IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Social Media.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Using internet and cell phones safely
Digital Citizenship Lisa Burch ED 505. Nettiquete on Social Media Sites What is it? How we handle ourselves when interact on sites such as Facebook, Twitter,
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
CSC 101 Slide Show Ashley Carroll. Podcast What is Podcasting? Podcasting is the distribution of audio or video files, such as radio programs or music.
By Nathan McCann. Blogs  
The term web2.0 refers to the development of online services that encourage collaboration, communication and information sharing. CILIP Scotland
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Threats to I.T Internet security By Cameron Mundy.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Brought To You By: Mrs. Swanson and Ms. Faase.  (n.) This is a website that includes the collaboration of work from many different authors. A wiki site.
 Facebook  Twitter  MySpace  Windows LiveSpace.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
INTERNET SAFETY RULES. TECHNOLOGY Technology has become an important part of today’s classroom as well as the world. Students need to be able to use and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
My Good Deed for Safer Internet Day Calum - 4W My good deed for Safer Internet Day 2015 is: Always try to help others and teach your parents or.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Digital CitizenshipDigital Citizenship By Pinsinee Mekpanuwat (pin) Smita Jirayingcharoen (mudmee)
Website that support online communities 1. Wikis 2. Blogs 3. Forums 4. Social networking sites.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
The Online World ONLINE DOCUMENTS. Online documents Online documents (such as text documents, spreadsheets, presentations, graphics and forms) are any.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
COMMUNICATION CHANNELS Alan Reilly and Andrew Patterson.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Computer Security Keeping you and your computer safe in the digital world.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Safety.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
How to use the internet safely and How to protect my personal data?
TECHNOLOGY GUIDE THREE
How to use the internet safely and How to protect my personal data?
Unit 4 IT Security.
Introduction to Networks
Unit# 5: Internet and Worldwide Web
CYBERSAFETY & Personal information
Lecture 7: Specialist Communication Channels
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

IT tools to communicate By Suleman Kalam

Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic devices such as IPod, Laptops and computers. What are podcasts used for? A Podcasts can be used for listening to another person whilst the person is traveling/ on the move How are Podcasts different to a blog? Podcasts Is different to a blog because you don’t need to write anything only listen where as in blogs the user will need to type many characters in order to explain what they are saying.

What is a Wiki A Wiki is a web page where a person can add, delete or modify a content. Wikis are used for to share information Wikis are different compared to a twitter because when editing the wiki a person can type in number of words whereas in twitter you can’t.

Blogs A blog is a personal page People can comment on people blogs Anyone can see it unless it is private.

Video conferencing 6 ways to keep safe when video conferencing 1. Organise the network. 2. Understand how the system of the computer is working. 3. expect, be organised and prepared for a firewall failure. 4. lower the restriction of the links between VIOP network avoid weak passwords (make it strong and secured by typing in different combination of characters This image is copied from google chrome on the 23 rd February

Storing personal information You should keep the information up to date You shouldn't give the information out to anyone like random people or strangers You should keep all the information in the work place and not take it out Don’t use a weak password You should also have a spyware software Anti virus software

Safely viewing and uploading digital content Don’t go to websites that you think are unreal, you may be correct that the website could be fake and lead to a virus and permanent damage to computer systems. Also run a anti virus software after you are finished on web Make sure the user is viewing the right information on the secured right websites

Data protection add Data must be processed and obtained lawfully Data must be within the subject Important valuable data must not be spread to other countries without data protection laws Data must be specified for law full purposes Data must be very safe and secured so that no strangers can have access Information must be updated and accurate Information should not be kept for a long period time Information key data should be relevant

Firewalls Firewalls blocks information coming in or coming out Firewalls are good to keep viruses out Never lose work to viruses Fast and easily to download Need to be up to date

Backups Backing and saving data is very important due to many reasons: A user can remove a important file from the system which then can’t be found When a virus occurs, all important files/data can be lost When a building happens to be in danger e.g. a fire may destroy and demolish the building where the stored data is on the computer (an organisation and businesses would usually store their back up files offsite

Secure sites you know when a website is secure because it has “https” this means Hyper Text Transfer Protocol with Secure Sockets. If it is not secure it will say this HTTP so this is hyper text transfer protocol. you can also tell if it is secure by the padlock is locked.

Blogs are effective communication channels because anyone can post there views blogs can put peoples ideas together If you get stuck on something you can get help from the blog by posting what you are stuck on. You can also post pictures and be in a group For example our it class has a Facebook chat with all our class in it