SUMMARIES OF INTERACTIVE MULTIMEDIA

Similar documents
ECDL / ICDL IT Security. Syllabus Version 2.0

SECURE USE OF IT Syllabus Version 2.0

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Security Awareness. Presented by OSU Institute of Technology

Introduction to

INTERNET SAFETY IS IMPORTANT

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

F9A0 04 (ESKINT2): Using the Internet 2

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

How To Remove Personal Antivirus Security Pro Virus

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Chapter 6 Network and Internet Security and Privacy

Unit 2 Assignment 2. Software Utilities?

Personal Cybersecurity

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Bowie Senior Center Surfing the Web

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Securing Information Systems

In this class, we'll talk about some of the features and advantages of Gmail, and study the Gmail window.

IT is Grade 10

BEST PRACTICES FOR PERSONAL Security

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Model Paper Information Technology (402) Class IX

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Course Outline (version 2)

This module allows candidates to understand the concept of presentations and to demonstrate competence in using presentation software.

Download firefox with virus protection

IT JARGON BUSTERS NETWORKING TERMS

Essential Library Competencies

The exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names

Cyber Security Practice Questions. Varying Difficulty

Chapter 9 Security and Privacy

Introducing the CSC SSM

Built without compromise for users who want it all

Cyber Security Guide for NHSmail

Frequently Asked Questions (FAQ)

Base Module - Computer Essentials

Online Security and Safety Protect Your Computer - and Yourself!

Unit 2 Essentials of cyber security

4 Information Security

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

The best for everyday PC users

Airtel PC Secure Trouble Shooting Guide

Systems and Principles Unit Syllabus

NHS South Commissioning Support Unit

The process by which a user can associate specific permissions to each username.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

INFORMATION TECHNOLOGY 402

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

Get Max Internet Security where to buy software for students ]

CONTENTS. Internet Basics. Internet Explorer. Search Engines. . Advantages and Disadvantages of the Internet. Some good websites

Certified Cyber Security Analyst VS-1160

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Computer networks 2013

FAQ. Usually appear to be sent from official address

University of Tennessee at Chattanooga ARCS, Michael Ward, Basic Windows Security

Zillya Internet Security User Guide

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

PROTECTING YOUR BUSINESS ASSETS

Chapter 12. Information Security Management

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Using WebQuarantine for Managing Quarantined Messages

Octopus Online Service Safety Guide

Firewall Antivirus For Windows Xp Full Version 2013

COURSE OUTLINE: OAD116 - COMPUTER ESSENTIALS

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

Quick Heal Total Security

Grade 10 IT work schedule break down 2018

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

ProofPoint Protection Perimeter Security Daily Digest and Configuration Guide. Faculty/Staff Guide

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

2 User Guide. Contents

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Chapter 1 B: Exploring the Network

Training UNIFIED SECURITY. Signature based packet analysis

Cyber Security Basics. Presented by Darrel Karbginsky

How To Remove Personal Antivirus Security Pro Virus Manually

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Optimized Communications Optimized Security Optimized Expressions Optimized Performance Optimized for Your Family...

The ICT4me Curriculum

The ICT4me Curriculum

As the length of terms varies from one year to another, the teaching plan/work schedules should be adapted accordingly on a year-to-year basis.

(electronic mail) is the exchange of computer-stored messages by telecommunication.

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Real protection against real threats

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

Kaspersky PURE 2.0. Mail Anti-Virus: security levels

Developing Web Applications

Comparison Of Antivirus Software

Transcription:

SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes Send and reply to e-mails Attach documents and forward e-mails Use your Contacts, Contact Groups and Address Book Manage your Inbox Use your Calendar and Tasks It is important to know the difference between the 2 main tpes of internet address, details of which are provided in this lesson. The lessons provides detailed steps on how to: Compose e-mails Attach documents to e-mails Send e-mails Reply to e-mails Forward e-mails Also be sure to follow the steps provided for managing Contacts Using folders and sub-folders makes it much easier to manage e-mails. There are 3 easy steps: 1. Right click on the Inbox 2. Choose New Folder from the menu that appears 3. Enter the name of the new folder in the field name and press OK This lesson also explains other things you can do with mail, like: Group e-mails Set up rules for e-mails 1

