SlideShare a Scribd company logo
1 of 2
Download to read offline
1
UNIT 2. Internet. Security and responsability.
1. Unit summary:
1. Internet: is a network of thousands of computers and devices around the world
connected by cooper wires, fibre optics, wireless connections and other methods.
2. Browser: a programme that displays the content of web pages.
3. Search engine: is a computer system that indexes files stored on websites.
4. URL: uniform resource locator. The address that identifies a website on the Internet.
5. Server: is a computer with special features, prepared to provide uninterrupted
services to lots of useers.
2. Order the stages that go from when I connect to the Internet to search for
an address in a browser until the corresponding web page appears:
1. I connect to the Internet if I have got an Internet servide provider (ISP) that
assigns an addres to my computer, calle dan IP address.
2. A router lets me connect to the Internet. Once connected, I open my browser
and type the address of a page in it (URL). Information starts to travel in the
form of packets.
3. DNS servers assign a name to each IP address.
4. My computer communicates with other computers following a common set of
rules called a protocol.
5. The DNS server sends the request to the server that hosts the web page we
want to visit.
6. Finally, the packets reach our computer and are reassembled. The page is then
displayed in our browser.
3. Tell me four tools to protect our personal safety and machine security.
1. Our attiude protects us from identify theft, phising, loss of privacy, damage to
our identity or image, ciberbullying,…
2. Antivirus that can protect our computer from attacks by viruses and Trojans.
3. Firewall that displays alerts to ask confirmation for any program that uses the
Internet connection.
4. Passwords that can enhance the security of a file, folder, computer, etc.
2
4. Match up the ítems in these two columns:
Threat Answer
Virus ANTIVIRUS Criptography
Trojans ANTIVIRUS Firewall
Black hackers CRIPTOGRAPHY. WHITE
HACKING
Antivirus
Ciberbullying REPORT Passwords
Spyware FIREWALL Report
Loss of privacy TAKE CARE OF OUR PRIVACY White hacking
Phising PASSWORDS Take care of our privacy
5. Explain why our attitude is our best protection to the Internet.
We must be digitally responsable. When we use Internet tools, we need to keep in mind
our own safety and respect for others. We have to use commom sense and do not do
things on a computer that we would not do in everyday life.
6. What is the digital footprint?
Everything we do on the Internet leaves a trace. This information is our digital identity
and it is our duty to take care of it.

More Related Content

What's hot

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threadsVdidv
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethicsSyed Zeeshan Ali
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!aimane
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
CLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONSCLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONSRc Os
 
Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
 
Internet terms
Internet termsInternet terms
Internet termstheAidman
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 

What's hot (20)

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Aiman
AimanAiman
Aiman
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Protection
ProtectionProtection
Protection
 
Adware
AdwareAdware
Adware
 
Presentation
 Presentation Presentation
Presentation
 
CLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONSCLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONS
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Internet terms
Internet termsInternet terms
Internet terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Similar to Review unit 2 tecnology 2 eso

CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyYhal Htet Aung
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...Sijuna Aetta
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxToleraYadessaGonfa
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 

Similar to Review unit 2 tecnology 2 eso (20)

shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...
 
Cyber security
Cyber securityCyber security
Cyber security
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hamza
HamzaHamza
Hamza
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer security
Computer securityComputer security
Computer security
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Review unit 2 tecnology 2 eso

  • 1. 1 UNIT 2. Internet. Security and responsability. 1. Unit summary: 1. Internet: is a network of thousands of computers and devices around the world connected by cooper wires, fibre optics, wireless connections and other methods. 2. Browser: a programme that displays the content of web pages. 3. Search engine: is a computer system that indexes files stored on websites. 4. URL: uniform resource locator. The address that identifies a website on the Internet. 5. Server: is a computer with special features, prepared to provide uninterrupted services to lots of useers. 2. Order the stages that go from when I connect to the Internet to search for an address in a browser until the corresponding web page appears: 1. I connect to the Internet if I have got an Internet servide provider (ISP) that assigns an addres to my computer, calle dan IP address. 2. A router lets me connect to the Internet. Once connected, I open my browser and type the address of a page in it (URL). Information starts to travel in the form of packets. 3. DNS servers assign a name to each IP address. 4. My computer communicates with other computers following a common set of rules called a protocol. 5. The DNS server sends the request to the server that hosts the web page we want to visit. 6. Finally, the packets reach our computer and are reassembled. The page is then displayed in our browser. 3. Tell me four tools to protect our personal safety and machine security. 1. Our attiude protects us from identify theft, phising, loss of privacy, damage to our identity or image, ciberbullying,… 2. Antivirus that can protect our computer from attacks by viruses and Trojans. 3. Firewall that displays alerts to ask confirmation for any program that uses the Internet connection. 4. Passwords that can enhance the security of a file, folder, computer, etc.
  • 2. 2 4. Match up the ítems in these two columns: Threat Answer Virus ANTIVIRUS Criptography Trojans ANTIVIRUS Firewall Black hackers CRIPTOGRAPHY. WHITE HACKING Antivirus Ciberbullying REPORT Passwords Spyware FIREWALL Report Loss of privacy TAKE CARE OF OUR PRIVACY White hacking Phising PASSWORDS Take care of our privacy 5. Explain why our attitude is our best protection to the Internet. We must be digitally responsable. When we use Internet tools, we need to keep in mind our own safety and respect for others. We have to use commom sense and do not do things on a computer that we would not do in everyday life. 6. What is the digital footprint? Everything we do on the Internet leaves a trace. This information is our digital identity and it is our duty to take care of it.