STUDENT TEACHER CLASS TARGET GRADE. Learning outcome achieved
|
|
- Chastity Flowers
- 5 years ago
- Views:
Transcription
1 Tick Level Lesson STUDENT TEACHER CLASS TARGET GRADE WORKING AT GRADE Learning outcome achieved Achieved a level 3 in the baseline assessment 5 Achieved a level 4 in the baseline assessment 6 Achieved a level 5 in the baseline assessment 4 I can select, combine and use internet services. 5 I know the potential of information technology for collaboration when computers are networked. I know names of hardware e.g. hubs, routers, switches, and the names of protocols e.g. SMTP, imap, 6 POP, FTP, TCP/IP, associated with networking systems. I can show responsible use of technologies and online services, and I know a range of ways to report 4 concerns I can recognise ethical issues surrounding the application of information technology beyond school. I can use technologies and online services securely, and I know how to identify and report inappropriate conduct. I can show responsible use of technologies and online services, and I know a range of ways to report concerns I can recognise ethical issues surrounding the application of information technology beyond school. I can use technologies and online services securely, and I know how to identify and report inappropriate conduct. I can show responsible use of technologies and online services, and I know a range of ways to report concerns. 5 I can recognise ethical issues surrounding the application of information technology beyond school. I can use technologies and online services securely, and I know how to identify and report inappropriate 6 conduct I know the difference between physical, wireless and mobile networks. I know data transmission between digital computers over networks, including the internet i.e. IP addresses and packet switching. I know names of hardware e.g. hubs, routers, switches, and the names of protocols e.g. SMTP, imap, POP, FTP, TCP/IP, associated with networking systems. I know how to effectively use search engines, and I know how search results are selected, including that search engines use 'web crawler programs'. I know how search engines rank search results. 6 I can identify and explain how the use of technology can impact on society. 4 Achieved a level 4 in the end of term assessment 5 Achieved a level 5 in the end of term assessment 6 Achieved a level 6 in the end of term assessment 1
2 1. Baseline assessment Can you match the keyword to the correct definition? REPETITION A set of step by step instructions that solves a problem SEQUENCE Repeating an instruction a number of times PROGRAM Finding errors and fixing them OUTPUT Data that is given to a computer system ALGORITHM A list of instructions that tell a computer what to do SELECTION Having different choices to make DEBUG Instructions that are placed in order and happen one after another INPUT Something that stores data for the computer to remember Self Assessment: R A G 2
3 2. Understanding Browsers Can you match the logo to the correct internet browser? Mozilla Firefox Netscape TheWorld Tencent Traveler Opera Internet Explorer Chrome Maxthon Safari My IP address is: 3
4 Research the advantages and disadvantages of changing security settings and list them below: ADVANTAGES DISADVANTAGES There are lots of different internet browsers available to download. Research at least three and then write a report for Pixel Pro, an independent games developer, about what internet browser they should use and why try to use key words (see back back of workbook). Upload your completed work to Edmodo. Self Assessment: R A G 4
5 3. Spot the Scam Below is an example of a phishing can you identify anything that makes it stand out as a scam? Make a list below. Research one of the following types of scams and create a presentation explaining what the scam is, how it works and how to avoid it. You should include real world examples. Chain s / Scareware / Mobile phone missed calls / Text message marketing / Phone-paid services 5
6 Your teacher will show you six examples of possible scams. Your job is to identify whether each one is real or a scam and then explain why you think this. Example Scam or Real Why? Self Assessment: R A G 6
7 4. Safety Savvy Read the news story below and then answer the questions. British hacker, 21, jailed for infiltrating Selena Gomez's Facebook page... and reading personal s to boyfriend Justin Bieber By EMILY SHERIDAN Published: 14:20, 21 May 2012 A British fast-food worker has been jailed for hacking into American singer/actress Selena Gomez's Facebook page. Gareth Crosskey, 21, of Lancing, West Sussex, posed as the 19-year-old star's step -father Brian Teefey to convince staff at the social networking firm to change passwords to her account. He then infiltrated her personal page, posting negative statements about her boyfriend Justin Bieber and also reading personal messages between the couple. Former McDonald's employee Crosskey, who was 19 at the time of the hacking in January 2011, was jailed for 12 months after admitting two offences under the Computer Misuse Act. After reading her s, Crosskey contacted OK! and Hollywood Life magazines offering them information about Gomez, who was yet to go public with her romance with Bieber at the time. He posted 'Justin Bieber sucks' on her Facebook page - which also appeared on her Twitter account - prompting a wave of abuse from devoted Bieber fans. Crosskey then wrote to the singer's stepfather Teefey claiming he had hacked into at least four personal accounts and had copied messages between her and her famous boyfriend. Judge John Price at Southwark Crown Court told Crosskey: 'You are clever with a computer and you hacked into the private part of somebody's Facebook account - that somebody was a singer, a celebrity called Selena Gomez. 