use Policy) Rights Responsibilities How does the school protect

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

News English.com Ready-to-use ESL / EFL Lessons

News English.com Ready-to-use ESL / EFL Lessons www.breaking News English.com Ready-to-use ESL / EFL Lessons 1,000 IDEAS & ACTIVITIES FOR LANGUAGE TEACHERS The Breaking News English.com Resource Book http://www.breakingnewsenglish.com/book.html Top

More information

SUMMARIES OF INTERACTIVE MULTIMEDIA

SUMMARIES OF INTERACTIVE MULTIMEDIA SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

MBChB Student E-portfolio Guide Year /18

MBChB Student E-portfolio Guide Year /18 MBChB Student E-portfolio Guide Year 1 2017/18 This document guides you through using the e- portfolio system and the customised forms that have been created, allowing you to record your activities and

More information

MBChB Student E-portfolio Guide Year /18

MBChB Student E-portfolio Guide Year /18 MBChB Student E-portfolio Guide Year 4 2017/18 This document is a step by step guide covering the use of the e- portfolio system and the customised forms that have been created, allowing you to record

More information

Using web-based

Using web-based Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

Digital Safety and Digital Citizenship

Digital Safety and Digital Citizenship Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself

More information

Southam College Computing & ICT Department. Summer Project

Southam College Computing & ICT Department. Summer Project Student Name: contact: sycamore.s@welearn365.com Southam College Computing & ICT Department Summer Project This booklet provides several tasks for you to update your current knowledge and learn new concepts

More information

Network Communications Standards. Applied Information Technology

Network Communications Standards. Applied Information Technology Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as

More information

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

The exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names

The exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names The exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names Lets Communicate - Chapter 1 : Mobile Phone Features Smart Phone A phone offering

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

Employee Security Awareness Training

Employee Security Awareness Training Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical

More information

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date 1. A Network consists of 2. A Point-to-Point Topology 3. The Internet is 1. Select the correct answer one computer computers

More information

LRS File Transfer Service

LRS File Transfer Service LRS File Transfer Service Version 2 User Guide October 27, 2017 Introduction The LRS File Transfer Service offers customers a secure way to send and receive files using HTTPS or FTPS protocols. This can

More information

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at   Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

Internet. Telephone Line

Internet. Telephone Line Internet The Internet (International Network) is a network of computers from all over the world linked together by telephone lines, fibre optic cables and satellite. Millions of users from all around the

More information

KS3 Programme of Study Subject: Computing Year group: Y7

KS3 Programme of Study Subject: Computing Year group: Y7 KS3 Programme of Study Subject: Computing Year group: Y7 Cybercrime 14/11/16 2/12/16 due AF1 Introduction - savings, set up folders, Health and Safety, Classroom Rules How to log on and secure passwords

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Computing 1: Computer Systems

Computing 1: Computer Systems U1 U2 U3 1 2 3 Computing 1: Computer Systems G: I know how to create strong passwords G: I know how to stay safe online and how to alert an adult if I am worried about anything G: I can list a range of

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Quick Installation Guide

Quick Installation Guide V50.02 Model: FI8918W Quick Installation Guide Indoor Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 14 Quick Installation Guide For Windows OS Package Contents

More information

Downloaded from

Downloaded from Unit-V Network and Communication Technology Network and Communication Technology Chapter: 09 A Network is a collection of interconnected autonomous computers. A Computer which is a part of a network is

More information

Stratford School Academy Schemes of Work

Stratford School Academy Schemes of Work Number of weeks (between 6&8) Content of the unit Assumed prior learning (tested at the beginning of the unit) 6 This is a theoretical unit covering the basic principles and architecture of local and wide

More information

Hotmail - An Introduction to a Web-Based system

Hotmail - An Introduction to a Web-Based  system http://www.hotmail.com/ Hotmail - An Introduction to a Web-Based E-mail system Morten Rask Aalborg University rask@i4.auc.dk http://www.i4.auc.dk/rask/ This document serves as teaching material at the

More information

Broadband Internet Access Disclosure

Broadband Internet Access Disclosure Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided

More information

Key Stage 1: Computing

Key Stage 1: Computing Weaving Computing Knowledge, Skills and Understanding into the new National Curriculum Key Stage 1: Computing 1 National Curriculum Requirements of Computing at Key Stage 1 Pupils should be taught to:

