Our third video in our Information Security series (part of the Introduction …
Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are
There are three forms of authentication •Something you know •Something you have •Something about you
This video focuses on date protection. We look at how to migrate …
This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.
Data is always priceless
Three topics: -Data migration -Data backup -Data disposal
Steps taken to protect computer networks. We cover permissions, user policies (especially …
Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.
Links from Video: -The System Administrator Song http://youtu.be/OpGN3oT1thA
Our 6 video in the Information Security series (part of Introduction to …
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.
Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.
Video 7 of our information security series (part of Introduction to Computers) …
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.
Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download
Our last video in the Information Security lesson covers my favorite topic, …
Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.
I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.
The first video in the Internet series of videos supporting the Introduction …
The first video in the Internet series of videos supporting the Introduction to Computers and BCIS series.
In this video we talk about what is a computer network and how that relates to the Internet. We also talk about some of the basic types of network hardware we need to make a network as well as the difference between a LAN and WAN.
If you have no background in networking this is the video to start with before you go any further into the Internet series.
We love our definitions and in this video we define what the …
We love our definitions and in this video we define what the Internet is. We take a quick look at how the Internet got its start. Finally we look at how to get on the Internet, how to pick the right ISP and check to see how fast you are surfing.
Links from video: http://www.speedtest.net/ http://speedtest.comcast.net/
Get ready to Geek out. In this video we take a look …
Get ready to Geek out. In this video we take a look under the hood of the Internet. We see what technologies run the Internet and more importantly how the make our lives easier.
Topics we cover include : *TCP/IP *HTTP & HTTPS *FTP *SMTP *POP3 *Telnet
Links from Video: FileZilla https://filezilla-project.org/ CuteFTP: http://www.cuteftp.com/ SmartFTP; http://www.smartftp.com/ Cyberduck: http://cyberduck.io/?l=en Mozilla Thunderbird: http://www.mozilla.org/en-US/thunderbird/ Star Wars ASCII: http://youtu.be/Dgwyo6JNTDA
The final video in our series on the Internet. In this one …
The final video in our series on the Internet. In this one we look at what is cloud computing as well as some example of how cloud computing makes your life so much cooler.
We also present our top website to check out.
Links from the video: -w3schools http://www.w3schools.com/ -HostGator http://www.hostgator.com/ -Bitly https://bitly.com/ -Google URL Shortener http://goo.gl/ -The IT Crowd - Series 3 - Episode 4: The Internet -http://youtu.be/iDbyYGrswtg -Paul Soares Jr. https://www.youtube.com/user/paulsoaresjr
This collection of lessons represent adapted and remixed instructional content for teaching …
This collection of lessons represent adapted and remixed instructional content for teaching media literacy and specifically civic online reasoning through distance learning. These lessons take students through the steps necessary to source online content, verify evidence presented, and corroborate claims with other sources.
The original lesson plans are the work of Stanford History Education Group, licensed under CC 4.0. Please refer to the full text lesson plans at Stanford History Education Group’s, Civic Online Reasoning Curriculum for specifics regarding background, research findings, and additional curriculum for teaching media literacy in the twenty-first century.
There are billions of galaxies filled with billions of stars. Each star …
There are billions of galaxies filled with billions of stars. Each star has the potential to have planets orbiting it. Does life exist on some of those planets? Explore the question, “Is there life in space?” Discover how scientists find planets and other astronomical bodies through the wobble (also known as Doppler spectroscopy or radial-velocity) and transit methods. Compare zones of habitability around different star types, discovering the zone of liquid water possibility around each star type. Explore how scientists use spectroscopy to learn about atmospheres on distant planets. You will not be able to answer the module's framing question at the end of the module, but you will be able to explain how scientists find distant planets and moons and how they determine whether those astronomical bodies could be habitable.
Student groups use the Java programming language to implement the algorithms for …
Student groups use the Java programming language to implement the algorithms for optical character recognition (OCR) that they developed in the associated lesson. They use different Java classes (provided) to test and refine their algorithms. The ultimate goal is to produce computer code that recognizes a digit on a scoreboard. Through this activity, students experience a very small part of what software engineers go through to create robust OCR methods. This software design lesson/activity set is designed to be part of a Java programming class.
This new publication by UNESCO is a timely resource and highly topical …
This new publication by UNESCO is a timely resource and highly topical subject for all those who practice or teach journalism in this Digital Age. UNESCO's new handbook is an essential addition to teaching syllabi for all journalism educators, as well as practising journalists and editors who are interested in information, how we share it and how we use it. It is mission critical that those who practice journalism understand and report on the new threats to trusted information. Political parties, health professionals, business people, scientists, election monitors and others will also find the handbook useful in navigating the information disorder. Written by experts in the fight against disinformation, this handbook explores the very nature of journalism - with modules on why trust matters; thinking critically about how digital technology and social platforms are conduits of the information disorder; fighting back against disinformation and misinformation through media and information literacy; fact-checking 101; social media verification and combating online abuse. The seven individual modules are available online to download that enables readers to develop their own course relevant to their media environment. This handbook is also useful for the library and information science professionals, students, and LIS educators for understanding the different dimensions of fake news and disinformation.
Table of Contents Module One | Truth, Trust and Journalism: Why it Matters | by Cherilyn Ireton Module Two | Thinking about "Information Disorder": Formats of Misinformation, Disinformation and Mal-Information | by Claire Wardle & Hossein Derakshan Module Three | News Industry Transformation: Digital Technology, Social Platforms and the Spread of Misinformation and Disinformation |by Julie Posetti Module Four | Combatting Disinformation and Misinformation Through Media and Information Literacy (MIL) | by Magda Abu-Fadil Module Five | Fact-Checking 101 | by Alexios Mantzarlis Module Six | Social Media Verification: Assessing Sources and Visual Content | by Tom Trewinnard and Fergus Bell Module Seven | Combatting Online Abuse: When Journalists and Their Sources are Targeted | by Julie Posetti
This lesson unit is intended to help you assess how well students …
This lesson unit is intended to help you assess how well students are able to: Perform arithmetic operations, including those involving whole-number exponents, recognizing and applying the conventional order of operations; Write and evaluate numerical expressions from diagrammatic representations and be able to identify equivalent expressions; apply the distributive and commutative properties appropriately; and use the method for finding areas of compound rectangles.
This lesson unit is intended to help teahcers assess how well students …
This lesson unit is intended to help teahcers assess how well students are able to interpret speed as the slope of a linear graph and translate between the equation of a line and its graphical representation.
ICT accessibility and inclusive design is considered as a relevant and essential …
ICT accessibility and inclusive design is considered as a relevant and essential topic that needs to be well covered and integrated within capacity building, training and education curricula and programmes. Despite this urgent need, there is a lack of integration of ICT-AID aligned courses in educational institutions and professional development services based on a comprehensive Global competency framework delimiting all required relevant competencies and capabilities in the field of ICT accessibility and Inclusive Design. It is in this context that Mada center has developed an open competency framework in a bid to guide globally training of students and workers on ICT accessibility and inclusive design, so that they will be well prepared to excel in their accessibility professions and contribute in the creation of accessible products, contents and services.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.