SlideShare uma empresa Scribd logo
1 de 3
Different types of Internet connections
Cable, DSL, Dial-up, 3G, Wi-Fi
Different types of ISPs (Internet Service Providers) and the type of internet connection that
they fall under.
Rogers, Bell, Shaw, Cogeco, Net Zero, Tek Savvy, TELUS, Earth Link
What is a worm?
A standalone malware computer program that replicates itself in order to spread to other
computers.
What is a virus?
A program on your computer that can affect different parts of your computer.
What is spyware?
A type of malware that is installed along with other programs without your knowledge.
What is adware?
Software that automatically displays or downloads unwanted advertising material.
Different Parts of the Computer
 Monitor
 Projector
 Mouse
 Computer speakers
 Motherboard
 Keyboard
 Memory Chip
 Flatbread Scanner
 Printer
 CPU (RAM)
 Laptop
 USB Flash Drive
 Ethernet Hub
Difference between browsers (Internet Explorer, Safari, Google Chrome and Firefox)
and Search Engines (Google, Cuil, Yahoo)
An internet browser allows you to view web pages on the internet. A search engine is a
web tool that allows you to search for information on the internet.
What is a Virtual Private Network (VPN)?
A network that is used by the internet to connect to a private network. For example, a
company’s network.
What is an Acceptable Use Agreement (AUP)?
Rules and consequences that a user must agree to for access to a corporate network or
the internet.
Outlines the rules of computer usage and the consequences for breaking them.
Identify parts of the computer as INPUT, OUTPUT, PROCESS and STORAGE.
What is an application?
Microsoft Word, Adobe Photoshop, Adobe Illustrator, Notepad, Paint
What is an Operating System?
Operating systems provide a software platform on top of which other programs,
called application programs, can run.
Workplace Surveillance
The use of computer to monitor activity in a place of work.
IP Address
A numerical label assigned to each device (e.g., computer, printer)
Devices that Connect to the Internet
Smart TV, Phone, Computer, Tablet, Printer, etc.
Ethical and Unethical Practices on the Internet
Ethical: Researching information, listening to music, etc.
Unethical: viewing inappropriate pictures, bullying someone over social media
Search Engines and Internet Browsers
Search Engines: Google, Bing, Yahoo
Internet Browsers: Google Chrome, Firefox, Safari, Internet Explorer
URL and parts of the URL
URL (Uniform Resource Locator) (http, :, //, www, domain name)
HTML
Hypertext Markup Language
What is a Domain Name? Provide Examples.
The part of a network address that identifies it as belonging to a particular domain
HTTP
Hypertext Transfer Protocol
Cookies
Little files that hide in your computer so that your browser and websites can track your
browsing sessions and save certain information like passwords.
2 ways to protect yourself against viruses.
Get a virus protector, if you come across any file on the internet that looks funny, don’t
open it.
3 reasons why people create viruses.
To cripple a computer or network, to generate money and steal people’s information.

Mais conteúdo relacionado

Mais procurados

Virus09
Virus09Virus09
Virus09
defler
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salim
HAMOOD13
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs inset
Maxie Santos
 

Mais procurados (18)

C 7
C 7C 7
C 7
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computers and more
Computers and moreComputers and more
Computers and more
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Ali abdullah
Ali abdullahAli abdullah
Ali abdullah
 
Virus09
Virus09Virus09
Virus09
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Mohamme d hamed
Mohamme d hamedMohamme d hamed
Mohamme d hamed
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salim
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs inset
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 

Destaque (14)

Discussion
DiscussionDiscussion
Discussion
 
sensi:vessel-lr
sensi:vessel-lrsensi:vessel-lr
sensi:vessel-lr
 
Thesis Mark McNaughton
Thesis Mark McNaughtonThesis Mark McNaughton
Thesis Mark McNaughton
 
COSMO VIP AMENITIES comp
COSMO VIP AMENITIES compCOSMO VIP AMENITIES comp
COSMO VIP AMENITIES comp
 
BikeLockSeniorProjectReport
BikeLockSeniorProjectReportBikeLockSeniorProjectReport
BikeLockSeniorProjectReport
 
Victor (edited) resume
Victor (edited) resumeVictor (edited) resume
Victor (edited) resume
 
Fashion orientation
Fashion orientationFashion orientation
Fashion orientation
 
Challenging Behaviour
Challenging BehaviourChallenging Behaviour
Challenging Behaviour
 
