Društvene mreže - Miloš Nikolić - Silvana IvkovićNašaŠkola.Net
Takmičenje na portalu www.nasaskola.net
"biramo najbolju lekciju"
engleski jezik i računarstvo i informatika,
mart 2011. godine,
Društvene mreže,
Računarstvo i informatika,
Miloš Nikolić, II-1,
Silvana Ivković,
Prva niška gimnazija "Stevan Sremac"
PowerPoint prezentacija "Elektronska pošta" za VIII razred osnovne škole, predmet "Tehničko i informatičko obrazovanje" (Mihailo Urošević, Andrija Milošević i Dragan Milutinović).
This document provides tips for protecting a computer. It discusses placing the computer in a safe location away from moisture, dust, and shocks. It recommends using a surge protector and cleaning out dust regularly. The document also recommends backing up data, using antivirus software, keeping the operating system updated, and enabling firewalls to protect against viruses, hackers, spam and theft. Physical security measures like locking doors and using security cables for laptops are also suggested.
Thomas Edison invented the electric light bulb in 1878 in the United States. He was born in 1847 in Ohio and had two wives and three children over his lifetime. Edison passed away in 1931 in New Jersey, leaving behind a legacy as the inventor of the light bulb which allowed people to illuminate darkness.
Društvene mreže - Miloš Nikolić - Silvana IvkovićNašaŠkola.Net
Takmičenje na portalu www.nasaskola.net
"biramo najbolju lekciju"
engleski jezik i računarstvo i informatika,
mart 2011. godine,
Društvene mreže,
Računarstvo i informatika,
Miloš Nikolić, II-1,
Silvana Ivković,
Prva niška gimnazija "Stevan Sremac"
PowerPoint prezentacija "Elektronska pošta" za VIII razred osnovne škole, predmet "Tehničko i informatičko obrazovanje" (Mihailo Urošević, Andrija Milošević i Dragan Milutinović).
This document provides tips for protecting a computer. It discusses placing the computer in a safe location away from moisture, dust, and shocks. It recommends using a surge protector and cleaning out dust regularly. The document also recommends backing up data, using antivirus software, keeping the operating system updated, and enabling firewalls to protect against viruses, hackers, spam and theft. Physical security measures like locking doors and using security cables for laptops are also suggested.
Thomas Edison invented the electric light bulb in 1878 in the United States. He was born in 1847 in Ohio and had two wives and three children over his lifetime. Edison passed away in 1931 in New Jersey, leaving behind a legacy as the inventor of the light bulb which allowed people to illuminate darkness.
The document discusses maintaining and protecting computer hardware. It explains how to evaluate hardware components when purchasing or upgrading, how input and output devices connect to computers, and basic maintenance tasks like cleaning and virus protection. Regular inspections and troubleshooting steps can identify problems before they escalate. Uninterruptible power supplies and surge protectors help prevent damage from power issues. Security measures like firewalls protect the system from hackers and viruses.
This document discusses types of resources, problems with non-renewable energy, and methods to reduce pollution and conserve resources. It defines renewable and non-renewable resources and examines fossil fuels, pollution, acid rain, and global warming. Suggested solutions include using alternative energy sources, reducing pollution emissions, improving energy efficiency, and recycling resources.
The document discusses Fleming's left hand rule and right hand rule for electric motors and generators. It then provides explanations of how electric motors and generators work. It states that an electric motor converts electrical energy to mechanical energy using the principles that a current-carrying coil placed in a magnetic field will experience a force. It also discusses the construction and working of DC motors and AC generators. The key components of motors and generators like armature, commutator, and brushes are explained. Faraday's law of electromagnetic induction and his experiment demonstrating it are also summarized.
This document provides an overview of satellite communication and satellite systems. It discusses different types of transmission systems including radio, coaxial cable, and optical fiber systems. It describes how radio systems use electromagnetic waves to transmit signals and the portions of the frequency spectrum used. The document outlines the layers of the atmosphere and how the ionosphere and troposphere can propagate radio waves. It also categorizes different types of radio communication including ionosphere communication, line of sight microwave communication, and troposphere scatter communication. The document discusses advantages of satellite communication and components of a satellite communication network including the space and ground segments. It covers topics like satellite orbits, frequency bands used, and multiple access techniques in satellite systems.
This document provides an overview of IP addressing and routing. It discusses key topics such as:
- IP addresses being 32-bit numbers written in dotted-decimal format, with the network portion identifying the network and host portion identifying the device.
- Private and public IP addresses, and how Network Address Translation (NAT) allows private networks to connect to the internet using a public IP address.
- Protocols like ARP and DNS that resolve IP addresses to MAC addresses and names.
- Default gateways and how routers use routing tables to determine the best path between networks.
- The differences between routing and switching, with routing using network layer information and switching using data link layer addresses.
This document provides an overview of wireless personal area networks (WPANs), including Bluetooth, ZigBee, and Ultra-Wideband. It describes the key features and applications of each technology, how their protocols are structured, and how they compare to each other. Bluetooth supports data rates up to 2 Mbps over short ranges and is used in devices like phones, laptops, and printers. ZigBee focuses on low power consumption and supports thousands of nodes in a mesh network for uses like smart homes and buildings. Ultra-Wideband provides high data rates over short ranges and is used in applications like TVs, DVD players, and mobile devices.
Protocols define rules for formatting and transmitting data over a network. Common protocols include TCP/IP, HTTP, FTP, and SMTP. TCP/IP provides reliable data transmission and IP specifies packet delivery. HTTP is the protocol for web pages and hyperlinks. FTP transfers files between hosts using separate channels for commands and data. SMTP enables email transmission over IP networks.
