Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Digital literacy review
1. Different types of Internet connections
Cable, DSL, Dial-up, 3G, Wi-Fi
Different types of ISPs (Internet Service Providers) and the type of internet connection that
they fall under.
Rogers, Bell, Shaw, Cogeco, Net Zero, Tek Savvy, TELUS, Earth Link
What is a worm?
A standalone malware computer program that replicates itself in order to spread to other
computers.
What is a virus?
A program on your computer that can affect different parts of your computer.
What is spyware?
A type of malware that is installed along with other programs without your knowledge.
What is adware?
Software that automatically displays or downloads unwanted advertising material.
Different Parts of the Computer
Monitor
Projector
Mouse
Computer speakers
Motherboard
Keyboard
Memory Chip
Flatbread Scanner
Printer
CPU (RAM)
Laptop
USB Flash Drive
Ethernet Hub
Difference between browsers (Internet Explorer, Safari, Google Chrome and Firefox)
and Search Engines (Google, Cuil, Yahoo)
An internet browser allows you to view web pages on the internet. A search engine is a
web tool that allows you to search for information on the internet.
2. What is a Virtual Private Network (VPN)?
A network that is used by the internet to connect to a private network. For example, a
company’s network.
What is an Acceptable Use Agreement (AUP)?
Rules and consequences that a user must agree to for access to a corporate network or
the internet.
Outlines the rules of computer usage and the consequences for breaking them.
Identify parts of the computer as INPUT, OUTPUT, PROCESS and STORAGE.
What is an application?
Microsoft Word, Adobe Photoshop, Adobe Illustrator, Notepad, Paint
What is an Operating System?
Operating systems provide a software platform on top of which other programs,
called application programs, can run.
Workplace Surveillance
The use of computer to monitor activity in a place of work.
IP Address
A numerical label assigned to each device (e.g., computer, printer)
Devices that Connect to the Internet
Smart TV, Phone, Computer, Tablet, Printer, etc.
Ethical and Unethical Practices on the Internet
Ethical: Researching information, listening to music, etc.
Unethical: viewing inappropriate pictures, bullying someone over social media
Search Engines and Internet Browsers
Search Engines: Google, Bing, Yahoo
Internet Browsers: Google Chrome, Firefox, Safari, Internet Explorer
3. URL and parts of the URL
URL (Uniform Resource Locator) (http, :, //, www, domain name)
HTML
Hypertext Markup Language
What is a Domain Name? Provide Examples.
The part of a network address that identifies it as belonging to a particular domain
HTTP
Hypertext Transfer Protocol
Cookies
Little files that hide in your computer so that your browser and websites can track your
browsing sessions and save certain information like passwords.
2 ways to protect yourself against viruses.
Get a virus protector, if you come across any file on the internet that looks funny, don’t
open it.
3 reasons why people create viruses.
To cripple a computer or network, to generate money and steal people’s information.