Fundamentos de gerenciamento de projetos
Fundamentos de gerenciamento de projetosFundamentos de gerenciamento de projetos
Fundamentos de gerenciamento de projetos
 
John galliano ppt
John galliano pptJohn galliano ppt
John galliano ppt
 
Essay writing
Essay writingEssay writing
Essay writing
 
11
1111
11
 
Zanamj
ZanamjZanamj
Zanamj
 
Mozilla Community Space Taipei - Status Report 201702
Mozilla Community Space Taipei - Status Report 201702Mozilla Community Space Taipei - Status Report 201702
Mozilla Community Space Taipei - Status Report 201702
 

Semelhante a Digital literacy review

Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
Pranjal Mishra
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
nicamos
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
Ayed Al Qartah
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation Downing
IWCS
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
00susanaob
 
Internet basics
Internet basicsInternet basics
Internet basics
osuchin
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
MISY
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
MISY
 
Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software Attacks
Susan Cox
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
phanleson
 

Semelhante a Digital literacy review (20)

Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Bryanpulido
BryanpulidoBryanpulido
Bryanpulido
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
Vocabulary link - Computers
Vocabulary  link - ComputersVocabulary  link - Computers
Vocabulary link - Computers
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation Downing
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
system Security
system Security system Security
system Security
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Introduction of (ICT).pptx
Introduction of (ICT).pptxIntroduction of (ICT).pptx
Introduction of (ICT).pptx
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
W 6 & 7 comp software
W 6 & 7 comp softwareW 6 & 7 comp software
W 6 & 7 comp software
 
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year ProgramCOMP-111 Past Paper 2021 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year Program
 
Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software Attacks
 
Fun with apps
Fun with appsFun with apps
Fun with apps
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 

Último

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Último (20)

Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 

Digital literacy review

  • 1. Different types of Internet connections Cable, DSL, Dial-up, 3G, Wi-Fi Different types of ISPs (Internet Service Providers) and the type of internet connection that they fall under. Rogers, Bell, Shaw, Cogeco, Net Zero, Tek Savvy, TELUS, Earth Link What is a worm? A standalone malware computer program that replicates itself in order to spread to other computers. What is a virus? A program on your computer that can affect different parts of your computer. What is spyware? A type of malware that is installed along with other programs without your knowledge. What is adware? Software that automatically displays or downloads unwanted advertising material. Different Parts of the Computer  Monitor  Projector  Mouse  Computer speakers  Motherboard  Keyboard  Memory Chip  Flatbread Scanner  Printer  CPU (RAM)  Laptop  USB Flash Drive  Ethernet Hub Difference between browsers (Internet Explorer, Safari, Google Chrome and Firefox) and Search Engines (Google, Cuil, Yahoo) An internet browser allows you to view web pages on the internet. A search engine is a web tool that allows you to search for information on the internet.
  • 2. What is a Virtual Private Network (VPN)? A network that is used by the internet to connect to a private network. For example, a company’s network. What is an Acceptable Use Agreement (AUP)? Rules and consequences that a user must agree to for access to a corporate network or the internet. Outlines the rules of computer usage and the consequences for breaking them. Identify parts of the computer as INPUT, OUTPUT, PROCESS and STORAGE. What is an application? Microsoft Word, Adobe Photoshop, Adobe Illustrator, Notepad, Paint What is an Operating System? Operating systems provide a software platform on top of which other programs, called application programs, can run. Workplace Surveillance The use of computer to monitor activity in a place of work. IP Address A numerical label assigned to each device (e.g., computer, printer) Devices that Connect to the Internet Smart TV, Phone, Computer, Tablet, Printer, etc. Ethical and Unethical Practices on the Internet Ethical: Researching information, listening to music, etc. Unethical: viewing inappropriate pictures, bullying someone over social media Search Engines and Internet Browsers Search Engines: Google, Bing, Yahoo Internet Browsers: Google Chrome, Firefox, Safari, Internet Explorer
  • 3. URL and parts of the URL URL (Uniform Resource Locator) (http, :, //, www, domain name) HTML Hypertext Markup Language What is a Domain Name? Provide Examples. The part of a network address that identifies it as belonging to a particular domain HTTP Hypertext Transfer Protocol Cookies Little files that hide in your computer so that your browser and websites can track your browsing sessions and save certain information like passwords. 2 ways to protect yourself against viruses. Get a virus protector, if you come across any file on the internet that looks funny, don’t open it. 3 reasons why people create viruses. To cripple a computer or network, to generate money and steal people’s information.