Ομάδα 34
Εφαρμογές Πληροφορικής Α΄ Γενικού Λυκείου - Ενότητα 4: Συνεργασία και Ασφάλεια στο Διαδίκτυο – Κεφ. 16 Ασφάλεια και Προστασία στο Διαδίκτυο – Σελίδες 134-135
Giannis Antetokounmpo was born in 1994 in Athens, Greece to Nigerian parents. He grew up in poverty in Athens and helped his family by selling items in the streets as a child. He began playing basketball in 2007 and was drafted 15th overall by the Milwaukee Bucks in 2013, becoming the first Greek player drafted in the NBA. Antetokounmpo has since become an NBA All-Star, leading the Eastern Conference in points during the 2017 All-Star Game, and signed a $100 million contract with the Bucks, making him the first NBA player to finish in the top 20 of all major stats.
The Hatziemmanouil winery is a family-owned business located on the Greek island of Kos. Due to its Mediterranean climate, Kos has ideal conditions for grape-growing and wine production. The winery owns 60 acres of fertile land and is the second largest but highest quality wine producer on the island. In 2004, the winery relocated to a larger facility, allowing them to expand production and modernize with new equipment. Today they employ 6 people seasonally to manage the grape growing and winemaking process, which culminates in 6 varieties of award-winning wines that are bottled and distributed.
Ecclesiastical nursing home in Kos, GreeceAthina MINAIDI
The Ecclesiastical Nursing Home "Agios Nektarios" in Kos, Greece was built in 1969-1971 with funding from the Metropolitan Bishop Nathaniel, citizens of Kos, the municipality, and endowments. It currently houses 8 women and 2 men and has capacity for 40 elderly residents. Residents generally stay until the end of their lives as their families are unable or unwilling to care for them. A daily routine includes meals, activities, visits from doctors, and optional participation in programs depending on individual abilities and needs. Common problems faced by residents include loneliness, lack of companionship, and issues with family relationships. Local students recently visited and found the facility to be clean and meeting residents' needs.
This document discusses an Erasmus+ program called "Safe Internet for All" involving schools from across Europe. The schools work on projects related to internet addiction, health, security, ethics, and safety. It describes visits between schools in Austria, Norway, Sweden, Greece, and Poland focused on internet safety workshops and lectures. It provides instructions for accessing the program's website, available in multiple languages, to learn more about the participating schools and their activities.
Hackers are people who try to gain unauthorized access to computer systems. Originally, the term "hacker" referred positively to computer enthusiasts who enjoyed programming, but it now generally refers to those who break into systems or use their skills maliciously. Common types of hacking include breaking into networks, bypassing passwords, defacing websites, and denial of service attacks. Hackers can steal valuable information like credit cards or install backdoors and programs to spy on users. Motives for hacking range from challenges, attention-seeking, education, and criminal plans to steal data and money. Famous hackers include Jonathan James, Kevin Mitnick, Albert Gonzalez, Kevin Poulsen, and Gary McKinnon.
This document summarizes research on internet addiction. It discusses characteristics of addiction and compares chemical and non-chemical addictions. It reviews research showing relationships between internet addiction and factors like loneliness, obesity, sleep problems, school performance, and depression. While most studies are cross-sectional, some longitudinal and treatment studies suggest internet addiction can cause and result from other issues. The document concludes there is evidence for links between internet addiction and other problems but more research is still needed.
This document provides information about the 2nd Lyceum of Kos, a state school in Greece. It has 270 students and 30 teachers. Students take a common curriculum in the first year and can choose between theoretical, technological, or science studies for the final two years. All courses lead to the same secondary school diploma. The school has ICT and science labs, a gym, and library. It offers computer science courses and participates in European educational projects to supplement students' learning.
Greece is a southern European country located in Southeast Europe, with a population of around 11 million people. It has a long history dating back to ancient Greek civilizations like the Minoan and Mycenaean cultures. In modern times, Greece struggled against Ottoman occupation for 400 years before gaining independence in the 19th century. Today, Greece is a parliamentary republic and member of the European Union, with a predominantly Greek Orthodox population and a culture that highly values family and interpersonal relationships.
