By Nathan McCann. Blogs  www.blogger.com www.blogger.com  www.wordpress.com www.wordpress.com.

Slides:



Advertisements
Similar presentations
ICT iGCSE.  You should be able to describe the use of Internet developments such as:  Web 2.0  blogs  wikis  digital media uploading websites  social.
Advertisements

Exploring newer technologies Bob Rotheram OPVC (ALT)
E-Safety Support e-Safety Presentation D Flynn and L Findon.
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
Blogging Towards Scholarship: Using open-source software and free on-line hosting to work with Scholarship students Toni Twiss TIC Media Studies Waikato.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Computer Hardware Software 1.Introduction 2.Internet research and security Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Heather Miller Bruce Herbert. Online Tools Digital Libraries Centra Webinars Schedule Wiki review.
IPODS & PODCASTING What is an iPod? How can we use it with our learners? What is Podcasting? What can I use right now with my learners?
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
-Target -Home Depot -Jimmy John’s “No one wants their personal information or sensitive data in the wrong hands”
NETS Stands for National Educational Technology Standards and are the standards for learning, teaching and leading in the digital age.
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Connecting Businesses and Staff Tools for the Virtual Office  Microsoft Groove Office Collaboration Software  Skype VOIP Telephone  Transferring Files.
Wikis.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
It’s a Wiki Wiki World Beth Lynne Ritter-Guth Lehigh Carbon Community College.
WHAT IS A WIKI Wiki Wiki WHAT IS A WIKI Wiki Wiki Volcano is going to blow!!!!!!
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Engaging Learners Wikis GroupsSkype Problem Based Learning Blogging Student Led Discussions Instructor Led Discussions Technological Tools *Click.
PAWS Workshop April 10, Agenda Grant administrative topics Web 2.0 –Discussion of instructional uses Copyright and open content resources –Discussion.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
For web 2.0.  Digital media files that is made available for download via web syndication.  It is a way to receive audio/video files over the internet.
GOTBACKUP THE BEST BACKUP SOLUTIONS. SIGN UP TODAY! CLICK HERECLICK HERE.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
ROB MARCHESE Podcasting. Contents Overview Educational Use How to Podcast.
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
Blogs. Blogs The definition of word BLOG in Wikipedia: A blog (a contraction of the term "Web log") It is a Web site, usually maintained by an individual.
Shonia Cecchine.  I learned that a podcast is a series of digital media files. A podcast allows you to download media, music and others. Apple Inc.’s.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
OBJECTIVES  Know what collaboration means.  To understand the advantages and disadvantages of different collaboration tools. OUTCOMES  Complete the.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Professional Development Without Borders Cindy Phthisic Edenton-Chowan Schools
Bullies R Us Cyber-Pals Security Blanket
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Introduction to Social Media October 28, 2010 Green County High School Vickie Buckman.
Branch of computer security specifically related to the Internet. Security for transactions made over the Internet. Internet security encompasses browser.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
There are many leading online sources that are providing reliable encryption solution for your online as well as offline file security through smart software.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Real Writing for a Real Audience. Overview During this workshop we will focus on blogs and wikis. By the end of the session you will have: a clear understanding.
Glossary – how do you define these words?
Blogging What, Why and How? Ask the Experts Online 17th July, 2007
Internet Safety By Ruby.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Business mail account in yahoo
Welcome To : Group 1 VC Presentation
What is Web Browsers - What is Blogs-
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Cyber Security School Challenge
Introduction to Networks
Encryption and Hacking
CYBERSAFETY & Personal information
Cyber Security School Challenge
Presentation transcript:

By Nathan McCann

Blogs  

Wikis  Wikipedia  Wiki leaks  Wiki Spaces

Podcasts  IPod  BBC  Gaming/Chat Shows

Video Conferencing  Skype  ooVoo  ToX  Google Hangouts  Viber

Storing Personal Information  Passwords  Encrypting  Signing up   Name  D.O.B  Servers/PC’s

Safely viewing digital content  Being safe online  Bank information  Downloading

Safely uploading digital content  Legal sites  No-popup sites

Data Protection Regulations  Storing  Private  Secure

Firewalls  Incoming Information  Outgoing Information  Blocking IP’s/ MAC

Secure sites Source - ca/en/images/11/10/rapport _security_software.jpg

Backups  Regular  Secure  Safe

Any Questions?