'People deserve privacy and should not their private correspondence by made public. 'People are entitles to privacy even those who seek publicity.' Prosecutor Corrine Bramwell said Crosskey also boasted about the incident by posting a video on YouTube demonstrating how he had hacked the page. Bramwell said the singer's team spent three days trying to regain control of the Facebook page. A joint 50,000 investigation between the Federal Bureau of Investigation (FBI) and MeT's E-Crime Unit eventually traced Crosskey to his home in West Sussex. He was found using an IP address linked to his home and a Wi-Fi network at the McDonald's branch where he was employed at the time. Gareth Morgan, defending, said: 'This defendant was 19 when he embarked on this course of action, he is now 21. 'He accepts his actions have caused distress and alarm and he accepts that his actions were stupid.' Source: How many months was Crosskey jailed for? Which celebrity did Crosskey hack and what did he hack into? How was he found? 7
8 One of the simplest ways that people have their accounts hacked is through someone else finding out their password. Sometimes this is due to people using the same password for all accounts. One way to avoid this is to use an algorithm to help you to set a unique password for each website and help you to remember it. Use the space below to come up with a set of instructions to set a strong password. Find a definition for Bluejacking: Some websites may not be what they seem and you could pick up a computer virus. Name a virus and what kind of software you need to remove it. 8
9 Choose one of the following internet services: shopping, gaming or social networking and explain how you can stay safe while online. Self Assessment: R A G 9
10 STRENGTH TARGET ACTION GRADE Green Pen Activity: 5. Safe social networking On the next page is an example of a Facebook account, can you see any problems with the information that Michael has shared circle anything that stands out to you as a concern. 10
11 When you sign up for a social networking site you have to go through some security checks. Give some examples of these and explain why these are needed: Create a poster explaining how to set up your security settings for Facebook and why. Submit your poster on Edmodo. Self Assessment: R A G 11
12 6. Connecting to the internet When you visit a website the packets of data have to travel between several servers. Go to to trace the route to your favourite site Draw the route taken by the packet data from your favourite website: 12
13 The data that all internet traffic is split down into is called: Using the internet to help you can you match up the term, abbreviation and description correctly? Term Abbreviation Description Point of Presence NAP The protocol which takes data from a user s application program and passes it to the IP for transfer across the internet. The reverse operation is performed at the destination computer, i.e. the TCP reassembles the data (from individual packets) and forwards them to the user s application program. The close relation with the IP means that the terms are Network Access Point TCP A standard protocol which allows files to be transferred between two computers on a TCP-based network. It is commonly used to download programs to your computer from other servers and to upload web pages that you have created to the server that is hosting Internet Protocol ISP An access point to the internet. Normally, it is a location which contains all of the hardware which allows internet users access to the internet. An Internet Service Provider (ISP) may operate several PoPs in their area to allow good access to the internet. Transmission FTP An interchange between Control Protocol File Transfer Protocol Internet Service Provider IP POP networks within the internet. It allows ISP s to interconnect with each other Which of the above protocols would be involved in sending an ? Direct connection to the internet would be very costly and so ISPs provide a costeffective gateway for people and organisations to get onto the internet. In the UK there are many ISPs, with some of the most popular ones being BT (British Telecom), Virgin Media and Sky. The protocol used to route packets of information across the internet 13
14 Computers need to be connected to a network in order to access the internet. Write the descriptions next to the correct piece of hardware. Self Assessment: R A G 14
15 7. Communicating Online Using what you learnt last lesson complete the diagram below: How travels Read Outbox Internet Inbox Write Senders ISP Recipients ISP You will have used a search engine lots of times to find out information but do you know how one works. Go to and answer the questions below. The world wide web is made up of more than how many pages? How does a search engine navigate from page to page? Where are the results of this stored? 15
16 What kind of things does Google have algorithms for? What is an algorithm? Are the results displayed in a random order? How many factors are used to rank results? A new bill has recently been passed which allows people the right to be forgotten. What do you think this means? 16
17 What are the advantages and disadvantages of this bill? Today you have learnt about some algorithms for searching can you name them below. Which was the most efficient? Self Assessment: R A G 17
18 8. End of term assessment End of term round up: What have you most enjoyed this term? What have you least enjoyed? What would you like to learn more about? 18
19 Self Assessment: R A G STRENGTH TARGET ACTION GRADE Green Pen Activity: 19
