Patrick’s Survival Guide to Computers & the Internet By Patrick Juriga Block G Sept. 26 th, 2014 Info Tech 9.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

A Students Survival Guide to Computers and the Internet By: Invir Gill Tech 9 Per: 7.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Woodland Hills School District Computer Network Acceptable Use Policy.
By: Parm Sekhon 2/7 - I.T - Oct 15, Internet Safety 1.Don`t use weak passwords 2.Don`t go on illegal websites 3.Don`t download files from websites.
Internet Safety/Cyber Ethics
Backups Why Is it important to back up your files? w If you've ever been in a situation in which you've almost completed an important project, only to.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Online Safety 2.02 Remember the rules of online safety.
Protecting Yourself Antivirus Programs By: Stephanie Shaughnessy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
C.E.S. TEAM TECH Playbook Created for CAT533 by Sandie Rainey and Ann Mayhall Kindergarten through Second Grade.
Possible WebQuest type links  
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
MODULE 3 SAFE USE OF COMPUTER. Virus and Antivirus A computer virus is a malware program that, when executed, replicates by inserting copies of itself.
Welcome to Causey Computer Lab! Computer Applications Mrs. Clements.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
By: Mackie Chapman, November 5th, IT 9, Block 2 Learning about computer safety may seem like a waste of time, but it is really important to learn how.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Dawes Intermediate miDevice Student Guidelines & Internet Safety Procedures Revised from the iSafe program at
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Welcome to Ms. Dickson’s Business Class.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Do pictures always give truthful information? Can publishing it be hurtful??
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
A Student’s Guide To The Internet By: Isaiah Klassen October 30 th 2013 I.T. Blk. 7.
Are You a Good Digital Citizen? By Abby Buchanan Image from Microsoft Clip Art.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Computer security By Shreya Houji. VirusesViruses.
UNIT 5-ICT ETHICS AND ISSUES. ICT ETHICS AND ISSUES Ethics vs. Law IT and Legal Issues IT and Social and Ethical Issues Privacy and Security Issues IT.
Brendan Wheeler October 1/13 Block 2/7 IT INTERNET SAFETY It’s crucial to be safe on the internet because being careless could result in getting your.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
By: Asfa Khan and Huda Mukhtar
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
Online Safety 2.02 Remember the rules of online safety.
Backing up By Betsy Weaver 8H. What is backup, and why should you do it? w So that you don’t lose all your files if you are attacked by a virus or hackers,
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Nashwaaksis Middle School Student Laptop Program Care and Use of Computers.
Windows XP Top Ten Attractions Courtesy of Microsoft.com.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials Computer basics: Computer health and safety Suitable for: Beginner.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Technology Education THE PERSONAL COMPUTER (PC) SOFTWARE PART 2.
Woodland Hills School District Computer Network Acceptable Use Policy.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Etiquette & Safety This is based on things you might experience when using you’re .
A Students Survival Guide For Computers And Internet By Kristina Patrakova Block G September 26, 2014 Info tech 9/10.
Internet Safety for Elementary Students Revised from the iSafe program at
Don’t talk to people that you don’t know online. What would you do if someone that you don’t know threatens you? Call the police or tell a parent!! Be.
2.02 Remember the rules of online safety.
Online Safety! By: Michelle Deng.
Remember the rules of online safety.
2.02 Remember the rules of online safety.
Social Issues in Computing
Social Issues in Computing
Woodland Hills School District
Presentation transcript:

Patrick’s Survival Guide to Computers & the Internet By Patrick Juriga Block G Sept. 26 th, 2014 Info Tech 9

Internet Safety It is important to practice proper internet safety because if you give away passwords or you don’t make a secure one someone could break into your account and ruin it for you. you must also watch what you download and make sure it is not a virus. Viruses can cause slowing down of your computer and ads. You should install protective software that will warn you or get rid of viruses or problems. You should also make backups of your computer every month just in case something goes wrong.

Top 5 Internet Safety Tips 1. Do not give out your passwords. 2. Do not respond to spam s. 3. Install safe protective software to stop viruses. 4. Watch what you download, it could be a virus. 5. Create a backup of your computer.

Ergonomi cs Ergonomics - The study of how well humans can work in their working environments. Ergonomics should be important to everyone, especially employers and employees. Employees should care because if they do not have good ergonomic equipment it could be hard to keep or find a job. And knowing ergonomics is good for employers because they need to know what equipment to put in the office. Some possible consequences of working in a non ergonomic environment is that you will not be working at full efficiency and you might not ever know how to work in an efficient workplace.

ERGONOMIC COMPUTER EQUIPMENT ERGONOMIC A NEW WIRELESS MOUSE AND MOUSEPAD 4/5 STARS GLOWING KEYBOARD WITH NUM PAD 3.5/ COMFORTABLE CHAIR WITH PADDED ARMREST AND HYDROLICS 4.5/5 NON-ERGONOMIC A 4 YEAR OLD MOUSE WITH NO MOUSEPAD 1/5 STARS KEYBOARD WITH NO NUMPAD AND MISSING KEYS 1.5/ LAWN CHAIR WITH 3 LEGS 2/5

Intellectual Property and File Sharing Intellectual Property is a work or invention that is the result of creativity. The legality of file sharing is very complex. While the unauthorized copying - uploading - of complete copyrighted works such as books, movies, or software is illegal under the Act, the situation regarding music files is more complicated.

Helpful Websites for-pc-laptop/ for-pc-laptop/

Bibliography

T H E E N D