Year 8 ICT Internet Security

Slides:



Advertisements
Similar presentations
Hardware Lesson 3 Inside your computer.
Advertisements

WEEK THREE MANAGING, FINDING AND SELECTING INFORMATION- PART 2 Functional ICT.
Essential Computer Concepts
Computer Terminology … Remember: Knowledge is Power!
Introduction to Computers Essential Understanding of Computers and Computer Operations.
Portable Software. This program will explain what portable software is, how it can be used, and where it can be found. This is an advanced level technology.
Storage Devices and Media
Chapter 1.1. FDD ( Floppy Disk Drive) Needs a data cable for connection Has two 34-pin drive connectors and one 34-pin connector for the drive controller.
Standard Grade Computing STORAGE DEVICES CHAPTER 18 COMPUTER STUDIES Standard Grade.
BASIC COMPUTER OPERATION. OUTLINE Computer Hardware Computer Hardware Operating systems Operating systems Terms Terms Disk capacities Disk capacities.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
FIRST COURSE Essential Computer Concepts. 2 Objectives Compare the types of computers Describe the components of a computer system Describe input and.
Operating System Utility Programs & Stand-alone utility Programs.
Computer Lab Teachers are welcome to change or add slides within this presentation to suit the needs of their students or better accommodate the structure.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
INFO1 – Practical problem solving in the digital world
Computers in the real world Objectives Explain the need for secondary storage devices Understand the three main storage types – Optical – Magnetic – Solid.
Inside your computer. Hardware Review Motherboard Processor / CPU Bus Bios chip Memory Hard drive Video Card Sound Card Monitor/printer Ports.
Operating Systems Foundation Computing Half the people you know are below average.
Computers - The Journey Inside continues…
Keeping Your Computer Safe and Running Efficiently.
Backing up By Betsy Weaver 8H. What is backup, and why should you do it? w So that you don’t lose all your files if you are attacked by a virus or hackers,
Storage of Data Instructions and data are held in main memory which is divided into millions of addressable storage.
“Read Only Memory” a class of storage media used in computers and other electronic devices. This tells the computer how to load the operating system.
Applications of secondary storage
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Skill: Making decisions after reflection and review.Monday, 9/28 Goal: To continue working on your couplets. Be sure to use the check list on the couplet.
ICT IGCSE Theory – Revision Presentation 3.1 Storage devices and media Chapter 3: Storage devices and media Identify storage devices,
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Burn ISO Image File to USB Drive From:
Info Tech for Medical Profession
STORAGE DEVICES Towards the end of this unit you will be able to identify the type of storage devices and their storage capacity.
Computer Note.
Part B Computer Storage
Magnetic Coaster Planning
Computing Fundamentals
Year 8 ICT Internet Security
Essential Computer Concepts
Data Representation N4/N5.
Information Technology
UNDERSTANDING YOUR COMPUTER
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Memory and storage AS identifies the main hardware components of at least two types of computer. AS states and discusses the implications.
Why Computer Security Need???
3 - STORAGE: TYPES AND CHARACTERTISTICS
STORAGE DEVICES Towards the end of this unit you will be able to identify the type of storage devices and their storage capacity.
Info Tech for Medical Profession
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Little work is accurate
Data Storage In today’s lesson we will look at:
Introduction to Storage Devices
Cloud vs Local: Better Data Storage Device
Chapter 3 – Storage Devices and Media
STORAGE DEVICES Towards the end of this unit you will be able to identify the type of storage devices and their storage capacity.
Internet Safety- Part II
Storage Keywords Secondary Storage
Digital Storage Digital Storage Ann Ware ~
INTRODUCTION TO BASIC DETAILS
Lesson 3 Data Storage.
BASIC COMPUTER OPERATION
Storage & Connectivity
“It matters that you don’t just give up”
Part C Computer Storage
7.2 Hardware Storage Devices
Lesson 9 Types of Storage Devices.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Secondary Storage Devices
Lauren Taylor – Dardanelle High School
Presentation transcript:

Year 8 ICT Internet Security Internet and Information Safety Lesson on Backup

PLTS (Personal Learning and Thinking Skills): Learning Objectives Be aware of the risks involved when using a computer. To know what third thing you should do to prevent a virus attack on your PC. Keywords : Backup PLTS (Personal Learning and Thinking Skills): To develop Independent enquirers – by completing the AVP exercise and answering the questions. Effective participators – by focussing on the task andcompleting it in the time given. Creative learners – by reflecting on how many ways you can keep your files safe.

How to prevent a virus attack Make sure that you have anti-virus software on your computer. Get the anti-virus software to scan your hard disk. If a virus is found, the software will either remove it or quarantine it.

Task 1: Keeping Security up-to-date (8 min) On your computer, it is important to keep security up-to-date. You do this by setting your security settings. Let’s have a play! Check how safe the system is: Start  My Computer  (T:) Shared  ICT  ICT Year 8  Unit - Internet Safety AVP Complete the All AVP Worksheet.doc Use the Security Centre to answer the questions. We will review in 8 minutes.

How to prevent a virus attack 2 - Firewalls A firewall examines all traffic between two networks to see if it meets certain criteria. A firewall filters both inbound and outbound traffic. Anyone who is responsible for a private network that is connected to a public network needs firewall protection. Furthermore, anyone who connects as a single computer to the Internet via modem should have personal firewall software. Examples of firewalls: Norton, McAfee, AVG…

How to prevent a virus attack 3 - Backing Up What is backing up? Why should you do it? What can you backup onto? Do you, honestly backup?

Why is it important to backup? What can you backup onto? Level 5+ File Sizes Why is it important to backup? What can you backup onto? File Example Size Equivalent to Word processed document 700 KB An mp3 file 4000KB (4MB) 6 documents A DVD video 4000MB (4GB) 1000 mp3’s

Device Average Capacity Typical Use Floppy Disk 1.44MB Home / Not used Zip Disk 100MB Home / University CD-R 750MB Home / Work CD-RW DVD-R 3.5GB Movie Production / Backup DVD-RW USB Storage 8MB – 16GB Flash Memory Hard Disk Drive 2GB – 500GB Magnetic Tape 4GB – 520GB Work / Professionals BD (Blue Ray DVD) 27GB WOW! HD-DVD U15GB - 45GB WOW!! NEW: Holographic Storage 300GB WOWEEE! Coming in 3 years: Advanced Holographic Storage 1TB 250,000 mp3’s on one disk! (a quarter of a million songs)

Today’s Main Task: Fact Sheet Production Create a 1 page fact sheet in a program of your choice: LEVEL 3/4: Your fact sheet must tell me what a virus is, what a firewall is and what backing up is. Audience: Year 7 LEVEL 5: As Level 4, but you must also explain how you keep virus software up-to-date and what the dangers of not doing so are. Audience: Year 8 LEVEL 6: Create a report, explaining everything from today’s lesson in detail, as well as discussing what problems viruses cause. ALL: Suitable graphics should be used. Save in your Internet folder.

Keywords Virus: Program that interferes with the computer by deleting the system files. System files: Essential instructions that tell the computer how to work. Firewall: Program that protects your computer from uncontrolled access from the Internet. Back up: Security copy of the files or documents created and kept in the PC.

What should you do to keep your files safe from a virus attack? Plenary What should you do to keep your files safe from a virus attack?