Introducing the networks and the Internet By Cody Gibbs.

Slides:



Advertisements
Similar presentations
Information Technology (IT) activities and careers. Source:
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
$200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $500 $100 Category One Category Two Category.
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER YOUR FUTURE AND INFORMATION TECHNOLOGY.
Nasca Internet Networking and Security viruses.
Your Future and Information Technology
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Quiz Review.
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
What is the Information technology career cluster?
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Careers in MIS Department of Decision Science and Management Information Systems.
Here you are at your computer, but you don’t have internet connections. Your ISP becomes your link to the internet. In order to get access you need to.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
IT Careers Saiprasad Setty. Career Opportunities in Information Technology (IT)  “Information technology and business are becoming inextricably interwoven.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
ICT Information and Communication Technology. Two parts : Core (Compulsory) part Elective part.
Careers in Information Technology Milton Ramer & Courtney Lisenbee.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Computer Crimes Career & Technology Education Department.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
Careers in Information Technology. Pick a Career Computer Programmer Computer Software Engineers Computer Support Specialist Computer Systems Analysts.
9/4/01Mary Price - The Internet1 9/4/01Mary Price - The Internet 2 T h e I n t e r n e t ? I n t e r n a t i o n a l N e t w o r k.
TECHNOLOGY TERMS BY:SHAQUILLA WATSON&SIMONE TAYLOR.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
Minnesota School of Business Rochester, MN Information Technology A.A.S. Degree.
An overview of information technology systems. Evolution of IT Department Data Processing (DP) Electronic Data Processing (EDP) Management Information.
GET CONNECTED Information Technology Career Cluster.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
CITA 310 Section 3 Additional Topics. Common IPv4 Classes ClassFirst numberSubnet maskNumber of networks Number of addresses Class A0 – ,777,216.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
CIW CURRICULUM.  Definition: the management and processing of information using computers and computer networks.  Most businesses have an IT department.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
A resource to help you write about the hosting options available for your community website.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
Glencoe Introduction to Multimedia Chapter 2 Multimedia Online 1 Internet A huge network that connects computers all over the world. Show Definition.
Information Technology
Unit 36: Internet Server Management
4.03 Understand Information Technology activities and careers.
Introduction to Computers
Chapter 16 – Careers in Information Technology
Higher Information Systems
4.03 Understand Information Technology activities and careers.
4.03 Understand Information Technology activities and careers.
Prepared By : Binay Tiwari
4.03 Understand Information Technology activities and careers.
Online Learning.
4.03 Understand Information Technology activities and careers.
Presentation transcript:

Introducing the networks and the Internet By Cody Gibbs

Protecting Computer Software and Data Virus Virus Trojan horse Trojan horse Antivirus programs Antivirus programs Crackers, Hackers Crackers, Hackers Phishing Phishing

The Ethical Responsibilities of the Web Developer Dynamic Pages Pages that link to databases to provide the user real-time information.

Careers Education requirements Education requirements Web Developer Web Developer Web Designer Web Designer Webmaster Webmaster Web Author Web Author

IT Departments and Companies Intranet Analysts Network administrator ISP Web Host

Pursuing an IT Career Careers: Careers: Media, Computer Arts, Computer Engineering, Computer Animation, ect. Many collages and universities are requiring students to submit an electronic portfolio as part of the admissions process. Many collages and universities are requiring students to submit an electronic portfolio as part of the admissions process.