THE PYRAMID OF KNOWLEDGE

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Cambridge Nationals R001 Revision Guide – June 2014.
POSSIBLE THREATS TO DATA
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
Input, Output & Storage devices
Local & Wide Area Networks
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
OCR Nationals Technological Innovation and E-Commerce Unit version.
OCR Nationals Technological Innovation and E-Commerce Unit 8 -June 2013 version.
1.1 System Performance Security Module 1 Version 5.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Input devices Output devices Wired Methods Ethernet ADSL Fibre Optic.
Networks.
ICT in the Home. Introduction ICT is used today for entertainment It influences how people spend their time ICT is used for most every day tasks: tv,
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
1 After completing this lesson, you will know: What computers need to operate—basic hardware and peripheral devices Why and how to protect your computer.
Online Communication 1 & Ubiquitous Computing. Online Communication *The red circles show the position of the keyframes on the timeline. 1. Explain what.
Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Keeping in touch Name:
Internet Safety Internet Safety LPM
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Module 2 Short Including preparation for ECDL testing.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
Year 12: Unit 2, living in the digital world. 1. What is ICT? ICT is the use of technology to convert data to information. It covers many areas, especially.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Technical Implementation: Security Risks
1.4 wired and wireless networks lesson 1
Network and hardware revision
IMPACT OF ICT.
Misuses of ICT Malpractice and crime © Folens 2008.
Implications of Digital Technology for Business and Customers
Administrative Practices Outcome 1
Information Systems.
Module 2 Short Managing files continued.
Edexcel GCSE ICT ASSESSMENT INFORMATION
Personal Digital Devices
GCSE ICT Revision Topic 2: Connectivity.
Topic 5: Online Communities Press F5 to view!
Issues Security and Privacy issues Health and Safety
Topic 6: Issues Press F5 to view!
Ch 8- Digital devices and media: managing a digital lifestyle
Ian Ramsey C of E School GCSE ICT On the move Keeping in touch.
Creating a home network
Progress leisure OCR GCSE ICT.
Ian Ramsey C of E School GCSE ICT Smart working Any time, anywhere.
Ian Ramsey C of E School GCSE ICT On the move How can we connect?
Unit 8 Technological Innovation and E-Commerce
Multimedia.
24/7/365 Remote Computer Support
BTEC level 3 Learning Aim D.
Protecting Data and Information
G061 - Network Security.
BACS Laws And Acts Applications of ICT Communications
Presentation transcript:

THE PYRAMID OF KNOWLEDGE ICT EDITION Cloud Computing Starting from the bottom, you must pick one block from each level and answer that question. If you answer incorrectly, your go is over and you must reset the game. Media & Gaming Legislation Security Reset Game Online shopping Online communities Connectivity Digital Devices

Digital Devices Click here to Reveal Answer Give an advantage of using removable storage over a hard disk drive? Click here to Reveal Answer Usually smaller and lighter Can view data wherever No moving parts that can be damaged

Digital Devices Click here to Reveal Answer Name 2 input devices for a computer Click here to Reveal Answer 2 from: Mouse, keyboard, microphone, scanner, touchpad etc

Digital Devices Click here to Reveal Answer State the use of GPS on a mobile phone Click here to Reveal Answer Get directions, current location, locations of key services, tagging images etc

Click here to Reveal Answer Digital Devices Give a possible health risk when using digital devices for a long period of time Click here to Reveal Answer Eyestrain, RSI etc.

Digital Devices Click here to Reveal Answer Give 2 ways to protect the information on your phone Click here to Reveal Answer Passcode, password protection, encrypt data, lock SIM, antivirus

Digital Devices Click here to Reveal Answer Which feature must every phone have Click here to Reveal Answer Connectivity

Digital Devices Click here to Reveal Answer Name 2 removable storage devices Click here to Reveal Answer SD/memory card, DVD, CD or memory stick/flash drive

Digital Devices Click here to Reveal Answer Name 2 features of a netbook that makes it suitable for travelling Click here to Reveal Answer Light/portable Long battery life Strong and robust

Connectivity Click here to Reveal Answer What is a NIC? A network interface card

Connectivity Click here to Reveal Answer Give 2 advantages of WiFi over other connectivity Click here to Reveal Answer No cables, cheaper, access from anywhere in the house etc.

