SlideShare a Scribd company logo
1 of 3
Different types of Internet connections
Cable, DSL, Dial-up, 3G, Wi-Fi
Different types of ISPs (Internet Service Providers) and the type of internet connection that
they fall under.
Rogers, Bell, Shaw, Cogeco, Net Zero, Tek Savvy, TELUS, Earth Link
What is a worm?
A standalone malware computer program that replicates itself in order to spread to other
computers.
What is a virus?
A program on your computer that can affect different parts of your computer.
What is spyware?
A type of malware that is installed along with other programs without your knowledge.
What is adware?
Software that automatically displays or downloads unwanted advertising material.
Different Parts of the Computer
 Monitor
 Projector
 Mouse
 Computer speakers
 Motherboard
 Keyboard
 Memory Chip
 Flatbread Scanner
 Printer
 CPU (RAM)
 Laptop
 USB Flash Drive
 Ethernet Hub
Difference between browsers (Internet Explorer, Safari, Google Chrome and Firefox)
and Search Engines (Google, Cuil, Yahoo)
An internet browser allows you to view web pages on the internet. A search engine is a
web tool that allows you to search for information on the internet.
What is a Virtual Private Network (VPN)?
A network that is used by the internet to connect to a private network. For example, a
company’s network.
What is an Acceptable Use Agreement (AUP)?
Rules and consequences that a user must agree to for access to a corporate network or
the internet.
Outlines the rules of computer usage and the consequences for breaking them.
Identify parts of the computer as INPUT, OUTPUT, PROCESS and STORAGE.
What is an application?
Microsoft Word, Adobe Photoshop, Adobe Illustrator, Notepad, Paint
What is an Operating System?
Operating systems provide a software platform on top of which other programs,
called application programs, can run.
Workplace Surveillance
The use of computer to monitor activity in a place of work.
IP Address
A numerical label assigned to each device (e.g., computer, printer)
Devices that Connect to the Internet
Smart TV, Phone, Computer, Tablet, Printer, etc.
Ethical and Unethical Practices on the Internet
Ethical: Researching information, listening to music, etc.
Unethical: viewing inappropriate pictures, bullying someone over social media
Search Engines and Internet Browsers
Search Engines: Google, Bing, Yahoo
Internet Browsers: Google Chrome, Firefox, Safari, Internet Explorer
URL and parts of the URL
URL (Uniform Resource Locator) (http, :, //, www, domain name)
HTML
Hypertext Markup Language
What is a Domain Name? Provide Examples.
The part of a network address that identifies it as belonging to a particular domain
HTTP
Hypertext Transfer Protocol
Cookies
Little files that hide in your computer so that your browser and websites can track your
browsing sessions and save certain information like passwords.
2 ways to protect yourself against viruses.
Get a virus protector, if you come across any file on the internet that looks funny, don’t
open it.
3 reasons why people create viruses.
To cripple a computer or network, to generate money and steal people’s information.

More Related Content

What's hot

SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Computers and more
Computers and moreComputers and more
Computers and moreEli Jimenez
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez JohnnAlvarez
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Virus09
Virus09Virus09
Virus09defler
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salimHAMOOD13
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs insetMaxie Santos
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 

What's hot (18)

C 7
C 7C 7
C 7
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computers and more
Computers and moreComputers and more
Computers and more
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Ali abdullah
Ali abdullahAli abdullah
Ali abdullah
 
Virus09
Virus09Virus09
Virus09
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Mohamme d hamed
Mohamme d hamedMohamme d hamed
Mohamme d hamed
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salim
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs inset
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 

Viewers also liked

Viewers also liked (14)

Discussion
DiscussionDiscussion
Discussion
 
sensi:vessel-lr
sensi:vessel-lrsensi:vessel-lr
sensi:vessel-lr
 
Thesis Mark McNaughton
Thesis Mark McNaughtonThesis Mark McNaughton
Thesis Mark McNaughton
 
COSMO VIP AMENITIES comp
COSMO VIP AMENITIES compCOSMO VIP AMENITIES comp
COSMO VIP AMENITIES comp
 
BikeLockSeniorProjectReport
BikeLockSeniorProjectReportBikeLockSeniorProjectReport
BikeLockSeniorProjectReport
 
Victor (edited) resume
Victor (edited) resumeVictor (edited) resume
Victor (edited) resume
 
Fashion orientation
Fashion orientationFashion orientation
Fashion orientation
 
Challenging Behaviour
Challenging BehaviourChallenging Behaviour
Challenging Behaviour
 
Fundamentos de gerenciamento de projetos
Fundamentos de gerenciamento de projetosFundamentos de gerenciamento de projetos
Fundamentos de gerenciamento de projetos
 
John galliano ppt
John galliano pptJohn galliano ppt
John galliano ppt
 
Essay writing
Essay writingEssay writing
Essay writing
 
11
1111
11
 
Zanamj
ZanamjZanamj
Zanamj
 
Mozilla Community Space Taipei - Status Report 201702
Mozilla Community Space Taipei - Status Report 201702Mozilla Community Space Taipei - Status Report 201702
Mozilla Community Space Taipei - Status Report 201702
 