Prioritise e-mails Archive e-mails Use the calendar Use tasks 2. Using Electronic Communications By the end of this lesson you will be able to: Identify several different digital communication modes and devices that are commonly used Apply acceptable netiquette rules for electronic mail and online social activities Explain the social implications and threats relating to electronic communication and Internet surfing You will learn about smart phones, mobile devices, wireless networks, using VoIP and video conferencing. There are also a number of new trends in technology that you need to be aware of, like: 3D printing The web of things Data privacy Wearable technology Cloud services And many more, covered in the lesson. It s important to guard against cyber bullying and identity theft. It is also essential to follow the netiquette rules, like these: Don t forget that there are also a number of dangers to be faced when using electronic communications. Learn about Spyware, Adware, Malware, Viruses, Spam, Trojan Horses, Worms, Pharming, Spoofing, Phishing and Hoaxes. There are some useful tips in this lesson about how to determine if your computer or device has a virus and how to fix online threats, using: 2

3. Using the Worldwide Web and Online Services This lesson is perfect for answering questions like: 1. What are the purposes, uses and types of websites available? 2. What are some of the applications that facilitate e-communications and how can these be used? 3. What types of online services are available to help with daily tasks? 4. How can these online services be used safely? The lesson starts by defining the differences between these 2 aspects of e-communications: There are 4 types of Internet connection available at the moment, namely: Fixed Internet connection Portable Internet devices WiFi Hotspot WiMAX dongle Use the lesson to understand: parts of a URL types of websites the difference between a browser and a search engine This is also a great lesson to learn about: Blogging Online services Advantages and disadvantages of social networking Good practice for social networking Popular social networking sites Online harassment or stalking 4. Using Online Communications Successfully Learners will be able to do the following by the end of the lesson: identify the impact of communications on the workplace, employment practices and globally identify ways in which you can protect yourself and your computer while online Identify various communication tools Use and acknowledge materials found online 3

Identify and understand several kinds of computer crimes and criminals Use online communications for studying working and being social. When using online communications, including creating a website, it s vital to take the following into account: Planning is key this is the most important step Readability easy to read, neat, with a good layout Layout reduce distracting images, keep it simple, neat and attractive Navigation there should be no need to guess where to click or find a link Consistency keep the same theme, colour scheme and font throughout Remember to use utility programs to protect your computer and ensure it performs at optimum levels. There is also anti-virus software to scan, detect and remove viruses, and anti-spyware to monitor e-mails, websites and file downloads for spyware programs. A firewall is also essential, to stop unauthorised access to or from a private network so hackers, worms and viruses will not be able to get into your computer. Remember that even GPS software can make us vulnerable to people who may want to know where we are and follow us. 4

Grade 12 Grade 11 Grade 10 LINKED ONLINE TUTORIALS (How To s) Here is a list of the titles of How To s that are related to the multimedia lessons about Internet Technologies. As indicated in the table below, some are more suited to specific grades than others, but viewing all of them would give a thorough overview of the section. Internet Technologies 1. E- communication using a Computer 2. Applications for E-communication 3. The Basics of E-mail 4. Faxing with a Computer 5. Etiquette for e-communication 6. Basic use of Internet and E-mail 7. Using Hyperlinks 8. Using Netiquette Rules 9. Sending and Receiving E-mails 10. E-mail Attachments 11. What is the Internet 12. Overview of the Worldwide Web 13. Using Browsers 14. Using Search Engines 15. Basic Browsing and Searching Techniques 16. Downloading and Uploading Techniques 17. Types of Digital Communications 18. Using Online Services 19. Using Social Websites 20. Managing E-mail 21. Exploring the Usability of Web Pages and Websites 22. Types of Digital Communications 23. The Many Uses of Digital Communications 24. Practical Blogging 25. Practical Social Networks 26. Practical E-mail Note: there are no interactive multimedia lessons for this section on Internet Technologies. 5