Connectivity Click here to Reveal Answer What is WPA A type of encryption (wireless protected access)

Connectivity Click here to Reveal Answer How do you “hide” your router’s signal? Click here to Reveal Answer Stop it broadcasting its SSID

Click here to Reveal Answer Connectivity What is latency? Click here to Reveal Answer The time in milliseconds between a bit leaving one device and arriving at another

Click here to Reveal Answer Connectivity What is bandwidth? Click here to Reveal Answer The number of bits that can go through the network connection in one second

Connectivity Click here to Reveal Answer Give an advantage of Bluetooth over WiFi? Click here to Reveal Answer Low power connection, no access point needed, devices can connect directly

Online communities Click here to Reveal Answer Give 2 types of online community Click here to Reveal Answer Social networking, bookmarking, Wikis, blogs, forums

Online communities Click here to Reveal Answer Give a feature of an online workspace Click here to Reveal Answer Email, chat, shared folders/files, online apps, online conferencing e.g. VoIP

Click here to Reveal Answer Online communities Give a feature of a VLE Click here to Reveal Answer Marking tools, chat, track progress, interactive polls, personalized spaces, timetable, department areas, news

Online communities Click here to Reveal Answer Give 2 advantages of social networking Click here to Reveal Answer Keep in contact, new friends, share information/media etc.

Online communities Click here to Reveal Answer Name a disadvantage of a Wiki Click here to Reveal Answer Can become inaccurate/biased/untrue Internet needed

Online communities Click here to Reveal Answer Name a social bookmarking site Click here to Reveal Answer Pinterest, delicious

Online shopping Click here to Reveal Answer Name a feature of an online shop Click here to Reveal Answer Sort/search for goods, images, 24/7 availability, comparisons, recommendations/reviews.

Online shopping Click here to Reveal Answer Name 2 benefits for the customer Click here to Reveal Answer Greater choice, shop 24/7, comparison sites, don’t have to leave house, reviews

Online shopping Click here to Reveal Answer Name 2 disadvantages for the customer Click here to Reveal Answer Internet access needed, cannot use cash, cannot see the item and test, delivery cost, have to submit details, fraud websites

Online shopping Click here to Reveal Answer List some impacts on businesses of online shops Click here to Reveal Answer No rent, less staff, can carry more products, customers globally.

Online shopping Click here to Reveal Answer Name a feature of an online auction Click here to Reveal Answer Search, see status of bids, secure payments, maximum bid,

Security Click here to Reveal Answer Name a threat to the security of data? Click here to Reveal Answer Physical threats (flooding/ theft) Blue Jacking Phishing Viruses Unsecured wireless networks

Security Click here to Reveal Answer Why is it safer to switch your bluetooth off when not using it? Click here to Reveal Answer Other devices which are in range cannot connect to the device and send unwanted messages

Security Click here to Reveal Answer What is meant by hacking? Gaining unauthorised access to computers and data

Click here to Reveal Answer Security What is this called Click here to Reveal Answer (re)CAPTCHA

Click here to Reveal Answer Legislation What is the name of the act organisations must comply with if they store personal details on a computer? (ensure you state the year) Click here to Reveal Answer Data Protection Act 1998

Legislation Click here to Reveal Answer Why was the computer misuse act introduced? Click here to Reveal Answer -Due to hackers/criminals -It allows the government to prosecute people who access computers and steal/ change data without permission

Legislation Click here to Reveal Answer Name two of your data protection rights. Click here to Reveal Answer 1. The right to look at and check any personal data an organisation holds about you 2. You can demand any incorrect information is amended 3. You can demand that the data is not used in anyway that could harm/ distress you 4. You can demand your data is not used for direct marketing

Media and Gaming Click here to Reveal Answer Give a way that playing violent and anti-social games might affect peoples relationships with others. Can lead to aggression Can decrease empathy for others Can affect emotional control Click here to Reveal Answer

Media and Gaming Click here to Reveal Answer Why should you not make a copy of an MP3 music files. It is illegal to make a copy of software/ music Copyright and patents act Click here to Reveal Answer

Cloud Computing Name these cloud computing services Click here to Reveal Answers Office 365 Dropbox iCloud

DID YOU BEAT THE PYRAMID OF KNOWLEDGE?