greetings

WELCOME TO THE NUMBER ITEC BLOG EVER

INTERNET

  • WWW     
World Wide Web: computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol
wordnetweb.princeton.edu/perl/webwn

  • INTERNET
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange.
wordnetweb.princeton.edu/perl/webwn


  • MODEM
(from a combination of MOdulate and DEModulate) electronic equipment consisting of a device used to connect computers by a telephone line.wordnetweb.princeton.edu/perl/webwn


  • BROADBAND
of or relating to or being a communications network in which the bandwidth can be divided and shared by multiple simultaneous signals (as for voice or data or video).
responding to or operating at a wide band of frequencies; "a broadband antenna"
wordnetweb.princeton.edu/perl/webwn


  • DAIL UP
Dial-up Internet access is a form of Internet access that uses telephone lines. The user's computer or router uses an attached modem connected to a telephone line to dial into an Internet service provider's (ISP) node to establish a modem-to-modem link, which is then used to route Internet ...
en.wikipedia.org/wiki/Dial_Up


  • WIRELESS
Wireless communication is the transfer of information over a distance without the use of electrical conductors or "wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometers for radio communications). ...
en.wikipedia.org/wiki/Wireless


  • SMS
Short Message Service (SMS) is a communication service component of the GSM mobile communication system, using standardized communications protocols that allow the exchange of short text messages between mobile phone devices. ...
en.wikipedia.org/wiki/SMS


  • MMS
MMS is a service developed jointly together with 3GPP, allows users to combine sounds with images and text when sending messages, much like the text-only SMS.
https://secure1.telkom.co.za/ir/glossary/glossary.jsp


  • CYBERBULLYING
Cyberbullying "involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others. -Bill Belsey"
en.wikipedia.org/wiki/Cyberbullying

  • PHISHING

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. ...
en.wikipedia.org/wiki/Phishing


  • CYBERSTALKING
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. ...
en.wikipedia.org/wiki/Cyberstalking


  • MASQUERADING





  • masquerade - a party of guests wearing costumes and masks
















  • masquerade - take part in a masquerade
















  • masquerade - fancy dress: a costume worn as a disguise at a masquerade party
















  • masquerade - pretend to be someone or something that you are not; "he is masquerading as an expert on the internet"; "This silly novel is masquerading as a serious historical treaty"
















  • masquerade - making a false outward show; "a beggar's masquerade of wealth"
    wordnetweb.princeton.edu/perl/webwn













    • SPAM
    Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. ...
    en.wikipedia.org/wiki/Spam_(electronic)


    • VIRUS
    A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. ...
    en.wikipedia.org/wiki/Virus_(computer)


    • E-SAFTY
    e-Safety – the safe and responsible use of technology – is sometimes presented as primarily a child protection issue. While children, young people and vulnerable adults do need support to keep themselves safe online (see Safeguarding), the risks associated with the use of technology are not confined to them. e-Safety issues may also affect adults – for example, the mismanagement of personal data, and risks of financial scams, identity theft and cyberbullying. This will be particularly relevant for those adults who are new to using technology.There is wealth of online resources to support organisations and individuals in keeping safe online.



    • SPYWARE

    computer software that obtains information from a user's computer without the user's knowledge or consent
    wordnetweb.princeton.edu/perl/webwn


    • POP-UP
    A new window opening on top of the used internet browser window. Pop-ups that open without the permission of the user usually feature advertisements.
    www.tietoturvakoulu.fi/en/index/opettajille/sanastoa.html




    2 SOCIAL NETWORK SITES



    • FACEBOOK
    • BEBO
    • TWITTER
    • TUMBLR
    • MYSPACE
    • TAGGED
    • AND MANY MORE!!!!

    B. Do a survey of the class - who belongs to what social networking sites?
    its on my poll.
    C. Find a newspaper article or news video about the dangers of social networking. Insert the video if you can into your blog, and on your 'Internet' page add a link to your article / video.
    Copy and answer the following questions about the article / video:
    Do you have a My Space profile? Have you ever searched for items to buy on Craiglist? Do you share or view photos on sites like Flick? It is almost a certainty that you do one of the above or something close to it. Social networking is huge and growing bigger. It provides a number of benefits and advantages for users, but sexual predators and scam artists have also discovered that these social networks can be exploited to locate new victims. Read my article to learn more about the risks and some steps you can take to protect yourself and use these sites safely.
    1. What newspaper was the article published in / news video shown on? YouTube
    2. Who were the people affected in the story? two fifteen year old girls
    3. What happened to them? syber rape
    4. What did you learn from reading the article / watching the video? stay safe on the Internet.



  • Personal details that should never be given over the Internet or on a social networking site

    photos
    age
    last name
    about your self
    personal info




  • Personal details that are okay to give online / use in social networking sites

    name
    day of birth
    1 thing you like
    favourite place
    favourite food




  • Personal details that are sometimes okay to give online / use in social networking sites
    middle name
    pictures of pets
    pictures of your self
    your hobbies
    what job you do



  • 1. List 5 different search engines you could use to search the internet
    • GOOGLE
    • YAHOO
    • MY WEB SEARCH
    • RS SEARCH
    • MOZILLA SEARCH
    2. Put your full name into google:
              a. how many pages come up in the search?1,310,000
              b.  How many of the pages in the search ACTUALLY have anything to do with you?NONE
    4. Choose an animal, and do a google search:
              a. how many web pages does google find for you?3,540,000
              b. Look at all of the first 20 web pages listed. For each one have a look at the web page, put the link into your answers, and say how good it was.
    http://www.mozilla.org/js/spidermonkey/ was completely a waste of time
     
     
     
     
     
              c. For those websites listed above, say if you think they were a reliable source or not.
             a. What is wikipedia?
             b. Who launched the site, and when?
             c. Search for Glenfield College in Wikipedia. Find the sentance that relates