Internet Literacy for Educators Project 1: Research Project Kelley Dixon Fall 2007.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

How to protect yourself, your computer, and others on the internet
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Technology in Franchising Jane Kimberlin. Who are Domino’s Pizza? World’s leading Pizza Delivery Company Over 8,000 stores worldwide 450+ stores in UK.
Agenda Finish Lesson 4 Step by Steps Lesson 4 Vocabulary & Review Questions
What is The Internet?. Internet Vs Intranet Internet –Computers connected throughout the world. PUBLIC Network Intranet- Secure connected computers within.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Introduction to TCP/IP Networks. Chapter Objectives Understand what TCP/IP Understand scope of TCP/IP networks Explore classroom network setup Understand.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
Online Safety 2.02 Remember the rules of online safety.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Stop the Creepers and Cyberbullies! 5 Easy Ways to keep yourself safer online!
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
© Paradigm Publishing, Inc. 5-1 Chapter 5 Application Software Chapter 5 Application Software.
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Using Google Drive/Docs Skills: use Google Drive/Docs Concepts: we download and run programs inside our Web clients, wire-frame diagram, user interface,
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
A guide.   Collaborating via Google Docs  Collecting data & testing via GD  Concerns & questions  Play time Overview.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Internet Fundamentals Total Advantage MS Excel 97, Hutchinson, Coulthard, 1998 McGraw Introduction to HTML Chapter 7.
Geographic Information Systems Cloud GIS. ► The use of computing resources (hardware and software) that are delivered as a service over the Internet ►
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Web Research © Copyright William Rowan Objectives By the end of this you will be able to: Use search engines and *URL’s on the internet as a research.
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Southern York County School District. About Your Instructor Kellin McCullough – Business Teacher.
By Joe and Josh.. Would you leave your front door open? Letting strangers see every thing about you by giving away your details online is probably the.
The New Computing Curriculum select, use and combine a variety of software (including internet services) on a range of digital devices to design and create.
Using Mobile Google Tools Tech Tip Project - Fall 2011 A guide to a Digital Portfolio October 17 th, 2011 MEDT 7477 Dr. Cooper Barry D. Thibault.
UEC 01 : Computer Skills & Programming Concepts I 1PUA – Computer Engineering Department – UEC01 – Dr. Mona Abou - Of Lecture 6: Applications Software.
Internet Safety Prepared by Donna Kirkland January 2009.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Small Business Security Keith Slagle April 24, 2007.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Choose a category. You will be given the answer. You must give the correct question. Click to begin.
Online Safety 2.02 Remember the rules of online safety.
BY: KELLI HENDERSON JUNE 3, 2013 Basic Internet Concepts.
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Digital Citizenship Project Kimberly Robbins. “Advances in computer technology and the Internet have changed the way America works, learns, and communicates.
Internet Essentials. The History of the Internet The Internet started when the Advanced Research Projects Agency (ARPA) of the United States Defense Department.
Internet safety By Suman Nazir
Unit 1, Lesson 3 Internet History AOIT Computer Networking Copyright © 2008–2013 National Academy Foundation. All rights reserved.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
Use of this service Checking location departure/arrival Checking time departure/arrival Benefits to the user or company Provides up to date information.
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Special Education Teachers and Speech Language Pathologist Effective Technology Tools By: Beth Fulks, June 23, 2014.
Marking the Most of the Web’s Resources
Personal spaces.
Internet and security.
Navigating the Internet
© EIT, Author Gay Robertson, 2017
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Information Security Awareness 101
Smartsheet at Austin Energy
The Internet What is the internet?
Internet Vocabulary Terms
Presentation transcript:

Internet Literacy for Educators Project 1: Research Project Kelley Dixon Fall 2007

Part 1 History of the Internet

What is the Internet a vast computer network linking smaller computer networks worldwide. The Internet includes commercial, educational, governmental, and other networks, all of which use the same set of communications protocols. a vast computer network linking smaller computer networks worldwide. The Internet includes commercial, educational, governmental, and other networks, all of which use the same set of communications protocols.

Did Al Gore Create the Internet? Although Al Gore did provide early support, most historical accounts say the Internet was created in 1969, when the first network of widely separated computers was set up by the Defense Department to aid in computer research. It was called the ARPANET, and it was created by scientists at Bolt Beranek & Newman, or BB&N, in Cambridge, Mass., and at Stanford University, based on concepts described earlier by Massachusetts Institute of Technology scientists J.C.R. Licklider and Leonard Kleinrock (and a few others). Bolt Beranek & Newman Al Gore

Internet Usage INTERNET USAGE STATISTICS - The Big Picture World Internet Users and Population Stats

Growth Chart

Part 1: Sources Slide 3 internet. (n.d.). Dictionary.com Unabridged (v 1.1). Retrieved October 01, 2007, from Dictionary.com website: Slide Slide 5 and 6

Part 2 Google Docs

What are Google Docs? Create documents, spreadsheets and presentations online

What are Google Docs? Share and Collaborate in Real time

What are Google Docs? Control Who Can See Your Work

What are Google Docs? Safely Share and Organize Your Work

What are Google Docs? gle.com%2F%3Fhl%3Den&followup=http%3A%2F%2Fdocs.google.com%2F%3Fhl%3Den&ltmpl=homepage&nui=1

Part 2: Sources Slides

Part 3 Internet Privacy

How Safe are We? From companies losing laptops Free Internet Service containing sensitive data to Time Warner AOL releasing customers search terms -- have again turned the spotlight on Internet privacy. Internet privacy is at risk due to the presence of different elements. The presence of spyware is one factor of risk for Internet privacy security.

Keep Out! These days Spyware, Adware and other malicious software programs are everywhere, and it seems almost impossible to stop them. You can be infected just by visiting a website, or by installing a popular software title. Once you are infected with even one of these malicious programs they can download and install even more! In fact, the people that produce Spyware and Adware pay good money to software developers to distribute their malicious programs. The more Spyware they can get installed on your computer, the more money they make!

Who’s Watching Not only are people producing malicious software programs to track our computer use and install unwanted software, the internet has also allowed access to a wide variety of personal information

Let Your Fingers Do the Walking Check out all the things you can find on

Give a Stranger Your Phone Number?? Type your phone number into Google and see what happens…scarey!

Who’s that Knocking at the Door?? Once someone has your address, they can easily use mapquest for step by step driving directions

This is only the Tip of the Iceberg Many government documents are now available online

Part 3: Sources Slide 18 Slide 16 Slide 17 s.htm s.htm