The document provides information about the Greek island of Kos. It notes that Kos is located in the Dodecanese Islands in the Aegean Sea and has sandy beaches, a rich history, and vibrant nightlife. The document then discusses Kos's history, including being originally colonized by the Carians, participating in the Trojan War, and being ruled by various powers like the Venetians, Ottomans, Italians, and eventually being ceded to Greece. It also mentions that the famous physician Hippocrates was born on Kos and founded the first ancient hospital there called the Asclepion.
Norway meeting presentation teachers 2nd lyceum of kosAthina MINAIDI
The document outlines the itinerary and activities for a meeting of the Safe Internet For All project in Norway. It includes accommodations at Os videregående skole, ice-breaking activities upon arrival, meetings and workshops with the Greek team and other project partners over several days, culminating in a SIFA day with videoconferencing between partner schools. The event concluded with reviewing results and conclusions, and thanking the Norwegian team for their hospitality hosting the event.
Norway meeting presentation teachers 2nd lyceum of kosAthina MINAIDI
The document outlines the itinerary and activities for a meeting of the Safe Internet For All project in Norway. The meeting was hosted at Os videregående skole and included ice-breaking activities, lectures, workshops, and videoconferencing with partner schools. Participants stayed at the school and engaged in discussions to share results and conclusions from the exchange before thanking the Norwegian team for their hospitality in hosting the event.
2. Το κακόβουλο λογισμικό είναι ένα λογισμικό που
έχει σχεδιαστεί για να εκτελεί ανεπιθύμητες
ενέργειες για λογαριασμό κάποιου.
Το λογισμικό αυτό συλλέγει πληροφορίες από το
λογαριασμό κάποιου χρήστη,
στέλνει ενημερώσεις κατάστασης ή μηνύματα που
φαίνεται ότι προέρχονται από τον χρήστη,
ή γεμίζει το λογαριασμό του με διαφημίσεις που
εμποδίζουν τη σωστή λειτουργία του υπολογιστή.
3. Ένας ιός υπολογιστών είναι ένα κακόβουλο
πρόγραμμα υπολογιστή, το οποίο μπορεί να
αντιγράφει και να "μολύνει" τον υπολογιστή χωρίς
τη γνώση ή την άδεια του χρήστη του.
4. Αυτοί οι ιοί δρουν αθόρυβα.
Μολύνουν τον υπολογιστή και αναμένουν κάποιο
γεγονός ανάλογα με το προγραμματισμό τους.
Όταν ο ιός δούρειος ίππος εγκατασταθεί στέλνει
μέσω διαδικτύου τις κατάλληλες πληροφορίες στο
δημιουργό του ώστε αυτός να πάρει τον έλεγχο του
υπολογιστή και να χρησιμοποιηθεί σε διάφορες
παράνομες και επιβλαβείς ενέργειες.
5. Μεγάλη ικανότητα αναπαραγωγής
Ο τρόπος διάδοσης τους είναι το διαδίκτυο
Οι συγκεκριμένοι ιοί αποκτούν προσπέλαση στο
βιβλίο διευθύνσεων και αποστέλλει μολυσμένα
μηνύματα.
6. Οι χρήστες που κάνουν διπλό κλικ σε ένα
συνημμένο, επιτρέπουν στον ιό να εκτελεσθεί.
Ο κώδικας στέλνει αντίγραφα του εαυτού του σ’
όσους βρίσκονταν στο βιβλίο διευθύνσεων του
θύματος και μετά αρχίζει να καταστρέφει αρχεία
στον υπολογιστή του.
7. Για την ανίχνευση των ιών χρησιμοποιείται μία
βάση δεδομένων ή οποία περιλαμβάνει τμήματα
του κώδικα των ιών - ψηφιακές υπογραφές.
Με αυτό τον τρόπο αναγνωρίζονται τα μολυσμένα
αρχεία καθώς και αν ένας ιός έχει φορτωθεί στη
μνήμη του υπολογιστή.
8. Για να προστατεύσουμε το PC , μπορούμε να
εγκαταστήσουμε προγράμματα προστασίας.
Ένα τέτοιο πρόγραμμα εντοπίζει και διαγράφει
όλων των ειδών τις ηλεκτρονικές απειλές, τους ιούς
και τα spyware.