Similar to Digital literacy review

Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentationPranjal Mishra
 
Vocabulary link - Computers
Vocabulary  link - ComputersVocabulary  link - Computers
Vocabulary link - Computersmospetelos
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Sciencenicamos
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The EnterpriseAyed Al Qartah
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation DowningIWCS
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorialSayeedAsghar
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software00susanaob
 
Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
Introduction of (ICT).pptx
Introduction of (ICT).pptxIntroduction of (ICT).pptx
Introduction of (ICT).pptxAhmedAtia68
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year ProgramCOMP-111 Past Paper 2021 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year Programhaiderali8455
 
Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software AttacksSusan Cox
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 

Similar to Digital literacy review (20)

Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Bryanpulido
BryanpulidoBryanpulido
Bryanpulido
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
Vocabulary link - Computers
Vocabulary  link - ComputersVocabulary  link - Computers
Vocabulary link - Computers
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation Downing
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
system Security
system Security system Security
system Security
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Introduction of (ICT).pptx
Introduction of (ICT).pptxIntroduction of (ICT).pptx
Introduction of (ICT).pptx
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
W 6 & 7 comp software
W 6 & 7 comp softwareW 6 & 7 comp software
W 6 & 7 comp software
 
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year ProgramCOMP-111 Past Paper 2021 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2021 complete Solution PU BS 4 Year Program
 
Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software Attacks
 
Fun with apps
Fun with appsFun with apps
Fun with apps
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 

Recently uploaded

Pimpri Chinchwad Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Servi...
Pimpri Chinchwad Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Servi...Pimpri Chinchwad Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Servi...
Pimpri Chinchwad Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Servi...pr788182
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfbelieveminhh
 
DUNGARPUR 💋 Call Girl 9827461493 Call Girls in Escort service book now
DUNGARPUR 💋 Call Girl 9827461493 Call Girls in  Escort service book nowDUNGARPUR 💋 Call Girl 9827461493 Call Girls in  Escort service book now
DUNGARPUR 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxtmthompson1
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Klinik kandungan
 
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxManagerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxssuserf63bd7
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312LR1709MUSIC
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacovaimostorept
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxseemajojo02
 

Recently uploaded (20)

Pimpri Chinchwad Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Servi...
Pimpri Chinchwad Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Servi...Pimpri Chinchwad Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Servi...
Pimpri Chinchwad Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Servi...
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
 
DUNGARPUR 💋 Call Girl 9827461493 Call Girls in Escort service book now
DUNGARPUR 💋 Call Girl 9827461493 Call Girls in  Escort service book nowDUNGARPUR 💋 Call Girl 9827461493 Call Girls in  Escort service book now
DUNGARPUR 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
 
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxManagerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacova
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 

Digital literacy review

  • 1. Different types of Internet connections Cable, DSL, Dial-up, 3G, Wi-Fi Different types of ISPs (Internet Service Providers) and the type of internet connection that they fall under. Rogers, Bell, Shaw, Cogeco, Net Zero, Tek Savvy, TELUS, Earth Link What is a worm? A standalone malware computer program that replicates itself in order to spread to other computers. What is a virus? A program on your computer that can affect different parts of your computer. What is spyware? A type of malware that is installed along with other programs without your knowledge. What is adware? Software that automatically displays or downloads unwanted advertising material. Different Parts of the Computer  Monitor  Projector  Mouse  Computer speakers  Motherboard  Keyboard  Memory Chip  Flatbread Scanner  Printer  CPU (RAM)  Laptop  USB Flash Drive  Ethernet Hub Difference between browsers (Internet Explorer, Safari, Google Chrome and Firefox) and Search Engines (Google, Cuil, Yahoo) An internet browser allows you to view web pages on the internet. A search engine is a web tool that allows you to search for information on the internet.
  • 2. What is a Virtual Private Network (VPN)? A network that is used by the internet to connect to a private network. For example, a company’s network. What is an Acceptable Use Agreement (AUP)? Rules and consequences that a user must agree to for access to a corporate network or the internet. Outlines the rules of computer usage and the consequences for breaking them. Identify parts of the computer as INPUT, OUTPUT, PROCESS and STORAGE. What is an application? Microsoft Word, Adobe Photoshop, Adobe Illustrator, Notepad, Paint What is an Operating System? Operating systems provide a software platform on top of which other programs, called application programs, can run. Workplace Surveillance The use of computer to monitor activity in a place of work. IP Address A numerical label assigned to each device (e.g., computer, printer) Devices that Connect to the Internet Smart TV, Phone, Computer, Tablet, Printer, etc. Ethical and Unethical Practices on the Internet Ethical: Researching information, listening to music, etc. Unethical: viewing inappropriate pictures, bullying someone over social media Search Engines and Internet Browsers Search Engines: Google, Bing, Yahoo Internet Browsers: Google Chrome, Firefox, Safari, Internet Explorer
  • 3. URL and parts of the URL URL (Uniform Resource Locator) (http, :, //, www, domain name) HTML Hypertext Markup Language What is a Domain Name? Provide Examples. The part of a network address that identifies it as belonging to a particular domain HTTP Hypertext Transfer Protocol Cookies Little files that hide in your computer so that your browser and websites can track your browsing sessions and save certain information like passwords. 2 ways to protect yourself against viruses. Get a virus protector, if you come across any file on the internet that looks funny, don’t open it. 3 reasons why people create viruses. To cripple a computer or network, to generate money and steal people’s information.