Viewed by others Online Communication Blogs Microblogs Wiki Podcast Chatroom Instant Message Virtual Learning Environment (VLE) Types message on client.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
. Today you will: Learn about how an is processed once it has been sent Learn some advantages and disadvantages of using Learn how.
By: SAMI ZIVE TEAM:6 GOLD DAY
Primary Threats to Computer Security
Networking Some of the basics. What is a Network Simply put, its two or more computer connected together through a communication medium. A communication.
Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Chapter Extension 1 Information Systems for Collaboration © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Lecture and Resource Slides BCOM 3e, Lehman & DuFrene © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
LESSON 3 – ONLINE COMMUNICATION Mr Cole. ONLINE COMMUNITIES  People who are computer literate, and have the equipment, can form groups or ‘societies’
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Hutton All Saints’ Online Risks and Dangers Workshop WEDNESDAY 19 TH NOVEMBER 2014.
E-safety and safeguarding Staying safe online. Introduction Being eSafe relies on selecting appropriate privacy levels knowing how to behave online understanding.
Unit 1 Living in the Digital WorldChapter 1 Let’s Communicate This presentation will cover the following topic: Socialising on the Internet.
Telecommunications, the Internet, and Wireless Technology.
Computer Basics 4 By: Mr. Stanford. Computer Foundations Although it may be hard to imagine, not too long ago, personal computers did not exist. Since.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
E-safety for Parents Why? Schools have a major role to play in developing pupils’ understanding of how to use new technologies safely. However, pupils.
Online Communities. Topics Social Networking Online Work Spaces Virtual Learning Environments User-Generated Reference Sites.
Lecture 6, Term COD12 COMPUTER LITERACY Communication and Connectivity.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
Lecture Slides Business Communication, 16e, Lehman & DuFrene © 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or.
Component 6 - Health Management Information Systems Unit 2-2 -Hardware and Software Supporting Health Information Systems.
Communications and Collaboration Exploring communication methods People with whom you are corresponding and the topic of the correspondence determine.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Online gaming  Online gaming is very popular today and is a very big industry.  Online gaming is when people from all over the world come together.
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Internet Architecture and Governance
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Teaching and Learning with Technology Chapter 7 Networks and the Internet by La Tisha Jenkins.
Online Communication 1 & Ubiquitous Computing. Online Communication *The red circles show the position of the keyframes on the timeline. 1. Explain what.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Julie Latham Digital Citizenship: An Informational Guide.
Anika Massey.  There are three main types of business:  Traditional  Online  Transportation.
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
STORAGE LOCAL OR ONLINE. DATA STORAGE: DATA YOU STORE ONLINE FILES SUCH AS IMAGES, SPREADSHEETS, VIDEO OR MUSIC. ONLINE DATA STORAGE: WHEN FILES ARE STORES.
This is Facebook and twitter that you can go on when you are at home but school monitor what you go on in school so they put a ban on it other people can.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Communications and Collaboration. Exploring communication methods People with whom you are corresponding and the topic of the correspondence determine.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Session Initiation Protocol
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Introduction to Networking. What is a Network? Discuss in groups.
Ubiquitous means ‘everywhere’
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Presented by Maria Shah. Road Map  VoIP Benefits  VoIP Protocols  VoIP Analysis  Advantages  Disadvantages  Implementing  Security  Summary.
Strand 3 Maya Mangindin 3.5 Public and Personal Communications.
Investigate ICT tools to support collaborative working Unit 2 AO2.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Network and hardware revision
By Asma Hamad Alharbi.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Networks By Lawrence standen.
This is just a bit more detail about how we communicate online
Definition, DIS/Advantages & Services
Progress leisure OCR GCSE ICT.
Introduction to Networks
Protocols 2 Key Revision Points.
BTEC level 3 Learning Aim D.
Presentation transcript:

Viewed by others Online Communication Blogs Microblogs Wiki Podcast Chatroom Instant Message Virtual Learning Environment (VLE) Types message on client Saves message on server

Behaviour online Netiquette How to behave CAPs = Shouting Reply Respect privacy (don’t reveal personal details) Safety Profiles – don’t reveal too much Scan downloads (trojans, viruses) Beware of malware

VOIP (Voice over Internet Protocol) Telephony over the internet Disadvantages Can drop connection or packets (low quality) Security concerns Advantages Low cost (internet only) Connection anywhere there is internet Can include video and file sharing facility

Ubiquitous computing The internet of ‘things’ Computers in everyday objects – Cars – Fridges – Home automation – Tins of baked beans RFID tags in objects and products The intelligent fridge knows what is still fresh Your health monitor tells it you need vitamins Your car receives a note from the fridge and plans your route home via shops What else could happen if computers are in EVERY device? You car detects you are too close to the car in front and breaks a little You get hit by a truck, your health monitoring watch calls an ambulance As you get close to home your car calls your home and turns on the heating As you get to the door it detects your personal RFID chip and unlocks it for you.