Lesson 27 Communications and Collaboration

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Basic Communication on the Internet:
1 Lesson 15 Evaluating Electronic Information Computer Concepts BASICS 4 th Edition Wells.
Lesson 30 Computer Safety and Ethics
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Lesson 5 Computer-Related Issues
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
August 15 click! 1 Basics Kitsap Regional Library.
Viruses & Destructive Programs
Lesson 10 Operating System Customization
Internet safety By Lydia Snowden.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Unit 10 Communication, Collaboration, and Safety.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 26 Communication Services 1 Morrison / Wells / Ruffolo.
BUSINESS B1 Information Security.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Communications and Collaboration Exploring communication methods People with whom you are corresponding and the topic of the correspondence determine.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Telecommunications Communication over a long distance; Distant communication.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
Topic 5: Basic Security.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Communications and Collaboration. Exploring communication methods People with whom you are corresponding and the topic of the correspondence determine.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Lesson 5 Computer-Related Issues Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1 Lesson 10 Operating System Customization Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Network System Security - Task 2. Russell Johnston.
Internet Business Associate v2.0
DIGITAL CITIZENSHIP What You Should Know!.
Unit 10 Communication, Collaboration, and Safety
Unit 11 Communication & Collaboration
Protect Your Computer Against Harmful Attacks!
Communications and Collaboration
Module 7 Questions Prepared by Mr O Seguna next.
Communications and Collaboration
Communications and Collaboration
Presentation transcript:

Lesson 27 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC3, 4th Edition Morrison / Wells

Objectives 2 2 Explore communication methods. Identify the advantages of electronic communication. Solve electronic communication problems. Protect against viruses and other security risks. Engage in professional and effective communications. Use other e-mail options. Follow guidelines for electronic communication. 2 2

Vocabulary spam tagging teleconferencing time bomb Trojan horse filtering fraud hoax logic bomb netiquette phishing pyramid scheme RDF Summary spam tagging teleconferencing time bomb Trojan horse urban legend virus worm 3 3

Exploring Communication Methods When you work with computers to communicate, you can use a variety of electronic communication methods, including e-mail and texting. 4 4

Exploring Communication Methods (continued) Teleconferencing uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people. Syndication (Really Simple Syndication, or RSS), also known as Rich Site Summary and RDF Summary, are formats widely used to share the contents of blogs. 5 5

Identifying the Advantages of Electronic Communication Electronic communication offers many advantages over other types of communication: Not restricted to a specific place and time You can use text and graphics You can use more than one type of correspondence Fosters community building Online document sharing 6 6

Identifying the Advantages of Electronic Communication (continued) Other advantages include: Speed is almost instantaneous Cost is minimal or even free Access is available from various devices Forwarding and routing of messages can be accomplished in an instant 7 7

Solving Electronic Communication Problems Lost Internet Connection: You may be able to repair the problem with the Internet Connections troubleshooter. 8 8

Solving Electronic Communication Problems (continued) E-Mail Software Problems: Your service provider’s connection could be down. Often, waiting a few minutes and then trying to send or receive messages results in success. Problems with Downloading and Viewing E-Mail Attachments: Attachment is too big or too many attachments Antivirus software or e-mail program is blocking Sender or type of e-mail is being blocked 9 9

Solving Electronic Communication Problems (continued) Delivery Failure: E-mail delivery failure refers to a returned or “bounced” e-mail. Garbled Messages/No Guaranteed Delivery: Occasionally, e-mail and other transmissions over the Internet are lost or spliced together. 10 10

Solving Electronic Communication Problems (continued) Lost Formatting: Not all e-mail programs support HTML-formatted messages, so formatting is lost. Lack of a Paper Trail: A paper trail is a written record, history, or collection of evidence created by a person or organization in the course of activities. Not all types provide this. Hasty Responses: Don’t send quick replies that you might later regret. 11 11

Solving Electronic Communication Problems (continued) Professional and Informal Communication: When writing professional communications, take time to be more formal. Volume of E-Mail Replies: Netiquette refers to good manners when communicating through electronic media. Junk Mail (Spam): Just as with regular mail, you might receive unsolicited messages in your inbox. 12 12

Solving Electronic Communication Problems (continued) Frauds, Hoaxes, and Other False Information: Electronic fraud is a computer crime that involves the manipulation of a computer or computer data to dishonestly obtain money, property, information, or other things of value, or to cause loss. Phishing messages are personal information scams. Pyramid schemes are an illicit business model where profits are based on the investor’s ability to recruit other people who are enrolled to make payments to their recruiters. 13 13

Solving Electronic Communication Problems (continued) Frauds, Hoaxes, and Other False Information (continued): A hoax is an attempt to deceive an audience into believing that something false is real. Urban legends are stories that at one time could have been partially true but have grown from constant retelling into a mythical yarn. 14 14

Protecting Against Viruses and Other Security Risks A program written to corrupt data on a computer. A worm makes many copies of itself, consuming system resources so that the computer slows down or actually halts tasks. A time bomb does not cause its damage until a certain date or until the system has been launched a certain number of times. 15 15

Protecting Against Viruses and Other Security Risks (continued) Viruses (continued): A logic bomb is triggered by the appearance or disappearance of specified data. A Trojan horse is a virus that does something different from what it is expected to do. General Security Risks: The best way to protect data is to effectively control access to it using passwords, firewalls, or other methods. 16 16

Engaging in Professional and Effective Communications Content, tone, and format should be appropriate Personal and social messages can be less formal Select a method that suits the purpose Respond quickly Messages should be concise and to the point Include one subject per e-mail The purpose and recipients should determine the level of formality Don’t duplicate or repeat information 17 17

Using Other E-Mail Options Control for viruses and spam. Protective tools and procedures include firewalls, encryption, antivirus tools, spam filters, and user education. 18 18

Using Other E-Mail Options Controlling Unsolicited E-Mail: You can filter your incoming e-mail messages to do the following: Sort incoming messages into folders Automatically tag messages Forward messages Discard messages 19 19

Using Other E-Mail Options (continued) Filtering Mail by Mail Servers: E-mail servers are usually set up to catch obvious spam and remove it before it is transferred to users. 20 20

Following Guidelines for Electronic Communication Check all messages for viruses Verify communication is appropriate before sending Apply rules of netiquette and other policies Encrypt e-mail messages Back up and archive correspondence Understand the sensitive nature of data sent online Be aware communication can leave an “electronic trail” Follow school and organization guidelines 21 21

Summary In this lesson, you learned: Teleconferencing uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people. Syndication (Really Simple Syndication or RSS), also known as Rich Site Summary and RDF Summary, are formats originally developed to facilitate the syndication of news articles. 22 22

Summary (continued) Electronic communication offers many advantages over other types of communication. For example, the communication is not restricted to a specific place and time. Secondly, in most instances, it uses text and graphics rather than voice. These tools also provide for different types of correspondence such as one to one, one to many, or many to many. 23 23

Summary (continued) Typical communication problems include failing to connect to the Internet or to your e-mail server. Being unable to download or view an e-mail attachment could be due to the size of the attachment, a virus in the message, the sender, or the type of e-mail. Communications netiquette, a combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media. 24 24

Summary (continued) Fraud is a computer crime that involves manipulating a computer or computer data to dishonestly obtain money, property, or other things of value or to cause loss. A virus is a program that has been written, usually by a hacker, to corrupt data on a computer. The virus is attached to a file and then spreads from one file to another once the program is started. Computer security can keep hardware, software, and data safe from harm or destruction. The best way to protect data is to effectively control access to it. 25 25