More information

COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4

COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4 This course will run the two units, 3 and 4, concurrently. The student Semester 1 grade will therefore be an estimate. Term Knowledge Skills Assessment 1 1 Introduction introduction to the course assessment

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the

More information

GOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail

GOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail GOOGLE APPS GETTING STARTED Page 02 Prerequisites What You Will Learn INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail DRIVE Page 07 Uploading Files to Google Drive Sharing/Unsharing

More information

Bell County District Attorney. E-Discovery Portal. Quick Guide for Attorneys. 3/17/2014 Version 1.2

Bell County District Attorney. E-Discovery Portal. Quick Guide for Attorneys. 3/17/2014 Version 1.2 Bell County District Attorney E-Discovery Portal Quick Guide for Attorneys 3/17/2014 Version 1.2 Information and System Requirements The E-Discovery portal has been developed to provide the District Attorney

More information

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable? Introduction Controlling Information Systems When computer systems fail to work as required, firms that depend heavily on them experience a serious loss of business function. M7011 Peter Lo 2005 1 M7011

More information

Student Portal. A guide for students. Department of Education and Training, Western Australia,

Student Portal. A guide for students. Department of Education and Training, Western Australia, Student Portal A guide for students Department of Education and Training, Western Australia, 2009 1 Table of Contents What is the Portal?...3 What will I need to access the portal?...3 Safety and responsibility

More information

Your computer, the internet, and the web. A brief overview

Your computer, the internet, and the web. A brief overview Your computer, the internet, and the web A brief overview Your computer Windows computers place the operating system on the C: drive Your computer Hard disks are organized into files and folders using

More information

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider. Local area network (LAN) Network of computers located close together Wide area networks (WANs) Networks of computers connected over greater distances Based on Chapter 2 of Gary Schneider. (2009). E-Business.

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

1. Web Technology... 6

1. Web Technology... 6 TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components

More information

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet

More information

Quick Heal Total Security

Quick Heal Total Security For secure online banking, smooth Internet surfing, and robust protection for your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Grand Orange Lodge of Ireland Privacy Notice

Grand Orange Lodge of Ireland Privacy Notice Grand Orange Lodge of Ireland Privacy Notice Introduction The Grand Orange Lodge of Ireland is registered with the Information Commissioner s Office for the purposes of compliance with the Data Protection

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Topic Course Activities

Topic Course Activities The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge

More information

Basic Computer Skills - Class 1 - Computer Vocabulary

Basic Computer Skills - Class 1 - Computer Vocabulary Basic Computer Skills - Class 1 - Computer Vocabulary Projector Today s Northstar Targets: Basic Computer Skills Distinguish between desktop and laptop computers Identify specific computer hardware: a

More information

Practice Examination 3

Practice Examination 3 Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination

More information

The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules.

The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules. The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules. Service Offerings Jefferson Telephone Company via the Jefferson Telephone Company brand directly offers

More information

Management Information Systems

Management Information Systems Telecommunications, the Internet, and Wireless Technology Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards Foundation,

More information

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory ) Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Learning and Development. UWE Staff Profiles (USP) User Guide

Learning and Development. UWE Staff Profiles (USP) User Guide Learning and Development UWE Staff Profiles (USP) User Guide About this training manual This manual is yours to keep and is intended as a guide to be used during the training course and as a reference

More information

CONTENTS 1) GENERAL. 1.1 About this guide About the CPD Scheme System Compatibility. 3 2) SYSTEM SET-UP

CONTENTS 1) GENERAL. 1.1 About this guide About the CPD Scheme System Compatibility. 3 2) SYSTEM SET-UP CONTENTS 1) GENERAL 1.1 About this guide. 1 1.2 About the CPD Scheme 2 1.3 System Compatibility. 3 2) SYSTEM SET-UP 2.1 Setting up your CPD year. 5 2.2 Requesting a date change for your CPD year. 9 2.3

More information

STUDENT ICT ACCEPTABLE USE POLICY

STUDENT ICT ACCEPTABLE USE POLICY The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a

More information

Analytics, Insights, Cookies, and the Disappearing Privacy

Analytics, Insights, Cookies, and the Disappearing Privacy Analytics, Insights, Cookies, and the Disappearing Privacy What Are We Talking About Today? 1. Logfiles 2. Analytics 3. Google Analytics 4. Insights 5. Cookies 6. Privacy 7. Security slide 2 Logfiles Every

More information

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information