Magnetic effect of electric current of class 10th.All you need from this chapter is available here.convenient for studying this chapter of class 10 NCERT book.BEST FOR EXAMS!
A personal area network (PAN) allows communication between devices near an individual via wired or wireless connections. Wireless PANs use technologies like Bluetooth or ZigBee. Bluetooth operates in the 2.4 GHz range using frequency hopping and can connect one master device to up to 7 slave devices. ZigBee uses the IEEE 802.15.4 standard and targets low-power, low data rate, secure mesh networking applications.
Protocols are sets of rules that allow computing devices to communicate. They define data formats, flow control, routing, error handling and other aspects of communication. Some key protocols include TCP, HTTP, FTP, SMTP, UDP and ICMP. Protocols ensure smooth functioning between systems by establishing predetermined understandings for data transmission, addressing, and error handling. The TCP/IP protocol suite defines widely used standards for exchanging packets of information between computers over networks.
Firewall technology has evolved from basic packet filters to today's advanced firewalls that filter packets, check for dangerous code, and decode email attachments. Firewalls come in different types (personal, organization, enterprise) and topologies (dual homed gateway, screened host, screened subnet) to provide security for networks of various sizes. Future firewalls are expected to more tightly integrate hardware and software for improved network protection.
A firewall is a hardware or software barrier that protects private networks from unauthorized access from outside networks. There are two main types - hardware firewalls which are physical devices installed between networks, and software firewalls which are installed on individual computers. Common firewall techniques include packet filtering, application gateways, circuit-level gateways, and bastion hosts. A firewall examines all incoming and outgoing network traffic and blocks unauthorized traffic based on predefined security rules.
The document discusses network protocols and related standards. It introduces the OSI Reference Model, which defines seven layers of network functionality standardized by ISO to enable communication between systems. These layers include the physical, data link, network, transport, session, presentation, and application layers. The document also discusses IEEE 802 network specifications and various protocols like TCP/IP, NetBEUI, and others. It provides an overview of each OSI layer and their functions in network communication.
The document discusses Internet protocols and TCP/IP. It describes how the Internet protocols were developed in the 1970s to facilitate communication between different computer systems. The key protocols are TCP and IP. TCP provides reliable data transmission and IP provides best-effort delivery of packets across networks. The document outlines the TCP/IP protocol stack and key concepts like IP addressing, ARP, routing, ICMP, TCP connection establishment and sliding windows.
Naslov članka: Tri antiutopije
projekt / tema u 1. razredu gimnazije
(primjer dobre prakse – odrađeno u 1.a, 1.b i 1.d razredu šk. godine 2020./2021.)
Autorica: Sonja Delimar
DAN SIGURNIJEG INTERNETA
Pedagoška radionica: Grafičari i sigurniji internet“
Tehnička škola i prirodoslovna gimnazija
Ruđera Boškovića iz Osijeka
Pedagoginja: Gordana Popović, prof.
Udruga "Suradnici u učenju" je od 2. do 8 studenog 2020. organizirala prvo natjecanje iz računalnog razmišljanja za učitelje, nastavnike, stručne suradnike i ravnatelje.
Natjecanje iz informatike i računalnog razmišljanja – Dabar održano je u osnovnim i srednjim školama Republike Hrvatske od 9. do 13. studenoga 2020. na CARNET-ovom sustavu MOOC.
1. Sadržaj prezentacije
Što je virus ?
Koje su vrste virusa ?
Kako prepoznati virus ?
Kako riješiti problem s virusom ?
2. • Naslovnica
VIRUS
• Vrste virusa
• Kako prepoznati virus ?
• Kako riješiti problem s virusom ?
Računalni virus je program koji može "zaraziti" druge programe tako da u njih
unese kopiju samog sebe (koja može biti modificirana). Virus se može
proširiti računalnim sustavom ili mrežom koristeći se ovlastima korisnika koji
su zaraženi. Svaki program koji je zaražen postaje virus i tako zaraza raste.
Računalnim virusima se često nazivaju i drugi štetni programi, npr. trojanski konji i crvi,
iako oni zapravo ne inficiraju datoteke, već imaju druge funkcije, na primjer širenje
mrežom (crvi) te krađa korisničkih lozinki i brojeva kreditnih kartica i/ili omogućavanje
pristupa neovlaštene osobe zaraženom računalu (karakteristično za trojanske konje).
3. Vrste virusa
• Naslovnica
• Što je virus ?
• Kako prepoznati virus ?
• Kako riješiti problem s virusom ?
• boot sektor virusi – napadaju Master boot sektor
• parazitski – zaraze izvršne datoteke dodavanjem svog sadržaja u strukturu
programa
• svestrani virusi – napadaju boot sektore i izvršne programe
• virusi pratioci – stvori .com datoteku koristeći ime već postojećeg .exe
programa i ugradi u nju svoj kod
• link virusi – u trenu inficiraju napadnuti računalni sustav, može izazvati pravi
kaos na disku
• makro virusi – imaju mogućnost da sami sebe kopiraju, brišu i mijenjaju
dokumente
4. KAKO PREPOZNATI VIRUS ?
• Naslovnica
• Virus
• Vrste virusa
• Kako riješiti problem s virusom ?
Probleme s virusom možemo lako riješiti moramo paziti na koje web-stranice ulazimo.
Jer ako uđemo na neku web-stranicu može doći do “zatrovanja “ našega računala.Stoga
moramo imati dobar antivirus program koji će nas štititi od problema.
5. Kako riješiti problem s
• Naslovnica
virusom ?
• Virus
• Vrste virusa
• Kako prepoznati virus ?
Problem možemo riješiti tako da očistimo cijelo računalo ili odnesemo ga na
popravak ali do toga ne bi došlo da smo ga pazili…