20 Keywords Virtual Learning Environment (VLE) A computer system that helps teachers by allowing them to provide learning resources to pupils and monitor their progress. AND gate A logic gate that has two inputs. If both inputs are 1 it will output 1, otherwise it will output 0. NOT gate A logic gate that has one input. If the input is 0, its output is 1. If the input is 1, its output is 0. OR gate A logic gate that has two inputs. If either or both of the two inputs is 1, its output is 1. File transfer protocol (ftp) An agreed system and set of rules that allow different programs to transfer files across different computers over the internet. Firewall Malware Adware Anti-malware Antivirus LAN Packet WAN Domain name HTML Internet IP address Protocol Router TCP/IP Algorithm A utility or device that monitors the traffic between a computer and the internet and only allows connections that are authorised. Any program, such as viruses, worms, trojans and adware, that are designed to be harmful to the computer on which they are run. A program that repeatedly and disruptively displays advertisements on a user s computer. A utility that searches for and removes any malware on a computer. A utility that searches for and removes any viruses on a computer. Local area network A unit of data sent on a packet switching network. Wide area network Name assigned to a resource on the internet. Hypertext Markup Language. The language used to define pages on the world wide web and similar networks. An international network of networks. Internet protocol number: the unique number that identifies a resource on the internet. Rules/standards for devices to communicate. A device that connects networks. Transmission control protocol/internet protocol A set of rules specifying a how to solve a problem. 20
INTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationComputing at Cox Green Curriculum Plan. Key Stage 3 Year 7
Computing at Cox Green Curriculum Plan Key Stage 3 Year 7 Term 1 Term 2 Term 3 Term 4 Term 5 Term 6 E-safety Database Programming Spreadsheet and modelling Web design How data is represented in s? How
More informationICT & Computing Progress Grid
ICT & Computing Progress Grid Pupil Progress ion 9 Select, Algorithms justify and apply appropriate techniques and principles to develop data structures and algorithms for the solution of problems Programming
More informationIt pays to stop and think
It pays to stop and think Protect yourself from financial fraud Together we thrive 2 In the first six months of 2018, over 34,000 people were scammed out of 145.4m At HSBC, we work hard to keep our customers
More informationSecurity Awareness. Presented by OSU Institute of Technology
Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless
More informationComputer networks 2013
Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages
More informationnetworks List various types of networks and their
Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationNETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)
NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) 1. An organization is planning to train all staff online rather than video-conference. Describe what is meant by a web conference. 2. Explain the differences
More informationBowie Senior Center Surfing the Web
Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationChapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network
Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationTechnology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University
Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better
More informationChapter 5: Networking and the Internet
Chapter 5: Networking and the Internet (Completion Time: 3 weeks) Topics: Internet Basics An overview of how the internet works and how we as users interact with it. This topic can also be used as sort
More informationInternet and Mini.K.G Senior Scientist, FRAD, CMFRI
Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several
More informationQuick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.
AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware
More informationTopic 4 Transfer of Data in ICT Systems
Topic 4 Transfer of Data in ICT Systems Key The Key concepts for this topic are: Students awareness of current and emerging communication technologies Basic elements of an ICT network Characteristics of
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationElementary Computing CSC 100. M. Cheng, Computer Science
Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans
More information3.2 COMMUNICATION AND INTERNET TECHNOLOGIES
3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2.1 PROTOCOLS PROTOCOL Protocol a set of rules governing the way that devices communicate with each other. With networks and the Internet, we need to allow
More informationMBChB Student E-portfolio Guide Year /18
MBChB Student E-portfolio Guide Year 2 2017/18 This document is a step by step guide covering the use of the e- portfolio system and the customised forms that have been created, allowing you to record
More informationClass X Chapter 1 Internet
Class X Chapter 1 Internet I. Word Search Find and circle seven terms related to this chapter. I S A C O M P U T E R Q X E N A M Y U N L B G S S J T X T Y W A E I O U G D Q F W B E B R S Q W J U F A A
More informationLesson-1 Computer Security
Threats to computer Security: What do they mean by a threat? Lesson-1 Computer Security A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to
More informationMBChB Student E-portfolio Guide Year /18
MBChB Student E-portfolio Guide Year 3 2017/18 This document is a step by step guide covering the use of the e- portfolio system and the customised forms that have been created, allowing you to record
More informationInternet Concepts ML Study Guide Created by Advisers
Description of Internet Concepts ML: The written objective test may consist of general information about the Internet, world wide web, browsers, e-mail, computer security, ethics, and privacy. 1 It is
More informationEveryone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer.
