1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Basic Communication on the Internet:
Lesson 30 Computer Safety and Ethics
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Lesson 5 Computer-Related Issues
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Module 7 Questions Prepared by Mr O Seguna. Contents Q1 – Uniform Resource Locator (web address)Uniform Resource Locator (web address) Q2 – Internet /
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 10 Operating System Customization
Internet safety By Lydia Snowden.
Unit 10 Communication, Collaboration, and Safety.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Digital Citizenship Project
Digital Citizenship By: Miranda Scorver.
Lesson 27 Communications and Collaboration
1 Lesson 29 Web Content Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
BUSINESS B1 Information Security.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Lesson 31 Computer Safety and Ethics
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Communications and Collaboration. Exploring communication methods People with whom you are corresponding and the topic of the correspondence determine.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Lesson 5 Computer-Related Issues Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Lesson 9 Windows Management Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1 Lesson 10 Operating System Customization Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Windows Vista Configuration MCTS : Productivity Applications.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Network System Security - Task 2. Russell Johnston.
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
Unit 10 Communication, Collaboration, and Safety
Unit 11 Communication & Collaboration
Communications and Collaboration
Module 7 Questions Prepared by Mr O Seguna next.
Communications and Collaboration
Communications and Collaboration
Presentation transcript:

1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E 222 Objectives Identify appropriate uses for different communication methods. Identify the advantages of electronic communications. Identify common problems associated with electronic communications. Identify the elements of professional and effective electronic communications.

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E 333 Objectives (continued) Identify appropriate use of attachments and other supplementary information. Identify issues regarding unsolicited . Describe how to minimize or control unsolicited . Identify effective procedures for ensuring the safe and effective use of electronic communications.

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Vocabulary biometric security measures filtering fraud hoax logic bomb netiquette phishing pyramid schemes RDF Summary spam tagging teleconferencing time bomb Trojan horse urban legend virus worm 444

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Communication Methods is best when the correspondence requires a paper trail, covers multiple points, and needs to be accessed frequently. Instant messaging is best when the correspondence needs to be in real time. Teleconferencing permits the live exchange and sharing of information between two or more people. RDF Summary is a format used to share the content of blogs. 555

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Advantages of Electronic Communications – Not restricted to time and space – Uses text and graphics rather than voice – Speed is almost instantaneous – Cost is minimal or even free – Access is available from various devices – Forwarding and routing can be accomplished – Collaborative communication allows interaction – Community building connects group members – Online document sharing possible 666

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Solving Communication Problems Troubleshooting tools help identify problems. Lost Internet Connection: The Network Connection Repair tool can help. 777 Windows Network Diagnostics dialog box

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Solving Communication Problems (continued) Software Problems: Windows Help and Support provides answers. 888 Troubleshoot problems with Windows Mail window

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Solving Communication Problems (continued) Downloading and Viewing Attachment Problems: Could be due to attachment size, a virus, or the sender may be blocked. Delivery Failure: can “bounce” because the address was mistyped; it may have a virus; it was identified as spam; the sender is blocked; or the mailbox is full. 999

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Solving Communication Problems (continued) Garbled Messages/No Guaranteed Delivery: Occasionally and other transmissions over the Internet are lost or spliced together. Lost Formatting: If the recipient’s program does not support HTML, the message will display as plain text. 10

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Solving Communication Problems (continued) Lack of a Paper Trail: Paper trails have been used in legal cases for evidence proof and in other situations. Some types of electronic communications do not produce a paper trail. Hasty Responses: Avoid sending messages you may later regret. 11

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Professional Versus Informal Communication Volume of Replies: Communication netiquette refers to good manners and proper behaviors when communicating through electronic media. Use guidelines when replying to messages. Junk Mail (Spam): Prevent by using caution giving out your address; checking Web site privacy statements; not replying to junk ; and using a filter. 12

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Fraud, Hoaxes, and Other False Information This type of computer crime involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, information, or other things of value, or to cause loss. Fraud: Phishing involves sending messages that appear to come from legitimate sources asking to update or verify personal information, are in fact used to commit identity theft. Pyramid schemes are an illicit business model. 13

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Fraud, Hoaxes, and Other False Information (continued) Hoaxes: A hoax is an attempt to deceive an audience into believing that something false is real. Urban legends are stories that at one time could have been partially true, but have grown from constant retelling into mythical yarn. 14

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Viruses and Security Viruses: A virus is a program that has been written, usually by a hacker, to cause corruption of data on a computer. Types include: – Worm – Time bomb – Logic bomb – Trojan horse 15

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Viruses and Security (continued) Viruses (cont): How a virus can spread 16

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E General Security Risks The best way to protect data is to effectively control access using passwords, electronic identification cards, firewalls, and antivirus software. Use precautions by instituting a selective hiring process, regularly backing up data, and employing biometric security measures. 17

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Professional and Effective Communications Rules of etiquette and formality apply to business communications. Consider whether the type of communication is business, social, or professional. The purpose and the recipients of the message will determine the level of formality. 18

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Other Options Attachments and hyperlinks can be added to messages. Controlling Unsolicited Filtering allows you to define rules to manage incoming by sorting, tagging, forwarding, and deleting messages. Filtering Mail by Mail Servers: Software filtering can cut down or eliminate most junk mail. 19

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E Guidelines for Electronic Communications A checklist of guidelines for electronic communications: – Attachments should be checked for viruses. – Review communication prior to sending – Understand and apply rules of netiquette – Encrypt messages – Filter messages – Back up and archive regularly – Be aware of leaving an “electronic trail” – Follow school and company guidelines 20

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E 21 Summary In this lesson, you learned: Teleconferencing uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people. Syndication (Really Simple Syndication or RSS), also known as Rich Site Summary and RDF Summary, are formats originally developed to facilitate the syndication of news articles. 21

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E 22 Summary (continued) Electronic communication offers many advantages. The communication is not restricted to a specific place and time. Secondly, in most instances, it uses text and graphics rather than voice. These tools also provide for different types of correspondence such as one to one, one to many, or many to many. Typical communication problems include failing to connect to the Internet or to your server. Being unable to download or view an attachment could be due to the size of the attachment, a virus in the message, or the sender and the type of . 22

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E 23 Summary (continued) Communications netiquette, a combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media. Fraud and false information are computer crimes that involve the manipulation of a computer or computer data in order to dishonestly obtain money, property, or other value or to cause loss. 23

Lesson 26 Morrison / WellsCLB: A Comp Guide to IC 3 3E 24 Summary (continued) A virus is a program that has been written, usually by a hacker, to cause corruption of data on a computer. The virus is attached to a file and then spreads from one file to another once the program is executed. Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. The best way to protect data is to effectively control access. 24