Module 7 Questions Prepared by Mr O Seguna. Contents Q1 – Uniform Resource Locator (web address)Uniform Resource Locator (web address) Q2 – Internet /

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
Module 7 Questions Prepared by Mr O Seguna. Contents Q1 – Uniform Resource Locator (web address)Uniform Resource Locator (web address) Q2 – Internet /
The Internet.
Breaking Trust On The Internet
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2010 Introductory Pasewark & Pasewark.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1 Kids on the Web. Child’s play? September, 2008.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1. 2 Windows Live Hotmail  offers access via special Outlook Connector software o provides a two-way sync for  mail  calendar  contacts o access.
IT Security for Users By Matthew Moody.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
NETWORKS.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
SPECIAL AT NHS. 2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Safety History.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Introducing the Internet and The Web Computer Concepts Unit A What Is Internet.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Architecture and Governance
Topic 5: Basic Security.
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Homework Explain these terms in your own words. If they are not your own words, they need to be in quotes with a source given. Sources 1.Wilson 2.Webopedia.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
By Toby Reed.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Internet Business Associate v2.0
Unit 4 IT Security.
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Risk of the Internet At Home
Module 7 Questions Prepared by Mr O Seguna next.
Internet.
Presentation transcript:

Module 7 Questions Prepared by Mr O Seguna

Contents Q1 – Uniform Resource Locator (web address)Uniform Resource Locator (web address) Q2 – Internet / WWWInternet / WWW Q3 – Instant MessagingInstant Messaging Q4 - MalwareMalware Q5 – Internet risksInternet risks Q6 – Parental Control SoftwareParental Control Software Q7 – Multiple Copies of an Multiple Copies of an Q8 - PhishingPhishing Q9 - VoIPVoIP Q10 – RSSRSS Q11 – Delete an Delete an Q12 – FirewallFirewall Q13 – Digital CertificateDigital Certificate

Module 7 – Q1 Click on the Uniform Resource Locator (or web address)

Module 7 – Q2 Which one of these best describes the difference between INTERNET and WWW? Internet is a global system of interconnected computer networks. WWW is related to an automobile company. In ECDL we learn about Internet only. In ECDL we learn about WWW only.

Module 7 – Q3 One of the following is not a benefit of instant messaging Real time communication Can receive messages when you’re online Ability to transfer files. Knowing whether contacts are online.

Module 7 – Q4 Malware includes the following except Trojan horses Podcasts Worms Viruses

Module 7 – Q5 The following are all related to safety. But which one is not caused by online activity? Unintentional disclosure of personal information Bullying or harassment Repetitive Strain Injury (RSI) Targeting of users by predators.

Module 7 – Q6 Parental Control software options include Free account. Computer usage time limits. Access to school records. Access to children’s s.

Module 7 – Q7 Click where you have to write the addresses where you want to send multiple copies of your

Module 7 – Q8 The term Phishing means providing security against malware means formatting of an external hard disk can be fraudulent messages or links within them is a fast way to find your documents from various folders

Module 7 – Q9 VoIP stands for Volume over Information Processing Voice over Internet Protocol Voice over Infrared Protocol Video over Internet Protocol

Module 7 – Q10 Really Simple Syndication (RSS) is An electronic news service A way to subscribe to updated web content A method of disinfecting PC viruses A type of internet connection

Module 7 – Q11 Delete an from Microsoft

Module 7 – Q12 A firewall protects you PC from Viruses Bugs External access to your private information. Spyware

Module 7 – Q13 A digital certificate means that You can verify that the has no viruses. You can verify that the sender is who he claims he is. You can delete spyware. Nobody can send any spam.

Module 2

Module 7 – Q11 (cont.) …and after you select the