Purpose - Why the Client Needs the Network: The client needs the network for their office in a nearby town for their small company Mesh Networking Solutions. These people are all using stand-alone computer
More informationFRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES
FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC 1 regulations, Frankfort Plant Board (FPB) provides this information about our broadband Internet access
More informationAnti-Cyber Bullying Policy.
Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.
More informationF9A0 04 (ESKINT2): Using the Internet 2
F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationStaff AUP (Acceptable Use Policy)
Guidance review Date April 2014 Date of next Review April 2016 Who reviewed this Guidance? Deputy Headteacher Guidance: Staff AUP (Acceptable Use Policy) Rights Responsibilities How does the school protect
More informationYour security on click Jobs
Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can
More informationNews English.com Ready-to-use ESL / EFL Lessons
www.breaking News English.com Ready-to-use ESL / EFL Lessons 1,000 IDEAS & ACTIVITIES FOR LANGUAGE TEACHERS The Breaking News English.com Resource Book http://www.breakingnewsenglish.com/book.html Top
More informationSUMMARIES OF INTERACTIVE MULTIMEDIA
SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes
More informationIntroduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University
Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one
More informationMBChB Student E-portfolio Guide Year /18
MBChB Student E-portfolio Guide Year 1 2017/18 This document guides you through using the e- portfolio system and the customised forms that have been created, allowing you to record your activities and
More informationMBChB Student E-portfolio Guide Year /18
MBChB Student E-portfolio Guide Year 4 2017/18 This document is a step by step guide covering the use of the e- portfolio system and the customised forms that have been created, allowing you to record
More informationUsing web-based
Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office
More informationInternet Architecture
Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use
More informationReview Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning
Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called
More informationPUPIL ICT ACCEPTABLE USE POLICY
PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status
More informationDigital Safety and Digital Citizenship
Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself
More informationSoutham College Computing & ICT Department. Summer Project
Student Name: contact: sycamore.s@welearn365.com Southam College Computing & ICT Department Summer Project This booklet provides several tasks for you to update your current knowledge and learn new concepts
More informationNetwork Communications Standards. Applied Information Technology
Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as
More informationChapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationThe exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names
The exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names Lets Communicate - Chapter 1 : Mobile Phone Features Smart Phone A phone offering
More informationIntroduction to
Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More informationEmployee Security Awareness Training
Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical
More informationThe City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date
The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date 1. A Network consists of 2. A Point-to-Point Topology 3. The Internet is 1. Select the correct answer one computer computers
More informationLRS File Transfer Service
LRS File Transfer Service Version 2 User Guide October 27, 2017 Introduction The LRS File Transfer Service offers customers a secure way to send and receive files using HTTPS or FTPS protocols. This can
More informationFull file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T
More informationComputer Networking. Chapter #1. Dr. Abdulrhaman Alameer
Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among
More informationMain area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation
Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]
More informationInternet. Telephone Line
Internet The Internet (International Network) is a network of computers from all over the world linked together by telephone lines, fibre optic cables and satellite. Millions of users from all around the
More informationKS3 Programme of Study Subject: Computing Year group: Y7
KS3 Programme of Study Subject: Computing Year group: Y7 Cybercrime 14/11/16 2/12/16 due AF1 Introduction - savings, set up folders, Health and Safety, Classroom Rules How to log on and secure passwords
More informationNetworking and Health Information Exchange: ISO Open System Interconnection (OSI)
Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection
More informationComputing 1: Computer Systems
U1 U2 U3 1 2 3 Computing 1: Computer Systems G: I know how to create strong passwords G: I know how to stay safe online and how to alert an adult if I am worried about anything G: I can list a range of
More informationAIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
More informationQuick Installation Guide
V50.02 Model: FI8918W Quick Installation Guide Indoor Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 14 Quick Installation Guide For Windows OS Package Contents
More informationDownloaded from
Unit-V Network and Communication Technology Network and Communication Technology Chapter: 09 A Network is a collection of interconnected autonomous computers. A Computer which is a part of a network is
More informationStratford School Academy Schemes of Work
Number of weeks (between 6&8) Content of the unit Assumed prior learning (tested at the beginning of the unit) 6 This is a theoretical unit covering the basic principles and architecture of local and wide
More informationHotmail - An Introduction to a Web-Based system
http://www.hotmail.com/ Hotmail - An Introduction to a Web-Based E-mail system Morten Rask Aalborg University rask@i4.auc.dk http://www.i4.auc.dk/rask/ This document serves as teaching material at the
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationKey Stage 1: Computing
Weaving Computing Knowledge, Skills and Understanding into the new National Curriculum Key Stage 1: Computing 1 National Curriculum Requirements of Computing at Key Stage 1 Pupils should be taught to:
More informationCOURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4
This course will run the two units, 3 and 4, concurrently. The student Semester 1 grade will therefore be an estimate. Term Knowledge Skills Assessment 1 1 Introduction introduction to the course assessment
More informationNetworking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3
Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the
More informationGOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail
GOOGLE APPS GETTING STARTED Page 02 Prerequisites What You Will Learn INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail DRIVE Page 07 Uploading Files to Google Drive Sharing/Unsharing
More informationBell County District Attorney. E-Discovery Portal. Quick Guide for Attorneys. 3/17/2014 Version 1.2
Bell County District Attorney E-Discovery Portal Quick Guide for Attorneys 3/17/2014 Version 1.2 Information and System Requirements The E-Discovery portal has been developed to provide the District Attorney
More informationIntroduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?
