Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Solving a last-minute hitch Name:

Slides:



Advertisements
Similar presentations
3.03 Be an Internet Detective
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Unit 1 Living in the Digital WorldChapter 2 Which devices should we take? This presentation will cover the following topic: Which devices should we take?
Introduction to Online Data Collection (OLDC) Community Based Abstinence Education September, 2009.
Opening a bank account.
Updating User Information Password – use this field to change your own password Confirm Password – retype the new password for verification purposes To.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Unit 1 Living in the Digital WorldChapter 2 Finding the way This presentation will cover the following topic: Finding the way Name:
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Unit 1 Living in the Digital WorldChapter 1 Let’s Communicate This presentation will cover the following topic: Socialising on the Internet.
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: Connecting to a home network Which types.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Planning a Trip Name:
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
Reliability & Desirability of Data
Lesson Starter: What information should be in a leaflet about Hockley? Discuss with your neighbour and fill out the sheet.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Web Research © Copyright William Rowan Objectives By the end of this you will be able to: Use search engines and *URL’s on the internet as a research.
Networks & the internet. Revision tip: Focus on the things you find difficult first.
Section 4 – Computer Networks Setting up a small network.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Step 1 Log in with your username and password Adding direct links to online archives from your VLE.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Cloud Storage Name:
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: What precautions should I take? Name:
LOG ONTO YOUR COMPUTER USE THE FOLLOWING LOGON IF YOURS DOES NOT WORK: USERNAME: PASSWORD: GO TO:
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
 Introduction to Computing  Computer Programming  Terrorisom.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Lesson Objectives By the end of the lesson you will be able to: Explain how a wide range of work-related tasks have been affected by ICT.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Anonymous Biometric Checking By Lunda A. Wright Supervised by Prof. P. Wentworth Co-supervised by Mr. J. Ebden.
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Databases. Revision tip: Focus on the things you find difficult first.
Section 6 Theory Issues with information found on the Internet.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Step 1 Having previously registered, log in with your username and password Adding direct links to online archives from your VLE.
Step 1 Log in with your username and password Adding direct links to online archives from your VLE.
Starter (June 2011) Explain two methods by which someone could find a website on the internet. [4]
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Galileo Student Online Testing Guide. OBJECTIVES  Log in/out  Take a test.
[ How to use Moodle ] [ Created by Hamda Ali ]. What is Moodle? Moodle is a learning platform designed to provide educators, administrators and learners.
Unit 1 Living in the Digital WorldChapter 1 Let’s Communicate This presentation will cover the following topic: The Internet as a work tool.
Unit 1 Living in the Digital WorldChapter 2 Which devices should we take? This presentation will cover the following topic: Which devices should we take?
Unit 1 Living in the Digital WorldChapter 2 Finding the way This presentation will cover the following topic: Finding the way Name:
THE RESEARCH PROCESS How do Sociologists study society? STUDYING SOCIETY TOPIC Glue the Learning Journey into your book.
Unit 1 Living in the Digital WorldChapter 2 On the move Chapter 2 Theory.
Starter: Think & Pair (10 mins) So far we have covered the following common ICT systems: Payroll System Personnel System Accounts System Back Office System.
Computer Security Keeping you and your computer safe in the digital world.
INFO 3: Use of ICT In The Digital World Topic 8: Development Methods (Stages of the SDLC) Electronic Chapter: 9.
Unit 1 Living in the Digital WorldChapter 2 How do we connect? This presentation will cover the following topic: How can we connect? Name:
A 'Level ICT Induction, 25 th June, Outline of the course AS course: INFO1 – Practical problem solving in the digital world In this unit you will.
Online Safety Lesson One. Introduction to ICT  ICT is a core subject in Mount Grace school, which means you will study it right the way through until.
This presentation will cover the following topic:
Adding direct links to online archives from your VLE
3.6 Fundamentals of cyber security
Please, use this URL to apply to your preferred program if you are new to the program
Starter Open up the “What Am I Task Sheet” and work through the clues independently. You have 5 minutes before the answers are to be discussed as a group…
Shopping experience! Is it safe to pay online? Ian Ramsey
Starter What is identity theft?
ICOTS Helpdesk Training
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Setting up an online account
Ian Ramsey C of E School GCSE ICT On the move How can we connect?
Web Programming Language
self-paced eLearning series
Welcome to the Keiser University Library
How was the NHS formed and what was its impact?
LO5 Unit 1: Fundamentals of IT
Welcome to the Keiser University Library
Presentation transcript:

Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Solving a last-minute hitch Name:

Unit 1 Living in the Digital WorldChapter 2 On the move Chapter Objectives: By the end of this lesson you will be able to: Explain how users can check the reliability and validity of websites Explain how search engine lists are organised Describe biometric methods of identification Explain the security and privacy issues involved. Name:

Unit 1 Living in the Digital WorldChapter 2 On the move Starter Following on from previous work studying technology used when travelling. This lesson will look at how technology is used to allow us to travel. The purpose of a passport is to prove the holder’s identity. Discuss: What does your passport say about you? Discuss: What other ways of proving someone’s identity can you think of?

Unit 1 Living in the Digital WorldChapter 2 On the move Finding information about passports Imagine you have to apply for a new passport, How do you distinguish official and other reliable websites from less reliable ones? Search for ‘passport information’ – how do we know which ones are legit and where on the list does the official one come? Task: Using the info on the VLE and your own research, work in pairs to come up with a 5-point list of tips for anyone concerned about whether a website is safe to use or not. Compare your responses with the class.

Unit 1 Living in the Digital WorldChapter 2 On the move The structure of URLs (Uniform Resource Locator) Do online research to provide an explanation of the terms below. What is it?Explain the different components of a URL HTTP HTTPS Domain name.uk.co.uk.ac.uk.gov.uk.com.org.net

Unit 1 Living in the Digital WorldChapter 2 On the move RFID (Radio Frequency Identification) Describe the two identification methods below Where possible add real examples and how they maybe used Use the links provided on the VLE and your own research Biometric recognition systems

Unit 1 Living in the Digital WorldChapter 2 On the move Exam Question: Some PC manufacturers include fingerprint scanners on their machines. These are used to log on instead of entering usernames and passwords. (i) The fingerprint scanner may be bypassed, so that a user can log on using the keyboard. Give two reasons why this facility is needed (ii) State two other biometric methods that can be used to log on to a pc. Answer below, or in your exercise books: