Module 7 Questions Prepared by Mr O Seguna next.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
Module 7 Questions Prepared by Mr O Seguna. Contents Q1 – Uniform Resource Locator (web address)Uniform Resource Locator (web address) Q2 – Internet /
The Internet.
Breaking Trust On The Internet
$200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $500 $100 Category One Category Two Category.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Module 7 Questions Prepared by Mr O Seguna. Contents Q1 – Uniform Resource Locator (web address)Uniform Resource Locator (web address) Q2 – Internet /
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Security for Seniors SeniorNet Help Desk
1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2010 Introductory Pasewark & Pasewark.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1. 2 Windows Live Hotmail  offers access via special Outlook Connector software o provides a two-way sync for  mail  calendar  contacts o access.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Internet Architecture and Governance
Topic 5: Basic Security.
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Homework Explain these terms in your own words. If they are not your own words, they need to be in quotes with a source given. Sources 1.Wilson 2.Webopedia.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
By Toby Reed.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Joseph J. Malone Security for Seniors Joseph J. Malone
Introduction to Computers
Internet Business Associate v2.0
Unit 4 IT Security.
TexPREP Summer Camp Computer Science
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
Staying safe on the internet
Introduction to Networks
Internet.
Presentation transcript:

Module 7 Questions Prepared by Mr O Seguna next

Contents Q1 – Uniform Resource Locator (web address) Q2 – Internet / WWW Q3 – Instant Messaging Q4 - Malware Q5 – Internet risks Q6 – Parental Control Software Q7 – Multiple Copies of an email Q8 - Phishing Q9 - VoIP Q10 – RSS Q11 – Delete an Email Q12 – Firewall Q13 – Digital Certificate

Click on the Uniform Resource Locator (or web address) Module 7 – Q1 Click on the Uniform Resource Locator (or web address)

Module 7 – Q2 Which one of these best describes the difference between INTERNET and WWW? Internet is a global system of interconnected computer networks. WWW is related to an automobile company. In ECDL we learn about Internet only. In ECDL we learn about WWW only.

A benefit of instant messaging is Module 7 – Q3 A benefit of instant messaging is Xbox kinect or playstation Move Ability to transfer files Sending emails You have to be a programmer

Module 7 – Q4 Malware includes MP3 and WMA files Worms, Viruses and Trojan horses AVI and MPEG files Text files and Spreadsheet files

Module 7 – Q5 The following are all related to safety. But which one is not caused by online activity? Unintentional disclosure of personal information Bullying or harassment Repetitive Strain Injury (RSI) Targeting of users by predators.

Parental Control software options include Module 7 – Q6 Parental Control software options include Free email account. Computer usage time limits. Access to school records. Access to children’s emails.

Module 7 – Q7 Click where you have to write the addresses where you want to send multiple copies of your email

Module 7 – Q8 The term Phishing means providing security against malware means formatting of an external hard disk can be fraudulent e-mail messages or links within them is a fast way to find your documents from various folders

Module 7 – Q9 VoIP stands for Volume over Information Processing Voice over Internet Protocol Voice over Infrared Protocol Video over Internet Protocol

Really Simple Syndication (RSS) is Module 7 – Q10 Really Simple Syndication (RSS) is An electronic news service A way to subscribe to updated web content A method of disinfecting PC viruses A type of internet connection

Delete an email from Microsoft Module 7 – Q11 Delete an email from Microsoft

A firewall protects you PC from Module 7 – Q12 A firewall protects you PC from Viruses Bugs External access to your private information. Spyware

A digital certificate means that Module 7 – Q13 A digital certificate means that You can verify that the email has no viruses. You can verify that the sender is who he claims he is. You can delete spyware. Nobody can send any spam.