Introduction Controlling Information Systems When computer systems fail to work as required, firms that depend heavily on them experience a serious loss of business function. M7011 Peter Lo 2005 1 M7011
More informationStudent Portal. A guide for students. Department of Education and Training, Western Australia,
Student Portal A guide for students Department of Education and Training, Western Australia, 2009 1 Table of Contents What is the Portal?...3 What will I need to access the portal?...3 Safety and responsibility
More informationYour computer, the internet, and the web. A brief overview
Your computer, the internet, and the web A brief overview Your computer Windows computers place the operating system on the C: drive Your computer Hard disks are organized into files and folders using
More informationINTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com
INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationLocal area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.
Local area network (LAN) Network of computers located close together Wide area networks (WANs) Networks of computers connected over greater distances Based on Chapter 2 of Gary Schneider. (2009). E-Business.
More informationQuick Heal AntiVirus Pro. Tough on malware, light on your PC.
Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects
More information1. Web Technology... 6
TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components
More informationJianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.
Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet
More informationQuick Heal Total Security
For secure online banking, smooth Internet surfing, and robust protection for your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware
More informationGrand Orange Lodge of Ireland Privacy Notice
Grand Orange Lodge of Ireland Privacy Notice Introduction The Grand Orange Lodge of Ireland is registered with the Information Commissioner s Office for the purposes of compliance with the Data Protection
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationTopic Course Activities
The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge
More informationBasic Computer Skills - Class 1 - Computer Vocabulary
Basic Computer Skills - Class 1 - Computer Vocabulary Projector Today s Northstar Targets: Basic Computer Skills Distinguish between desktop and laptop computers Identify specific computer hardware: a
More informationPractice Examination 3
Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination
More informationThe following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules.
The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules. Service Offerings Jefferson Telephone Company via the Jefferson Telephone Company brand directly offers
More informationManagement Information Systems
Telecommunications, the Internet, and Wireless Technology Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards Foundation,
More informationCOMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )
Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin
More informationPROTECTING YOUR BUSINESS ASSETS
PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina
More informationLearning and Development. UWE Staff Profiles (USP) User Guide
Learning and Development UWE Staff Profiles (USP) User Guide About this training manual This manual is yours to keep and is intended as a guide to be used during the training course and as a reference
More informationCONTENTS 1) GENERAL. 1.1 About this guide About the CPD Scheme System Compatibility. 3 2) SYSTEM SET-UP
CONTENTS 1) GENERAL 1.1 About this guide. 1 1.2 About the CPD Scheme 2 1.3 System Compatibility. 3 2) SYSTEM SET-UP 2.1 Setting up your CPD year. 5 2.2 Requesting a date change for your CPD year. 9 2.3
More informationSTUDENT ICT ACCEPTABLE USE POLICY
The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched
More informationMULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a
More informationAnalytics, Insights, Cookies, and the Disappearing Privacy
Analytics, Insights, Cookies, and the Disappearing Privacy What Are We Talking About Today? 1. Logfiles 2. Analytics 3. Google Analytics 4. Insights 5. Cookies 6. Privacy 7. Security slide 2 Logfiles Every
More informationChapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts
E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More information